Text Extractor Privacy Policy
Thank you for trusting and using our products and services. We understand the importance of personal information to you and thank you for your trust in us. Through this policy, we will explain to you how we collect, store, protect, use and provide your information, and explain your rights. You should read and fully understand this "Privacy Policy" before using our products/services. If you do not agree with the contents of this policy, it may cause our products/services to fail to operate normally, or fail to achieve the normal operation of our products/services. You should immediately stop accessing/using our products/services. Your use or continued use of the products/services provided by us indicates that you fully understand and agree to the entire contents of this Privacy Policy (including the updated version). We will make every effort to prevent the leakage, damage and loss of your information through reasonable and effective information security technology and management process. We strictly abide by laws and regulations to protect the confidentiality of your communications and provide you with secure communications services. In order to provide better service to you and other users, we only collect the necessary information.
1. Information collection
1. When you use this software and related services, we will collect, store and use data related to your personal information, which can be used to receive verification codes when you register, log in, and retrieve your bound account and password, etc.
The information you fill in and/or provide when you register, log in or use the software and services may include name, mobile phone number, email address, address and other information that identifies the user individually or in combination.
If you log in in other ways, we will request your personal information from a third party, and we will still ask you to provide personal information that we need but the third party cannot provide. If you refuse to provide, you will not be able to use certain services.
2. Your information we obtain from third parties
We may obtain the account information (avatar, nickname, etc.) that you authorize to share from a third party, and bind your third-party account to your account after you agree to this "Privacy Policy", so that you can directly use the third-party account Log in and use our products and/or services. We will use your personal information on the premise of complying with relevant laws and regulations after confirming the legality of the source of personal information in accordance with the agreement with the third party.
2. Storage of personal information
1. Where the information is stored
In accordance with the provisions of laws and regulations, we store your personal information collected and generated during domestic operations in the territory of the People's Republic of China. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow relevant national regulations or seek your consent.
2. Storage period
During your use of this platform, we will continue to save your personal information, and the storage period will not exceed the period necessary to provide you with services. After you terminate the use of this platform or close the corresponding authorization, we will delete or anonymize your information, except as otherwise stipulated by laws and regulations for the retention period of specific information. If we stop operating the services of this platform, we will delete or anonymize your personal information held within a reasonable period in accordance with applicable laws.
3. Use of Information
1. Safety monitoring
In order to improve the security of your use of this platform, protect the personal and property safety of you or other users or the public, and better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc. To accurately identify violations of laws and regulations, when you use this platform, we will automatically collect your IP address, device unique identifier, hardware model and settings, operating system and application functions (such as MAC address) and your Detailed usage of our services, such as browsing history, time zone, regional and language settings, server logs (including access date and time), application crash information to comprehensively judge your account and transaction risks, perform authentication, detect and prevent security incidents , and take necessary recording, auditing, analysis and disposal measures in accordance with the law.
We will take reasonable and practicable measures to try our best to avoid collecting personal information irrelevant to the purpose of use. If we use your personal information beyond the purported purpose and directly or reasonably related to the use, we will inform you separately and obtain your express consent before using your personal information.
4. How we share and publicly disclose your personal information
1. Sharing of personal information
We will not share or transfer your personal information to third parties, unless you have given your prior authorization and consent, or the personal information shared or transferred is de-identified information, and the sharing third party cannot re-identify the individuals of such information Information subject.
When sharing your personal information, we will follow the following principles:
Authorization and consent principle: We will not share your personal information without your consent, unless the personal information shared is de-identified and processed, and the sharing third party cannot re-identify the natural person subject of such information. If the third party uses the information for a purpose beyond the scope of the original authorized consent, they need to obtain your consent again.
Principles of legality and minimum necessity: The shared data must have a legitimate and legitimate purpose, and the shared data is limited to the extent necessary to achieve the purpose.
Security and prudence principle: We will carefully evaluate the purpose of using shared information by third parties, conduct a comprehensive assessment of the security assurance capabilities of these partners, and require them to follow legal cooperation agreements. We will conduct strict security monitoring on the software tool development kits (SDKs) and application programming interfaces (APIs) used by partners to obtain information to protect data security.
2. Public disclosure of personal information
We will not disclose your information publicly without your consent. However, in accordance with laws, regulations, rules, other normative documents, mandatory administrative law enforcement or judicial requirements, in the event that you must provide your personal information, we may report to the administrative law enforcement or judicial agencies according to the requested type and disclosure method of personal information Disclosure of your personal information. When we receive a disclosure request, on the premise of compliance with laws and regulations, we require them to issue corresponding legal documents. We only provide data that law enforcement and judicial departments have obtained for specific investigation purposes and have legal rights. Under the premise of laws and regulations, the documents we disclose are under the protection of encryption measures.
Please understand that in the following cases, according to laws, regulations and national standards, we do not need your authorization and consent to share, transfer, and publicly disclose your personal information:
(1) Those directly related to national security and national defense security;
(2) Those directly related to public safety, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(4) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent, except for the circumstances expressly prohibited by laws and regulations;
(5) Your personal information disclosed to the public by yourself;
(6) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
According to the law, sharing and transferring de-identified personal information and ensuring that the recipient of the data cannot recover and re-identify the subject of the personal information is not an external sharing, transfer or public disclosure of personal information. The processing will be performed without further notice to you and your consent.
5. How we protect the security of your personal information
We adopt strict data processing authority control to prevent data from being used illegally; we adopt various data desensitization methods of de-identification technology such as coding and shielding to enhance the security of personal information in use; we adopt encryption technology widely used in the industry Your personal information is encrypted and stored and isolated through data isolation technology. For example, we encrypt all messages stored on our servers and on your terminal device. We always implement these technical measures and organizational management methods, and may revise and improve them from time to time to improve the overall security of the system.
Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, It is not always possible to guarantee 100% security of information, and we will do our best to ensure the security of the personal information you provide to us. Please know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information and do not disclose your account and other personal information to others.
In the event of an event jeopardizing network security, we will take appropriate remedial measures in a timely manner in accordance with the network security incident emergency plan. If our physical facilities or technical protection measures are damaged, resulting in your personal information being leaked, illegally provided or misused, resulting in damage to your legitimate rights and interests, we will assume corresponding responsibilities in strict accordance with the law.
6. Function description
We will collect and process user information for the following functions or purposes
Account login: For your convenience, we provide account login function. You can log in by registering an account with your mobile phone number. If you log in with your mobile phone number, we will collect your mobile phone number for account registration. If you want to cancel your account, you can cancel your account by referring to the contents of "Cancellation of Account" in this Privacy Statement.
vip privilege: for your convenience, we provide vip privilege function. You can log in to your account with your mobile phone number to activate vip privileges through WeChat/Alipay, and we will collect your mobile phone number and mobile imei or uuid as the only representation of membership.
Account Cancellation Instructions
If you have carefully considered and decided to give up your Text Scan Master account, and meet all the cancellation conditions stipulated by Text Scan Master, you can log out by yourself through the app. Click "Delete Account" to proceed with the logout process. During the logout process, your original identity information needs to be verified. After you logout, the following information will be cleared and cannot be retrieved:
- Membership and related benefits
- Identity information and third-party authorization information
The text scan master account cancellation application will take effect immediately after the application is successful. Once it is cancelled, it will not be restored. Please back up all the information and data related to the text scan master account before operation. Please keep the transaction vouchers, bills and other information of the order service, otherwise you may have to pay additional account and order inquiry fees, or you may not be able to enjoy after-sales service. TextScan Master will not be held responsible for any adverse impact on you caused by the cancellation of your account application.
7. Required permissions
1) Storage permissions <
Some local data is required for caching software, such as: user KEY, imei, uuid, and software usage records after successful login.
2) Network connection permissions
Our application needs to be connected to the Internet. For the normal use of the networking function of this software
3) Network connection status permission
Our application needs to be connected to the network. We determine whether you have a network by checking whether you have enabled mobile data or wifi. When it is detected that you have no network, you will be prompted to enable it.
4) Mount and unmount file system permissions
Used to update and upgrade applications.
5) Camera permission
For photo translation.
List of third-party SDKs:
SDK: com.facebook.fresco
Purpose of use: The uni-app base module is integrated by default, used for nvue page loading image use
Types of data collected: storage of personal files
Official website link: https://www.fresco-cn.org/
SDK: com.facebook
Purpose of use: This app uses facebook's open source framework to build an interface
Type of data collected: No data is collected
Official website link: https://reactnative.dev/
SDK: wechat-sdk-android WeChat login
Purpose of use: use Tencent WeChat third-party login
Type of data collected: No data is collected
Official website link: https://open.weixin.qq.com/
SDK: android.permission.READ_PHONE_STATE
Purpose of use: for app data and crash log statistics
Mobile phone data type: Get mobile phone status (including mobile phone number, IMEI, IMSI permissions, etc.)
Official website link: https://www.umeng.com/page/policy
SDK: com.qq.e Youlianghui SDK
Function: Ad SDK for serving ads to users
Types of Personal Information Collected: IMEI, MAC Address, Location Information, Identifiers, Usage Data, Diagnostics, Other Data
Privacy Policy: https://imgcache.qq.com/gdt/cdn/adn/uniondoc/ylh_sdk_privacy_statement.html
SDK: Pangolin SDK
Function: Ad SDK for serving ads to users
Types of personal information collected: Obtain mobile phone status including imei, network status, mac address, etc., location information, identifiers, usage data, diagnostics, and other data
Privacy Policy: https://www.pangle.cn/privacy
SDK: com.qq.e Guangdiantong
Function: Ad SDK for serving ads to users
Types of personal information collected: Obtain mobile phone status including imei, network status, mac address, etc., location information, identifiers, usage data, diagnostics, other data
Privacy Policy: https://www.tencent.com/en-us/privacy-policy.html
SDK: com.umeng UMENG (Youmeng SDK)
Purpose of use: user data statistics
Type of data collected: device identification information (IMEI/IP address/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/MAC address/geolocation, etc.)
Official website link: https://www.umeng.com/page/policy?spm=a213m0.17692878.0.0.6375378e01JMi9
SDK: com.google.android.gms.ads(AdMob)
Purpose of use: Advertising sdk that provides advertising services to users
Types of data collected: IMEI, browser type and settings, operating system, mobile network information (including operator name and phone number) and application version number, location information, mac address, etc.
Privacy Policy: https://policies.google.cn/privacy
8. Change
In the event of any material change to this Privacy Policy, we will use reasonable efforts to advertise it to all users, such as by posting a notice on this Platform; your continued access or use of this Platform after this Privacy Policy is updated shall be deemed your acceptance Updated Privacy Policy. If you do not agree with the updated privacy policy, please stop accessing or using this platform.
9. Protection of Children's Personal Information
If you are a child under the age of 14, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using the services of this platform.
We protect children's personal information in accordance with relevant national laws and regulations, and will only collect, use, store, share, transfer or disclose children's personal information as permitted by law, with explicit consent of parents or other guardians, or necessary to protect children; If we become aware that personal information from a child has been collected without prior verifiable parental consent, we will seek to delete the information as soon as possible.
If you are the guardian of a child, when you have questions about the personal information of the child under your guardianship, please contact us through the contact information published in this Privacy Policy.
Update date: 2021-09-20
Effective Date: 2021-09-20