APP Privacy Policy

We are committed to strictly abiding by laws and regulations, and following the principles of privacy protection to provide you with more secure and reliable services:

 

1、 Information we may collect

1) Information unrelated to personal identity:

When you use our service, we may collect and summarize information such as the source path and access order of users, such as recording the source path and browser software of each user using the service.

2) Information about personal identity:

When you use the service, we may collect and summarize or require you to provide personal identity information, network identity information (including system account number, IP address, e-mail address and passwords, passwords and password protection answers related to the above); Log information (including software use records, click records, operation logs, etc.); Equipment information (including equipment model, equipment MAC address, operating system type and equipment settings); Unique equipment identification code in the software list (such as imei/androidid/idfa/openudid/guid, SIM card IMSI information, etc., which describe the basic information of personal common equipment); Location information (including travel information, accurate positioning information, accommodation information, longitude and latitude, etc.).

We collect your information mainly to make it easier and more satisfactory for you and other users to use the service. Our goal is to provide all Internet users with a safe, stimulating, interesting and instructive Internet experience. And this information will help us achieve this goal.

 

2、 How we collect and use information

1) We will collect and obtain your information through the following ways:

1. The information you provided. For example:

(1) The information you provided to us when you registered your service account or used the service;

(2) The shared information you provide to others through our services, and the information stored when you use the services.

2. Your information shared by others. That is, the shared information about you provided by other parties when using our services.

3. We got your information. When you use our services, we collect, summarize and record information, such as log information, location information, device information, etc.

2) We collect and use your information for the following purposes:

1. Help you complete your registration

In order for us to provide services for you, you need to provide basic registration information, such as mobile phone number, email address, etc., and create your user name and password. In some individual services, if you only need to use basic services such as browsing and search, you do not need to register as our user and provide the above information.

2. Provide you with security

In order to ensure the authenticity of your identity and provide you with better security, you can provide us with personal sensitive information such as identity certificates, facial features and other biometric information to complete real name authentication.

In addition to authentication, we may use your information for customer service, security prevention, fraud monitoring, archiving and backup to ensure the security of the services we provide you; We may use or integrate the information we have collected about you, and the information our partners have obtained your authorization or shared according to law, to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis and disposal measures according to law.

3. Improve our service

We may use the information collected through one service for our other services. For example, your information collected when you use one service may be used in another service to provide you with specific content or show you information related to you rather than general push; We may let you participate in the survey of relevant services to help us improve existing services or design new services; At the same time, we may use your information for software updates.

You understand and agree that after collecting your information, we will de identify the data through technical means. The de identified information will not identify you. In this case, we have the right to use the de identified information to analyze the user database and make commercial use of it.

If we use your information for other purposes not specified in this privacy policy, we will seek your prior consent.

4. Exceptions with authorization

According to relevant laws and regulations, your authorization is not required to collect your information in the following cases:

(1) Relating to national security and national defense security;

(2) Related to public safety, public health and major public interests;

(3) Related to criminal investigation, prosecution, trial and execution of judgments;

(4) For the purpose of protecting the life, property and other major legitimate rights and interests of the information subject or other individuals, but it is difficult to obtain your consent;

(5) The collected information is disclosed to the public by yourself;

(6) Collecting information from legally disclosed information, such as legal news reports, government information disclosure and other channels;

(7) Necessary to sign the contract according to your requirements;

(8) It is necessary to maintain the safe and stable operation of the service, such as finding and handling the fault of the product or service;

(9) Necessary for legitimate news reporting;

(10) It is necessary for an academic research institution to carry out statistics or academic research based on the public interest, and to de identify the information contained in the results when providing the results of academic research or description externally;

(11) Other circumstances stipulated by laws and regulations.

 

3、 Information that we may share, transfer or disclose

1) Share

Except for the following circumstances, we will not share your information with any third party other than the company without your consent:

1. To provide you with our services. We may share your information with our partners and other third parties to achieve the core functions you need or provide the services you need, for example, providing corresponding order information to logistics service providers;

2. Achieve the purposes set forth in Article 2 "how we collect and use information" of this privacy policy;

3. Perform our obligations and exercise our rights in this privacy policy or other agreements between us and you;

4. It is shared with third parties such as partners who entrust us with promotion, but we will only provide these entrusting parties with information about the coverage and effectiveness of promotion, and will not provide information that can identify you, such as name, phone number or e-mail; Or we can aggregate this information so that it does not identify you personally. For example, we can tell the client how many people have read their promotional information or purchased the client's goods after seeing these information, or provide them with statistical information that can not identify their personal identity to help them understand their audience or customers.

5. To the extent permitted by laws and regulations, we may exchange information with other companies and organizations in order to comply with laws, protect us and our related parties or partners, you or other users or the public interest, property or security from damage, such as to prevent illegal activities such as fraud and reduce credit risk. However, this does not include information sold, leased, shared or otherwise disclosed for profit in violation of the commitments made in this privacy policy.

