Updated:01 January 2023
Foreword
This policy applies to all products and services provided by our company, hereinafter referred to as "we".
In order to provide you with consistent services in different products, We has established a unified account service system among multiple business applications. Within the service scope of the service system, We will jointly collect and process personal information related to We account registration and login when you log in and use applications within the system; Business applications within the service system are also guidelines for personal information protection based on this policy, and separate independent privacy policies or similar documents are formulated as needed. If a product provided by us has a separate privacy policy or a special agreement in the corresponding user service agreement, the privacy policy or special agreement of the product will be applied preferentially. The content not covered by the product privacy policy and special agreement shall prevail over the content of this policy.
Please note that this policy does not apply to other third party products or services that you access through our products or services (the "other third party" includes any third party websites and third party service providers), as specified in the third party's privacy policy or similar statement.
A.We Client Software: Also referred to as "We Software" and "We Business Applications", it refers to various systems and software including We website and client that carry We services, as well as other domain names, systems and software products launched by We from time to time according to business operation needs. The actual operating entity of each We software shall be subject to the individual prompts or statements of the corresponding software.
B. Personal information: all kinds of information related to identified or identifiable natural persons recorded electronically or in other ways, excluding information processed anonymously.
C.Sensitive personal information: refers to personal information that can easily cause the personal dignity of natural persons to be infringed upon or the personal and property safety of natural persons once leaked or illegally used, including biometrics, religious beliefs, specific identities, medical and health care, financial accounts, whereabouts and other information, as well as personal information of minors under the age of 14.
D.Collection: refers to the act of obtaining the control right of personal information, including the act of actively collecting personal information, such as actively providing personal information, interacting with or recording the behavior of the subject of personal information, and indirectly obtaining personal information through sharing, transferring, and collecting public information. If the provider of a product or service provides a tool for the use of a personal information subject, and the provider does not access personal information, it does not belong to the collection of personal information.
E.Authorization consent: Sometimes also expressed as "authorization" and "consent", it refers to the behavior of the subject of personal information to make a clear authorization for the specific processing of their personal information, including authorization through positive acts, and authorization through negative inaction.
F.Delete: refers to the act of removing personal information from the system involved in the implementation of daily business functions, so as to keep it in a state that cannot be retrieved or accessed.
G.SDK: Also known as the software development toolkit, the industry generally refers to the collection of development tools when building application software, such as specific software packages, software frameworks, hardware platforms, operating systems, etc.
H.Client terminal equipment: Also referred to as "terminal" or "terminal equipment" in this article, it refers to the mobile Internet terminal equipment used by you to download and install We business applications, mainly including mobile phones and PAD.
I.Intelligent Internet of Things hardware device: Also referred to as "smart device" or "hardware device" in this article, it refers to the intelligent hardware products that you bind and manage through We business applications.
J.Permission: Also referred to as "application permission" in this article, it refers to the system function scope that your client terminal equipment is open to We business applications, mainly including photo album, microphone, Bluetooth, and location.
Please read and fully understand this policy before using the various products/services we provide. Contents closely related to your rights and interests will be highlighted in bold or underlined format; By the time you use or continue to use our products/services, you are aware of the contents of this Privacy Policy and understand the features we provide to you and the necessary personal information necessary for the functionality to function, but this does not mean that you have agreed that we may collect non-essential personal information that will be solicited separately from you based on your authorization to use it. In addition, the corresponding client terminal device permissions will not be turned on by default. When important or sensitive terminal device permissions are involved, we will open another pop-up window after obtaining your consent when you use the corresponding business functions; After the permission is turned on, you can also set the shutdown permission through the terminal device at any time; If you do not agree to open permissions, it will not affect the normal use of other non-related business functions. Personal sensitive information will also be processed separately with your consent.
If you refuse this Privacy Policy, it means that you refuse to provide us with authorization for personal information, and we will only be able to provide you with content browsing services that do not rely on personal information (that is, the basic mode, due to different business functions, the scope of basic mode services under different Zhino client software will be different).
Your understanding and cooperation is important for us to protect the personal information and privacy of you and your associates. Your identity documents, passwords, SMS verification codes, client terminal device verification codes and other private information are kept by you. Please carefully evaluate the physical and electronic environment when keeping, entering, and using this information to prevent information leakage. In addition, our products and/or services enable you to collect or use content containing personal information of others; In order to protect the legitimate rights and interests of the subject of personal information, please take care to ensure that the authorized consent of the relevant subject has been legally obtained before submitting it to us or collecting personal information of others through our products and services. In particular, if the aforementioned information relates to the child's personal information, you need to obtain the consent of the corresponding child's guardian in advance.
