In order to better serve our customers, we may use third-party software tool development kits (SDKs). We will conduct a comprehensive assessment of the security assurance capabilities of these partners and require them to comply with the cooperation legal agreement. We will also conduct strict security monitoring on the software tool development kits (SDKs) and application programming interfaces (APIs) used by partners to obtain information to protect users' data security.
List of third-party SDKs:
SDK:com.facebook.fresco
Purpose of use: The uni-app base module is integrated by default, used for nvue page loading image use
Types of data collected: storage of personal files
Official website link:https://www.fresco-cn.org/
SDK:com.facebook
Purpose of use: This app uses facebook's open source framework to build an interface
Type of data collected: No data is collected
Official website link:https://reactnative.dev/
SDK:wechat-sdk-android WeChat login
Purpose of use: use Tencent WeChat third-party login
Type of data collected: No data is collected
Official website link:https://open.weixin.qq.com/
SDK:android.permission.READ_PHONE_STATE
Purpose of use: for app data and crash log statistics
Mobile phone data type: Get mobile phone status (including mobile phone number, IMEI, IMSI permissions, etc.)
Official website link:https://www.umeng.com/page/policy?spm=a213m0.17692878.0.0.6375378e01JMi9
SDK:com.umeng UMENG(UMENG SDK)
Purpose of use: user data statistics
Type of data collected: device identification information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/geolocation, etc.)
Official website link:https://www.umeng.com/page/policy?spm=a213m0.17692878.0.0.6375378e01JMi9
SDK: Youlianghui SDK
Function: Ad SDK for serving ads to users
Types of Personal Information Collected: IMEI, MAC Address, Location Information, Identifiers, Usage Data, Diagnostics, Get Device Installed List, Other Data
Privacy Policy:https://imgcache.qq.com/gdt/cdn/adn/uniondoc/ylh_sdk_privacy_statement.html
SDK:Pangolin SDK
Function: Ad SDK for serving ads to users
Types of personal information collected: Obtain mobile phone status including imei, network status, mac address, etc., location information, identifiers, usage data, diagnostics, and other data
Privacy Policy:https://www.pangle.cn/privacy
SDK: com.qq.e Guangdiantong
Function: Ad SDK for serving ads to users
Types of personal information collected: Obtain mobile phone status including imei, network status, mac address, etc., location information, identifiers, usage data, diagnostics, other data
Privacy Policy:https://www.tencent.com/zh-cn/privacy-policy.html
SDK:com.tencent.mm.opensdk WXPay(WeChat payment)
Purpose of use: to help users use WeChat payment within the app
Type of Data Collected: Device Identification Information
Official website link: https://payapp.weixin.qq.com/summeract/gdpr/home
SDK:com.alipay Alipay(Alipay payment)
Purpose of use: to help users use Alipay within the app
Type of Data Collected: Device Identification Information
Official website link:https://docs.open.alipay.com/54
com.google.android.gms.auth(GoogleSignin)
Purpose of use: use GoogleSignin third-party login
Type of Data Collected: username.
Official website link:https://policies.google.cn/privacy
SDK:com.google.android.gms.ads (AdMob)
Purpose of use: Advertising sdk that provides advertising services to users
Types of data collected: IMEI, browser type and settings, operating system, mobile network information (including operator name and phone number) and application version number, location information, mac address, etc.
Privacy Policy:https://policies.google.cn/privacy
At the same time, we will use the following permissions to better allow users to experience the functions of this product:
1: Storage permission:android.permission.WRITE_EXTERNAL_STORAGE
Purpose of use: The user selects pictures from the album for various AI image processing and stores them in the album
2:Camera permission: android.permission.CAMERA android.permission.READ_EXTERNAL_STORAGE
Purpose of use:Users take pictures for AI picture processing
3: Network permission: android.permission.INTERNET
Purpose of use: used to synchronize various states of the Internet, judge the quality of the network, respond to the situation and handle various user operations, etc.
