《Cleaner Master Pro》- Privacy Policy
Update Date: April 2, 2025
Effective Date: April 2, 2025
Beijing Fengling Technology Co., Ltd. (hereinafter referred to as “our Company“ or “we“) respects and protects your privacy. When you use our Cleaner Master Pro (hereinafter referred to as “this software“), we will collect, store, use, and provide your personal information according to this Software's Privacy Policy (hereinafter referred to as “this Policy“). This policy is closely related to your use of this software's services. We recommend that you read and understand all the contents of this policy carefully before using this software's products or services. If you have any questions, opinions, or suggestions regarding the content of this policy, please consult us promptly via the customer service email (fenglingkjgs@163.com). If you do not agree with any content of this policy or cannot understand the relevant content of this policy, you should immediately stop visiting and using this software.
I. How We Collect Personal Information
To enable you to normally use this software's services, we need to collect some of your information in the following scenarios to provide you with services, improve our service quality, ensure account security, and comply with national laws, regulations, and regulatory requirements:
(A) Risk Control
To ensure the safe and stable operation of the services provided to you, prevent transaction and fund risks, protect your account security, prevent malicious programs and cheating; based on your terminal device and network status, ensure the normal use and optimization of product features and services. We need to obtain the following device information from you: including IMEI, IDFA identifier, IMSI, MAC address, network SSID, device model, device name, IP address, device version information, device identification code, application launch time, language or timezone information. We will identify and verify your identity through the collected device information, which will enhance the security of your use of our services. If you do not agree to provide the aforementioned information, you may not be able to complete risk control verification.
(B) Local Album and Accessing Contacts Function
2.1 When you use the camera or import files function, you need to authorize us to access the permissions for the camera or local album. If you do not agree to authorize, you will not be able to use the above functions.
2.2 When you use the contact editing function, you need to authorize us to access the permissions for your contacts. If you do not agree to authorize, you will not be able to use the above functions.
(C) Summary of Device Permissions
For your better understanding of the permissions this software calls involving your personal information, we summarize the call situations as follows. You can choose to turn off some or all permissions in the settings function of your device.
1. Network Permission: Access network permission (to enable the application to connect to the internet)
2. Contacts Permission: To achieve contact editing function
3. Album Permission: To achieve photo organization function
(D) According to relevant laws and regulations and national standards, in the following scenarios, we will legally collect and use your personal information without requiring your authorization consent:
1. Related to our fulfillment of obligations stipulated by laws and regulations;
2. Directly related to national security or defense security;
3. Directly related to public safety, public health, or significant public interests;
4. Directly related to criminal investigation, prosecution, trial, and execution of judgment;
5. For maintaining your or other individuals' major legitimate rights such as life or property when it is difficult to get your consent;
6. Personal information you have disclosed to the public on your own;
7. Necessary for signing and performing contracts as required by you;
8. Collected from legally disclosed information, such as news reports, government information disclosure channels;
9. Necessary for maintaining the secure and stable operation of the products or services provided, such as discovering and handling product or service failures;
(E) Other
Please understand that the services we provide to you are continuously updated and developed. If you choose to use other services not covered by the previous explanation, based on those services, we will separately inform you of the scope and purpose of the information collection through page prompts, interactive processes, or agreement terms, and obtain your consent. We will use, store, provide externally, and protect your information according to this policy and the corresponding user agreements; if you choose not to provide the aforementioned information, you may not be able to use a certain service or part of a service, but it does not affect your use of other services we provide. Additionally, third parties may provide services to you through this software. When you enter the service page operated by a third party, please note that the related services are provided by the third party. Regarding the collection of your personal information by third parties, it is recommended that you carefully review the privacy policy or agreement terms of the third party.
II. How We Use Personal Information
To comply with national laws and regulations and regulatory requirements and provide you with services and improve service quality, or protect your account and financial security, we will use your information in the following scenarios:
1. During the period we provide you with this software's services, we will collect and use your relevant personal information according to this privacy policy and your additional authorization. When you cancel the service or revoke authorization, we will stop collecting and using your relevant personal information, but we will continue to use the previously collected information according to laws, regulations, and the requirements of national authorities for auditing or assisting investigations.
2. To prevent risks and ensure the stability and security of the services, we will use your information for identity verification, security prevention, fraud monitoring, fraud investigation, prevention or prohibition of illegal activities, and risk reduction.
3. Your personal information will only be used within the People's Republic of China (excluding Hong Kong, Macao Special Administrative Regions, and Taiwan region) and will not be transferred overseas. If it is necessary to transfer the information abroad due to business needs, we will conduct a security assessment according to methods formulated by the Cyberspace Administration and relevant departments of the State; except as otherwise provided by laws, regulations, and national authorities.
