Privacy Policy

Updated on: February 7, 2023

Effective date: February 7, 2023

introduction

Private information refers to the secret that citizens are unwilling to disclose or know for others in their personal life. Changsha Nianyu Information Technology Co., Ltd. (or "we", referring to Changsha Nianyu Information Technology Co., Ltd. and its affiliated companies, the same below) attaches great importance to the protection of user privacy information. When you use Changsha Nianyu Information Technology Co., Ltd.'s "Duokai/WeChat Duokai Assistant/Duokai Assistant/Duokai Assistant" (hereinafter referred to as "the software"), Changsha Nianyu Information Technology Co., Ltd. may collect and use your relevant information. Changsha Nianyu Information Technology Co., Ltd. hopes to explain to you through this policy which information you may collect, the purpose of collecting this information, Changsha Nianyu Information Technology Co., Ltd. and how you protect the security of this information.
Before using this software, please read this policy carefully (especially the bold content) and confirm that you understand our rules for handling your personal information. If you have any questions about this privacy policy, you can contact us for consultation. If you do not agree with any terms in this privacy agreement, you should immediately stop using this software. Once you click to accept this policy or update this privacy policy in Changsha Nianyu Information Technology Co., Ltd., you continue to use this software, which is deemed as your consent to Changsha Nianyu Information Technology Co., Ltd. to collect, use, save, share, transfer or disclose your relevant information in accordance with this policy. We are fully aware of the importance of personal information to you and will do our best to protect the security and reliability of your personal information. This policy will help you understand the following contents. If you have any questions, please let us know:

Personal information refers to the information or information collection that can identify a specific user's identity independently or in combination with other information, including but not limited to name, date of birth, ID number, address, telephone number, account number, password, etc.

catalogue

1、 How do we collect your personal information

2、 How do we use your personal information

3、 How do we share, transfer and publicly disclose your personal information

4、 How do we protect your personal information

5、 Description of third-party SDK services

6、 Your rights

7、 Partner links and their products and services

8、 Your management of personal information

9、 Changes and contact information of this policy

1、 How do we collect your personal information

 

The content of personal information and personal sensitive information in this policy is derived from the provisions of GB/T35273 Personal Information Security Specification, and the definition is consistent with the definition of GB/T35273 Personal Information Security Specification.

1.1 Collect the information you provide for the purpose of registering your account

(1) To provide you with account registration and login functions and services, you need to provide the following information: 
When you register this software account, you will provide us with your mobile number and login password. 
When you log in with a third-party account, we will read your nickname and avatar registered with the third-party account.
At present, the software supports Google login method. If there is any change in the subsequent registration login method, the actual one provided by the software shall prevail.
The purpose of collecting the above account information is to (1) better provide services for you through account management. By logging in to your account, you can synchronize all data in your account; After you change the device, you can continue to use the relevant information you have synchronized by logging in to your account, and data loss will not be caused by changing the device. (2) If you provide a real and effective Google account for binding, you can easily retrieve the account and password when you encounter the problem of losing your registered account or forgetting your password. (3) We will de-identify the collected relevant information and conduct statistical analysis, so as to more accurately understand the user's habits, and on this basis, continue to improve the product, improve the service quality and improve the user experience of the product.
(2) If you do not provide the above information and do not register your account, it will affect your use of the software's VIP value-added services and other functions.

1.2 Information obtained during your use of the service

In the process of using the services provided by this software, in order to understand the product suitability, identify the abnormal status of the account, and report errors to you, in addition to the information you actively provide to us according to the product or service content, we may collect information about your device and how you and your device interact with our products and services. Such information includes:

(1) Equipment and application information. Such as equipment name, equipment identification code (ESN, MEID and SN), equipment activation time, hardware model, operating system version, application version, software identification code, address book, SMS, equipment and application settings (such as region/language/time zone/font), etc.

(2) Mobile network information. Such as public land mobile network provider ID (PLMN), geographical location (identification information of signal transmission tower in the area where the equipment is located), and Internet Protocol (IP) address.

(3) Log information. When you use our service or view the content provided by us, we or our partners will automatically collect some information and store it in the log, such as the service access time, access times, access IP, event information (such as error, crash, restart, upgrade), etc.

(4) The content you store on the partner server. For example, the content you upload to cloud space will be stored on the server of the data service provider to realize your quick access and sharing of the same content between different devices. We or the partner will not view the content you store on the partner server. The personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.

