Privacy Policy

Updated date: April 25, 2023

Effective date: April 25, 2023

Harbin Widget (hereinafter referred to as "this product" or "this application"). This statement applies only to this product. If you have any questions, comments or suggestions, please contact us through the following contact information: dpfeedback@163.com.

Hefei Douscreen Technology Co., Ltd. (hereinafter referred to as "we"), as the operator of this application, knows the importance of personal information to you, and will do our best to protect your personal information safe and reliable. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: the principle of consistent power and responsibility, the principle of clear purpose, the principle of choice consent, the principle of least enough, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. . At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry.

Before using this application and related services, please be sure to carefully read and fully understand the contents of each clause, especially the corresponding clauses of exemption or limitation of liability, as well as the separate agreement for opening or using a certain service, and choose to accept or not. Restrictions and disclaimers may be bolded and underlined to remind you.

If you do not expressly agree to this privacy statement and start using it, we will only collect information necessary for the operation of this application software, which will cause us to be unable to provide you with complete products and services, but we will also use de-identification, encryption and other measures to protect this information. We will provide you with corresponding services after obtaining your consent and acceptance. When you choose to continue or use it again, based on the necessity of providing products and services, it will be deemed that you accept and approve that we will process your relevant information in accordance with this statement. In order to provide you with better services, we will update the terms of this policy according to product updates and relevant requirements of laws and regulations, and this update constitutes a part of this policy. When the privacy agreement changes after you use it, we will notify you in the form of information push. If you continue to use our services, you need to carefully read the changed agreement. You have the right not to accept the revised agreement, and you should stop using the software or services provided by this application.

In the event of any violation of this agreement by you, we have the right to unilaterally restrict, suspend or terminate the provision of this service to you at any time according to the violation, and have the right to pursue your relevant responsibilities.

If you are under the age of 18, please read this agreement and other above-mentioned agreements accompanied by your guardian, and obtain the consent of your parent or legal guardian in advance. If you are the guardian of a minor, when you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information stipulated in this Privacy Policy.

The Privacy Statement will help you understand the following:

· 1. How we collect and use personal information

 

· 2. How do we store personal information

 

· 3. Use of cookies and similar technologies

 

· 4. How do we share, transfer and publicly disclose personal information

 

· V. How do we protect the security of personal information

 

· 6. Your rights

 

· 7. Scope of application

 

· 8. Others

 

· 9. How to contact us

 

1. How we collect and use personal information

1. Personal information we collect

We will collect information that you actively provide when using the service, as well as information that you generate during the use of functions or acceptance of services through automated means, in the following ways:

(1) Product security protection function: In order to protect your account security and system security, we need to obtain your device MAC address, device serial number, IMSI, Android ID, IP address, hardware model, operating system version number, and unique device identifier character (IMEI, etc.), network device hardware address (MAC), software version number, network access method, type, status, network quality data, operation log, hardware serial number, and service log information.

①Our products are integrated with Youmeng+SDK, and Youmeng+SDK needs to collect your device MAC address, unique device identification code (IMEI/ANDROID ID/IDFA/OAID/OPENUDID/GUID, SIM card IMSI information) to provide statistical analysis services , and calibrate the accuracy of report data through geographic location to provide basic anti-cheating capabilities. (In order to improve user experience, Youmeng SDK may obtain your above information asynchronously in the "background state")

 

②For your convenience, after you start the APP and agree to the "Privacy Policy", we need to collect your device information (Android ID, IMEI, OAID) as your unique anonymous identifier for using our services, and this information adopts MD5 Encrypted transmission and storage, anonymized processing will not reveal your personal information. Please note: The collected device information is information that cannot identify a specific natural person. Unless authorized by you or otherwise stipulated by laws and regulations, device information collected by this app will only be used to identify you as a user of this app.

The above functional permissions are all necessary permissions to use the corresponding product functions and services. If you do not grant the corresponding permissions, you will not be able to use the relevant functions, but it will not affect the use of other functions, nor will it affect your use of basic business functions.

If you agree to provide your sensitive personal information (*), you agree that we will process your sensitive personal information in accordance with the purposes and methods described in this agreement.