4. Use your personal information for other purposes allowed by law.
III. How We Store and Protect Personal Information
(A) Storage Location
The personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. However, to handle cross-border business and after obtaining your authorization, your personal information as part of the transaction information may be transferred abroad. In such cases, we will perform data de-identification and other security measures before cross-border data transfer and require foreign institutions to keep your information confidential through agreements, audits, and other measures.
(B) Storage Duration
We promise that the storage time of your personal information will always be within a reasonable and necessary period. We store user information based on business needs and national laws and regulations. While you use our services, we will retain relevant information. After the necessary period, we will delete or anonymize your personal information unless laws and regulations stipulate that they cannot be deleted or anonymized.
(C) How We Protect Personal Information
1. To protect your information security, we strive to use various security technologies and supporting management systems to safeguard your information security at a reasonable security level. We try to reduce the risks of your information being leaked, damaged, misused, unauthorized accessed, disclosed, or altered. For example, through SSL encryption transmission, information encryption storage, strict restrictions on data center access, dedicated network channels, and network proxies. We also set up a personal information protection department and established relevant internal control systems. Additionally, we annually hire external independent third parties to assess our information security.
2. We have developed a personal information security incident emergency response plan, regularly organize internal personnel for emergency response training and drills, so they understand their job responsibilities and emergency response strategies and procedures. In the event of a personal information security incident, we will notify you in accordance with legal requirements: basic situation and potential impact of the security incident, measures taken or to be taken, suggestions for you to independently prevent and reduce risks, remedial measures for you, etc. We will inform you of the situation in a timely manner through emails/short messages, etc. If it is difficult to individually inform the subjects of personal information, we will take reasonable and effective ways to issue announcements. At the same time, we will proactively report the handling of personal information security incidents to regulators.
IV. How We Share Personal Information Externally
(A) Sharing
We commit to keeping your information confidential according to relevant laws and regulations and regulatory requirements. With your explicit consent or authorization, to provide various services on the platform, you agree and authorize us to share your personal information with our affiliates and cooperative institutions under the following circumstances. We will require these affiliates and cooperative institutions to store and process your personal information according to laws and regulations, this privacy policy, our instructions, and any other relevant cooperation agreements.
Regarding your personal information, we will not share it with any company, organization, or individual unless one or more of the following scenarios occur:
1. Prior consent has been obtained from you.
2. Demands made by you or your guardian.
3. Necessary Sharing with Partners:
You understand and acknowledge that, in order to provide you with more comprehensive and high-quality products and services, we will authorize partners to provide you with certain services. In such cases, we may share some of your personal information with our partners or integrate third-party SDKs to provide better customer service and user experience.
When you use the features or services of this software, under certain specific usage scenarios, we may use software development kits (SDKs) provided by qualified third-party service providers to offer you services. These SDKs might collect and use your personal information, which we would obtain after obtaining your authorization. This software will conduct strict security checks on SDKs or similar applications and require third-party service providers to implement stringent data protection measures to effectively safeguard your legal rights. The specific SDKs include the following:
Third-party SDKs:
[【Umeng+】Terminal Statistical Analysis Service (U-APP/U-Web/Application Performance Monitoring Platform U-APM)]
Third-party entity
[Youmeng Tongxin (Beijing) Technology Co., Ltd.]
Permissions used
[Device Information Permissions]
Personal Information Fields
[Device Identification Information (installed application package names, IP address, current network type, WIFI information, IMEI, MAC Address ID, IDFA, OpenUDID, GUID, SIM card, IMSI, OAID, running processes), App internal user operation records]
Functions and Purposes
[Provide user behavior data, App operation collection and visual analysis to assist in better analytical decision-making for business growth, and for unique device identification to provide device application performance monitoring services, diagnosing reasons for application performance crashes]
Privacy Policy Link
[https://www.umeng.com/policy]
Third-party SDK:
[Tencent Bugly]
Third-party entity
[Shenzhen Tencent Computer Systems Co., Ltd.]
Permissions used
[Device Information Permissions]
Personal Information Fields
[Device Identification Information (IP address, current network status, WIFI information, IMEI, idfv)]
Functions and Purposes
[Provide App stability monitoring and crash issue tracking services]
Privacy Policy Link
[https://static.bugly.qq.com/bugly-sdk-privacy-statement.pdf]
Third-party SDK
[Adjust SDK]
Third-party entity
[Adjust GmbH]
Permissions used
[Device Information]
Personal Information Fields
[Device Identification Information (IP address, current network status, WIFI information, IMEI, Android ID, idfv)]
Function
[Provide data statistics functionality]
Privacy Policy Link
[https://www.adjust.com/terms/privacy-policy]
Third-party SDK
[Baidu SDK]
Third-party entity
[Baidu Online Network Technology (Beijing) Co., Ltd.]