1.3 Function points and their corresponding permissions

1. Separate function. The split function is the core function of the software. This function requires read and write storage permission, photo permission, and read application list permission. If you refuse to open the above permissions, you will not be able to use the split function.

2. WeChat separate function. To use WeChat avatar, you need to obtain all the permissions required by WeChat, including reading and editing user calendar data, reading and writing user's call records, viewing the number being dialed, or terminating the call, using camera, reading and writing the address book, obtaining the application account list from the account service, obtaining geographical location, using microphone, obtaining the unique identification information of devices such as IMSI and IMEI, and making a call Make/receive network calls, send and accept read text messages, receive WAP (wireless application protocol) push messages, receive multimedia messages, read and write to external memory. See WeChat privacy terms and Tencent privacy terms for specific permissions

3. Software installation list. Under our software, we need to obtain the user's "software installation list" information, because payment and login need to obtain the user's software installation list permission.

4. Other functions. The application of OTA upgrade and update requires the application installation permission. Yu Yi and Dracaena sanderiana Technology's third-party SDK data statistics and analysis require the permission of network and mobile phone basic information. The Udesk third-party SDK needs to call the customer service to solve the problem.

1.4 Partner source information

If permitted by law, the software or partners will also obtain information about you from public and commercial sources. We will also obtain information about you from our partner's social network services, such as when you use your social network account to log in to our website. We and our partners may also collect other information about you, your equipment or the use of services by other means, which will be explained to you when collecting, or with your consent.

1.5 Exceptions to obtaining authorization and consent. In the following cases, we and our partners do not need your authorization to collect and use personal information:

(1) Relating to national security and national defense security;

(2) Those related to public safety, public health and major public interests;

(3) Relating to criminal investigation, prosecution, trial and execution of judgments;

(4) For the purpose of safeguarding the life, property and other important legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain my consent;

(5) The collected personal information is disclosed by the individual information subject to the public;

(6) Collect your personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;

(7) It is necessary to sign the contract according to your requirements;

(8) It is necessary for maintaining the safe and stable operation of the products and/or services provided, such as finding and handling the faults of the products and/or services;

(9) Necessary for legal news reporting;

(10) It is necessary for academic research institutions to carry out statistical or academic research based on the public interest, and to de-identify the personal information contained in the results when providing the results of academic research or description;

(11) Other circumstances stipulated by laws and regulations.

1.6 Collection and use of non-identifying information. Non-identifying information refers to information that cannot be used to determine personal identity, such as website visits, app downloads, product sales, etc. We and our partners will collect collected statistical information to understand how users use our products and services. With this, we can improve our service and better meet the needs of users. We or our partners may collect, use, disclose and transfer non-identifying information for other purposes at our discretion.

2、 How do we use your personal information

In order to comply with national laws, regulations and regulatory requirements, provide services to you, improve service quality, or ensure the security of your account and funds, we will use your information for the purpose of achieving services under the following circumstances;

2.1 We will use the collected personal information in accordance with the provisions of this privacy policy and in order to realize the functions of our products and/or services.

2.2 Please understand and agree that we have the right to use personal information that is de-identified and cannot identify you personally; And on the premise of not disclosing your personal information, we have the right to analyze the user database and make commercial use of it.

2.3 Please note that all personal information provided by you when using our products and/or services will continue to be authorized for use by us during your use of our products and/or services.

2.4 We or partners will make statistics on the use of products and/or services, and may share these statistical information with the public or partners to show the overall use trend of our products and/or services. However, these statistics do not contain any identification information of you.

2.5 When we display your personal information, we will desensitize your information by means of content replacement and anonymous processing to protect your information security.

