Clean Up Privacy Policy

Update Time: November 17, 2025

Effective Time: November 17, 2025

Preface

[Clean Up] (hereinafter referred to as "Cleaner" or "this Product") is provided by [Tianjin Chenzhi Technology Co., Ltd.] (hereinafter referred to as "we", "Chenzhi", or "the Company"). We are well aware of the importance of personal information to users (hereinafter referred to as "you"), and we understand that providing effective protection for your personal information is the cornerstone of the healthy and sustainable development of our business. Thank you for using and trusting Chenzhi products or services! We know that this trust is not easily earned. We adhere to the principle of openness and transparency to clarify our rules for processing your personal information. We process your personal information in a legal and legitimate manner and for clear and reasonable purposes. We will take corresponding security protection measures to protect your personal information in accordance with legal requirements and industry security standards to strengthen this trust.

Through this privacy policy, we aim to explain how we collect, use, store, share, transfer, and publicly disclose your personal information, as well as how we provide you with access, updates, deletion, and protection of this information.

[Special Tips] Before using our products or services, please be sure to read and understand this privacy policy carefully, especially the terms marked in bold and underlined. You should focus on reading and only use our products or services after confirming that you fully understand and agree. Once you start using our products or services, it means you have fully understood and agreed to this policy, and we will collect, use, store, and share your relevant information in accordance with this privacy policy. If you have any questions, comments, or suggestions regarding the content of this policy, you can contact us through the various contact methods provided in this privacy policy.

This privacy policy will help you understand the following:

1.How do we collect and use your personal information?

2.How do we use cookies and similar technologies?

3.How do we store your personal information?

4.How do we share, transfer, and publicly disclose your personal information?

5.How do we protect your personal information?

6.Your rights to manage personal information

7.Protection of minors' personal information

8.Scope of application of the privacy policy

9.Changes and revisions to the privacy policy

10.How to contact us

I. How Do We Collect and Use Your Personal Information?

We will follow the principles of legality, legitimacy, and necessity to collect and use your personal information for the purposes described in this policy. If your personal information is used for purposes other than those stated in this policy, we will inform you in a reasonable manner and obtain your consent.

When you use this Product, we need to collect and use your personal information in the following two circumstances:

1.To support and realize the basic business functions of this Product (part or all of the business functions), you need to authorize us to collect and use your necessary personal information.

2.To enrich our products and enhance your experience, in addition to providing basic business functions, we will also offer extended business functions. Such functions require the collection and use of corresponding personal information. If you refuse to provide it, you will not be able to use the extended functions or enjoy the intended experience, but this will not affect your use of the basic business functions of this Product.

If you refuse us to collect any necessary personal information, we will not be able to provide you with any functions or services of this Product, including basic business functions.

(I) Basic Business Scenarios Requiring Authorization for Collecting and Using Personal Information

1.Mobile Album Cleaning Service

This function includes similar photo recognition, photo cleaning, photo compression, and video compression. To implement this function, you need to grant album permissions. After authorization, we will identify similar photos and dark photos on your mobile phone through local analysis, enabling you to delete duplicate or blurry photos, clean up albums, compress videos, and quickly free up storage space. We will not upload photos or video information from your mobile phone album to the Chenzhi server. You can navigate to "Me → Permission Management" in this Product or directly enter your mobile phone's local "Settings → Clean Up" to disable and withdraw the "Photo" authorization. After withdrawing the authorization, we will no longer be able to provide this service or obtain any relevant information from you, but it will not affect your use of other functional services.

2.Private Space Services

This function provides privacy protection for recordings, notes, password books, and album encryption. It requires you to grant album permissions and microphone permissions. After obtaining these permissions, when setting up an encrypted object, you need to add the photos, recordings, notes, password books, and passwords you want to encrypt and protect to the "Privacy Space." The confidential content and passwords you set are stored only locally and will not be uploaded to the server or shared with third parties. You can manage your privacy password through "Privacy Space → Settings."

At the same time, you can turn on or off fingerprint or Face ID unlocking to protect your privacy space. After enabling fingerprint or Face ID unlocking, Clean Up calls the iOS system's built-in fingerprint or Face ID unlocking system. The iOS system will read your fingerprint or facial data, complete the verification, and return the verification result to Clean Up. We will not read, re-acquire, or store your fingerprint or Face ID data.