Permissions used
[Device Information]
Personal Information Fields
[Device Identification Information (IP address, current network status, WIFI information, IMEI, Android ID, idfv)]
Function
[Provide data statistics functionality]
Privacy Policy Link
[https://dev2.baidu.com/content]
[Adjust SDK]
Third-party entity
[Adjust GmbH]
Permissions used
[Device Information]
Personal Information Fields
[Device Identification Information (IP address, current network status, WIFI information, IMEI, Android ID, idfv)]
Function
[Provide data statistics functionality]
Privacy Policy Link
[https://www.adjust.com/terms/privacy-policy]
(B) Transfer
We will not transfer your personal information to any company, organization, or individual except in the following situations:
1. Transfer upon obtaining explicit consent: After obtaining your explicit consent or authorization, we will transfer your personal information to other parties;
2. According to laws and regulations or mandatory administrative and judicial requirements;
3. According to laws, regulations, and commercial practices, in mergers, acquisitions, asset transfers, consolidations, reorganizations, or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new holder of your personal information to continue to be bound by this privacy policy, otherwise, we will require that company or organization to seek your authorization again.
(C) Public Disclosure
We will only publicly disclose your personal information in the following situations:
(1) After obtaining your explicit consent or authorization;
(2) As required by government, regulatory bodies, or judicial authorities under laws and regulations, we will publicly disclose your personal information without needing your consent.
(D) Exceptions to Obtaining Authorization Consent
According to relevant laws and regulations and national standards, in the following scenarios, we may legally share, transfer, or publicly disclose your personal information without obtaining your consent:
(1) Related to fulfilling obligations stipulated by laws and regulations and industry supervisory authorities;
(2) Directly related to national security or defense security;
(3) Directly related to public safety, public health, or significant public interests;
(4) Directly related to criminal investigation, prosecution, trial, and execution of judgment;
(5) For maintaining your or others' major legitimate rights such as life or property when it is difficult to get your consent;
(6) Personal information you have disclosed to the public on your own;
(7) Personal information collected from legally disclosed information, such as news reports, government information disclosure channels. As our business develops, we and our affiliates may undergo mergers, acquisitions, asset transfers, or similar transactions, and your personal information may be transferred as part of such transactions. We will notify you before the transfer.
V. How You Can Access and Manage Your Personal Information
During your use of this software's services, to make it easier for you to access and manage your personal information, we have provided corresponding operational settings in the product design, and you can follow the guidance below to operate.
(A) Managing Your Personal Information
1. If you find that our use of your personal information violates legal provisions or breaches the agreement with you, you can contact our customer service email (fenglingkjgs@163.com) and request the deletion of the relevant information.
In the following scenarios, users can request us to delete their relevant information:
1) If our processing of user information violates laws and regulations;
2) If we collect and use user information without obtaining user consent;
3) If our processing of user information violates the agreement with the user;
4) If the user no longer uses our products or services;
5) If we no longer provide products or services to the user.
If we decide to respond to the user's deletion request, we will also notify entities that have obtained the user's relevant information from us, requesting them to delete it promptly, unless otherwise provided by laws and regulations or these entities have obtained independent authorization from the user. After the user deletes the information from our services, we may not immediately delete the corresponding information in the backup system but will delete this information when updating backups.
2. Despite the above agreements, according to relevant laws and regulations and national standards, in the following scenarios, we may not be able to respond to your requests:
(1) Directly related to national security or defense security;
(2) Directly related to public safety, public health, or significant public interests;
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgment;
(4) There is sufficient evidence that you have acted maliciously or abused your rights;
(5) Responding to your request would seriously harm the legitimate rights and interests of other individuals or organizations;
(6) Involves trade secrets.
(B) Google [Google Aouth2.0,Google Gmail]
(1) Google APIs Terms of Service : https://developers.google.com/terms
(2) When you use our email cleanup feature, we will request access to your Gmail account to read, compose, send, and permanently delete all of your Gmail emails.
The email data we obtain through the Google API is only used for local email display and deletion operations on the client side, and will not be uploaded to any server or third party.
We do not reach or process any Google user data when you use Google API through Cleaner Master Pro. Therefore, it is not possible for Cleaner Master Pro to use any Google user data obtained via Google APIs for marketing purposes such as serving ads, including retargeting, personalised, or interest-based advertising.
(3) After authorization, you can still use the logout function within the app to stop us from continuing to use your Gmail account permissions.
(4) You can also revoke the authorization for this app in your Google account settings.
(V) Accessing the Privacy Policy
You can view the full content of this privacy policy in “Settings - About Us - Privacy Policy“.
