Abu Dhabi Housing Authority (ADHA) respects the privacy of your data and is committed to protect and preserve it. If personal data was submitted from the user then the authority is committed to protect such data. Several protection policies and regulations were developed and technical measures were taken to preserve the personal data that is under our control.
Collecting and Storing Information Automatically
The Abu Dhabi Housing Authority (ADHA) collects and stores information related to accessing ADHA ST-Mobile application automatically. The collected information includes:
1. Personal identifying information such as name, E-mail and contact details if voluntarily provided
2. Certain features from mobile device based on the permission granted such as Device ID, Device Type, IMEI number, Geo-location information, Network provider, Internet Protocol (IP) address and mobile operating system
3. Certain technical information while using the ST-Mobile application, such as the pages accessed and the transactions made
Changes in Privacy Statement
Abu Dhabi Housing Authority (ADHA) has the right to modify the privacy statement at any time. In case of applying such changes, the authority will inform stakeholders and their clients about them.
Use and Disclosure of Personal Information
If personal information is provided voluntarily to be granted access privileges to Abu Dhabi Housing Authority (ADHA) ST-Mobile application services and use the application’s services or through ADHA contact pages, the information is saved and logged on our servers for the purpose of logging and tracking transactions and services. Abu Dhabi Housing Authority (ADHA) may share the collected information with the government entities of Abu Dhabi only if necessary.
Abu Dhabi Housing Authority (ADHA) does not sell, exchange, or otherwise distribute the information collected for commercial or marketing purposes.
Abu Dhabi Housing Authority applies various regulative and security precautions to protect its information from loss, misuse or alteration. These measures cover commercial software programmes and secure technology infrastructure to monitor network traffic, authenticate legitimate users, and identify unauthorized attempts to upload or change information, or otherwise cause damage.