foreword
Privacy information refers to the secrets that citizens do not want to disclose or know to others in their personal lives. Changsha years information technology co., LTD. (or "we", refers to Changsha years information technology co., LTD., and its affiliates, the same below) attaches great importance to the protection of user privacy information, you in using Changsha information technology co., LTD. "Hide App Lock" (hereinafter referred to as "the software"), Changsha years information technology co., LTD. May collect and use your relevant information. Changsha Years Information Technology Co., Ltd. hopes to explain to you through this policy what information may be collected, the purpose of collecting such information, Changsha Years Information Technology Co., Ltd. and how you protect the security of such information.
Please read this policy carefully (especially in the bold content) and confirm our processing rules for your personal information before using this software. If you have any questions about this Privacy Policy, you may contact us for consultation, and if you do not agree to any terms of this Privacy Agreement, you should immediately stop using the Software. Once you click to confirm to accept this policy or update this privacy policy in Changsha Information Technology Co., Ltd., if you continue to use this software, it shall be deemed that you agree to Changsha Information Technology Co., Ltd. to collect, use, preserve, share, transfer or disclose your relevant information in accordance with this policy. We know the importance of personal information to you and will do our best to protect your personal information safe and reliable. This policy will help you understand the following. If you have any questions, please inform us:
Personal information refers to the information or collection of information that can effectively identify the identity of a specific user, individually or in combination with other information, including but not limited to name, date of birth, id number, address, telephone number, account number, password, etc.
catalogue
1. How do we collect your personal information
2. How do we use your personal information
3. How do we share, transfer, and publicly disclose your personal information
4. How do we protect your personal information
5. Third-party SDK service description
VI. Your rights
Vii. Partner links and their products and services
Eight, your management of personal information
Ix. Changes and contact information of this policy
1. How do we collect your personal information
The content of personal information and personal sensitive personal information in this policy comes from the provisions of GB / T35273 Personal Information Security Code, and the definition is consistent with the definition of GB / T35273 Personal Information Security Code.
1.1 Collect information from you for the purpose of registering your registered account
(1) In order to provide you with the account registration and login functions and services, you shall provide the following information:
When you register the secret box and New App Lock-Private Lock account, you will provide us with the mobile phone number login password.
At present, the software supports the login method of mobile phone number. If there is any change in the subsequent registration and login method, the actual method provided by the software shall prevail.
The purpose of collecting these account information is (1) providing better service through account management. By logging in the account, you can synchronize all the data in your account; after you change the device, you can log in the account, you can continue to use the synchronized information, without data loss due to the change of equipment.(2) If you provide a real and valid mobile phone number for binding, when you lose the registered account or forget your password, you can easily retrieve your account and password.(3) We will make statistical analysis of the relevant information collected, so as to more accurately understand users habits, and on this basis, constantly improve the product, improve the service quality and improve the user experience of products.
(2) If you do not provide the above information and do not register an account, your use of the software will be affected.
1.2 Information obtained during your use of the service
In your use secret box, New App Lock-Private Lock in the service process, in order to understand the product adaptation, identify account abnormal status, submit the error to you, in addition to you according to the product or service content to provide information, we may collect your equipment information, and you and your equipment how to interact with our products and services, such information includes:
1.2.1 Equipment and application information. Such as device name, device identification code (ESN, MEID and SN), device activation time, hardware model, operating system version, application version, software identification code, address book, short message, device and application settings (e. g. region / language / time zone / font), application permission list, etc.
1.2.2 Mobile network information. Such as public land mobile network provider ID (PLMN), geographic location (regional signal transmitter identification information), Internet protocol (IP) address.
1.2.3 Specific functions. When you use the product function, we need to obtain the network IP address for the normal use of transmission, reception and other functions. When you switch the network or refresh the IP, it is possible to obtain the IP address multiple times. When the software service provider, smart device provider or system service provider with us to provide services, such as certification service, short service, etc., to achieve this function, we may collect your related equipment information (e. g., hardware model, operating system version number, international mobile device identification code (IMEI), network equipment hardware address (MAC)) after deidentification and provided to the aforementioned provider.
