DACS Privacy Policy

Release Date: April 18, 2023

Effective Date: April 18, 2023

DACS is developed by DataCloak (Shenzhen) Co., Ltd. (hereinafter referred to as “we” or “DataCloak”) and is an office security application for enterprise customers. Before you download and install DACS software (hereinafter referred to as "this software" or "this APP") and related services, please carefully read and thoroughly understand this privacy policy. We have tried to explain the terminology used in this policy in a clear and concise manner so that you can understand it. If you have any questions, opinions or suggestions about the content of this policy, you can contact us through the contact information at the end of this policy. At the same time, we suggest that you fully learn more about the relevant data collection, use, and protection rules from your company.

This clause constitutes a legally binding agreement between you and us, and we hereby specifically remind you to read and fully understand each clause of this agreement, especially those related to your rights and interests which may be bolded or underlined to draw your attention. Please carefully read and choose whether to accept or not to accept this agreement. If you do not agree to this clause, please immediately stop accessing or using this software. Your agreement to the privacy policy indicates that you have understood the functions provided by this software, as well as the necessary personal information required for its operation, and have granted corresponding collection and use authorization.

This privacy policy includes the following:

  1. How DACS collects your personal information
  2. How DACS uses your personal information
  3. How DACS processes, transfers and publicly discloses your personal information
  4. Storage of personal information
  5. Security protection of personal information
  6. Management of personal information
  7. Protection of personal information of minors
  8. Contact information of DataCloak
  9. Update of Privacy Policy
1. How DACS collects your personal information

1.1 Information that DACS needs/may need to collect during your use of this software.

1.1.1 Account information: your account name, email address, phone number, and account information of other business systems within the enterprise.

1.1.2 【Android APP】Device information and network information hardware model and settings, OS information and version number, device ID, Android ID, MAC, network device hardware address, CPU information, storage information, IP address, WLAN access point, network access method, type, status, app list.

1.1.3 Log information and information related to your use of certain functions, applications, and websites, including the time and duration of service usage, network request information, standard system logs, crash information, behavior log information generated from service usage or operations, and event information of devices and software.

1.1.4 Cookies and similar technologies. DACS uses cookies and other similar technologies (such as web beacons, Flash cookies, etc.) (Referred to as "cookies") to enhance your experience of using this software. When you use "DACS" and related services, DACS may use technologies to send one or more cookies or anonymous identifiers to your device to collect and store information about your access and use of this product. Most web browsers automatically accept cookies, but it is up to you to decide whether to accept them or not. You can choose to accept or disable cookies. You understand and agree that DACS may store necessary cookies for the operation of this software, including cookies that allow you to log in to the secure workspaces of this software. The aforementioned behavior of storing necessary cookies is a necessary condition for providing basic service content. If you do not agree to the relevant authorization, you cannot use any services of this software.

2. How DACS uses your personal information

2.1 DACS will collect and use your personal information for the following purposes

2.1.1 Login and Authentication

When you log in DACS, you need to be provided with the enterprise identification code, account number and password by your enterprise administrator (hereinafter referred to as the "user administrator"), you can log in this software after entering the above information, if necessary, the user administrator will also send a verification message to your mobile phone to complete the login account authentication. If you want to reset your password, you need to enter your current password through the web page and you need user administrator to send verification code to your mobile phone, email address, and verify the SMS, email verification code you entered to ensure your account login security.

2.1.2 VPN Service

In order to provide you with VPN data transfer services, perform authentication of user devices and network fault diagnosis, DACS needs to obtain your device information and network information. The VPN service is responsible for connecting your device to the enterprise's internal office network so that you can access enterprise’s internal resources. This service does not access, hijack, or tamper with your content information.

2.1.3 OTP Service

The OTP service provides a one-time password (updated every 30 seconds) for VPN connection authentication to ensure account login security.

