One Cleaner Privacy Policy

Last Updated: September 1st, 2025

Effective Date: September 1st, 2025

Privacy Policy Effectiveness and Scope of Application

  1. Definition of Effectiveness: This Privacy Policy (hereinafter referred to as "this Policy") constitutes a legal agreement between you and One Cleaner (hereinafter referred to as "we" or "this software") regarding the collection, use, storage, protection, and exercise of rights concerning your personal information. By downloading, installing, launching, or using any feature of this software, you are deemed to have fully read, thoroughly understood, and voluntarily accepted all terms of this Policy. If you do not agree with this Policy, you should immediately cease using this software.
  2. Scope of Application: This Policy applies solely to information collected by the Software through its functionalities, emails, texts, and other electronic communications. It does not apply to the following scenarios:
  3. Information collected offline;
  4. Information collected by third-party software or websites (including third-party links accessed within this software and third-party entities providing advertising services);
  5. Other information collection activities not explicitly marked as subject to this Policy.

Third parties will provide services based on their own privacy policies. We have included official links to third-party privacy policies in this Policy. We recommend reviewing their policies before providing information to them.

  1. Governing Law: The establishment, performance, interpretation, and dispute resolution of this Policy shall be governed by the laws of the Mainland Region of the People's Republic of China (excluding the application of any conflict of laws rules). If any provision of this Policy is deemed invalid, it shall not affect the legal validity of other provisions. Disputes arising from this Policy shall first be resolved through friendly consultation between the parties. If consultation fails, either party may file a lawsuit with the People's Court at the defendant's location. (Applicable law: Mainland Region of the People's Republic of China, excluding conflict of laws rules).

Scope and Methods of Personal Information Collection

We strictly adhere to the principles of "lawfulness, legitimacy, and necessity" in collecting information, gathering only what is essential to achieve the functions of this software. Specifically:

Information You Actively Provide

  1. Subscription Order Information: When purchasing subscription services, you must complete payment via supported methods like Apple Pay. We obtain necessary order details (including purchased items, subscription validity period, order status, and payment time) through iOS system APIs. We do not collect sensitive payment information such as bank card numbers, payment passwords, or verification codes.
  2. Feedback and Inquiry Information: When you contact us via the email address listed in this policy to report software issues or seek service assistance, you may voluntarily provide device model, iOS version, problem description, and relevant screenshots. This information is solely used to address your feedback and is not utilized for any other purposes.

Information Automatically Collected by the Software

  1. Basic Device Information: After you grant device permissions, we will automatically collect non-modifiable unique device identifiers (such as IDFA and IDFV), device model, iOS version, and device storage capacity. Collection purposes include:
  2. Adapting cleaning algorithms to different devices to ensure compatibility and functionality across various iOS models and system versions;
  3. Troubleshoot software issues and enhance service stability.

This information is not linked to your identity and is used solely for technical adaptation and security purposes.

  1. Temporary Information Related to Cleaning: When you use the cleaning feature, this software will temporarily collect the following information locally on your device without uploading it to servers:
  2. Temporary scan information: Types of files eligible for cleanup (e.g., app cache, redundant installation packages, temporary files, unused large files), file sizes, and storage paths;
  3. Cleanup operation records: cleanup time, total files cleaned, and amount of storage space freed.

The above information is solely used to generate real-time cleanup recommendations and synchronize cleanup status. Temporary scan data will be immediately deleted from your device after cleanup operations are completed.

  1. Media File Identification Information: If you grant photo and video read/write permissions, this software only identifies redundant media files on your device that can be cleaned (e.g., duplicate photos, expired screenshots, unused downloaded videos). It does not collect the original content of private photos/videos (e.g., photo frames, video clips). The identification process is entirely performed locally on your device, and the results are solely used to generate media file cleanup suggestions.
  2. Contacts Optimization Support Information: If you use the contacts optimization feature, you must first enable contacts read permissions. We only obtain basic identifiers from your contacts list. If you do not use this feature, you may deny authorization without affecting the core cleaning functions of this software.

Indirectly Collected Information

We only obtain your publicly available information from third-party partners you authorize, specifically:

We do not obtain private file information related to cleanup functions (such as file scan results, private document content, or original photo/video data) from third parties.

Exceptions Requiring No Authorization

Pursuant to relevant laws and regulations, your authorization is not required for information collection in the following circumstances:

  1. Matters related to national security or defense security;
  2. Matters concerning public safety, public health, or significant public interests;
  3. Cases related to criminal investigation, prosecution, trial, and enforcement of judgments;
  4. Where it is necessary to protect your or another individual's vital legal rights and interests, such as life or property, but obtaining your consent is impractical;
  5. Information you voluntarily disclose to the public;
  6. Information collected from legally disclosed sources (e.g., legitimate news reports, government information disclosure channels);
  7. Necessary for entering into a contract at your request;
  8. Necessary for maintaining the secure and stable operation of this software service (e.g., identifying and addressing software malfunctions);
  9. When necessary for legitimate news reporting;
  10. Necessary for statistical or academic research conducted by academic institutions in the public interest, provided that the information has been de-identified when the research results are made available externally;
  11. Other circumstances as prescribed by laws and regulations.