*Personal sensitive information refers to personal information that, if leaked, illegally provided or misused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. For example, personal sensitive information includes ID number, personal biometric information, bank account number, communication content, health and physiological information, etc. The content contained in "personal information" or "personal sensitive information" in this privacy policy comes from GB/T35273 "Personal Information Security Specification", and the definition is consistent with the definition in "Personal Information Security Specification".

(2) This application account (login, logout)

This application currently supports third-party account login or mobile phone number login:

①When you use WeChat or QQ to log in to this application, we will obtain the nickname and avatar of the account and the unique OpenID of the third party through the open interface services provided by WeChat and QQ; if you log out of this account, we will clear the account all information.

 

②When you log in with the verification code of your mobile phone number or one-click login with your own phone number, we will collect your mobile phone number; if you log out of this account, we will clear all the information of the account. Please note: We will encrypt and store the mobile phone number, and the display will be anonymized by adding *, such as 123****2222. [If you do not have a mobile phone number to log in to this product, please ignore this message]

(3) Functions related to this application

Where you give feedback on taking pictures, using tools and other related functions, you may need to authorize sensitive permissions such as photo albums. Refusing to provide them will only make you unable to use this function, but it will not affect your normal use of other functions of this application.

2. To provide you with related services of this application

When you use the relevant functional services of this application, we may request the following permissions from your terminal device:

[ Physical activity recognition authority ]:

Record steps component requires permission

 

 

Modify/Delete External Storage :

Store local wallpaper and component related resources

 

Read phone status and identity :

During your use of this application, in order to understand the app’s adaptability and crash logs and provide you with a better experience, the third-party application statistics service of this application may collect your unique device identifier to record your identify you, analyze your use of this application, and identify you as a user of this application. In addition, your usage may be collected and stored as web log information, including:

Device information DEVICE_ID: This application will receive and record information about the device you use (including device model, operating system version, login IP address, operation log, regional distribution, operation quotient and other characteristic information).

Please note: Collecting device information is information that cannot identify a specific natural person.

Unless authorized by you or otherwise stipulated by laws and regulations, device information collected by this app will only be used to identify you as a user of this app.

APP will not collect personal usage habits, browsing records, user-targeted push and precision marketing

 

[ Allow the application to start discovering devices or setting the Bluetooth function ]:

Part of the x-panel in the app needs to get the Bluetooth device information of the mobile phone

 

 

 

[ Allow installation of apps from unknown sources ]:

Allow this product to update automatically

 

Read phone status and identity :

During your use of this application, in order to understand the app’s adaptability and crash logs and provide you with a better experience, the third-party application statistics service of this application may collect your unique device identifier to record your identify you, analyze your use of this application, and identify you as a user of this application. In addition, your usage may be collected and stored as network log information, including: device serial number,

Device information DEVICE_ID: This application will receive and record information about the device you use (including device model, operating system version, login IP address, operation log, regional distribution, operation merchant feature information).

Please note: Collecting device information is information that cannot identify a specific natural person.

Unless authorized by you or otherwise stipulated by laws and regulations, device information collected by this app will only be used to identify you as a user of this app.

 

 

Get precise location :

The weather component needs specific location information to obtain accurate weather

 

Change WiFi status :

Allows an application to change the wifi connection state

 

[ Get user software installation list ]:

The shortcut component needs to access local applications, which is convenient for users to customize shortcut applications

Read external storage :

Access to local images, videos, local productions for wallpapers and component backgrounds

 

[ Display content on top of other applications ]:

The transparent skin function needs to use this permission before it can be used normally

 

[ Get rough location ]:

The weather component needs specific location information to obtain accurate weather

 

Use Bluetooth :

Part of the x-panel in the app needs to get the Bluetooth device information of the mobile phone

Get WiFi Status :

It is used to access the network/WiFi status authority, so that the software can obtain the current network/WiFi connection status, and use the functions that require network/WiFi connection

 

 

 

Collect the behavior of gyroscope, acceleration and gravity sensor :

Used for the display of in-app material content

 

 

3. Use of personal information

(1) Necessary to realize product functions

The information we collect follows the principle of "legal, legitimate, and necessary", and we use the collected information to realize the aforementioned business functions or services.