3、 How do we share, transfer and publicly disclose your personal information

3.1 Sharing: We will not share your personal information with any company, organization or individual other than Changsha Nianyu Information Technology Co., Ltd., except for the following circumstances:

(1) . Sharing with explicit consent;

(2) . Share your personal information according to laws and regulations or the mandatory requirements of the competent government departments;

(3) . Share with our affiliates: however, we will only share necessary personal information and be bound by the purpose stated in this privacy policy. If the affiliates want to change the purpose of processing personal information, they will ask for your authorization again;

(4) Share with authorized partners: To enrich the service content, we will work with partners to provide services to you, and collect and share your personal information with partners according to the mandatory provisions of laws and regulations and/or the requirements of partners. We will only share your personal information with partners for legitimate, legitimate, specific and clear purposes. If you refuse to share your personal information with the corresponding partners, you will not be able to use the corresponding services. Our partners have no right to use the personal information obtained based on the sharing situation agreed in this agreement for any other purpose, unless you reach a new agreement with our partners. It should be noted that when the relevant service provider provides you with services by jumping to the service provider's page and other third-party access methods, the corresponding service provider will directly reach the corresponding personal information authorization license with you. The personal information directly collected by the service provider is not within the scope of personal information we share with it.

At present, our partners include the following types:

1) Function and technical service providers. We may share your personal information with a third party that supports our business functions. These support include confirming your geographic location information, map service, third-party payment service, login authentication service, security and statistical analysis, etc. The purpose of sharing this information is to obtain technical support for relevant functions to realize business functions. For details, please refer to the third party SDK service description in point 5

2) Third-party merchants: In the case of transaction services, we must share your order information and necessary information related to the transaction with the third-party merchants to meet your demand for purchasing goods or services from them, and to enable them to complete subsequent after-sales services. See the specific transaction service page for third-party merchants and shared information.

At the same time, you should know and understand that the relevant products may contain links to websites, applications, products and services operated by other independent third parties. We do not make any express or implied warranties for such third-party websites, applications, products and services. Such links are only provided to facilitate users to browse the relevant pages. When you can access the links of such third-party websites, applications, products and services, you should separately agree to the privacy policy or personal information protection terms provided for you. We and such third-party websites, applications, products and service providers respectively assume independent personal information protection responsibilities to you within the scope of legal provisions and the agreement of both parties.

We promise to keep your information confidential. Unless otherwise specified by laws, regulations and regulatory authorities, before providing information to partners, partners include our affiliates and our cooperative companies. We will make commercially reasonable efforts to evaluate the legality, legitimacy and necessity of the use of information by the partners. In addition, the personal information we share is tagged and cannot point to an identifiable and identified natural person. Even so, we will still sign relevant legal documents with our partners and require them to comply with laws and regulations when processing your personal information, and try our best to require them to take protective measures for your information.

3.2 Transfer refers to the process of transferring the control of personal information from us or our partner to another personal information controller. We and our partners will not transfer your personal information to any company, organization or individual, except for the following circumstances: transfer with explicit consent: after obtaining your explicit consent, we will transfer your personal information to other parties; When it comes to mergers, acquisitions or bankruptcy liquidation, if it comes to the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this statement, otherwise we will require the company or organization to ask you for authorization again.

3.3 Public disclosure

We and our partners will only publicly disclose your personal information under the following circumstances: after obtaining your explicit consent; Public disclosure based on law or reasonable basis: We may publicly disclose your information in case of laws, legal proceedings, litigation or requirements of public and government authorities.

3.4 Exceptions to obtaining authorization prior to sharing, transferring and public disclosure of personal information.

In the following cases, the sharing, transfer and public disclosure of your personal information need not obtain your authorization and consent in advance: those related to national security and national defense security; Those related to public safety, public health and major public interests; Relating to criminal investigation, prosecution, trial and execution of judgments; For the purpose of protecting your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent; Personal information that you disclose to the public; Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels. According to the law, sharing and transferring personal information that has been de-identified, and ensuring that the data receiver cannot recover and re-identify the subject of personal information, does not belong to the external sharing, transfer and public disclosure of personal information. The storage and processing of such data will not need to notify you and obtain your consent.

