a. In order to ensure the safe operation, quality and efficiency of software and services, we will collect your hardware model, operating system version number, international mobile device identification number, unique device identifier, network device hardware address, IP address, WLAN Access point, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service log.
b. In order to prevent malicious programs and ensure operation quality and efficiency, we will collect installed application information or running process information, overall application operation, usage and frequency, application crashes, overall installation usage, performance data, Application source.
c. We may use your account information, device information, service log information, and information that our affiliates and partners may share with your authorization or in accordance with the law for judging account security, performing identity verification, detecting and preventing security incidents.
1.6 Sharing and Activity Participation
When you share or receive shared information, participate in activities, etc., we need to access your clipboard and read the contents and links in it to realize functions or services such as jumping, sharing, and event linkage.
1.7 Statistical analysis
In order to analyze statistical indicators such as application additions, activations, retention, performance, etc., we may call the clipboard to perform attribution analysis on relevant statistical information. Please rest assured that we will not collect your private information.
1.8 Changes in the purpose of collecting and using personal information
Please understand that with the development of our business, the functions of the platform and the services provided may be adjusted and changed. In principle, when the new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly or reasonably related to the original processing purpose, we will inform you again when we collect and use your personal information and obtain your consent.
1.9 Personal information exempted by law from the collection and use of consent
Please understand that in the following cases, according to laws and regulations and relevant national standards, we do not need your authorization and consent to collect and use your personal information:
a. Directly related to national security and national defense security;
b. Directly related to public safety, public health, and major public interests;
c. Directly related to criminal investigation, prosecution, trial and execution of judgments;
d. It is difficult to obtain the consent of the person in order to protect the life and property of the personal information subject or other individuals and other major legitimate rights and interests;
e. Your personal information collected is disclosed to the public by you;
f. Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
g. Necessary to enter into or perform a contract at your request;
h. Necessary for maintaining the safe and stable operation of the software and related services, such as finding and dealing with faults in the software and related services;
i. Necessary for legitimate news reporting;
j. When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing the results of academic research or description to the outside world, it de-identifies the personal information contained in the results;
k. Other circumstances stipulated by laws and regulations.
You are specially reminded to note that if the information cannot identify you individually or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify you individually or in combination with other information or we When data that cannot be linked to any specific personal information is used in combination with other personal information about you, such information will be treated and protected as your personal information in accordance with this Privacy Policy during the combined use.
2. How we use similar technologies such as cookies
Similar technologies such as cookies and device information identification are commonly used technologies on the Internet. When you use the platform and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information when you visit and use this product. We undertake not to use cookies for any purpose other than those described in this Privacy Policy. We use cookies and similar technologies mainly to achieve the following functions or services:
2.1 Ensuring the safe and efficient operation of products and services
We may set authentication and security cookies or anonymous identifiers to allow us to confirm that you are securely logged in to the Services, or that you have experienced theft, fraud and other wrongdoing. These technologies also help us improve the efficiency of our services and improve login and responsiveness.
2.2 Helping you to have an easier access experience Using such technologies can help you save yourself from repeating the steps and processes of filling in your personal information and entering your search content (examples: record searches, form filling).
2.3 Clearing of Cookies
Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data clearing operations in the browser settings. If you clear it, you may not be able to use the services or corresponding functions provided by us that rely on cookies.
3. How we share, transfer, and publicly disclose personal information
3.1 Sharing
3.1.1 Sharing principle
a. Principle of authorization and consent: We will not share your personal information without your consent, unless the personal information shared is de-identified and processed, and the sharing third party cannot re-identify the natural person subject of such information. If the third party uses the information for a purpose beyond the scope of the original authorized consent, they need to obtain your consent again.
b. Principles of legality and minimum necessity: The shared data must have a legitimate and legitimate purpose, and the shared data shall be limited to the extent necessary to achieve the purpose.
c. Principles of security and prudence: We will carefully evaluate the purpose of using shared information by third parties, conduct a comprehensive assessment of the security assurance capabilities of these partners, and require them to follow legal cooperation agreements. We will conduct strict security monitoring on the software tool development kits (SDKs) and application programming interfaces (APIs) used by partners to obtain information to protect data security.
