Getting Started
  1. Be sure to use Feng Office
  2. Be sure to have the Liquid Office plug-in installed
  3. Install your favourite app, eg Liquid Notes from Google Play

Support / Learn more ...
  • take a look at our FAQs or
  • contact us,
  • visit us on Facebook or
  • follow us on Twitter
Credits
Liquid Office | privacy policy
Mobile apps (Android + iOS) for Feng Office, including Notes, Mails, Calendar, Documents, Reports, Tasks, Time and Contacts.
Feng Office Native Mobile Apps Applications
7778
page-template-default,page,page-id-7778,ajax_leftright,page_not_loaded,smooth_scroll,,wpb-js-composer js-comp-ver-4.1.2,vc_responsive

privacy policy

Privacy Policy for Liquid Office (v1.0p, PDF version)

1. Your Data, your privacy – how Liquid Office treats your data
The mobile applications of Liquid Office have been developed in accordance with the Austrian Data Protection Act 2000, Federal Law Gazette part I no. 165/1999, which implements the European Data Protection Directive 95/46/EC. According to its rules the usage of data must not exceed the extent necessary.

By installing Liquid Office you entered into an End-User License Agreement (EULA) with ILIA, the provider of Liquid Office. This agreement is the legal base for using your data within the meaning of Art 7 (b) of the European Data Protection Directive 95/46/EC. The processing of this data is necessary for the performance of your agreement with ILIA, because without this use of data, the requested services, i.e. the access to your existing Feng Office installation, cannot be provided to you.

2. Usage of encrypted device ID for security management
All the data, that is used and processed, is the data, that you may access and use according to your user permissions, as laid down in your installation of Feng Office, to which you connect via Liquid Office.

Additionally to the data usage of Feng Office only a hash code of your mobile’s unique ID is processed. This is done for security reasons, to be able to deactivate access from a distinct mobile device, for example in case of loss. The unique ID of your mobile is encrypted with a one-way encryption (“hash algorithm”) so that the uniqueness of the identification is preserved, while at the same time the hashed ID cannot be decrypted, so that tracking of your device is technically excluded. Only in case someone tries to access your Feng Office installation via the deactivated device, the hashed ID of the deactivated device is compared against the encrypted ID, that has been stored within your Feng Office installation. In case of deactivation all connection-attempts from deactivated devices are rejected.

3. Dealing with user permissions
Liquid Office deals with user permissions the same way, Feng Office does. For this reason it is your responsibility to take care, that confidential information is not disclosed to other users, that have access to your Feng Office installation. Liquid Office does (at the present state) not allow for the creation of workspaces or adjustment of users permissions. They are inherited from the current dimensions (work-spaces, projects and/or tags), that you are working with.

4. Connection security
The security of connection is also within your responsibility. When your Feng Office installation is protected via Secure Socket Layer (SSL) technology, also your Liquid Office access will be protected the same way. If your original Feng Office installation lacks an encrypted connection, also your connection via Liquid Office will be unencrypted.

5. Data security
By being able to use the on-site version of Feng Office, you decide on which server Feng Office is installed. Thereby you define the data security framework of your Feng Office as well as Liquid Office installation. For security reasons the password is not included within in the QR-code, that eases your log-in. That’s why no one else than you, can log in with the QR-code from your account site of Feng Office. This access is protected by your password, which you have to type in at least once. The QR-code is also generated in such a way, that it cannot be scanned from far distances, thus assuring you that only you – in front of the screen – and not everyone, can scan the code.