个推User Privacy Policy

个推User Privacy Policy

Latest update date:2024年03月21日

Introduction

  Daily Interactive Co., Ltd. (hereinafter referred to as "Getui") understands the importance of user information to you and will do its best to protect the security and reliability of your user information. We are committed to maintaining your trust in us and resolutely abide by the principles of "legality, legitimacy, necessity, integrity", "purpose limitation", "minimum necessity", "openness and transparency" stipulated in the Personal Information Protection Law of the People's Republic of China to protect your information. At the same time, we promise to take corresponding security measures to protect your user information in accordance with the Personal Information Protection Law of the People's Republic of China, the Network Security Law of the People's Republic of China, the Data Security Law of the People's Republic of China, the Civil Code of the People's Republic of China and other laws and regulations on information protection in the Internet industry, and with reference to recommended national standards such as the Personal Information Security Specification for Information Security Technologies (GB/T 35273-2020)< Considering that you are not a developer with a direct contractual relationship with Qitui, but a device holder who has installed an application developed or operated by a developer who has effectively registered a Qitui account and integrated the Qitui SDK, we will require the developer to inform you through appropriate means such as privacy policies or service agreements that their application integrates the Qitui service module, and ensure that you are aware of and agree that the developer's right to obtain and use your user related information is extended to Qitui, so that we can obtain and use the necessary and reasonable information to implement the relevant service functions< We hope to use this privacy policy to help you understand how Getui processes and protects your user information during the process of providing services to you. At the same time, we will disclose to you the purpose, processing methods, types of personal information processed, processing rules, and other contents of our processing of user information, as well as the ways and procedures in which you exercise legal rights such as viewing, copying, correcting, supplementing, and deleting information. Therefore, please carefully read and fully understand this privacy policy.

This policy will help you understand the following content:
1、 How do we handle your user information
2、 How do we protect your user information
3、 Your rights
4、 How do we handle personal information of minors
5、 Storage and global transfer of user information
6、 How to update this privacy policy
7、 How to contact us
8、 Definition

1、 How do we handle your user information

  Personal recommendations will only be made for the business functions and purposes described in this policy. Developers are required to ensure that, with your authorization and consent, they process any user information you voluntarily provide during the use of this service that arises from the use of this service.
 Please understand that in order to better operate and improve the technology and services of this platform, or due to changes in business strategy, the functions of the products and services on this platform may also be updated and developed. When the information processing required for the products or services we provide exceeds the scope mentioned above, or when we need to use the processed information for other purposes not specified in this privacy policy, or when we need to use information processed for specific purposes for other purposes, or when our processing methods change,We will notify you within a reasonable period of time before any changes occur and require developers to obtain your consent again before use.
  In order to achieve full functionality, individual push services may remain enabled on both the front-end and back-end of the application. The purpose, processing method, types of personal information processed, and processing rules for processing your user information in the enabled status of the personal recommendation service are as follows:
(1) How do we collect and use your user information
 1. Message push SDK service:
  1.1 Function Introduction
  (1) Basic function: empowering developers with the ability to push messages and notifications
  (2) Extended features: To meet the service requirements of developers in different dimensions, we provide extended features such as situational push, intelligent push, emergency push, and link adjuster for developers to choose from.
  1.2 Information processed in the message push SDK service
 (1) Information processed by Android

Product Function Types Product Function Name Personal information type Personal Information Fields Purpose and purpose
Basic functions Message push Device information
Network information
Required information: device platform, device manufacturer, device brand, device model and system version, OAID, AndroidID, WIFI connection information, operator information

Optional information: IMEI, MAC, Advertising ID, Serial Number, IMSI, ICCID, IP address, base station information
Used to generate unique push target ID (CID) and device ID (GID) to ensure accurate message push and accurate identification of message devices
Extended functionality Contextual push Location related information Required Information:Location related information Providing refined push notifications for offline scenarios, we can recommend push content that better meets your needs and reduce unnecessary push messages that may disturb you
Intelligent push Application list information
Location related information
Required information: Application list information,Location related information Recommend push content that better meets your needs and reduce the disturbance of useless push information to you
Emergency push Application list information
Location related information
Required information: Application list information,Location related information At the request of relevant national departments, in order to improve the function of mobile Internet technology in serving social public welfare and play the role of APP message push in disaster early warning, when major disasters such as earthquakes and meteorology occur, relevant disaster notification information is sent to users in affected areas in real time through the developer's APP push channel
Link regulator Application List Information Required Information: App List Information We adopt the merge link technology for technology push. When a device has multiple APP push links active at the same time, we will randomly merge them into one link to save power and traffic for you. When a device has an offline push message waiting to be issued, an offline message can be issued through the association start function. You can choose to turn on or off this service. When you turn off this service, the association start will also be turned off, which will lead to an increase in power and traffic consumption and a decrease in message reach rate