1.Address Book Optimization Services

This function can merge and analyze incomplete contacts in the address book to ensure its integrity. To implement this function, you need to grant address book reading permission. After authorization, address book optimization can be realized through this function.

2.Network Speed Measurement Services

This function can help you detect your mobile phone's network speed (latency, upload speed, download speed). To implement this function, we will directly detect your device's network environment through the mobile phone system's public interface. During the implementation of this function, we will not obtain any of your personal information.

(II) Optional Authorization Scenarios for Extended Business Functions

1.Calendar Cleaning Services

This function can determine whether items in your calendar are harassing advertisements or spam based on local rules and provides you with cleaning suggestions and ways to avoid calendar harassment and fraud. When you turn on this function, you need to authorize two local permissions: "Access Calendar" and "Access Reminders" to use calendar reminder settings and expired calendar cleaning functions. You can enable or disable these two authorizations through "Me → Permission Management" in this Product or directly enter your mobile phone's local "Settings → Clean Up." After withdrawing the authorization, this function will be disabled. We will no longer obtain any relevant information from you or provide this service, but it will not affect your use of other functional services.

(III) Device Permission Calls Involved

During service provision, [Clean Up] will call some of your device permissions. This section summarizes all system permissions involved in the above (I) and (II) for full transparency:

Permission Name

Functional Scenario

Purpose of Use

Can It Be Closed?

Address Book Permissions

Address Book Optimization

Optimize mobile contacts; merge and analyze incomplete contacts

Yes

Calendar Permissions

Calendar Cleaning

Clean up expired calendar items

Yes

Album Permissions

Mobile Album Cleaning and Video Compression

Clean up and detect photos or videos on the mobile phone

Yes

Camera Permissions

Taking Photos

Take photos and save them to the Privacy Space

Yes

To ensure the normal implementation of our functions and services, we will call corresponding necessary permissions or non-essential permissions (which help improve service experience but do not affect core function usage if not granted) based on specific usage scenarios. We will ask for your consent via a pop-up window before calling. Sensitive permissions are disabled by default and will only be authorized to us after your explicit consent. Please note that obtaining a specific sensitive permission does not mean we will necessarily collect your relevant information; even if we have obtained sensitive permissions, we will only collect information when necessary and in accordance with this policy.

You can choose to turn off some or all permissions in your device's settings to refuse [Clean Up] from collecting corresponding personal information. The display and disabling methods of permissions may vary across devices; please refer to the instructions or guidelines of the device and system developers for details. Please note that enabling any permission means you authorize us to collect and use relevant personal information to provide corresponding services. Disabling any permission means you revoke the authorization; we will no longer collect or use relevant personal information based on that permission and will stop providing the corresponding service. However, disabling permissions will not affect the collection and use of information completed based on your prior authorization.

(IV) Non-Personal Information

Due to business cooperation needs, in some cases, you may use services provided by Chenzhi's affiliates and partners through our products or services. With your active authorization and consent, we will access aggregated statistical data based on your personal information from our affiliates and partners. Such statistical data is non-personal information that cannot directly or indirectly identify or locate individuals, including the number of product downloads, installations, and uninstallations, data reflecting product usage, the number of requests, and network performance data related to error feedback. The purpose of collecting such information is to improve existing products or services or develop new ones.

(V) Others

1.We will use information collected during product or service provision (such as device identification number (OAID), advertising identifier, device model, system version number, operating system version number, system ID number, screen resolution, Internet access type, Product version number, button click times and frequencies, option values of key configurations, and software crash logs) to count the number of Product users, analyze product usage, troubleshoot crash causes, reduce crash rates, improve our products, and provide customer support. This information does not involve sensitive information such as your personal identity.

On the premise of complying with laws and regulations, we will anonymize, aggregate, desensitize, and encrypt your personal information to form statistical information or user profiles (which cannot identify any individual user) and display and push relevant services, products, or functions to you. If we use your personal information for purposes not specified in this policy or for purposes beyond the scope for which the information was collected, we will obtain your prior consent.

