Update time: 2022-7-22
Effective time: 2022-7-22
introduction
Private information refers to the secrets in the personal life of citizens that are unwilling to be disclosed or known to others. Changsha Wenying Network Technology Co., Ltd. (or "we", referring to Changsha Wenying Network Technology Co., Ltd. and its affiliates, the same below) attaches great importance to the protection of user privacy information. Notebook/My Portable Notebook" (hereinafter referred to as "the software"), Changsha Wenying Network Technology Co., Ltd. may collect and use your relevant information. Changsha Wenying Network Technology Co., Ltd. hopes to explain to you what information about you may be collected, the purpose of collecting this information, Changsha Wenying Network Technology Co., Ltd. and how you can protect the security of this information through this policy.
Before using this software, please read this policy (especially the bolded content) carefully and confirm that you understand our rules for handling your personal information. If you have any questions about this Privacy Policy, you can contact us for consultation. If you do not agree with any terms in this Privacy Policy, you should immediately stop using this software. Once you click to confirm to accept this policy or update this privacy policy in Changsha Wenying Network Technology Co., Ltd., and you continue to use this software, you are deemed to agree that Changsha Wenying Network Technology Co., Ltd. collects, uses, saves, shares, Transfer or disclose information about you. We are fully aware of the importance of personal information to you, and will do our best to protect your personal information safe and reliable. This policy will help you understand the following contents. If you have any questions, please let us know:
Personal information refers to information or a collection of information that can identify a specific user individually or in combination with other information, including but not limited to name, date of birth, ID number, address, phone number, account number, password, etc.
Table of contents
1. How we collect your personal information
2. How we use your personal information
3. How do we share, transfer and publicly disclose your personal information
4. How we protect your personal information
5. Description of third-party SDK services
6. Your rights
7. Partner links and their products and services
8. Your management of personal information
9. Changes to this policy and contact information
1. How we collect your personal information
1.1 The information you provide to My Pocket Notebook will only be collected and used by itself or designated risk control technical service providers (hereinafter referred to as "partners") for the following purposes.
1.2 Information obtained during your use of the service
During your use of the services provided by My Portable Notebook, your device information and information on how you and your device interact with our products and services will be collected, including:
(1) Equipment and application information . Such as device name, device identification code (ESN, MEID and SN), device activation time, hardware model, operating system version, application version, software identification code, address book, SMS, device and application settings (such as region/language/ time zone/font) etc.
(2) Mobile network information . Such as public land mobile network provider ID (PLMN), geographic location (identification information of the cell tower in the area where the device is located), and Internet Protocol (IP) address.
(3) Log information . When you use our services or view the content provided by us, we or our partners will automatically collect certain information and store them in logs, such as service access time, access times, access IP, event information (such as errors, crashes, reboot, upgrade), etc.
(4) Location information . When accessing certain location-based services (such as performing a search, using navigation software, or checking the weather for a location), we or our partners collect, use, and process the vague or precise location of your device, which is obtained through GPS , WLAN and service provider network ID acquisition. We or a partner will ask you which applications you want to enable location-based services for. You can choose to turn off the corresponding permissions on your device in your device's settings menu to deny sharing of your location.
(5) Personal Information . With your permission, collect your operator information, social security information, provident fund information, educational experience information, transaction information, online banking information, shopping information on e-commerce platforms, Alipay information, personal loan information, email information, insurance information, Social network information, tax information, etc.
(6) Your content stored on the partner server . For example, the content you upload to the cloud space will be stored on the server of the data service provider to enable you to quickly access and share the same content between different devices. We or the partner will not view your content stored on the partner's server. Personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.
1.3 Function points and their corresponding permissions
1. Register an account. When you register for an account, you need to obtain your geographic location, provide your email address and create a username and password. This information is collected to help you complete account registration in order to use full functionality. If you do not provide the above information, you cannot complete the account registration, and the backup and restore function will not be available.
2. Read and write storage. You need to access your camera to take pictures of your resource information and upload them, so that you can choose to add local pictures in the function of adding notes to add pictures, pictures and videos to the album for you. If you deny this permission, you will not be able to select local images, but you can use other basic functions normally.
3. Microphone permissions. When you use the microphone permission function, you can send a voice to the customer service to solve your problem. If you refuse this permission, you will not be able to use this function, but you can use other functions normally.