(2) Information processed on the iOS end: ① Device information: Device identification code (IDFA, IDFV), device platform, and device manufacturer used to generate unique push target ID (CID) and device ID (GID) to ensure accurate message push and accurate identification of message devices. The device brand, device model, and system version are used to optimize the effectiveness of channel resources, improve the arrival rate and stability of message push< ② Network information (including IP address, WIFI information, base station information, operator information) and location related information: In order to maintain the stability of network connections and establish long links to the greatest extent possible, we need to understand the network status and changes of devices, in order to achieve stable and continuous push services. We provide a situational push function, and location related information will help us provide developers with refined offline scene push. We can recommend push content that better meets your needs and reduce the disturbance of useless push messages to you< Br>In order to practice the mission of "science and technology for the good", several Internet enterprises have taken the initiative to assume social responsibility and formed a "public welfare push alliance". For the purpose of protecting your life, health and property safety, according to the Personal Information Protection Law of the People's Republic of China, the Law of the People's Republic of China on Earthquake Prevention and Disaster Reduction and other laws and regulations, when there are major disasters such as earthquakes and meteorology, the personal push conference will send you the relevant disaster notification information in real time through the developer's mobile application push channel when you are in the area that may be affected and the personal push receives the relevant information published by the relevant departments, on the premise that the developer has obtained your full and clear authorization< (3) Permission application

OS Permissions Usage scenarios
Android INTERNET (mandatory) Network communication
Android ACCESS-NETWORK STATE (Required) When the network changes, perform network switching communication
Android ACCESSWIFI-STATE (Required) View WiFi connection status
Android VIBRATE (mandatory) Vibration permission (mandatory for using notification function)
Android SCHEDULE-EXACT-ALARM (mandatory) When calling the CID registration interface
Android BADGE-ICON (mandatory) When receiving notification messages
Android READ-EXTERNAL-STORAGE (optional) When calling the CID registration interface, ensure that the CID remains unchanged after uninstallation and reinstallation
Android WRITE-EXTERNAL-STORAGE (optional) When calling the CID registration interface, ensure that the CID remains unchanged after uninstallation and reinstallation
Android BLUETOOTH (optional) When enabling situational push, intelligent push, and emergency push functions, and you authorize Bluetooth permissions
Android BLUETOOTH-ADMIN (optional) When enabling situational push, intelligent push, and emergency push functions, and you authorize Bluetooth permissions
Android ACCESS-BACKGROund-LOCATION (optional) When enabling situational push, intelligent push, and emergency push functions, and you authorize location permissions
Android ACCESS-FINE-LOCATION (optional) When enabling situational push, intelligent push, and emergency push functions, and you authorize location permissions
Android ACCESS-COARSE-LOCATION (optional) When enabling situational push, intelligent push, and emergency push functions, and you authorize location permissions
Android READ-PHONESTATE (optional) When calling the CID registration interface
IOS Network Access Permissions (Required) Full lifecycle
IOS IDFA (mandatory) When calling the CID registration interface
IOS Positioning (optional) When you enable situational push, intelligent push, and emergency push functions, and authorize location information

2. User Operation SDK Services: 2.1 Function Introduction We provide developers with professional data statistics and analysis capabilities as well as user profiling capabilities, helping them provide content and services that better suit your preferences, reducing unnecessary information interference, and improving your user experience when using developer applications< 2.2. Information processed in user operation SDK services
(1) Information processed on Android end

Product Function Types Product Function Name Personal information type Personal Information Fields Purpose and purpose
Basic functions Data analysis and user profiling capabilities Device Information Network Information Location related Information Application List Information Required Information: Device Platform, Device Manufacturer, Device Brand, Device Model and System Version, OAID, AndroidID, IP Address, Base Station Information, Operator Information, Application List Information

Optional Information: IMEI, IMSI, MAC, Advertising ID, Serial Number, ICCID, GPS Location Information, WIFI Connection Information
Used to provide basic services such as high-quality and stable data statistics, data analysis and image generation, image analysis services, and generate unique device identification GTCID, effectively identifying devices and data deduplication

(2) Information processed on the iOS end: ① Device information: Device identification codes (IDFA, IDFV) will be used to generate a unique user identifier, namely GTCID. GTCID will be used for data deduplication and statistical analysis of different dimensions, and can be applied in scenarios such as advertising traffic distribution. The device platform, device manufacturer and brand, device model and system version, and device serial number help us generate richer profiles for developers, such as analyzing the advertising effects of different users and adapting them according to different device information, thus providing you with refined product services< ② Network information (including IP address, WIFI information, base station information, operator information) andlocation related information: Network information helps developers determine network status, thereby providing services such as pre loading content only on WiFi, reducing mobile traffic loss; Location information helps us assist developers in providing content and services that better suit your preferences

(3) Permission application

OS Permissions Usage scenarios
Android INTERNET (mandatory) Network communication
Android ACCESS-NETWORK STATE (Required) When the network changes, perform network switching communication
Android ACCESSWIFI-STATE (Required) View WiFi connection status
Android BLUETOOTH (mandatory) To provide you with content and services that meet your preferences, and when you authorize Bluetooth permissions
Android BLUETOOTH-ADMIN (mandatory) To provide you with content and services that meet your preferences, and when you authorize Bluetooth permissions
Android ACCESS-BACKGROUND-LOCATION (Required) To provide you with content and services that meet your preferences, and when you authorize location permissions
Android ACCESS-FINE-LOCATION (mandatory) To provide you with content and services that meet your preferences, and when you authorize location permissions
Android ACCESS-COARSE-LOCATION (mandatory) To provide you with content and services that meet your preferences, and when you authorize location permissions
Android READ-PHONESTATE (optional) When calling the GTCID registration interface
IOS Network Access Permissions (Required) Full lifecycle
IOS IDFA (mandatory) When calling the GTCID registration interface
IOS Positioning (optional) To provide you with content and services that meet your preferences, and when you authorize location information

