About this policy
Regarding Amazon, “Alexa” means their Alexa Voice Service which includes third party services (like our skills) and other related Software.
When you use our skills you have to talk to Alexa. This voice input is sent to Amazon and us where we use it to understand what our skill should do for you. This is absolutely necessary for our service to give you an appropriate answer and an adequate functionality.
Data Collection, Use, and Sharing
We are the sole owners of the information collected by this skill.
We only have access to/collect information that you voluntarily give us via the use of this skill or other direct contact from you. We will not sell or rent this information to anyone.
We will use your information to respond to yo and to execute the commands regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request.
To improve our services we analyze automatically how often utterances are spoken and other analytics. This is done automatically by Amazon in the Amazon Developer Portal.
For some of our skills you need to save your data and your account information in our databases. This data in particular are your Alexa user ID, your email and the account Name. We will not recover other personal information through our Alexa skill
However, other personal information provided by you in other state may be stored on our database as a result of your subscription / purchase of services and / or products supplied by our company and therefore acquired externally to this Alexa skill and for which appropriate policy has been provided elsewhere.
We take precautions to protect your information. When you submit sensitive information via the Alexa service, your information is protected both online and offline.
While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer/technical service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.