Love Edit privacy policy

Preface

Love Edit (hereinafter referred to as "this product") is a video editing software for mobile devices based on Android (Android) system and iOS system (hereinafter referred to as "mobile phone"), including mobile video browsing, mobile video editing, adding subtitles, and adding Music and sound effects, export video and other functions. This product is produced by Changsha Fortune Bamboo Network Technology Co., Ltd.(hereinafter referred to as "we" ) (registered address: Longgu Temple Community Office Building 103, 1st Floor, Building 3, Vanke Bailu County, Yuelu District, Changsha City, Hunan Province No.) provided. Thank you very much for your trust in us.

This privacy policy will help you understand the following:

1. How we collect and use your personal information

2. How do we store your personal information

3. How do we share, transfer and publicly disclose your personal information

4. How do we protect your personal information

5. Scope of application of privacy policy

6. Changes and revisions to the privacy policy

7. Effectiveness of Privacy Policy

We hope to use this privacy policy to explain to you how we collect, use, store, share and transfer your personal information when using Love Edit, and how we protect this information. Please read and understand this privacy policy carefully before using Love Edit, and use our products or services after confirming your full understanding and consent. Once you start using Love Edit, it means that you fully understand and agree to this policy, and agree that we collect, use, store and share your relevant information in accordance with this privacy policy. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the various contact methods provided in this privacy policy.

1. How we collect and use your personal information

We will collect and use your personal information for the following purposes described in this privacy policy:

(1) Improve our products and services

1. User experience improvement. We may collect the International Mobile Equipment Identity (IMEI) and network device address (MAC) encrypted by MD5 algorithm, advertising identifier IDFA, device model, system version number, operating system version number, system number, system ID number, screen Resolution, Internet type, version number of this product, click time and frequency of a button, option value of some key configuration, software crash log, used to count the number of users of our product, analyze product usage, and version Upgrade judgments, investigate the causes of crashes, and reduce crashes in order to continuously improve our products. This information does not involve private information such as your personal identity.

(2) Security

In order to improve the security of your use of the services provided by us and our affiliates and partners, protect the personal and property safety of you, other users or the public, and better prevent phishing websites, fraud, network vulnerabilities, network attacks, and network intrusions Such as security risks, and more accurately identify violations of laws and regulations or the rules of related agreements with more than a year. We may use or integrate your account information, device information, software usage information, and information that our affiliates and partners have obtained your authorization or shared in accordance with the law for identity verification, detection and prevention of security incidents, and to take necessary Recording, auditing, analysis, and disposal measures.

(3) Other uses

Under the premise of complying with laws and regulations, we may anonymize, aggregate, desensitize and encrypt your personal information to form statistical information or user portraits (but the portraits cannot identify any individual users), and display and push for you Related services, products or functions. If we use information for other purposes not specified in this policy, or use information collected for specific purposes for other purposes, we will seek your consent in advance.

(4) Exceptions for obtaining authorization and consent

According to relevant laws and regulations, the collection of your personal information in the following situations does not require your authorization and consent:

1. Related to national security and national defense security;

2. Related to public safety, public health, and major public interests;

3. Related to criminal investigation, prosecution, trial and execution of judgments;

4. In order to protect the life, property and other major legal rights of the personal information subject or other individuals, but it is difficult to obtain your own consent;

5. The personal information collected is disclosed to the public by yourself;

6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

7. Necessary for signing a contract according to your requirements;

8. It is necessary to maintain the safe and stable operation of the provided products or services, such as discovering and disposing of product or service failures;

9. Necessary for legal news reports;

10. When it is necessary for academic research institutions to conduct statistical or academic research based on the public interest, and when they provide academic research or description results to the outside, they de-identify the personal information contained in the results;

11. Other circumstances stipulated by laws and regulations.

2. How do we store your personal information

The personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.

If it is necessary to transfer relevant personal information collected in China to overseas institutions in order to process cross-border business, we will implement it in accordance with laws, administrative regulations and relevant regulatory authorities. We will ensure that your personal information is adequately protected, such as anonymization, encrypted storage, etc.

We only store your personal information within the necessary period for the purpose of this policy and within the time limit required by laws and regulations.

If we stop operating Love Edit¡¯s products or services, we will promptly stop continuing to collect your personal information, will notify you of the stop of operations in the form of one-by-one delivery or announcement, and delete or anonymize the personal information we store»¯´¦Àí.

3. How do we share, transfer and publicly disclose your personal information

(1) Sharing

We will not share your personal information with any company, organization or individual, except in the following circumstances:

1. We may share your personal information with external parties in accordance with laws and regulations, the need for litigation dispute resolution, or the requirements of administrative and judicial organs in accordance with the law.

2. With your explicit consent, we will share your personal information with other parties.

3. In cases where our affiliates provide services to you or to us, we may share your personal information with our affiliates. However, we only share necessary personal information, and the processing of your information by related parties is subject to this privacy policy. If the affiliated company wants to change the purpose of processing your personal information, it will again seek your authorization and consent.

4. Unless we have your explicit authorization and consent, we will not share your personal information with third-party advertisers, application developers, open platforms or other partners. We may provide these partners with aggregated information, anonymized information, or other information that does not identify you personally. For example, we may tell application developers how many people have installed the application they developed.

5. Only for the purposes stated in this privacy policy, we may share your personal information with our suppliers, service providers, consultants or agents to provide better customer service and user experience. These vendors, service providers, consultants, and agents may provide us with technical infrastructure services, analyze how our services are used, measure the effectiveness of advertising and services, provide customer service and payment services, conduct academic research and surveys, or Provide legal, financial and technical advisory services. For example, we may occasionally invite registered users to participate in sweepstakes. If you are lucky enough to win the prize, we need to provide your personal information to the logistics service provider in order to send you our prizes.