2.1.4 Security Function

DACS is committed to providing you with a secure and trusted product and usage environment, and the information collected is necessary to achieve the security functions.

a. To ensure the secure operation of the software and services, DACS will collect your device information, network information hardware model and settings, operating system information and version number, device information, device ID, network device hardware address, CPU information, storage information, IP address, WLAN access point, network access method, type, status, APP list, network quality data, operation, usage, and service logs.

b. To prevent malicious programs, DACS collects information about installed applications or running processes, the overall operation, usage and frequency of applications, application crashes, and performance data, which are also necessary for secure operations.

c. DACS may use your account information, device information, and service log information to determine account security, authenticate, detect and prevent security incidents.

2.1.5 Statistical Analysis

DACS may use your device information and log information for statistical analysis of product operation and to improve the user experience.

2.1.6 Message Push

To ensure the timeliness of the message push, DACS will connect to manufacturers and third-party PUSH SDKs, and we will enable the self-start and associated start functions for you by default. When you use the push service, the program will adjust the link and activate the closed push processes to ensure effective delivery of push messages, you can control to turn on or off the self-start/associated start through the system setting switch. Please be aware that if you choose to turn off this capability, the timeliness of push messages may be reduced or you may not be able to receive push messages, but it will not affect your normal use of other services that do not require this capability.

2.2 DACS Permission List Description

Permission NamePermission Function DescriptionUsage scenarios or purposes
CAMERATake photos and videos, complete scanning QR codesProvide scanning function
WRITE_EXTERNAL_STORAGEProvide service capability for shared logsUse when generating logs
READ_EXTERNAL_STORAGERead local QR codeRealize scan code login
READ_PHONE_STATEGet device idRealize system login
ClipboardAccessing clipboard contentUsed to identify whether you have copied information within this software without storing any clipboard information
3. How your personal information is processed, transferred, and publicly disclosed

3.1 We will not share your information with any company, organization, or individual other than your company, except for the following situations:

a. Obtain your explicit consent to share information with third parties.

b. Sharing necessary for fulfilling legal obligations: We may share your personal information in accordance with laws and regulations, litigation, dispute resolution, or as required by administrative and judicial authorities in accordance with the law, as well as other legal obligations.

c. Depending on the circumstances, we may share your information with our affiliated companies or authorized third parties, for example, security logs generated by your device during operation will be shared with the partner to upgrade the quality of our services and improve the security of services. We only share necessary information, and the processing of your information by our affiliated companies or authorized third parties is subject to this policy, and your authorization and consent will be sought again if the purpose of processing the information is changed.

d. Access to third-party software development kit (SDK)

In order to enhance the experience of using, this software will embed third-party SDKs, and the directory of third-party SDKs that this software accesses to obtain personal information is as follows:

  • Huawei HMS SDK

Purpose of use: Push messages

Obtain personal information type: basic information of the application, device identifier in the application, hardware information of the device, basic system information and system setting information

Privacy policy link: https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177

  • OPPO Push SDK

Purpose of use: Push messages

Obtain personal information type: device identifier (e.g. IMEI, ICCID, IMSI, Android ID, GAID), application information (e.g. application package name, version number and running status), network information (e.g. IP or domain connection result, current network type)

Privacy policy link: https://open.oppomobile.com/wiki/doc#id=10288

  • vivo Push SDK

Purpose of use: Push messages

Obtain personal information type: device information

Link to privacy policy: https://www.vivo.com.cn/about-vivo/privacy-policy

  • Xiaomi Push SDK

Purpose of use: Push messaging

Obtain personal information type: device identifier (e.g. Android ID, OAID, GAID), device information

Privacy policy link: https://dev.mi.com/console/doc/detail?pId=1822

  • URORA SDK

Purpose of use: To identify unique users, ensure accurate delivery of push and accurate statistics of push information

Obtain personal information type: device identifier information (IMEI, IDFA, Android ID, GID, MAC, OAID, VAID, AAID, IMSI, MEID, UAID, SN, ICCID, SIM)