(2) Handling of changes in the purpose of use of personal information

We will use the collected information for big data analysis. We use the collected information for analysis to form industry insight reports that do not contain any personal information. We may disclose and share with our partners the statistically processed and non-identifiable information to understand how users use our services or to let the public understand the overall usage trends of our services. Without your consent, we will not disclose your personal information to any company, organization or individual other than this application, unless otherwise stipulated by laws and regulations or otherwise agreed in this agreement.

You understand and agree that, under the premise of not disclosing the privacy information of individual users, we have the right to conduct technical analysis on the entire user database and commercially exploit the analyzed and desensitized user database.

You can access, modify and delete the personal information you provided during the process of using our services. If you have any questions, you can also contact us through customer service.

If we use your personal information beyond the stated purpose and scope of direct or reasonable association with the collection, we will notify you again and obtain your express consent before using your personal information.

You are specially reminded that if the information cannot identify you personally or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify you personally or in combination with other information or we When data that cannot be associated with any specific personal information is combined with other personal information of yours, such information will be treated and protected as your personal information in accordance with this privacy statement during the combined use.

Personal information that is legally exempt from consent collection and use

Please understand that in the following situations, according to laws, regulations and relevant national standards, we do not need your authorization to collect and use your personal information:

· (1) Directly related to national security and national defense security;

 

· (2) Directly related to public security, public health, and major public interests;

 

· (3) Directly related to criminal investigation, prosecution, trial and execution of judgments;

 

· (4) In order to protect the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the consent of the individual;

 

· (5) Your personal information collected is disclosed to the public by you;

 

· (6) Your personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;

 

· (7) Necessary to sign or perform a contract at your request;

 

· (8) Necessary for maintaining the safe and stable operation of the "Application" software and related services, such as discovering and handling failures of the "Application" software and related services;

 

· (9) Necessary for legitimate news reporting;

 

· (10) It is necessary for academic research institutions to carry out statistical or academic research based on public interest, and when providing academic research or description results to the outside world, de-identify the personal information contained in the results;

 

· (11) Other circumstances stipulated by laws and regulations.

 

2. How do we store personal information

We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being improperly used or accessed without authorization. Public disclosure, use, modification, damage, loss or disclosure. Before you use some functions of this service, you need to have a successfully registered platform account, and you need to provide your mobile phone number + verification code [If you do not have a mobile phone number to log in to this product, please ignore this message]. For your account information, we will use professional encrypted storage and transmission methods to ensure information security, and will not collect, use, disclose or disclose it without authorization. You are responsible for properly keeping your account information safe, and we will not bear any responsibility for the leakage, tampering, deletion and other consequences of relevant information under this service caused by account leakage due to your own reasons.

1. Storage location

We will store the personal information of users collected in the territory of the People's Republic of China in accordance with laws and regulations. At present, we will not transfer information overseas. If we transfer information overseas, we will follow relevant national regulations or seek your consent.

2. Storage period

Generally, we only retain your personal information for as long as necessary to fulfill the purposes, such as:

Account information: During your use of this application service, we need to keep your account information to ensure your normal use of the service. When you log out of this application account, we will delete or anonymize the corresponding information;

However, in the following cases, we may change the storage period of personal information to comply with legal requirements:

· (1) To comply with applicable laws and regulations and other relevant provisions;

 

· (2) To comply with court judgments, rulings or other legal procedures;

 

· (3) To comply with the requirements of relevant government agencies or legally authorized organizations;

 

· (4) We have reasons to believe that we need to abide by relevant laws and regulations;

 

· (5) Purposes that are reasonably necessary to implement relevant service agreements or this policy, safeguard social and public interests, and protect the personal and property safety or other legitimate rights and interests of our customers, us or our affiliates, other users or employees;

 

· (6) When our products or services cease to operate, we will notify you in the form of push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time.

 

3. Overdue processing of personal information

We will only keep your personal information for the period necessary to achieve the purposes stated in this policy, unless an extended retention period is required or permitted by law. When your personal information exceeds the period required by laws and regulations, we will delete or anonymize your personal information. If we terminate the operation of a certain business or service, we will notify you at least fifteen days in advance, and delete or anonymize your personal information after terminating the operation of the business or service.

