“Gallery Cleaner” Privacy Policy

 

Updated: July 07, 2023

Effective date: January 01, 2021

When you use the "Gallery Cleaner" service, "Gallery Cleaner" will protect your personal information and privacy in accordance with laws and regulations. Since the success of "Gallery Cleaner" depends on establishing and maintaining a good reputation with users, we will firmly implement the privacy policy. If you are under the age of 18, please carefully read and fully understand this Privacy Policy accompanied by your guardian, and use our services or provide us with information after obtaining the consent of your guardian.

Hope you read and understand this Privacy Policy carefully before using the "Gallery Cleaner" service. After reading this policy, if you have any questions about this "Privacy Policy" or matters related to this "Privacy Policy", please contact us by email : support@imeigoo.cn.

Your use or continued use of "Gallery Cleaner" means that you agree to our collection, use, storage and sharing of your information in accordance with this "Privacy Policy". We have highlighted and underlined the important content of the terms and conditions regarding your personal information rights, please pay special attention.

 

1. How we collect and use information

In order to provide corresponding services, "Gallery Cleaner" will apply to you for authorization to use some permissions and collect some of your information or data. Using the services of "Gallery Cleaner" means that you have agreed and authorized "Gallery Cleaner" to use these permissions, and agree to the "User Service Agreement" and "Privacy Policy".

When you use the service of cleaning up personal privacy content such as photos and contacts, we only provide you with the cleaning function, but we will not collect your photos, contacts and other files.

In the function of synchronizing contacts, you can upload your contacts to the cloud for backup, but this service is based on the upload service provided by "iCloud", so using this service means that you understand that this service is provided by "Apple Company" and agree to the iCloud Terms and Conditions.

 

Device information and log information

  1. We need to collect your device information and log information for the following reasons:

    1. Detect whether the user's account is safe, and prevent the user from encountering theft, fraud and other behaviors.
    2. Ensure network security and operational security, and prevent malicious cheating.
    3. To help us with failure analysis.
  2. Device information refers to: refers to the information of the device you use when using this software. We will collect your device brand, device model, screen resolution, device identification code (IMEI), system version, application identification code, IP address, device MAC address, application list, IDFA, and IDFV information.

  3. The content of the log information includes:

    1. Information about the use of this software: the version number of the software you use, the overall operation of the software, usage and frequency. This type of data is anonymous, and we will not match this information one by one or with your personally identifiable information.
    2. Log information related to network security events, such as network crashes, system activities, and other information. This type of information is required to be collected by law. If you do not want such information to be collected by us, please do not use this software.
  4. In order to prevent malicious programs and ensure operation quality and efficiency, we need to collect your application list information, including installed application information or running process information, overall application operation, usage and frequency, application crashes, overall Installation usage, performance data, and application sources to better optimize the functionality of our mobile software in your mobile phone, so as to provide you with better services.

  5. Please understand that the collection of device information is the premise and basis of our services. After you install and open this software, we will ask for your consent through the "authorization pop-up window".

  6. Separate device information cannot identify a specific natural person, and we have de-identified and anonymized such information.

     

2. Use of COOKIES and similar technologies

(1) Introduction to COOKIES and similar technologies

We or our third-party partners may obtain and use your information through COOKIES and WEB BEACON, and store such information as log information.

COOKIES refers to a technology. When a user visits this website with a COOKIES device, the server of this website will automatically send COOKIES to your browser and store them in your mobile device. This COOKIES will be responsible for recording your future information. Various activities, personal information, browsing habits, consumption habits and even credit history of visiting this website. COOKIES technology enables us to provide better and faster services, and enables the NetEase Platform to serve you more targeted.

 

(2) Usage of COOKIES and similar technologies

We use our own COOKIES and WEB BEACON for the following purposes:

  1. Remember your identity;
  2. Analyze and optimize our services;
  3. Ad optimization. COOKIES and WEB BEACON help us optimize your selection of advertisements based on your information.