1.2.4 Personal information. Collect your carrier letters, etc. with your permission.
1.2.5 Content that you store in the partner server. Content that you upload to the cloud space is stored on the data service provider server for your quick access and sharing of the same content across different devices. We or the partner will not view what you store in the partners server. Personal information collected and generated within the Peoples Republic of China will be stored within the Peoples Republic of China.
1.3 Function points and their corresponding authority
1.3.1 Allow access to the screen use time
Allowing the Pick Secret Box to access the screen usage time allows it to view your activity data, limited content, and limited use of apps and websites.
You can control which App can access your own screen time in "Set"
1.4 Source information of the partners
If permitted by law, boxes, New App Lock-Private Lock, or partners also obtain information about you from public and commercial sources. We also get information about you from our partner social networking services, such as when you logged on to our site using a social networking site account. We and our partners may also collect other information about you, your equipment, or services that will be explained to you at the time of collection, or with your consent.
1.5 Exceptions to authorized consent. We and our partners are not authorized to collect and use personal information if:
(1) those related to national security and national defense security;
(2) Those related to public safety, public health and major public interests;
(3) related to crime investigation, prosecution, trial and execution of judgment;
(4) In order to safeguard the major legitimate rights and interests such as the life and property of the personal information subject or other individuals, but it is difficult to obtain the consent;
(5) The personal information collected is disclosed to the public by the personal information subject by itself;
(6) Your personal information is collected from the legal and publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(7) It is necessary to sign the contract according to your requirements;
(8) Those necessary to maintain the safe and stable operation of the products and / or services provided, such as the discovery and disposal of faults of the products and / or services;
(9) those necessary for legal news reporting;
(10) When an academic research institution carries out statistics or academic research institute based on public interest, and provides the results of academic research or description, it deidentifies the personal information contained in the results;
(11) Other circumstances as stipulated by laws and regulations.
1.6 Non-identifying information collection and use. Non-identifying information refers to information that cannot be used to determine personal identity, such as website visits, App downloads, product sales, etc. We and our partners collect aggregated statistics to understand how users use our products and services. Thus, we can improve our services and better meet the needs of users. We or our partners may independently collect, use, disclose or transfer non-identifying information for other purposes.
2. How do we use your personal information
In order to comply with national laws, regulations and regulatory requirements, as well as to provide you with services and improve the quality of services, or to ensure the security of your account and funds, we will use your information for the purpose of achieving services in the following circumstances;
2.1 We will use the collected personal information in accordance with the provisions of this Privacy Policy and for the realization of our products and / or service functions.
2.2 Please understand and agree that we have the right to use the de-identified personal information, and we have the right to analyze and make commercialization of the user database without disclosing your personal information.
2.3 Please note that all personal information you provide when using our products and / or services will continuously authorize us to use during your use of our products and / or services.
2.4 We or our partners will make statistics on the use of our products and / or services, and may share these statistics with the public or our partners to demonstrate the overall trend in the use of our products and / or services. But these statistics do not contain any of your identification information.
2.5 When we display your personal information, we will desensitize your information, including content replacement, anonymous processing, to protect your information security.
