Software privacy policy

This Privacy Policy is designed to help you understand what data we collect, why we collect it, what we do with it, and how we protect it. Understanding these contents is very important for you to exercise your personal rights and protect your personal information. Please take time to read this policy carefully before using the products or services.

When you begin to download, access or use the Products or Services, you agree to this Privacy Policy and trust us in the treatment of your information. Note that you can dynamically manage your information through Settings features or controls in the product.

In particular:

1, This Policy does not apply to the services provided by other third parties to you, nor does it apply to the products or services that have a separate legal statement and privacy policy when providing the services. When you use a third party's product or service through the product or service, your information shall be subject to the privacy terms of the third party. We will clearly inform you on the specific product or service page that the service is provided by a specific third party. It is strongly recommended that you read and confirm that you understand the above third party agreements and policies on personal information protection before accepting services (especially services related to personal information).

2, the specific service content you obtain may be different due to the software version you use and the equipped device. If some versions or equipped devices do not cover some service content or provide no specific functions, the contents in this Privacy Policy that involve the functions of the above services / and related personal information will not be applicable.

This policy contains the following:

1)How we collect and use your personal information.

2)How do we useCookieand similar technologies.

3)How we store and protect your personal information.

4)Intelligence and feedback.

5)Changes to the privacy policy.

6)Contact us.

Thank you for your use of the software and trust, know the importance of personal information to you, we will continue to be committed to provide you with more reliable service. We will protect your personal information in accordance with "" principle of consistency of rights and responsibilities, principle of clear purpose, principle of consent of choice, principle of minimum sufficient, principle of ensuring security, principle of subject participation, principle of openness and transparency. "

1. How do we collect and use your personal information

Personal informationRefers to all kinds of information recorded electronically or by other means that can identify a particular natural person alone or in combination with other information or reflect the activities of a particular natural person. When you use the product or service, the software may automatically receive and record the server value on your website or application, including but not limited to the operation status of the product or service, network environment, exception log and other basic record information clearly and objectively reflected on the server side of the product or service. You understand and agree that the above basic record information and any other information that does not identify you individually or in combination with other information does not constitute your personal information.


1.1  How do we collect your information:

1)Account and membership service information

When you use the software, can log into a registered software account or use a third-party account . When you register an account, you will need to provide us with your account name, nickname, avatar, password, gender, region, and signature. If you log in using a third-party account, you will authorize the software to read your public information registered with the third-party account (nickname and profile picture, subject to the information provided by the third-party login service). Binding a third-party account can help you retrieve your account and password more easily if your account is lost or your password is forgotten.

When you contact the software, in order to protect your account and system security, we require you to provide the necessary personal information to verify your membership. In order to help you solve problems or provide services, we may record your communication, correspondence/call records with us and related contents (including account information, order information, other information you provide to prove relevant facts, or contact information you leave). If you consult, complain or provide suggestions regarding specific services, orders, functions or operational activities, We will use your account information and order information or service record information. In order to provide services and improve the quality of service, we may also use your other information, including the information you provide when you contact customer service and the information we send when you participate in the questionnaire.

To help you solve problems or provide services, we may record your communication with us, correspondence / call records and related content (including account information, order information, other information you left to prove relevant facts, or contact information you left), We will use your account information and order information or service record information if you make inquiries, complaints or suggestions regarding specific services, orders, features or operational activities. In order to provide services and improve the quality of service, we may also use your other information, including the information you provide when you contact customer service and the information we send when you participate in the questionnaire.

2)Log information and published content

When you use the software's search and information display service, our server will automatically record your log information, including the search keywords you input (including the information you input through voice interaction) and the links you click. Published error messages, feedback, and comments, pictures you uploaded, and your IP address, device information, access time, and favorites. Please note that the information you post publicly may involve your personal information or other people's personal information or even personal sensitive information, such as when you choose to upload pictures containing personal information when commenting. Please consider more carefully whether to share or even publicly share relevant information when using our services. If the information you publicly release involves the personal information of children, the guardian of the children involved shall be authorized to consent before the release.

When the client software you use frequently reports errors to us or displays error logs, to check software errors and provide you with better services, we record and collect configuration information and abnormal data on your device for diagnosis and product and service improvement.

1.2 Instructions for use

1)We will use your Personal information in the Services in accordance with the above stated, If we need to collect or use your personal Information for other purposes or non-specific purposes not set forth in this Policy, we will seek your prior consent.

2)We will use the above information in accordance with your authorization during your use of the Products and Services. If you cancel your account, we will stop using it and delete your personal information according to your request.

3)If we stop operating products or services, we will promptly stop your personal information authorized only for the Service and notify you in the form of one-by-one delivery or announcement, and delete or anonymize the personal information held by us related to the closed business.

1.3 Service interaction

We promise that the collection and use of your personal information will not exceed the scope of this privacy policy.

We will conduct strict security checks on relevant program interfaces and software kits, and agree strict data protection measures with authorized partners, who will handle personal information in accordance with this policy and any other relevant confidentiality and security measures.

1.4 Other

Please understand that the services we provide to you are constantly updated and developed. If you choose to use any other service not covered by the above description, and we need to collect your information based on the service, we will separately explain the scope and purpose of information collection to you through the prompts on the page, the interactive process and the agreement, and obtain your consent.


