Privacy Policy for UZB CYBER KALKAN
Xayrulla SaidovLast updated: November 21, 2025
This Privacy Policy describes how UZB CYBER KALKAN (the "App"), operated by CYBER KALKAN MCHJ, collects, uses, and protects user data. Our primary goal is to protect your device, and we are committed to ensuring your privacy throughout this process.If you have questions, contact us at: wwwclas2@gmail.com1. Core App Functionality & Data UsageUZB CYBER KALKAN is a security tool designed to protect your device by:•Scanning installed applications for malware and suspicious behavior.•Scanning files in your device's storage for potential threats.•Monitoring for newly installed applications and downloaded files in real-time.•Allowing users to uninstall harmful applications and delete malicious files.To provide these features, the App requires access to certain device data and permissions, as detailed below.
2. Information We Collect and WhyWe do not collect personally identifiable information (PII) like your name, email address, or phone number. All operations are designed to be anonymous.
2.1. Installed Application Information•What we access: To scan for threats, we access the list of all applications installed on your device (QUERY_ALL_PACKAGES permission). For each application, we analyze its package name, signature, permissions, and code structure (.dex files).•Why we access it: This is essential for our antivirus engine to compare installed apps against our malware database and to perform heuristic analysis (behavioral scanning) to detect new threats.•Data sharing: This information is processed locally on your device. Only anonymized data hashes (like SHA-256) or package names may be checked against our remote malware database.
2.2. File and Storage Access•What we access: The App requires broad access to your device's storage (MANAGE_EXTERNAL_STORAGE permission) to perform full-device scans for malicious files (e.g., .apk, .zip, .pdf).•Why we access it: Harmful files can be located anywhere on your device. This permission allows us to find and analyze them. We also use this to delete files identified as threats, but only after your explicit confirmation.•Data sharing: Files are analyzed locally. We do not upload your personal files or documents to our servers.
2.3. Anonymous Authentication Data (Firebase)•What we collect: The App uses Firebase Anonymous Authentication, which generates a unique, anonymous Firebase User ID for your device. This ID is not linked to your personal identity.•Why we collect it: This ID is used to manage premium subscriptions, apply promo codes, and distinguish between different users without collecting personal data.
2.4. App Integrity and Security (Google Play Integrity API)•What we do: The App uses Google's Play Integrity API to verify the integrity of your device and the apps installed on it. This API checks if your device is rooted, if it has a recognized version of Android, and if apps were installed from a trusted source like the Google Play Store.•Why we do it: This helps our App make more accurate security decisions and protects against sophisticated threats that may compromise the operating system. The data is processed by Google's services.
2.5. Analytics and Crash Reports (Firebase)•What we collect: We use Firebase Analytics and Crashlytics to gather anonymized data about app usage (e.g., which features are used most) and crash reports. This may include device type, OS version, and other non-personal technical information.•Why we collect it: This data is crucial for us to fix bugs, improve app stability, and enhance the user experience.
3. Data SharingWe do not sell, trade, or share your data with third parties, with the following exceptions:•Google (Firebase & Play Integrity): Data is shared with Google to provide core functionalities like anonymous authentication, analytics, crash reporting, and device integrity checks. Google processes this data according to its own privacy policy.•Legal Requirements: We may disclose information if required by law.No other third-party integrations, payment systems, or advertising networks are used in the App at this time.
4. User Control and Data Management•Uninstalling Applications: The App can initiate the uninstallation process for malicious apps (REQUEST_DELETE_PACKAGES permission), but the final confirmation is always required from you via a system dialog.•Deleting Files: You have full control over deleting files. The App will recommend deleting a file only if it is identified as a threat, and the action will not be performed without your consent (e.g., pressing a "Delete" button).•Data Deletion: Since we do not store personal information, the primary data is the anonymous Firebase ID. Deleting this ID is not currently a built-in feature. If you uninstall the app, this anonymous data remains in Firebase but is not linked to you or your device if you reinstall.
5. Security MeasuresWe are committed to protecting your data. We use industry-standard security practices, including:•Using Firebase Security Rules to protect data stored in our backend.•Encrypting data in transit.•Performing all sensitive analysis locally on your device to prevent personal data exposure.
6. Children’s PrivacyThe App is intended for a general audience. We do not knowingly collect any personal information from children under the age of 13 (or the relevant age in your jurisdiction). All user interactions are anonymous.
7. Changes to This Privacy PolicyWe may update this Privacy Policy to reflect changes in our services or for legal reasons. We will notify you of any significant changes by updating the "Last updated" date of this policy.8. Contact UsIf you have any questions or concerns about this Privacy Policy or our data practices, please contact us at:•Email: wwwclas2@gmail.com
•Developer: CYBER KALKAN MCHJ