Media Cleaner Privacy Policy

Effective Date: 2025.08.05

 

1. INTRODUCTION AND SCOPE

Dreamway Tech Ltd("Company," "we," "our," or "us") has developed this comprehensive Privacy Policy to outline our data handling practices for the Media Cleaner application ("Application") and associated services ("Services"). This document serves as a binding agreement between Dreamway Tech Ltd and users ("you," "your," or "User") regarding the collection, processing, and protection of personal information.

IMPORTANT NOTICE: Your continued use of the Application constitutes acceptance of these terms. If you disagree with any provision herein, discontinue use immediately.

1.1 Application Scope

This Privacy Policy exclusively governs:

l Data collection within the Media Cleaner application environment

l Electronic communications transmitted through our Services

l Information processing related to application functionality

1.2 Exclusions

The following are NOT covered by this Policy:

l Third-party applications, websites, or services

l Offline data collection activities

l External platforms accessible through our Application

1.3 Policy Updates

We reserve the right to modify this Privacy Policy. Material changes will be communicated through appropriate channels, and continued usage implies acceptance of updated terms.

 

2. DATA COLLECTION FRAMEWORK

2.1 Automated Data Collection Systems

Our Application employs automated collection mechanisms for the following data categories:

Technical Infrastructure Data:

l Operating system specifications (type, version, configuration)

l Application version and configuration parameters

l Network identifiers (IP address, ISP information)

l Device identifiers (IDFA, OpenUDID, GUID)

l Wireless network status and connectivity data

Behavioral Analytics Data:

l Application interaction patterns and frequency metrics

l Feature utilization statistics

l Performance monitoring data

l User engagement analytics

Subscription & Payment Metadata

l We collect non-sensitive metadata related to in-app purchases, including:

l Purchase item identifiers

l Subscription status and duration

l Purchase and renewal timestamps

l Order completion or failure status

 

Please note: We do not collect, process, or store any personal payment details such as credit card numbers. All payment transactions are securely handled by third-party platforms (e.g., Apple App Store), and are subject to their respective privacy policies. We recommend reviewing their privacy policies before entering any personal billing information.

 

2.2 User-Initiated Data Provision

We may request user authorization to access certain types of data in order to enable key app functionalities:

l Photo Library Access: Required for features such as duplicate and similar photo detection, large file identification, image compression, text extraction (OCR), photo merging, cropping, and format conversion.

l Contact Access: If the user opts to use contact cleaning and organization features, permission to access contact data will be requested.

Additionally, we integrate the Adjust SDK to collect limited user information for attribution tracking and marketing analytics. The collected data may include: Approximate location, CUID, App usage and performance data, Device identifiers (e.g., IMEI, MAC address, Advertising ID).

All data transmitted via the Adjust SDK is encrypted in transit. Adjust also supports data deletion requests in compliance with privacy regulations through its OpenGDPR framework.

 

To learn more, please visit the official£º Adjust Privacy Statement & Policy | Adjust

 

3. DATA UTILIZATION PROTOCOLS

3.1 Primary Processing Objectives

Data utilization is structured around the following operational requirements:

l Service Delivery: Maintaining and enhancing Application functionality

l Performance Optimization: Implementing system improvements and feature enhancements

l Quality Assurance: Monitoring, testing, and maintaining service reliability

l User Support: Providing technical assistance and addressing user inquiries

l Dispute Resolution: Managing conflicts and resolving service-related issues

l Legal Compliance: Adhering to applicable regulations and legal requirements

3.2 Processing Transparency

Any modifications to data processing purposes will be communicated through Privacy Policy updates prior to implementation.

 

4. DATA DISCLOSURE PARAMETERS

4.1 Third-Party Service Integration

Limited data sharing occurs with vetted third-party providers for:

l Analytics and performance monitoring services

l Advertising network operations

l Content delivery and search functionality

Security Measures:

l Data anonymization protocols

l Contractual confidentiality requirements

l Compliance with data protection standards

4.2 Legal Disclosure Requirements

Information disclosure may occur when legally mandated for:

l Law enforcement cooperation

l Fraud prevention and security measures

l Legal process compliance

l Public safety protection

4.3 Business Continuity Scenarios

Data transfer may be necessary during:

l Corporate restructuring or merger activities

l Asset acquisition or divestiture

l Insolvency or administrative proceedings

 

5. INTERNATIONAL DATA TRANSFER PROTOCOLS

5.1 Global Operations Framework

Our international service delivery model necessitates cross-border data transfers to optimize user experience and service reliability.

5.2 EEA User Consent

European Economic Area users provide explicit consent for international data transfers upon service utilization. Consent withdrawal options are available upon request.

 

6. DATA RETENTION AND LIFECYCLE MANAGEMENT

Data retention periods are determined by:

l Service provision requirements

l Legal and regulatory obligations

l User account status and activity

Long-term retention may be necessary for:

l Tax and accounting compliance

l Audit requirements

l Security and fraud prevention

l Data backup and recovery systems

 

7. MINOR USER PROTECTION PROTOCOLS

7.1 Age Verification Standards

Application usage requires users to meet minimum age requirements (14 years or local statutory minimum age).

7.2 Child Data Protection

We implement strict protocols to prevent minor data collection. Identified violations trigger immediate data deletion procedures.

 

8. INFORMATION SECURITY INFRASTRUCTURE

8.1 Security Architecture

Our security framework implements:

l Industry-standard encryption protocols

l Access control and authentication systems

l Data transmission security measures

l Storage security safeguards

8.2 Risk Mitigation

We employ comprehensive risk assessment and mitigation strategies, though absolute security cannot be guaranteed due to inherent technological limitations.

 

9. USER PRIVACY RIGHTS AND CONTROLS

Users maintain rights to:

l Access collected personal information

l Request data modification or correction

l Initiate data deletion procedures

l Withdraw consent for data processing

Exercise Your Rights: Contact lyx@dreamwaytech.ltd to initiate privacy rights requests.

 

10. CONTACT AND SUPPORT INFORMATION

For privacy-related inquiries, technical support, or rights exercise requests:

Email: lyx@dreamwaytech.ltd

Our support team will respond to inquiries within reasonable timeframes in accordance with applicable legal requirements.