Privacy policy link: https://www.jiguang.cn/license/privacy

  • zxing-android-embedded SDK

Purpose of use: to detect ambient light and turn on the headlights when it is very dark

Obtain personal information type: obtain light sensor permission and listen to the light sensor

3.2 We will not transfer your information to any company, organization or individual, except:

a. With your express consent to transfer the information to a third party.

b. In the event of a reorganization, merger, demerger or change of beneficial owner of DataCloak, we may transfer the collected user information to a third party, but we will continue to protect or require the new controller to continue to protect your information in accordance with laws and regulations and standards no less stringent than those required by this policy. If the recipient changes the original processing purpose or processing method, we will obtain your consent again.

3.3 We will not disclose your information except

a. With your explicit consent to disclose the information.

b. We may disclose your information in accordance with laws and regulations or mandatory requirements of state agencies such as national security agencies, judicial agencies, or administrative agencies.

c. We may disclose your information in accordance with applicable law and the relevant provisions of this Policy if we determine that disclosure is reasonably necessary to enforce the terms and conditions of the contract between DataCloak and you, to protect our operations or users, or other material public interest.

3.4 In the following situations, Share, transfer, disclose your information without your prior authorized and consent from you.

a. Related to national security, national defense and safety.

b. Related to public safety, public health, or significant public interest.

c. Related to crime investigation, prosecution, trial, judgment execution, etc.

d. For the purpose of safeguarding the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals but it is difficult to obtain the consent of the individual.

e. Information that you disclose to the public on your own.

f. Collected from information that is lawfully and publicly disclosed, such as lawful news reports, government information disclosure and other channels.

g.Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and disposing of product or service failures.

h. Other circumstances as stipulated by laws and regulations.

3.5 Please be aware that, in accordance with the relevant provisions of applicable law, if we take technical measures and other necessary measures to process personal information in such a way that the recipient of the data cannot re-identify a specific individual and cannot recover it, the sharing, transfer, or disclosure of such processed data does not require separate notification to you and your consent.

4. Storage of Personal Information

4.1 The information and data we collect and generate in the People's Republic of China will be stored on servers in the People's Republic of China.

4.2 For security and backup purposes, we may store your information and data on the servers of our affiliated companies of DataCloak.

4.3 We will reasonably determine the period of storage of your information and data based on the period necessary for the purposes described in this policy and the time limits required by law and regulation. For companies and users who exceed the aforementioned retention period of user information or terminate cooperation, we will delete or anonymize such information. If this is not possible (e.g. because the relevant information and data are already stored in other backup archives), we will store such information and data safely until they are deleted.

5. Security protection of personal information

5.1 We take the security of your information very seriously and will use a variety of administrative, technical and physical measures to store and protect your information and data from loss, theft, misuse, unauthorized access, disclosure, alteration and destruction.

5.2 We will establish a user information security management system and workflow, adopt the principle of minimum sufficient authorization for staff who may have access to the relevant information and train them on security responsibilities and confidentiality obligations.

5.3 In the unfortunate event of a user information security incident, we will take reasonable, effective and timely measures to inform you of the basic situation of the security incident, the possible impact, the measures we have taken or will take, your suggestions for independent prevention and risk reduction, remedial measures for you, etc. in strict accordance with the requirements of laws and regulations.

5.4 Despite our best efforts to use various security measures to protect your information, please understand that DataCloak will not be able to be held responsible for the leakage of user information and its direct and indirect losses due to certain reasons (such as you informing others of your service password, sharing your registered account and password with others, hacker attacks, computer virus intrusion, or other force majeure factors).

5.5 About the data protection methods and security measures adopted by your company, please contact your company to communicate and understand.

6. Management of Personal Information

6.1 How to cancel your account

After you have terminated your use of the Software, only your personal account can be cancelled by your business administrator, and you will need to apply to your business administrator to do so. After you cancel your account, we will delete your personal information.

