Release date: August 28, 2024Effective date: August 28, 2024
Welcome to Pocket Data Genius products and services!
Your trust is very important to us. We are fully aware of the importance of personal information to you. We will provide full protection for the security of your personal information in accordance with legal and regulatory requirements and in accordance with industry best practices. To this end, Pocket Data Genius (hereinafter referred to as "this software") has formulated this Privacy Policy (hereinafter referred to as "this policy/"this Privacy Policy") to help you fully understand the following when you use this software product/service How will we collect, use, share, store and protect your personal information and how can you manage your personal information during the process? Before you start using our products and services, please be sure to read and understand this policy carefully. , make sure you fully understand and agree before you start using it. We will try to explain the professional terms involved in this policy in a concise and popular way to facilitate your understanding. If you have any questions, comments or suggestions about the content of this policy, you can Contact us through the various contact methods provided in this policy.
This privacy policy section will help you understand the following:
1. Definition and Scope of Application 2. How we collect and Use your information 3. How we use cookies and similar technologies 4. How we share, transfer, and publicly disclose your information 5. How we protect your information 6. How do we store your information 7. How do you manage your information 8. How do we handle information of minors 9. How to update this privacy policy 10. How do you contact us
(I) Definition 1. Software Service Provider: refers to Shenghe (Beijing) Information Technology Co., Ltd., the legal entity that develops and provides the software products and services, hereinafter referred to as "this software" or "we". 2. Enterprise/Team Users of this Software: refers to those who register as users of this Software through an authorized administrator of the enterprise or other team or directly through the legal representative, and upload the enterprise/team employee address book through the software management platform as an administrator to build the enterprise organizational structure, and then open, manage and use the software service on behalf of the enterprise team. Enterprise/Team Users of this Software include but are not limited to legal persons, government agencies, other organizations, partnerships or individual businesses, etc. 3. Enterprise/Team Administrators of this Software: refers to individual users of this Software who are authorized or designated by the enterprise team users of this Software, have the system operation authority of the enterprise team user management platform of this Software, and open, manage and use the software service on behalf of the enterprise team. 4. Individual users of this software: refers to individual users who register for this software account, including individual users with the administrator privileges of the enterprise team users of this software and individual users who are members of the enterprise team users of this software and do not have the administrator privileges of the enterprise team of this software, hereinafter referred to as "you". 5. Personal information: refers to various information recorded in electronic or other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. 6. Personal sensitive information: refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. The personal sensitive information of this software service includes mobile phone numbers, transaction information, personal information of children under 14 years old (inclusive), etc. 7. Children: refers to minors under the age of fourteen. 8. Deletion of personal information: refers to the act of removing personal information in the system involved in realizing daily business functions, so that it remains in an inaccessible and unretrievable state. 9. Anonymization of personal information: the process of making the subject of personal information unidentifiable and the processed information unrecoverable through technical processing of personal information. 10. Controller of personal information: the team or individual who has the right to decide the purpose and method of personal information processing. Some controllers of personal information in this agreement and this software service are the enterprise/team users of this software. Unless otherwise agreed, the definitions used in this policy have the same meaning as those in the "Software Service Agreement".
(II) Scope of application This policy applies to the products and services of this software platform, including the computer client of this software, the web version of this software (dyy.winpeace.com.cn), WeChat applet and mobile APP.
Our products are developed based on DCloud uni-app (5+ App/Wap2App). During the operation of the application, we need to collect your device unique identification code (IMEI/android ID/IDFA, SIM card IMSI information) to provide statistical analysis services, and improve performance and user experience through application startup data and abnormal error log analysis to provide users with better services. When you use our software products and/or services, we need/may need to collect and use your personal information including the following two types:
1. In order to provide you with the basic functions of our software products and/or services, you must authorize us to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally; 2. In order to provide you with additional functions of our products and/or services, you can choose to authorize us to collect and use information. If you refuse to provide, you will not be able to use the relevant additional functions normally or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic functions of our products and/or services.