Personal Information Usage Rules

The personal information we collect is solely used to achieve the functionalities and service purposes of this software and shall not be used for any other purposes not specified in this policy. Specific usage scenarios are as follows:

Core Functionality Implementation

  1. Device basic information is used to adapt cleaning algorithms, ensuring the software accurately identifies files eligible for cleanup across different iOS versions and device models, thereby guaranteeing the proper functioning of cleaning features;
  2. Temporary information related to cleanup is used to generate cleanup recommendations and is not used for commercial marketing or user profiling;

Subscription Service Management

1. Subscription order information is used to verify your subscription status, ensuring you can use advanced cleanup features normally;

2. Subscription order information is used to process auto-renewals (e.g., verifying payment status 24 hours before subscription expiration) and respond to inquiries about subscription validity and order history;

3. If you request a refund, we will provide Apple with necessary supporting materials (e.g., payment status, in-app usage duration) based on subscription order information to assist with the refund process.

Service Optimization and Security Assurance

  1. Anonymized device metadata (e.g., removing personally identifiable information linked to unique device identifiers) is used to analyze software malfunctions and optimize feature compatibility across devices (e.g., fixing scanning lag on specific device models);
  2. Cleaning operation records undergo anonymization (removing all personal identifiers) to optimize cleaning algorithms (e.g., identifying more types of redundant files) and enhance cleaning efficiency;

Information Push

You understand and agree that we may send you the following information via email, SMS, or in-app notifications:

  1. Product and Service Information: Such as software version update notifications, cleanup feature optimization alerts, and subscription service expiration reminders;
  2. Commercial Information: Such as subscription promotions for this software and introductions to new services (excluding third-party commercial advertisements).

If you no longer wish to receive these notifications, you may disable them via the following methods:

  1. In-app: Go to "Settings > Notification Management" to disable push permissions;
  2. Device system: Go to "Device Settings > Privacy & Security > One Cleaner" to disable notification permissions;
  3. Email/SMS: Follow the unsubscribe instructions provided within the message.

Usage Restrictions

  1. Cleaning-related information is solely used for the cleaning function itself and is not utilized for user profiling, targeted advertising, or other purposes unrelated to core functionality;
  2. Your personal information will not be used for any purposes not specified in this policy without your explicit consent. Should we need to expand the scope of information usage, we will seek your consent separately via software pop-ups, emails, or other means.

Sharing, Transfer, and Disclosure of Personal Information

We strictly limit the sharing, transfer, and disclosure of personal information, which occurs only under the following circumstances compliant with legal requirements or with your explicit consent:

Information Sharing

Except for the following circumstances, we will not share your personal information with any company, organization, or individual:

  1. Your explicit consent: For example, if you agree to share your subscription information with a third-party customer service team to assist with subscription inquiries;
  2. Required by laws, regulations, or competent authorities: For example, when administrative or judicial authorities lawfully request information related to case investigations (requiring legal documentation);
  3. Necessary to protect legitimate rights and interests: In urgent situations where we must protect you, other users, or public interests, and obtaining your consent is impractical;
  4. Sharing with Affiliated Companies: Necessary personal information may be shared with our affiliated companies solely for the purpose of providing this software service. Such affiliated companies must comply with the information protection requirements outlined in this policy. Should an affiliated company need to change the purpose of information use, it will separately obtain your authorization and consent. Affiliated companies will not share temporary scan information related to cleanup processes or private file identifiers.
  5. Sharing with Authorized Partners: Necessary information may be shared with authorized partners providing technical support, advertising analytics, or security protection solely to achieve the purposes stated in this Policy. Confidentiality agreements will be executed with such partners, requiring them to use the information only for the agreed purposes and prohibiting further sharing or use for other purposes. The currently integrated third-party SDKs are listed in the Appendix to this Agreement.

Information Transfer

We do not transfer your personal information unless one of the following circumstances occurs:

1. Obtaining your explicit consent;

2. Corporate asset changes such as mergers, acquisitions, or bankruptcy liquidation, where personal information must be transferred to the transferee. We will require the transferee to continue complying with this policy's information protection requirements. If the transferee needs to change the purpose of information processing, we will require them to obtain your authorization and consent again. When transferring information related to cleanup, we will additionally require the transferee to commit to using it solely for cleanup functions and not for other purposes.

Information Disclosure

We do not publicly disclose your personal information unless:

1. We obtain your explicit consent;

2. We are required to do so by law or by a court order, and the disclosure is strictly limited to the minimum necessary scope.

