Last updated: January 27, 2023
Information Collection and Use
When you create an account with Lotus Meditation & Sleep, you provide us with personal information such as your name, email address, and other information you choose to provide. We use this information to provide you with the best possible experience when using our app.
We may also collect information about your device, such as its type, operating system, and language, as well as your location data. This information is used to improve the quality of our services and to deliver more relevant advertisements.
Ads and Analytics
Lotus Meditation & Sleep may display advertisements to you while you use the app. These advertisements are delivered by third-party ad networks and may be based on your interests and activities. To deliver these advertisements, we and third-party ad networks may use device information, including, but not limited to, IP address, device type, operating system, and geographic location.
In addition, we may use analytics tools to better understand how our users interact with the app and to improve our services. These analytics tools may collect information such as your device type, operating system, and location data.
Lotus Meditation & Sleep offers the ability to log in using your email, Google, Facebook, or Apple account. When using these third-party login services, you may be asked to provide personal information such as your name and email address. This information will be shared with Lotus Meditation & Sleep in accordance with the terms of service of the third-party service you used to log in.
Data Sharing and Disclosure
Lotus Meditation & Sleep will not share or disclose your personal information to third parties unless required by law or with your prior consent.
Lotus Meditation & Sleep takes the security of your personal information seriously and implements appropriate technical and organizational measures to protect it from unauthorized access or unauthorized alteration, disclosure or destruction. However, please be aware that no security measures are perfect or impenetrable and no method of data transmission can be guaranteed against any interception or other type of misuse.