Permissions and how they are used in 360 Security

Permissions How they are used
1 read calendar events plus confidential information 360 Security requires this permission to read and backup your calendar events in our backup feature, but no confidential information will be enveloped. Android defines the permission of reading calendar events and reading confidential information as one, however 360 Security will not access your confidential information.
2 add or modify calendar events and send email to guests without owners' knowledge 360 Security requires this permission to restore your backed up calendar events, but no emails will be sent in the process. Android defines the permission of add/modify calendar events and sending emails to guests without owners' knowledge as one, however 360 Security never send any messages without users’ knowledge and consent.
3 take pictures and videos This permission is required for 360 Security’s flashlight feature in the multifunctional notification bar, due to the fact that the flashlight next to the rear camera is considered a part of the phone camera system in Android.
4 directly call phone numbers This permission is required in order to make outgoing calls through Vault to private contacts; outgoing calls must be initiated by users themselves. 360 Security never make calls without users’ knowledge and consent.
5 reroute outgoing calls The accurate name of this permission is "android.permission.PROCESS_OUTGOING_CALLS", which means the permission to process outgoing calls. This permission is required for Vault to detect and encrypt outgoing calls to private contact. 360 Security will never reroute outgoing calls without users’ knowledge and consent.
6 receive text messages (SMS) This permission is required for 360 Security’s Call & SMS Blocker and Vault features. 360 Security will filter users’ incoming messages, move spam messages and private messages into blocking records and Vault respectively.
7 send SMS messages This permission is required for 360 Security’s Call & SMS Blocker and Vault to respond to a spam message or a private messages directly, which will be initiated by users. 360 Security never send a message without users’ knowledge and consent.
8 precise location (GPS and network-based) This permission is required for 360 Security’s Anti-theft protection feature to locate your lost device should a locate command is triggered by user. 360 Security will never track your location without users’ knowledge and consent.
9 approximate location (network-based) This permission is required for 360 Security’s Anti-theft protection feature to locate your lost device should a locate command is triggered by user. 360 Security will never track your location without users’ knowledge and consent.
10 read sensitive log data This permission is required for 360 Security to collect and submit system crash reports should 360 Security experience crashes in extreme scenarios. This will be used to improve our product and services in future updates. It will be users’ decision whether or not to submit a crash report despite the fact that the data will contain no personal information. 360 Security will never send crash reports without users’ knowledge and consent.