3. One click authentication SDK service:
3.1 Function introduction
(1) Basic functions: endow developers with professional authentication capabilities
(2) Extended functions: To meet the service requirements of developers in different dimensions, we provide anti fraud functions for developers to choose from

3.2. Information processed in one click authentication SDK service
(1) Information processed on Android end

Product Function Types Product Function Name Personal information type Personal Information Fields Purpose and purpose
Basic functions One click authentication Device Information Network Information Required information: device platform, device manufacturer, device brand, device model and system version, OAID, AndroidID, WIFI connection information, operator information, IP address,deidentified phone number
Optional information: IMEI, MAC, Advertising ID, Serial Number, IMSI, ICCID, base station information
Used for effectively identifying devices, responding quickly to verification needs, providing efficient, stable, and smooth one click authentication services, and generating a unique client ID, i.e. GYUID (also used for billing calculations)
Extended functionality Anti fraud Location related information
Application list information
Network information
Required information:Location related information, application list information, network information Used to analyze the risk level of current devices, effectively identify various cheating behaviors, effectively identify risky devices, evaluate channel quality, identify malicious traffic, malicious programs, protect your account security, and other scenarios

(2) Information processed on iOS
① Device information andphone number: Device identification codes (IDFA, IDFV) anddeidentified phone numberswill be used to generate a unique client ID, i.e. GYUID; The device platform, device manufacturer, device brand, device model and system version, device serial number, and deidentified mobile phone number help us ensure effective identification and quick response for one click authentication. To provide efficient, stable, and smooth one click authentication services, which will enhance our anti fraud capabilities< ② Network information (including IP address, WIFI information, base station information, operator information) and location related information: Through analyzing the risk level of the current device, we can effectively identify various cheating behaviors and risky devices, which can be used to evaluate channel quality, identify malicious traffic, malicious programs, and protect your account security< Through the above information, we can assist developers in providing you with more secure services through our authentication and/or anti fraud services< (3) Permission application

OS Permissions Usage scenarios
Android INTERNET (mandatory) Network communication
Android ACCESS-NETWORK STATE (Required) When the network changes, perform network switching communication
Android ACCESSWIFI-STATE (Required) View WiFi connection status
Android ACCESS-BACKGROund-LOCATION (optional) When the anti fraud feature is turned on and you authorize location permissions
Android CCESS-FINE-LOCATION (optional) When the anti fraud feature is turned on and you authorize location permissions
Android ACCESS-COARSE-LOCATION (optional) When the anti fraud feature is turned on and you authorize location permissions
Android READ-PHONESTATE (optional) When calling the GYUID registration interface
IOS Network Access Permissions (Required) When calling the GYUID registration interface
IOS IDFA (mandatory) When calling the GYUID registration interface

4. OneID SDK Services: 4.1 Function Introduction We provide developers with the ability to effectively identify their user devices and provide anti fraud services, providing you with more secure services while empowering developers with multidimensional applications in user operations, risk control services, digital marketing, and other scenarios, enhancing your user experience on multiple platforms< 4.2 Information processed in OneID SDK service (1) Information processed on Android end

Product Function Types Product Function Name Personal information type Personal Information Fields Purpose and purpose
Basic functions Provide effective device identification capability Device Information Network Information Location related Information Application List Information Required information: device platform, device manufacturer, device brand, device model and system version, OAID, operator information, IP address

Optional information: IMEI, MAC, Advertising ID, Serial Number, IMSI, ICCID, AndroidID, WIFI connection information, base station information,location related information, application list information
Enhance the multidimensional application of developers in user operations, risk control services, digital marketing and other scenarios, and generate OneIDs, effectively enhancing cross platform device recognition capabilities and improving your user experience on multiple platforms. At the same time, relevant information will be used for anti fraud services, identifying various cheating behaviors and tools, effectively identifying risk devices, and providing you with safer services

(2) Information processed on the iOS end: ① Device information: Device identification code (IDFA, IDFV), device platform, device manufacturer and brand, device model and system version, and device serial number will be used to generate a unique device identifier, namely OneID. The aforementioned information will effectively enhance developers' cross platform device recognition capabilities, empower developers with multidimensional applications in user operations, risk control services, digital marketing, and other scenarios, and improve your user experience on multiple platforms< ② Network information (including IP address, WIFI information, base station information, operator information) and location related information: IP address and operator information are used to generate a unique device identifier, namely OneID. WIFI information, base station information, and location related information can help developers generate more accurate device OneIDs. The above information will be used for anti fraud services, identifying various cheating behaviors and tools, effectively identifying risk devices, and providing you with more secure services< (3) Permission application