You understand and agree: 1. We are committed to creating a variety of products and services to meet your needs. Because we provide you with a wide variety of products and services, and different users choose to use different specific product/service scopes, the basic/additional functions and the types and scopes of personal information collected and used will be different accordingly. Please refer to the specific product/service functions; 2. In order to bring you a better product and service experience, we are continuously working to improve our technology. As a result, we may launch new or optimized functions from time to time, which may require the collection and use of new personal information or change the purpose or method of using personal information. In this regard, we will explain to you the purpose, scope and use of the corresponding information by updating this policy, pop-up windows, page prompts, etc., and provide you with a way to choose consent on your own, and collect and use it after obtaining your explicit consent. During this process, if you have any questions, comments or suggestions, you can contact us through the various contact methods provided by this software, and we will answer you as soon as possible. In order to provide this software service to you and the enterprise/team users of this software, maintain the normal operation of this software service, improve and optimize our service experience and protect your account security, we will collect the information you actively provide, authorize to provide, or based on the requirements of your enterprise team users when registering and using this software service, as well as the information generated when you use this software service for the following purposes and methods in this policy:
(I) Help you become our registered user of this software 1. Register as a personal user of this software To register as a personal user of this software, so that we can provide you with basic services of this software, such as account binding and account login, we need to collect your mobile phone number and SMS verification code to register and create this software account, otherwise you will not be able to use this software service. After registering as a user of this software, you can enter basic information such as name, avatar, nickname, etc. 2. Register as an enterprise/team user of this software To register as an enterprise team user of this software, so that we can provide this software service based on the employment and management behavior of your enterprise team, such as various modules of this software platform (including attendance, approval, report, schedule, inventory, customer, order and finance based on enterprise/team management), in order to realize the digital office transformation and upgrading of the enterprise/team, you need to provide your enterprise/team name to create this software enterprise/team account, otherwise you will not be able to use this software service based on the enterprise team management behavior. After registering as an enterprise team user of this software, you must further provide information on the location, industry type and staff size of the enterprise/team. If you need to obtain more rights and interests (such as the activation of the professional version, etc.), as an enterprise/team administrator, you need to provide specific information and materials on behalf of the enterprise/team to complete the effectiveness of some rights and interests, including certificate type, copy of business license, unified social credit code, enterprise organization name, address, name of legal representative, and ID number of legal representative.
(II) Information collected during the use of this software service When you use this software service, in order to provide you with more suitable software services, interactive display, search results, identify abnormal account status, maintain the normal operation of this software service, improve and optimize your experience of this software service and protect your account security, including information about your use of this software service and how to use it, and associate this information: 1. Usage information We will collect information submitted or generated when you use this software service as an individual user of this software, and information submitted or generated when you use this software service as an end user of this software enterprise/team user. 2. Device information We will receive and record information about the device you use (such as device model, operating system version, device settings, unique device identifier and other software and hardware feature information) and information about the location of the device (such as IP address, GPS/Beidou location information, and sensor information such as Wi-Fi access points, Bluetooth and base stations that can provide relevant information) based on the specific permissions you grant during software installation and use. 3. Log information When you use the products or services provided by our clients, websites, and mini-programs, we will automatically collect detailed information about your use of our services and save it as relevant network logs. For example, your search query content, IP address, browser type, telecom operator, language used, access date and time, web page records you visit, call status information, approval log information, attendance log information, office payment information, transaction log information of this software application market, and other operation log information. Please note that individual device information, log information, etc. are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information may be considered personal information during the combined use. We will anonymize and de-identify such personal information unless you authorize us or otherwise required by laws and regulations. When you use our services or view content provided by us, we may automatically collect certain information and store it in server logs. Such information includes: detailed information about your use of our services; call log information: obtaining call time and duration. 4. Enterprise Team Control Data If you, as an enterprise team administrator of this software, choose to activate and manage the software service, we will record the information and data submitted or generated by the individual users of this software in the process of using the relevant functions/applications of this software according to the instructions of the enterprise team administrator of this software (hereinafter referred to as "Enterprise Team Control Data"), and the enterprise team control data may include: 1) Information such as the role and authority assigned to you by your enterprise team, as well as personal sensitive information such as fingerprint base map, fingerprint features, facial features, geographic location, attendance punch-in information, approval records, release log information, schedule information, etc. that you require or generate to complete the operation function. 2) Order transaction information when you use the software service, so as to show you and facilitate your order management. Such as transaction information when you upgrade the professional version of this software platform as an administrator. You understand and agree that the enterprise team user is the controller of the data controlled by the above-mentioned enterprise, and we only activate, manage and use the above-mentioned application services to process the enterprise team control data of this software or your personal information according to the instructions of the enterprise team user administrator. 