Privacy Policy

Version Date: July 2, 2024

Effective Date: July 2, 2024

 

TopClean (hereinafter referred to as "this software") is a convenient and fast mobile cleaning software provided by us for you. We highly respect and value the protection of users' personal privacy rights. In order for you to fully use our products and/or services, we will use and disclose your personal information in accordance with the provisions of this privacy protection policy. We understand the importance of personal information to you and will do our best to protect your personal information security and reliability. This privacy protection policy explains how this software will collect and use your personal information and help you understand your rights. Please read and understand this privacy protection policy carefully before using our services.

This policy will help you understand the following:

1.How do we collect and use your personal information

2.How do we use cookie technology

3.How do we share, transfer, and publicly disclose your personal information

4.How do we store and protect your personal information

5.Your rights (how do you manage personal information, change authorization scope, cancel account)

6.How do we protect children's personal information

7.How can your personal information be transferred globally

8.Notification and Revision

9.Definition

10.Contact Information

11.Explanation of Third Party Cooperation and Information Sharing

 

We strive to present this privacy policy in a clearer and easier to understand manner, in order to truthfully convey the information we wish to convey to you. We also hope that you can have a clear understanding of the purpose, purpose, and other aspects of the information collected before providing us with certain information (which may include your personal information) and allowing us to process and share certain information. For your convenience in reading and understanding, we will define specialized terms, please refer to Section 10 Definitions of this Privacy Policy.

If you use the products and services of this software, it means that you agree with the content described in this policy. When using your information for purposes not covered by this privacy policy, we will seek your consent in advance.

This privacy policy is applicable to your access to and use of our products and services through the software application, the software WeChat official account and the application programming interface (API) for third-party websites and applications.

1. How do we collect and use your personal information

1.1 When you use this software, we may obtain the following permissions from your terminal device, and you can choose to agree or refuse at your own discretion

In the process of using our services, in order to identify abnormal account status, understand product compatibility, and ensure network and operational security for providing services. For this purpose, we will collect your:

1.1.1 Equipment status permission

During your use of this software, in order to remember your identity, analyze your usage of this software, and identify you as a user of this software, we will need to obtain your device READ_CHONE-STATE permission to read phone status, and collect your device's IMSI, IMEI, OAID, device serial number, MAC, IP, Android ID information, acceleration sensor, and gyroscope sensor. This permission requires your permission. If you refuse to provide it, it will only prevent you from using the function, but it will not affect the normal use of other functions. You can refuse it when we request authorization from you or close the authorization through your device.

1.1.2 Access to read external storage

When you add pictures or videos from your phone's photo album to this software for making pictures/videos, we will need to obtain the permission to read the external storage of your device READ_deTERNAL_STORE, as well as the video and image information (personal information) in your phone's storage space. This permission requires your permission. If you refuse to provide it, it will only prevent you from using the function, but it will not affect the normal use of other functions. You can refuse it when we request authorization from you or close the authorization through your device.

1.1.3 Permission to write to external storage

When you use this software to create images or videos for saving the final synthesized images or videos to the album, we will need to obtain permission to read the external storage on your device's WRITE.exe TERNAL_STORE, as well as access the video and image information (personal information) stored in your phone's storage space. This permission requires your permission. If you refuse to provide it, it will only prevent you from using the function, but it will not affect the normal use of other functions. You can refuse it when we request authorization from you or close the authorization through your device.

1.2 We directly collect and use personal information

We will collect the information you voluntarily provide when using the service, as well as the information generated during your use of features or acceptance of the service through automated means, in the following ways:

1.2.1 Ensure the normal operation of products and services

When you use product related services, in order to ensure the normal operation of software and services, we will collect information about your device (manufacturer, model, name, phone battery level, operating system information, acceleration sensor and gyroscope sensor), device identification (IMEI, OAID, MAC, AndroidID, IDFA, OpenUDID, UID, SIM card IMSI ICCID、SN、IP)、 Network information (WIFI information, network operator information, network type, network status), rough location information, operation log information, and information about the applications you have installed or processes running. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of our products.

