Privacy Policy

This product is a service product provided by the company. The company is well aware of the importance of personal information and data to users, so it will respect and protect your personal information and privacy in accordance with laws and regulations. I hope you will read and understand this privacy carefully before using this product and related services. policy in order to make appropriate choices. The content of this Privacy Policy applies only to user information and data collected and stored by this product. When you check the \"I have read and agree\" button in the process of using the product service, it means that you have carefully read and expressly agree to abide by the content of this privacy policy and all relevant terms and guidelines incorporated by reference, and are subject to Constraints on the corresponding content.

We will collect and use your information in accordance with the Privacy Policy, but will not collect personal information in a bundled manner just because you agree to this Privacy Policy

When you use or enable related functions or use services, we will collect and use relevant information for the realization of functions and services. Unless it is necessary to achieve basic business functions or required by laws and regulations, you can refuse to provide it without affecting other functions or services.

If you do not log in to your account, we will use the identifier information corresponding to the device to ensure basic functions such as information push. If you log in to your account, we will implement basic functions such as information push based on your account information. The following content will help you understand in detail the issues related to personal information and data involved in the use of this product and related services before and during the use of the user

1. How we collect and use personal information

We will collect the information you actively provide when using the service, and collect the information generated during the process of using or receiving the service through automated means in the following ways

1.1 Registration and login use

a. When you use this product and related services after registration and login, the collection of information (such as avatar, nickname, mobile phone number, etc.) is to help you complete registration and later modify and improve account information.

1.2 Use without login account

a. When using the product and related services without logging in to the account, the collection of information (identifier information corresponding to the device, IP, etc.) is to ensure the use of the basic functions of the product.

1.3 Safe operation

1.3.1 Security function

We are committed to providing you with safe and reliable products and use environments, and providing high-quality and reliable services is our core goal. The information collected in order to realize the security function is necessary information.

1.3.2 Device Information and Log Information

a. In order to ensure the safe operation of software and services, we will collect your hardware model, operating system version number, end user's hardware model, operating system version, device configuration, unique device identifier, International Mobile Equipment Identity Code IMEI, device MAC address, IMSI, device serial number, network device hardware address, IP address, WLAN access point, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service logs, etc. information. And there is a background state or a silent state to collect appeal information, we will encrypt the appeal information to improve the protection of privacy.

b. In order to prevent malicious programs and necessary for safe operation, we will collect installed application information or running process information. For example, to retrieve whether you have installed the WPS App, if it is, jump directly to the App to display the document content. c. You hereby solemnly confirm and agree that: we can use your account information, device information, service log information, and information that our affiliates and partners can share with your authorization or in accordance with the law to judge account security and identify Verify, detect and combat black production, detect and prevent security incidents.

1.4 Others

1.4.1 In order to provide corresponding services according to your network status, we need to check your current network status, connect to and disconnect from the WLAN network, and check the on and off status of WLAN.

1.4.2 We will create an APP icon of this product on your desktop when you install this product, and delete the APP icon of this product on your desktop when you uninstall it;

1.5 Changes in the purpose of collecting and using personal information

Please understand that with the development of our business, the functions of this product and the services provided may be adjusted and changed. In principle, when the new function or service is related to the function or service currently provided by us, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly or reasonably related to the original processing purpose, we will notify you again when we collect and use your personal information and obtain your consent.

1.6 Personal information exempted by law from the collection and use of consent

Please understand that in the following cases, in accordance with laws and regulations and relevant national standards, we do not need your authorization and consent to collect and use your personal information: a. It is directly related to national security and national defense security; b. It is related to public security, Directly related to public health and major public interests c. Directly related to criminal investigation, prosecution, trial and execution of judgments; d. In order to protect the life and property of the personal information subject or other individuals, but it is difficult to obtain the personal information Consent; e. Your personal information collected is disclosed to the public by you; f. Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels; g. Necessary for signing or performing a contract according to your requirements h. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and disposing of software and related service failures; Necessary for legitimate news reports; j. When it is necessary for an academic research institution to conduct statistical or academic research based on the public interest, and when providing the results of academic research or description, it de-identifies the personal information contained in the results; k. Other situations stipulated by laws and regulations .