5. Information you provide to us During the use of this software service, you can provide feedback on the experience of the software's products, functions, applications and services to help us better understand your experience and needs in using our products or services and improve our products or services. For this purpose, we will record your contact information, feedback questions or suggestions so that we can further contact you to feedback our handling opinions. 6. Customer Service and Dispute Handling When you contact us or apply for after-sales service or dispute handling during sales, in order to protect the security of your account and system, we need you to provide necessary personal information to verify your registered account identity for this software. In order to facilitate contact with you, help you solve problems as soon as possible, or record the solutions and results of related problems, we may save your communication/call records and related content with us (including account information, work order information, other information you provide to prove relevant facts, or contact information you leave). If you consult, complain or provide suggestions for a specific order, we will use your account information and work order information. In order to provide services and improve the reasonable needs of service quality, we may also use your other information, including the relevant information you provide when you contact customer service and the questionnaire response information you send to us when you participate in the questionnaire survey. 7. Show you product or service information In order to show you product or service information that better suits your needs, we will collect and use your usage information, device information or service logs when you access or use this software service to form group feature tags, which are used to provide users with marketing activity notifications, commercial electronic information or, push and other information. 8. Information collection for your security To improve your security when using us, protect the personal and property safety of you or other users or the public from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, and more accurately identify violations of laws and regulations or relevant agreement rules of this software, we embed the application security SDK developed by our company in the application to collect your personal information, service usage information, device information, service log information, and may use or integrate your member information, transaction information and information you authorize or share according to the law to comprehensively judge your account and transaction risks, conduct identity authentication, detect and prevent security incidents, and take necessary recording, auditing, analysis and disposal measures in accordance with the law. 9. Other additional services provided to you The following information will not affect your use of the basic services such as digital office, communication and collaboration of this software, but you may not be able to obtain the user experience brought to you by these additional services. These additional services include: 9.1 Additional services based on camera/camera: You can use this function to scan codes, take photos/videos, and take WeChat screenshots after turning on the camera/camera permissions. 9.2 Additional services based on storage, photo album (photo library/video library) image/video access and upload: You can use this function to upload your photos/pictures/videos after turning on the photo album permission, so as to change the avatar, post comments, upload photos or videos, complete the enterprise team certification or communicate with customer service to provide proof, and perform log caching, voice/picture/video and other multimedia downloads, etc. If you refuse us to obtain this permission, we will not be able to provide you with the above services. 9.3 Additional services related to voice technology based on microphone: You can use the microphone to realize the intelligent voice input function in this software or realize voice interaction with the robot after turning on the microphone permission. Please be aware that even if you have agreed to turn on the microphone permission, we will only obtain voice information through the microphone when you actively click the microphone icon in the client or record a video. 9.4 Location permission: You can turn on your location permission (including geographic location permission or WIFI, Bluetooth recognition range) to complete the attendance punch-in arranged by your team or you actively share your location. 9.5 Phone status permission: To ensure the security of your account and usage, you need to authorize us to read the local identification code. If you refuse, this software will not be able to operate normally due to security risks. 9.6 Phone call permission: To make calls, you need to authorize us to make calls. If you refuse, the phone call function through this software may be unavailable. 1) Calendar-based additional services: After you enable us to read/write your calendar, we will collect your synchronized mobile phone schedule and log schedule to create your schedule in this software so that it can be displayed in the to-do function, manage the calendar information you created, arrange tasks and remind you of relevant schedule arrangements. 2) Allow access to address book and write contact information service: After you authorize access to and write address book permissions, write your local mobile phone's address (including mobile phone number and name) in your software. You understand and agree that the above additional services may require you to enable access to your location information (geolocation), camera, photo album and storage, microphone (voice), address book and/or phone status in your device to collect and use the information involved in these permissions. You can view the status of the above permissions in your device's "Settings-App Permissions" or the client's "My-Settings-General or Privacy", and you can decide to turn these permissions on or off at any time. Please note that when you enable any permission, it means that you authorize us to collect and use relevant personal information to provide you with the corresponding services. Once you turn off any permission, it means that you cancel the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, and we will not be able to provide you with the services corresponding to the permission. However, your decision to turn off the permission will not affect the previous collection and use of information based on your authorization. You understand and agree that the functions and service scenarios we provide to you are constantly iterating and upgrading. If we do not clearly indicate the personal information you need to collect in the above scenarios, we will separately indicate the content, scope and purpose of information collection to you through page prompts, interactive design, etc. and obtain your consent. If we stop operating this software product or service, we will promptly stop collecting your personal information, notify you of the cessation of operation in the form of an announcement 30 days in advance, and delete or anonymize your personal information in accordance with applicable laws.
