Privacy Policy
By accessing or using ShieldLoom (the "Services") you consent to the collection, use, sharing and processing of personal information as described in this Policy. If you provide personal information about another individual you confirm you have authority to do so.
1. Personal Information Collected
Information you provide directly:
- User Profile: First name, last name, phone number and optional photo, address, email, country, website.
- Other Submissions: Tags (e.g. business names), spam reports, survey responses, support interactions.
Information collected automatically when installing or using the Services may include geo‑location, IP address, device identifiers, OS & hardware details, SIM usage, installed apps (for threat analysis), usage statistics, default communication apps, screen resolution, logs & event data, call/SMS metadata, and version data. Some features require access to your device address book (never stored when installed via official stores) to enable enhanced spam intelligence.
Third‑party service identifiers you choose to connect (e.g. social login) are used solely to enable interoperability; we never store third‑party passwords.
Additional data categories for mobile threat detection may include caller information, device information and permission states (contacts, call, notification, read call logs, SMS) strictly to deliver caller ID, protection and filtering functionality.
2. How We Use Personal Information
- Provide smart caller ID, document/app/link inspection and spam blocking.
- Maintain community-driven spam intelligence and improve detection models.
- Personalize protection thresholds and feature experience you elect.
- Operate, secure, troubleshoot and enhance the Services.
- Comply with legal obligations and prevent fraud or abuse.
4. Delisting of Contact Information
Disabling enhanced search removes contributed contact information from active lookup results. You may request full exclusion by contacting us (see Contact).
5. Information Security & Transfers
We apply layered safeguards including encryption in transit, hardened infrastructure, least‑privilege access controls, audit logging and periodic security assessments. Data may be processed in jurisdictions where we or our cloud providers operate (including India). No method of transmission or storage is 100% secure; we continually improve our controls.
6. Accessing & Updating
You may request confirmation of what personal data we process, updates, corrections or deletion where legally permissible. We may retain minimal records required for fraud prevention, security or legal compliance.
7. Minors
The Services are not directed to individuals below the applicable age of consent. We do not knowingly collect data from minors. If you believe a minor has provided data, contact us for removal.
8. Changes to This Policy
Material changes will be communicated via in‑app notice, email or push notification where appropriate. Continued use after effectiveness constitutes acceptance.
10. Contact
If you have questions, requests or grievance submissions contact:
This summary format is provided for usability; if any inconsistency arises with a future full-length legal version, the latter will control.

