top of page

PRIVACY POLICY

A Legal Disclaimer

At PurixOS, we prioritize your privacy and are committed to safeguarding your personal information. This Privacy Policy outlines the types of data we collect, how we use it, and the measures we take to protect it.
1. Information We Collect
We may collect the following types of information:

  • Personal Information: Only collected in the website.

  • Device Information: Including device type, operating system.

  • Usage Data: Details of how you use PurixOS, including features accessed and interactions within the system.

  • Cookies and Tracking Technologies: To enhance user experience and analyze usage patterns.

2. How We Use Your Information
Your data helps us to:

  • Provide, maintain, and improve PurixOS.

  • Communicate updates, security alerts, and support.

  • Analyze usage to enhance system performance and user experience.

  • Ensure compliance with legal obligations.

Once personal data is no longer required for the purposes for which it was collected, we ensure it is securely deleted or anonymized using industry best practices.
3. Data Security
We implement appropriate technical and organizational measures to protect your personal data from unauthorized access, alteration, disclosure, or destruction. These measures include:

  • Encryption of sensitive data.

  • Regular security assessments and audits.

  • Access controls and authentication protocols

4. Your Rights
Depending on your jurisdiction, you may have the following rights regarding your personal data:

  • Access: Request details about the personal data we hold about you.

  • Correction: Request correction of any inaccuracies in your personal data.

  • Deletion: Request deletion of your personal data, subject to certain conditions.

  • Data Portability: Request a copy of your personal data in a structured, commonly used format.

  • Objection: Object to the processing of your personal data in certain circumstances.

To exercise these rights, please contact us at support@purixos.studio.
5. Cookies and Tracking Technologies
We use cookies and similar tracking technologies to track the activity on our Services and hold certain information. Cookies are small files stored on your device that help us enhance your experience and analyze usage patterns. You can manage cookie preferences through your browser settings.
6. Changes to This Privacy Policy
We may update this Privacy Policy from time to time. Any changes will be posted on this page with an updated effective date. We encourage you to review this Privacy Policy periodically to stay informed about how we are protecting your information.
Disclaimer: None of the pre-tweaked image files are pre-activated, to activate your Pro Edition install, you must use a key. 
The goal is an endeavour to better understand and mitigate the collection of Personally identifiable information (PII), as has been clearly defined by numerous outlets covering the topic. We also aim to greatly enhance the base performance of the OS to provide a better, snappier and more fluid productivity and gaming experience.


EU Directive:
 
EU Directive 2009/24, on the legal protection of computer programs, governs reverse engineering in the European Union. The directive states:
"(15) The unauthorised reproduction, translation, adaptation or transformation of the form of the code in which a copy of a computer program has been made available constitutes an infringement of the exclusive rights of the author. Nevertheless, circumstances may exist when such a reproduction of the code and translation of its form are indispensable to obtain the necessary information to achieve the interoperability of an independently created program with other programs. It has therefore to be considered that, in these limited circumstances only, performance of the acts of reproduction and translation by or on behalf of a person having a right to use a copy of the program is legitimate and compatible with fair practice and must therefore be deemed not to require the authorisation of the rightholder. An objective of this exception is to make it possible to connect all components of a computer system, including those of different manufacturers, so that they can work together. Such an exception to the author's exclusive rights may not be used in a way which prejudices the legitimate interests of the rightholder or which conflicts with a normal exploitation of the program." 

bottom of page