Privacy Policy for the ArchiCrypt Crypt Protect App

Data protection has a high priority for software development Patric Remus - ArchiCrypt. We want you to know what data we use for what purpose. The processing of personal data, such as the name, address, e-mail address or telephone number of a data subject, is always in accordance with the General Data Protection Regulation and in accordance with the country-specific privacy policy applicable to software development Patric Remus. Through this privacy policy, our company seeks to inform the public about the nature, scope and purpose of the personal information we collect, use and process. Software Development As a controller, Patric Remus has implemented technical and organizational measures to ensure the most complete protection possible for the personal data processed through this app. Nevertheless, Internet-based data transmissions can generally have security holes, so that absolute protection can not be guaranteed. In particular, if the app accesses the services of third parties, their data protection regulations and security mechanisms apply.


Personal data
Personal data is any information relating to an identified or identifiable natural person (hereinafter the "data subject"). A natural person is considered to be identifiable who, directly or indirectly, in particular by association with an identifier such as a name, an identification number, location data, an online identifier or one or more special features, expresses the physical, physiological, genetic, mental, economic, cultural or social identity of this natural person can be identified.
Affected person
Affected person is any identified or identifiable natural person whose personal data is processed by the controller.
Processing means any process or series of operations related to personal data, such as collecting, collecting, organizing, organizing, storing, adapting or modifying, reading, querying, using, with or without the aid of automated procedures; disclosure by submission, dissemination or other form of provision, reconciliation or association, restriction, erasure or destruction.
Restriction of processing
Restriction of the processing is the marking of stored personal data with the aim to limit their future processing.
Responsible or the controller
The controller or controller is the natural or legal person, public authority, body or body that, alone or in concert with others, decides on the purposes and means of processing personal data. Where the purposes and means of such processing are determined by Union law or the law of the Member States, the controller or the specific criteria for his designation may be provided for under Union or national law.
The processor is a natural or legal person, public authority, agency or other body that processes personal data on behalf of the controller.
Recipient is a natural or legal person, agency, agency or other entity to whom Personal Data is disclosed, whether or not it is a third party. However, authorities which may receive personal data under Union or national law in connection with a particular mission are not considered as beneficiaries.
Third is a natural or legal person, public authority, body or body other than the data subject, the controller, the processor and the persons authorized under the direct responsibility of the controller or processor to process the personal data.
Consent is any voluntarily given and unambiguously expressed in the form of a statement or other unambiguous confirmatory act by the data subject for the particular case, by which the data subject indicates that they consent to the processing of the personal data concerning him / her is.

What permissions are required for ArchiCrypt Crypt Protect and why are they required?

Delete app cache
The app stores data in the cache for further processing by other apps. In order for these applications to be able to work with the data, this data must be stored decrypted there. This sensitive data can be deleted there with Crypt Protect.
Read and write external storage
If the device on which the app is used has an external memory, then Crypt Protect will perform file operations (create, encrypt, decrypt, delete). These operations are never unsolicited for data that you have not given permission for.
Access network status and wifi status
ArchiCrypt Crypt Protect requires unrestricted access to the Internet as soon as you exchange data with one of the supported cloud services (upload / download). To ensure a smooth process, ArchiCrypt Crypt Protect needs to know the status (availability) of the network / WiFi connection.
Access to the Internet is required to communicate with the cloud services and to handle InApp purchases made by the user (optional).
Access to the camera
You can extract images directly from ArchiCrypt Crypt Protect, copy them to the outgoing folder and, if necessary, send them encrypted to one of the supported cloud services.
Write settings
ArchiCrypt Crypt Protect remembers in the settings the state at the last use. Only the settings of the Crypt Protect app itself are read and written.
Sales note / in-app billing
When transferring encrypted data to the cloud and from the cloud, a data quota is used up. If you need data volume beyond the free contingent, you can optionally purchase data packages of different sizes. The purchase and the payment is handled by means of In App Purchase. The resulting data are transmitted to the shop owner and are subject to its privacy policy. The services used by Crypt Protect are the Google Play Store ( and Apple AppStore ( The purchased data volume will be credited to your device and will be marked as consumed in the Google Play Store and Apple AppStore. Crypt Protect does not collect any information about the purchase and the information given here. Software Development Remus has insight into purchases made via Google or Apple through a service provided by Google or Apple, enabling it to handle order processing with the customer in addition to proper bookkeeping.
Communication with cloud services
Crypt Protect supports several cloud providers. To use the respective cloud service, you must log in to the service in the ArchiCrypt app. The services have their own privacy statements that correspond to those in normal use (without Crypt Protect app). Dropbox: Google Backup & Sync OneDrive When you log in to Cloud Services, you will be charged tokens (keys that allow you to quickly log in to the cloud service without interaction) and stored locally on your Android phone. After an initial login, you can access the respective cloud service without specifying your login data. These data (cloud tokens) become invalid after a certain period of time determined by the respective service, can be deleted manually in the Crypt Protect app in the settings or automatically when quitting. The password used to encrypt and decrypt data by Crypt Protect is neither stored on the device nor ever transferred to the cloud. Consequently, the password must be specified each time the Crypt Protect App is started and when accessing an encrypted Crypt Protect folder.

Transmission of data to third parties

Software Development Patric Remus - ArchiCrypt does not share data with third parties. If InApp purchases are made, the privacy policy of the used shop applies.

Name and address of the controller

The person responsible within the meaning of the General Data Protection Regulation, other data protection laws in the Member States of the European Union and other provisions of a data protection character is: Software Development Patric Remus - ArchiCrypt Am Brunneck 6 85521 Ottobrunn Germany Tel.:+49 (0) 89 66000893 E-Mail: request [at] Website:
This Privacy Policy was created on February 01, 2018. If you have any questions, feel free to contact us by e-mail.