Excel Editor privacy policy

Wuhan bayesian network technology co., LTD. respects and attaches great importance to the protection of users' personal privacy. In order to provide you with more accurate and personalized services, we will use and disclose your personal information in accordance with the provisions of this Privacy Policy. The importance of your information to you, and will do our best to keep your personal information safe and secure. This Privacy Policy describes how we will collect and use your personal information and help you understand your rights. Please read and understand this Privacy Policy carefully before using our services.  

This policy will help you understand the following:
1. Definition
2. How we collect and use your personal information
3. How do we share, transfer and publicly disclose your personal information
4. How we protect and save your personal information
5. Your rights
6. Protection of minors
7. How to update this policy
8. Scope of application
9. How to contact us

1. Definition
Personal information: refers to various information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. For the purposes of this Privacy Policy, please refer to the types of personal information listed in the section "How We Collect and Use Your Personal Information".
Sensitive personal information: refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. The personal sensitive information involved in this privacy policy includes: your personally identifiable information (including ID card); network identification information (including account name, account nickname and password related to the foregoing); other information (including address book, personal phone number) number, mobile phone number, itinerary information, web browsing records, accommodation information, precise positioning information). For sensitive personal information listed above in this Privacy Policy. For your convenience while reading. In addition to the unified definition and listing here, we will still remind you to pay attention in this Privacy Policy with bold fonts, or highlighted separately.  

2. How we collect and use your personal information

In the process of continuously improving product functions and optimizing product experience, we will only collect and use your personal information for the following purposes described in this policy:
(1) Help you to register as a user of Excel spreadsheet documents
In order to help you create an account so that we can provide you with registered user services, we provide you with a variety of registration channels for you to choose. When you choose to register with your mobile phone number or email address, you need to provide us with sensitive personal information of your mobile phone number, email address and password (encrypted). We use this information to send verification code information for you to submit your identity verification. is it effective.  
When you choose to use a third-party account (such as WeChat, QQ, Weibo, etc.) to register and log in to your user account more conveniently, we will access and collect your expressly authorized personal information through indirect access (you are in the third-party account The avatar and nickname information in the website are subject to the public information and permissions authorized by different third-party accounts) and bind your third-party account with your registered account. If you refuse to provide the information under the third-party account, you will not be able to choose to use the third-party account to register and log in. We promise the legitimacy of the source of third-party account channels for such personal information.
During the process of registering as an excel spreadsheet user and using it, you can choose whether to provide your nickname (including real name), gender, avatar (including real avatar), birthday, constellation, location and personal introduction information (" Supplementary Information"), which will help us provide you with personalized and better user services.
you know. We collect mobile phone number and e-mail address information in order to meet the online real-name system requirements of relevant laws and regulations. If you do not provide such information, we may not be able to use our registered user services normally. However, you do not provide mobile phone number, email address information, third-party account information and supplementary information, which will not affect your use of the basic functions of the service.  
When you use functions such as posting information or exporting files and linking to the display location, we may request your permission to authorize geographic location and collect location information related to this service. If you refuse to authorize the permission information to provide precise location information, you will not be able to use the associated function of displaying location information, but it will not affect other functions of the product you are using.
(2) To improve our products or services
We may also obtain other information about you that is reasonably necessary to improve our products or services, including the relevant feedback information you provide when you contact customer service, the questionnaire response information you send to us when you participate in the questionnaire survey, and the information you communicate with us Information we authorize when interacting with our affiliates and our partners. For information collected from your various devices, we may associate them so that we can provide you with consistent services on these devices. We may combine information from one service with information from other services in order to provide you with services, personalised content and recommendations.
(3) Information collected by third-party websites and analysis service providers
We may cooperate with third-party websites or analytics service providers to serve advertisements to you, or to help us better understand how the products and services above are used, such as how long the services are used. These third-party partners may collect information about you, which may be transmitted to and stored by the relevant third-party partners. We have no control over the technologies used by third parties and are not responsible for their privacy policies, information handling policies or the content of any third party websites.  
(4) To provide you with security
In order to improve the security of your use of our services, protect the personal and property safety of you, other users or the public from infringement, and better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc. To accurately identify violations of laws and regulations or relevant agreement rules of Wuhan bayesian network technology co., LTD., we may use or integrate your registration information, device information, network logs, as well as the frequency of your use of the application, crash data, overall usage, Information such as performance data and application sources are used to comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law. For example, we will comprehensively analyze abnormal user account activity, multi-terminal login, abnormal traffic, etc. to protect the security of your account.  
(5) Other purposes and uses
In the following circumstances, we will seek your consent in advance in accordance with the provisions of laws and regulations:
1. We use the information for other purposes and purposes not specified in this policy;
2. When we use the information collected for a specific purpose of use for other purposes.
(6) Exceptions to authorization and consent
1. According to relevant laws and regulations, the collection of your personal information in the following situations does not require your authorization and consent:
2. Related to national security and national defense security;
3. Those related to public safety, public health and major public interests;
4. Those related to criminal investigation, prosecution, trial and execution of judgments;
5. In order to protect the life and property of the personal information subject or other individuals, but it is difficult to obtain your consent;
6. The collected personal information is disclosed to the public by you;
7. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
8. Necessary to sign a contract according to your requirements;
9. Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and disposing of faults in the products or services;
10. Necessary for legitimate news reporting;
11. When it is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing the results of academic research or description, the personal information contained in the results is de-identified;
12. Other circumstances stipulated by laws and regulations;