OS Permissions Usage scenarios
Android INTERNET (mandatory) Network communication
Android ACCESS-NETWORK STATE (Required) When the network changes, perform network switching communication
Android ACCESSWIFI-STATE (Required) View WiFi connection status
Android BLUETOOTH (optional) To provide you with more accurate OneID services
Android BLUETOOTH-ADMIN (optional) To provide you with more accurate OneID services, and when you authorize Bluetooth permissions
Android ACCESS-BACKGROund-LOCATION (optional) To provide you with more accurate OneID services, and when you authorize location permissions
Android ACCESS-FINE-LOCATION (optional) To provide you with more accurate OneID services, and when you authorize location permissions
Android ACCESS-COARSE-LOCATION (optional) To provide you with more accurate OneID services, and when you authorize location permissions
Android READ-PHONESTATE (optional) When calling the OneID registration interface
IOS Network Access Permissions (Required) Full lifecycle
IOS IDFA (mandatory) When calling the OneID registration interface
IOS Positioning (optional) To provide you with more accurate OneID services, and when you authorize location information

5. Personal recommendations provide information processed during the user profiling service process (only applicable to existing customers): 5.1. Device information: The device identification code (including IMEI, IDFA, Android ID, MAC, OAID, Advertising ID, Serial Number, IMSI, UAID, ICCID, IDFV, CAID) will be used to generate a unique user identifier, namely GIUID. The device platform, device manufacturer, device brand, device model and system version, and device serial number help us identify different users for developers and make corresponding adaptations based on different device information, thereby providing you with accurate product services. For example, when applied to advertising distribution scenarios, we analyze the advertising effects of different users< 5.2. Application List Information: This information helps developers analyze your interests and hobbies, providing content and services that are more in line with your preferences, such as helping you make decisions about advertising related services and reducing unnecessary information that may disturb you< 5.3. Network information (including IP address, WIFI information, base station information, operator information) and location related information: Network information helps developers determine network status, providing services such as pre loading content only on WiFi, such as advertising pre loading, to reduce mobile traffic loss; Location information helps us assist developers in providing content and services that better suit your preferences< We will use the above information to help developers acquire professional user profiling capabilities, provide you with more comprehensive and high-quality services through rich profiling information, reduce the disturbance of useless information to you, and improve your user experience using developer applications

6. The information processed during the application statistics service process provided by individual recommendations (only applicable to existing customers): 6.1. Device information: Device identification code (including IMEI, IDFA, Android ID, MAC, OAID, Advertising ID, Serial Number, IMSI, UAID, ICCID, IDFV, CAID) will be used to generate a unique statistical identification ID, namely GCID, for internal system use, for data deduplication and quantity statistics in different dimensions; The device platform, device manufacturer, device brand, device model and system version, and device serial number will be used for multi-dimensional statistical calculations< 6.2. Application related information: including but not limited to application lists, channels, timestamps, page unique identifiers, and user click events. We use the above information to provide multi-dimensional statistical analysis, achieving statistical functions including visual buried points and industry analysis< 6.3. Network information (including IP address, WIFI information, base station information, operator information) and location related information: Network information is used to establish connections with multiple servers< Strong>Location related informationhelps us help developers optimize their products based on statistical analysis results by region, and improve your user experience

7. Information processed during the process of providing link adjuster services (only applicable to existing customers): 7.1. Device information: Device identification code (including IMEI, IDFA, Android ID, MAC, OAID, Advertising ID, Serial Number, IMSI, UAID, ICCID, IDFV, CAID) will be used to generate a unique push target ID, namely CID. The device platform, device manufacturer, device brand, device model and system version, and device serial number are used to optimize the effectiveness of channel resources, improve the arrival rate and stability of message push< 7.2. Application List Information: When an application pushes messages to you, it can authorize us to adjust the link and activate the closed SDK push process, ensuring that you can receive the messages pushed to you by the application in a timely manner< 7.3. Network information (including IP address, WIFI information, base station information, operator information) and location related information: Network information will be used to establish connections with individual push servers. Location information will be used to regulate regional push and reduce the disturbance of irrelevant information to you

We will use the above information to help developers develop application products that are more suitable for your use, improve your user experience, and bring you higher quality services

8. Data Solution
Based on the legally obtained data from the specific services mentioned above, we will process the information in accordance with industry-leading data security technologies such as de identification and anonymization in accordance with the law. This information will be desensitized, filtered, cleaned, organized, and deeply mined before entering the "personal promotion big data platform" for building personal promotion label information databases, statistical analysis databases, etc. The data in the personal promotion database is anonymous statistical prediction data obtained through modeling and calculation, and cannot identify specific natural persons. Therefore, when providing big data solutions to the public, it does not involve the use of personal identity information. We will provide big data solutions in various vertical fields such as mobile Internet developer services, user growth services, brand marketing, public services and risk control services through the platform with innovative technologies according to the purpose, method, scope and other constraints stated in this privacy policy, such as:
(1) crowd insight services. Based on the ability of personalized big data, we will analyze and insight the portrait characteristics of target customer groups, provide multi-dimensional portrait analysis reports for industry customers, help customers to understand target customer groups in depth and develop corresponding marketing strategies< (2) Precise targeted services, individual promotion docking with advertising placement platforms, providing the ability to build and optimize marketing target audiences, helping precision marketing and efficient reach, optimizing effect conversion< (3) Modeling attribution services, utilizing individual tag data, scene data, and vectorized features, combined with machine learning models and prediction algorithms, provide customers with data model construction and intelligent group prediction services, and support backflow of advertising data and analysis of advertising effects through transformation funnel models, achieving closed-loop optimization of attribution< (4) Multi party data services, we fully utilize privacy computing environments and technological capabilities such as big data joint computing platforms, federated learning, and feature vectorization, collaborate with other types of data providers, participate in data computing together, and mine data value< (5) Anti fraud and risk control services, based on your authorization with credit reporting agencies and licensed financial institutions, combined with machine learning models and prediction algorithms, for aggregation, fusion and analysis, to provide risk prediction services for licensed institutions< If you do not wish us to proceed with the aforementioned procedures, you can contact us through the contact information listed in Article 7 of this policy or through our user exit mechanism ( https://www.getui.com/user-quit Cancel authorization