4: Network permission: android.permission.ACCESS_NETWORK_STATE
Purpose of use: to obtain the status of network information, such as whether the current network connection is valid
5: Network permission android.permission.ACCESS_WIFI_STATE
Purpose of use: Get the WiFi status, which is used to obtain the current WiFi access status and information about WLAN hotspots
6: Install permission android.permission.REQUEST_INSTALL_PACKAGES
Purpose of use: for installation permissions from unknown sources
7: Network permission android.permission.CHANGE_NETWORK_STATE
Purpose of use: change the network status to change the network status, such as whether it can be connected to the Internet
8:android.permission.QUERY_ALL_PACKAGES
Purpose of use: new version upgrade push
2. How to share and transfer your personal information
1. We will not share your personal information with any company, organization or individual other than us, except in the following cases:
(1) After obtaining your explicit consent, we will share your personal information with other parties;
(2) Share your personal information externally in accordance with the provisions of laws and regulations, the need for litigation and dispute resolution, or as required by administrative and judicial organs in accordance with the law;
(3) To the extent permitted by laws and regulations, in order to provide you with more network services, we share your personal information with its affiliates or partners;
(4) It is necessary to provide the public interest, property or safety from damage;
(5) To handle disputes or disputes between you and others according to your needs;
(6) It is used based on the social and public interests stipulated by law.
2. We will not transfer your personal information to any company, organization or individual, except in the following cases:
(1) After obtaining your explicit consent, we will transfer your personal information to other parties;
(2) The transfer is made in accordance with the requirements of applicable laws and regulations, legal procedures, or mandatory administrative or judicial requirements;
(3) When it comes to mergers, acquisitions, asset transfers or similar transactions, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this Privacy Policy, otherwise, we will Require the company or organization to seek authorization from you again.
3. How to protect your personal information
1. We have taken reasonable and feasible security protection measures in line with industry standards to protect the personal information provided by you and prevent unauthorized access, public disclosure, use, modification, damage or loss of personal information. We will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms and try our best to ensure that only authorized personnel can access personal information.
2. We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected.
3. We will only retain your personal information for the period necessary to achieve the purpose stated in this policy, unless it is necessary to extend the retention period or permitted by law. If you do not want us to continue to use your personal information, please contact us to delete and terminate the use of this software. However, such information will remain in our systems for a period of time to comply with legal requirements.
4. We will formulate an emergency response plan, and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (leakage, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can voluntarily Recommendations for preventing and mitigating risks, remedies for you, etc. We will promptly notify you of the relevant information of the event in the form of push notifications, emails, letters, text messages, etc.; when it is difficult to inform you one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of user information security incidents in response to the requirements of relevant regulatory authorities. You confirm that if we have not intentionally caused any loss of your personal information to leak, we will be exempted from all responsibilities under the circumstance that we have taken the above emergency measures.
5. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, it is not always possible to guarantee 100% information security, and we will do our best to ensure the security of the personal information you provide to us. You know and understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive steps to protect the security of your personal information.
4. How to handle the personal information of minors
1. Minors are not allowed to use this software without the consent of their parents or guardians. If you are a minor, it is recommended that you ask your parents or guardians to read this Privacy Policy carefully, and use our services or provide us with information with the consent of your parents or guardians.
2. For the collection of personal information of minors using our products or services with the consent of parents or guardians, we will only use and share minors’ personal information permitted by laws and regulations, express consent of parents or guardians, or necessary to protect minors , transfer or disclose this information.
5. Amendment
According to changes in national laws and regulations and our operational needs, we have the right to revise the content of the policy from time to time. Once the revised content is published on this software in any form, it will take effect and replace the previous relevant content. You should pay attention to the relevant content of this software from time to time. Changes in content. You know and confirm that if you do not agree with the updated content, you should stop using the software immediately; if you continue to use the software, you are deemed to be aware of the changes and agree to accept them.
6. How to contact us
If you have any questions about this Privacy Policy or your personal information, you can send us an email at chenfeng@palmmob.com.
Release date: 2022.2.1
Update date: 2022.2.19