3. Use of cookies and similar technologies

Cookies and similar technologies are commonly used technologies on the Internet. When you use the "To do list" software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We use cookies and similar technologies mainly to achieve the following functions or services:

Ensure the safe and efficient operation of products and services

We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you have logged in to the service safely, or whether you have encountered illegal activities such as theft and fraud. These technologies will also help us improve service efficiency, login and response speed.

4. How do we share, transfer and publicly disclose personal information

1. Sharing of personal information

We will not share or transfer your personal information with other companies, organizations, or individuals, except in the following cases:

We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.

 

appendix

SDK name

Personal information that may be collected

scenes to be used

SDK company and privacy policy link

Youmeng/Youmeng+SDK (including com.cmis.sso;com.umeng)

Device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information/location/MEID/hardware serial number/application list/device serial number), and mobile phone number, used to provide one-click login with mobile phone number service; provide anti-cheating services by collecting geographic locations, and eliminate cheating devices (in order to improve user experience, this SDK may obtain this information asynchronously in the "background state") Contains the following SDKs: com.cmic.sso(Mobile; China Mobile), cn .com.chinatelecom (Telecom; China Telecom; Tianyi), com.unicom (Unicom; China Unicom)

Users collect information such as new users, provide statistical analysis services, and calibrate the accuracy of report data through geographic location, and provide basic anti-cheating capabilities to provide one-click login services for mobile phone numbers; provide anti-cheating services by collecting geographic locations to eliminate cheating equipment.

https://www.umeng.com/page/policy Youmeng Tongxin (Beijing) Technology Co., Ltd.

Pangolin SDK

Device information: [Double-end] Device brand, model, software system version, resolution, network signal strength, IP address, device language, sensor information and other basic information [Android only] AndroidID [IOS only] Phone system restart time, disk total Space, total system memory space, CPU number and other basic information, IDFV You can choose whether to provide pangolin with the following information based on the purpose of optimizing the advertising effect: [Double-end] wireless network SSID name, WiFi router MAC address, device MAC address (If it is iOS, it is only applicable to versions below IOS3200) [Android only] device identifier (such as IMEI, OAID, IMSI, ICCID, GAID (GMS service only), MEID, device serial number build_serial, the specific fields vary by hardware and software There are differences depending on the version) [Only iOS] Device identifier (such as IDFA, the specific fields are different due to different software and hardware versions) Application information: [Only Android] Developer application name, application package name, running process information, Version number, front and back status of the application You can choose whether to provide Pangolin based on the purpose of optimizing the advertising effect: [Android only] Software list information Advertising information: [Double-end] Interactive data location information such as display, click, and conversion of advertisements : You can choose whether to provide Pangolin with the following information based on the purpose of optimizing the effect of advertising: location information performance data: [double-ended] such as crash data, performance data other information: operator information, device time zone

Advertisement delivery and ad monitoring attribution, anti-cheating ad delivery, anti-cheating ad monitoring attribution, ad delivery statistical analysis, anti-cheating ad targeting and anti-cheating to reduce app crashes, provide stable and reliable services ad delivery, anti-cheating

https://www.csjplatform.com/privacy Beijing Juliang Engine Network Technology Co., Ltd.

Guangdiantong/Youlianghui SDK; Tencent Social SDK (com.qq.e.comm)

Coarse location information [Android only] Base station, nearby WIFI, connected WIFI Third-party developers can choose whether to provide the following information to this SDK: [Double-end] Precise location information Device/network/system information [Dual-end] Device manufacturer , brand, device model, OS version, screen resolution, screen orientation, screen DPI, IP address, time zone, network type, operator [Android only] magnetic force, acceleration, gravity, gyroscope sensor [iOS only] device name, System startup time, system language, disk space, device attitude, pressure sensor and other basic information identifiers [Android only] OAID Third-party developers can choose whether to authorize the SDK to collect the following information: [Android only] IMEI, Android_ID [iOS only] IDFV, IDFA Application information [Double-end] Host application package name, version number [Android only] Host application process name, running status, suspicious behavior Third-party developers can choose whether to authorize the SDK to collect the following information: [Dual-end] Application installation information usage data [double-ended] such as product interaction data, advertising data (such as display, click, conversion advertising data) diagnostic data [double-ended] such as crash data, performance data

Advertisement delivery Anti-cheating Advertisement attribution Advertisement monitoring Minimize App crashes, ensure normal server operation, improve scalability and performance

https://e.qq.com/dev/help_detail.html?cid=2005&pid=5983 Shenzhen Tencent Computer System Co., Ltd.