 

(3) Authorized use of COOKIES and WEB BEACON

Similar technologies such as COOKIES and device information identification are commonly used technologies on the Internet. When you use "Gallery Cleaner" and related services, we may use related technologies to send one or more COOKIES or anonymous identifiers to your device to collect and identify information when you access and use this product. We promise not to use COOKIES for any purpose other than those stated in this Privacy Policy. We use COOKIES and similar technologies mainly to achieve the following functions or services:

  1. Ensure the safe and efficient operation of products and services

    We may set up authentication and security COOKIES or anonymous identifiers to allow us to confirm whether you have logged in to the service safely, or whether you have encountered theft, fraud or other illegal acts. These technologies will also help us improve service efficiency, login and response speed.

  2. Data analysis and exception troubleshooting

  3. We may use such technologies to understand your usage habits and conduct data analysis to improve product services.

  4. When using "Gallery Cleaner", we may use COOKIES to record browsing activities to troubleshoot crashes, delays, and explore better service methods.

  5. Clearing of COOKIES

    Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data clearing operations in the browser settings function. If you clear it, you may not be able to use the services or corresponding functions provided by us that rely on COOKIES.

Please understand that in the following situations, according to laws, regulations and relevant national standards, we do not need your authorization to collect and use your personal information:

  1. Related to the fulfillment of the obligations stipulated by laws and regulations by the personal information controller;
  2. Directly related to national security and national defense security;
  3. Directly related to public security, public health, and major public interests;
  4. Directly related to criminal investigation, prosecution, trial and judgment execution;
  5. In order to protect the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the authorization and consent of the individual;
  6. The personal information involved is disclosed to the public by the subject of the personal information;
  7. It is necessary to sign and perform a contract according to the requirements of the personal information subject;
  8. Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;
  9. Necessary to maintain the safe and stable operation of the products or services provided, such as discovering and handling product or service failures;
  10. The personal information controller is a news unit, and it is necessary for it to carry out legal news reports;
  11. The personal information controller is an academic research institution, and it is necessary to carry out statistical or academic research in the public interest, and when it provides the results of academic research or description to the outside world, it de-identifies the personal information contained in the results.

 

4. How do we share, transfer and publicly disclose your personal information

(1) Prerequisites for sharing information

  1. We will not share your personal information with any other company, organization or individual, except in the following cases:

    1. Obtain your explicit consent or authorization in advance;

    2. According to the applicable laws and regulations, the requirements of legal procedures, mandatory administrative or judicial requirements to share;

    3. Sharing with authorized partners: Only for the purpose stated in this policy in advance, some of our services will be jointly provided by us and authorized partners. We may share some of your information with our partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for other purposes unrelated to products or services. At the same time, it will show you the purpose of sharing, transferring, and publicly disclosing personal information; the type of personal information involved; the type or identity of the recipient. Currently, our authorized partners include the following types:

      1. Information sharing based on user sharing and push functions

        We will access MobTech's SDK, they will collect your IMEI number, ID information, device model, location information, IP information, operator information, mac address, and application list information through the SDK.

      2. Information sharing based on vendor push

        We will access the SDK of mobile phone manufacturers,** they will collect the device identification (AAID), IMEI number, device ID, device model, IP information, etc. of the Mobile Security Alliance through the SDK. If you refuse to provide it, you will not be able to use the relevant services pushed by the manufacturer, but it will not affect the normal use of other functions. **

      3. Information sharing based on advertisement recommendation

        1. Advertisement push: We may access the SDK of the partners who entrust us with promotion and advertisement, but they cannot collect the information (name, ID number) used to identify you through the SDK, and will only send these Partners provide indirect portrait tags and de-identified or anonymized information that cannot identify you personally to help them increase the effective reach of advertisements without identifying you personally.

        2. Advertising statistics: We may access the SDKs of business service providers, suppliers and other partners, they will use these SDKs to collect de-identified statistical information, which is difficult to associate with your identity information, these Information will help us analyze and measure the effectiveness of advertising and related services.

        3. Information sharing based on programmatic advertising.

          We will access the SDK of companies that provide programmatic advertising services, they will collect your imei/network status/mac address/location information/application list information through the SDK. If you refuse to provide, you will not be able to use advertising recommendation related services, but it will not affect the normal use of other functions.

