Skip to content

Effective: Sep 1, 2023

Version: 23.9.1

Google API Disclosure

Sparky’s use and transfer to any other app of information received from Google APIs will adhere to Google API Services User Data Policy, including the Limited Use requirements.

1.Data Utilization Scope

Sparky, leverages Google APIs to access and retrieve pertinent data in order to enhance its functionalities and services. These APIs provide essential resources that contribute to the seamless operation of the application, thereby ensuring a superior user experience.

2.Adherence to Google API Services User Data Policy

It is of paramount importance to highlight that Sparky is committed to complying rigorously with Google’s API Services User Data Policy. This policy outlines the stipulations and guidelines governing the collection, usage, and transmission of user data facilitated by Google APIs.

3.Limited Use Obligations

Underpinning the data utilization protocol of Sparky is the strict observance of the Limited Use requirements mandated by Google. These stipulations enunciate that the data procured through Google APIs will be employed solely for the purposes specified within the application’s intended scope of functionality. Any unauthorized or non-conforming use of the acquired data is unequivocally prohibited and will be treated as a breach of the prescribed terms.

4.Information Transfer to Third Parties

In the event of information sharing or transfer necessitated by the application’s operational demands, Sparky will ensure that such data dissemination adheres comprehensively to Google’s data sharing regulations and the tenets of the Limited Use requirements. Any data shared with third-party applications or services will be conducted with due diligence, encompassing the requisite user consents and transparency, as mandated by prevailing legal and regulatory frameworks.

5.User Data Privacy and Security

Sparky places an unwavering emphasis on safeguarding the privacy and security of user data procured through Google APIs. The application employs robust encryption protocols and state-of-the-art security mechanisms to thwart unauthorized access, mitigate risks, and avert any form of data compromise.