Privacy & Data
Protection at ShieldLoom

Last updated | July, 2025

Privacy Policy

Welcome to Gala Intelligence ("Gala Intelligence," "Company," "we," "our," or "us"). We are committed to protecting your privacy, safeguarding your personal information, and maintaining transparency regarding how information is collected, used, stored, shared, and protected.

This Privacy Policy explains how Gala Intelligence collects, processes, uses, stores, transfers, and protects information when you use our mobile applications, websites, products, platforms, APIs, communication services, and related offerings (collectively, the “Services”).

By accessing, installing, registering for, or using our Services, you acknowledge that you have read and understood this Privacy Policy and agree to the practices described herein.

1. SCOPE OF THIS POLICY

This Privacy Policy applies to:

  • Mobile applications developed and operated by Gala Intelligence.
  • Websites and web platforms operated by Gala Intelligence.
  • APIs, integrations, and communication systems.
  • Caller identification, spam protection, fraud detection, analytics, and related services.
  • Customer support, promotional, and engagement channels.

This Policy applies regardless of the device, operating system, or method used to access our Services.

2. DEFINITIONS

For the purposes of this Privacy Policy:

  • Personal Information / Personal Data means any information that identifies, relates to, describes, or can reasonably be associated with an individual.
  • Sensitive Personal Information means information requiring additional protection under applicable laws.
  • Processing means collecting, recording, organizing, storing, using, sharing, transferring, or deleting information.
  • User means any person who accesses or uses the Services.
  • Third Party means any entity other than Gala Intelligence and the User.

3. INFORMATION WE COLLECT

We collect information directly from users, automatically through device interactions, from third parties, and through service usage.

3.1 Information You Provide Directly

When you create an account, contact support, submit reports, or interact with our Services, we may collect:

  • Full name
  • Phone number
  • Email address
  • Profile photograph
  • Address information
  • Country and region
  • Business or company details
  • Professional website or social profiles
  • User-submitted tags, reports, feedback, or notes
  • Communication preferences
  • Support requests and correspondence

Providing certain information may be optional; however, some Services may not function properly without required information.

3.2 Device and Technical Information

When you install or use the Services, we may automatically collect:

  • IP address
  • Device identifiers
  • Advertising identifiers
  • Device manufacturer and model
  • Operating system and version
  • Mobile network information
  • SIM and carrier information
  • Browser type and version
  • Device language and regional settings
  • App version and configuration
  • Device performance and diagnostics
  • Connection information
  • Time zone and timestamps
  • Crash reports and logs
  • Usage analytics and engagement metrics
  • Screen resolution and hardware specifications
  • Installed application metadata where permitted by law

3.3 Call, Messaging, and Communication Information

Subject to permissions granted by the user and applicable law, we may collect:

  • Incoming and outgoing phone numbers
  • Caller identification metadata
  • Spam reports and risk indicators
  • Call timestamps and durations
  • SMS sender information
  • Message metadata
  • Communication logs
  • Fraud or abuse indicators

We do not access or store the content of private communications unless explicitly disclosed by the user or legally required.

3.4 Contact Information

Where legally permitted and where the user explicitly grants permission, we may access contact information stored on the device, including:

  • Names
  • Phone numbers
  • Email addresses
  • Contact images
  • Associated identifiers

This information may be used to improve caller identification, spam prevention, and contact recognition functionality.

Users may revoke contact access permissions at any time through device settings.

3.5 Location Information

Depending on device permissions and service functionality, we may collect:

  • Approximate location
  • GPS-based precise location
  • IP-based geographic location
  • Country and regional information

Location information may be used for:

  • Fraud prevention
  • Security analysis
  • Localized services
  • Compliance requirements
  • Improving service performance

3.6 Information from Third Parties

We may receive information from:

  • Public databases
  • Telecom or communications partners
  • Advertising and analytics providers
  • Fraud prevention providers
  • Social media integrations
  • Payment processors
  • Business partners
  • Government or regulatory authorities where legally permitted

Third-party information may include demographic information, contact details, risk intelligence, and publicly available data.

3.7 Cookies and Tracking Technologies

We use cookies, SDKs, web beacons, local storage, and similar technologies to:

  • Authenticate users
  • Maintain session security
  • Improve functionality
  • Analyze performance
  • Personalize user experiences
  • Measure advertising effectiveness
  • Prevent fraud and abuse

Users may manage cookie preferences through browser or device settings.

5. HOW WE USE INFORMATION

5.1 Service Delivery

  • Provide caller identification and communication services
  • Enable spam and fraud detection
  • Deliver contact recognition functionality
  • Facilitate account management
  • Provide customer support
  • Process transactions and subscriptions

5.2 Security and Fraud Prevention

  • Detect spam, scams, abuse, and malicious activity
  • Verify identities and accounts
  • Protect users and systems
  • Prevent unauthorized access
  • Investigate violations and suspicious activities

5.3 Product Improvement

  • Improve algorithms and intelligence systems
  • Analyze usage patterns and trends
  • Conduct testing, troubleshooting, and diagnostics
  • Develop new features and products
  • Improve system stability and performance

5.4 Communication

  • Send service notifications and updates
  • Provide alerts and security notices
  • Respond to support requests
  • Share promotional or marketing communications where permitted

Users may opt out of marketing communications at any time.

5.5 Compliance and Legal Obligations

  • Comply with applicable laws and regulations
  • Respond to lawful requests from authorities
  • Enforce agreements and policies
  • Protect legal rights and public safety

6. SHARING AND DISCLOSURE OF INFORMATION

We do not sell personal information without appropriate legal basis or user consent.