If you wish to revoke your authorization or have any questions regarding the contents of the Agreement, you may contact us through the following contact details in this Agreement. However, please understand and agree that when you withdraw certain licenses, the product functions associated with them will be unavailable, we will not be able to continue to provide you with the specific functions and services for which you withdraw your consent or authorization, and your decision to withdraw your authorization will not affect the personal information processing previously carried out based on your authorization. We will respond to your request within 15 business days:1.Contact us for in-app online customer service or telephone customer service
We will collect and use your personal information for the following purposes of this policy:
a) When you register or log in to We account, we will collect your mobile phone number, email address, password and SMS/email verification code; This information is necessary to help you complete the registration and/or login of We account, protect the security of your account and meet the requirements of relevant laws and regulations for online real-name systems; If you refuse to provide, you will not be able to successfully register and/or log in.
b) When you reset your password for your account, we collect your SMS/Email Authentication Code information, which is required to modify the password function. If you refuse to provide it, you will not be able to successfully modify the password, but it will not affect your use of the registration or login function (if the password before your modification is still valid).
c) In order to make it easier for you to register and log in, we also provide the "One-click Login" function (not all We business applications are supported, please refer to the actual prompt on each application page). When you choose to use this feature, we will collect your mobile phone number indirectly from your carrier, without manually entering it. This is the information necessary to implement this feature. If you refuse to provide it, you will not be able to use the One-Button Login feature, but it will not affect your use of other methods of registering or logging in.
d) In order to enable you to log in more securely and conveniently, if your client terminal device supports the fingerprint function or the face ID function, you can choose to use the fingerprint or face ID login method (not all We business applications are supported, please refer to the actual prompt on each application page). You will need to enter your fingerprint information or face ID information on your client terminal device to complete the verification of the information, which is necessary for you to use this feature. Please note that we only receive verification results and do not collect your fingerprint information or face ID information. Face images and fingerprint information are your sensitive personal information. If you do not need to use this login method, you can also choose the login method of password or SMS verification code. This feature is optional and will not affect your access to your account or services if you do not use it.
e) After you register, you can choose to fill in the account profile information, including nickname, avatar, mailbox, regional information, intelligent Internet of Things hardware application scenarios, according to your own needs, in order to use our other services; The service content corresponding to the regional information and equipment applicable scenario information will be informed to you through the system prompt. This information is not necessary for the registration, login, and authentication functions. If you refuse to provide this information, it will reduce the ability to protect your account, but it will not affect your use of the registration or login function.
f) You can also choose to bind a third-party account (including WeChat account, Apple ID, or other accounts, subject to the application interface prompts), so that we can provide you with fast registration or login services. This feature is optional and will not affect your access to your account or services if you do not use it.
[User Unified Authentication IMS Authentication] SDK, which is used to verify the correctness of the identity when registering or logging in.
a) Add distribution network for intelligent Internet of Things hardware devices: When you bind your intelligent Internet of Things hardware device and configure the network for use in order to use We Cloud service, we will collect the information of your bound intelligent Internet of Things hardware device (most of the time for device serial number, device verification code; If it is a hardware device without a authentication code, you need to use the device serial number and the user token information randomly generated by us under your account information), and the basic information of the client terminal device (client type, client version number, device model, hardware signature code, operating system version number, operator information); When your intelligent Internet of Things hardware device is connected via WiFi, we will also collect the network connection method of your hardware device, operator, Wifi information (Wi-Fi fi SSID information, BSSID information, signal strength), and Wifi password; When your smart hardware device connects via Bluetooth, we collect the Bluetooth Mac address information for your smart hardware device. This information is the basic information necessary to complete the binding of smart hardware devices and further provide you with We Cloud services. If you refuse to provide it, you will not be able to use smart hardware device addition features. In addition, when you configure the network for your Internet of Things hardware devices, we will also use the location permissions of your client terminal devices to search for wifi information in order to complete the network distribution function for you; Denying permission to open a location prevents you from using the feature. Please note that this location information is not uploaded to the server and will not be recorded and stored. Under APP, if you use the Add Device Location Escalation, Weather Related Function at this stage simultaneously, we will collect the specific geographic locations of your client terminal devices (including provincial and municipal streets, longitude and latitude) after you turn on the location and location permissions, so as to achieve the purpose of this function for you. You can turn off Location and Location permission to deny our collection through the system settings, which will prevent you from using this feature, but it will not affect your ability to add features using smart hardware devices.