6. Assist in handling your disputes or disputes with others at your legitimate needs;

7. Provide your information at the lawful request of your guardian;

8. Provided in accordance with the single service agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents;

9. Based on academic research;

10. Provided on the basis of social and public interests in compliance with laws and regulations.

We will only share your information for legitimate, legitimate, necessary, specific and clear purposes. For the companies, organizations and individuals with whom we share information, we will sign a strict confidentiality agreement, requiring them to handle the information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

2) Assignment

1. With the continuous development of our business, we may conduct mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization holding your information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to ask for your authorization consent again.

2. With your express consent, we will transfer your information to other parties.

3) Disclosure

We will disclose your information only under the following circumstances and under the premise of taking safety protection measures in line with industry standards:

1. According to your needs, disclose the information you specify under the disclosure method you expressly agree;

2. If your information must be provided according to the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may disclose your information according to the required information type and disclosure method. On the premise of compliance with laws and regulations, when we receive the above request for information disclosure, we will require the receiving party to issue corresponding legal documents, such as subpoenas or letters of investigation. We firmly believe that the information we are required to provide should be as transparent as possible to the extent permitted by law. We have carefully reviewed all requests to ensure that they have a legitimate basis and are limited to data that law enforcement agencies have a legitimate right to obtain for specific investigation purposes.

 

4、 How we retain, store, and protect information

We will only retain your information for the period necessary for the purposes stated in this Privacy Policy and for the period required by laws and regulations.

The information we collect and generate during our operations in the people's Republic of China is stored in China.

We will protect your information by:

1) Technical measures for data security

We will adopt security protection measures that comply with industry standards, including establishing reasonable system specifications and security technologies to prevent unauthorized access, use and modification of your information and avoid data damage or loss. Network services adopt a variety of encryption technologies. For example, in some services, we will use encryption technology (such as SSL) to protect your information, use encryption technology to encrypt and save your information, and isolate it through isolation technology. When using information, such as information display and Information Association calculation, we will adopt a variety of data desensitization technologies to enhance the security of information in use. Adopt strict data access control and multiple identity authentication technology to protect information and avoid illegal use of data.

2) Other security measures we take to protect information

We manage the storage and use of standardized information by establishing a data classification and classification system, data security management specifications, and data security development specifications.

We conduct comprehensive security control over data through information contact confidentiality agreements, monitoring and auditing mechanisms.

Strengthen safety awareness. We will also hold security and privacy training courses to enhance employees' awareness of the importance of protecting information.

3) We only allow employees and partners who need to know this information to access your information, and we have set up a strict access control and monitoring mechanism for this purpose. We also require all personnel who may have access to your information to perform the corresponding confidentiality obligations. If we fail to fulfill these obligations, we may be held legally liable or our cooperative relationship may be suspended.

4) We will take all reasonable and feasible measures to ensure that irrelevant information is not collected.

5) The Internet is not an absolutely secure environment, and the communication methods with other users such as e-mail, instant messaging, social software or other service software cannot be determined whether they are fully encrypted. We recommend that you use complex passwords when using such tools, and pay attention to protecting your information security.

6) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.

7) Safety incident handling

When communicating with third parties or purchasing goods and services through our services, you will inevitably disclose your own information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your information properly and provide it to others only when necessary.

In order to deal with the possible risks of information leakage, damage and loss, we have developed a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding processing procedures. We have also established a special emergency response team for safety incidents. According to the requirements of the safety incident disposal specification, we have launched safety plans for different safety incidents, stopped losses, analyzed, positioned, developed remedial measures, and cooperated with relevant departments to trace and crack down.

In the event of an information security incident, we will promptly inform you of the basic information and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can take on your own to prevent and reduce the risk, and the remedial measures for you in accordance with the requirements of laws and regulations. At the same time, we will promptly inform you of the relevant information of the event by mail, letter, telephone, push notification, etc. if it is difficult to inform the information subject one by one, we will take a reasonable and effective way to publish the announcement. At the same time, we will actively report the disposal of information security incidents in accordance with the requirements of regulatory authorities.

Please understand that due to the limitations of technology and risk prevention, even if we have tried our best to strengthen security measures, we can not always guarantee the 100% security of information. You need to know that the system and communication network you use to access our services may have problems due to conditions beyond our control.

 

5、 How to manage your information

1) Access, update, and delete

We encourage you to update and modify your information to make it more accurate and effective. You can access your information through our services, and complete or require us to modify, supplement and delete your information according to the management method of the corresponding information. We will take appropriate technical measures to ensure that you can access, update and correct your own information or other information provided when using our services.

When accessing, updating, correcting and deleting the above information, we may require you to authenticate to ensure information security.