1.3 Provide you with business functions of products and/or services

1.3.1 Garbage cleaning function

The garbage cleaning function is the core service we provide. When you clean up the garbage information in your phone, we will request authorization for photo access and storage (including SD card) permissions from you.

In the process of using our services, in order to identify abnormal account status, understand product compatibility, and ensure network and operational security for providing services. For this purpose, we will collect your:

Device information (including device model, operating system version, device settings, unique device identifier, network device hardware address MAC, mobile application list feature information); Information related to the location of the device (including IP address) and personal internet browsing history (including browsing history, software usage history, and click history).

1.3.2 Login/Register/Share Works

When you log in/register, we will obtain your WeChat nickname and avatar information to manage your works and favorites list.

When you share videos produced by this software, we will obtain your WeChat or other sharing website nickname and avatar information.

In order to provide you with a one click login service, our product may integrate third-party SDKs or other similar applications, such as the Youmeng SDK, which needs to collect your device's International Mobile Device Identity (IMEI), iOS Advertising Identifier (IDFA), and necessary fields for your phone number. For the security of your information, we have established strict data security and confidentiality obligations with third-party SDK service providers, who will strictly comply with our data privacy and security requirements. We will not share your other personal information with you unless we obtain your consent. For your better understanding of the types and purposes of data collected by Youmeng+, as well as how to protect your personal information, you can visit https://www.umeng.com/policy Understand the Youmeng+Privacy Policy. We understand and respect your right to choose. If you do not wish to participate in Youmeng+big data computing, you can also access it https://outdip.umeng.com/opt_out.html Exercise opt out rights/ span>

1.3.3 In order to ensure network security and improve our services, we will collect detailed information about your use of this software and save it as relevant logs, including the content you browsed, the date and time you visited, as well as the webpage records you requested, operating system, software version number, and network IP information.

The information collected by the application in silent/background state. In order to analyze the usage habits of users in the complete usage scenario, improve user experience, and optimize the performance of our products and services, we will automatically collect your device MAC information from the devices you access the application in silent/background mode. You can restrict us from collecting relevant information from your mobile device or using specific permissions by adjusting the "Settings" option of your mobile device. When you restrict us from obtaining a certain permission, we may no longer be able to provide you with the corresponding service or process your corresponding information.

Please note that individual device information and service log information cannot identify the identity of a specific natural person. If we combine this type of non personal information with other information to identify a specific natural person's identity, or use it in conjunction with personal information, during the combined use period, this non personal information will be considered personal information. Unless authorized by you or otherwise provided by laws and regulations, we will anonymize and de identify this type of information.

1.3.4 Explanation of user related image and audio data

If you use the album cleaning function in this software, we will request that you grant us access to the album in order to retrieve photos or audio on your mobile device. After obtaining your authorization, we will process the photos or audio and immediately delete them. The processed data does not contain any of your personal information. We will neither store nor share/process the above data with any third party.

1.3.5 Special instructions related to face data

The image and video special effects provided by this software involve analyzing the facial information (such as facial feature coordinate points) in your photos. We will only analyze your facial information after your authorization and during the production process. After the production is completed, it will be immediately deleted and your facial data will not be persistently stored or shared with third parties.

1.3.6 Device permissions

During the service provision process of this software, you are required to grant us device access permission. We will explain the purpose to you and obtain your consent during the first installation or when permission needs to be granted. By granting these permissions, you authorize us to collect and use this information to achieve the corresponding functions. include:

We will inquire or request authorization to use device storage read-write permissions during the first installation or in specific scenarios in order to import the necessary materials for creating album videos using photos or videos. This software will not abuse device storage read and write permissions to access files from other applications.

We will inquire or request authorization to use device information permissions during the first installation or in specific scenarios: to determine account security, perform identity verification, locate crash logs, and provide the optimal solution for information display.