Baidu Alliance SDK

Device information: basic information such as device brand, model, software system version, resolution, network signal strength, sensor information, total disk space, total system memory space, mobile phone restart information, mobile phone system update time, OAID, AndroidID (Andriod only) Collection) Log information such as click records Developer application information: application package name, application front and back status information Developers can choose whether to allow Baidu Alliance to collect (at the same time, authorization and consent from end users must be obtained) to optimize the effectiveness of advertising delivery: Device information : IMEI, IMSI, MEID (collected by Andriod only); IDFA (collected by iOS only) Location information Device information: screen width and height, screen pixel density, system version number, device manufacturer, device model, mobile phone operator, mobile phone network status , the remaining storage space of the device, the restart time of the phone and the update time

Ad delivery, ad attribution, anti-cheating, security, ad interaction (shake, slide, etc.)

https://union.baidu.com/bqt/#/legal/policies Beijing Baidu Netcom Technology Co., Ltd.

Kuaishou Alliance SDK (com.kuaishou)

Basic information: device brand, device model, software system version, storage information, operator information, device time zone, device language, network information, etc. Basic information Device identification: IMEI, MEID, OAID, Androidld, IMSl, ICCID, hardware serial number, Device serial number location information: IP address, MAC address, GPS location information, base station information, WIFI information Application information: application installation list Other information: sensor information (acceleration, gravity, gyroscope sensor), sim card activation information, pasteboard acquisition

Ad delivery, ad attribution, anti-cheating, security, ad interaction (shake, slide, etc.)

https://u.kuaishou.com/home/help/detail/1337/1425 Beijing Kuaishou Advertising Co., Ltd.

Jiguang Push SDK

Device parameters and system information (device type, device model, system version, and related hardware information): used to identify the user's device type, device model, system version, etc., to ensure accurate delivery of messages; device identifiers (IMEI, IDFA, Android ID, GID, MAC, OAID, VAID, AAID, IMSI, MEID, UAID, SN, ICCID, SIM information): used to identify unique users, ensure accurate delivery of push messages and accurate statistics of push information; network information (IP Address, WiFi information, base station information, DNS address, DHCP address, SSID, BSSID) and location information (latitude and longitude): used to optimize the network connection request between the SDK and Jiguang server, ensure the stability and continuity of the service, and realize regional push Function; application list information (application crash information, notification switch status, APP application list and active status, APP application page information, APP function event related information): When a device has multiple APP push links active at the same time, we use Combined link technology, randomly merged into one link, in order to save power and traffic for users; (In order to improve user experience, this SDK may obtain this information asynchronously in the "background state")

Provide APP users with information push service

https://www.jiguang.cn/license/privacy Shenzhen Hexun Huagu Information Technology Co., Ltd.

Tencent Open Platform SDK (com.tencent.open, com.tencent.tauth)

Device identification information (such as OAID, Android ID), device hardware information, shared information content (such as clipboard, album pictures, etc.); access network permissions, access network status permissions, and read device unique ID permissions.

Share content to WeChat client; WeChat login and payment;

https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8 Shenzhen Tencent Computer System Co., Ltd.

QQ Internet SDK

Operating system information; device model information; clipboard information; memory card permissions; application list information;

1. Easy to quickly locate and solve system compatibility problems 2. Ensure that the system components required for end users to use the functions work normally. Space or avatar settings to determine whether QQ or TIM is installed on the user's mobile phone

https://wiki.connect.qq.com/qq%e4%ba%92%e8%81%94sdk%e9%9a%90%e7%a7%81%e4%bf%9d%e6%8a%a4% e5%a3%b0%e6%98%8eShenzhen Tencent Computer System Co., Ltd.