2) Publicity and sharing

Many of our services allow you to publicly share your relevant information not only with your social network, but also with all users using the service, for example, the information you upload or publish in the service, your response to the information uploaded or published by others, upload or publish your personal information through e-mail or in a public area visible to unspecified users in the service, And include location data and log information related to these information. As long as you do not delete the information you have disclosed or shared, the relevant information may remain in the public domain; Even if you delete the shared information, the relevant information may still be independently cached, copied or stored by other users or third parties beyond our control, or kept in the public domain by other users or such third parties. If you disclose or share your information through the above channels, we will not be responsible for the disclosure of your information. Therefore, we remind you and ask you to carefully consider whether to disclose or share your information through the above channels.

3) Logout

In case of compliance with the conditions agreed in the service agreement for a single service and relevant national laws and regulations, your service account may be cancelled or deleted. After the account is cancelled or deleted, all service materials and data related to the account and under the single service will be deleted or processed according to the service agreement of the single service.

4) Change the scope of your authorization

You can always choose whether to disclose information. Some information is required to use the service, but most other information is provided at your discretion. You can change the scope of your authorization to continue collecting information or withdraw your authorization by deleting information, turning off device functions, etc.

After you withdraw your authorization, we cannot continue to provide you with the services corresponding to the withdrawal of your authorization, nor will we process your corresponding information. However, your decision to withdraw your authorization will not affect the previous information processing based on your authorization.

5) Tips for sensitive information

Some information may be considered sensitive due to its particularity, such as your race, religion, personal health and medical information, as well as identity documents, personal biometric information, property information, whereabouts, minor information, etc.

Please note that the content and information you provide, upload or publish in the service (such as photos or information about your social activities) may disclose your sensitive information. You need to carefully consider whether to use the service to disclose your sensitive information.

You agree that your sensitive information will be handled in accordance with the purposes and methods described in this privacy policy.

 

6、 Third party services

This service may be linked to social media or other services (including websites or other forms of services) provided by third parties. include:

(1) You can use the "share" button to share some content with other services, or you can use third-party services to log in to our services. These functions may collect your information (including your log information), so as to operate the above functions normally;

(2) We provide you with links through advertisements or other means of our services so that you can access the services or websites of third parties;

(3) Other access to third-party services.

Such third-party social media or other services are operated by relevant third parties. Your use of such third party's social media services or other services (including any information you provide to such third parties) must be bound by the third party's own terms of service and information protection statement (not this Privacy Policy), and you need to carefully read its terms. This privacy policy is only applicable to any information we collect, and does not apply to the services provided by any third party or the information use rules of any third party, and we will not assume any responsibility for any third party's use of the information provided by you.

 

7、 Age limit

We suggest that any minor should obtain the consent of his / her parents or legal guardian (hereinafter referred to as "Guardian") before participating in online activities. We will protect the relevant information of minors in accordance with relevant national laws and regulations.

We encourage parent

 

8、 Notices and amendments

We may modify the terms of this privacy policy from time to time, and such modifications form part of this privacy policy. For major changes, we will provide more significant notice, and you can choose to stop using our services; In this case, if you continue to use our services, you agree to be bound by the revised privacy policy.

Any changes will put your satisfaction first. We encourage you to review our privacy policy every time you use our services.

We may issue service related announcements when necessary (for example, when we suspend a service due to system maintenance). You may not be able to cancel these service-related announcements that are not promotional in nature.

Finally, you must keep your account and password information confidential. In any case, please keep it carefully.

 

9、 Permissions used by app

1. modify or delete the contents in the memory card

2. access to approximate location information (locate using the network)

3. camera

4. read the contents of the memory card

5. read mobile network information 

 

10 Description of the relevant third-party SDK used by the APP The third-party SDKs used by this application that collect personal information are:

com.tencent.stat,

com.tencent.smtt,

com.baidu.ocr,

Facebookreact,

Matisse

method and scope of the personal information collected by the SDK: com.com.tencent.stat: WeChat sharing, WeChat open platform. This SDK collects personal information to satisfy the third-party login of WeChat.

 

com.tencent.smtt: QQ login, Tencent browsing service. The behavior of this SDK to collect personal information is to satisfy the third-party login of QQ.

 

com.baidu.ocr: Baidu voice, Baidu text recognition. The behavior of this SDK to collect personal information is to satisfy the function of intelligent recognition of voice conversion into text and image conversion into text.

 

Matisse: Android picture selection framework. The behavior of this SDK to collect personal information is to satisfy the framework that uses the pictures in the local album for display when printing pictures.

 

Facebookreact: Integrated into the app, and the sdk:com used by the app has been included in the privacy policy facebook. React, this function will read the Android ID and perform the hot update of the application.

 

This privacy policy will take effect from April 1st, 2022.

档铺网——在线文档免费处理