2. Use of Cookies and Similar Technologies

Cookies and similar technologies are commonly used technologies on the Internet. When you use this product and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you visit and use this product. We promise not to use cookies for any purpose other than those described in this Privacy Policy. We use cookies and similar technologies mainly to achieve the following functions or services

2.1 Ensure the safe and efficient operation of products and services

We may set authentication and security cookies or anonymous identifiers that allow us to confirm that you are securely logged into the Services, or have experienced theft, fraud and other wrongdoing. These technologies will also help us improve service efficiency and improve login and responsiveness.

2.2 Helping you get an easier access experience

2.3 Personalized Recommendations

a. We may use cookies and similar technologies to understand your preferences and usage habits, conduct data analysis to improve product services, recommend information or functions that users are interested in, and optimize your choice of advertising. b. We may use cookies to record browsing activities to recommend information to you, troubleshoot crashes, delays, and explore better service methods

2.4 Clearance of cookies

The mobile application management function supports clearing application data, and you can perform the corresponding data clearing operation in the setting function. If you clear it, you may not be able to use the services or corresponding functions provided by the company that rely on cookies due to these modifications.

3. How we share, transfer, and publicly disclose personal information

3.1 Sharing

3.1.1 Sharing principle

a. Principle of Authorization and Consent: Sharing your personal information with our third parties requires your authorization and consent, and the shared personal information is de-identified information or natural persons who cannot be identified by a third party. information, unless our affiliates share necessary personal information and are bound by the purposes stated in this Privacy Policy. If related parties and third parties use information for purposes beyond the scope of the original authorization and consent, they need to obtain your consent again. b Principles of legality and minimum necessity: The data shared with related parties and third parties must have a legitimate and legitimate purpose, and the shared data shall be limited to the extent necessary to achieve the purpose. C. Security and prudence principle: We will prudently assess the purpose of related parties and third-party data use and shared information, conduct a comprehensive assessment of the security assurance capabilities of these partners, and require them to follow the cooperation legal agreement. We will conduct strict security monitoring on the software tool development kits (SDKs) and application programming interfaces (APs) used by partners to obtain information to protect data security.

3.1.2 Shared information for implementing functions or services

a. We will de-identify when you use the functions provided by our affiliates, third parties in this product, or when software service providers, smart device providers, system service providers and us jointly provide services for you The transformed personal information and the information of natural persons who share such information cannot be identified by third parties are shared with these related parties and third parties, comprehensive statistics are carried out, and characteristics and preferences are analyzed through algorithms to form indirect crowd portraits, which can be used to provide you with information. Recommend, display or push information that may be of interest to you, or push specific functions, services or commercial advertisements that are more suitable for you Your nickname, avatar and account balance, de-identified pud and cid are shared with the third-party products you log in to.

3.1.3 Realize shared information related to advertising

a. Advertising push: We may share information with partners who entrust us for promotion and advertising, but we will not share information (name, ID number) used to identify you personally, and will only provide these partners with information that cannot be Indirect portrait tags that identify your personal identity and de-identified or anonymized information to help them improve the effective reach rate of advertisements without identifying your personal identity. b. Advertising statistics: We may share analytical de-identified statistical information with service providers, suppliers and other partners of our business, which is difficult to associate with your identifiable information. This information will help us analyze, measure advertising and related Availability of Services.

3.1.4 Implementing shared information for security and analysis statistics

a. Safeguarding use: We attach great importance to account and service security. In order to protect the account and property safety of you and other users, and protect your and our legitimate rights and interests from illegal infringement, we and affiliated companies or service providers may share Necessary equipment, account and log information b. Analysis of product usage: In order to analyze the usage of our services and improve the user experience, the statistics of product usage (crash, flashback) may be shared with related parties or third parties data that cannot be combined with other information to identify you personally. 3.1.5 Helping you to participate in marketing promotion activities When you choose to participate in relevant marketing activities organized by us and our affiliates or third parties, you may be required to provide your name, mailing address, contact information, and bank account information. This information is sensitive personal information, and refusal to provide it may affect your participation in related activities, but will not affect other functions. Only with your consent, we will share this information with affiliates or third parties to ensure that you receive services with a consistent experience in joint activities, or entrust a third party to cash rewards to you in a timely manner.