3. How do we share, transfer and publicly disclose your personal information
(1) Sharing and Disclosure
We may share device information with advertising partners, but we will only provide these partners with indirect portrait tags that do not identify you personally, and de-identified or anonymized device, network, and channel information to help them Improve the effective reach rate of ads without identifying individuals.
In order to better serve our customers, we may use third-party software tool development kits (SDKs). We will conduct a comprehensive assessment of the security assurance capabilities of these partners and require them to comply with the cooperation legal agreement. We will also conduct strict security monitoring on the software tool development kits (SDKs) and application programming interfaces (APIs) used by partners to obtain information to protect users' data security.
List of third-party SDKs:
SDK:com.facebook.fresco
Purpose of use: The uni-app base module is integrated by default, used for nvue page loading image use
Types of data collected: storage of personal files
Official website link:https://www.fresco-cn.org/

SDK:com.facebook
Purpose of use: This app uses facebook's open source framework to build an interface
Type of data collected: No data is collected
Official website link:https://reactnative.dev/

SDK:wechat-sdk-android WeChat login
Purpose of use: use Tencent WeChat third-party login
Type of data collected: No data is collected
Official website link:https://open.weixin.qq.com/

SDK: android.permission.READ_PHONE_STATE
Purpose of use: for app data and crash log statistics
Mobile phone data type: Get mobile phone status (including mobile phone number, IMEI, IMSI permissions, etc.)
Official website link:https://www.umeng.com/page/policy

com.google.android.gms.auth(GoogleSignin)
Purpose of use: use GoogleSignin third-party login
Type of Data Collected: username.
Official website link:https://policies.google.cn/privacy

SDK: com.qq.e Youlianghui SDK
Function: Ad SDK for serving ads to users
Types of Personal Information Collected: IMEI, MAC Address, Location Information, Identifiers, Usage Data, Diagnostics, Other Data
Privacy Policy: https://imgcache.qq.com/gdt/cdn/adn/uniondoc/ylh_sdk_privacy_statement.html

SDK: Pangolin SDK
Function: Ad SDK for serving ads to users
Types of personal information collected: Obtain mobile phone status including imei, network status, mac address, etc., location information, identifiers, usage data, diagnostics, and other data
Privacy Policy:https://www.pangle.cn/privacy

SDK: com.qq.e 广点通
Function: Ad SDK for serving ads to users
Types of personal information collected: Obtain mobile phone status including imei, network status, mac address, etc., location information, identifiers, usage data, diagnostics, other data
Privacy Policy:https://www.tencent.com/zh-cn/privacy-policy.html

SDK: com.tencent.mm.opensdk WXPay (WeChat Pay)
Purpose of use: to help users use WeChat payment within the app
Type of Data Collected: Device Identification Information
Official website link:https://payapp.weixin.qq.com/summeract/gdpr/home?lang=cn&nobutton=1 