4. Other functions. Application OTA upgrade and update requires application installation permission, payment requires access to user installation list permission (whether to install apps WeChat, Alipay), real-name authentication face recognition requires camera permission, contact customer service requires call permission, Umeng third-party SDK Statistical analysis of data requires permissions such as network and mobile phone basic information. For real-name authentication of Xinyan Technology SDK, it is necessary to obtain camera permissions for real-name authentication.
1.4 Partner source information
Where permitted by law, My Pocket Notebook or partners also obtain information about you from public and commercial sources. We also obtain information about you from partner social networking services, such as when you log into our website using a social networking account. We and our partners may also collect other information about you, your device or the use of the service by other means, which will be explained to you at the time of collection or with your consent.
1.5 Exceptions to Authorized Consent. In the following cases, we and our partners do not need your authorization and consent to collect and use personal information:
(1) Related to national security and national defense security;
(2) Those related to public safety, public health, and major public interests;
(3) related to criminal investigation, prosecution, trial and execution of judgments;
(4) It is difficult to obtain the consent of the person in order to protect the life and property of the personal information subject or other individuals and other major legitimate rights and interests;
(5) The personal information collected is disclosed to the public by the subject of the personal information;
(6) Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(7) Necessary to conclude a contract according to your request;
(8) Necessary for maintaining the safe and stable operation of the products and/or services provided, such as discovering and disposing of failures of the products and/or services;
(9) Necessary for legitimate news reporting;
(10) When it is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing the results of academic research or description to the outside world, the personal information contained in the results is de-identified;
(11) Other circumstances stipulated by laws and regulations.
1.6 Collection and Use of Non-Identifying Information. Non-identifiable information refers to information that cannot be used to determine personal identity, such as website visits, App downloads, product sales, etc. We and our partners collect aggregated statistical information for the purpose of understanding how users use our products and services. In this way, we can improve our services and better meet the needs of users. We or our partners may collect, use, disclose, transfer non-identifying information for other purposes at our sole discretion.
2. How we use your personal information
In order to comply with national laws, regulations and regulatory requirements, to provide you with services and improve service quality, or to protect the security of your accounts and funds, we will use your information in the following situations for the purpose of achieving services;
2.1 We will use the personal information collected in accordance with the provisions of this Privacy Policy and in order to realize the functions of our products and/or services.
2.2 Please understand and agree that we have the right to use de-identified personal information that cannot identify you personally; and without disclosing your personal information, we have the right to analyze the user database and make commercial use.
2.3 Please note that all personal information you provide when using our products and/or services will continue to be used by us during your use of our products and/or services.
2.4 We or our partners will collect statistics on the usage of our products and/or services, and may share these statistical information with the public or our partners to show the overall usage trends of our products and/or services. However, these statistics do not contain any identifying information about you.
2.5 When we display your personal information, we will desensitize your information by means of content replacement and anonymization to protect your information security.
3. How do we share, transfer and publicly disclose your personal information
3.1 Sharing: We will not share your personal information with any company, organization or individual other than Changsha Wenying Network Technology Co., Ltd., except in the following cases:
1. Sharing with explicit consent;
2. Share your personal information externally in accordance with laws and regulations or the mandatory requirements of government authorities;
3. Sharing with our affiliated companies: but we will only share necessary personal information and are bound by the purpose stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization again. ;
4. Sharing with authorized partners: To enrich service content : We will work with partners to provide you with services, and collect and share your personal information with partners in accordance with the mandatory provisions of laws and regulations and/or the requirements of partners. We will only share your personal information with partners for legitimate, legitimate and necessary, specific and explicit purposes. If you refuse us to share your personal information with the corresponding partner, you will not be able to use the corresponding service. Our partners have no right to use the personal information obtained based on the sharing conditions stipulated in this agreement for any other purpose, unless you have reached a new agreement with our partners. It is necessary to draw your attention to the fact that when the relevant service provider provides services to you by means of third-party access such as page jumping to the service provider's page, the corresponding service provider will directly reach an agreement with you to authorize the use of your personal information. With permission, such personal information collected directly by service providers is not the scope of personal information we share with them.
