“{{appName}}”Privacy Policy

Updated date: Oct 1, 2022

Effective date: Oct 1, 2022

Developer: Hangzhou Keyi Network Technology Co., Ltd.

This privacy policy will help you understand the following main policies:

1) In order to ensure the normal operation of the core functions and other functions of the product, we will collect some of your necessary information;

2) We will not share, provide, transfer or obtain your personal information from third parties unless you agree;

3) We will strive to take reasonable security measures to protect your personal information. In particular, we will adopt the methods common in the industry and do our utmost commercial efforts to protect the security of your personal sensitive information;

4) The way you access, correct, delete personal information, withdraw your consent and authorization, and complain and report.

If you disagree with this privacy policy and start using it, we will only collect the information necessary to maintain the basic functions of the "App", which will prevent us from providing you with complete products and services, but we will also use de-identification Measures such as encryption and encryption to protect this information. When you use it again, it is necessary to fulfill the contract and service, it will be deemed that you accept and approve that we will process your relevant information in accordance with this policy.

We attach great importance to the protection of users’ personal information, and will treat this information with diligence and prudence. When you download, install, open, browse, use (hereinafter collectively referred to as "use") "App" software and related services, we will collect, store, use, share, disclose and protect your personal information in accordance with this privacy policy. We hope to introduce to you our handling of your personal information through this privacy policy, so we recommend that you carefully and completely read all the terms of this privacy policy. Among them, the content related to your information and rights will be reminded in bold form. Please focus on the following content:

Ⅰ. How do we collect and use personal information

Ⅱ. Our use of cookies and similar technologies

Ⅲ. How do we store personal information

Ⅳ. How do we share, transfer, and publicly disclose personal information

Ⅴ. How do we protect the security of personal information

Ⅵ. Your Rights

Ⅶ. How to transfer the personal information of end users across borders

Ⅷ. Terms of use for minors

Ⅸ. Revision and notice of privacy policy

Ⅹ. Scope of application

Ⅺ. How to contact us

Ⅻ. Others


I. How do we collect and use personal information

When you use the "App" software and services, we will collect information in accordance with the principles of lawfulness, fairness and necessity. The information we collect or ask you to provide will be used to:

1). Guarantee the normal operation of the product foundation

2). Realize various functions and services;

3). Optimize and improve products and services;

4). Ensure the safety of products, services and users;

5). Provide you with advertisements, information, etc.;

6). Follow laws, regulations and national standards.

We will collect the information that you actively provide when you use the service, and the information generated during the use of the function or the process of receiving the service in the following ways:

1. Ensure the normal operation of "App" and services

When you use "App" and related services, in order to ensure the normal operation of software and services, we will collect your hardware model, operating system version number, network device hardware address (MAC), IP address, and software version number , Software installation list, network access method and type, operation log and other information, used to identify real users rather than plug-in software and machines when logging in and register, and used to advertise SDK to form feature tags to provide you with more relevant advertisements , Used to collect bug information generated by statistical applications, so that we can better improve our products. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of our products.

2. Register and log in

In order to improve the record of membership status, our product requires your mobile phone number to verify and log in. Its main purpose is:

(1) Provide you with better services through account management. By logging in to your account, you can synchronize your relevant information.

(2) If you provide a real and valid mobile phone number for binding, you can easily retrieve your account and password when you encounter the problem of losing your registered account or forgetting your password.

3. Permission description

Serial number Authority name method of obtaining Purpose of obtaining the permission
1 Access the web Get silently is used to obtain application content and ensure the normal use of core functions.
2 Storage permissions (access to photo album) Dynamic acquisition, user active authorization Export long screenshots to the photo album, upload pictures for collage
3 Screen recording permissions Dynamic acquisition, user active authorization Core functions for recording long pages and taking long screenshots

4. Other third-party statistical code information

(1) In the process of using our products, in order to reduce bugs affecting your use and improve user experience, we will upload behavior information and crash logs to Youmeng sdk for statistical detailed crash logs and behavior analysis.

(2) When you use our products, we use third-party services:

1) Umeng statistics (com.umeng, com.efs, com.ut.device)

Provider Name: Youmeng

Scene description: statistical functions for each dimension of App

Collection method: automatic collection by calling system-related interfaces

Types of personal information: Personal common equipment information, location information, network information, personal communication information

Personal information field: device information: IMEI/MAC address/Android ID/IDFA/Serial/OpenUDID/GUID/SIM card IMSI/IP geographic location, get SD card data information (read SDCard data/write SDCard data ( Create)), obtain device serial number, application information (obtain running process information, application crash information, notification switch status, software installation list related information), device parameters and system information (device type, device model, operating system and hardware, Device sensor data related information)

Network information: IP address, WiFi information, base station information and other related information

Use or purpose: for statistical detailed crash logs and behavior analysis

Is it necessary information: Yes

Information processing method: use anonymized method to desensitize and display personal information

Privacy Policy: https://www.umeng.com/page/policy

5. Ensure the safety of products, services and users

In order to help us better understand the operation of the "App" and related services, so as to ensure the safety of operation and service provision, we use third-party statistical tools to record network log information, as well as the frequency of using software and related services, crashes data, overall installation, usage, performance data, and more.