SDK: com.alipay Alipay(Alipay payment) 
Purpose of use: to help users use Alipay within the app
Type of Data Collected: Device Identification Information
Official website link:https://docs.open.alipay.com/54 

SDK:com.umeng UMENG(Youmeng SDK)
Purpose of use: user data statistics
Type of data collected: device identification information (IMEI/IP address/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/MAC address/geolocation, etc.)
Official website link:https://www.umeng.com/page/policy?spm=a213m0.17692878.0.0.6375378e01JMi9

SDK:com.google.android.gms.ads(AdMob)
Purpose of use: Advertising sdk that provides advertising services to users
Types of data collected: IMEI, browser type and settings, operating system, mobile network information (including operator name and phone number) and application version number, location information, mac address, etc.
Privacy Policy:https://policies.google.cn/privacy

At the same time, we will use the following permissions to better allow users to experience the functions of this product:
1: Storage permission android.permission.WRITE_EXTERNAL_STORAGE
Purpose of use: for user storage or uploading for document editing

2: Network permission android.permission.INTERNET
Purpose of use: It is used to synchronize various states of the network, judge the quality of the network, respond to the situation and handle various user operations, etc.

3: Network permission android.permission.ACCESS_NETWORK_STATE
Purpose of use: to obtain the status of network information, such as whether the current network connection is valid

4: Network permission android.permission.ACCESS_WIFI_STATE
Purpose of use: Get the WiFi status, which is used to obtain the current WiFi access status and information about WLAN hotspots

5: Install permission android.permission.REQUEST_INSTALL_PACKAGES
Purpose of use: for installation permissions from unknown sources

6: Network permission android.permission.CHANGE_NETWORK_STATE
Purpose of use: change the network status to change the network status, such as whether it can be connected to the Internet

7: android.permission.QUERY_ALL_PACKAGES
Purpose of use: new version upgrade push

We will not share your personal private information with any company, organization or individual other than Wuhan bayesian network technology co., LTD., except in the following cases:
With your (and your guardian's) express consent or authorization or your voluntary choice;
We may share your personal information externally in accordance with laws and regulations, litigation and dispute resolution needs, or as required by administrative and judicial authorities. For example, if we determine that you have violated laws and regulations or seriously violated the rules of this agreement, or to protect the personal and property safety of Wuhan bayesian network technology co., LTD. The Agreement Rules disclose personal information about you, including related violations and actions we have taken against you. For example, if you or the account you use uploads illegal videos, illegal videos and seriously violates our rules, violates laws and regulations and/or violates public order and good customs, causes significant social impact and causes reputation damage to our platform, we may publicly disclose you information and penalties.  
Share your personal information with affiliates of Wuhan bayesian network technology co., LTD. In such cases, we will only share the necessary personal information and be bound by the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will seek your authorization again.
(2) Transfer
1. We will not transfer your personal information to any company, organization or individual, except in the following cases:
2. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
3. In the event of merger, acquisition or bankruptcy liquidation of Wuhan bayesian network technology co., LTD., or other situations involving merger, acquisition or bankruptcy liquidation, if it involves the transfer of personal information, we will request a new company holding your personal information, Organizations continue to be bound by this policy, or we will require the company, organization, and individual to seek your authorization again.
(3) Public disclosure
1. We will only publicly disclose your personal information under the following circumstances and on the premise of taking industry-standard security protection measures:
2. According to your needs. Disclose personal information specified by you in a disclosure method that you expressly consent to;
3. According to the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we will only publicly disclose your personal information under the following circumstances and on the premise of taking industry-standard security protection measures:
4. According to your needs. Disclose personal information specified by you in a disclosure method that you expressly consent to;
5. When it is necessary to provide your personal information according to the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements. We may publicly disclose your personal information according to the requested types and disclosure methods. Subject to compliance with laws and regulations, when we receive a request for information disclosure, we will require the production of corresponding legal documents. We strongly believe that information requested from us should be as transparent as possible to the extent permitted by law, and we will carefully review all requests to ensure they have a legitimate basis. And only data that law enforcement authorities have a legal right to obtain for specific investigative purposes.  
(4) Exceptions to prior authorization and consent when sharing, transferring, and disclosing personal information
1. According to the provisions of relevant laws and regulations, in the following situations, sharing, transferring and publicly disclosing your personal information does not require your prior authorization and consent:
2. Those directly related to national security and national defense security;
3. Those directly related to public safety, public health and major public interests;
4. Those related to criminal investigation, prosecution, trial and execution of judgments;
5. In order to protect the life and property of the personal information subject or other individuals, but it is difficult to obtain the consent of the individual;
6. The personal information collected is disclosed to the public by the subject of the personal information;
7. Other situations stipulated by laws and regulations.
According to the law, sharing and transferring de-identified personal information and ensuring that the recipient of the data cannot recover and re-identify the subject of the personal information is not an external sharing, transfer or public disclosure of personal information. Storage and processing will not be required to notify you and obtain your consent.  

