Privacy Policy

This Privacy Policy describes how Email Backup Help collects, uses, and discloses your personal information when you use our website (the Email Backup Help) and our email backup software. We are committed to protecting your 100% privacy and ensuring that your personal information is handled responsibly.

Who We Are?

We at Email Backup Help specialize in delivering high-class email migration and backup services for corporations and businesses. We are offering 90+ email clients that can be backed up to local PCs, Hard Drives, or Laptops into 32+ Email Clients and File Formats. We are dedicated to providing the best services that benchmark the successful management involving the least investment.

Compliance with Indian Personal Data Protection Bill (PDPB)

This Privacy Policy is designed to comply with the Indian Personal Data Protection Bill, 2019 (PDPB), which regulates the processing of personal data in India. We also take into account relevant data protection principles from the EU General Data Protection Regulation (GDPR) and the U.S. Federal Trade Commission (FTC) Act.

Information We Collect

We collect two types of information: Non-Personal Information & Personal Information.

Non-Personal Information: This includes information that cannot be used to identify you personally, such as browsing activity, download frequency, number of website hits, usage statistics, preferences, and content like comments or feedback. This information is collected on an aggregate basis and not linked to any individual user.

Personal Information: This may include your name, email address, contact number, billing information, company name, IP address, and device information. We collect personal information when you:

  • Register for an account on the Site
  • Purchase or license the Software
  • Contact us for support
  • Submit a complaint
  • Participate in a survey or contest

In What Ways Do We Use Collected Information or Data?

Taking the Services Online

We save the customers' information, like email, contacts, and addresses used while purchasing the services online. These data are well protected for any further clarification or purchased-related technical support to assist the users with any kind of future guidance.

Technical Expert For Technical Assistance

The team will respond to the user's query based on the email address used while taking the services online. We only keep email addresses and contact information to maintain communication with clients.

For Recent Innovations and Updates

Our company believes that updating our clients with newly launched software or significant updates to specific software services is a core business concept. So, to keep our customers informed of software updates and new launches, we keep their contact information and email addresses with us.

Data Protection for Sensitive Data

We understand the sensitivity of your email credentials and stored data. To access your mailbox data in our tool, we use Modern Authentication Mechanisms that generate tokens with limited lifespans. These tokens expire automatically, and we cannot store any sensitive data or credentials. This ensures your right to confidentiality remains protected.

We use OAuth 2.0 for getting authentication in Google. OAuth 2.0 is a robust framework for securing user authentication and authorization in web applications, and Google’s implementation of OAuth 2.0 enhances security in several key ways:

How OAuth 2.0 Secures Google Login?

OAuth 2.0 uses access tokens to grant access to resources without exposing user credentials. When a user logs in with Google, they are redirected to Google’s secure authentication servers. Upon successful authentication, Google issues an access token to the application. This token is used to access user data, reducing the need to handle user credentials directly and minimizing the risk of credential theft.
OAuth 2.0 allows applications to request specific scopes, or permissions, which limit the access granted by the token. For instance, an application can request permission to access only basic profile information or email, without accessing more sensitive data. Google’s implementation ensures that users are informed of the exact permissions being requested and can consent accordingly.
The token exchange process in OAuth 2.0 involves secure communication channels. Tokens are exchanged using HTTPS, ensuring that they are encrypted during transmission. Additionally, the use of authorization codes and tokens reduces the exposure of sensitive information, such as user credentials and access tokens, to potential attackers.
OAuth 2.0 supports refresh tokens, which allow applications to obtain new access tokens without requiring users to re-authenticate. Refresh tokens have a longer lifespan but are securely stored and managed. Access tokens themselves have limited lifetimes, reducing the window of opportunity for token misuse if they are compromised.
Google ensures that access tokens and refresh tokens are securely stored and managed. If a token is compromised, it can be revoked through Google’s security interfaces, which invalidates the token and prevents further access. Users also can review and manage applications that have access to their Google account, enhancing user control over permissions.
Google employs a range of security practices to protect OAuth 2.0 transactions. This includes regular security audits, anomaly detection, and advanced encryption techniques. Google’s infrastructure is designed to withstand various security threats, ensuring that OAuth 2.0 remains a secure method for user authentication and authorization.
For added security, Google offers two-factor authentication (2FA). Even if an attacker obtains a user’s credentials, 2FA adds a layer of protection by requiring a second form of verification, such as a code sent to the user’s phone.

Data Retention and Deletion

At Email Backup Help, we believe you should have complete control over your data. Therefore, we will not delete your Google user data without your explicit permission. This means you can keep your data safe and secure for as long as you want.

