Personal data is any information relating to an identified or identifiable natural person (hereinafter the "data subject"). A natural person is considered to be identifiable who, directly or indirectly, in particular by association with an identifier such as a name, an identification number, location data, an online identifier or one or more special features, expresses the physical, physiological, genetic, mental, economic, cultural or social identity of this natural person can be identified.
Affected person is any identified or identifiable natural person whose personal data is processed by the controller.
Processing means any process or series of operations related to personal data, such as collecting, collecting, organizing, organizing, storing, adapting or modifying, reading, querying, using, with or without the aid of automated procedures; disclosure by submission, dissemination or other form of provision, reconciliation or association, restriction, erasure or destruction.
Restriction of processing
Restriction of the processing is the marking of stored personal data with the aim to limit their future processing.
Responsible or the controller
The controller or controller is the natural or legal person, public authority, body or body that, alone or in concert with others, decides on the purposes and means of processing personal data. Where the purposes and means of such processing are determined by Union law or the law of the Member States, the controller or the specific criteria for his designation may be provided for under Union or national law.
The processor is a natural or legal person, public authority, agency or other body that processes personal data on behalf of the controller.
Recipient is a natural or legal person, agency, agency or other entity to whom Personal Data is disclosed, whether or not it is a third party. However, authorities which may receive personal data under Union or national law in connection with a particular mission are not considered as beneficiaries.
Third is a natural or legal person, public authority, body or body other than the data subject, the controller, the processor and the persons authorized under the direct responsibility of the controller or processor to process the personal data.
Consent is any voluntarily given and unambiguously expressed in the form of a statement or other unambiguous confirmatory act by the data subject for the particular case, by which the data subject indicates that they consent to the processing of the personal data concerning him / her is.
What permissions are required for ArchiCrypt Crypt Protect and why are they required?
Delete app cache
The app stores data in the cache for further processing by other apps. In order for these applications to be able to work with the data, this data must be stored decrypted there. This sensitive data can be deleted there with Crypt Protect.
Read and write external storage
If the device on which the app is used has an external memory, then Crypt Protect will perform file operations (create, encrypt, decrypt, delete). These operations are never unsolicited for data that you have not given permission for.
Access network status and wifi status
ArchiCrypt Crypt Protect requires unrestricted access to the Internet as soon as you exchange data with one of the supported cloud services (upload / download). To ensure a smooth process, ArchiCrypt Crypt Protect needs to know the status (availability) of the network / WiFi connection.
Access to the Internet is required to communicate with the cloud services and to handle InApp purchases made by the user (optional).
Access to the camera
You can extract images directly from ArchiCrypt Crypt Protect, copy them to the outgoing folder and, if necessary, send them encrypted to one of the supported cloud services.
ArchiCrypt Crypt Protect remembers in the settings the state at the last use. Only the settings of the Crypt Protect app itself are read and written.
Sales note / in-app billing
Communication with cloud services
Crypt Protect supports several cloud providers. To use the respective cloud service, you must log in to the service in the ArchiCrypt app. The services have their own privacy statements that correspond to those in normal use (without Crypt Protect app). Dropbox: https://www.dropbox.com/privacy Google Backup & Sync https://www.google.com/intl/en_US/policies/privacy/ OneDrive https://privacy.microsoft.com/en-us/privacystatement When you log in to Cloud Services, you will be charged tokens (keys that allow you to quickly log in to the cloud service without interaction) and stored locally on your Android phone. After an initial login, you can access the respective cloud service without specifying your login data. These data (cloud tokens) become invalid after a certain period of time determined by the respective service, can be deleted manually in the Crypt Protect app in the settings or automatically when quitting. The password used to encrypt and decrypt data by Crypt Protect is neither stored on the device nor ever transferred to the cloud. Consequently, the password must be specified each time the Crypt Protect App is started and when accessing an encrypted Crypt Protect folder.
Name and address of the controllerThe person responsible within the meaning of the General Data Protection Regulation, other data protection laws in the Member States of the European Union and other provisions of a data protection character is: Software Development Patric Remus - ArchiCrypt Am Brunneck 6 85521 Ottobrunn Germany Tel.:+49 (0) 89 66000893 E-Mail: request [at] archicrypt.de Website: www.archicrypt.de