4. How we protect and save your personal information
(1) Technical protection
In order to ensure the security of your information, we strive to take various reasonable physical, electronic and management security measures in line with industry standards to protect your information, so that your information will not be leaked, damaged or lost, including but not limited to SSL, encrypted storage of information, data center access control. We will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms and try our best to ensure that only authorized personnel can access personal information.  
(2) Perfect institutional measures
We have formulated a protection system covering all aspects of personal information collection, storage, use, circulation, destruction, incident handling reporting, etc., and established supporting technical measures.
(3) Personnel safety management
We also take strict management of employees or outsourced personnel who may have access to your information, including but not limited to adopting different permission controls according to different positions, signing non-disclosure agreements with them, and batch access and access by employees is limited to system migration or legal The system authorization of two or more management personnel is required when cooperating with law enforcement. We will provide corresponding security measures to protect your information according to the existing technology, provide reasonable security, and we will try our best to prevent your information from being leaked, damaged or lost. We will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.  
(4) Sensitive information and password protection tips
Note on the protection of sensitive personal information: the information you share voluntarily or even publicly when using our services may involve your or others' personal information or even personal sensitive information. Please consider more carefully whether to share or even publicly share relevant information when using our services. We will do our best to keep any information you send us secure. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility. Your account has security protection functions, please keep your account and password information properly. We will ensure that your information will not be lost, abused and altered through security measures such as backing up to other servers and encrypting user passwords. Despite the aforementioned security measures, please understand that there are no "perfect security measures" on the information network.  
Information disclosure tips and password disclosure handling: Please note that the Internet is not an absolutely safe environment. We will try our best to ensure the security of any information you send to us. Please properly protect your personal information. Only provide it to others when necessary. If you find that your personal information is leaked, especially your account and password, please contact our customer service immediately. so that we can take appropriate measures.  
(5) Handling of information security incidents
In the event of an unfortunate personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions that you can take to prevent and reduce risks, remedies for you, etc. We will inform you of the relevant circumstances of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subjects one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.  
(6) How do we store your personal information
Storage location: Wuhan bayesian network technology co., LTD. will follow the provisions of laws and regulations. The personal information collected and generated during domestic operations will be stored within the territory of the People's Republic of China, and will not be transmitted overseas. If Wuhan bayesian network technology co., LTD. needs to transmit overseas due to business development needs, it will be clearly informed and your consent will be obtained.  
Storage period: We will take reasonable and practicable steps to avoid collecting irrelevant personal information. We will only retain your personal information for the shortest period necessary to achieve the purposes of this policy, unless you agree to extend the retention period or are permitted by law. After the storage period is exceeded, we will delete your personal information or take technical measures to anonymize it, unless otherwise stipulated by laws and regulations.