In the specific process of providing services, we also need to invoke more device permissions from you, including: obtaining access to your photos for the purpose of uploading images; To obtain your camera permission for photography and uploading purposes.

We will inquire and obtain your consent in the form of pop ups in specific scenarios. You can also manage device permissions through the application permission settings page of this software to allow or refuse us to collect and use your personal information.

 

2. The use of cookies and similar technologies

Cookies and device information identification are widely used technologies in the Internet. When you use the services of this software, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information about your access to and use of this product. We promise not to use cookies for any purposes other than those described in this privacy policy. We use cookies and similar technologies mainly to achieve the following functions or services:

2.1 Ensure the safe and efficient operation of products and services

We may set authentication and security cookies or anonymous identifiers to confirm whether you have safely logged into the service or encountered theft, fraud, and other illegal activities. These technologies will also help us improve service efficiency, enhance login and response speed.

2.2 Help you achieve a more relaxed access experience

Using this type of technology can help you save the steps and processes of repeatedly filling in personal information and entering search content (e.g. record search, form filling).

2.3 Troubleshooting of service anomalies

1. In the sharing page of the template content, we may use cookies to record browsing activities, in order to recommend information to you, troubleshoot related abnormal situations such as crashes and delays, and explore better service methods.

2.4 Clearing cookies

Most devices provide users with the ability to clear cached data, and you can perform the corresponding data clearing operation in the device's settings. If you clear it, you may not be able to use the services or corresponding functions provided by us that rely on cookies.


3. How do we share, transfer, and publicly disclose your personal information

3.1 Sharing

3.1.1 The principle of sharing

(1) Principle of Authorization and Consent: Without your consent, we will not share your personal information unless the shared personal information is de identified and the third party cannot re identify the natural person subject of such information. If a third party uses the information for purposes beyond the scope of the original authorization, they will need to obtain your consent again.

(2) The principle of legality, legitimacy, and minimum necessity: Shared data must have a legitimate and legitimate purpose, and the shared data must be limited to what is necessary to achieve the purpose.

(3) Principle of safety and prudence: We will carefully evaluate the purpose of third-party use of shared information, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with cooperation legal agreements. We will conduct strict security monitoring on the software development kits (SDKs) and application programming interfaces (APIs) used by our partners to obtain information, in order to protect data security.

3.1.2 Shared information for implementing functions or services

When you use the features provided by our partners or third parties in this software, or when software service providers, smart device providers, or system service providers collaborate with us to provide services to you, we will share the necessary information for business implementation with these partners or third parties

3.1.3 Realize shared information for security and analysis statistics

(1) Ensuring Security of Use: We attach great importance to the security of our accounts, services, and content. To ensure the safety of your and other users' accounts and property, and to protect your and our legitimate rights and interests from illegal infringement, we may share necessary equipment, account, and log information with our partners or service providers.

(2) Analyzing product usage: In order to analyze the usage of our services and improve user experience, we may share statistical data on product usage (crashes, crashes) with partners or third parties, which may be difficult to combine with other information to identify your personal identity.

(3) Academic research and research: In order to enhance research capabilities in related fields and promote technological development, we may share de identified or anonymized data with research institutes and universities, while ensuring data security and legitimate purposes.

3.1.4 Assist you in participating in marketing and promotional activities

When you choose to participate in marketing activities organized by us, our partners, or third parties, you may need to provide your name, mailing address, contact information, and bank account information. These pieces of information are personal sensitive information, and refusing to provide them may affect your participation in related activities, but will not affect other functions. Only with your consent will we share this information with our partners or third parties to ensure that you receive consistent service experience in joint activities, or entrust third parties to promptly redeem rewards to you.

At present, our partners include the following types:

Service platform or service provider: This software product is integrated with a variety of third-party services. When you choose to use this third-party service, you authorize us to provide this information to third-party service platforms or service providers so that they can provide services to you based on the relevant information. When a third party accesses our products/or services, your information will be obtained through the third-party account. The actions of the third-party service platform or service provider are not related to our company and the third party shall bear corresponding responsibilities.

