FilePile Manager Privacy Policy

Effective Date: January 29, 2026

 

Thank you for choosing FilePile Manager! We always prioritize your privacy and strictly adhere to relevant laws and regulations such as the Personal Information Protection Law and the General Data Protection Regulation (GDPR), processing your information in a transparent and compliant manner. This policy clearly explains how we collect, use, and protect your information, and your control over it. We recommend you read it carefully.

 

If you do not agree to any part of this policy, please do not download, install, or use this application. Once you start using it, it means you fully understand and agree that we process your information in accordance with this policy.

 

I. What Information We Collect and Why

 

We adhere to the principle of "collecting only necessary information." All information collection is for better service provision or to ensure security; we do not collect irrelevant data.

 

1. Automatically Collected Information (No Manual Authorization Required)

Device Basic Data: To ensure the application is compatible with your device and operates stably, we automatically obtain your device model, operating system version, and non-identifiable identifiers such as Android ID and AAID (this information cannot be linked to your real identity).

 

Application Log Data: If the application crashes, freezes, or experiences other malfunctions, relevant logs (including failure time, configuration parameters, and other statistical information) will be recorded locally on your device. This data is used solely for troubleshooting and repair and will not involve your file content or privacy.

 

Usage Behavior Data:To optimize the user experience, we will collect statistics on your usage of core functions (such as file management and junk file cleanup frequency), application launches, usage duration, and interactions such as ad clicks and browsing (this type of ad-related data is collected by a third-party ad SDK).

 

Anonymous Statistical Data:Service traffic, operation paths, and performance data are collected through third-party analytics tools (such as Firebase Analytics). All data is anonymized and aggregated, used solely for overall service optimization, and does not contain any personally identifiable information.

 

2. Based on Your Authorized Permissions and Information Usage

 

Application permissions are divided into "Required Permissions" and "Optional Permissions." You can choose whether to grant optional permissions; denying them will not affect the use of core functions:

 

Required Permissions:Storage Permissions

 

This is the foundation of file management functionality—whether browsing, moving, copying, deleting files, or unzipping, sharing, or creating folders, access to your device's storage is required. Important Note: We will only use this permission locally on your device to perform the above operations. We will never upload any of your files (documents, images, audio, video, etc.) to our servers or third-party platforms. All file operations are completed locally.

 

Optional Permissions: Grant as needed, self-controlled

 

Access Application Usage: After authorization, we can obtain statistics on the storage space used by each application. We will not monitor your specific actions in other applications. The collected statistics are only used within this application and are not uploaded to servers or used to identify your personal information.

 

Change System Settings: After authorization, you can set audio as ringtones, images as wallpapers, and other personalized operations. This does not modify other core system settings.

 

Allow Installation of Apps from Unknown Sources: After authorization, we can assist in installing APK files on your device. This only calls the system installation interface and does not record installation information. We recommend that you verify the security of the files before proceeding.

 

3. Purpose of Information Use

 

The collected information will only be used for the following scenarios and will not be used for any other purpose without your explicit consent:

 

To ensure the normal operation of core services;

 

To analyze data to fix faults and optimize functional logic;

 

To display personalized advertisements (based on non-identifiable information) to support the free operation of the application;

 

To conduct security monitoring and prevent risks such as malicious attacks and fraud;

 

To comply with laws and regulations, judicial orders, or other legal requirements.

 

II. Will Your Information Be Shared or Disclosed?

 

We will never sell or rent your information indiscriminately, and will only share or disclose information in the following limited circumstances:

 

1. Sharing with Third-Party Partners

 

We will only share anonymized, non-personally identifiable information with authorized partners:

 

Advertising Partners: Sharing device identifiers (such as AAID) and advertising interaction data for displaying personalized advertisements and monitoring their effectiveness. You can opt out of personalized advertisements through your device settings;

 

Data Analysis Partners: Sharing anonymized usage behavior and statistical data for generating analysis reports to help us improve our services.

 

The above-mentioned third parties all have independent privacy policies, which can be found here:

 

Google Play Services: https://policies.google.com/privacy?hl=en

Firebase: https://firebase.google.com/support/privacy/

Google AdMob: https://transparency.google/our-policies/product-terms/google-admob/

Facebook: https://www.facebook.com/about/privacy

Pangle: https://www.pangleglobal.com/privacy

Topon: https://www.toponad.com/en/privacy-policy

 

2. Transfer of Information

 

Your information may be transferred only in two circumstances:

 

With your explicit written consent;

 

In the event of a merger, acquisition, asset transfer, or other similar transaction, the information will be transferred as part of the assets. The transferee must continue to comply with this policy, and any change in the purpose of use requires your renewed consent.