b) Preview, play and replay of video shot by monitoring equipment: when you use the functions of preview, play, replay and download of monitoring video, you are required to fill in the equipment secret key and SMS verification code of your monitoring equipment. We will collect the serial number of your monitoring equipment, the IP of the internal network of the equipment, the IP of the external network of the equipment, the type of network currently connected, the current network status, and the (mobile phone) operator type, client type, client version number, operating system version, operating system type, equipment model, equipment screen width, equipment screen height, equipment screen direction, and equipment screen density of your client terminal equipment, so that you can achieve the purpose of this function; In addition, we collect acceleration sensor information from your client terminal device (mobile phone only) when you use the preview and playback functions to judge the vertical and horizontal screen of the mobile phone. This information is necessary for you to use the Surveillance Video View feature, and if you refuse to provide it, we will not be able to provide you with the appropriate service. When you query the video recording of monitoring equipment, we will collect the serial number of your monitoring equipment and the client type and client version number of your client terminal equipment, as well as the video recording results queried, the number of videos queried, and the operation time of video recording query, so as to help you achieve the purpose of video recording query on specific hardware equipment; This information is necessary for you to use the aforementioned features, and if you refuse to provide it, we will not be able to provide you with the appropriate services. When you use the surveillance video preview and playback functions, we collect a screenshot of the current video footage of your surveillance equipment to show you so that you can identify the surveillance location, and the screenshot will be deleted immediately the next day. You can deny our collection via video encryption. If you refuse to provide it, you will not be able to view the previous screenshots on the home page of the surveillance video, but it will not affect your use of the preview, playback, and playback functions. If you use the "Panoramic Photo" function under the cloud monitoring device, we will collect panoramic screenshots of the video screen of your monitoring device for the purpose of providing you with this function; The screenshot will be saved continuously while you are using the monitoring device. If you refuse to provide it, you will not be able to use the Panorama Photo function, but it will not affect your use of the Preview, Playback, and Playback functions. It should be noted that we will not and will not be able to view or use your video content and/or the video screenshots above, unless you otherwise use value-added services based on video content analysis and license them accordingly.
c) Voice Intercom Function of Hardware Device: When you use the voice intercom function under the intelligent hardware device, we will ask you to turn on the microphone permission, and collect the serial number of your hardware device, current network status, device intranet IP, device extranet IP, and the client type, client version number, operating system version, operating system type, intercom operation time, intercom duration and intercom operation result of your client terminal device in order to achieve the purpose of this function for you. You can turn off the microphone permission by setting the system to deny our collection, which will prevent you from using this feature, but it will not affect your use of hardware devices or other features of We business applications.
d) Hardware Device Analysis or Comparison Function: when you use the analysis or comparison function based on user benchmark information (mainly including face/figure recognition, vehicle recognition, sound recognition, text recognition and face/fingerprint unlocking), you need to enter face pictures, fingerprints, sounds and text information after opening photo album permissions and storing permissions, so that we can extract and process the feature values of the benchmark information submitted by you and realize related services on the hardware equipment. For specific operations, please refer to the interface prompts. Face pictures, fingerprint information and voice information are sensitive personal information and you must carefully decide whether to use them. If you refuse to provide the above baseline information, you will not be able to use the analysis or comparison functions based on this information, but it will not affect your use of hardware devices or other functions of We business applications. Please note that some Zhino IoT hardware devices can support local-based analysis or comparison functions (including fingerprint unlock, subject to the specific instructions provided by the hardware device). Under such local functions, Zhino Cloud only receives verification results to push message reminders to you on the premise that you agree to the information notification reminder, but will not collect your information in a back-haul server or other way (except when you actively authorize otherwise).
e) Video screenshots of monitoring equipment as event message contents: When you turn on event message reminder and notification function of monitoring equipment, we will collect video screenshots taken by your intelligent Internet of Things hardware equipment (monitoring equipment) (whether there are video screenshots depends on the performance of your hardware equipment), so as to push the screenshots as hardware event message content to you. This feature is optional. You can prevent us from pushing message notifications to you by denying permission to notify, or you can deny it by turning off the Message Notification setup button on your client endpoint. This will prevent you from using this feature, but it will not affect your use of hardware devices or other features of We business applications.
f) Other business functions: When you use the value-added services or other additional business functions based on We Cloud, we will collect your personal information directly related to the purpose of the service. The specific purpose of the service, the personal information collected and processed for the purpose of achieving the purpose of the service, will prompt you in the form of service description or usage rules and obtain your express consent. This feature is optional and will not affect your use of hardware devices or other features of business applications if you do not use it.