(VI) Exceptions for Collecting and Using Personal Information Without Authorization

1.It is necessary to conclude and perform a contract to which you are a party, or to implement human resources management in accordance with legally formulated labor rules and regulations and collectively negotiated contracts.

2.It is necessary to perform statutory duties or obligations.

3.It is necessary to respond to public health emergencies or protect the life, health, and property safety of natural persons in emergency situations.

4.It is necessary to conduct news reporting, public opinion supervision, or other public interest activities and process personal information within a reasonable scope.

5.It is necessary to process personal information you have publicly disclosed or other legally disclosed information within a reasonable scope in accordance with the provisions of the Personal Information Protection Law.

6.Other circumstances stipulated by laws and administrative regulations.

II. How Do We Use Cookies?

Cookies are small text files sent to your browser by the websites you visit. They usually contain identifiers, site names, and certain numbers and characters. The cookies sent to you by each website are unique and can only be read by the web server that sent them. They are often used to simplify repeated login steps, help us remember your device and service preferences, and analyze your use of our website to provide you with a smoother experience and recommend websites or other services you may be interested in.

We will not use cookies for any purpose other than those described in this privacy policy. You can manage or clear all cookies saved on this website according to your preferences. If you clear these cookies, the corresponding information you previously recorded will also be deleted, which may affect the security and convenience of the services provided to you.

III. How Do We Store Your Personal Information?

(I) Storage Region

The personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.

(II) Storage Period

We will only store your personal information for the shortest time necessary to achieve the purposes described in this policy and within the time limit required by laws and regulations. After this period, we will delete or anonymize your personal information.

If we stop operating Clean Up's products or services, we will promptly stop collecting your personal information, notify you of the suspension of operations individually through delivery or announcement, and delete or anonymize the personal information we store within a reasonable period.

IV. How Do We Share, Transfer, and Publicly Disclose Your Personal Information?

(I) Sharing

We will not share your personal information with any companies, organizations, or individuals except in the following cases:

1.With your explicit consent, we will share your personal information with other parties.

2.To the extent permitted by laws and regulations, it is necessary to share your personal information to protect your interests, other users' interests, or the public interest, property, or safety from harm.

3.Without your explicit authorization and consent, we will not share your personal information with third-party advertisers, application developers, open platforms, or other partners. We will provide these partners with aggregated information, anonymized information, or other information that cannot identify you personally. For example, we may inform application developers of the number of people who have installed their applications.

4.To ensure the stable operation of our products or services, we will integrate third-party software development kits (SDKs) and share your personal information with them. Such sharing is solely for the purposes stated in this privacy policy. The providers of the third-party SDKs we integrate include our suppliers, service providers, consultants, or agents who provide technical infrastructure services, analyze service usage, measure advertising and service effectiveness, provide customer service and payment services, conduct academic research and surveys, or provide legal, financial, and technical consulting services. We will occasionally invite registered users to participate in lucky draws. If you win a prize, we need to provide your personal information to the logistics service provider to deliver the prize to you.

(II) Transfer

We will not transfer your personal information to any other companies, organizations, or individuals except in the following cases:

1.With the development of the Company's business, we and our affiliates may conduct mergers, acquisitions, asset transfers, or other similar transactions. If such transactions involve the transfer of your personal information, we will require the new companies, organizations, or individuals holding your personal information to continue to be bound by this policy; otherwise, we will require them to re-request your authorization and consent.

2.To comply with the requirements of laws and regulations, legal procedures, mandatory government requirements, or judicial rulings.

3.With your explicit consent, we will transfer the personal information we have obtained to other parties.

4.To respond to your transfer request: If you request to transfer your personal information to a designated personal information processor and meet the conditions stipulated by the national cyberspace administration, we will provide the transfer method in accordance with the law.

(III) Public Disclosure

We will only publicly disclose your personal information under the following circumstances:

1.We have obtained your explicit consent.

2.We may publicly disclose your personal information in accordance with laws, legal procedures, litigation, or mandatory requirements of government authorities.