VI. Using Cookies and Related Technologies
We or our third-party partners may place cookies and related technologies to collect your information to provide you with a better user experience and service. You can also manage cookies. However, if you disable cookies, you may not enjoy the best service experience, and some services may not work properly.
VII. Statement on Third-Party Responsibilities
For the integration of third-party products and services, we establish strict management mechanisms and workflows and clarify both parties' security responsibilities and implemented personal information security measures through contracts with third-party product or service providers. When the products or services you use are provided by third parties, we will clearly mark and explain it to you. If third parties need to collect your information due to service necessity, they will obtain your separate authorization consent.
Please note that your transaction counterparties, operators of third-party websites you visit, third-party services integrated into our platform (such as third-party applications in this software), and recipients of your personal information may have their own privacy policies. When you view web pages created by third parties or use applications developed by third parties, these third parties may place their own cookies or pixel tags, which are not under our control and are not subject to this policy. We will make commercially reasonable efforts to require these parties to take protective measures for your personal information, but we cannot guarantee that they will take measures as we require. Please contact them directly for detailed information about their privacy policies. If you find risks in web pages created by third parties or applications developed by third parties, we recommend you terminate related operations to protect your legitimate rights and interests.
Eight. Special Agreement on the Privacy Rights of Minors
1. We expect parents or guardians to guide minors in using our services. According to relevant national laws and regulations, we will protect the confidentiality and security of minors' personal information.
2. If you are a minor, we recommend that your parents or guardians read this policy and use our services or provide us with your information only after obtaining their consent. For the use of your information with the consent of parents or guardians, we will only use or publicly disclose this information under circumstances allowed by law, with explicit consent from parents or guardians, or as necessary for protecting your rights. If your guardian disagrees with you using our services according to this policy or providing us with your information, please immediately stop using our services and notify us promptly so we can take appropriate measures.
Nine. Application and Updates of This Policy
1. This privacy policy applies to all services provided by this software platform to you. You confirm that regarding the personal information requiring your authorization for provision, use, and sharing mentioned in this policy, we will no longer separately obtain your individual authorization when you agree to this policy and use related services.
It should be specifically noted that this privacy policy does not apply to services provided by associated parties of this software, cooperative institutions of this software, or other third parties. The platform may also contain links to other websites, and we will take necessary measures in accordance with legal requirements to review these linked sites (including reviewing website operating qualifications, conducting reasonable and preliminary identification of the site's security situation through technical means, urging the operators of the site to protect your personal information safety according to the law), but we cannot guarantee that the operators of the linked sites will take protective measures as required by us. We recommend that you review the privacy policies of those sites to understand how they handle your information and make prudent decisions.
2. Other terms agreed upon by us concerning personal information and privacy are considered supplements to this policy. Where this policy does not cover, the agreements of other terms shall apply. If new products, services, functions require the collection, use, provision of your personal information, we will obtain your consent separately.
3. In case of significant changes that may substantially diminish your rights under this policy or have a major impact, we will update this policy at an appropriate time:
(1) Changes in our basic situation, such as mergers, acquisitions, restructurings leading to ownership changes;
(2) Changes in the scope, purpose, rules for collecting, storing, using personal information;
(3) Changes in the objects, scope, purposes for providing personal information externally;
(4) Changes in the methods for you to access and manage personal information;
(5) Changes in data security capabilities and information security risks;
(6) Changes in channels and mechanisms for user inquiries and complaints, as well as external dispute resolution institutions and contact details;
(7) Other changes that may significantly affect your personal information rights.
If this policy is updated, we will notify you via pop-up prompts within the software, email, or SMS. To ensure you receive notifications promptly, we suggest updating your contact information with us when it changes. If you do not agree to the changes in this policy, please stop accessing and using this software immediately. If you continue to use this software service after the update takes effect, it indicates that you have fully read, understood, and accepted the updated policy and are willing to be bound by the updated policy. You can view this policy within the software. We encourage you to review our privacy policy each time you use the software.
Ten. Explanation of Key Terms in This Policy
The term “identity elements“ in this policy refers to: information elements used to identify your identity, such as your login name, telephone number, mobile phone number, ID number, bank card information, and biometric information (such as fingerprint information, facial information, voiceprint information).
Eleven. Contact Us
1. If you have any questions, opinions, or suggestions regarding the content of this policy or related matters, you can contact us via the customer service email within the APP (fenglingkjgs@163.com), and we will verify and handle it within 15 working days.
Twelve. Complaint Feedback Channels
During the process of using our product or receiving services, if you have any questions or suggestions about our products, services, or the Privacy Policy, you can contact us for feedback through the following means.
Complaint Email: fenglingkjgs@163.com