Personal Information Storage and Security Protection

We implement both technical and managerial measures to safeguard your personal information, specifically as follows:

Storage Rules

  1. Storage Location: Personal information collected within China is stored within the territory of the People's Republic of China and is not transferred across borders;
  2. Storage Period:

◦ Temporary Data Purge: Locally scanned information is deleted immediately upon completion of the cleanup operation;

◦ Subscription order information: Stored for 30 days after the subscription service ends, then permanently deleted;

◦ Feedback and inquiry information: Retained for 3 months after your feedback request is processed (for verification purposes), then deleted;

  1. Storage Method:
  2. Local Data: Stored using device-side encryption (e.g., iOS system key protection) to prevent unauthorized access;
  3. Server data: Utilizes SSL-encrypted transmission and tiered access controls (only authorized personnel access necessary information) to ensure data storage security.

Security Protection Measures

  1. Technical Safeguards: Employ data encryption, vulnerability scanning, malicious code protection, and anomaly detection to prevent unauthorized access, tampering, or disclosure of personal information;
  2. Management Standards: Establish information security management systems, clearly define staff access permissions, and conduct regular privacy protection and information security training;
  3. Emergency Response: In the event of a personal information security incident (e.g., data breach or tampering), emergency protocols are immediately activated. Remedial actions (e.g., blocking leakage channels, deleting compromised data) are implemented, and you will be promptly notified of the following details as required by law:
  4. Basic details of the security incident and its potential impact;
  5. Measures already taken or to be taken;
  6. Recommendations for risks you can proactively mitigate;
  7. Remedial actions (e.g., assisting with device security checks).

If it is impractical to notify you individually, we will publish incident-related information through in-app announcements, official website notices, or other appropriate channels.

Your Security Precautions

1. Download this software exclusively through official channels such as our website or authorized app stores. Avoid using third-party cracked versions to prevent your device from being infected with malicious programs that could lead to information leaks.

2. When using the cleanup feature, we recommend operating within a secure network environment (such as your personal home WiFi) to avoid transmitting sensitive information over public WiFi networks;

3. If you suspect information leakage, immediately report it via the "Contact Us" section of this policy. We will assist you in identifying risks.

Special Protection for Minors' Personal Information

This software does not directly target minors as its service recipients. We implement additional safeguards for minors' personal information, consistent with the minor usage guidelines outlined in the User Agreement:

Parental Consent Requirement:

  1. If you are under 18 years of age, you must read this policy with your legal guardian before using this software or providing personal information, and obtain your guardian's explicit consent for the following: using software features, providing necessary personal information, and making subscription payments.
  2. Minors under 14 years of age must use this software with guardian assistance.

Usage Guidance and Risk Notices:

  1. When using the cleanup feature, minors should confirm files to be deleted under guardian supervision to avoid accidentally deleting important data. We assume no responsibility for such incidents.

Guardian Rights:

If a minor accidentally deletes important files, guardians may contact us for assistance in investigation. However, due to the nature of local data deletion during cleanup, file recovery cannot be guaranteed. We recommend guiding minors to back up important data in advance;

Guardians may request deletion of a minor's personal information. We will complete the deletion within 15 business days after verifying the guardian's identity.

Your Rights Regarding Personal Information and How to Exercise Them

You have the right to access, correct, delete, or withdraw consent for your personal information. These rights may be exercised through the following methods:

Access and Correction

Subscription Order Information: Access "Settings > Subscription Management" to view order records, or use official Apple channels (e.g., App Store Order Center) to query or correct details (as subscription data is synchronized via iOS systems, we cannot modify it directly).

Deletion and Feedback

  1. Feedback and Inquiry Information: To delete previously submitted feedback, send an email request. We will delete it within 15 business days after identity verification.
  2. Circumstances where you may request deletion:

We collected or used your information without your consent;

The information processing violates laws, regulations, or this policy;

You no longer use this software, or we terminate service provision.

Withdrawing Authorization

  1. Device Permission Revocation: Navigate to "Device Settings > Privacy & Security > One Cleaner" to disable permissions such as photo read/write access, contacts, and notifications. After revocation, we will cease collecting information associated with that permission, though it does not affect the lawful use of previously collected data.
  2. Information Sharing Authorization Withdrawal: If you previously consented to sharing information with third parties, you may send an email request to terminate sharing. We will immediately notify the third party to cease using your information and provide feedback on the processing outcome within 15 business days.

Obtaining a Copy of Your Information

You may email [onecleaner628@gmail.com] to request a copy of your personal information (including subscription records and cleanup logs). After verifying your identity, we will provide the copy as an email attachment within 15 business days.

