Privacy Policy

Last Updated: January 25, 2025

Privacy Policy for Color Picker Geco Extension

We respect your privacy and are committed to protecting your data while you use the Color Picker Geco extension (hereinafter referred to as the “Extension”). This document explains what data is processed and what measures we take to protect it. By using our Extension, you agree to the terms outlined in this Privacy Policy. We reserve the right to modify this document by publishing an updated version. Your continued use of the Extension after any updates constitutes acceptance of the new terms.

Data Collection and Processing

  • Personal Data
  • The Extension does not collect any personal data, such as your name, email address, passwords, or any other personally identifiable information. We also do not track keystrokes or collect any data unrelated to the Extension’s functionality.
  • Access to Google APIs
  • The Extension does not request access to Google APIs and does not receive any information about users who install it via the Google Chrome Web Store.
  • Sharing Data with Third Parties
  • Since we do not collect personal data, no information is shared with third parties.

Data Storage

All user settings are stored locally in your browser’s storage. No data is transmitted to external servers, ensuring complete privacy of your preferences.

Use of Cookies

We may use cookies to improve the Extension’s functionality, such as saving user preferences or analyzing usage trends. Most browsers accept cookies by default, but you can modify your settings to disable them. Please note that disabling cookies may affect some features of the Extension.

Analytics Data

To analyze user behavior and enhance the Extension’s functionality, we use Google Analytics. This tool helps us understand which features are most used. You can learn more about how Google processes your data by reviewing Google’s Privacy Policy.

Data Security

We implement modern security measures, including:

  • Internal security audits,
  • Data encryption,
  • Local storage protection,
  • Physical security measures.
These steps help minimize the risk of unauthorized access, modification, or data breaches.

Contact Us

If you have any questions, contact us at: [email protected]