Privacy Policy - SnipLog
Owner and Data Controller
GoTush
Types of Data Collected
With explicit user consent, the
application may collect the following data:
Mode and Place of Processing the Data
Methods of Processing
The data collected is securely
transmitted and stored using industry-standard encryption
and practices. Data is processed only for the stated
purposes and is accessible only to authorized personnel.
Retention Time
Data is retained only as long as
necessary for the purpose it was collected. Users may
request deletion of their data at any time by contacting the
Owner.
The Purposes of Processing
Collected data is used for the following
purposes:
Basic Information
By default, this application reads clipboard
content on user machine. This data is not
stored, transmitted, or retained unless explicit consent is
provided for diagnostic or improvement purposes.
Email
User profile information is collected
with explicit permission of user. This may include email
addresses if a user logs to windows with an email address as
signing in username. We do not use emails for spam or do not
share this data with third party.
Device Permissions for Personal Data
Access
The application may request permission to
access the data required for its core functionality. The
user must explicitly grant these permissions. Revoking these
permissions may affect application functionality.
Permissions Not Used
The application does NOT use or request
access to:
System Logs and Maintenance
The application may generate log files or
usage data locally for the purpose of diagnostics and
maintenance. Settings are saved locally on the user’s system
and may include application preferences like checkbox states
and text inputs. These are not transmitted unless the user
explicitly consents to share for support purposes.
Changes to This Privacy Policy
The Owner reserves the right to amend
this privacy policy at any time by notifying Users on this
page and/or within this Application. If changes affect data
processing based on consent, new consent will be requested
from the user.
Updated on April 15, 2025 |