Access to the third-party SDK directory
SDK: com.facebook.fresco
Purpose of use: The uni-app base module is integrated by default, used for nvue page loading image use
Types of data collected: storage of personal files
Official website link: https://www.fresco-cn.org/
SDK: com.facebook
Purpose of use: This app uses facebook's open source framework to build an interface
Type of data collected: No data is collected
Official website link: https://reactnative.dev/
SDK:android.permission.READ_PHONE_STATE
Purpose of use: for app data and crash log statistics
Mobile phone data type: Get mobile phone status (including mobile phone number, IMEI, IMSI permissions, etc.)
Official website link: https://www.umeng.com/page/policy?spm=a213m0.17692878.0.0.6375378e01JMi9
SDK: com.umeng UMENG (Youmeng SDK)
Purpose of use: user data statistics
Type of data collected: device identification information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/geolocation, etc.)
Official website link: https://www.umeng.com/page/policy?spm=a213m0.17692878.0.0.6375378e01JMi9
3.1.2 Shared information for implementing functions or services
a. When you use the functions provided by our affiliates, third parties in the platform, or when software service providers, smart device providers, system service providers and us jointly provide services for you, we will realize the business Necessary information is shared with these related parties and third parties for comprehensive statistics and feature and preference analysis through algorithms to form indirect crowd portraits to recommend, display or push information that may be of interest to you, or push more information. Specific features, services or commercials that are suitable for you.
b. Mini Programs: When you use Mini Programs, we will not share your personal information with these developers and operators without your consent. When you use the Mini Program, the Mini Program may use the relevant system permissions authorized by you, and you can revoke the authorization in the Mini Program.
c. Geolocation services: When you use geolocation related services, we will share GPS information with location service providers (Amap) through SDK or related technologies so that we can return location results to you. GPS information is sensitive personal information, and refusal to provide it will only affect the geographic location service function, but will not affect the normal use of other functions.
d Payment function: The payment function is provided to you by a third-party payment institution that cooperates with us. Third-party payment institutions may need to collect your name, bank card type and card number, expiration date and mobile phone number. Bank card number, expiration date and mobile phone number are sensitive personal information, which is necessary for payment functions. Refusal to provide this information will prevent you from using this function, but will not affect the normal use of other functions.
e. In order to adapt the message push function to the terminal model you are using, we may share the mobile phone model, version and related device information with terminal device manufacturers (Huawei, Xiaomi, OPPO, VIVO, etc.) through technologies such as SDK.
3.1.3 Implementing shared information related to advertising
a. Advertising push and delivery: We may share information with partners who carry out promotion and advertising, but we will not share information (name, ID number) used to identify you personally, and will only provide these partners with information that cannot be Indirect portrait tags that identify your personal identity and de-identified device information or anonymized device, network, channel and other information to help it improve the effective reach rate of advertisements without identifying your personal identity. Understand and manage ad push
b. Advertising statistics: We may share with our business service providers, suppliers and other partners to analyze de-identified device information or statistical information that is difficult or impossible to associate with your real identity. This information will help us analyze and measure the effectiveness of advertising and related services.
3.1.4 Implementing shared information for security and analytics statistics
a. Safeguarding use: We attach great importance to the security of accounts, services and content. In order to protect the account and property safety of you and other users and protect your and our legitimate rights and interests from illegal infringement, we and our affiliates or service providers may Necessary device, account and log information will be shared.
b. Analysis of product usage: In order to analyze the usage of our services and improve the user experience, statistical data on product usage (crash, flashback) may be shared with affiliates or third parties, which are difficult to compare with other information. The combination identifies you personally.
c. Academic research and scientific research: In order to improve scientific research capabilities in related fields and promote the level of scientific and technological development, we may share de-identified or anonymized data with scientific research institutes, universities and other institutions on the premise of ensuring data security and legitimate purposes. data.
3.1.5 To help you participate in marketing promotions
When you choose to participate in the relevant marketing activities held by us and our affiliates or third parties, you may be required to provide your name, mailing address, contact information, bank account number and other information. Some of the information is personal sensitive information, and refusal to provide it may affect your participation in related activities, but will not affect other functions. Only with your consent, we will share this information with affiliates or third parties to ensure that you receive services with a consistent experience in joint activities, or entrust a third party to cash rewards to you in a timely manner.