5. Your rights
1. After you complete the account registration and perform reasonable and necessary identity verification, you can view, modify, and delete the personal information you submit. Under normal circumstances, you can browse, modify and delete the information submitted by yourself at any time, but for the sake of security and identification, some initial registration information and verification information provided during registration cannot be modified.  
2. We always put the protection of user information first, and you have the right to update or correct your information at your own discretion. Before you update and correct your information, in order to protect the security of your account and ensure that this update and correction is done by you, we will first verify your identity, and then update and correct your information.
3. If you do not want some of your information to be obtained by us, you can prevent us from obtaining your information by closing some functions. After closing some functions, we will not be able to provide you with corresponding services.
4. We respect the usage habits of users. If you decide to no longer use our products and services, you can contact the official customer service staff to request to cancel your account. Before canceling your account, we will verify your personal identity, security status, commonly used equipment and other information in order to protect account security and ensure that the account cancellation is done by you. Special Note: Your act of canceling your account is irreversible. Once you cancel your account, we will delete or anonymize all information about your account immediately. We guarantee that this information will not be disclosed, and at the same time, you will not be able to obtain services through the cancelled account.  
5. Access to the Privacy Policy: We will remind you of this Privacy Policy when you first register an account and make your own decision to agree to it. In addition, you can log in to your personal account in the mobile application to view this Privacy Policy at any time. of the entire content. If we terminate the service or operation, we will notify you at least thirty days in advance and delete or anonymize your personal information after the termination of the service or operation.  
6. When you do not need this product, you can choose the logout function, and the logout path is my--account management--cancel account. After we receive your cancellation request, we will process your cancellation within three working days. ask.

6. Protection of minors
We attach great importance to the protection of personal information of minors. If you are a minor under the age of 18. Before you use Excel Editor related services. You should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians, and use our services or provide us with information with the consent of your guardians.  
For the collection of minors' personal information using our products or services with the consent of parents or guardians, we will only use, share, and transfer minors' personal information permitted by laws and regulations, express consent of parents or guardians, or necessary to protect minors or disclose this information. If we become aware that personal information from minors has been collected without prior verifiable parental consent, we will try to delete the information as soon as possible.

7. How to update this policy
(1) Wuhan bayesian network technology co., LTD. may revise this Privacy Policy in due course, and we will not reduce your rights in accordance with this Privacy Policy without your express consent.
(2) After the Privacy Policy is updated. Wuhan bayesian network technology co., LTD. will show you the changed privacy policy in the form of push notifications and pop-up boxes when you log in and update the version. So that you can keep abreast of new versions of this Privacy Policy. If you continue to use our services. Indicates agreement to accept the contents of this Policy as amended.
(3) For major changes, we will also provide more prominent notices (we will explain the specific changes to the privacy policy by means of, but not limited to, text messages, private messages, and special prompts on the login page with a pop-up window). We will also archive older versions of this policy for your review. Material changes referred to in this Privacy Policy include, but are not limited to:
1. Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the way personal information is used, etc.;
2. We have undergone major changes in ownership structure, organizational structure, etc. Such as all changes caused by business adjustments, bankruptcy mergers and acquisitions, etc.;
3. The main objects of personal information sharing, transfer or public disclosure have changed;
4. Significant changes in your rights to participate in the processing of personal information and the manner in which it is exercised;
5. When there are changes to the responsible department, contact information and complaint channels that we are responsible for handling personal information security;
6. When the personal information security impact assessment report indicates that there is a high risk.

8. Scope of application
This privacy policy applies to all services provided by Wuhan bayesian network technology co., LTD. and its affiliates, including the "Excel Editor" client, website, etc., and does not apply to a separate privacy policy that is not incorporated into this privacy policy third-party products or services.
1. Other third-party products or services, which may include products or websites and advertising content displayed to you in personalized recommendations or other products or websites linked to in the "Excel Editor" service;
2. Other third parties who advertise the "Excel Editor" service.
Your use of these third-party services (including any personal information you provide to these third parties) will be governed by the terms of service and privacy policies of these third parties (not this Privacy Policy). Please read the terms of the third parties carefully. . Please properly protect your personal information and only provide it to third parties when necessary.  
The "Excel Editor" and related services described in this privacy policy may vary depending on the mobile phone model, system version, software application version and other factors you use. The final products and services are subject to the "excel spreadsheet" software and related services you use.  
If you have any questions, comments or suggestions about the content of this Privacy Policy, you can contact us by logging in to the "Feedback" page in the "Excel Editor" client or sending an email to chenfeng@palmmob.com.

9. How to contact us
If you have any questions, comments or suggestions about this Privacy Policy. You can contact us through the official announcement. We will review the issues involved as soon as possible and respond promptly after verifying your user identity. Generally, we will respond to your request within thirty days.

Release date: 2021.11.21
Update date: 2021.11.22