3. How do we share, transfer, and publicly disclose your personal information
3.1 Sharing: We will not share your personal information with any company, organization or individual, except where:
3.1.1 Sharing with explicit consent;
3.1.2 Share your personal information according to the provisions of laws and regulations, or the mandatory requirements of the competent government authorities;
3.1.3 Share with our affiliates: However, we will only share the necessary personal information and are subject to the purpose stated in this Privacy Policy. If the affiliates want to change the purpose of processing the personal information, we will seek your authorization consent again;
4. Sharing with authorized partners: To enrich the service content: We will provide services to you with partners, and collect and share your personal information with partners in accordance with the mandatory provisions of laws and regulations and / or the requirements of partners. We will only share your personal information with partners for legitimate, necessary, specific and specific purposes. If you refuse us to share your personal information with the corresponding partner, you will be unable to use the service. Our Partner is not entitled to use the personal information obtained based on the sharing circumstances agreed herein for any other purpose unless you have a new agreement with our Partner. Need to draw your attention, when the relevant service provider to jump to the service page third party access to provide services to you, the corresponding service provider will directly with you the corresponding personal information authorization license, the personal information is directly collected by the service provider is not us to its share the scope of personal information.
At present, our partners include the following types:
1) Functional and technical service providers. We may share your personal information with third parties that support our business functions. These support includes confirming your location information, mapping services, third-party payment services, login authentication services, security, and statistical analysis. The purpose of sharing this information is to obtain technical support for the relevant functions to achieve business functions.
At the same time, you should be aware and understand that the relevant products may contain links to the websites, applications, products and services operated by other independent third parties. We do not make any express or implied warranty on the third-party websites, applications, products and services, and such links are only provided for the convenience of users to browse the relevant pages. When you visit such third-party websites, applications, products and services links, you shall separately agree to the privacy policy or personal information protection clauses provided for you. We, together with such third party websites, applications, product and service providers, shall assume independent responsibility for personal information protection within the scope stipulated by law and agreed by both parties.
We promise to keep your information confidential. Unless otherwise stipulated by laws, regulations and regulatory authorities, the partners, including our affiliates and our partner companies, we will make commercially reasonable efforts to assess the legality, legitimacy and necessity of the information. In addition, the personal information we share is labeled and cannot point to an identifiable and identified natural person. Even so, we will still sign relevant legal documents with the partner and ask the partner to comply with the laws and regulations when processing your personal information, and try our best to ask the partner to take protective measures against your information.
3.2 Transfer refers to the process of transferring the control of personal information from us or the cooperation to another personal information controller. We and our partners will not transfer your personal information to any company, organization or individual, except in the following cases: with your express consent, we will transfer your personal information to other parties; in the case of merger, acquisition or liquidation, the company holding your personal information will continue to be subject by this statement, otherwise we will require the company or organization to renew your authorization.
3.3 Public disclosure
We and our partners will publicly disclose your personal information only in the following circumstances: after obtaining your express consent; public disclosure based on legal or reasonable basis: We may publicly disclose your information as required by law, legal process, litigation or public and government authorities.
3.4 Exceptions to prior authorization consent for sharing, transfer and public disclosure of personal information.
In the following circumstances, sharing, transfer and public disclosure of your personal information without your authorization: related to national security, national defense security, public safety, public health, major public interests, criminal investigation, prosecution, trial and judgment execution; you or other personal life and other legitimate rights and interests, but difficult to obtain consent; personal information to the public; and collect personal information from the legal publicly disclosed information, such as legal news reports, government information disclosure and other channels. According to the law, sharing, transfer to the identification of personal information, and ensure that the data receiver cannot recover and identify the personal information subject, does not belong to the personal information sharing, transfer and public disclosure behavior, the preservation and processing of such data will not need to inform you and obtain your consent.
4. How do we store and protect your personal information
4.1 Storage location
Personal information collected and generated during our operations within the Peoples Republic of China is stored in China and will not be transferred or transmitted abroad, except in the following circumstances:
(1) Laws and regulations have clear provisions;
(2) Obtain your explicit authorization;
(3) You can conduct personal active activities such as cross-border transactions through the Internet.
In view of the above circumstances, we will ensure adequate protection of your personal information in accordance with this policy.
Changsha Nian Information Technology Co., Ltd. will not profit by transferring or transmitting your personal information abroad.