If you decide that you no longer need your data stored with us, you can easily enable permission in the tool. The software will ensure that your data is deleted securely and in compliance with applicable data protection laws.

We are committed to protecting your data privacy and giving you the power to choose what happens to it. By providing you with the option to retain or delete your data, we aim to give you the peace of mind that your information is in your hands.

Minimum Required Permissions

Our Software requires access to specific data to function properly. These permissions are the minimum necessary and include Emails, Calendars, Contacts, and other additional data only if it's essential for the specific functionality.

Oauth Scopes Requested by Email back up help Gmail Backup Tool

1. See, Edit, Create, and Delete all of your Google Drive files (https://www.googleapis.com/auth/drive):

This broad scope allows the app to manage all files within the user's Google Drive. Although it provides extensive access, the cause is likely tied to the need for comprehensive file management for backup purposes. The app may require the ability to create backup files, manage folders, and possibly clean up or organize these files. The tool ensures it only accesses files relevant to the backup process and maintains strict data management practices to avoid interference with other Drive content.

2. Create, Edit, and See Google Meet Conferences Information Created by the App (https://www.googleapis.com/auth/meetings.space.created):

The software has features related to Google Meet conferences. So, this scope is necessary to manage and organize those conferences. However, if the primary functionality of the tool is email backup, this scope may be irrelevant unless the app integrates backup functionalities with Google Meet for some reason.

3. See, Edit, Download, and Permanently Delete your Contacts (https://www.googleapis.com/auth/contacts):

The app includes functionality to backup contact information or synchronize contacts as part of the backup process. So, this scope is necessary.

4. See, Upload, and Organize Items in your Google Photos library (https://www.googleapis.com/auth/photoslibrary):

This scope is appropriate because the app integrates with Google Photos, perhaps for storing email attachments or other media.

5. See, Edit, Share, and Permanently Delete all the Calendars Accessed using Google Calendar (https://www.googleapis.com/auth/calendar):

This scope allows extensive access to Google Calendar data. If the app does not involve calendar functionalities, such as scheduling or syncing events, we don’t expose unnecessary user data.

6. Read, Compose, Send, and Permanently Delete all your Email from Gmail (https://mail.google.com/):

This comprehensive scope is needed for a tool that performs email backup. It asks to read, compose, send, and delete emails ensuring that the app can manage emails effectively. It is important to backup, organize, and possibly remove emails once backed up. The applications justify each action performed with this scope and ensure user data privacy and security are maintained.

How We Use Your Information?

We use your information for the following purposes:

  • To improve our products and website based on user feedback.
  • To provide you with updates, discounts, and promotions on our products and services.
  • To offer technical support and answer your questions about the Software.
  • To process your transactions.
  • For marketing and advertising purposes, with your consent.
  • To conduct surveys or contests.
  • To comply with legal obligations.

Using Cookies

We use cookies to collect non-personal information about your browsing behavior, such as clicks, shopping preferences, device specifications, location (if allowed), and search history. This information helps us understand your preferences and provide a better user experience. You can always manage your cookie preferences in your browser settings.

Security Measures

We take all reasonable physical, electronic, and administrative steps to protect your personal information from unauthorized access, use, disclosure, alteration, or destruction. Sensitive information like billing data and credit card information is encrypted using Secure Socket Layers (SSL) technology.

At Email Backup Help, your privacy is our top priority. When you log in through Email backup help, our system uses advanced security protocols to ensure that your data remains safe and private. Therefore, we want you to be fully informed about how we handle your Gmail data:

  • No Storage of Credentials: We do not store your Gmail login credentials or any mailbox information on our servers. Your credentials are used solely for authentication purposes and are never retained.
  • Data Access: During the authentication process, our tools take read and write permission for certain data from your Gmail account. This includes Emails, Google Drive, Photos, Calendar, and Contact. However, this data is used temporarily only to let you choose to migrate and is not saved or stored by our software.

User’s Rights

You have several data protection rights under the PDPB and other applicable laws. These rights include:

  • The right to access and update your personal information.
  • The right to request deletion of your personal information.
  • The right to object to the processing of your personal information.
  • The right to withdraw your consent to the processing of your personal information at any time.
  • The right to complain to the appropriate data protection authority if you believe your data rights have been violated.

Contact Us

If you have any questions or concerns about this Privacy Policy, please contact us at: contact@arysontechnologies.com.

You Must Note!

  • We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on the Site.
  • Following the Children's Online Privacy Protection Act (COPPA), we do not knowingly collect information from children under 18. Our website and services are intended for adults only.
  • This Privacy Policy applies only to our website and software. We are not responsible for the privacy practices of other websites you may visit through links on our Site.

By using our website or software, you agree to the terms of this Privacy Policy.