The Aviator mobile application
Last updated on January 19, 2022
COLLECTION OF YOUR INFORMATION
I personally don’t collect ANY information via the Application. However the Application needs access to some sensitive data like:
The Application registers for accurate geo location / GPS coordinates to enable the primary purpose of the Application – flight navigation. When the Application is in flight mode it collects and stores the coordinates into a flight log file which is then available to the user to manage (view, export, delete). The log files are not share or send anywhere. They remain in the private area of the Application until they are manually deleted by the user or the Application is deleted from the device.
When the user activates the Location sharing feature user’s actual geo location / GPS coordinates are sent to the Aviator backend server for sharing with other users of the application within the same sharing group. The location is shared with user’s own nick name of his choice without link to any other private data. When the user disables the feature, no data are being sent to the backend system and the last position is deleted.
Sharing of Flight recordings
The Aviator application is able to export the flight records / logs to external / 3rd party applications / services. Any export is manual action from the application user. Nothing is exported or shared automatically or in background.
The Aviator integrates with the xcontest.org portal, users can export the flight recording / log to the portal. For this purpose the application needs to store portal login credentials (user / login name and password) securely.
Another option is to export the flight recording / log into the KML format and the open it in the Google Earth application. however it’s user’s discretion where the recording is stored.
Mobile Device Storage Access
I may request access or permission to the device storage to store the flights log files. If you wish to change the Application access or permissions, you may do so in your device’s settings. This however may limit the application functionality.
SECURITY OF YOUR INFORMATION
I use administrative, technical, and physical security measures to help protect your personal information. While I have taken reasonable steps to secure the personal information you provide to my backend system, please be aware that despite our efforts, no security measures are perfect or impenetrable, and no method of data transmission can be guaranteed against any interception or other type of misuse. Any information disclosed online is vulnerable to interception and misuse by unauthorized parties. Therefore, I cannot guarantee complete security if you provide personal information.