4.2 Storage period
Changsha Nian Information Technology Co., Ltd. only retains your personal information for the period necessary for the purposes stated in this policy and for the time limit required by laws and regulations. In general, unless otherwise required by laws and regulations, the storage period is consistent with the validity period of your account. If you cancel your account, we will delete your personal information simultaneously. If you are not registered for an account, the storage period is generally 6 months. After the above storage period, we will delete or anonymthe anonymous anonymous.
However, we may change the storage time of our personal information in the following circumstances:
To comply with the applicable laws and regulations; to comply with the provisions of court decisions, rulings or other legal procedures; to comply with the requirements of relevant government authorities or legally authorized organizations; to be satisfied of the compliance with laws and regulations; for purposes reasonably necessary to protect the safety or other lawful interests of our customers, our or our affiliates or other users or employees.
When our products or services stop operations, we will notify you in the form of including but not limited to push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time.
4.3 At the same time, we have used industry standards to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. We will deploy access control mechanisms to ensure that only authorized people will have access to personal information. We will hold security and privacy protection training courses to enhance employees awareness of the importance of protecting their personal information.
After the unfortunate occurrence of a personal information security event, we will timely inform you in accordance with the legal requirements,: the basic situation and possible impact of the security event, we have taken or will take the disposal measures, you can independently prevent and reduce the risk suggestions, remedial measures for you, etc. If it is difficult to inform them one by one, we will take a reasonable and effective way to issue the announcement. At the same time, we will also take the initiative to report the handling of personal information security incidents according to the requirements of the regulatory authorities.
5. Third-party SDK service description
1. In order to ensure the stable operation of the software or realize relevant functions, we may access the software development package (SDK), application interface (API), application plug-ins and other codes provided by a third party or through other cooperative methods to achieve relevant purposes.
2. We will conduct strict security monitoring on the codes of the third party that obtains the information to ensure the data security.
3. We will list the connected third party in the catalog. For the specific processing situation of the third party, please refer to the privacy policy, service agreement or similar text of the third party.
4. Please understand that the functions and services provided by the third party are constantly updated and developed, and the type of personal information and other contents handled by it may change due to the function or strategy adjustment. Please refer to the official description of the personal information published by the third party.
5. Third-party SDK directory
No access to the SDK is currently available
VI. Your rights
In accordance with the relevant Chinese laws, regulations, standards and the prevailing practices of other countries and regions, we guarantee that you will exercise the following rights to your personal information.
6.1 Access to or correct your personal information
You have the right to access or correct your personal information, you can achieve the above purpose by accessing or editing your account information, if you are unable to access or correct by the above method, you can you can send us an email and we will reply to your request within 15 days.
6.2 Account cancellation
You can cancel your previously registered account at any time. After canceling the account, we will stop providing you with products or services and delete your personal information at your request, unless otherwise stipulated by laws and regulations.
Vii. Partner links and their products and services
The websites, application software, products and services of Changsha Nian Information Technology Co., Ltd. and its partners may contain links to the partners websites, products and services. The products and services of Changsha Nian Information Technology Co., Ltd. may also use or provide products or services from partners, such as the partner App on the shelves in each major application market.
All links containing partner websites, products and services are provided for user convenience only. Hide App Lock and its partners have no control over such partners, and cannot provide any express and implied guarantee of the link content, and such links shall not be regarded as the recommendation or authorization of the link content by New App Lock-Private Lock; the Secret Box and New App Lock-Private Lock cannot control the privacy or data protection policies of the partners, and such partners are not bound by this statement.
You need to independently judge your interaction with such links. Before submitting our personal information to our partners, please read and refer to the privacy policies of these partners. We and our partners will not bear any responsibility for this.
Eight, your management of personal information
8.1 You have the right to access personal information in your account, and if you want to access or edit basic personal information in your account, you can perform this operation by logging in to your account. However, the deletion or modification of relevant information may affect your use of the software or cause some functions to be implemented normally. If you are unable to access such personal information through the above path methods, you can contact us at any time through the software customer service or the software feedback channel at any time. We will promptly respond to your access request.