3.Within the scope permitted by laws and regulations, it is necessary to publicly disclose your personal information to protect the interests, property, or safety of Chenzhi Company, Chenzhi's affiliates or partners, you, other users, or the public from harm.

4.Other circumstances stipulated by laws and regulations.

(IV) Exceptions to Prior Consent for Sharing, Transferring, and Publicly Disclosing Personal Information

1.Related to the personal information controller's performance of obligations stipulated by laws and regulations.

2.Directly related to national security and national defense security.

3.Directly related to public safety, public health, and major public interests.

4.Directly related to criminal investigation, prosecution, trial, and execution of judgments.

5.To protect the life, property, and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the person's authorization and consent.

6.Personal information publicly disclosed by the personal information subject.

7.Personal information collected from legally disclosed sources, such as legal news reports and government information disclosure.

In accordance with the law, the sharing, transfer, and public disclosure of de-identified personal information (provided that the data recipient cannot restore or re-identify the personal information subject) do not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data do not require separate notification to you or obtaining your consent.

V. How Do We Protect Your Personal Information?

We have taken security measures in accordance with industry standards to protect the personal information you provide and prevent unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your personal information:

1.We attach great importance to the security of your personal information and will strive to implement reasonable security measures to protect it.

2.We will encrypt the transmission and storage of identifiable personal information to ensure data confidentiality. For your mobile phone's unique device identifier, we will use the MD5 algorithm to anonymize and encrypt it on your device and only collect and upload the anonymized and encrypted identifier.

3.If our application adopts WebView technology, we will verify all file protocol URLs used in WebView and restrict access to the application's sensitive data and SDCard data to prevent private files and sensitive information of this Product from being maliciously stolen without special permissions, which could lead to the leakage of your personal information.

4.We deploy an access control mechanism on the server side, adopt the principle of "minimum necessity" for personnel who can access your personal information, and regularly review visitor lists and access records.

5.The server system storing users' personal information uses a security-reinforced operating system. We will audit and monitor server operation accounts. If a server operating system with security vulnerabilities is identified in external announcements, Clean Up will promptly upgrade server security to ensure the security of all server systems and applications.

6.We regularly conduct training on personal information protection laws and regulations for our staff to strengthen their awareness of protecting users' personal information.

7.We implement classified and graded management measures for the personal information we collect to ensure its security.

If, unfortunately, our physical, technical, or management protection measures are compromised, we will promptly activate an emergency plan to prevent the expansion of security incidents, report to the competent national authorities in accordance with legal requirements, and promptly inform you of the basic situation of the security incident, potential impacts, and measures that have been or will be taken through reasonable and effective means such as push notifications and announcements.

VI. Your Rights to Manage Personal Information

(I) Query and Correct Your Personal Information

You can check and correct your personal information through the contact methods in Section 10.

(II) Delete Your Personal Information

You have the right to request Chenzhi Company to delete your personal information in the following situations:

1.We collected your personal information without your explicit consent.

2.We processed your personal information in violation of legal requirements.

3.We used or processed your personal information in violation of our agreement with you.

4.We will stop providing you with services.

You can contact us to request the deletion of your personal information through the methods provided in Section 10 of this privacy policy. After we delete your personal information from the server, we will not immediately delete the corresponding data from the backup system, but we will delete this information when the backup is updated.

(III) Obtain a Copy of Your Personal Information

You have the right to obtain a copy of your personal information. You can contact us through the contact methods in Section 10 to request a copy.

(IV) Withdraw Your Consent or Authorization

1.You can centrally manage the activation or deactivation of permissions through "Me → Permission Management" in this Product.

Please understand that each business function requires certain basic personal information to be completed (see Section 1 of this privacy policy). When you withdraw your consent or authorization, we will no longer be able to provide the services corresponding to the withdrawn consent or authorization and will cease processing the relevant personal information. However, your decision to withdraw consent will not affect the prior processing of personal information based on your authorization.

(V) Respond to Your Requests

To ensure security, you may need to provide a written request or otherwise verify your identity. We will ask you to verify your identity before processing your request. However, please understand that due to legal requirements, information security protection, and technical limitations, you may not be able to access, correct, or delete certain information.