Request Response Guidelines

  1. Identity Verification: To safeguard your information security, we may request identity verification documents before processing your request.
  2. Fees and Rejection: We generally do not charge fees for reasonable requests. However, we may charge necessary costs for repeated requests beyond reasonable scope (e.g., frequent requests for the same information copy). We reserve the right to reject requests that are groundless, technically unfeasible (e.g., restoring deleted local scan data), or may harm others' legitimate rights and interests.
  3. Circumstances Where Requests Will Not Be Responded To: In accordance with laws and regulations, we cannot respond to your requests under the following circumstances:

◦ Matters related to national security, defense security, public safety, public health, or significant public interests;

◦ Matters related to criminal investigations, prosecutions, trials, or enforcement of judgments;

◦ Where there is sufficient evidence indicating your subjective malice or abuse of rights;

◦ Where it is necessary to protect your or another individual's vital legal rights and interests, such as life or property, but obtaining your consent is impractical;

◦Where responding to the request would cause serious harm to the lawful rights and interests of you, other individuals, or organizations;

◦Where the request involves trade secrets.

Updates and Notifications to the Privacy Policy

We may update this policy in response to changes in laws and regulations or adjustments to business functions (such as optimizing cleanup features or modifying subscription rules). The update process is as follows:

  1. Update Process:
  2. Non-material changes: Such as wording refinements or detail additions will be directly updated on the "Settings > Privacy Policy" page within this software. Continued use of the software after such updates constitutes acceptance of the changes.
  3. Material Changes: For changes involving the following, we will proactively notify you via software pop-ups, email, etc., and the changes will take effect only after your confirmation and consent:
  4. Changes to the scope of information collection or purpose of use related to cleanup features;
  5. Changes to personal information sharing or transfer rules;
  6. Changes to the methods for exercising your personal information rights;
  7. Significant adjustments to personal information security protection measures.
  8. Definition of Significant Changes: "Significant changes" as described in this policy include but are not limited to:
  9. Substantive changes to the purpose, type, or manner of processing your personal information;
  10. Changes to your rights regarding personal information processing and the methods for exercising those rights;
  11. A personal information security impact assessment report indicating significant risks.
  12. Version Inquiry: You may view the current effective version and historical versions at any time on the "Settings-Privacy Policy" page within this software. To obtain historical versions, please send an email to [onecleaner628@gmail.com] to request them.
  13. Handling of Non-Acceptance of Updates: If you do not agree with the updated policy, you should immediately cease using this software. Continued use shall be deemed as acceptance of all updated terms.

Contact Us

If you have questions about this policy, wish to exercise your personal information rights, or wish to report privacy-related issues, please contact us via the following methods:

Contact Email: [onecleaner628@gmail.com]

Feedback Requirements: To facilitate efficient processing of your request, please include the following information in your email:

  1. • Type of request;
  2. Details (problem description, relevant screenshots);
  3. Contact information (e.g., phone number, email address) for us to provide feedback on the resolution.

•Response Time: We will reply within 15 business days of receiving your email. For complex requests, this may extend to 30 business days, and we will notify you of the processing progress via email in advance.

If you are dissatisfied with our response, you may file a complaint with local regulatory authorities such as the Internet Information Office or Consumer Association.

Supplementary Provisions

  1. Definitions of "personal information" and "sensitive personal information" in this policy comply with the Personal Information Protection Law of the People's Republic of China and other applicable laws and regulations.
  2. Matters not covered herein shall be governed by the relevant laws and regulations of the Mainland Region of the People's Republic of China;
  3. The operator of Universal Clean Master reserves the final right of interpretation for this policy.

Appendix: SDK Directory

AppLovin SDK

Company Information: AppLovin Corporation

Information Collected and Purpose: Device and storage information; used for providing advertisements;

Official Website Link: https://www.applovin.com/privacy-cn/

Google Mobile Ads SDK

Company Information: Google LLC

Information Collected and Purpose: Device and storage information; used for providing advertisements;

Official website link: https://policies.google.com/privacy?hl=zh-CN

AppsFlyer SDK

Company Information: AppsFlyer Inc.

Information Collected and Purpose: Device and storage information; used for providing advertisements;

Official Website Link: https://www.appsflyer.com/legal/services-privacy-policy/

Firebase SDK

Company Information: Google LLC

Information Collected and Purpose: Used for analyzing crash information and optimizing the product experience;

Official website link: https://policies.google.com/privacy?hl=zh-cn

Sensors Analytics SDK

Company Information: Sensors Analytics

Information Collected and Purpose: Used to analyze crash information and optimize product experience;

Official website link: https://manual.sensorsdata.cn/sa/docs/tech_sdk_client_privacy_policy

BDASignal SDK

Company Information: ByteDance

Information Collected and Purpose: Device and storage information; used to deliver advertisements;

Official website link: https://bytedance.larkoffice.com/docx/CgYBdVzoBogND2xv7PhcSfFNnyc