[Camera] permission: when you [Scan Code to Add Equipment] and [Take pictures and add face image information under My-Face Management Function], we need to retrieve your permission; If you deny the relevant system permissions, you will not be able to use the aforementioned business functions;
[Access location] permission, when you [Device Configuration], we need to call your permission; If you deny the relevant system permissions, you will not be able to use these business functions;
[Microphone/Recording] Permission: When you [Use Voice Intercom Previewed by Monitoring Device], we need to retrieve your permission; If you deny permissions to the relevant system, you will not be able to use these business functions.
[Access Network Permission] Permission: When you [Use LAN Hardware Equipment Preview Function], we need to retrieve your permission; If you deny the relevant system permissions, you will not be able to use the aforementioned business functions;
[Photo Library] permissions, including [Write Photo Library] and [Read and Write Photo Library]: We need to call your permission when you [Scan code to add device], [Download pictures/videos], [Save pictures/videos in the media library], [Use video editing function], [Save and share QR code pictures of devices], [Select and add face image information from album under My-Face Management function]; If you deny the relevant system permissions, you will not be able to use these business functions.
In order to facilitate your timely understanding of the use of your Zhino products and services, we will provide you with a message notification push, under APP, including:
a) Event messages for your intelligent Internet of Things hardware device, including "someone appears" under the monitoring device; This type of message is pushed when the event is triggered, and the frequency is determined by your hardware equipment installation environment and event type;
b) Reminders for the use of your various We services, including sending you renewal reminders 1-3 days before the service expires; This type of message is pushed by Zhino according to your service usage, and the frequency is determined by your service use;
c) We's system service messages, including service agreement and privacy policy updates, and release of new application versions; This type of message is pushed by Zhino according to the needs of business operations, and the frequency is not fixed for the time being.
When you use the push feature of APP, we push the above notification messages to you as follows:
a) In-Application Message Push: the above message is prompted to you in the form of a message notification banner. At this point, we collect and use network information, device types, device models, operating systems, device platforms, device vendors, and device brands for your client end devices. This information is required for this feature, and if you do not agree to collect this information, you will not be able to use the push function within the application properly. You can manage and control the push of this part of the information by closing the Message Notification setting button. Turning off this feature will not affect your use of your We account or other We services.
b) Mobile Desktop Push: The above message will be pushed to your mobile desktop. This function is implemented through a third-party SDK, which directly collects and uses your corresponding personal information; The third-party SDK involved is mainly based on the push SDK of the mobile phone system you are using (ios, Android, etc.). If you do not agree to be collected to use this information, you will not be able to use Desktop Push normally. If you do not want to use this feature, you can turn off, manage and control the push of this part of the message through your phone's operating system Settings-Notification. Turning off this feature will not affect your use of your We account or other We services.
During your use of our products and/or services, in order to identify the abnormal status of your account and ensure the security of your account and system operation, we will directly or indirectly collect and store relevant information generated during your use of our products and/or services, including:
(1) Client Terminal Device Information: We will receive and record the client terminal device information used to install and use We software according to the specific permissions granted by you during software installation and use, including client type, client version number, device model, operating system version number, operating system language, IP address, network access mode and operator, installed application package name, SIM card status, run list/running process/task list. Please understand that this information is essential for providing services and ensuring the proper operation of the product and for prompting updates to Zhino Software. If you refuse to provide it, we will not be able to provide services for you.
(2) Intelligent Internet of Things hardware device information: When your intelligent hardware device is bound, we will automatically receive and record relevant intelligent hardware device information, including type, model, firmware number, MAC address, system version number and system settings. We rely on this information to provide you with services and ensure the safe operation of hardware devices. If you refuse to provide them, we will not be able to provide you with services related to the control and management of intelligent hardware devices, but it will not affect your use of We account or other functions under We business applications. Please note that when the system is set to allow automatic upgrades of hardware devices (enabled by default under some hardware devices), we will automatically install and run for you when there is an upgrade package to ensure that your smart hardware device always adapts effectively to the Zhino software you are using.