3.2 Transfer
a. We will not transfer your personal information to any other third party except with your express consent.
b. With the continuous development of our business, we may carry out mergers, acquisitions and asset transfers, and your personal information may be transferred accordingly. In the event of the aforementioned changes, we will require the successor to protect your personal information in accordance with laws and regulations and the security standards not lower than those set out in this Privacy Policy, otherwise we will require the successor to obtain your authorization and consent again.
3.3 Public Display
a. We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. We publicly disclose your personal information using industry-standard security safeguards.
b. We will disclose the relevant account information when making announcements of penalties for illegal accounts and fraudulent behaviors.
3.4 Personal information that is exempted from consent to share, transfer, and public disclosure in accordance with the law Please understand that in the following cases, according to laws, regulations and national standards, we do not need your authorization to share, transfer, and publicly disclose your personal information:
a. Directly related to national security and national defense security;
b. Directly related to public safety, public health, and major public interests;
c. Directly related to criminal investigation, prosecution, trial and execution of judgments;
d. In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
e. Your personal information disclosed to the public by yourself;
f. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
4. How we store personal information
4.1 Storage location
In accordance with the provisions of laws and regulations, we store your personal information collected and generated during domestic operations in the territory of the People's Republic of China. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow relevant national regulations or seek your consent.
4.2 Storage period
We only retain your personal information for the period necessary for the purpose of providing the platform and services, and we will retain the relevant information when you do not withdraw, delete or cancel your account. After the necessary period, we will delete or anonymize your personal information, unless otherwise provided by laws and regulations.
5. How we protect the security of personal information
a. We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or without authorization Accessed, publicly disclosed, used, modified, damaged, lost or disclosed.
b. We will protect your personal information with encryption technology, anonymization processing and related reasonable and feasible means that are no less than industry peers, and use security protection mechanisms to prevent your personal information from being maliciously attacked.
c. We will establish a special security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data usage and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner.
d. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, it is not always possible to guarantee 100% information security, and we will do our best to ensure the security of the personal information you provide to us.
e. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.
f. We will formulate emergency response plans, and immediately activate emergency plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can prevent it yourself and recommendations for risk reduction, remedies for you. We will promptly notify you of the relevant information of the event by means of push notifications, emails, letters, text messages and other related forms. When it is difficult to inform you one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
g. Once you leave the platform and related services, browse or use other websites, services and content resources, we will not have the ability and direct obligation to protect any personal information you submit on software and websites outside the platform and related services, regardless of whether you log in , browsing or using the above software, whether the website is based on the link or guidance of the platform.
6. Manage your personal information
We attach great importance to the management of your personal information, and do our best to protect your rights to query, access, modify, delete, withdraw consent and authorization, cancel your account, report complaints and set up privacy functions for your personal information, so that you have the ability to Protect your privacy and information security.
6.1 Independent choice and control of personalized recommendation information
6.1.1 Independent decision to receive information Our functions such as recommendation of relevant information may be made based on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. When you are not interested in the information we push or want to reduce certain information recommendations , you can long press the screen in the recommended audio and video, and click "Not Interested" to accurately block. This will help you control and make independent decisions about the push information.
6.1.2 The information required for self-subscription will be displayed in Follow according to the account information you actively choose to follow, and you can choose to follow or unfollow.
6.2 Changing or withdrawing the scope of authorization
6.2.1 Change or revoke sensitive permission settings
You can disable precise geographic location information, address book, camera, microphone, photo album permissions, calendar permissions, change the scope of consent or withdraw your authorization in the operating system of the device itself. We will no longer collect information related to these permissions after the authorization is withdrawn.
6.2.2 Change or withdraw authorization of information processing Specific business functions and services will require your information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization. Your corresponding personal information is also no longer processed. However, your decision to withdraw your consent or authorization will not affect our previous processing of personal information based on your authorization.
6.3 Access, delete, correct your personal information
6.3.1 Accessing personal account information You can inquire and access your avatar, user name, profile, gender, birthday, region, and you can inquire, access and correct in [Me]-[Edit Profile].
