Privacy Policy

This Privacy Policy describes how we collects, uses, and shares personal data when you use Abbiya, our progressive web application ("the App").

By using the App, you agree to the practices described in this Privacy Policy.


1. Data Collection

We collect various types of data, including but not limited to:

  • Email: We collect your email address for account registration and communication purposes.
  • Authentication Tokens: When you use third-party authentication providers (e.g., Gmail, Facebook), we collect authentication tokens to facilitate login.
  • User Content: This includes comments, direct messages (DMs), images, and brand information that you provide while using the App.

2. Purpose of Data Collection

We collect data for the following purposes:

  • User Experience: To enhance your experience, we collect data such as preferred language and theme settings.
  • App Features: To enable various features of the App, including storing clothing items and outfits digitally.

3. Data Sharing

We may share data with third parties, including:

  • Advertisers: We may share data with advertising partners for marketing and analytics purposes.
  • Service Providers: Data may be shared with service providers, such as cloud storage providers, to support the App's functionality.

4. Data Retention

We will retain your data for as long as necessary to fulfill the purposes outlined in this Privacy Policy and as required by our infrastructure.


5. Cookies and Tracking

We use cookies and similar tracking technologies to enhance your user experience.

These technologies may include session cookies for authentication and cookies to remember your preferred language and theme settings.


6. User Rights

You have the right to:

  • Access Your Data: You can request access to the personal data we hold about you.
  • Deletion of Your Data: You can request the deletion of data you have posted on the App.

7. Security Measures

We implement industry-standard security measures to protect your data from unauthorized access and breaches.

However, no data transmission over the internet or electronic storage is completely secure.