Record audio SDK code package name (com.zlw.main)

Collection of personal information: access to audio, SD card permissions

Usage scenario and purpose: After the user starts the APP and agrees to the "Privacy Policy", it is used to record and save the audio

-

(3) SDK access based on data statistics

At present, our data statistics are provided by Youmeng Tongxin (Beijing) Technology Co., Ltd. We will access the SDK of Youmeng Tongxin (Beijing) Technology Co., Ltd., but will not share any of your information with it. They will collect your device Mac address, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card, IMSI information), and device information through the SDK. Geographical location information and network information for anti-cheating.

2. Transfer of personal information

We will not transfer your personal information to any company, organization or individual, except in the following cases:

(1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

(2) When mergers, acquisitions, asset transfers or bankruptcy liquidation are involved, your personal information may be transferred accordingly. When the aforementioned changes occur, we will continue to protect or require the successor of personal information to continue to protect your personal information in accordance with laws and regulations and the security standards not lower than the requirements of this privacy statement, otherwise we will require the successor to re-obtain Your authorization agrees.

3. Public disclosure of personal information

We will only publicly disclose your personal information under the following circumstances:

(1) After obtaining your explicit consent

Normally, we will not publicly disclose the personal information it collects. If public disclosure is necessary, we will inform you in advance of the purpose of public disclosure, the type of information to be disclosed, etc., and after obtaining your explicit consent, we will publicly disclose the authorized public information.

(2) Personal information that is legally exempt from consent to share, transfer, and public disclosure

Please understand that in the following situations, according to laws and regulations, national standards, legal procedures, litigation or mandatory requirements of government authorities, we do not need your authorization to share, transfer or publicly disclose your personal information:

· 1) Directly related to national security and national defense security;

 

· 2) Directly related to public security, public health, and major public interests;

 

· 3) Directly related to criminal investigation, prosecution, trial and execution of judgments;

 

· 4) For the protection of your or other personal life, property and other major legal rights and interests, but it is difficult to obtain the consent of the individual;

 

· 5) Personal information that you disclose to the public by yourself;

 

· 6) Personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.

 

V. How do we protect the security of personal information

We strive to provide protection for the security of users' information to prevent loss, improper use, unauthorized access or disclosure of information.

1. Use safety precautions

We have adopted security measures of ISO27001, international information security management system, and TRUSTArc international authoritative certification to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example:

· (1) Data exchanged between your browser and the "Service" is protected by SSL encryption;

 

· (2) We also provide https secure browsing method for the website of this application;

 

· (3) We will use encryption technology to ensure the confidentiality of data;

 

· (4) We will use trusted protection mechanisms to prevent data from being maliciously attacked;

 

· (5) We will deploy an access control mechanism to ensure that only authorized personnel can access personal information;

 

· (6) We will organize security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.

 

2. Do not collect irrelevant personal information

We will take all reasonable and practicable measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this statement, unless an extended retention period is required or permitted by law.

3. Remind users to protect such as personal information

You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.

4. Regularly assess security risks

We will regularly conduct security risk and personal information security impact assessments. You can consult and supervise through the contact information disclosed in this statement.

5. Bear the legal responsibility for accidental leakage

The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will assume corresponding legal responsibilities.

6. Actively deal with and remedy accidental leakage

After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures that you can independently prevent and reduce risks. Suggestions, remedies for you, etc. We will promptly inform you of the relevant situation of the incident by email, letter, phone call, push notification, etc. When it is difficult to inform the main body of the personal letter one by one, we will take a reasonable and effective way to issue an announcement.

7. We will formulate emergency response plans, and immediately activate emergency plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (disclosure, loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and your own protection and advice on risk reduction, remedies for you. We will promptly inform you of the relevant circumstances of the event through push notifications, emails, letters, text messages and other related forms. When it is difficult to inform one by one, we will adopt reasonable and effective methods to issue announcements. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

8. Once you leave this application and related services, browse or use other websites, services and content resources, we will not have the ability and direct obligation to protect any personal information you submit on software and websites other than this application and related services, regardless of Whether your login, browsing or use of the above-mentioned software or website is based on the link or guidance of this application.

At the same time, we will also actively report the handling of personal information security incidents in accordance with the requirements of the regulatory Taimen.