At present, our partners include the following types:
1) Functional and technical service providers. We may share your personal information with third parties who support our business functions. These supports include confirming your geographic location information, map services, third-party payment services, login authentication services, security and statistical analysis, etc. The purpose of sharing this information is to obtain technical support for related functions to achieve business functions. For example, this product is connected to Umeng+SDK for statistical data analysis. For details, please refer to the third-party SDK service description in point 5.
2) Advertising and data service providers. We may share information with partners who entrust us with promotion and advertising. We will implement user-based profiling through third-party advertising or data service providers.
3) Third-party merchants: In the case of transaction services, we must share your order information and necessary transaction-related information with third-party merchants to meet your needs for purchasing goods or services from them, and enable them to complete subsequent transactions. After-sales service. Please refer to the specific transaction service page for third-party merchants and shared information.
At the same time, you should be aware and understand that relevant products may contain links to websites, applications, products and services operated by other independent third parties, and we do not make any express or implied representations to such third-party websites, applications, products and services. It is guaranteed that such links are only provided for the convenience of users to browse the relevant pages. When you visit and link to these third-party websites, applications, products and services, you should separately agree to their privacy policies or personal information protection terms. We and these third-party websites, applications, products and service providers assume independent personal information protection responsibilities to you within the scope stipulated by law and agreed by both parties.
We promise to keep your information confidential. Unless otherwise stipulated by laws, regulations and regulatory authorities, before providing information to partners, including our affiliates and our partner companies, we will make commercially reasonable efforts to assess the legality of the partner's use of information , legitimacy, necessity. Even so, we will still sign relevant legal documents with our partners and require them to abide by laws and regulations when handling your personal information, and try our best to require them to take protective measures for your information.
3.2 Transfer refers to the process of transferring the control of personal information from us or our partners to another personal information controller. We and our partners will not transfer your personal information to any company, organization or individual, except in the following cases: Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties Information; When it comes to merger, acquisition or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this statement, otherwise we will require the company or organization to renew the information. Ask for your authorization consent.
3.3 Public disclosure
We and our partners will only publicly disclose your personal information under the following circumstances : after obtaining your explicit consent; public disclosure based on legal or reasonable grounds: as required by laws, legal procedures, lawsuits or public and government authorities circumstances, we may publicly disclose your information.
3.4 Exceptions to prior authorization and consent when sharing, transferring, and publicly disclosing personal information.
In the following situations, the sharing, transfer and public disclosure of your personal information do not require your prior authorization and consent: related to national security and national defense security; related to public security, public health, and major public interests; related to criminal investigation and prosecution For the protection of your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain the consent of the person; the personal information you disclose to the public on your own; from the information disclosed legally Collection of personal information, such as legal news reports, government information disclosure and other channels. According to the law, sharing and transferring de-identified personal information and ensuring that the recipient of the data cannot recover and re-identify the subject of the personal information does not belong to the external sharing, transfer and public disclosure of personal information. Storage and processing will not be required to notify you and obtain your consent.
4. How we protect your personal information
We have used industry-standard security safeguards to protect the personal information you provide against unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably practicable steps to protect your personal information. We deploy access control mechanisms to ensure that only authorized personnel have access to personal information. We will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with legal requirements: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions you can take to prevent and reduce risks, remedies for you, etc. If it is difficult to inform them one by one, we will take a reasonable and effective way to make announcements. At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
5. Description of third-party SDK services
1. In order to ensure the stable operation of the software or realize related functions, we may access the software development kit (SDK), application program interface (API), application plug-in and other codes provided by third parties or through other cooperation methods to achieve related purpose.
2. We will conduct strict security monitoring on the codes of third parties that obtain information to ensure data security.
3. We will list the access third parties in the directory. For the specific processing situation of the third party, please refer to the third party's privacy policy, service agreement or similar text.
4. Please understand that the functions and services provided by third parties are constantly updated and developed, and the types of personal information they process may change due to the adjustment of functions or strategies. Please use the relevant personal information published by the third party. The official description shall prevail.
5. Third-party SDK directory
Third-party SDK name: Umeng+SDK
Name of the third party: Youmeng Tongxin (Beijing) Technology Co., Ltd.,
Beijing Ruixunlingtong Technology Co., Ltd.
Purpose of use: to provide statistical analysis services, and to report APP crashes
crash data.
