Public Privacy Policy
1. Privacy Policy Statement
- This Public Privacy Policy (hereinafter referred to as "this Policy") is intended to explain how Oupula Computer Technology Co., Ltd.'s software (hereinafter referred to as "the Software") collects, uses, stores, shares and protects the User's personal information and related data.
- This Policy is complementary to the Public Service Terms. By using the Software, the User indicates consent to the contents of this Policy.
2. Information We Collect
- Device Information
- Device model, operating system version, unique device identifier, IP address, network status, etc., used for software adaptation, fault troubleshooting, and security verification.
- Usage Information
- Software startup records, function usage status, operation logs, protocol connection details, and file transfer records (excluding any specific file content); by default, all the aforementioned log records are only stored in the folder of the User's local device and will not be uploaded to any cloud server. Meanwhile, the Software does not enable the debug log output function by default, which needs to be manually enabled by the User; if the User needs to feedback relevant problems, they can independently upload the debug logs generated after manual enabling to the bug feedback page designated by the platform. The Operator only uses them for problem troubleshooting and function optimization, not for other irrelevant purposes.
- Information Provided by the User
- Server address, user name, password, key, port and other information actively entered by the User when configuring the server and logging in to the account, which is only used to establish connections and complete file operations, and will not be uploaded to the Operator's server by default.
- Files and Data
- The Software mainly runs on the User's local device and generally does not upload the User's file content to the Operator's server, unless the User actively uses functions that explicitly require uploading, such as cloud synchronization and backup.
- The Software supports connecting to third-party cloud disks. After connection, the User can access the data in their own third-party cloud disks through the Software; all the aforementioned data in the third-party cloud disks can only be accessed and operated by the User themselves through the Software. The authentication information used by the User to access the third-party cloud disks will not be uploaded to any cloud server by default. Unless the User actively uses the cloud synchronization function of the Software to synchronize software configurations, the authentication information will be transmitted after local encryption together with the configuration information, and the Operator will not obtain or store the unencrypted authentication information or the data in the third-party cloud disks.
- Encryption and Synchronization Related Information
- The cloud synchronization function of the Software only uploads the User's encrypted configuration information, and does not collect or upload the password used to encrypt the configuration information; the encryption password is only stored locally on the User's device in an encrypted form and will not be uploaded to any cloud server at any time, which cannot be obtained by the Operator.
3. Purpose of Information Use
- Provide, maintain and ensure the normal operation of the Software, including protocol connection, file transfer, error repair, version update, etc.
- Optimize software performance, interface experience and functional logic to enhance the User's experience.
- Conduct security detection and risk control to prevent security incidents such as malicious attacks, account theft and data leakage.
- Comply with laws and regulations, regulatory requirements, and legitimate instructions from judicial or administrative authorities.
- Other purposes with the User's consent.
4. Information Storage and Protection
- The information collected by the Software is mainly stored on the User's local device or the server/cloud storage configured by the User themselves, and the Operator will not obtain the User's file content without authorization.
- We adopt technical and management measures that meet industry standards to protect the User's information, including encrypted transmission, access control, security audit, etc., to prevent information leakage, tampering and loss.
- The password used to encrypt the cloud-synchronized configuration information is only stored locally on the User's device in an encrypted form, protected by a high-strength encryption algorithm. The Operator cannot obtain, store or crack the password, ensuring the security of the password.
- Please note that no security measure can be absolutely safe, and the User shall properly keep sensitive information such as devices, passwords and keys by themselves. In particular, the User must properly keep the encryption password used for synchronization; if this password is lost and the cloud backup cannot be decrypted, the relevant losses shall be borne by the User themselves.
5. Information Sharing and Disclosure
- The Operator will not sell, rent or share the User's personal information to third parties, except in the following cases:
- Obtain explicit consent from the User;
- Third-party assistance is required to complete the User's request (such as third-party cloud storage, CDN, etc.);
- In accordance with mandatory requirements of laws and regulations, judicial or administrative authorities;
- To protect the legitimate rights and interests of the Operator, the User or the public within a reasonable scope.
- The Operator will not share the password used by the User to encrypt the cloud-synchronized configuration information of the Software with any third party, nor use the password for any other purposes.
- In the event of merger, division, acquisition, asset transfer and other situations of the Operator, the relevant information may be transferred as assets, but will continue to be bound by this Policy.
6. User Rights
- The User has the right to inquire about, correct and delete their own personal information, and may submit an application through software settings or customer service channels.
- The User has the right to withdraw consent to the collection and use of certain information, but this may result in some functions being unavailable.
- The User has the right to cancel the account or stop using the Software. After cancellation, the Operator will process the relevant information in accordance with laws, regulations and this Policy. The password used by the User to encrypt the cloud-synchronized configuration information will be deleted together with the local data, and the Operator will not retain any of it.
- The User has the right to modify or reset the password used to encrypt the cloud-synchronized configuration information of the Software. After modification, only the encrypted password stored locally will be updated, which will not affect the encrypted configuration information already synchronized to the cloud.
7. Third-Party Services
- The Software may contain third-party service links, SDKs or interfaces (such as third-party cloud storage, advertising, statistics, etc.), and third parties will process the User's information in accordance with their own privacy policies.
- The Operator is not responsible for the privacy behaviors of third parties. It is recommended that the User read the privacy policy of the third party before using the third-party service.
- Third-party services cannot obtain the password used by the User to encrypt the cloud-synchronized configuration information of the Software, nor can they decrypt the encrypted configuration information synchronized to the cloud.
8. Protection of Minors
- The Software is not designed or promoted for minors under the age of 18.
- If a guardian finds that a minor has used the Software and provided personal information without permission, they may contact the Operator to delete the relevant information.
9. Policy Update
- The Operator may modify this Policy due to business changes, updates to laws and regulations, etc. The updated Policy will be published in the Software.
- If there are major changes to the Policy, the Operator will prominently prompt the User through software pop-ups, announcements and other methods.
10. Contact Us
If the User has any questions, opinions or complaints about this Policy, they may contact us through "About/Feedback" in the Software or official contact information.