We would like to remind you that the personal information protection measures provided in this privacy statement only apply to this application and related services. Once you leave this application and related services and browse or use other websites, services and content resources, we have no ability and obligation to protect any personal information you submit on software and websites other than this application and related services, regardless of whether you log in, Browsing or using the above software, whether the website is based on the link or guidance of this application.

6. Your rights

We attach great importance to the management of your personal information, and in accordance with the relevant laws, regulations, and standards of the People's Republic of China, as well as the common practices of other countries and regions, we will do our best to protect your access to, modification (update or correction), deletion and The right to withdraw authorized consent to enable you to protect your privacy and security.

1. Access to your personal information

You have the right to access your personal information, except for exceptions provided by laws and regulations. If you would like to exercise your right to access your data, you can do so yourself by:

Account information: If you wish to access (or modify, delete) personal data information and your password in your account, add security information or close your account, etc., you can perform such operations by visiting your personal homepage and account management.

Imported files: If you want to check (or modify, delete) the audio and video you have imported, you can find the information you imported in [File]

2. Correction of your personal information

When you find that the personal information we process about you is incorrect, you have the right to ask us to make corrections.

You can apply for correction through the methods listed in "1. Access to your personal information".

Please note that for the sake of security and identification, you may not be able to independently modify some of the initial registration information submitted during registration (such as information after real-name authentication); if you really need to modify such information, please contact us via electronic Contact us by email at dpfeedback@163.com, we will review the issues involved within 10 days, and we will reply in a timely manner after verifying your user identity.

3. Deletion of your personal information

You can request us to delete your personal information under the following circumstances:

· (1) If our handling of personal information violates laws and regulations;

 

· (2) If we collect and use your personal information without your consent;

 

· (3) If our processing of personal information violates the agreement with you;

 

· (4) If you do not want other users to see some of your publicly released content;

 

· (5) If you no longer use our products or services, or you cancel your account;

 

· (6) If we no longer provide you with products or services.

 

If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and request them to delete them in a timely manner, unless laws and regulations provide otherwise, or these entities obtain your independent authorization.

After you delete information from our service, we may not delete the corresponding information in the backup system immediately, but will delete the information when the backup is updated. You can refer to the methods listed in "1. Access to your personal information" to view and then delete: In the [File] interface, find the file, click [Select] in the upper right corner, and check the video to [Delete].

4. Change the scope of your authorization and consent

You can authorize the company to continue to collect personal information or change or withdraw your authorization by deleting information, turning off device functions, changing privacy settings, etc.

Please understand that specific business functions and services will require your information to be completed. After you withdraw your consent or authorization, the company will not be able to continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the company's previous processing of personal information based on your authorization.

5. Cancellation of account by personal information subject

To cancel an account, the following conditions must be met:

· (1) The account is in a normal state, and there are no restrictions such as being disabled.

 

· (2) The account property is not settled, and the unsettled virtual rights and interests are given up.

 

You can apply for cancellation of your account by means of our email application.

You can send email to our mailbox (dpfeedback@163.com) at any time. We will respond to your access request within 10 days.

Before you cancel your account, we will verify your personal identity, security status, device information, etc. You know and understand that the act of canceling your account is irreversible. After you cancel your account, we will delete all information about your account or anonymize the relevant information, unless otherwise stipulated by laws and regulations.

6. The subject of personal information obtains a copy of personal information

You have the right to obtain a copy of your personal information, and you can send an email to us (dpfeedback@163.com) at any time. We will respond to your access request within 10 days.

Under the premise of technical feasibility, such as data interface matching, we can also directly transmit a copy of your personal information to the third party you designate according to your request.

7. Complaints and reports

You can make a complaint or report according to our publicized system. If you think that your personal information rights may be violated, or if you find clues of personal information rights violations, you can click [My]-[Feedback] to enter the user feedback interface to contact us. We will feedback your complaints and reports within 10 days after verification.

8. Access to Privacy Statement

You can view the entire content of this privacy statement on the registration page, or log in to your personal account and click [Privacy Link] on the "My" page of this application.

9. Constrain information system automatic decision-making

In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legal rights, you have the right to request an explanation from us, and we will also provide appropriate remedies.