6.4 Cancellation of account
Before you cancel your account, we will verify your personal identity, security status, device information, etc. Regarding the cancellation process and content, the act of canceling your account is irreversible. When you cancel your account, we will delete relevant information about you or perform anonymization, unless otherwise provided by laws and regulations.
Logout path: My - User Management - Account cancellation. After we receive your account cancellation request, after verifying the relevant data, your cancellation request will be completed within 7 working days.
6.5 Complaints and reports
You can make a complaint or report in accordance with our publicized system. If you think your personal information rights may be infringed, or find clues about infringing your personal information rights, you can enter the user feedback interface to contact us. We will feedback your complaints and reports within 30 days after verification.
6.6 Accessing the Privacy Policy
a. You can view the entire contents of this privacy policy on the registration page, or log in to your personal account [Me] - [Settings] - [Privacy Policy].
b. Please understand that the platform and related services described in this Privacy Policy may vary according to the mobile phone model, system version, software application version, mobile client and other factors you use. The final products and services are subject to the platform software and related services you use.
6.7 Inform you of cessation of operations
If we stop operating, we will promptly stop the collection of your personal information, notify you of the cessation of operations in the form of one-by-one delivery or announcement, and delete or anonymize your personal information held.
7. Minors Clause
7.1 General Terms and Conditions for Minors
a. If you are a minor under the age of 18, before using the platform and related services, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians.
b. We protect the personal information of minors in accordance with the relevant national laws and regulations, and will only collect, use, share or disclose minors when permitted by law, express consent of parents or other guardians or necessary to protect minors personal information of minors; if we become aware that personal information of minors has been collected without the prior consent of a verifiable parent or other guardian, we will seek to delete the relevant information as soon as possible. At the same time, we have established strict rules for the collection and use of information on minors to protect the personal information of children and adolescents.
c. If you are the guardian of a minor, when you have questions about the personal information of the minor under your guardianship, please contact us through the contact information published in this Privacy Policy.
8. Amendments and Notices of Privacy Policy
a. In order to provide you with better services, the platform and related services will be updated and changed from time to time. We will revise this Privacy Policy from time to time. These revisions form part of this Privacy Policy and have the same effect as this Privacy Policy. You expressly agree that we will not reduce your rights under this Privacy Policy currently in effect.
b. After this Privacy Policy is updated, we will issue an updated version on the platform and remind you of the updated content through other appropriate means before the updated terms take effect, so that you can keep abreast of the latest version of this Privacy Policy.
9. Device permission call
Read mobile phone SD card content
Usage scenario: read and save file data operation.
Call the phone camera
Usage scenarios: user feedback to take photos
Allows the app to modify or delete the contents of your SD card.
Usage scenario: manage and delete file data generated by software
10. Others
1. The validity, interpretation and dispute resolution of this agreement shall be governed by the laws of the People's Republic of China. If any dispute or dispute occurs between the user and Wuhan Zhanbei Network Technology Co., Ltd., it should be settled through friendly negotiation first. If the negotiation fails, the user agrees to submit the dispute or dispute to the people's court with jurisdiction where Wuhan Zhanbei Network Technology Co., Ltd. is domiciled. jurisdiction.
2. If any clause of this agreement is invalid or unenforceable for whatever reason, the remaining clauses are still valid and binding on both parties.
The final interpretation right of this agreement belongs to Wuhan Zhanbei Network Technology Co., Ltd. If any clause of this agreement is deemed to be repealed, invalid or unenforceable for any reason, the clause shall be deemed separable and shall not affect any other remaining clauses effectiveness and enforceability.
If you have any questions about this Privacy Policy or your personal information, you can send us an email at chenfeng@palmmob.com.
Registered address: No. 5, 15th Floor, Unit 06, Building 06, Phase II R&D Building, Laser Engineering Design Department, No. 3, Optics Valley Avenue, Donghu New Technology Development Zone, Wuhan
Office Address: No. 5, 15th Floor, Unit 06, Building 06, Phase II R&D Building, Laser Engineering Design Department, No. 3, Optics Valley Avenue, Donghu New Technology Development Zone, Wuhan
Contact number: 18571688692
Wuhan Palmbei Network Technology Co., Ltd.
Release date: 2021.12.21
Update date: 2021.12.22