Welcome to this App, we are fully aware of the importance of personal information to you, and we will do our best to protect your personal information safely and reliably. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring safety, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security measures to protect your personal information in accordance with the mature security standards of the industry. Please read and understand this Privacy Policy carefully before using our products (or services).
I. How we collect and use your personal information
Personal information refers to various information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.
(I) We will collect and use your information for the following purposes:
1. Providing services to you
The information we collect and use is a necessary condition for providing you with services. If we lack relevant information, we will not be able to provide you with the core content of the service, for example:
In order to ensure the normal operation of this system, we need to successfully obtain relevant permissions, such as:
Obtain basic information of the mobile phone, obtain camera permissions, location permissions, storage permissions
The above information you provide will continue to authorize us to use during your use of this service. We use this information only to improve our services. We will not provide it to other companies. When you delete this system, we will stop using and delete the above information.
2. Your information shared by other parties. That is, the shared information about you provided by other parties when using our services.
3. Your information we obtain. When you use our services, we collect, summarize, and record information, such as location information, device information, etc.
(II) Conduct internal data analysis and research, third-party website statistics services, and improve our products or services [Note: Example] We collect data based on your interactions with us and the choices you make, including your privacy settings and the products and features you use. The data we collect may include new users, active users, number of launches, cumulative users, etc. When we want to use information for other purposes not specified in this policy, we will ask for your consent in advance. When we want to use information collected for a specific purpose for other purposes, we will ask for your consent in advance.
4. Improve our services
We may use the information collected through a certain service for our other services. For example, your information collected when you use a certain service may be used in another service to provide you with specific content or to show you information related to you rather than generally pushed; we may ask you to participate in surveys on services to help us improve existing services or design new services; at the same time, we may use your information for software updates.
You understand and agree to this privacy policy. After collecting your information, we will use technical means to de-identify the data. The de-identified information will not be able to identify you. In this case, we have the right to use the de-identified information to analyze the user database and make commercial use of it.
If we use your information for other purposes not specified in this Privacy Policy, we will ask for your consent in advance.
5. Exceptions to obtaining authorization and consent
According to relevant laws and regulations, your authorization and consent are not required for collecting your information in the following circumstances:
(1) Information related to national security and national defense security;
(2) Information related to public security, public health, and major public interests;
(3) Information related to criminal investigation, prosecution, trial, and execution of judgments;
(4) Information collected for the purpose of protecting the life, property, and other major legitimate rights and interests of the information subject or other individuals, but it is difficult to obtain your consent;
(5) Information collected is disclosed to the public by you on your own initiative;
(6 ) Collect information from legally disclosed information, such as legal news reports, government information disclosure and other channels;
(7) Necessary for signing a contract according to your requirements;
(8) Necessary for maintaining the safe and stable operation of the service, such as discovering and handling product or service failures;
(9) Necessary for legal news reporting;
(10) Necessary for academic research institutions to conduct statistical or academic research based on the public interest, and when providing the results of academic research or descriptions to the outside, the information contained in the results shall be de-identified;
(11) Other circumstances stipulated by laws and regulations.
II. How we share, transfer and publicly disclose your personal information
(I) Sharing
We will not share your personal information with any other company, organization or individual, except in the following circumstances:
1. Sharing with explicit consent: We will share your personal information with other parties after obtaining your explicit consent.
2. We may share your personal information with others in accordance with laws and regulations or the mandatory requirements of government authorities.
3. Sharing with authorized partners: For the purposes stated in this privacy policy only, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide the service.
For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them and require them to handle personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.
(II) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Transfer with explicit consent: We will transfer your personal information to other parties after obtaining your explicit consent;
2. In the event of merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to re-ask for your authorization and consent.
(III) Public Disclosure
We will only publicly disclose your personal information in the following circumstances and on the premise of taking security protection measures that meet industry standards:
1. After obtaining your explicit consent, we will disclose the information you specify in the disclosure method you explicitly consent to;
2. Disclosure based on law: We may publicly disclose your personal information under the mandatory requirements of laws, legal procedures, litigation or government authorities. Subject to laws and regulations, when we receive the above-mentioned request for disclosure of information, we will require the recipient to produce the corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that the information we are required to provide should be as transparent as possible within the scope permitted by law. We carefully review all requests to ensure that they have a legal basis and are limited to data that law enforcement agencies have a legal right to obtain for specific investigation purposes.
III. How we retain, store and protect information
We will only retain your information for the period necessary for the purposes described in this Privacy Policy and the time limit required by laws and regulations.
The information we collect and generate during operations within the territory of the People's Republic of China is stored within China.
We will take the following measures to protect your information:
(I) Data security technical measures
We will adopt security protection measures that meet industry standards, including establishing reasonable system specifications and security technologies to prevent your information from being accessed, used, or modified without authorization, and to avoid data damage or loss. Network services use a variety of encryption technologies. For example, in some services, we will use encryption technology (such as SSL) to protect your information, use encryption technology to encrypt and save your information, and isolate it through isolation technology. When using information, such as information display and information association calculation, we will use a variety of data desensitization technologies to enhance the security of information in use. Use strict data access permission control and multiple identity authentication technologies to protect information and prevent data from being used in violation of regulations.
(II) Other security measures we take to protect information
We manage the storage and use of standardized information by establishing a data classification and grading system, data security management specifications, and data security development specifications.
We use confidentiality agreements for information contacts, monitoring and auditing mechanisms to conduct comprehensive security control of data.
Strengthen security awareness. We will also hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting information.
(III) We only allow personnel and partners who need to know this information to access your information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your information to fulfill their corresponding confidentiality obligations. If these obligations are not fulfilled, you may be held accountable for the corresponding legal responsibilities.
(IV) We will take all reasonable and feasible measures to ensure that no irrelevant information is collected.
(V) The Internet is not an absolutely safe environment, and it is impossible to determine whether email, instant messaging, social software or other service software and other communication methods with other users are completely encrypted. We recommend that you use complex passwords when using such tools and pay attention to protecting your information security. We will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legal rights and interests, we will bear the corresponding legal liability.
IV. Description of permissions required for the application
1. Access network permissions: detect whether there is a new version through the network, obtain advertisements, etc.
2. Read mobile phone status and identity permissions, location permissions
: Obtain device identification information in the statistics SDK for statistical analysis services.