4、 How do we store and protect your personal information
1. Storage location The
personal information collected and generated by us in the operation of the People's Republic of China is stored in China and will not be transferred or transmitted overseas, except for the following circumstances: (1) There are clear provisions in laws and regulations; 
(2) Obtain your explicit authorization;
(3) You conduct cross-border transactions and other personal initiatives through the Internet.
In view of the above situations, we will ensure that your personal information is adequately protected in accordance with this policy.
Changsha Nianyu Information Technology Co., Ltd. will not make profits by transferring or transmitting your personal information overseas.
2. Storage period:
Changsha Nianyu Information Technology Co., Ltd. will retain your personal information only for the period necessary for the purpose stated in this policy and the time limit required by laws and regulations. Generally, unless otherwise required by laws and regulations, the storage period is consistent with the validity period of your account. If you cancel your account, we will synchronously delete your personal information. If you are not registered, the storage period is generally 6 months. After the above storage period, we will delete it or conduct unrecoverable anonymization.
However, in the following cases, we may change the storage time of personal information due to the need to comply with legal requirements: 
in order to comply with applicable laws and regulations and other relevant provisions; In order to comply with the provisions of court judgments, rulings or other legal proceedings; In order to comply with the requirements of relevant government agencies or legally authorized organizations; We have reason to believe that we need to comply with laws and regulations; Use reasonably necessary for the implementation of the relevant service agreement or this policy, the maintenance of social and public interests, and the protection of the personal and property safety or other legitimate rights and interests of our customers, our or our affiliates, other users or employees.
When our products or services stop operating, we will notify you in the form of including but not limited to push notifications, announcements, and delete or anonymize your personal information within a reasonable period of time.

We have used security protection measures in line with industry standards to protect the personal information you provide from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. We will deploy an access control mechanism to ensure that only authorized personnel can access personal information. We will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.

In the event of an unfortunate personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can take to prevent and reduce risks independently, and the remedial measures for you according to the legal requirements. If it is difficult to inform one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will actively report the disposal of personal information security incidents according to the requirements of regulatory authorities.

5、 Description of third-party SDK services

1. In order to ensure the stable operation of the software or realize the relevant functions, we may access the software development kit (SDK), application program interface (API), application plug-in and other code provided by a third party or through other cooperation methods to achieve the relevant purposes.

2. We will conduct strict security monitoring on the code of the third party who obtains the information to ensure data security.

3. We will list the accessed third party in the directory. For the specific treatment of the third party, please refer to the third party's privacy policy, service agreement or similar text.

4. Please understand that the functions and services provided by the third party are constantly updated and developed, and the type of personal information processed by the third party may change due to the adjustment of functions or strategies. Please refer to the official description of personal information published by the third party.

5. Third-party SDK directory

Third-party SDK name: TBS Tencent Browsing Service SDK

Name of the third party: Tencent Technology (Shenzhen) Co., Ltd

Purpose of use: Use Tencent browser X5 kernel to browse web pages to ensure the safety and speed of web browsing.

Use scenario: display H5 interface, such as privacy policy, user agreement web page display

Sharing method: SDK native collection

Personal information/permission type involved: obtain the running process information, Mac address, unique device identification code (IMEI, androidID/IDFA/OPENUDID/GUID, SIM card IMSI information)

See TBS Tencent Browsing Service Privacy Policy for details

 

 

Other SDK descriptions:

Jiyou SDK: call this SDK in the product to complete services such as obtaining verification code, member login and sharing

Dracaena sanderiana Technology SDK: The toolbox function in the product needs to call this SDK, and the user's personal information will not be collected.

 

 

6、 Your rights

In accordance with the relevant laws, regulations, standards of China and the general practices of other countries and regions, we guarantee that you exercise the following rights with respect to your personal information.

6.1 Access or correct your personal information

You have the right to access or correct your personal information. You can access or edit your account information to achieve the above purpose. If you cannot access or correct through the above methods, you can send us an email, and we will reply to your request within 15 days.

6.2 Account cancellation

You can cancel your previously registered account at any time. After canceling the account, we will stop providing you with products or services and delete your personal information according to your requirements, unless otherwise specified by laws and regulations.

7、 Partner links and their products and services

The website, application software, products and services of Changsha Nianyu Information Technology Co., Ltd. and its partners may contain links to the partner's website, products and services. The products and services of Changsha Nianyu Information Technology Co., Ltd. may also use or provide products or services from partners, such as partners' apps on the shelves in major application markets.

All links containing partners' websites, products and services are only provided for the convenience of users. The software and its partners have no control over such partners, and cannot provide any express or implied guarantee for the linked content, and such links are not considered as the recommendation or authorization of the software for the linked content; This software also cannot control the privacy or data protection policies of partners, and such partners are not bound by this statement.

You need to independently judge your interaction with such links. Before submitting personal information to the partners, please read and refer to the privacy policies of these partners. We and our partners will not assume any responsibility for this.