We may share information with:

6.1 Service Providers and Vendors

Third-party vendors supporting:

  • Cloud hosting
  • Analytics
  • Security services
  • Customer support
  • Payment processing
  • Infrastructure management
  • Communication delivery

These parties are contractually obligated to protect information and use it only for authorized purposes.

6.2 Business Partners and Integrations

Where users enable integrations or partnerships, limited information may be shared to provide requested functionality.

6.3 Legal and Regulatory Authorities

We may disclose information where required to:

  • Comply with laws or court orders
  • Respond to legal processes
  • Protect rights, users, or public safety
  • Prevent fraud, abuse, or security threats

6.4 Corporate Transactions

In connection with mergers, acquisitions, financing, restructuring, asset sales, or bankruptcy proceedings, information may be transferred subject to confidentiality and legal safeguards.

7. INTERNATIONAL DATA TRANSFERS

Your information may be processed, transferred, or stored in countries outside your jurisdiction, including countries with different data protection laws.

Where required, we implement safeguards such as:

  • Contractual protections
  • Data processing agreements
  • Security and confidentiality controls
  • Regulatory compliance measures

By using the Services, you acknowledge and consent to such transfers where legally permitted.

8. DATA RETENTION

We retain information only for as long as necessary to:

  • Provide Services
  • Fulfill contractual obligations
  • Comply with legal requirements
  • Resolve disputes
  • Enforce agreements
  • Prevent fraud and abuse

Retention periods may vary depending on the nature of the information and legal obligations.

When information is no longer required, we take reasonable measures to securely delete, anonymize, or de-identify it.

9. USER RIGHTS

Depending on applicable laws, users may have rights including:

  • Right to access personal information
  • Right to correction or rectification
  • Right to deletion or erasure
  • Right to withdraw consent
  • Right to object to processing
  • Right to restrict processing
  • Right to data portability
  • Right to opt out of marketing communications
  • Right to lodge complaints with authorities

Requests may be submitted using the contact information provided below.

We may verify identity before processing requests.

10. ACCOUNT CONTROLS AND OPT-OUT OPTIONS

Users may:

  • Modify profile information
  • Disable permissions through device settings
  • Opt out of marketing communications
  • Request removal of contact information
  • Delete accounts where available
  • Restrict tracking technologies through browser or device controls

Certain features may become unavailable if permissions are disabled.

11. DELISTING OF CONTACT INFORMATION

Users who previously enabled enhanced search or contact-sharing functionality may request delisting or removal of searchable information.

Upon valid request:

  • Search visibility may be restricted
  • Contact indexing may be disabled
  • Associated searchable records may be removed where legally permitted

Certain information may still be retained where legally required or necessary for fraud prevention and security purposes.

12. CHILDREN AND MINORS

The Services are not intended for individuals below the legal age required under applicable laws.

We do not knowingly collect personal information from children without appropriate legal authorization.

If we become aware that information from a child has been collected unlawfully, we will take reasonable steps to delete such information.

Parents or guardians who believe a child has provided personal information may contact us.

13. SECURITY OF INFORMATION

We implement reasonable administrative, technical, organizational, and physical safeguards designed to protect information against:

  • Unauthorized access
  • Loss or misuse
  • Alteration or destruction
  • Disclosure or compromise

Security measures may include:

  • Encryption
  • Access controls
  • Monitoring systems
  • Authentication mechanisms
  • Secure infrastructure practices
  • Internal security policies

However, no system or transmission method can be guaranteed to be completely secure.

Users are responsible for maintaining the confidentiality of account credentials and device security.

14. THIRD-PARTY SERVICES AND LINKS

The Services may contain links to or integrations with third-party platforms, applications, or websites.

We are not responsible for the privacy practices, security, or content of third-party services.

Users should review the privacy policies of third-party providers before interacting with them.

15. ADVERTISING AND ANALYTICS

We may use analytics and advertising technologies to:

  • Measure service engagement
  • Understand usage trends
  • Improve advertising relevance
  • Analyze campaign effectiveness

Third-party analytics or advertising providers may collect information subject to their own policies.

Users may manage advertising preferences through device or browser settings where available.

16. AUTOMATED PROCESSING AND INTELLIGENCE SYSTEMS

Gala Intelligence may use automated systems, machine learning models, and analytical technologies to:

  • Detect spam and fraud
  • Classify communication risks
  • Improve caller identification
  • Analyze suspicious activity
  • Improve operational efficiency

These systems may process communication metadata and behavioral signals.

Where legally required, users may request additional information regarding significant automated decisions.

17. INCIDENT RESPONSE AND BREACH NOTIFICATION

In the event of a security incident involving personal information, Gala Intelligence may:

  • Investigate and mitigate the incident
  • Notify affected users where legally required
  • Inform regulators or authorities where applicable
  • Take corrective and preventive actions

18. CHANGES TO THIS PRIVACY POLICY

We may update or modify this Privacy Policy periodically.

Material changes may be communicated through:

  • Application notifications
  • Website notices
  • Email communications
  • In-service alerts

The “Last Updated” date at the top indicates the latest revision date.

Continued use of the Services after updates constitutes acceptance of the revised Privacy Policy.

19. GOVERNING LAW

This Privacy Policy shall be governed by and interpreted in accordance with applicable laws of India and other relevant jurisdictions where the Services are offered.

20. CONTACT INFORMATION

For questions, requests, grievances, or privacy-related concerns, please contact:

Gala Intelligence, India
Email: support@galaintelligence.com

Security

Experience the Ultimate in Cyber Security Protection

Experience the ultimate cybersecurity protection to keep your Family, Data, and Online identity safe