9. Indirect acquisition of personal information and your authorization and consent. Please note that we have requested the developer to ensure that you have confirmed and authorized us to process your user information during the service period, in compliance with relevant laws and regulations, for the purposes stated in this policy, and to use the collected information for the purposes specified in this privacy policy after de identifying or anonymizing it in accordance with the law

(2) How do we share, transfer, and publicly disclose your user information? 1. Sharing. We will not share your user information with any company, organization, or individual other than our personal recommendations, except for the following situations: 1.1. Sharing with explicit consent: After obtaining your explicit consent, we will share it with other parties< 1.2. We may share information with the outside world in accordance with laws and regulations, or mandatory requirements from judicial institutions and government authorities< 1.3. Sharing with our affiliated companies: Your user information may be shared with our affiliated companies, including Hangzhou Yunshen Technology Co., Ltd., Hangzhou Yunmeng Shuzhi Technology Co., Ltd., Beijing Yunmeng Shuzhi Network Technology Co., Ltd., Zhejiang Yunhe Data Technology Co., Ltd., Shanghai Lanbao Data Technology Co., Ltd., Beijing Yunzhenxin Technology Co., Ltd., Zhejiang Mingri Data Intelligence Co., Ltd., Shenzhen Aiyixun Data Co., Ltd., and Zhejiang Yuntong Shuda Technology Co., Ltd< We will only share necessary information with affiliated companies when necessary, and affiliated companies and individuals are equally bound by the purposes stated in this privacy policy

SDK Name Third party partner name Product type or name Collection method Collect information Privacy Policy Link
Function
Message push SDK, OneID SDK China Academy of Information and Communications Technology Zhuoxin ID Provide equipment identification and safety risk control services SDK collection Weak characteristics of devices (features that do not possess uniqueness and stability), including device information (device manufacturer, device model, device system information), device network information (device networking method and status information), device environment information (screen brightness, battery status and country), and device application information (installation information such as versions of common device applications) https://zxid.caict.ac.cn/privacy
Message Push SDK Huawei Software Technology Co., Ltd Huawei Push SDK Message push for Huawei phones SDK collection Device information [including device model, device name, SIM card serial number, device unique identifier (IMEI, IMSI, Android ID, IDFA, OAID)], network information https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177
Message Push SDK Honor Terminal Co., Ltd Honor Push SDK Message push for Honor phones SDK collection Device and application information: such as device name, device identifier, device activation time, hardware model, operating system version, application version, software identification code, device and application settings (such as region/language/time zone/font size), etc. Mobile network information, log information, location information https://www.hihonor.com/cn/privacy/privacy-policy/
Message Push SDK Beijing Xiaomi Mobile Software Co., Ltd Xiaomi Push SDK Message push for Xiaomi phones SDK collection Device identifiers (such as Android ID, OAID, GAID), device information https://dev.mi.com/console/doc/detail?pId=1822
Message Push SDK Guangdong Huantai Technology Co., Ltd OPPO Push SDK Message push for Oppo phones SDK collection Device identifiers (such as IMEI, ICCID, IMSI, Android ID, GAID), application information (such as application package name, version number, and running status), network information (such as IP or domain name connection result, current network type) https://open.oppomobile.com/wiki/doc#id=10288
Message Push SDK Vivo Mobile Communications Co., Ltd Vivo Push SDK Message push for vivo phones SDK collection Device and application information: including the operating system version number, application information (including application installation list), device identifiers (such as IMEI, ICCID, EMMCID/UFSID, oaid/vaid/aaid, SN code and IMSI, Android ID, mobile country code, and mobile network number of vivo Android devices during your use of vivo devices and services), MAC address, mobile operator, language of use, system settings, and other system, device, and application data; Log information; Location information https://www.vivo.com.cn/about-vivo/privacy-policy
Message Push SDK Zhuhai Meizu Communication Equipment Co., Ltd Meizu Push SDK Message push for Meizu smartphones SDK collection Device information: mainly includes device name, device model, region and language settings, device identification code (IMEI number, etc.), device hardware information and status, usage habits, IP address, Mac address, operating system version, as well as setting information, application list, location information, network status information, and log information of devices used to access services https://i.flyme.cn/privacy
One click authentication SDK China United Network Communications Co., Ltd Unicom account authentication SDK Provide risk control and certification services for the app SDK collection Network type, network address, operator type, local phone number, mobile device type, mobile operating system, hardware manufacturer https://opencloud.wostore.cn/authz/resource/html/disclaimer.html?fromsdk=true
One click authentication SDK Tianyi Digital Life Technology Co., Ltd Telecom (Tianyi) Account Authentication SDK Provide risk control and certification services for the app SDK collection Network IP address, network type, registered mobile phone number, local phone number, international mobile user identification code, application process information, network connection type, network status information, network address, operator type, mobile device type, mobile device manufacturer, mobile operating system type and version https://e.189.cn/sdk/agreement/detail.do?hidetop=true
One click authentication SDK China Mobile Internet Co., Ltd Mobile account authentication SDK Provide risk control and certification services for the app SDK collection Network type, network address, operator type, local phone number information, mobile device type, mobile operating system, hardware manufacturer https://wap.cmpassport.com/resources/html/contract.html