Usage scenario: When a user logs in and authorizes, the system will collect part of the behavior data and user information authorized by the user for business use and data analysis.
Sharing method: SDK native collection
Involved personal information/authority types: device Mac address, unique device identification code (IMEI, android ID/IDFA/OPENUDID/GUID, SIM card, IMSI information), location information, device status and identity information .
For details of specific permissions, please refer to the Umeng Privacy Policy: https://www.umeng.com/page/policy?spm=a211eg.10560647.0.0.547034dcafEUZJ
Third-party SDK name: Udesk Customer Service SDk
Third party name: Beijing Wofeng Times Data Technology Co., Ltd.
Purpose of use: to help users contact customer service at any time to solve problems
Usage scenario: contact customer service
Sharing method: SDK native collection
Type of personal information/authority involved: Permission to make phone calls .
For details, please refer to the Udesk Customer Service SDK Privacy Policy:
https://www.udesk.cn/terms_service.html
Third-party SDK name: TBS Tencent Browsing Service SDK
Third party name: Tencent Technology (Shenzhen) Co., Ltd.
Purpose of use: Use Tencent Browser X5 kernel for web browsing,
Used to ensure the security and speed of web browsing.
Usage scenario: Display H5 interface, such as privacy policy, user agreement
Web page display
Sharing method: SDK native collection
Type of personal information/permission involved: Mac address, unique device identification code (IMEI, androidID/IDFA/OPENUDID/GUID, SIM card IMSI information)
For details, see TBS Tencent Browsing Service Privacy Policy:
https://x5.tencent.com/docs/privacy.html
Third-party SDK name: Lucky Bamboo Technology SDK
Third party name: Changsha Fortune Bamboo Network Technology Co., Ltd.
Purpose of use: (1) For users to give feedback and suggestions on the product, upload feedback and suggestions, and log out of the account. (2) User member login information, payment type, advertisement management, etc.; as well as binding WeChat ID, changing password, obtaining verification code, etc.
Usage scenarios: software update, user account binding mobile phone number,
Use G code and private data export.
Sharing method: SDK native collection
Involved personal information/authority type: device status and identity information, user mobile phone number, storage read and write permissions, Mac address, unique device identification code (IMEI, androidID/IDFA/OPENUDID/GUID, SIM card IMSI information).
Additional SDK notes:
Aiper Technology SDK: It is used for the web page display of the supply module in the product and the web page display of the WeChat business address book module. The above needs to call the Apple Technology SDK, this SDK will not collect the user's personal information.
Baidu SDK: Baidu SDK is required for the function of "Adding people by taking pictures" in the product. This SDK is used for text recognition and does not collect users' personal information.
6. Your rights
In accordance with relevant Chinese laws, regulations, standards and common practices in other countries and regions, we guarantee that you exercise the following rights over your personal information.
6.1 Accessing or Correcting Your Personal Information
You have the right to access or correct your personal information. You can achieve the above purposes by accessing or editing your account information. If you cannot access or correct your personal information through the above methods, you can send us an email and we will post Respond to your request within 15 days.
6.2 Account Cancellation
You can cancel the previously registered account at any time. After canceling the account, we will stop providing you with products or services, and delete your personal information according to your requirements, unless otherwise provided by laws and regulations.
7. Partner links and their products and services
The websites, application software, products and services of Changsha Wenying Network Technology Co., Ltd. and its partners may contain links to the partners' websites, products and services. The products and services of Changsha Wenying Network Technology Co., Ltd. may also use or provide products or services from partners, such as partner apps listed in major application markets.
All links to partner websites, products and services are provided for the convenience of users only. My Pocket Notebook and its partners have no control over such partners, and cannot provide any express and implied warranties for the content of the links, and such links are not considered my Pocket Notebook to recommend or authorize the linked content; my Pocket Notebook also has no control over the privacy or data protection policies of partners, and such partners are not bound by this statement.
You need to independently judge your interaction with such links. Before submitting personal information to partners, please read and refer to the privacy policies of these partners. We and our partners do not take any responsibility for this.
8. Your management of personal information
8.1 You have the right to access personal information in your account, if you wish to access or edit the personal profile information in your account, you can do so by logging into your account. However, the deletion or modification of relevant information may affect your use of the software or cause some functions to fail to function normally. If you cannot access such personal information through the above methods, you can contact us at any time through the software customer service or the software feedback channel. We will promptly respond to your access request.