VII. Protection of Minors' Personal Information

If you are a minor under the age of 18, you should obtain the consent of your parents or legal guardians in advance before using Chenzhi's products or services.

If you are a minor (child) under the age of 14, you must read this privacy policy or the corresponding product/service privacy policy accompanied by your guardian to decide whether to use Chenzhi's products or services. If you need to submit personal information to obtain products or services, please obtain your guardian's consent and complete the process under their guidance.

If you are a child's guardian, you should carefully read this policy or the specific product's privacy protection policy before assisting the child in completing product/service registration and use to decide whether to agree to it. If you have any questions about the personal information of the child under your guardianship, you can contact us through the contact methods in Section 10 of this privacy policy.

VIII. Scope of Application of the Privacy Policy

This privacy policy applies only to [Clean Up]. Other products or services of Chenzhi Company will be governed by their respective privacy policies. Please note that this privacy policy does not apply to the following situations:

1.Information collected by third-party products (or services) that embed Chenzhi Company's products (or services).

2.Information collected by third-party services, advertisements, or other companies, organizations, or individuals accessed through Chenzhi's products (or services).

We hereby remind you that when using third-party products and/or services, please carefully read the relevant user agreements and privacy policies provided by the third party and provide your personal information cautiously.

IX. Changes and Revisions to the Privacy Policy

Our privacy policy may change with business development. Without your explicit consent, we will not restrict your rights under this privacy policy.

We will provide prominent notices for major changes to this privacy policy. When the software is revised or upgraded, or when you log in again, you will be notified in a timely manner via a pop-up window.

Major changes referred to in this policy include but are not limited to:

1.Significant changes to our service model, such as changes to the purpose of processing personal information, the type of personal information processed, or the method of using personal information.

2.Significant changes to our control, such as changes in ownership due to mergers, acquisitions, or restructuring.

3.Changes to the main recipients of personal information sharing, transfer, or public disclosure.

4.Significant changes to your right to participate in the processing of personal information and the way to exercise such rights.

5.Changes to the responsible department, contact information, and complaint channels for personal information security.

6.A personal information security impact assessment report indicating a high risk.

X. How to Contact Us

If you have any questions, comments, suggestions, or complaints about our privacy policy and the processing of your personal information, please contact us via the following method:

Contact Email: chenzhi_360@163.com

Under normal circumstances, we will respond to your request within 15 working days.

Appendix I: Interpretation of Terms

1.Personal Information: Refers to various information recorded electronically or by other means that can identify the identity of a specific natural person alone or in combination with other information, or reflect the activities of a specific natural person. Personal information includes: basic information (name, date of birth, gender, address, personal phone number, email address); personal identification information (ID card, military ID, passport, driver's license, etc.); personal biometric information (voiceprint, fingerprint, facial features, etc.); network identification information (system account number, IP address, etc.); personal property information (bank account, transaction and consumption records, game redemption codes, and other virtual property information); personal communication information (address book content, etc.); personal Internet access records (website browsing records, software usage records, click records, etc.); commonly used personal device information (hardware model, device MAC address, software list, unique device identification number (a string of characters programmed into the device by the manufacturer to uniquely identify the device)); personal location information (whereabouts, precise location information, accommodation information, longitude and latitude, etc.).

2.Personal Sensitive Information: Refers to personal information that may endanger personal and property safety if disclosed, illegally provided, or misused, and is likely to lead to damage to personal reputation, physical and mental health, or discriminatory treatment. Personal sensitive information includes: personal property information (bank accounts, transaction and consumption records, game redemption codes, and other virtual property information); personal biometric information (voiceprint, fingerprint, facial features, etc.); personal identification information (ID card, military ID, passport, driver's license, etc.); other information (address book, whereabouts, web browsing records, accommodation information, precise positioning information).

3.De-identification: Refers to the process of technically processing personal information such that the personal information subject cannot be identified without the assistance of additional information.

4.Anonymization: Refers to the process of technically processing personal information such that the personal information subject cannot be identified and the processed information cannot be restored.

5.Personal Information Deletion: Refers to the act of removing personal information from the systems involved in realizing daily business functions to render it unrecoverable or inaccessible.

6.Children: Refers to minors under the age of 14.