We will sign strict confidentiality agreements with companies and organizations with which we share information, requiring them to handle shared information in accordance with our instructions, the purposes or purposes listed in this privacy policy, and confidentiality and security measures

2. Transfer: We will not transfer your user information to any company, organization, or individual, except for the following situations: 2.1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer to other parties< 2.2. When it comes to mergers, acquisitions, or bankruptcy liquidation, if it involves the transfer of your user information, we will require the company or organization to seek your authorization and consent again, and inform you of the recipient's name or name, contact information, processing purpose, processing method, and type of personal information

3. Public Disclosure: We will only publicly disclose your user information in the following situations: 3.1. After obtaining your explicit consent< 3.2. Disclosure based on laws and regulations: In cases where laws and regulations, legal proceedings, litigation, or mandatory requirements from government regulatory authorities are required, we may publicly disclose

(3) Exceptions
Please understand that according to laws and regulations, we do not need to obtain your authorization and consent to process your user information in the following situations:
1. It is necessary to enter into and perform contracts to which an individual is a party, or to implement human resource management in accordance with labor rules and regulations and collective contracts signed in accordance with the law< 2. Necessary for fulfilling legal duties or obligations< 3. Necessary for responding to sudden public health emergencies or in emergency situations to protect the life, health, and property safety of natural persons< 4. Conduct news reporting, public opinion supervision, and other activities for the public interest, and process personal information within a reasonable range< 5. According to the provisions of this law, handle personal information that is publicly available on one's own or that has already been legally disclosed within a reasonable range< 6. Other situations stipulated by laws and administrative regulations

Secondly, how do we protect your user information

(1) We have used security measures that comply with industry standards to protect your user information, preventing unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect data security. For example, being protected by SSL encryption when exchanging data between your browser and the "service"; We also provide HTTPS secure browsing for domains such as getui.com and ge.cn; We will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanisms to prevent data from being maliciously attacked; We will deploy access control mechanisms to ensure that only authorized personnel can access and operate; And we will regularly hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting user information; We develop and organize the implementation of emergency plans for personal information security incidents< (2) We have obtained the following certifications: Level 3 certification for information system security protection, ISO9001 quality management system certification, ISO27001 information security management system certification, ISO/IEC27701 privacy information management system certification, etc< (3) Our data security capabilities: In accordance with a series of laws, regulations, and industry standards such as the Data Security Law, the Cybersecurity Law, and the Personal Information Security Specification, we have successively completed a series of work such as three-level authentication for the security level protection of individual business information systems, data classification and grading, and supporting data security guarantee technologies (clarifying requirements for data desensitization, storage, etc.). We have developed various control processes and emergency response systems such as the Security Outline, the Data Classification and Grading Specification, and the Security Event Management Specification. We have built enterprise data security "firewalls" for management system construction, physical environment security, host security, application system security, network security, data security, and other dimensions, and have established a "firewall" that runs through data accumulation. Data processing and usage A data security control and protection mechanism for the entire chain of data transmission and storage< (4) We will take all reasonable and feasible measures to ensure that irrelevant information is not processed. We will only retain your user information for the period necessary to achieve the objectives stated in this policy, unless an extension of the retention period is required or permitted by laws and regulations< Br>(V) The Internet is not an absolutely secure environment, and e-mail, instant messaging and other communication methods are not encrypted. We strongly recommend that you do not send information through such methods< (VI) We will regularly conduct compliance audits on the compliance with laws and administrative regulations when processing personal information, and conduct impact assessments on personal information protection to record the processing situation< Br>(VII) Before processing personal information that has a significant impact on personal rights and interests, we will conduct an assessment of the impact of personal information protection, record the processing and keep it for at least three years:
(VIII) The Internet environment is not 100% secure, and we will try our best to ensure the security of any information you provide us. Even though we have made great efforts and taken all reasonable and necessary measures, it is still possible that we may not be able to prevent your user information from being illegally accessed, stolen, tampered with or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of the information network and voluntarily assume them< If, after taking necessary and reasonable security measures, a personal information security incident still unfortunately occurs and cannot avoid information leakage, tampering, or loss causing harm, we will take immediate remedial measures in accordance with legal requirements and promptly inform you of the types, reasons, and potential hazards of personal information leakage, tampering, or loss; The remedial measures we have taken or will take, and the measures you can take to mitigate the harm; Our contact information and other related information. We will promptly inform you of the relevant situation of the event through email, letter, phone, push notifications, and other means. If it is difficult to inform you one by one, we will take reasonable and effective measures to publish an announcement. At the same time, we will actively and timely fulfill our notification obligations in accordance with the requirements of the department responsible for personal information protection III. Your Rights

