WHAT KIND OF INFORMATION WE COLLECT AND HOW WE USE IT
Mobile Phone Number
The Off Hours™ mobile application will prompt the user for their mobile number on installation. The sole use of the number is to allow the mobile phone to be identified by the end user at the Off Hours™ web portal. The mobile number entered does not have to be a valid number, but entering a bad number may affect future functionality (re: text messages), of the Off Hours™ system.
Mobile Phone Location
The Off Hours™ mobile application checks the phone’s location approximately every five minutes. Historical locations are not recorded. The sole purpose of the location check is to test if the phone is within a geofence of any given appliance.
- Facebook Authentication. For users that elect to use Facebook as their authentication mechanism, the Off Hours™ system will ask Facebook for their name and e-mail from the user’s public profile in Facebook.
- Discrete Authentication (Traditional Username & Password). Off Hours™ will use the users e-mail address as their username in the system. The email will only be used to recover forgotten passwords and occasional notifications by MobileM2M about materials changes to the system.
Off Hours™ uses RADUIS location data. RADIUS is a rough location approximation that is derived from the cellular network provider. The Off Hours™ web portal will allow the end user to use this location as the appliance location, but it’s recommended that the end user enters the physical address location of the appliance. This location is used as the center of the geofence. The system tests the address entered by end users to check if it within 5 miles of the reported RADUS location. User address’ outside of 5 miles are not allowed.
Credit Card Information
Off Hours™ uses a 3rd party to process secure credit card payments. All confidential information, (name, credit card number, et.), remains with the processor and is not shared with the Off Hours™ system.
None of the above-mentioned information is shared with any 3rd parties, and all customer data is deleted when users terminate their account.
MobileM2M takes the security of your information very seriously. We uses reasonable administrative, physical, and technical safeguards to secure the information you share with us. Despite these safeguards and our additional efforts to secure your information, we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third-parties will not be able to defeat our security, and improperly collect, access, steal, or modify your information.