3.2 Transfer

a. We will not transfer your personal information to any other third party without your express consent. b. With the continuous development of our business, we may carry out mergers, acquisitions and asset transfers, and your personal information may be transferred accordingly. In the event of the aforementioned changes, we will require the successor to protect your personal information in accordance with laws and regulations and the security standards not lower than those set out in this Privacy Policy, otherwise we will require the successor to obtain your authorization and consent again.

3.3 Disclosure

a. We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. When we publicly disclose your personal information, we will adopt security protection measures that comply with industry standards. b When we announce penalties for illegal accounts and fraudulent behaviors, we will disclose the information of relevant accounts.

3.4 Personal information that is exempted from consent to sharing, transfer and public disclosure according to law

Please understand that in the following cases, according to laws, regulations and national standards, we do not need your authorization and consent to share, transfer and publicly disclose your personal information: a. It is directly related to national security and national defense security; b. It is related to public Directly related to safety, public health, and major public interests C. Directly related to criminal investigation, prosecution, trial and execution of judgments; d. To protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain With my consent, e. personal information you disclose to the public on your own; f. personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

4. How we store personal information

4.1 Storage location

In accordance with the provisions of laws and regulations, we store your personal information collected and generated during domestic operations in the territory of the People's Republic of China. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow relevant national regulations or seek your consent.

5. How we protect the security of personal information

a. We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or unauthorized. Access, public disclosure, use, modification, damage, loss or leakage b. We will use encryption technology, anonymization processing and related reasonably feasible means that are no less than industry peers to protect your personal information, and use security protection mechanisms to prevent you personal information has been maliciously attacked. c. We will establish a special security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data usage and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner. d. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security It is not always possible to ensure that information is 100% secure, and we will do our best to ensure the security of the personal information you provide to us. e. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others. f. We will formulate emergency response plans, and immediately activate emergency plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. once it happensAfter a user information security incident (leakage, loss), we will promptly inform you of the basic situation and possible impact of the security incident in accordance with the requirements of laws and regulations, the disposal measures we have taken or will take, and you can prevent and reduce risks on your own. advice, remedies for you. We will promptly notify you of the relevant information of the event by means of push notifications, emails, letters, text messages and other related forms. When it is difficult to inform you one by one, we will publish announcements in a reasonable and effective manner. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities. g Once you leave this product and related services, browse or use other websites, services and content resources, we will not have the ability and direct duty to protect any personal information you submit in software and websites other than this product and related services, regardless of Whether you log in, browse or use the above software or website is based on the link or guidance of this product.

6. Manage your personal information

We attach great importance to the management of your personal information, and do our best to protect your rights to query, access, modify, delete, withdraw consent and authorization, cancel your account, make complaints and set up privacy functions, so as to enable you to have the ability to Protect your privacy and information security.

6.1 Autonomous and controllable information received

a. You decide to receive push messages independently, and you can choose whether to accept or not to receive notifications through the system settings of your mobile phone. b Programmatic advertising information: Programmatic advertising is one of the advertising display technologies, and advertisers make intelligent recommendations based on your preferences in their apps. This product only provides programmatic advertising docking technology, and will not obtain your behavior or personal data in other applications

6.2 Changing or reverting authorization settings and reverting and processing of information

6.2.1 Change or revoke sensitive permission settings

You can turn off GPS location, address book, camera, microphone, and album permissions in the device's own operating system to change the scope of consent or withdraw your authorization. We will no longer collect information related to these permissions after the authorization is withdrawn

6.2.2 Change or return authorized information processing

Certain business functions and services will require your information to be completed. When you withdraw your consent or authorization, we will not be able to continue to provide you with the functions and services corresponding to the withdrawal of your consent or authorization, nor will we process your corresponding personal information. . However, your decision to withdraw your consent or authorization will not affect the company's previous processing of personal information based on your authorization.