Considering that you are not a direct customer of the app, we suggest that you send your relevant requests directly to the app provider according to the privacy policy of the app provider you are using, and the app provider will help you convey your request to us. We will require developers to commit to providing you with an easy-to-use user rights implementation mechanism, explaining how to exercise their right of choice, access, correct, supplement your user information, exercise deletion rights, and change the scope of your authorization and consent< If you still choose to directly make relevant requests to our personal recommendations, in order to protect the legitimate rights and interests of our customers and others, we will require you to verify your identity. Please provide relevant proof of your claims in a timely manner. After verifying with your application provider, we will process your relevant request in accordance with laws and regulations as well as the provisions of this privacy policy. In accordance with relevant laws, regulations, standards in China, as well as common practices in other countries and regions, we guarantee that you exercise the following rights over your user information:
(1) Access, copy, correct, and supplement your information
You have the right to access and copy your user information, except for exceptions specified by laws and regulations. If you wish to exercise the right of access or reproduction, or if you find that the user information we process about you is inaccurate or incomplete and needs to be corrected or supplemented, you can contact us through the contact information listed in Article 7 of this policy, and we will assist you in the operation< We will strive to enable you to access, correct, and supplement your information, but please understand that when you perform a certain operation, we may require you to provide sufficient information so that we can verify your identity to ensure that the requester is the requested information subject or a legally authorized person. We will handle the information you provide in accordance with the purposes, methods, confidentiality, and security measures listed in this privacy policy

(2) Delete your information. In the following situations, you can contact the person in charge of user information protection via email: support@getui.com "> support@getui.com Or through the user exit mechanism ( https://docs.getui.com/userQuit/ ), requesting us to delete information:
(1) Our processing purpose has been achieved, cannot be achieved, or is no longer necessary to achieve the processing purpose< (2) We cease to provide products or services, or our storage period has expired< (3) You withdraw your consent and no longer allow us to process your personal information< (4) We violate laws, administrative regulations, or agreements in processing your personal information< We will evaluate your deletion request based on it, and if it meets the corresponding regulations, we will take corresponding steps to handle it. When you make a deletion request to us, we may require authentication to ensure the security of your account< When you delete information from our services, due to applicable laws, regulations, and security technologies, we may not immediately delete the corresponding information from the backup system. We will securely store your information until the backup can be cleared or anonymized. During this period, we will take necessary security measures to protect the security of your information

(3) Change the scope of your authorization and consent. Each business function requires some basic user information to be implemented (see "Part One" of this policy). For the processing of your information, you can contact us through the contact information listed in Article 7 of this policy or through the user exit mechanism ( https://docs.getui.com/userQuit/ )Requesting the revocation of your authorized consent (i.e. withdrawal of consent) We will process your request and provide a response within fifteen working days after receiving it. Once you confirm the revocation of authorization, we will no longer process your corresponding information< Please also note that your withdrawal of consent may result in certain consequences, such as our inability to continue providing you with corresponding services or specific features. However, your decision to withdraw consent will not affect any information processing based on your authorization

(4) In response to your above request, to ensure security, you need to provide a written request and prove your identity. We may first request you to verify your identity before processing your request. In principle, we will respond within fifteen working days after receiving your request and verifying it. If you are not satisfied, you can also file a complaint with us through the contact information listed in Article 7 of this policy< For your reasonable requests, we generally do not charge any fees, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical. Please also understand that due to security considerations, relevant legal and regulatory requirements, or technical limitations, we may not be able to respond to certain of your requests, such as the following situations: (1) related to the individual's fulfillment of legal and regulatory obligations< (2) There is sufficient evidence to indicate that you have subjective malice or abuse of power< (3) For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent< (4) Responding to your request will cause serious damage to your or other individuals or organizations' legitimate rights and interests< (5) involving trade secrets< (6) Other situations stipulated by laws and regulations 4. How do we handle the personal information of minors

Getui attaches great importance to the protection of personal information of minors, and we do not accept minors registering to use Getui's products or services. Although laws, regulations, and customs in different regions have different definitions of minors, we consider anyone under the age of 14 to be a minor< If the developer's application is developed for minors, we will ask the developer to establish specific personal information processing rules and take necessary measures to inform the parents or guardians of minors, and ensure that the parents or guardians of minors authorize and agree to provide information to individuals to achieve relevant functions or services. We will also require them to strictly comply with the requirements of the Personal Information Protection Law of the People's Republic of China, the Regulations on the Network Protection of Children's Personal Information, and other relevant laws, regulations, policies, standards, and guidelines on the protection of personal information of minors< For cases where personal information of minors is processed with the consent of parents or guardians, we will only process this information when permitted by laws and regulations, explicitly agreed by parents or guardians, or necessary to protect minors. Otherwise, we will try to delete the relevant data as soon as possible< Due to the limitations of existing technology and business models, it is difficult for us to proactively identify the personal information of minors. If you find that we have processed the personal information of minors without our knowledge or obtaining the consent of verifiable parents or guardians in advance, you can contact us in a timely manner, and we will try to delete it in a timely manner after discovering it. If we discover the aforementioned situation ourselves, we will also delete it in a timely manner, except for those required by laws and regulations to be retained V. Storage and Global Transfer of User Information