(III) Applications obtain MAC address personal information 1. Collection of MAC address information: In order to provide the services you need and ensure the normal operation of the application, we may collect the MAC address of your device. The MAC address is the unique identifier of the device in the network, which helps us identify the device and optimize the service experience. 2. Purpose of information collection: The main purpose of our collection of MAC addresses is for device identification, network connection optimization, service provision and data analysis. This information helps us understand the user's usage habits so that we can improve the quality of service and user experience. 3. Use of information: We promise that the collected MAC address information will only be used for the above purposes and strictly abide by the provisions of relevant laws and regulations. Without your consent, we will not use your MAC address information for other purposes or share it with third parties.
Use of Cookies To provide you with an easier access experience, when you use this software product or service, we may collect and store relevant data about your access to this software service through various technologies. When you visit or revisit this software service, we can identify you and provide you with better and more services by analyzing the data. This includes using small data files to identify you. This is done to understand your usage habits, save you the steps of repeatedly entering account information, or help determine the security of your account. These data files may be cookies or other local storage provided by your browser or associated applications (collectively referred to as "cookies"). Please understand that some of our services can only be achieved by using cookies. If your browser or browser add-on service allows, you can modify the degree of acceptance of cookies or reject the cookies of this software, but if you reject the cookies of this software, you may not be able to use some functions of this software service that rely on cookies in some cases.
We are fully aware of the importance of user data, and therefore we will collect, use and protect user data in strict accordance with the requirements of relevant laws and regulations. For data collected through third-party SDKs, we will process them in accordance with the agreement signed with the SDK provider and ensure the legality, legitimacy and necessity of the data. Unless we obtain the explicit consent of the user or the permission of laws and regulations, we will not share the data collected through third-party SDKs with any third party. When sharing data, we will strictly abide by the requirements of relevant laws and regulations and take necessary security measures to ensure the security of the data.
(I) Processing of Sensitive Information We are fully aware of the importance of sensitive information to users, and therefore we will take more stringent measures to protect this information. In the process of using our applications, we may collect and process some sensitive information, including but not limited to: Identification information such as name, ID number: etc. This information may be collected when you use certain specific functions (such as real-name authentication). Location information: including precise GPS location data, which may be collected when you use location-based services.
(II) Purpose of Collection and Method of Use We collect sensitive information for the purpose of providing better services and functions, including but not limited to identity authentication, payment processing, etc. We will strictly handle such sensitive information in accordance with the requirements of relevant laws and regulations, and take necessary security measures to ensure its security.
(III) Data Sharing and Protection We will not share sensitive information with any third party unless we obtain the explicit consent of the user or the permission of laws and regulations. When sharing data, we will strictly comply with the requirements of relevant laws and regulations, and take security measures such as encryption to ensure the security of the data.
(IV) User Rights Users have the right to review, correct or delete the sensitive information we collect at any time. Users also have the right to refuse us to collect and process sensitive information, but please note that this may affect your use of our application or certain specific functions. We strongly recommend that you regularly review and update your personal information to ensure its accuracy and completeness. If you have any questions or suggestions about our privacy policy or data processing methods, please feel free to contact us through our contact information.