8、 Your management of personal information

8.1 You have the right to access the personal information in your account. If you want to access or edit the basic personal information in your account, you can do this by logging in to your account. However, the deletion or modification of relevant information may affect your use of the software or cause some functions not to be realized normally. If you cannot access such personal information through the above path, you can contact us at any time through the software customer service or the software feedback channel. We will reply to your visit request in time.

8.2 Delete your personal information and withdraw the approved authorization. You can log in to your personal account at any time to delete and modify relevant data and information. However, the deletion or modification of relevant information may affect your use of the software or cause some functions not to be realized normally. In the following cases, you can also request us to delete personal information: if our behavior of processing personal information violates laws and regulations or the agreement with you; If we collect and use your personal information without your explicit consent; If you no longer use our products or services, or you actively cancel your account; If we never provide you with products or services.
You can revoke the authorization of Changsha Nianyu Information Technology Co., Ltd. to continue to collect your relevant information by cancelling your account. See the following "Cancellation of user account" for details; You can also withdraw the authorization of Changsha Nianyu Information Technology Co., Ltd. to continue to collect relevant information by stopping using the software. Please understand that some functions need some basic personal information to be completed. After you withdraw your consent or authorization, Changsha Nianyu Information Technology Co., Ltd. may not be able to continue to provide you with the services corresponding to the withdrawal of your consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous personal information processing based on your authorization.
8.3 If you want to obtain a copy of your personal information collected by us, you can contact us through the software customer service or the software feedback channel, and we will reply to your request within 15 days after verifying your user identity.
8.4 Cancellation of user account: You can apply to us to cancel your registered account through the following path "My Settings Cancel Account", and we will cancel your account after verifying your identity information. After you cancel your account, we will delete or anonymize your personal information.
8.5 Automatic decision of constraint information system: in some business functions, we may only make decisions based on non-manual automatic decision mechanism including information system and algorithm. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us to make a termination, and we will also provide solutions without infringing the business secrets of the software or other user rights and interests, and social public interests.
8.6 In response to your above request, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. We will reply to your request within 15 days after verifying your user identity. If you are not satisfied with our response, you can also file a complaint through the complaint feedback channels listed in this policy. We will handle your reasonable request. We may refuse requests that are repeated without reason, require too many technical means, bring risks to the legitimate rights and interests of others or are unrealistic.
8.7 Under the following circumstances, according to the requirements of laws and regulations, we will not be able to respond to your request: 
(1) related to national security and national defense security; 
(2) Those related to public safety, public health and major public interests;
(3) Relating to criminal investigation, prosecution, trial and execution of judgments;
(4) There is sufficient evidence to show that you have subjective malice or abuse of rights;
(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations.
(6) Involving trade secrets.

8.8 If you have any questions about the personal information management of this software, or you think that Changsha Nianyu Information Technology Co., Ltd. has any violation of laws and regulations or any agreement with you on the collection or use of personal information, you can contact Changsha Nianyu Information Technology Co., Ltd. through the methods listed in this software.

9、 Changes and contact information of this policy

9.1 Our privacy policy may change.
9.2 Without your explicit consent, we will not limit your rights under this policy. We will notify you of this policy change or publish the changed privacy policy in the following ways: 
(1) We will publish the changed privacy policy on the "My Settings Privacy Policy" page. 
(2) For major changes, we will provide more prominent notifications (including pop-up prompts to you). The major changes referred to in this policy include, but are not limited to, major changes in our service model, such as the purpose of processing personal information, the type of personal information processed, and the use of personal information; Significant changes have taken place in our control rights, such as changes in owners caused by mergers and acquisitions; The main objects of personal information sharing, transfer or public disclosure have changed; Your right to participate in personal information processing and the way you exercise it have changed significantly; When the department responsible for handling personal information security, contact information and complaint channel change; When the personal information security impact assessment report indicates that there is a high risk.
9.3 If you confirm to accept the changed content, you can use the relevant services of the software normally; If you do not agree with the changed content, please do not click to confirm or continue to use the software.
9.4 If you have any questions about this privacy policy when using this software, you can use email 2838548579@qq.com You can also mail your questions to the registered address of Changsha Nianyu Information Technology Co., Ltd.: No. 110, Longgu Temple Community Office Building, Building 3, Wanke Bailu County, Yanghu Street, Yuelu District, Changsha City, Hunan Province. We will review the issues involved as soon as possible and reply within 15 days after verifying your user identity.