      4. Information sharing based on risk control

        We will access the SDK of the company that provides risk control services, they will collect your device hardware serial number, device MAC address, device installed application list, device unique identification code (IMEI/Android ID/iccid/imsi/ idfa/idfv), device IP address information.

      5. Information sharing based on online intelligent customer service

        We will access the SDK of the company that provides online intelligent customer service, they will collect your IMEI and IMSI information through the SDK. If you refuse to provide, you will not be able to use online smart customer service related services, but it will not affect the normal use of other functions.

      6. Information sharing based on statistical crash logs

        We will provide the SDK of the company that provides statistical crash log services, they will collect your IMEI, IMSI and carrier information through the SDK.

      7. Hotfix-based information sharing

        We will access the SDK of the company that provides the hot repair service, they will collect your IMEI and IMSI information through the SDK.

      8. SDK access based on login, sharing and withdrawal

        We will access the SDKs of companies that provide login, sharing, and cash withdrawal services, but will not share any of your information with them.

      9. Information sharing based on the unique identification of supplementary equipment

        We will access the SDK of the company that provides the supplementary device unique identification service, they will collect your IMEI, IMSI, and geographic location information through the SDK.

      We will only share your information for legitimate, necessary and specific purposes. De-identified information that does not identify you personally will be collected. For third-party service providers with whom we share information, we will require them to fulfill relevant confidentiality obligations and take corresponding security measures

  2. Realize the shared information of security and analysis statistics

    Safe use: We attach great importance to account and service security. In order to protect the account and property security of you and other users, and protect your and our legitimate rights and interests from illegal infringement, At the same time, in order to prevent robots from cheating, we or service providers Necessary device, account and log information may be shared.

    Analysis of product usage: In order to analyze the usage of our services and improve user experience, ** may share statistical data on product usage (crashes, flashbacks) with related parties or third parties, which are difficult to compare with other information Combined to personally identify you. **

  3. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to process personal information in accordance with our instructions, this Privacy Policy and other relevant confidentiality and security measures. At the same time, we will only provide third parties with information about the coverage and effectiveness of the promotion, and will not provide information that can identify you, or we will aggregate and anonymize this information so that it will not identify you personally.

 

(2) Transfer of personal information during acquisitions, mergers, and reorganizations

As our business continues to develop, we may conduct mergers, acquisitions, asset transfers or similar transactions, and your personal information may be transferred as part of such transactions. We will require new companies and organizations that hold your information to continue to be bound by this "Privacy Policy", otherwise, we will require the company or organization to seek your authorization again.

 

(3) Information disclosure based on other reasons

We may also need to retain, store or disclose your personal information for the following reasons:

  1. You authorize or agree to the disclosure by "Gallery Cleaner";
  2. Comply with applicable laws and regulations;
  3. To comply with court orders or other legal procedures;
  4. Comply with the requirements of relevant government agencies;
  5. We believe it is reasonably necessary to comply with applicable laws and regulations, safeguard social and public interests, or protect the personal and property safety or legal rights or public safety and interests of us or our group companies, our customers, other users or employees ; and in accordance with the relevant provisions of the "Gallery Cleaner" service terms and statements, or other circumstances that "Gallery Cleaner" deems necessary.

 

5. How do we store and protect information

(1) Location of information storage

We only retain your information for the period necessary for the purposes described in this Privacy Policy and within the time limit required by laws and regulations. The information we collect and generate during our operations in the People's Republic of China is stored in China. If cross-border transmission is required, we will separately obtain your authorization and consent.

 

(2) Information storage time

In general, we only retain your personal information for as long as necessary to achieve the purpose of the product. When our products and services cease to operate, we will notify you in the form of push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time.