Please understand that when we collect and use the above information, we have de-identified/anonymized it, and data analysis only corresponds to specific codes that cannot be directly associated with user identities.

(1) Handling of changes in the purpose of collecting and using personal information

Please understand that with the development of our business, there may be adjustments and changes to the functions and services provided by the "App". In principle, when the app adds functions, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly or reasonably related to the original purpose, we will notify you again and obtain your consent when we collect and use your personal information.

(2) Personal information that is legally exempt from consent collection and use

Please understand that in the following situations, according to laws and regulations and/or relevant national standards, we do not need your authorization and consent to collect and use your personal information:

1) Directly related to national security and national defense security;

2) Directly related to public safety, public health, and major public interests;

3) Directly related to criminal investigation, prosecution, trial and execution of judgments;

4) In order to protect the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the consent of the individual;

5) The collected personal information is disclosed to the public by you;

6) Your personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;

7) Necessary to sign and perform a contract according to your request;

8) Other circumstances stipulated by laws and regulations.

(3) Instructions for account cancellation

1) You can find the account cancellation function in the personal center of the app and submit a cancellation application. The account cancellation will be completed within 7 days. During the application period, you can still use the current APP;

2) Once the account is canceled successfully, we will clear all the data of the current APP (including but not limited to your membership rights and all asset information in the App), and at the same time, you cannot use this account to register/log in to the current APP, and it cannot be restored;

3) During the application for account cancellation, if the manual customer service contacts you, please answer it in time to avoid the failure of the cancellation application.

Specially remind you that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information When or when we combine data that cannot be associated with any specific personal information with other your personal information, during the combined use, such information will be treated and protected as your personal information in accordance with this Privacy Policy.

II. Our use of cookies and similar technologies

Cookies and similar technologies are commonly used technologies on the Internet. When you use the "To do list" software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We may set cookies or anonymous identifiers for authentication and security to ensure the safe and efficient operation of products and services, help us improve service efficiency, and increase login and response speed.

3. How we store personal information

(1) Where the information is stored

In accordance with laws and regulations, we store your personal information collected and generated during domestic operations in legal and compliant locations.

(2) Storage period

We only retain your personal information for the period necessary for the purpose of providing the "App" and services. After the necessary period, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations Except as specified.

4. How do we share, transfer and publicly disclose personal information

(1) Sharing

Respect for user privacy is one of our basic principles. Except for the following circumstances, we will not share your personal information with any company, organization or individual:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information externally in accordance with the requirements of judicial or administrative agencies.

3. Sharing with related parties: Your personal information may be shared with our affiliated companies. We will only share necessary personal information and be bound by the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization and consent again.

4. Sharing with authorized partners: Only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and only share personal information necessary to provide services, for example, you must share your personal information with logistics companies when you purchase our products online information. Our partners have no right to use the shared personal information for any other purpose. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.


(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. Disclose the personal information you specify in the disclosure method you have explicitly agreed to.

2. When your personal information must be provided according to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information according to the required personal information type and disclosure method. Under the premise of complying with laws and regulations, when we receive the above request for information disclosure, we will require to issue corresponding legal documents, such as subpoenas or investigation letters.

3. Please understand that in the following situations, according to laws and regulations and/or relevant national standards, we do not need your authorization to share, transfer, or publicly disclose your personal information

(1) Directly related to national security and national defense security;

(2) Directly related to public safety, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and judgment execution;

(4) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain your consent;

(5) Personal information that you disclose to the public;

(6) Personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.

V. How do we protect the security of personal information

(1) We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or without authorization access, public disclosure, use, modification, damage, loss or disclosure.

(2) We will protect your personal information with reasonable and feasible means such as encryption technology and anonymization processing that are not inferior to those of industry peers, and use security protection mechanisms to prevent malicious attacks on your personal information.

(3) We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in due course.

(4) Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if you do your best to It is impossible to strengthen security measures, and it is impossible to always guarantee 100% security of information. We will try our best to ensure the security of the personal information you provide to us. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information.

(5) We will formulate an emergency response plan, and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (disclosure, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can independently Suggestions for preventing and reducing risks, remedial measures for you, etc. We will promptly inform you of the relevant circumstances of the incident by email, letter, text message, etc. If it is difficult to inform you one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

(6) We would like to remind you that the personal information protection measures provided in this Privacy Policy only apply to "App" software and related services. Once you leave the "App" and related services, browse or use other websites, services and content resources, we have no ability and obligation to protect any personal information you submit on software and websites other than the "App" software and related services, regardless of Whether you log in, browse or use the above-mentioned software and website based on the link or guidance of "App".

6. Your rights

We attach great importance to the management of your personal information, and do our best to protect your rights to access, modify (update or correct), delete and withdraw authorization and consent to your personal information, so that you have sufficient ability to protect your personal information. Privacy and Security.