Software and hardware/system service providers: When third-party software and hardware/system products or services are combined with the products or services of this software to provide services to you, with your authorization, we will provide you with necessary personal information to the third-party software and hardware/system service provider for you to use the service, or for us to analyze product and service usage to enhance your user experience.

Advertising and information service providers/advertisers: Without your authorization, we will not share your personal information with advertising and information service providers. But we may share information that has been processed and cannot identify your identity and cannot be recovered by the recipient with advertising or information service providers or advertisers.

You can refer to the appendix table of this privacy policy for detailed information on the identity of service providers and the types of shared information in the aforementioned situations.

At the same time, you should be aware and aware that the relevant products may contain links to other independent third-party operated websites, applications, products, and services. We make no express or implied warranties regarding these third-party websites, applications, products, and services, and such links are only provided for the convenience of users browsing the relevant pages. When you access such third-party websites, applications, products, and service links, you should separately agree to the privacy policy or personal information protection terms provided to you. We and the third-party website, application, product, and service provider each assume independent personal information protection responsibilities to you within the scope stipulated by law and agreed upon by both parties.

3.2 Transfer

3.2.1 We will not transfer your personal information to any other third party unless we obtain your explicit consent.

3.2.2 As our business continues to develop, we may engage in mergers, acquisitions, and asset transfers, which may result in the transfer of your personal information. When the aforementioned changes occur, we will require the recipient to protect your personal information in accordance with laws and regulations and security standards not lower than those stated in this privacy policy. Otherwise, we will require the recipient to obtain your authorization and consent again.

3.3 Public display

3.3.1 We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. We will adopt security measures that comply with industry standards when publicly disclosing your personal information.

3.3.2 When issuing punishment notices for illegal accounts and fraudulent behavior, we will disclose the relevant account information

3.4 Personal information that is exempted from sharing, transferring, and publicly disclosing in accordance with the law

Please understand that in the following situations, according to laws, regulations, and national standards, we do not need your authorization or consent to share, transfer, or publicly disclose your personal information:

1. Directly related to national security and defense security

2. Directly related to public safety, public health, and major public interests

3. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

4. For the purpose of safeguarding your or other individuals' significant legitimate rights and interests in life and property, but it is difficult to obtain my consent;

5. Personal information that you disclose to the public on your own;

6. Collecting personal information from legally disclosed information, such as legitimate news reports and government information disclosure channels;

7. Necessary to sign or fulfill the contract according to your requirements;

8. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling software and related service failures;

9. Necessary for legitimate news reporting;

10. Academic research institutions conduct statistical or academic research necessary for the public interest, and when providing results of academic research or descriptions to external parties, they de identify the personal information contained in the results;

11. Other circumstances stipulated by laws and regulations.

 

4. How do we store and protect your personal information

4.1 Retention period

During the use of this software product and service, we will continue to store your personal information for you. After you cancel your account or voluntarily delete the above information, we will delete or anonymize your personal information, except as otherwise provided by laws and regulations.

When our products or services cease operation, we will notify you in the form of push notifications or announcements, and delete your personal information or anonymize it within a reasonable period of time.

4.2 Protecting the Territory

We store your personal information collected and generated during our operations within the territory of the People's Republic of China in accordance with the provisions of laws and regulations. At present, we will not transmit the above information overseas. If we do so, we will comply with relevant national regulations or seek your consent

4.3 Protective measures

1. Our technical measures to protect your personal information

We have established security measures at every stage of data collection, storage, display, processing, use, and destruction from the perspective of the lifecycle of data. Different control measures are taken according to the level of information sensitivity, including but not limited to access control, SSL (Secure Socket Layer) encrypted transmission, AES 256 bit or above encryption algorithm for encrypted storage, and sensitive information desensitization display.

If a personal information leakage security incident occurs, we will activate the emergency plan to prevent the security incident from expanding, and inform you in the form of push notifications and announcements.

