Privacy policy
Updated at 2023-5-19
Effective time :2023-5-19
1. The information we collect
1.1 Information Collection
In the process of your use of such products and services, we will collect the information provided by or generated by your use of the Services in the following ways, so as to provide you with services, optimize our services and ensure the security of your account:
In order to protect the basic security of your account, network access and service, we need to call your device's telephone rights and we need to collect your unique device identifier (IMEI)
IMSI, MEID(which will be obtained after you agree to the privacy policy popup after launching the APP), IDFA, OAID, UUID(IDFV), unique identifier obtained by algorithm), phone system language, country, city, IP address, MAC address (collected when APP is launched), device information (browser type, device type and model, CPU, system language, memory, operating system version, Wi-Fi status, time stamp and region, device motion parameters and carrier), your network behavior track (including the number of clicks, participation time), installed APP information (obtained when the APP is running in the foreground or background), running process information (obtained when the APP is running in the foreground or background)
), acceleration sensor, software installation list, access date and time, and service log information. We will combine the above information with the information you provide when using the login service (including: network type, IMSI, network address, carrier type, local number, international mobile subscriber Identity, SIM card number, mobile device type, mobile operating system and hardware manufacturer). The information you provide will change depending on the carrier you belong to. You can query [third-party list] for confirmation), information provided during payment and settlement service (including device brand, device model, device name, IP address, MAC address (collected upon APP startup), device software version information, device identifier (IMEI, IDFA, OAID), and location for data analysis. By providing the first information and agreeing to the User Registration Agreement and this Policy, you may use the relevant functions of this APP. If you choose not to provide the necessary information for realizing the basic business functions of the APP or for using one of the functions. Will cause us to be unable to provide service to you.
To ensure service reliability, stability, and security, you need to collect information about your device model, operating system version, browser type, language, network access mode, IP address, and access time. We collect the above information from you to ensure the reliability and stability of application operation. Since you cannot turn off the permission to collect the above data, if you do not provide such information, you will not be able to use our services.
We or our third party partners may collect your information, including your device information, browsing information and clicking information, through cookies or similar technologies, and store the information as log information for remembering your identity, analyzing your use of our services and optimizing our services. You can set up your browser to reject or manage the use of cookies or similar technologies. At the same time, we will also use the third-party SDKSDK/ to collect and use the above information. We collect your above information to ensure the reliability and stability of application operation, improve and optimize your service experience and ensure the security of your account. Because you cannot turn off the permission to collect the above data, if you do not provide such information, you will not be able to use our services.
In order to provide you with one-click sharing service, our product integrates with Alliance +U-Share SDK, which will collect your device ID information (IMEI/MAC address/device hardware location)
Address//OpenUDID/GUID/SIM card IMSI/location) and you need to share account of the social public information, in order to complete a key sharing service. For the sake of your information security, we have made data security and confidentiality agreements with third-party SDK service providers, and these companies will strictly abide by our data privacy and security requirements. We will not share your personally identifiable information with them unless we have your consent.
111 Circumstances in which we collect and use your personal information in Basic Business Functions
(1) Complete registration
When you register as a foreign language translator, we need to collect your mobile phone number, email address and login password. We collect your above information to help you register your account as a foreign language translator and protect your account security. If you do not provide such information, we will not be able to create an account for you and provide you with normal services. You may also choose to provide us with your avatar, nickname, or bind your wechat account according to your own needs to improve your personal information or increase the login convenience of your account. However, if you do not provide such information, your normal use of our services will not be affected.
(2) Document reading and management
If you are an Android user, when you scan and store documents. Read and delete operations when we need to invoke your device store, all document access and clipboard permissions. We invoke the above permission to help you complete the reading, management, search, naming and content editing of documents. Except for the documents taken by you and selected by yourself, we will not process other documents in your storage space. If you do not agree to our invoking the above permission, you may not be able to complete the reading and management of documents and therefore cannot normally use our services.
2. Storage of information
21 Information storage mode and duration
We will store your information in a secure way, including local storage (e.g. using APP for data caching), database and server logs.
Under normal circumstances, we will only store your personal information for such a period of time as is necessary to achieve the purpose of the service or as required by laws and regulations.
2.2 Information storage area
We will store users' personal information collected in accordance with laws and regulations.
We do not transfer or store your personal information across borders. If cross-border transmission or storage is required in the future, we will inform you of the purpose of leaving the information, the recipient, security guarantee measures and security risks, and obtain your consent.