For companies, organizations and individuals with whom we share personal information, we will sign strict data protection agreements with them, requiring them to process personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.

(2) Transfer

We will not transfer your personal information to any other companies, organizations or individuals, except in the following circumstances:

1. With the development of the technology business for more than a year, we and our affiliated companies may conduct mergers, acquisitions, asset transfers or other similar transactions. If the relevant transaction involves the transfer of your personal information, we will require the companies, organizations and individuals that newly hold your personal information to continue to be bound by this policy, otherwise we will require the companies, organizations and individuals to re-obtain your authorization and consent.

2. Transfer with your explicit consent, that is, after obtaining your explicit consent, we will transfer the personal information we have obtained to other parties.

(3) Disclosure

We will only publicly disclose your personal information under the following circumstances:

1. Your explicit consent has been obtained.

2. We may publicly disclose your personal information when required by laws, legal procedures, litigation or government authorities.

3. Other circumstances stipulated by laws and regulations.

4. How do we protect your personal information

We have adopted industry-standard security protection measures to protect the personal information you provide to prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonable and feasible measures to protect your personal information.

1. We will encrypt the transmission and storage of identifiable personally identifiable information to ensure data confidentiality. For your mobile device identifier International Mobile Equipment Identity (IMEI) and network device address (MAC), we will use MD5 algorithm for anonymization and encryption on your device, and only collect and upload the anonymized and encrypted Identifier.

2. If the user registers our account, we may analyze the user's login time, IP, number of logins and other information to properly manage the risk. If there is a suspected login operation by someone other than the person, we will remind the user via SMS to prevent your account from being logged in by someone other than the person. For the data exchange between your mobile phone and our client, we use our custom encryption scheme and https double encryption for transmission to ensure the security of data transmission.

3. If our application adopts WebView technology, we will verify all file protocols used in WebView and restrict access to sensitive data and SDCard data of this application, so as to avoid arbitrarily private products without special permissions. Files and sensitive information have been maliciously stolen, causing your personal information to be leaked.

4. We deploy an access control mechanism on the server side, adopt the principle of minimum sufficient authorization for staff who may have access to your personal information, and regularly check the list of visitors and access records.

5. The server systems where we store users' personal information are all security-hardened operating systems. We will conduct account audit and monitoring of server operations. If we find a server operating system that has security issues in an external announcement, we will update the server security as soon as possible to ensure the security of all our server systems and applications.

6. We have established a personal information protection responsibility group to conduct personal information security impact assessments for personal information collection, use, sharing, and entrusted processing. At the same time, we have established a relevant internal control system, adopting the principle of minimum sufficient authorization for staff who may have access to your information; systematically monitor the staff¡¯s handling of your information, and we regularly hold personal information protection laws for staff Legal training to strengthen the staff¡¯s awareness of user privacy protection.

7. In the unfortunate event that our physical, technical or management protection measures are damaged, we will promptly activate emergency plans to prevent the expansion of security incidents, report to the national competent authority in accordance with the requirements of laws and regulations, and promptly adopt reasonable pushes, announcements, etc. , In an effective way to inform you of the basic situation, possible impact, measures that have been taken or measures to be taken, etc. of the security incident.

8. After you terminate the use of the service, we will stop the collection and use of your information, unless otherwise provided by laws, regulations or regulatory authorities. If we stop operations, we will promptly stop the collection of your personal information, notify you of the suspension of operations in the form of one-by-one delivery or announcement, and delete or anonymize the personal information we hold.

9. How do we protect the information of minors

(1) We expect parents or guardians to guide minors to use our services. We will protect the confidentiality and security of minors¡¯ information in accordance with relevant national laws and regulations.

(2) If you are a minor, it is recommended that your parents or guardians read this policy and use our services or provide us with your information with the consent of your parents or guardians. In the case of collecting your information with the consent of your parent or guardian, we will only use or publicly disclose this information when permitted by law, the parent or guardian's explicit consent, or necessary to protect your rights. If your guardian does not agree with you to use our services or provide us with information in accordance with this policy, please immediately terminate the use of our services and notify us in time so that we can take corresponding measures.

(3) If you are the parent or guardian of a minor, if you have any questions about the information processing of the minor under your supervision, please contact us through the contact information below.

5. Scope of application of privacy policy

This privacy policy only applies to Love Edit. Other products and services of Nianyu Technology will use the privacy policies of related products or services. In particular, it should be noted that this privacy policy does not apply to the following situations:

1. Embed Love Edit products (or services) into third-party products (or services), and information collected by third-party products (or services).

2. Information collected by third-party services, advertisements, or other companies, organizations, or individuals that access Love Edit products (or services).

6. Changes and revisions to the privacy policy

Our privacy policy may change. Without your explicit consent, we will not restrict your rights in accordance with this privacy policy.

For major changes to this privacy policy, we will also provide noticeable notifications (for example, when the software is revised or upgraded, or you log in again, we will promptly notify you in the form of a pop-up window).

The major changes referred to in this policy include but are not limited to:

1. Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;

2. Significant changes have taken place in our control rights. Such as owner changes caused by mergers and acquisitions, etc.;

3. The main objects of personal information sharing, transfer or public disclosure have changed;

4. Your right to participate in the processing of personal information and how to exercise it has undergone major changes;

5. When our responsible department, contact information and complaint channels for handling personal information security change;

6. When the personal information security impact assessment report shows that there is a high risk.

7. Effectiveness of Privacy Policy

This privacy policy will come into effect on May 17, 2019. If you have any questions or comments on the content of this agreement and policy, or if you have any questions or comments on the practice and operation of the privacy policy, you can call the customer service (or Email) contact us.