10. Right to be informed of cessation of shipment

If we stop operating, we will stop collecting your personal information in a timely manner, notify you of the notice of cessation of operation by delivery or announcement one by one, and delete or anonymize your personal information held.

11. To respond to your above request

For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

We will reply within 10 days. If you are not satisfied, you can submit to the Beijing Arbitration Commission for arbitration in accordance with its effective arbitration rules at that time; the arbitration award is final and binding on all parties.

For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. For those that are unnecessarily repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose a risk to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) request, we may deny it.

In the following situations, we will not be able to respond to your request in accordance with laws and regulations:

· (1) Directly related to national security and national defense security;

 

· (2) Directly related to public security, public health, or major public interests;

 

· (3) Directly related to criminal investigation, prosecution, trial and execution of judgments;

 

· (4) There is sufficient evidence that you have subjective malice or abuse of rights;

 

· (5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

 

· (6) Those involving commercial secrets.

7. Scope of application

This privacy statement applies to all services provided by Hefei Douscreen Technology Co., Ltd. and its affiliates, and does not apply to third-party products or services that have separate privacy statements and are not included in this privacy statement.

This Privacy Statement does not apply to:

1. Other third parties who advertise for this application service

Your use of these third-party services (including any personal information you provide to these third parties) will be governed by the terms of service and privacy statements of these third parties (not this Privacy Statement), please read the terms of the third parties carefully for specific regulations . Please properly protect your personal information and only provide it to third parties when necessary.

The application and related services described in this privacy statement may vary depending on factors such as the mobile phone model, system version, and software application version you use. The final products and services are subject to the "this application" software and related services you use.

8. Others

· (1) All notices under this agreement can be sent through page reminders, emails, text messages or regular letters; such notices are deemed to have been delivered to the recipient on the date of sending.

 

· (2) The establishment, entry into force, performance, interpretation and dispute resolution of this agreement shall be governed by the laws of the mainland of the People's Republic of China (excluding conflict of laws). The place where this agreement is signed is the jurisdiction where the company is registered.

 

· (3) If there is any dispute or controversy between you and us, it should first be settled through friendly negotiation; if the negotiation fails, you agree to submit the dispute or dispute to the competent people's court in the place where this agreement is signed for jurisdiction.

 

· (4) The titles of all clauses in this agreement are for convenience of reading only, and have no actual meaning in themselves, and cannot be used as the basis for interpretation of the meaning of this agreement.

 

· (5) Regardless of the reasons for which the terms of this agreement are partially invalid or unenforceable, the rest of the terms are still valid and binding on both parties.

 

special statement

Whereas: Article 496 of my country's "Civil Code" stipulates: If standard clauses are used to conclude a contract, the party providing the standard clauses shall follow the principle of fairness to determine the rights and obligations between the parties, and use reasonable methods to remind the other party to pay attention to exempting or limiting its liability and other terms that have a significant interest relationship with the other party, and explain the terms according to the requirements of the other party.

We hereby make a special statement as follows in accordance with the law: The application's obligation to draw users' attention in a reasonable manner will be achieved through the following methods: In this agreement, this application uses clear fonts, italics, underlines, and colors that are clear enough to attract users' attention. Marks and other reasonable ways to remind users to pay attention to relevant terms (it should be emphasized that users should also pay special attention to any terms that contain words such as "not responsible", "exemption" and "shall not" that are not clearly marked), and the provisions of these terms Confirmation will lead to passivity, inconvenience and loss of the user under certain circumstances, please read the above terms again before confirming and agreeing to this agreement. The two parties confirm that the above clauses do not belong to the clauses stipulated in Article 497 of the "Civil Code" that "the party providing the standard terms unreasonably exempts or reduces its liability, increases the other party's liability, and restricts the other party's main rights".

The user confirms that he has fully read all the terms of this agreement, clearly understands the meaning of the above terms of the agreement, fully pays attention to and agrees to the legality and validity of all the terms of this agreement.

9. How to contact us

If you have any questions, comments or suggestions about the content of this privacy statement, you can log in to the "Question Feedback" page in the app client, or send an email to dpfeedback@163.com to contact us . (Generally, we will reply within ten days).