(3) Log Information: When you use our service, we will automatically collect (including the detailed usage of our service under background running status), save it as relevant network log, and record basic information of your client terminal equipment (client type, client version number, device model, operating system version number, operating system language), network information (IP address, network connection mode and operator), and your operation record (page exposure, click button, stutter, crash data). We rely on this information to provide you with services and ensure the safe operation of your client terminal devices. If you refuse to provide them, we will not be able to provide services for you.
Please note that separate client terminal device information, log information is information that cannot identify a specific natural person. If it is necessary to combine such non-personal information with other information to identify specific natural persons, or to use it in combination with personal information, such non-personal information will be regarded as personal information during the combined use. In addition to obtaining your authorization or otherwise stipulated by laws and regulations, we will anonymize and de-identify such personal information.
Not involved.
Under the APP include:
[private cloud pushes IMSP Cloud Push, IMSP Cloud Network] SDK is used to push intelligent Internet of Things device event messages.
1. We will integrate your personal information and/or other legally obtained information related to your service or product usage as needed so that you can track orders, initiate user complaints, and optimize the quality and process of customer service.
2. We will make statistics on the use of our products and/or services according to needs, and use the de-identified information that cannot identify you and cannot be recovered for the establishment of databases and commercial utilization, which is referred to as "statistical information"; We will share these statistics with the public or third parties as necessary to display the overall usage trends of our products and/or services and/or form relevant market satisfaction research reports and research results related to service improvement plans.
3. When we intend to use your personal information for other purposes not set forth in this Policy, or for other purposes for which information has been collected for a particular purpose, your prior consent will be sought in the form of an unsolicited checkmark.
You are fully aware that in accordance with the Information Security Technology Personal Information Security Code and its legal basis, the collection and use of your personal information does not require your authorized consent in the following circumstances:
1. Related to We's performance of obligations prescribed by laws and regulations;
2. Directly related to national security and national defense security;
3. Directly related to public safety, public health and major public interests;
4. Directly related to criminal investigation, prosecution, trial and execution of judgments;
5. Out of protecting your personal or other personal life, property and other major legal rights and interests, but it is difficult to obtain my consent;
6. The personal information involved is disclosed to the public by yourself;
7. as necessary for the signing and performance of contracts or other written documents between you and us;
8. Your personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
9. necessary to maintain the safe and stable operation of our products and/or services, such as the detection and disposal of product and/or service failures; Identify and investigate fraud, illegality, infringement or breach of contract.
Please understand that our products and/or services will change as our business evolves. In principle, when a new feature or service relates to a feature or service we currently offer, the personal information collected and used will be deemed to be directly or reasonably relevant to the purpose of the original process. In scenarios that are not directly or reasonably related to the original processing purpose, we will collect and use your personal information, and will once again inform you by page prompts, interactive procedures, and agreement confirmation in accordance with the requirements of laws and regulations and national standards, and obtain your consent.
We will delegate the processing of your personal information to an authorized Partner, as required, so that the authorized Partner can provide you with some of the services or implement specific functions on our behalf, within the scope of our authorization. We will entrust the processing of your information for legal, justified, necessary, specific and explicit purposes as stated in this Policy. At the same time, we will specify the purpose, duration, processing method, and type of personal information entrusted for processing in the form of a written agreement, and agree strict data protection measures with authorized partners to allow them to process personal information in accordance with this policy and written agreements, and supervise the processing of personal information by authorized partners. If an Authorized Partner uses your information for processing purposes that we do not entrust, it will separately seek your consent.
In addition, when the Authorized Partner provides processing of the Entrusted Information through an embedded SDK or other similar application, we will perform strict security inspection on the Application Program Interface (API) and Software Tool Development Kit (SDK) of the Authorized Partner to obtain the relevant information to ensure that it receives and uses the Entrusted Information within the agreed scope.