6.2 Changing or withdrawing the scope of authorization

6.2.1 We may delete, modify or anonymize information at your reasonable request. You may contact us with your request using the contact information provided in Section 8 of this Policy. We will generally review and process your request within 15 business days.

6.2.2 You can change the scope of your consent or withdraw your authorization by turning off camera, album and other related authorizations in the device's own operating system. Withdrawing your authorization will prevent your business from collecting information related to these permissions. If you have questions about the handling of any personal information that has been collected, please contact your corporate administrator.

6.2.3 You may make a request to us to delete User Information in the following circumstances:

a. Our handling of User Information violates relevant laws and regulations.

b. We collect and use your User Information without seeking your explicit consent.

c. We use or process your User Information in serious violation of the agreement with you.

d. Other reasonable and legitimate requests.

7. Protection of personal information of minors

This software provides products and services primarily to adults (employees of corporate customers or other persons authorized by them). If you are a minor, we request that you ask your parent or guardian to read this policy carefully and to use our products or services or provide information to us with the consent of your parent or guardian. In the case of personal information collected from minors with the consent of their parents or guardians to use our products or services, we will only use, share, transfer or disclose this information as permitted by law or regulation, with the express consent of their parents or guardians, or as necessary to protect the minor.

8. Contact Information of DataCloak

If you have any questions or comments about this policy, you can contact us via our customer service email: contact@datacloak.com. In general, we will respond within 15 business days.

9. Updates of Privacy Policy

9.1 We may revise and update this Policy from time to time in accordance with the requirements of applicable law and the needs of our business development.

9.2 In the event of changes or updates to this policy, we will notify you of the revisions through as many channels and methods as possible (including, but not limited to, push notifications, pop-up, and special tips on browsing pages, sending emails/short messages or posting announcements). In order for you to receive timely notification, we recommend that you notify us when your contact information is updated. If you continue to use our products or services after the update of this policy has taken effect, you are deemed to have fully read, understood and accepted the updated policy and are willing to be bound by the updated policy.

9.3 You can check the latest version of this policy at any time by visiting our website.

DACS Privacy Policy

Release Date: April 18, 2023

Effective Date: April 18, 2023

DACS is developed by DataCloak (Shenzhen) Co., Ltd. (hereinafter referred to as “we” or “DataCloak”) and is an office security application for enterprise customers. Before you download and install DACS software (hereinafter referred to as "this software" or "this APP") and related services, please carefully read and thoroughly understand this privacy policy. We have tried to explain the terminology used in this policy in a clear and concise manner so that you can understand it. If you have any questions, opinions or suggestions about the content of this policy, you can contact us through the contact information at the end of this policy. At the same time, we suggest that you fully learn more about the relevant data collection, use, and protection rules from your company.

This clause constitutes a legally binding agreement between you and us, and we hereby specifically remind you to read and fully understand each clause of this agreement, especially those related to your rights and interests which may be bolded or underlined to draw your attention. Please carefully read and choose whether to accept or not to accept this agreement. If you do not agree to this clause, please immediately stop accessing or using this software. Your agreement to the privacy policy indicates that you have understood the functions provided by this software, as well as the necessary personal information required for its operation, and have granted corresponding collection and use authorization.

This privacy policy includes the following:

  1. How DACS collects your personal information
  2. How DACS uses your personal information
  3. How DACS processes, transfers and publicly discloses your personal information
  4. Storage of personal information
  5. Security protection of personal information
  6. Management of personal information
  7. Protection of personal information of minors
  8. Contact information of DataCloak
  9. Update of Privacy Policy
1. How DACS collects your personal information

1.1 Information that DACS needs/may need to collect during your use of this software.

1.1.1 Account information: your account name, email address, phone number, and account information of other business systems within the enterprise.

1.1.2 【Android APP】Device information and network information hardware model and settings, OS information and version number, device ID, Android ID, MAC, network device hardware address, CPU information, storage information, IP address, WLAN access point, network access method, type, status, app list.