2. Our management measures to protect your personal information

We have also implemented strict management for employees who may come into contact with your information, monitoring their operations. We have established approval mechanisms for important operations such as data access, internal and external transmission and use, desensitization, and decryption, and have signed confidentiality agreements with the aforementioned employees. We also conduct background checks on a large number of individuals who come into contact with sensitive personal information. At the same time, we also regularly provide information security training to our employees, requiring them to develop good operating habits in their daily work and enhance their awareness of data protection.

3. Please understand

Despite the aforementioned security measures, please understand that there is no "perfect security measure" on the internet. We will provide corresponding security measures based on existing technology to protect your information and provide reasonable security guarantees. We will do our best to ensure that your information is not leaked, damaged or lost.

4. Personal account information self-protection

Your account has security protection functions. Please keep your account and password information safe and do not disclose your password to others. If you find that your personal information has been leaked, especially your account and password, please contact our customer service immediately so that we can take appropriate measures.

Please save or back up your text, images, and other information in a timely manner. You need to understand and accept that the system and communication network you use to access our services may encounter problems due to factors beyond our control.

 

5. Your rights (how to manage information, change authorization scope, cancel account)

5.1 Accessing your personal information

You have the right to access your personal information, except for exceptions provided by laws and regulations. You can log in to your account and click on "My" to enter your personal homepage and view your personal information.

You can also contact us at any time to access your personal information. We will reply to your access request within 15 days after receiving the access information. For other personal information generated by you during the use of our products or services, we will provide it to you in accordance with the relevant arrangements in "(VI) Responding to your above requests" of this clause.

5.2 Correct or supplement your personal information

When you discover errors in the personal information we process about you, you have the right to request us to make corrections or supplements. You can apply for correction or supplementation through the methods listed in "(1) Accessing Your Personal Information".

5.3 Delete your personal information

In the following situations, you can request us to delete your personal information:

1. If our handling of personal information violates laws and regulations;

2. If we collect and use your personal information without your explicit consent;

3. If our handling of personal information seriously violates our agreement with you;

4. If you no longer use our products or services, or if you voluntarily cancel your account;

5. If we permanently cease to provide you with products or services.

You can contact us at any time to delete some of your personal information. If we decide to respond to your request for deletion, we will also notify the subjects who have obtained your personal information from us as much as possible, requesting them to delete it in a timely manner, unless otherwise stipulated by laws and regulations, or these subjects have obtained your independent authorization. When you delete information from our service, we may not immediately delete the corresponding information from the backup system, but we will delete this information when the backup is updated.

5.4 Change the scope of your authorized consent

Each business function may require some basic personal information to be completed. In addition, for the collection and use of additional personal information, you can give or revoke your authorization and consent by contacting customer service. After you withdraw your consent, we will no longer process the corresponding personal information. But your decision to withdraw consent will not affect the personal information processing previously carried out based on your authorization.

 

5.5 Cancel account

You have the right to cancel your account on this software. After logging in to your account, you can perform online operations by visiting the "Settings" - "Account Cancellation" page on our App page. After you voluntarily cancel your account, we will stop providing you with products or services. You acknowledge and understand that the act of canceling an account is irreversible. After you cancel your account, we will delete relevant information about you or anonymize it, except as otherwise provided by laws and regulations.

We kindly remind you that during the cancellation period of your software account, if your software account is involved in disputes, including but not limited to complaints, reports, lawsuits, arbitrations, investigations by national authorities, etc., the software has the right to terminate the cancellation of your software account on its own without obtaining your consent.

Once the account of this software is cancelled, it cannot be restored. Please backup all the information and data related to the account before operation. If you cancel this software account, you will no longer be able to use it, nor will you be able to retrieve any content or information related to your software account.

5.6 In response to your above request

To ensure safety, you may need to provide a written request or prove your identity in other ways. We may first require you to verify your identity before processing your request. We will provide a response as soon as possible. If you are not satisfied, you can also file a complaint through customer service phone. For your reasonable requests, we generally do not charge any fees, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may refuse requests that are unnecessarily repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are very unrealistic.