Currently, the types of Authorized Partners we have commissioned are:
(1) Authorized partners of advertising and analysis services, we will entrust these partners to process information related to advertising push, coverage and effectiveness on the premise of adopting common security technologies in the industry. We will not entrust your personally identifiable information to such partners for processing;
(2) Suppliers that provide business operation support for We, including warehouse logistics providers, outsourced customer service, installers, authorized maintenance providers, and service providers that provide payment convenience. We need to share your order information or product information or contact information with these suppliers in order to provide you with appropriate services;
(3) To assist our partners who provide you with some value-added or additional services, we will entrust the partners with the necessary personal information based on the specific services you choose.
We undertake to share your personal information with third parties only for the legal, justified, necessary, specific, and explicit purposes set forth in this Policy, and only for such personal information as may be necessary for the achievement of the relevant purpose. At the same time, we will also do a good job of managing third parties through various methods including strict access, confidentiality agreements, audits and supervision, and require them to handle relevant information with confidentiality and security measures that are not lower than those required by this policy.
We do not share your personal information externally, except in the following situations:
(1) Obtain the explicit consent of you or your guardian: After obtaining the explicit consent of you or your guardian, we will share your personal information with other parties;
(2) Sharing necessary for fulfilling legal obligations: we will share your personal information according to the provisions of laws and regulations, the necessity of litigation and dispute resolution, or the necessity of performing judicial and administrative organs and other competent organs according to law and other legal obligations;
(3) Sharing with our Affiliates: We will only share the necessary personal information and will be bound by the purposes stated in this Policy. If we share your sensitive personal information or if the Affiliates change the purpose for which the personal information is used and processed, we will seek your authorization again. We undertake that we will only share the necessary personal information and that such sharing is subject to the purposes of this Policy; At the same time, we will ensure security through a variety of measures, including intercompany legal documents, internal system and employee privilege isolation.
(4) Share with our partners according to the relevant service agreement between you and We, the agreement of the usage rules and the purpose of serving you: it depends on the products or services purchased by you through each We software, and the We cloud services and/or value-added services that you choose to enable.
Please note that the shared party usually has its own independent privacy policy or related statement, and we recommend that you carefully review and make such choices as you deem appropriate before making the relevant authorizations.
Unless there are legal and regulatory retention requirements, we will only retain your personal information for as long as necessary to achieve the purposes set forth in this policy. We judge that the storage period of personal information mainly refers to the following standards and whichever is longer: the service time provided for you by Zhino or the product, the completion of transaction purposes related to you, the maintenance of corresponding transaction and business records, in response to your inquiries or complaints; Guarantee the safety and quality of our services for you; Do you agree to a longer retention period? Whether there are other special agreements or legal and regulatory provisions on retention periods.
After the retention period is exceeded, your personal information will be deleted or anonymized as required by applicable law. If you log out of your account or actively delete personal information, we will handle it in accordance with the relevant laws and regulations.
Terminate Operations: In the event of termination, you will be notified at least 30 days in advance and your personal information will be processed in accordance with legal and regulatory requirements after termination.
In accordance with relevant laws, regulations, standards, and industry common practices, we guarantee that you exercise the rights of personal information subjects in accordance with the law. You can conveniently exercise the following personal information subject rights:
You have access to your personal information, except for legal and regulatory exceptions. When you want to exercise data access, you can access it yourself in the following ways:
(1) Your Account Information: under APP, you can enter the personal data and account security page through My under the main interface to query and update the registration information including avatar, nickname, mobile phone number, password and email address. You can also view your login terminal and operation log. Other We software can be set up on the "My" page.
(2) Your use of We Cloud services. Under APP, you can view the Smart Internet of Things hardware devices that you have bound, and you can also view product information including the smart hardware device model, serial number, device name, and your usage information including the network access method of the hardware device, value-added service usage, and sharing through the details page of the individual device.
You can directly erase or delete information from our product and/or service pages, including non-essential account registration information, order information, and shipping address information including avatar. The specific operation path is consistent with the above access or correction path.
You can request us to delete additional personal information in the following situations:
(1) If our handling of personal information violates laws and regulations;
(2) If we collect and use your personal information without your consent;
(3) If our handling of personal information violates the agreement with you;
(4) If you cancel your We account;
(5) If we terminate our services and operations.
If we decide to respond to your request for deletion, we will also notify those entities that have obtained your personal information from us and require them to be removed in a timely manner, unless otherwise provided by law or regulations, or if these entities have obtained your independent authorization.
If, due to applicable legal and security technology restrictions, we are unable to remove the appropriate information from the backup system immediately after you or we assist you in removing the relevant information, we will securely store your personal information and restrict any further processing of it until the backup can be removed or anonymized.
