Privacy Policy

Myrteni Smart Solutions SMPC respects your concerns about privacy. We pay great attention to our users’ privacy. Related information will be collected and adopted from you when using our application and we hope to give you a clear declaration through this document about how we collect, use, store and protect this information and the way to access, update, control and protect it when you enjoy our service.

This statement is closely related to our application, please make sure to read it carefully.

1. Collected information

1.1 Information we need

No personal information will be needed when you download and use the mobile application.

1.2 Information acquired when using the application

We will collect the mobile device information and assign to it a virtual mobile device code. This virtual code will be used to identify unique users and ensure accurate delivery of message pushes, and it is stored in our server.

2. How we use the collected information

The information collected might be used for the following reasons:

  • Delivery of push notifications
  • Revise system settings
  • Notice information for software updating

3. Personal information sharing in accordance with law and regulations

We may share the collected information externally in accordance with laws and regulations, or mandatory requirements of government authorities.

4.Contact Us

If you have any questions, comments, or suggestions about this Privacy Policy, please contact us at:

Email: info@myrteni.gr

We will generally respond to your inquiries within 15 business days.

5.Information Security

The information collected will be only reserved for the time required for the delivery of our service, and for legal requirements within a limited time under this Privacy Policy.

Myrteni Smart Solutions SMPC takes all necessary measures to secure the collected information, by applying any relevant information security technology and procedures. However, we need to underline that there is no complete security under the existing technology limits and any possible cybersecurity attacks that may arise, even though we try our best.