(I) Sharing We will not share your personal information with companies, organizations, and individuals other than the service provider of this software, except in the following cases: 1. Sharing with your consent: We will share your personal information with other parties after obtaining your explicit consent. 2. Sharing under legal circumstances: We may share your personal information with others in accordance with laws and regulations, litigation, dispute resolution needs, or administrative and judicial authorities. 3. Sharing when you actively choose: Only by sharing your personal information and personal sensitive information can we provide the third-party products and services you request, such as: 1) Activate and use third-party applications. If you, as an enterprise team user administrator of this software, choose to activate, manage and use third-party application services through the application market of this software, you agree that this software will provide the third-party application service provider with the basic personal information (UserID, avatar, nickname, etc.) and basic permissions of the enterprise team employees controlled by your enterprise team users based on employment management behavior, or if you, as an individual user of this software, choose to activate a third-party mini program service through the mobile client "My-Mini Program", you agree that this software will provide your basic personal information (UserID, avatar, nickname, etc.) to the mini program service provider, otherwise you will not be able to use the third-party application service or mini program service. When you activate and use third-party application services, you need to read and fully understand and comply with the product functions, statements and corresponding privacy protection policies of the third-party application services or mini programs. 2) Handling of infringement complaints: When you are complained by others for infringement of intellectual property rights or other legal rights, you need to disclose your necessary information to the complainant in order to handle the complaint; 3) Sharing with authorized partners: We may entrust authorized partners to provide you with certain services or perform functions on our behalf. We will only share your information for legitimate, proper, necessary, specific and clear purposes. Authorized partners can only access the information they need to perform their duties and may not use this information for any other purpose. At present, our authorized partners include the following types: Message push service providers: Push technology services are provided by Daily Interactive Co., Ltd. We may provide your device platform, device manufacturer, device brand, device identification code and other device information, application list information, network information and location-related information to Daily Interactive Co., Ltd. for providing you with message push technology services. When we push messages to you, we may authorize Daily Interactive Co., Ltd. to adjust the link and mutually activate the closed SDK push process to ensure that you can receive the messages we push to you in a timely manner. For details, please visit the "Personal Push User Privacy Policy". AutoNavi Map: In order to provide you with location-based related functions/services, our products integrate the AutoNavi Map Positioning SDK. When providing you with positioning functions/services, AutoNavi Map SDK needs to collect and use your device information, location information, WLAN and other sensor information. Please read the "AutoNavi Map Open Platform Privacy Policy" carefully for details Suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business, including technical cooperation R&D services commissioned by us, software promotion and deployment services for this software platform, customer service, payment convenience and other cooperation scenarios. Authorized partners for advertising and analysis services. We will entrust these partners to process information related to advertising coverage and effectiveness, but unless you allow us to do so, we will not share your personally identifiable information with partners who provide advertising and analysis services, or we will de-identify this information so that the authorized partners cannot identify you personally. Such partners may combine the above information with other data they legally obtain to implement the advertising services or decision-making recommendations we entrust them with.
(II) Transfer We will not transfer your personal information to any company, organization or individual, except in the following circumstances: 1. Transfer with explicit consent: We will transfer your personal information to other parties after obtaining your explicit consent. 2. In the event of a merger, acquisition or bankruptcy liquidation of the software service provider, or other merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or team holding your personal information to continue to be bound by this policy, otherwise we will require the company, team or individual to re-ask your authorization and consent.
(III) Public Disclosure We will only publicly disclose your personal information in the following circumstances: 1. With your explicit consent or based on your active choice, we may publicly disclose your personal information; 2. If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of this software, or to protect the personal and property safety of users of this software and its affiliates or the public from infringement, we may disclose your personal information with your consent in accordance with laws and regulations or the relevant agreement rules of this software, including relevant violations and measures taken by this software against you.
(IV) Exceptions to prior authorization and consent when sharing, transferring, and publicly disclosing personal information In the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent: 1. Related to national security and national defense security; 2. Related to public safety, public health, and major public interests; 3. Related to criminal investigation, prosecution, trial, and execution of judgments; 4. For the purpose of safeguarding your or other individuals’ major legitimate rights and interests such as life and property, but it is difficult to obtain the consent of the person concerned; 5. Personal information that you disclose to the public on your own; 6. Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure, and other channels. Please note that according to the law, sharing and transferring personal information that has been anonymized and ensuring that the data recipient cannot restore and re-identify the subject of the personal information does not constitute external sharing, transfer and public disclosure of personal information. The preservation and processing of such data will not require further notification to you and your consent.