(1) Manage and revoke authorization of your information

You can withdraw your consent, change the scope of your authorization to continue collecting personal information or withdraw your authorization by turning off functions, changing application permissions in device settings, etc. Please understand that specific business functions and services will require your information to be completed. After you withdraw your consent or authorization, we will not be able to continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.

(2) Access Privacy Policy

You can view the entire content of this privacy policy in "My"--"Settings"-"Privacy Policy" in the client.

(3) Stop operations and inform you of your rights

If we stop operating, we will stop collecting your personal information in a timely manner, notify you of the notice of cessation of operation in the form of delivery or announcement one by one, and delete or anonymize your personal information held deal with.

7. How to transfer personal information of end users across borders

The personal information of end users collected by us will be stored in China. If cross-border is involved, we will strictly follow the laws and regulations, carry out data export security assessment and ensure the security of personal information of end users.

VIII. Terms of Use for Minors

If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using the "App" software and related services.

We protect the personal information of minors in accordance with relevant national laws and regulations, and will only collect, use, share or disclose minors when the law permits, with the explicit consent of parents or other guardians, or when it is necessary to protect minors If we find that we have collected personal information of minors without prior verifiable parental consent, we will try to delete the relevant information as soon as possible.

If you are the guardian of a minor, when you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information published in this privacy policy.

9. Revision and notice of privacy policy

(1) In order to provide you with better services, the "App" software and related services will be updated and changed from time to time, and we will revise this Privacy Policy in due course, which constitutes a part of this Privacy Policy and has the same meaning as this Privacy Policy Effect of Privacy Policy. However, without your explicit consent, we will not reduce your rights under the currently effective Privacy Policy.

(2) After this privacy policy is updated, we will remind you of the updated content in an appropriate way on the "App" application client before the updated terms take effect, so that you can keep abreast of the latest version of this privacy policy Version. If you continue to use our services, you agree to accept the revised content of this policy. However, if the updated content requires the collection of sensitive personal information such as audio and video, contact information, and geographic location, your consent will still be sought in a prominent manner.

(3) For major changes, we will also provide more prominent notices (we will use methods including but not limited to emails, text messages, private messages, or special reminders on browsing pages to indicate that there are changes to the privacy policy, please re-read carefully).

Major changes referred to in this Privacy Policy include but are not limited to:

1. Major changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;

2. We have undergone significant changes in ownership structure, organizational structure, etc. Such as business adjustments, bankruptcy mergers and other ownership changes;

3. The main objects of personal information sharing, transfer or public disclosure have changed;

4. Significant changes have occurred in your right to participate in the processing of personal information and how to exercise it;

5. When there is a change in our responsible department, contact information and complaint channels responsible for handling personal information security.

10. Scope of application

This privacy policy applies to all services provided by the company and its affiliates, including "App" clients, websites, etc., and does not apply to third-party products that have separate privacy policies and are not included in this privacy policy or service.

This Privacy Policy does not apply to:

1. Other third-party products or services, which may include products or websites and advertising content displayed to you, or other products or websites linked to in the "App" service;

2. Other third parties who advertise for the "App" service.

Your use of these third-party services (including any personal information you provide to these third parties) will be governed by the terms of service and privacy policies of these third parties (not this Privacy Policy), please read carefully the specific provisions Tripartite terms. Please properly protect your personal information and only provide it to third parties when necessary.

The "App" and related services described in this Privacy Policy may vary depending on factors such as the mobile phone model, system version, and software application version you use. The final products and services are subject to the "App" software and related services you use.

11. How to contact us

1. If you have any questions, comments or suggestions about the content of this privacy policy, you can send an email to 1404556846@qq.com to contact us.

2. If you think that we have collected and used your personal information in violation of laws and regulations or our agreement with you, you can also contact us by email (1404556846@qq.com) and request to delete your personal information. related personal information. We promise to confirm the problems involved within 15 working days, and we will reply and deal with them in a timely manner after verifying your user identity.

Twelve, others

(1) The titles in this "Privacy Policy" are for convenience and reading only, and do not affect the meaning or interpretation of any provision in this Privacy Policy.

(2) Definition of related terms in this "Privacy Policy":

1. "App" software and related services refer to the client application programs legally owned and operated by the company and its affiliates and marked with the name "App"

2. Affiliated parties refer to any company, institution, and legal representative of the above-mentioned company or institution that is currently or in the future controlled, controlled, or under joint control by one party. "Control" means the possession, directly or indirectly, of the ability to affect the management of the company in question, whether through ownership, voting shares, contracts, or otherwise as legally determined.

3. De-identification refers to the process of technically processing personal information to make it impossible to identify the subject of personal information without additional information.

4. Anonymization refers to the process of technically processing personal information so that the subject of personal information cannot be identified and the processed information cannot be restored.

Company: Hangzhou Keyi Network Technology Co., Ltd.

Customer service hours: 9:30-18:00 (weekdays only)