(1) Storage location: In principle, the user information related to you processed by Qitui will be transmitted to Qitui's servers within the territory of the People's Republic of China and stored within the territory of the People's Republic of China. If cross-border transmission is required, we will obtain your authorization and consent separately
If our developers use the products or services we promote and apply them to areas outside the mainland of the People's Republic of China,we will require developers to strictly comply with the relevant provisions of the Personal Information Protection Law of the People's Republic of China on cross-border transmission of personal information, as well as local laws, regulations, and regulatory requirements on cross-border data transmission and transfer.. Meanwhile, we will also ensure that the developer has obtained your separate consent for this cross-border transfer matter. In this case, we will ensure that your user information receives sufficient and equal protection within the territory of the People's Republic of China(II) Storage Period
We will only store your user information for the period required for the purposes and purposes stated in this policy and the shortest period specified by laws and regulations. After the above storage period is exceeded, we will delete your user information or anonymize it in accordance with the requirements of applicable laws and regulations, in accordance with the Implementation Guidelines for Personal Data Security Protection Technology.
< If there are other laws and regulations, or if you authorize and agree separately, we may extend the storage period of your personal information 6. How to update this privacy policy

In order to provide you with better services, Getui will adjust and republish this privacy policy in a timely manner based on actual operation, performance, and legal requirements. We will publish the updated privacy policy on our official website, and the adjusted or changed privacy policy will take effect within 7 days of publication. Before it takes effect, we will notify developers through appropriate means such as on-site messages or emails, so that you can stay updated on privacy policies in a timely manner. If you do not agree to the modifications made to the relevant terms of this policy by Qitui, please stop using the Qitui service; If you choose to continue using the personalized service, it will be deemed that you accept any adjustments or changes made to the relevant terms of this policy< Without your explicit consent, we will not reduce your rights under this privacy policy< For significant changes, we will also provide more significant notifications (including for certain services, we will notify through built-in platforms and other means to explain the specific changes in privacy policies)< The significant changes referred to in this policy include but are not limited to: 1. Significant changes in our service model, such as the purpose of processing information, the type of information processed, and the way information is used< 2. We have undergone significant changes in ownership structure, organizational structure, etc., such as business adjustments, changes in ownership caused by bankruptcy mergers and acquisitions, etc< 3. Changes in the main objects of information sharing, transfer, or public disclosure< 4. Your rights to participate in information processing and the way you exercise them have undergone significant changes< 5. When there are changes in the department responsible for handling information security, contact information, and complaint channels< When the personal information security impact assessment report indicates a high risk< We will also archive the old version of this policy for your reference 7. How to contact us

If you have any questions, opinions or suggestions about this privacy policy, please contact us through the following contact information:
Email: business@getui.com

Phone: 4006-808-606
Fax: 0571-86473223
Contact address: No. 100 Jingda Road, Xihu District, Hangzhou City, Zhejiang Province, China Daily Jinzuo
You can also visit https://www.getui.com Contact us through various methods such as online customer service system or calling any of our customer service numbers< We have also established a dedicated department for personal information protection, and you can access the email address of the user information protection responsible person support@getui.com "> support@getui.com Contact us< If you are not satisfied with our response, especially if our information processing behavior has harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit with the people's court with jurisdiction in the location of our website (Xihu District, Hangzhou City)

8. Definition

1. We or a personal recommendation: referring to Daily Interactive Co., Ltd< 2. Personal information: refers to various information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person, either individually or in combination with other information< 3. Personal information subject: the natural person identified by personal information< 4. Delete: The act of removing information from systems involved in implementing daily business functions, keeping it in a state that cannot be retrieved or accessed< 5. Anonymization: The process in which personal information cannot be processed to identify specific natural persons and cannot be restored< 6. Deidentification: The process in which personal information is processed to prevent it from identifying specific natural persons without the need for additional information< 7. Affiliated company: refers to an enterprise that has a direct or indirect ownership or control relationship with an individual, is directly or indirectly owned or controlled by a third party, and has other related relationships in terms of interests (including but not limited to legal representatives or actual controllers being the same person, or has family or family relationships, etc.)< 8. Within the territory of the People's Republic of China: Refers to the mainland region of the People's Republic of China, for the purpose of this policy only, and does not include the Hong Kong Special Administrative Region, Macao Special Administrative Region, and Taiwan region< 9. Existing customers: Refers to developers who have access to personal user profiling services and/or number of application statistics services and/or link adjuster services before October 12, 2022

文档中心搜索

技术
咨询

微信扫一扫

随时联系技术支持

在线
咨询