Privacy Policy of GoMemory
Policy
Last updated: December 3, 2023
This Privacy Policy describes our policies and procedures on the collection, use and disclosure of
information when you use the Service, and tells you about your privacy rights and how the law protects
your
information.
We use your personal data to provide and improve the Service, and by using the Service, you consent to the
collection and use of information in accordance with this Privacy Policy.
Explanation and definition
Explain
Words whose first letter is capitalized have meanings defined under the following conditions. The meanings
defined below shall have the same meaning regardless of whether they appear in the singular or the
plural.
Definition
For the purposes of this privacy policy:
-
Account means the unique account created for you to access our Services or
portions
of our Services.
-
Member means an entity that controls, controls, or is under common control
with a party, and
"control"
means
-
ownership of 50% or more of the shares, equity interests, or other
securities entitled to vote for
election
of directors or other managing authority.
-
Service refers to the software program GoMemory provided by the Company.
-
Company (referred to as the "Company", "We", "Us" or "Our" in this
Agreement) refers to "Shenzhen Jiangda Technology Co., Ltd.".
-
Country refers to: China.
-
Device means any device that can access the Service, such as a computer,
mobile phone or digital tablet.
-
Personal data is any information relating to an identified or identifiable
individual.
-
Service Provider is any natural or legal person who processes data on
behalf of the Company. It refers
to a
third party company or individual hired by the Company to facilitate the Service, to provide the
Service
on
the Company's behalf, to perform Service-related services or to assist the Company in analyzing how
the
Service is used.
-
Usage Data refers to automatically collected data that is generated
through the use of the Services or
the
Services infrastructure itself (for example, the duration of a page visit).
-
You means the individual on whose behalf you are accessing or using the
Service, or the company or
company
or other legal entity on whose behalf you are accessing or using the Service, as applicable.
Disclosure statement: The purpose of using this informat ion is only to process feedback or verify
problems
you have when using our services. This is also to better serve your experience of using the product.
This
information will not be uploaded to other third parties. and shared use.
2.Usage data
Usage Data is automatically collected when you use the Service, Usage Data may include your device's
Internet Protocol address (such as IP address), browser type, browser version, the pages of the Services
that you visit, the time and date of your visit, and the content on those pages. Information such as time
spent, unique device identifiers and other diagnostic data.
When you access the Services on or through a mobile device, we may automatically collect certain
information, including, but not limited to, the type of mobile device you use, your mobile device unique ID,
your mobile device's IP address, your mobile device operations system, the type of mobile internet browser
you use, unique device identifiers and other diagnostic data.
Disclosure statement: The purpose of this information is limited to: analyzing and locating product
problems, collecting feedback information about errors when connecting external devices when using the
service, locating faster through accurate device IDs, and solving problems reported by users when using the
product.
3.Manage all file information
1. Necessity of obtaining permissions
When performing a backup operation, you may want to completely and accurately back up all types of files in the device, including but not limited to documents, pictures, audio, video, and other formats of files, to a specified location (such as a cloud or external storage device)
Since the files in the device are stored in different directory structures, if the application only has limited file access permissions, it will not be able to traverse and obtain all the files you want to back up.
For example, some important work documents may be stored in custom folders, precious family photos may be scattered in different album directories, and some files in special formats may also be stored in specific application-related folders.
Only by obtaining all file management permissions can the application ensure that all files in the device are scanned and backed up without omissions to meet your needs for comprehensive data backup.
2. Specific uses of permissions
File scanning and identification: After obtaining permissions, the application will scan all files in the device storage. Through specific algorithms and technologies, different types of files are identified and classified. This process is like being in a large library, classifying and numbering books according to their category, author, year of publication, etc., so that each book (that is, each file) can be found and processed quickly and accurately later. For example, all .jpg format images are classified as images, and .doc and .pdf format files are classified as documents, etc.
Backup execution: After completing the file scanning and classification, the application will copy and transfer the identified files one by one to the target location according to the backup strategy you set (such as backing up to a specific folder on the cloud server, or a specified path on an external USB storage device). Taking backup to the cloud as an example, the application will establish a secure connection with the cloud server and upload local files to the dedicated storage space allocated to you on the server, just like moving your home items to a safe warehouse for safekeeping.
Backup integrity verification: In order to ensure that the backed-up files are accurate and complete, after completing the backup operation, the application will use the obtained permissions again to compare and verify the local source files with the files that have been backed up to the target location. By calculating the hash value of the file (similar to the fingerprint of the file, the hash value of each file is unique) and other technical means, confirm that the backup file is exactly the same as the original file in content and size. Only when all files pass the integrity check, will the backup task be considered successfully completed.
III. Data Protection Measures
Encrypted transmission: When transferring your files from the device to the backup target location (such as the cloud), the application uses advanced encryption algorithms (such as SSL/TLS encryption protocols) to encrypt the data. This means that your files are like being put into a safe with a high-strength lock during the transmission process. Even if the data is illegally intercepted during the transmission, the third party cannot read the content because it only sees a string of encrypted garbled characters.
Storage encryption: Whether it is temporarily storing backup-related data locally on the device or storing files on a cloud server or external storage device, the application will encrypt the files. In the cloud, files are encrypted using industry-standard encryption algorithms such as AES before being stored on the server's hard drive; for external storage devices, data is also encrypted when written to ensure that even if the storage device is lost or stolen, the data in it cannot be easily obtained and used by others.
Strict access control: A strict access control mechanism is established within the application, and only authorized specific modules and codes can operate on the acquired files. At the same time, extremely strict permission management policies are also formulated for application developers and operation and maintenance personnel to limit their access to user file data. Only when necessary (such as troubleshooting and after multiple approval processes) can relevant personnel view a small amount of user data in a safe and controllable environment, and all operations will be recorded and audited in detail for traceability and accountability.
Follow the privacy policy: We always strictly follow the published privacy policy and will not use your acquired file data for any other purpose unrelated to the backup service. The content of your files will not be disclosed to any third party without your explicit consent. The privacy policy details our rules and measures for data collection, use, storage and protection, which you can view at any time in the application or on our official website.
We are fully aware of your importance to personal data. We obtain all file management permissions to better serve the backup function, and we will do our best to protect your data security and privacy. If you have any questions or concerns about permission acquisition or data protection, please feel free to contact us through the feedback channel in the app or our official customer service.
Other Matters
Limited Liability
You may not use the Service in any manner that may violate local and international laws. If you have
questions about compliance with the law, please uninstall the service.
Changes to Privacy Policy
This privacy policy may be updated at any time without prior notice. We encourage you to check it
occasionally for updates and changes.
Questions
If you have any questions about this privacy policy, please contact us by email at
xuxiaoming1976@gmail.com.