 

(3) Information protection methods

  1. We will protect your personal information with reasonable and feasible means such as encryption technology and anonymization processing that are not inferior to those of industry peers, and use security protection mechanisms to prevent malicious attacks on your personal information.
  2. We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information.
  3. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in due course.
  4. In order to deal with possible risks such as personal information leakage, damage and loss, we have established a special emergency response team to initiate safety plans for different security incidents in accordance with the requirements of the company's relevant security incident handling regulations, and carry out stop loss, analysis, and formulation. Remedial measures, joint relevant departments to trace and crack down. At the same time, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks independently, and remedial measures for you, etc. . At the same time, we will promptly inform you of the relevant situation of the incident by email, letter, phone call, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also actively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
  5. Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen security It is impossible to always guarantee 100% security of information, and we will do our best to ensure the security of the personal information you provide to us.
  6. Please note: once you browse or use other websites, services and content resources after leaving this software, we will not have the ability and direct obligation to protect any personal information you submit on software and websites other than this software and related services , no matter whether you log in, browse or use the above software, whether the website is based on the link or guidance of "this software".

 

6. How users manage information

(1) Access, correction and deletion

You can check the authorization authority of "Gallery Cleaner" in your mobile phone system through the "Settings" of your device. You need to check the personal information generated during the process of using Gallery Cleaner. We will provide it to you under reasonable request. If you cannot access, correct or delete your personal information through the above methods, you can also send an email to support@imeigoo.cn to contact us, and we will reply you within 15 working days.

 

(2) Closing or withdrawing authorization

You can turn off or withdraw your authorization in the "Settings" of the device's own operating system.

 

(3) Complaints

You can make a complaint or report according to the contact information of our company. If you think that your personal information rights may be violated, or if you find clues of personal information rights violations, you can contact us through the contact information under the "Privacy Policy", and we will promptly feedback your complaints and reports after verification.

 

7. Age limit

  1. This software service is mainly for adults. Our products, websites and services are primarily intended for adults. If you are a minor under the age of 18, you should read this guide accompanied by your guardian before using our products and/or services, and you should ensure that you use our services after obtaining the consent of your guardian and submit a report to We provide your information. We will focus on protecting the personal information of minors in accordance with relevant national laws and regulations.
  2. If your guardian does not agree with you to use our services or provide information to us in accordance with this guideline, please stop using our services immediately and notify us in time.
  3. For the collection of personal information of minors with the consent of parents or legal guardians, we will only use or publicly disclose this information when permitted by law, with the explicit consent of parents or guardians, or when it is necessary to protect minors.
  4. If you are the guardian of a minor, please contact us in time when you have any questions about the minor under your guardianship using our services or the user information provided to us. We will protect the confidentiality and security of minor user information in accordance with relevant national laws and regulations and the provisions of this guideline. If we discover that we have collected personal information about minors without the prior consent of a verifiable parent or legal guardian, we will try to delete the relevant data as soon as possible.

 

8. Notice and revision

  1. We may modify the privacy agreement according to the requirements of national laws and regulations and business development needs. Generally speaking, we will publish the changed privacy policy on the "Settings-Privacy Policy" page, and we will mark the red dot on the above viewing path. You are reminded to review the updated agreement.
  2. For major changes, we will provide more prominent notices (including we will notify you through the site and even provide you with pop-up prompts). The major changes referred to in this policy include but are not limited to: major changes in our service model, such as the purpose of processing personal information, the type of personal information processed, and the way in which personal information is used; major changes in our control rights, etc. Such as changes in owners caused by mergers and acquisitions, etc.; changes in the main objects of personal information sharing, transfer, or public disclosure; major changes in your rights to participate in the processing of personal information and how to exercise them; our responsible department for handling personal information security, When the contact information and complaint channels change; when the personal information security impact assessment report indicates that there is a high risk.
  3. If you confirm that you accept the changed content, you can use the relevant services of this software normally; if you do not agree with the changed content, please do not click Confirm or continue to use this software.

 

9. How to contact us

If you have any questions, comments or suggestions about this Privacy Policy, please contact us in the following ways:

Company Name: Gallery Cleaner Team

Personal information security complaints and reporting channels: support@imeigoo.cn, we will reply within fifteen working days.

 

Gallery Cleaner Development Team