6.3 Access, delete, correct your personal information

aAccess personal account information: You can inquire, access, and correct your avatar, username, gender, region, etc. b. You are specially reminded that for security and identity recognition (such as number appeal service) considerations, you may not be able to voluntarily modify some of the initial registration information submitted during registration. If you really need to modify such registration information, please contact us according to the contact information set out in this Privacy Policy.

6.4 Cancellation of account

You can follow the logout process or contact customer service to help you complete the logout. Before you cancel your account, we will verify your personal identity, security status, device information, etc. For the logout process and content, please refer to the logout page tips. You know and understand that the act of canceling your account is irreversible. After you cancel your account, we will delete your relevant information or anonymize it within 20 days, unless otherwise provided by laws and regulations

6.5 Complaints and reports

You can make a complaint or report in accordance with our publicized system. If you think your personal information rights may be infringed, or find clues about infringing your personal information rights (for example, you think that our collection of your personal information violates the law or the agreement between the parties), you can contact us. We will promptly feedback your complaints and reports after verification.

6.6 Access Privacy Policy

1. When you install this product for the first time, you can click [Privacy Policy] on the pop-up page to view 2 More pages - "Privacy Policy", you can also view the entire content of this Privacy Policy 3 Please understand that the terms described in this Privacy Policy "This product" and related services may vary according to the mobile phone model, system version, software application version, mobile client and other factors you use. The final products and services are subject to your use of the "this product" software and related services. 6.7 Stop operation and inform you that if we stop operation, we will stop collecting your personal information in a timely manner, notify you of the stop operation one by one or in the form of an announcement, and delete your personal information that we hold. or anonymized.

7. Minors Clause

7.1. If you are a minor under the age of 18, before using this product and related services, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians. 7.2. We protect the personal information of minors in accordance with the relevant national laws and regulations, and will only collect, use, store, share, transfer or disclose when permitted by law, with the explicit consent of parents or other guardians, or when it is necessary to protect minors Personal information of minors; if we become aware that personal information of minors has been collected without prior verifiable parental consent, we will seek to delete the relevant information as soon as possible. 7.3. If you are the guardian of a minor, when you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information published in this privacy policy of the company.

8. Amendments and Notices of Privacy Policy

8.1 We may revise the contents of this Privacy Policy from time to time in accordance with the requirements of laws and regulations or the needs of business operations. Unless otherwise specified, any changes or modifications will take effect immediately upon the release of the revisions to this product, and your use and continued use of this product will indicate your acceptance of such changes or modifications.

8.2 If you do not agree with all the provisions of this Privacy Policy (including any revisions we may make to it or other rules cited therein from time to time), please do not use this product and related services, or you can voluntarily cancel the subscription of this product. Use and Related Services.

8.3 In order to facilitate your understanding of the terms and conditions applicable to your use of this product, we will post our modifications to this agreement on this product, and you should review this Privacy Policy and other rules and content incorporated by reference from time to time .

9. Contact us

If you have any questions, comments or suggestions about the content of this privacy policy or the protection of personal information, you can contact us through the contact information in the product, and we will give feedback and communicate in time after checking and verifying your user identity

10. Applicable Laws and Dispute Resolution

The interpretation, performance and dispute resolution of this Privacy Policy shall be governed by the laws of the People's Republic of China. During the implementation of the policy content, all disputes and disputes arising from or related to this Privacy Policy shall be resolved through consultation by the parties. If the negotiation fails, either party may file a lawsuit with the local people's court.

11. Supplementary Provisions

If any provision of this Privacy Policy is invalid or unenforceable in whole or in part for any reason, the other provisions of this Privacy Policy shall remain in effect. Matters not covered in this Privacy Policy shall be handled in accordance with relevant Chinese laws, regulations, relevant business regulations of each information provider and the User Registration Agreement that you agree to when registering on this website/APP. If you need to formulate supplementary privacy policy content, its legal effect is the same as this privacy policy. If this Privacy Policy is not updated by the Company, after you confirm your agreement and sign this Privacy Policy, its effect will apply to all your actions at this time and in the future. This privacy policy will be signed electronically, and the content will take effect after you click "Agree and enter the next step.";