(I) Technical security protection To ensure the security of your information, we have taken reasonable and feasible security protection measures that meet industry standards to protect your information and prevent personal information from being accessed, disclosed, used, modified, damaged or lost without authorization. For example, when exchanging data between your software client APP and the server, it is encrypted and protected by the SSL protocol; we also provide HTTPS protocol secure browsing for the official website of this software; we will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(II) Security System Certification This software has an industry-leading data security management system that takes data as the core and revolves around the data life cycle, which improves the security of the entire system from multiple dimensions such as team building, system design, personnel management, and product technology.
(III) Personnel Security Management We have also adopted strict management for employees or outsourced personnel who may have access to your information, including but not limited to taking different authority controls according to different positions, signing confidentiality agreements with them, and monitoring their operations. We will provide corresponding security measures according to existing technologies to protect your information and provide reasonable security protection. We will try our best to prevent your information from being leaked, damaged or lost. We will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(IV) Password Protection Tips The Internet is not an absolutely safe environment. Please use complex passwords when using this software service to help us ensure the security of your account. We will make reasonable commercial efforts to ensure the security of any information you send to us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legal rights and interests, we will bear the corresponding legal liability.
(V) Handling of Information Security Incidents After a personal information security incident occurs, we will inform you in accordance with the requirements of laws and regulations (no later than 30 natural days): the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, your suggestions for self-prevention and risk reduction, and your remedial measures. We will inform you of the relevant circumstances of the incident by email, letter, phone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take reasonable and effective ways to issue an announcement. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities. The Internet environment is not 100% safe. Although we have these security measures, please note that there is no "perfect security measures" on the Internet. We will ensure the security of your information based on normal business efforts.
You can access and manage your information in the following ways:
(I) Query, correct and supplement your information 1. Individual users of this software As an individual user of this software, you have the right to query, correct or supplement your information. You can do it yourself in the following ways: Log in to the client of this software and query and correct personal information and personal account related information by operating "My-Avatar-My Information": Avatar, name, mobile phone number and other information.
(II) Delete your information You can delete some of your information by the methods listed in "(I) Query, correct and supplement your information" above. In the following circumstances, you can ask us to delete your personal information: 1) If our handling of personal information violates laws and regulations; 2) If we collect and use your personal information without your explicit consent; 3) If our handling of personal information seriously violates the agreement with you; 4) If you no longer use our products or services, or you actively cancel your account; 5) If we no longer provide you with products or services. If we decide to respond to your request for deletion, we will also notify the subject that obtained your personal information from us as much as possible and request it to delete it in a timely manner (unless otherwise provided by laws and regulations, or these subjects have independently obtained your authorization). After you or we assist you in deleting the relevant information, due to applicable laws and security technologies, we may not be able to immediately delete the corresponding information from the backup system. We will securely store your personal information and isolate it from any further processing until the backup can be cleared or anonymized.
(III) Change the scope of your authorization and consent Each business function requires some basic personal information to be completed (see "II. How we collect and use your information" in this privacy policy). In addition, you can change the scope of your authorization and consent by operating: Individual users of this software: You can log in to the mobile client, set it in "My-Settings-Privacy" or contact the customer service of this software website or change the settings of your smart mobile device to give or withdraw your authorization and consent (for example, you can withdraw your user consent authorization of "Allow me to be found by mobile phone number" in the mobile client APP "My-Settings-Privacy"). When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the personal information processing previously carried out based on your authorization.
(IV) Cancel your account When your enterprise/team user cancels the enterprise team of this software, we will anonymize or delete your relevant personal information in the team, but your personal information as an individual user of this software will still be retained unless you actively cancel your personal account of this software. After you actively cancel your personal account on this software, we will stop providing you with this software service and delete your personal information or anonymize it in accordance with the requirements of applicable laws: You can also contact us through the client "My-Contact Customer Service" or "Customer Service Hotline (010-8886 6207). After you actively cancel your account, we will stop providing you with products or services, delete your personal information or anonymize it in accordance with the requirements of applicable laws.
(V) Restricting automatic decision-making of information systems In certain business functions, we may make decisions based only on non-manual automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legal rights and interests, you have the right to ask us for an explanation, and we will also provide a complaint method without infringing on the software's commercial secrets or other user rights and interests, or the public interest.