2.How do we use cookies and similar techniques

1)To make your access experience easier when you use the product or service, we may use various techniques to collect and store information, and in the process may send one or more cookies or anonymous identifiers to your device. The purpose of doing so is to understand your usage habits, save you from having to re-enter registration information, or help you determine the security of your account.

2)When you use the products or services, we may also use cookies and similar technologies to receive your information for understanding your preferences, consulting or data analysis, improving product services and user experience, enhancing advertising effectiveness, timely detecting and preventing security risks, and providing better services for users and partners.

3)We do not use the Cookie for any purpose other than the one outlined in this policy, and you may retain or delete the Cookie as you prefer. You can clear all cookies saved in the software, and your relevant information will be deleted after you manually clear it.


3.How do we preserve and protect your personal information

3.1 Safety measure

(1) The software stores and protects your personal information from loss, misuse, unauthorized access or disclosure, tampering or destruction by adopting appropriate industry-standard security measures and technical means. For example, exchanging data between your browser and the server is protected by SSL protocol encryption; We will use encryption to make personal information more secure; We use trusted safeguards against malicious attacks on personal information.

(2) We have the industry's advanced data security management system centered on data life cycle, to improve the security of the whole system from the aspects of organization construction, system design, personnel management, product technology and so on.

(3) We will deploy access control mechanisms that only allow employees of software and affiliated companies that have a need to know this information to access or modify it, after taking reasonable steps to verify their identity. At the same time, we will strictly require them to fulfill their confidentiality and security obligations. If they fail to fulfill these obligations, they will be held legally liable or terminated from the cooperation with the software. At the same time, we will organize security and privacy training courses to enhance staff's awareness of the importance of protecting personal information.

(4) In order to protect your information security, if the user's personal information is incorrect, the software will access, correct or delete the relevant information according to the user's request after strict verification and verification of the applicant's identity (unless the software has to retain the personal information for legitimate reasons).

3.2 Special note

(1) The Internet is not an absolutely safe environment. It is not possible to determine whether e-mails, instant messages, social software, trading platforms and other means of communication with other users are fully encrypted. Please pay attention to the security of your personal information when using them interactively.

(2) Please understand that due to the rapid development of computer and Internet technology and the limitation of synchronization speed, there may be a variety of malicious or non-malicious attack means. While software continues to improve and enhance security measures to protect your information from accidents or damage, it is not always possible to ensure that your information is 100 percent safe.

(3) The system, communication network, hardware and other software used by you to use the product or service cannot be controlled. Please understand and pay attention to the security of your personal information.

(4) Your personal information, after being anonymized, will be formed into data that can be used and circulated. The software will save and process such data without prior notice and without your consent.

3.3 Security incident

(1) In the event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic information and possible impact of the security incident, the measures we have taken or will take to deal with it, the suggestions on risks that you can independently prevent and reduce, and the remedial measures for you. We will timely inform you of the relevant information through the site notification, SMS notification, phone call, email and other contact information you may reserve. If it is difficult to inform you one by one, we will take a reasonable and effective way to release announcements.

(2) We will promptly deal with security risks such as system vulnerabilities, network attacks, virus attacks and network intrusion. In case of incidents that harm network security, we will take corresponding remedial measures in time according to the network security incident emergency plan, and push the relevant competent authorities to report according to the regulations.

(3) If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in loss of your legitimate rights and interests, we shall bear the corresponding responsibilities in strict accordance with the law.


4. Information and feedback

(1) The software can't grow without your support and help. Thank you very much for providing us with data updates, intelligence feedback and various comments and content contributions.

(2) When you share any information publicly in a product or service, anyone may view or access that information, such as photos, ratings, and other data you upload in the software, while using or not using the product or service. Please try to avoid sensitive personal information when sharing, and make prudent decisions.

5. Changes to the privacy policy

This Policy is subject to revision from time to time based on adjustments or updates to the business model, and such revisions form part of this Privacy Policy.

We will not reduce your rights under this Privacy Policy without your express consent. We will publish changes to the Privacy policy in a reasonable manner.

If the terms of the change will reduce your rights or increase your obligations (i.e. " material change " ), we will take a more proactive approach through   knows you, e.g. on the home page of a product or service or sends you an email. By continuing to use our products or services, you agree to the revised Privacy Policy.

Material changes referred to in this policy include but are not limited to:

a. Major changes in our service mode, such as the purpose of processing personal information, the type of personal information processed and the way in which personal information is used;

b. The main object of personal information sharing, transfer or public disclosure has changed;

c. Your right to participate in personal information processing and the way of exercising it have changed significantly;

d.Our contact information and complaint channels have changed.


6.How can you contact us

6.1 Customer service channel

If you have any questions, comments or suggestions about this Privacy Policy, or if you have any comments or suggestions about the collection, use, sharing, inquiry, deletion or correction of your personal information when using the products or services, or if you encounter any problems when using the Products or services, You can reach us through the contact information reserved in app.

6.2 Special note

(1) The software reminds you that if the problem you feedback involves your personal information, especially your sensitive information, please do not disclose it directly by phone or email. We will communicate with you further under the condition of ensuring the safety of your personal information.

(2) In some cases, we may require you to provide a written request or otherwise prove your identity in order to protect your personal information. We will respond to your request within 15 days after receiving your feedback and verifying your identity.