23 Notification when the product or service ceases operation
When our products or services stop operation, we will notify you in the form of APP notice or announcement, and delete your personal information or anonymize it within a reasonable period, unless otherwise stipulated by laws and regulations.
3. Information security
31 Security Protection Measures
We strive to provide security for users' information security to prevent information disclosure, loss, improper use, unauthorized access and disclosure. We use multi-directional security protection measures to ensure that users' personal information protection in a reasonable level of security, including technical protection means, management system control, security system protection and many aspects.
We use industry-leading technology protection measures. The technical means we use include, but are not limited to, firewalls, encryption (such as SSL), de-identifications or abatement, and access control measures. In addition, we have established a special management system, process and organization to ensure the security of personal information. For example, we strictly limit the scope of people who can access information, require them to comply with confidentiality obligations and conduct audits, and those who violate those obligations will be punished according to the regulations. We also review our management systems, processes and organizations to prevent unauthorized access, use or disclosure of user information.
We suggest that you pay full attention to the protection of personal information when using products and services. We also provide a variety of security functions to help you protect your personal information.
3.2 Security Event Handling Measures
In case of personal information leakage, damage, loss of security events, we will start the emergency plan, Yin stop security events expand. After a security incident occurs, we will promptly inform you of the basic information of the security incident, the measures and remedies we will take or have taken, as well as our suggestions for you. If it is difficult to inform you one by one, we will release the police message through an announcement.
4.1 Information Usage Rules
We will use the collected information as follows:
We will provide you with various functions and services according to the information we collect, including content browsing service, welfare check-in function, voice and video production function;
We will analyze the operation of our products according to the frequency and situation of your use of products, fault information and performance information, so as to ensure the security of services, optimize our products and improve the quality of our services.
We do not combine the information we store in our analytics software with the personally identifiable information you provide.
4.2 Ways to obtain consent after notifying the purpose of change
We will use the information collected for the purposes covered in this Privacy Guide. If we use your personal information beyond the scope that is directly or reasonably related to the purpose stated at the time of collection, we will inform you again and obtain your express consent before using your personal information.
5. Offer it externally
We will not take the initiative to share or transfer your personal information to a third party. If there is any other sharing or transfer of your personal information or you need us to share or transfer your personal information to a third party, we will directly or confirm that the third party has obtained your express consent for the above behavior.
We will not publicly disclose the personal information we collect, if it is necessary to do so. We will inform you of the purpose of this public disclosure, the type of information disclosed and the sensitive information that may be involved, with your express consent.
As our business continues to develop, we may conduct mergers, acquisitions or asset transfers. We will inform you of the relevant situations and continue to protect your personal information in accordance with laws and regulations and standards no lower than those required by this Privacy Protection Policy or require new controllers to continue to protect your personal information.
In addition, according to relevant laws, regulations and national standards, we may share, transfer and publicly disclose personal information without prior consent of your authorization under the following circumstances:
Directly related to national security and national defense security:
Those directly related to public security, public health or major public interests; Those directly related to the investigation, prosecution, trial and execution of judgments of crimes;
In order to protect the major legal rights and interests of the subject of personal information or other individuals' life and property, but it is difficult to obtain the consent of the person;
The subject of personal information discloses personal information to the public on its own;
Collecting personal information from legally publicly disclosed information, such as legal news reports through government information disclosure channels.
6. Your rights
During your use of our products and services, we may provide you with corresponding operation Settings based on the specific circumstances of the products, so that you can query, delete, correct or withdraw your relevant personal information and cancel your account. You may refer to the specific instructions of the corresponding products for operation. In addition, you can also contact us through the contact information in Section 9 to submit you.
7 .Change
We may revise this privacy policy in due time, and we will notify you of the changes through the APP. The latest privacy policy can be found in our products. Please read the changed privacy policy carefully. If you continue to use our products, you agree that we will handle your personal information in accordance with the updated privacy policy.
8. Protection of minors
We attach great importance to the protection of minors' personal information. We will require minors under 14 years old to obtain prior authorization from their guardians (such as their parents) before using the services of our products or providing us with personal information in accordance with relevant laws and regulations: minors over 14 years old and their husbands over 18 years old may obtain prior authorization from their guardians or authorize their own consent.
We use, provide or publicly disclose this information only when it is permitted by law and regulations, with the express consent of the minor's guardian or when it is necessary to protect the minor.