8.2 Delete your personal information and withdraw your consent. You can log in to your personal account at any time to delete or modify relevant data and information. However, the deletion or modification of relevant information may affect your use of the software or cause some functions to fail to function normally. In the following situations, you can also request us to delete personal information: if our processing of personal information violates laws and regulations or our agreement with you; if we collect and use your personal information without your explicit consent; If you no longer use our products or services, or you voluntarily cancel your account; if we no longer provide you with products or services.
You can withdraw the authorization of Changsha Wenying Network Technology Co., Ltd. to continue to collect your relevant information by canceling your account. For details, see "Cancellation of User Accounts" below; you can also withdraw Changsha by stopping using the software. The authorization of Wenying Network Technology Co., Ltd. to continue to collect relevant information. Please understand that some functions require some basic personal information to be completed. After you withdraw your consent or authorization, Changsha Wenying Network Technology Co., Ltd. may not be able to continue to provide you with the services corresponding to the withdrawal of consent or authorization, and will no longer Process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.
8.3 If you want to obtain a copy of the personal information we have collected about you, you can contact us through the software customer service or the software feedback channel, and we will reply to your request within 15 days after verifying your user identity.
8.4 Cancellation of user account: You can request us to cancel your registered account through the following path "My - Settings - Cancellation of Account", and we will cancel your account after verifying your identity information. When you cancel your account, we will delete or anonymize your personal information.
8.5 Constraining the automatic decision-making of information systems: In some business functions, we may only make decisions based on non-human automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us to make a release, and we will also provide solutions on the premise of not infringing on the business secrets of this software or other user rights and social public interests.
8.6 In response to your above request, you may be required to provide a written request, or otherwise prove your identity. We may ask you to verify your identity before processing your request. For your request, we will respond within 15 days of verifying your user identity. If you are not satisfied with our response, you can also file a complaint through the complaint feedback channel set out in this policy. We will process your reasonable request. We may refuse requests that are unreasonably repeated, require excessive technical means, pose risks to the legitimate rights and interests of others, or are impractical.
8.7 In the following cases, according to the requirements of laws and regulations, we will not be able to respond to your request:
(1) It is related to national security and national defense security;
(2) It is related to public security, public health, and major public interests;
(3) Related to criminal investigation, prosecution, trial and execution of judgments;
(4) There is sufficient evidence to show that you have subjective malice or abuse of rights;
(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations damaged.
(6) Involving commercial secrets.
8.8 If you have any questions about the personal information management of the software, or you think that Changsha Wenying Network Technology Co., Ltd. has any violation of laws and regulations or the agreement with you on the collection or use of personal information, you can use the methods listed in this software. Contact Changsha Wenying Network Technology Co., Ltd.
9. Changes to this policy and contact information
9.1 Our Privacy Policy is subject to change.
9.2 We will not limit your rights under this Policy without your express consent. We will notify you of changes to this policy or publish the changed privacy policy in the following ways:
(1) We will publish the changed privacy policy on the "My-Settings-Privacy Policy" page.
(2) For major changes, we will provide more prominent notices (including that we will provide you with pop-up prompts). The major changes referred to in this policy include, but are not limited to: major changes in our service model, such as the purpose of processing personal information, the types of personal information processed, the way personal information is used, etc.; major changes in our control rights, etc., Such as changes in owners caused by mergers and acquisitions, etc.; changes in the main objects of personal information sharing, transfer or public disclosure; major changes in your rights to participate in personal information processing and exercise methods; our responsible department responsible for handling personal information security, When the contact information and complaint channels are changed; when the personal information security impact assessment report indicates that there is a high risk.
9.3 If you confirm to accept the changed content, you can use the relevant services of the software normally; if you do not agree with the changed content, please do not click to confirm or continue to use the software.
9.4 If you have any questions about this privacy policy when using this software, you can send your questions to 2069318097@qq.com, or through the "My-Settings-Comments and Feedback" channel in this software. Mail to Changsha Wenying Network Technology Co., Ltd. registered address: No. 110, Longgu Temple Community Office Building, Building 3, Vanke Bailu County, Yanghu Street, Yuelu District. We will review the issue as soon as possible and respond within 15 days of verifying your user identity.