1.1.3 Log information and information related to your use of certain functions, applications, and websites, including the time and duration of service usage, network request information, standard system logs, crash information, behavior log information generated from service usage or operations, and event information of devices and software.

1.1.4 Cookies and similar technologies. DACS uses cookies and other similar technologies (such as web beacons, Flash cookies, etc.) (Referred to as "cookies") to enhance your experience of using this software. When you use "DACS" and related services, DACS may use technologies to send one or more cookies or anonymous identifiers to your device to collect and store information about your access and use of this product. Most web browsers automatically accept cookies, but it is up to you to decide whether to accept them or not. You can choose to accept or disable cookies. You understand and agree that DACS may store necessary cookies for the operation of this software, including cookies that allow you to log in to the secure workspaces of this software. The aforementioned behavior of storing necessary cookies is a necessary condition for providing basic service content. If you do not agree to the relevant authorization, you cannot use any services of this software.

2. How DACS uses your personal information

2.1 DACS will collect and use your personal information for the following purposes

2.1.1 Login and Authentication

When you log in DACS, you need to be provided with the enterprise identification code, account number and password by your enterprise administrator (hereinafter referred to as the "user administrator"), you can log in this software after entering the above information, if necessary, the user administrator will also send a verification message to your mobile phone to complete the login account authentication. If you want to reset your password, you need to enter your current password through the web page and you need user administrator to send verification code to your mobile phone, email address, and verify the SMS, email verification code you entered to ensure your account login security.

2.1.2 VPN Service

In order to provide you with VPN data transfer services, perform authentication of user devices and network fault diagnosis, DACS needs to obtain your device information and network information. The VPN service is responsible for connecting your device to the enterprise's internal office network so that you can access enterprise’s internal resources. This service does not access, hijack, or tamper with your content information.

2.1.3 OTP Service

The OTP service provides a one-time password (updated every 30 seconds) for VPN connection authentication to ensure account login security.

2.1.4 Security Function

DACS is committed to providing you with a secure and trusted product and usage environment, and the information collected is necessary to achieve the security functions.

a. To ensure the secure operation of the software and services, DACS will collect your device information, network information hardware model and settings, operating system information and version number, device information, device ID, network device hardware address, CPU information, storage information, IP address, WLAN access point, network access method, type, status, APP list, network quality data, operation, usage, and service logs.

b. To prevent malicious programs, DACS collects information about installed applications or running processes, the overall operation, usage and frequency of applications, application crashes, and performance data, which are also necessary for secure operations.

c. DACS may use your account information, device information, and service log information to determine account security, authenticate, detect and prevent security incidents.

2.1.5 Statistical Analysis

DACS may use your device information and log information for statistical analysis of product operation and to improve the user experience.

2.1.6 Message Push

To ensure the timeliness of the message push, DACS will connect to manufacturers and third-party PUSH SDKs, and we will enable the self-start and associated start functions for you by default. When you use the push service, the program will adjust the link and activate the closed push processes to ensure effective delivery of push messages, you can control to turn on or off the self-start/associated start through the system setting switch. Please be aware that if you choose to turn off this capability, the timeliness of push messages may be reduced or you may not be able to receive push messages, but it will not affect your normal use of other services that do not require this capability.

2.2 DACS Permission List Description

Permission NamePermission Function DescriptionUsage scenarios or purposes
CAMERATake photos and videos, complete scanning QR codesProvide scanning function
WRITE_EXTERNAL_STORAGEProvide service capability for shared logsUse when generating logs
READ_EXTERNAL_STORAGERead local QR codeRealize scan code login
READ_PHONE_STATEGet device idRealize system login
ClipboardAccessing clipboard contentUsed to identify whether you have copied information within this software without storing any clipboard information
3. How your personal information is processed, transferred, and publicly disclosed

3.1 We will not share your information with any company, organization, or individual other than your company, except for the following situations:

a. Obtain your explicit consent to share information with third parties.