 

3. Public Disclosure

 

Public disclosure will only be made in the following necessary circumstances:

 

To comply with laws and regulations, or legal requirements of judicial or administrative authorities;

 

To protect the legitimate rights and interests of you, us, or the public (such as responding to security incidents or investigating fraud);

 

Based on your voluntary authorization or public statement.

 

4. Exceptions Without Authorization

 

According to legal provisions, information sharing and disclosure may be made without your consent in the following circumstances:

 

Related to the performance of legal obligations;

 

Involving national security, defense security, public safety, or significant public interests;

 

Related to judicial or administrative enforcement procedures;

 

To protect the life, property, or other significant legitimate rights and interests of others, and it is difficult to obtain their consent;

 

Information you have already voluntarily disclosed;

 

Information collected from legally public channels.

 

III. Your Rights

 

As the information subject, you enjoy the following rights, and we will do our utmost to protect your right to exercise them:

 

1. Core Rights Explanation

 

Right to Know: You have the right to inquire whether we are processing your information and the specific details of the processing;

 

Right to Correct: If the information is inaccurate or incomplete, you have the right to request that we correct it;

 

Right to Deletion (Right to Be Forgotten): You have the right to request deletion when the information is no longer necessary, you withdraw your consent, and there is no other legal basis;

 

Right to Restrict Processing: If there is a dispute regarding the accuracy of the information, or the processing is illegal but you object to deletion, you have the right to request a temporary restriction on processing;

 

Right to Data Portability: For information you provide based on consent or a contract that is processed automatically, you have the right to request that it be received or transmitted to other platforms in a common format;

 

Right to Object: You may object to information processing based on legitimate interests or public interests, and you may also object to information processing used for direct marketing at any time;

 

Right to Withdraw Consent: If the information processing is based on your consent, you may withdraw it at any time without affecting the legal processing prior to the withdrawal.

 

2. How to Exercise Your Rights

 

If you wish to exercise the above rights or have questions about information processing, please contact us using the contact information at the end of this document. To ensure your security, we may need to verify your identity. Once verified, we will respond within the legally mandated timeframe.

 

If you believe our information processing violates GDPR, you have the right to file a complaint with the data protection authority in your EU member state.

 

IV. How Your Information is Stored and Protected

 

1. Storage Location and Duration

 

Storage Location: Our services cover the globe. Your information may be stored on servers outside your country/region, but we will ensure the security of cross-border data transfers through compliant methods such as EU standard contractual terms and adequacy assessments.

 

Storage Duration: Information will only be retained for the shortest period necessary to achieve the service's purpose. After the storage period, it will be automatically deleted or anonymized.

 

2. Security Measures

 

We employ industry-leading security technologies and management practices to protect your information from unauthorized access, disclosure, or damage:

 

End-to-end encryption of data transmission and storage (e.g., SSL/TLS);

 

Strict control over information access permissions, ensuring access is only granted to authorized personnel;

 

Regular security audits, vulnerability patching, and system upgrades;

 

Privacy protection training for employees, clearly defining confidentiality obligations.

 

3. Security Incident Explanation

 

Given the complexity of the network environment and the continuous evolution of cyberattack techniques, we cannot guarantee 100% security for your information. In the unfortunate event of information leakage or loss, we will immediately take necessary measures such as technical remediation and risk control to minimize the impact of the incident. We will also strictly comply with relevant laws and regulations, promptly report the incident to regulatory agencies, and, if necessary, notify you of the relevant situation and response suggestions in a reasonable manner.

 

V. Policy Updates and Your Control

 

1. Policy Updates

 

If this policy needs to be updated due to business development, revisions to laws and regulations, etc., we will announce it within the application or through official channels, and the updated "effective date" will be marked. Your continued use of the application constitutes acceptance of the revised policy; in the event of significant changes (such as changes in the purpose of information processing, changes in sharing objects, etc.), we will notify you through more prominent methods such as in-application pop-ups.

 

2. Your Device Control

 

You can manage permissions and information usage through device settings:

 

Permission Management: Android devices can adjust permissions via "Settings → Apps → FilePile Manager → Permissions"; iOS devices can control permissions via "Settings → FilePile Manager → Permissions";

 

Personalized Advertising: Android users can turn this off in "Google Settings → Advertising"; iOS users can turn it off in "Settings → Privacy & Security → Apple Advertising";

 

VI. Contact Us

 

If you have any questions, suggestions, or need to exercise your rights or provide feedback, please contact us through the following methods:

 

Email: [email protected]