You can change the scope of your authorization to continue collecting personal information or withdraw your authorization by deleting information, turning off a service or function, making privacy settings on the Zhino website or software, and applying permission management; You can also withdraw all of our authorizations to continue collecting your personal information by logging out of your account. The specific paths are as follows:
1. Change or withdraw sensitive permission settings
a) You may change the agreed scope or withdraw your authorization by turning off the Geography, Camera, Microphone, Photo Album, and Address Book permissions in the operating system of your client terminal device itself. Information related to these permissions will no longer be collected when authorization is turned off.
b) You can turn off or turn on the corresponding permissions in "My-Settings" of Zhino APP. After closing the authorization, we will no longer collect information related to these permissions.
2. Change or withdraw privacy policy authorization
You can request withdrawal of privacy policy authorization from the APP My-Settings-Privacy Statement-Withdraw Privacy Policy Authorization page. After you withdraw, we will no longer use your personal information and will only be able to provide you with browsing related basic mode services. You can still use the full functionality through supplemental licensing.
Please understand that each business function requires some basic personal information to complete. After you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of consent or authorization, nor can we process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the processing of personal information previously performed based on your authorization.
You can log out of your account via APP. Please note that logging out of your account is irreversible. After logging out of your account, we will stop providing you with products or services. Your rights and interests under your account will be completely eliminated. Your personal information will be deleted or anonymously processed, except as otherwise stipulated by laws and regulations.
V. Obtaining a copy of personal information
You have access to copies of your personal information. You may contact us at any time if you need to obtain a copy of your personal information that we have collected. Subject to legal requirements and technical feasibility, we will provide you with a copy of your personal information upon request.
At present, We business functions do not make decisions based solely on non-manual automatic decision-making mechanisms including information systems and algorithms. If we consider it necessary to enable the a forementioned technical means in the course of operations, we will inform you in a timely manner. If you believe that these decisions have significantly affected your legitimate rights and interests, you have the right to ask us to explain, and we will also provide a method of appeal without infringing upon Zino's trade secrets or other user rights and interests, and the public interest.
If you are unable to manage your personal information in the manner described above, or if you need to inquire about the type of personal information or personal information you have acquired, the source, the purpose for which you have obtained it, as well as the identity or type of third party who has obtained such personal information, or if you have other personal information rights claims, you may contact us by e-mail. To ensure your safety, we will require you to provide a written request or otherwise prove your identity, and we will respond to your request within 15 working days of receiving your feedback and verifying your identity.
We do not charge a fee in principle for your reasonable requests, but we will charge a certain cost for repeated requests that exceed reasonable limits. For requests that are repeated for no reason, require too many technical means, pose risks to the legitimate rights and interests of others, or are very impractical, we will reject them according to the situation.
Zhino attaches great importance to the protection of minors' personal information. We do not provide products or services to users based on age identification, but the nature of our products and/or services requires that you be an adult with full civil capacity. If you are a minor, we require that you request your guardian to read this Privacy Policy carefully and to use or provide information to us with the consent and supervision of your guardian. If you collect or submit personal information about minors to us through our products and/or services for the purpose of interacting with children, please ensure that you have obtained the prior authorization of their legal guardian.
If legal guardians have reason to believe that minors have submitted personal information to us without your prior consent, or if they have questions about the way in which our minors' personal information is protected, please contact us through the methods specified in this policy.
We will make changes to this policy as needed. We will not diminish your entitlements under this policy without your express consent, nor will we actively adjust the personal information settings you have made. Any changes to this policy will be posted on this page.
For major changes, we also provide more prominent notifications, including in the form of push notifications, pop-up windows, and sending emails. Please visit this policy regularly to read the latest version.
Significant changes referred to in this Policy include, but are not limited to:
1) Significant changes have taken place in our service model. Including the purpose of processing personal information, the type of personal information processed, and the use mode of personal information;
2) Significant changes have taken place in our ownership structure and organizational structure. Including owner changes caused by business adjustments, bankruptcy mergers and acquisitions;
3) The main objects of personal information sharing, transfer or public disclosure have changed;
4) Significant changes have taken place in the rights and forms of your participation in the processing of personal information;
5) When the responsible department, contact method and complaint channel of personal information security are changed;
6) The Personal Information Security Impact Assessment Report indicates that there is a high risk.
(End of full text)