b. Sharing necessary for fulfilling legal obligations: We may share your personal information in accordance with laws and regulations, litigation, dispute resolution, or as required by administrative and judicial authorities in accordance with the law, as well as other legal obligations.

c. Depending on the circumstances, we may share your information with our affiliated companies or authorized third parties, for example, security logs generated by your device during operation will be shared with the partner to upgrade the quality of our services and improve the security of services. We only share necessary information, and the processing of your information by our affiliated companies or authorized third parties is subject to this policy, and your authorization and consent will be sought again if the purpose of processing the information is changed.

d. Access to third-party software development kit (SDK)

In order to enhance the experience of using, this software will embed third-party SDKs, and the directory of third-party SDKs that this software accesses to obtain personal information is as follows:

  • Huawei HMS SDK

Purpose of use: Push messages

Obtain personal information type: basic information of the application, device identifier in the application, hardware information of the device, basic system information and system setting information

Privacy policy link: https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177

  • OPPO Push SDK

Purpose of use: Push messages

Obtain personal information type: device identifier (e.g. IMEI, ICCID, IMSI, Android ID, GAID), application information (e.g. application package name, version number and running status), network information (e.g. IP or domain connection result, current network type)

Privacy policy link: https://open.oppomobile.com/wiki/doc#id=10288

  • vivo Push SDK

Purpose of use: Push messages

Obtain personal information type: device information

Link to privacy policy: https://www.vivo.com.cn/about-vivo/privacy-policy

  • Xiaomi Push SDK

Purpose of use: Push messaging

Obtain personal information type: device identifier (e.g. Android ID, OAID, GAID), device information

Privacy policy link: https://dev.mi.com/console/doc/detail?pId=1822

  • URORA SDK

Purpose of use: To identify unique users, ensure accurate delivery of push and accurate statistics of push information

Obtain personal information type: device identifier information (IMEI, IDFA, Android ID, GID, MAC, OAID, VAID, AAID, IMSI, MEID, UAID, SN, ICCID, SIM)

Privacy policy link: https://www.jiguang.cn/license/privacy

  • zxing-android-embedded SDK

Purpose of use: to detect ambient light and turn on the headlights when it is very dark

Obtain personal information type: obtain light sensor permission and listen to the light sensor

3.2 We will not transfer your information to any company, organization or individual, except:

a. With your express consent to transfer the information to a third party.

b. In the event of a reorganization, merger, demerger or change of beneficial owner of DataCloak, we may transfer the collected user information to a third party, but we will continue to protect or require the new controller to continue to protect your information in accordance with laws and regulations and standards no less stringent than those required by this policy. If the recipient changes the original processing purpose or processing method, we will obtain your consent again.

3.3 We will not disclose your information except

a. With your explicit consent to disclose the information.

b. We may disclose your information in accordance with laws and regulations or mandatory requirements of state agencies such as national security agencies, judicial agencies, or administrative agencies.

c. We may disclose your information in accordance with applicable law and the relevant provisions of this Policy if we determine that disclosure is reasonably necessary to enforce the terms and conditions of the contract between DataCloak and you, to protect our operations or users, or other material public interest.

3.4 In the following situations, Share, transfer, disclose your information without your prior authorized and consent from you.

a. Related to national security, national defense and safety.

b. Related to public safety, public health, or significant public interest.

c. Related to crime investigation, prosecution, trial, judgment execution, etc.

d. For the purpose of safeguarding the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals but it is difficult to obtain the consent of the individual.

e. Information that you disclose to the public on your own.

f. Collected from information that is lawfully and publicly disclosed, such as lawful news reports, government information disclosure and other channels.

g.Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and disposing of product or service failures.

h. Other circumstances as stipulated by laws and regulations.

3.5 Please be aware that, in accordance with the relevant provisions of applicable law, if we take technical measures and other necessary measures to process personal information in such a way that the recipient of the data cannot re-identify a specific individual and cannot recover it, the sharing, transfer, or disclosure of such processed data does not require separate notification to you and your consent.