(VI) Responding to your above request To ensure security, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. We will respond within 15 days. If you are not satisfied, you can also file a complaint through the customer service of this software. In principle, we do not charge any fees for your reasonable requests, but we will charge a certain fee for repeated requests that exceed reasonable limits. We may reject requests that are not directly related to your identity, repeat information without reason, or require too many technical means (for example, the need to develop new systems or fundamentally change current practices), pose risks to the legitimate rights and interests of others, or are impractical. In the following circumstances, we will not be able to respond to your request in accordance with laws and regulations: 1) Related to national security and national defense security; 2) Related to public safety, public health, and major public interests; 3) Related to criminal investigation, prosecution, trial, and execution of judgments; 4) There is sufficient evidence that the subject of personal information has subjective malice or abuses rights; 5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations; 6) Involving the business secrets of the software company and/or the software enterprise team users.
(I) Storage location We will store the personal information collected and generated in the operation of this software service in the territory of the People's Republic of China in the territory of the People's Republic of China. The personal information generated by the users of this software outside the People's Republic of China in the process of using this software products and services will be stored on the server in Singapore, otherwise you will not be able to use the existing products and services of this software. In the following circumstances, we will provide your personal information to overseas entities after fulfilling the obligations prescribed by law: 1) The applicable law has clear provisions; 2) Obtain your explicit authorization; 3) You conduct cross-border transactions and other personal proactive behaviors through the Internet. In response to the above circumstances, we will ensure that your personal information is protected to a degree not less than that specified in this policy through contracts and other forms.
(II) Storage period We will take reasonable and feasible measures to store your personal information and try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period required to achieve the purposes described in this policy and the period required by applicable laws and regulations. For example, this software will retain the transaction goods, service information, and transaction information of paid applications and paid services purchased in the software application market for no less than three years from the date of completion of the transaction in accordance with the requirements of the "E-Commerce Law of the People's Republic of China". This software will retain relevant network logs for your use of this software application service for no less than six months in accordance with the requirements of the "Cybersecurity Law of the People's Republic of China". The criteria for our judgment of the aforementioned period include: 1) Complete the service purpose related to you, maintain the corresponding service and business records, and respond to your possible inquiries or complaints; 2) Ensure the security and quality of the services we provide to you; 3) Whether you agree to a longer retention period; 4) Whether there are other special agreements on the retention period. After your personal information exceeds the retention period, we will delete your personal information or anonymize it in accordance with the requirements of applicable laws.
In digital office/learning, communication and collaboration activities, we presume that you have the appropriate civil capacity. If you are a minor, we ask that you ask your parents or other guardians to read this Privacy Policy carefully and use our services or provide information to us with the consent of your parents or other guardians.
Our privacy policy may change. We will not limit your rights under this Privacy Policy without your explicit consent. We will announce any changes to this privacy policy on the official homepage of this software (dyy.winpeace.com.cn) . For major changes, we will also provide more prominent notices (including soliciting opinions, making announcements, and even providing you with pop-up reminders through the disclosure of this software).
Major changes referred to in this policy include but are not limited to: 1) Our service model has undergone significant changes. Such as the purpose of processing personal information, the type of personal information processed and the use of personal information; 2) We have undergone major changes in control, organizational structure, etc. Such as changes in controllers caused by mergers, acquisitions, reorganizations, etc.; 3) The main recipients of personal information sharing, transfer or public disclosure change; 4) Significant changes in your rights to participate in the processing of personal information and the way you exercise them; 5) When our responsible department, contact information and complaint channels for handling user information security change; 6) When the user information security impact assessment report indicates that there is a high risk. We will also archive the old version of this Privacy Policy on the dedicated page of this software for your review.
If you have any questions, comments or suggestions about the privacy protection policy or data processing of this software, you can contact us through "My-Contact Customer Service" or "Customer Service Hotline (010-8886 6207). Our mailing contact information is as follows : Shenghe (Beijing) Information Technology Co., Ltd. Contact department: Operations Department Address: Room 519, Floor 5, Building 1, No. 2, Caoqiao East Road, Fengtai District, Beijing Postcode: 100068 Email: xych@winpeace.com.cn Under normal circumstances, we will respond within fifteen working days after receiving your relevant contact information and verifying your identity. Thank you for trusting us and using this app. We will continue to work hard to protect your privacy and provide quality service.