In the following situations, as required by laws and regulations, we will not be able to respond to your request:

1. Related to national security and defense security;

2. Related to public safety, public health, and major public interests;

3. Related to criminal investigation, prosecution, trial, and execution of judgments;

4. There is sufficient evidence to indicate that the personal information subject has subjective malice or abuse of rights;

5. Responding to your request will result in serious harm to your or other individuals' or organizations' legitimate rights and interests;

6. Involving trade secrets.

 

6. How do we protect children's personal information

Our products, website, and services are primarily aimed at adults. Children are not allowed to create their own user accounts without the consent of their parents or guardians. For cases where personal information of children is collected with the consent of parents, we will only use or publicly disclose this information when permitted by law, with the explicit consent of parents or guardians, or when necessary to protect the child.

Although local laws and customs define children differently, we consider anyone under the age of 14 as a child. If we discover that personal information of children has been collected without obtaining verifiable parental consent in advance, we will try to delete the relevant data as soon as possible.

If you are the guardian of a child and have any questions about the personal information of the child under your guardianship, please contact us through the contact information provided in this privacy policy.

7. How can your personal information be transferred globally

The personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China and will not involve cross-border transmission, except in the following circumstances:

1. The applicable laws have clear provisions;

2. Obtain your explicit authorization;

3. You conduct cross-border transactions and other personal initiatives through the Internet.

In response to the above situation, we will ensure that your personal information is adequately protected in accordance with this privacy policy

If it is necessary to transmit relevant personal information collected domestically to overseas institutions during cross-border data processing of this product in the future, we will comply with laws, administrative regulations, and relevant regulatory authorities. And seek your consent and permission again before cross-border data transmission. At the same time, we ensure that the location and purpose of data transmission are detailed in our privacy policy, so that you can always understand the storage location of personal information. At the same time, we will adopt corresponding encryption, anonymization and other technologies to ensure that your personal information is adequately protected during transmission.

 

8. Notification and Revision

Our privacy policy may change. Without your explicit consent, we will not reduce the rights you are entitled to under this privacy policy. We will post any changes made to this policy on this page.

After the update of this privacy policy, we will release an updated version in the software application and notify you of the updated content through in app notifications or other appropriate means before the updated terms take effect, so that you can keep up with the latest version of this privacy policy in a timely manner.

The significant changes referred to in this policy include but are not limited to:

1. Our service model has undergone significant changes. Such as the purpose of processing personal information, the types of personal information processed, and the ways in which personal information is used;

2. We have undergone significant changes in ownership structure, organizational structure, and other aspects. Changes in ownership caused by business adjustments, bankruptcy mergers and acquisitions, etc;

3. The main objects of personal information sharing, transfer or public disclosure have changed;

4. There has been a significant change in your right to participate in personal information processing and the way you exercise it;

5. When the responsible department, contact information, and complaint channels for handling personal information security change;

6. When the personal information security impact assessment report indicates the presence of high risks.

We will also archive the old version of this policy for your reference.

9. Definition

Personal information: refers to various types of information recorded electronically or in other ways that can be used alone or in combination with other information to identify the identity of a specific natural person or reflect the activities of a specific natural person. Personal information includes name, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, account passwords, property information, credit information, whereabouts, accommodation information, health and physiological information, and transaction information.

Personal sensitive information: refers to personal information that, once leaked, illegally provided, or abused, may endanger personal and property safety, and is highly likely to cause damage to personal reputation, physical and mental health, or discriminatory treatment. Personal sensitive information includes ID number, personal biometric information, bank account number, communication records and content, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, and personal information of children under 14 years old (including).

De identification: After collecting personal information, we will take technical and management measures to store the de identified data separately from the information that can be used to recover and identify individuals, and ensure that individuals are not re identified in subsequent personal information processing.

10、 Contact Information

Address: Room 606, 6th Floor, Chunshen Building, Lane 188, Shengrong Road, Pudong New Area, Shanghai

Email: ksks9898@163.com