Privacy Policy of GoMemory

Policy

Last updated: December 3, 2023

This Privacy Policy describes our policies and procedures on the collection, use and disclosure of information when you use the Service, and tells you about your privacy rights and how the law protects your information.

We use your personal data to provide and improve the Service, and by using the Service, you consent to the collection and use of information in accordance with this Privacy Policy.

Explanation and definition

Explain

Words whose first letter is capitalized have meanings defined under the following conditions. The meanings defined below shall have the same meaning regardless of whether they appear in the singular or the plural.

Definition

For the purposes of this privacy policy:
  • Disclosure statement: The purpose of using this informat ion is only to process feedback or verify problems you have when using our services. This is also to better serve your experience of using the product. This information will not be uploaded to other third parties. and shared use.
  • 2.Usage data

    Usage Data is automatically collected when you use the Service, Usage Data may include your device's Internet Protocol address (such as IP address), browser type, browser version, the pages of the Services that you visit, the time and date of your visit, and the content on those pages. Information such as time spent, unique device identifiers and other diagnostic data.
    When you access the Services on or through a mobile device, we may automatically collect certain information, including, but not limited to, the type of mobile device you use, your mobile device unique ID, your mobile device's IP address, your mobile device operations system, the type of mobile internet browser you use, unique device identifiers and other diagnostic data.
    Disclosure statement: The purpose of this information is limited to: analyzing and locating product problems, collecting feedback information about errors when connecting external devices when using the service, locating faster through accurate device IDs, and solving problems reported by users when using the product.

    3.Manage all file information

    1. Necessity of obtaining permissions​
    When performing a backup operation, you may want to completely and accurately back up all types of files in the device, including but not limited to documents, pictures, audio, video, and other formats of files, to a specified location (such as a cloud or external storage device)
    Since the files in the device are stored in different directory structures, if the application only has limited file access permissions, it will not be able to traverse and obtain all the files you want to back up.
    For example, some important work documents may be stored in custom folders, precious family photos may be scattered in different album directories, and some files in special formats may also be stored in specific application-related folders.
    Only by obtaining all file management permissions can the application ensure that all files in the device are scanned and backed up without omissions to meet your needs for comprehensive data backup.
    2. Specific uses of permissions​
    File scanning and identification: After obtaining permissions, the application will scan all files in the device storage. Through specific algorithms and technologies, different types of files are identified and classified. This process is like being in a large library, classifying and numbering books according to their category, author, year of publication, etc., so that each book (that is, each file) can be found and processed quickly and accurately later. For example, all .jpg format images are classified as images, and .doc and .pdf format files are classified as documents, etc. ​
    Backup execution: After completing the file scanning and classification, the application will copy and transfer the identified files one by one to the target location according to the backup strategy you set (such as backing up to a specific folder on the cloud server, or a specified path on an external USB storage device). Taking backup to the cloud as an example, the application will establish a secure connection with the cloud server and upload local files to the dedicated storage space allocated to you on the server, just like moving your home items to a safe warehouse for safekeeping. ​
    Backup integrity verification: In order to ensure that the backed-up files are accurate and complete, after completing the backup operation, the application will use the obtained permissions again to compare and verify the local source files with the files that have been backed up to the target location. By calculating the hash value of the file (similar to the fingerprint of the file, the hash value of each file is unique) and other technical means, confirm that the backup file is exactly the same as the original file in content and size. Only when all files pass the integrity check, will the backup task be considered successfully completed.
    III. Data Protection Measures ​
    Encrypted transmission: When transferring your files from the device to the backup target location (such as the cloud), the application uses advanced encryption algorithms (such as SSL/TLS encryption protocols) to encrypt the data. This means that your files are like being put into a safe with a high-strength lock during the transmission process. Even if the data is illegally intercepted during the transmission, the third party cannot read the content because it only sees a string of encrypted garbled characters. ​
    Storage encryption: Whether it is temporarily storing backup-related data locally on the device or storing files on a cloud server or external storage device, the application will encrypt the files. In the cloud, files are encrypted using industry-standard encryption algorithms such as AES before being stored on the server's hard drive; for external storage devices, data is also encrypted when written to ensure that even if the storage device is lost or stolen, the data in it cannot be easily obtained and used by others. ​
    Strict access control: A strict access control mechanism is established within the application, and only authorized specific modules and codes can operate on the acquired files. At the same time, extremely strict permission management policies are also formulated for application developers and operation and maintenance personnel to limit their access to user file data. Only when necessary (such as troubleshooting and after multiple approval processes) can relevant personnel view a small amount of user data in a safe and controllable environment, and all operations will be recorded and audited in detail for traceability and accountability. ​
    Follow the privacy policy: We always strictly follow the published privacy policy and will not use your acquired file data for any other purpose unrelated to the backup service. The content of your files will not be disclosed to any third party without your explicit consent. The privacy policy details our rules and measures for data collection, use, storage and protection, which you can view at any time in the application or on our official website. ​
    We are fully aware of your importance to personal data. We obtain all file management permissions to better serve the backup function, and we will do our best to protect your data security and privacy. If you have any questions or concerns about permission acquisition or data protection, please feel free to contact us through the feedback channel in the app or our official customer service.
    Other Matters

    Limited Liability
    You may not use the Service in any manner that may violate local and international laws. If you have questions about compliance with the law, please uninstall the service.

    Changes to Privacy Policy
    This privacy policy may be updated at any time without prior notice. We encourage you to check it occasionally for updates and changes.

    Questions
    If you have any questions about this privacy policy, please contact us by email at xuxiaoming1976@gmail.com.