The following description comes from the Google Play Store description of the app:The Clone Phone app
Customers on 4GEE plans can download the app straight away, but if you’re on an Orange or T-Mobile plan, please call customer services on 150 to subscribe to one of our Clone Phone plans before you start using the app.
The Clone Phone app keeps a copy of your phone's content so you can quickly and simply get all your contacts, calendar, photos, music and videos back onto a replacement handset or your home computer.
• The Clone Phone app clones your content, so you have a snapshot of your contacts, calendar, photos, music and videos stored totally securely online.
• You can also use the Clone Phone website to view and download your content onto your home computer.
• With Clone Phone Loaded and Fully Loaded you can also locate your lost phone using Find-My-Phone on the Clone Phone website. And if you need to, lock and wipe it remotely so all your content doesn’t fall into the wrong hands.
Please note: Data charges apply when you download the app.
Thank you for providing feedback – this update delivers various improvements. We'll keep listening so please stay in touch.
Clone Phone Insurance
If you want complete peace of mind you can sign up to Clone Phone Fully Loaded which combines the app with phone insurance.
This means you can Get 24 hour replacement if your claim is accepted before 7.30pm or same day replacement if your claim is accepted by 11am*
To purchase Clone Phone Fully Loaded, with insurance, or find out about all Clone Phone pricing, please call us on 150. See ee.co.uk/clone-phone for more information.
*Geographical restrictions apply, excludes bank holidays and exceptional circumstances. Other terms apply, see www.ee.co.uk/terms for full details.
|Write call log||Can change your device’s call log including incoming and outgoing calls data||Not analyzed yet|
|Read call log||Can read your device’s call log, including incoming and outgoing calls||Not analyzed yet|
|Directly call phone numbers||Can call phone numbers||Not analyzed yet|
|Connect and disconnect from wi-fi||Can connect to and disconnect from Wi-Fi access points||Not analyzed yet|
|Precise location (gps and network-based)||Can use user's precise location||Not analyzed yet|
|Modify or delete the contents of your usb storage||Can write to your phone's USB storage||Not analyzed yet|
|Create accounts and set passwords||Can use user's account authentication information (like password) or create new accounts||Not analyzed yet|
|Add or remove accounts||Can manage user's accounts on the phone||Not analyzed yet|
|Retrieve running apps||Can retrieve information on currently and recently running apps on the device||Not analyzed yet|
|Find accounts on the device||Can use user's account information stored on the phone||Not analyzed yet|
|Edit your text messages (sms or mms)||Allows the app to write to SMS messages stored on your tablet or SIM card. Malicious apps may delete your messages.||Not analyzed yet|
|Read your text messages (sms or mms)||Can read SMS messages||Not analyzed yet|
|Receive text messages (sms)||Can receive SMS messages||Not analyzed yet|
|Read phone status and identity||Can read phone's current state information like in-phone call, phone signal, carrier, device ID, and phone number||Not analyzed yet|
|Add or modify calendar events and send email to guests without owners\' knowledge||Allows an application to write the user's calendar data.||Not analyzed yet|
|Read calendar events plus confidential information||Allows an application to read the user's calendar data.||Not analyzed yet|
|Modify your contacts||Can edit contacts on device||Not analyzed yet|
|Read your contacts||Can read user's contact list (phone book) and phone call history||Not analyzed yet|
|Full network access||Can access the internet||Not analyzed yet|
Version of the app analyzed:
App was last analyzed by Privacy Grade on:
Why does this app have this grade?
Our method for grading apps uses a privacy model that we built. This model is based on crowdsourced surveys that we conducted to capture people’s expectations and comfort levels with various app behaviors.
See the sensitive permissions table below the app description to see the permissions that made users of the app uncomfortable.
If you have issues about the information on this page, click the button below to send us feedback.Send Us Feedback