8.2 Delete your personal information and withdraw the agreed authorization. You can log in to your personal account to delete and modify relevant information and information at any time. However, the deletion or modification of relevant information may affect your use of the software or cause some functions to be implemented normally. In the following circumstances, you may also request us to delete your personal information: if we process personal information against laws and regulations or agreements with you; if we collect and use your personal information without your consent express; if you no longer use our products or services, or you cancel your account; if we will not provide products or services for you forever.
You can change the scope of authorization of Changsha Information Technology Co., Ltd. to continue to collect personal information by removing the data, deleting the functions in the relevant equipment or software. You can also withdraw the authorization to continue to collect your information by canceling the account in the following "Cancellation of User Account"; you can also withdraw the authorization of Changsha Information Technology Co., Ltd. to collect relevant information by stopping using the software. Please understand that some functions require some basic personal information to be completed. After you withdraw your consent or authorization, Changsha Information Technology Co., Ltd. may not be able to continue to provide you with the services corresponding to withdrawing your consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.
8.3 If you want to obtain a copy of your personal information collected by us, you can communicate with us through the customer service of the software or the feedback channel of the software. We will reply to your acquisition request within 15 days after verifying your user identity.
8.4 Cancellation of user account: If you can request us to cancel your registered account through the following path "Set-cancel your account", we will immediately cancel your account number. When you cancel your account, we will delete or anonymize your personal information.
8.5 Constraint the automatic decision of information systems: In some business functions, we may only make decisions based on the non-manual automatic decision mechanism, such as information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us to make a termination, and we will also provide solutions on the premise of not infringing on the software trade secrets or other users rights and interests, social and public interests.
8.6 In response to your above request, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. For your request, we will respond within 15 days after verifying your user identity. If you are not satisfied with our reply, you can also file a complaint through the complaint feedback channel listed in this policy. We will deal with your reasonable request. We may reject requests that repeat unprovoked, require excessive technical means, pose risks to the legitimate rights or unrealistic interests of others.
8.7 We will not be able to respond to your request in the following cases where:
(1) those related to national security and national defense security;
(2) Those related to public safety, public health and major public interests;
(3) related to crime investigation, prosecution, trial and execution of judgment;
(4) There is sufficient evidence to show that you have subjective malice or abuse of rights;
(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.
(6) Trade secrets are involved.
8.8 If you have any questions about the management of personal information of the software, or if you believe that Changsha Information Technology Co., Ltd. has any violation of laws and regulations or the collection or use of your personal information, you may contact Changsha Information Technology Co., Ltd. through the methods listed in this software.
Ix. Changes and contact information of this policy
9.1 Our privacy policy may change.
9.2 We will not restrict your rights under this policy without your express consent. We will notify you of the change or the change as follows:
(1) We will post the changed privacy policy on the "My-Set-Privacy Policy" page.
(2) For major changes, we will provide a more significant notification (including we will provide pop-up prompts to you). Major changes referred to in this policy include but are not limited to: major changes in our service mode, such as the purpose of handling personal information, type and use of personal information; major changes in control rights, such as owner changes caused by merger and reorganization; changes in the main objects of personal information sharing, transfer, or public disclosure; major changes in your rights and exercise methods in the processing of personal information; changes in personal information security; and the impact of personal information security report indicates that there is a high risk.
9.3 If you confirm to accept the changed content, you can normally use the relevant services of the software; if you do not agree with the changed content, please do not click to confirm or continue to use the software.
9.4 if you have any problems with the privacy policy, you can through the email 1626244507@qq.com, or through the software "set-comments and feedback" channel, you can also mail your questions to Changsha information technology co., LTD. Registered address: Changsha high-tech development zone Wenxuan road 27 foot valley yu garden F4 building 1801-2. We will review the questions as soon as possible and respond within 15 days after verifying your user identity.