4. Storage of Personal Information

4.1 The information and data we collect and generate in the People's Republic of China will be stored on servers in the People's Republic of China.

4.2 For security and backup purposes, we may store your information and data on the servers of our affiliated companies of DataCloak.

4.3 We will reasonably determine the period of storage of your information and data based on the period necessary for the purposes described in this policy and the time limits required by law and regulation. For companies and users who exceed the aforementioned retention period of user information or terminate cooperation, we will delete or anonymize such information. If this is not possible (e.g. because the relevant information and data are already stored in other backup archives), we will store such information and data safely until they are deleted.

5. Security protection of personal information

5.1 We take the security of your information very seriously and will use a variety of administrative, technical and physical measures to store and protect your information and data from loss, theft, misuse, unauthorized access, disclosure, alteration and destruction.

5.2 We will establish a user information security management system and workflow, adopt the principle of minimum sufficient authorization for staff who may have access to the relevant information and train them on security responsibilities and confidentiality obligations.

5.3 In the unfortunate event of a user information security incident, we will take reasonable, effective and timely measures to inform you of the basic situation of the security incident, the possible impact, the measures we have taken or will take, your suggestions for independent prevention and risk reduction, remedial measures for you, etc. in strict accordance with the requirements of laws and regulations.

5.4 Despite our best efforts to use various security measures to protect your information, please understand that DataCloak will not be able to be held responsible for the leakage of user information and its direct and indirect losses due to certain reasons (such as you informing others of your service password, sharing your registered account and password with others, hacker attacks, computer virus intrusion, or other force majeure factors).

5.5 About the data protection methods and security measures adopted by your company, please contact your company to communicate and understand.

6. Management of Personal Information

6.1 How to cancel your account

After you have terminated your use of the Software, only your personal account can be cancelled by your business administrator, and you will need to apply to your business administrator to do so. After you cancel your account, we will delete your personal information.

6.2 Changing or withdrawing the scope of authorization

6.2.1 We may delete, modify or anonymize information at your reasonable request. You may contact us with your request using the contact information provided in Section 8 of this Policy. We will generally review and process your request within 15 business days.

6.2.2 You can change the scope of your consent or withdraw your authorization by turning off camera, album and other related authorizations in the device's own operating system. Withdrawing your authorization will prevent your business from collecting information related to these permissions. If you have questions about the handling of any personal information that has been collected, please contact your corporate administrator.

6.2.3 You may make a request to us to delete User Information in the following circumstances:

a. Our handling of User Information violates relevant laws and regulations.

b. We collect and use your User Information without seeking your explicit consent.

c. We use or process your User Information in serious violation of the agreement with you.

d. Other reasonable and legitimate requests.

7. Protection of personal information of minors

This software provides products and services primarily to adults (employees of corporate customers or other persons authorized by them). If you are a minor, we request that you ask your parent or guardian to read this policy carefully and to use our products or services or provide information to us with the consent of your parent or guardian. In the case of personal information collected from minors with the consent of their parents or guardians to use our products or services, we will only use, share, transfer or disclose this information as permitted by law or regulation, with the express consent of their parents or guardians, or as necessary to protect the minor.

8. Contact Information of DataCloak

If you have any questions or comments about this policy, you can contact us via our customer service email: contact@datacloak.com. In general, we will respond within 15 business days.

9. Updates of Privacy Policy

9.1 We may revise and update this Policy from time to time in accordance with the requirements of applicable law and the needs of our business development.

9.2 In the event of changes or updates to this policy, we will notify you of the revisions through as many channels and methods as possible (including, but not limited to, push notifications, pop-up, and special tips on browsing pages, sending emails/short messages or posting announcements). In order for you to receive timely notification, we recommend that you notify us when your contact information is updated. If you continue to use our products or services after the update of this policy has taken effect, you are deemed to have fully read, understood and accepted the updated policy and are willing to be bound by the updated policy.

9.3 You can check the latest version of this policy at any time by visiting our website.