Privacy Policy

Speech To Text will collect and use your personal information when providing products and/or services to you (or "users"). We hereby remind you to read and fully understand our privacy policy ("this policy"). Your registration, login, and use of our product recording to text will be deemed that you have fully read and understood the content of this policy, and agree to make the corresponding authorization; you agree to this policy when you use this product and/or service. the whole process is valid. If you have any questions, comments or suggestions about this policy, you can contact us at any time through the contact information specified in this policy for consultation and feedback; if you do not agree with this policy, you should immediately stop using this product and service. We hope to explain to you the protection measures we take for your information and the rights you enjoy when you use our products and/or services through this policy. We specifically remind you that after collecting your personal information, we may perform automated data processing of your personal information. In this case, we will de-identify the data in accordance with the national technical standards to form a user database, and the use of information that meets the de-identification standards does not violate your personal privacy or violate the personal information protection policy.
 
1. Personal information collection and use rules
(1) The core business function of providing products and/or services to you.
For our core business functions, we may need to collect personal information from you when you use the products and/or services we provide. The core business functions and the personal information collected for the realization of the functions will be listed in detail below. If you refuse to collect them, you will not be able to use the service.
(1) When you use the product functions: You can use the product functions without registering an Speech To Text account. Product functions include uploading and recording audio content and converting text; in the process of using the functions, under the premise of obtaining your authorization, we may collect the device information (including device model, device unique identifier, operating system) that you use to convert audio to text. version, resolution, telecom operator, device settings, device positioning) in order to provide you with the best solution for information display. In addition, during your use of the product functions, we will automatically collect the details of your use of Speech To Text and save them as relevant logs, including but not limited to the content you browse, the language you use, the date of access and Time, and the web page record you requested, operating system, software version number, and login IP information.
(2) We may ask you to authorize the use of device storage read and write permissions in order to store audio/video content. Before obtaining your authorization, Speech To Text will not abuse the device storage read and write permissions to access files of other applications.
(2) To provide you with additional business functions of products and/or services
In order to provide you with better products and services, we may need to collect the following information. If you refuse to provide the following information, it will not affect your normal use of the core business functions described in item "(1)" in the first part of this policy, but we cannot provide you with certain specific functions and services.
(1) When you log in to your recording-to-text account: During the process of registering as a user of recording-to-text, you may need to provide us with your mobile phone number or WeChat account information (WeChat nickname and avatar, region, gender) or QQ account information ( QQ nickname, avatar, region and gender) these basic information to create a username and password. If you log in with a third-party account authorization, you need to authorize us to share your third-party account information; you can provide more additional information in user registration to complete your personal information, such as your real name, gender, region of residence, mobile phone number, QQ, email, these information will help us to provide you with more personalized services, but not providing you will not affect your basic services using this product.
(2) When you are recording: When you grant the recording permission, storage permission, and microphone permission, you can use the recording function, and the recording will record all the content you record. The recorded content will be stored in the phone.
(3) When you upload a recording or convert the recording into text: After you register as a user of recording to text, you can back up the audio content and perform text conversion. When you use the aforementioned functions, you can actively provide, upload or share the recording content and information, which may leak your personal sensitive information. Please treat it with caution and carefully consider whether to share or even publicly share the relevant information when using the relevant services.
(4) When you share audio to third-party channels (WeChat, QQ, WeChat Moments, Qzone, Weibo, etc.): You can share audio content to third-party channels after you register as an Speech To Text user. When you use this function, you can actively provide, share or publish video content and information, which may leak your personal sensitive information. Please treat it with caution and carefully consider whether to share or even publicly share relevant information when using related services.
(5) When your use of our products and/or services involves a transaction, the system will generate your transaction order, which requires the user account and mobile phone number related to the order, the information of the goods or services you purchased, and the payment you should pay. Payment information such as amount and payment method.
(6) When you use the functions involving payment: the payment is completed through the payment services provided by the cooperative third-party payment institutions (WeChat payment, Alipay payment, QQ payment, etc.). The third-party payment service may use biometric information for Payment verification, please read the privacy policy of the third-party organization when you use the third-party payment service. If you do not agree with the agreement, please stop using the third-party payment service in time.
(3) We may indirectly obtain your personal information from third parties
(1) When you log in with a third-party account (QQ, WeChat), you can choose to authorize the audio recording to be converted into text to read and obtain the public information you have registered, published and recorded on the third-party platform under the premise of complying with the requirements of relevant laws and regulations. (including nickname, avatar, etc.).
(2) Speech To Text requires your authorization to obtain the above information from a third party in order to remember your login identity as a user of Speech To Text and to provide you with better products and/or services. We will only collect and use your personal information within the scope of your authorization and consent. After you register or log in with a third-party account, your third-party account will be bound to the Speech To Text account.
List of third-party SDKs:
SDK: com.umeng UMENG (Youmeng SDK)
Purpose of use: user data statistics
Type of data collected: device identification information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/MAC address/geographical location, etc.)
Official website link: https://www.umeng.com/page/policy?spm=a213m0.17692878.0.0.6375378e01JMi9

SDK: Pangolin SDK
Function: Ad SDK for serving ads to users
Types of personal information collected: Obtain mobile phone status including imei, network status, mac address, etc., location information, identifiers, usage data, diagnostics, and other data
Privacy Policy: https://www.pangle.cn/privacy

(IV) Exceptions to obtaining authorization and consent In the following situations, we may obtain relevant information without seeking your prior consent:
a) directly related to national security and national defense security;
b) Directly related to public safety, public health, and major public interests;
c) Directly related to criminal investigation, prosecution, trial and execution of judgments;
d) It is difficult to obtain your consent in a timely manner for the protection of your or others' life, property and other major legitimate rights and interests;
e) The personal information collected is disclosed to the public by you;
f) Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
g) Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and disposing of faults in the products or services;
h) When it is necessary for academic research and the results of academic research or description are provided externally, the personal information contained in the results is de-identified;
i) Other circumstances stipulated by laws and regulations.

 
2. How we use cookies and similar technologies
(1) Cookies
To ensure the proper delivery of our products and/or services, we store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, we are able to store data such as your preferences or favorites; we do not use cookies for any purpose other than those described in this policy.
(2) Web beacons and pixel tags
In addition to cookies, we also use other similar technologies such as web beacons and pixel tags. For example, text messages we send you may contain URLs that link to our products and/or services. If you click on the link, we will track the click to help us understand your product or service preferences and improve customer service.
(3) Do Not Track
Many web browsers have a Do Not Track feature that issues a Do Not Track request to a website. Currently, no major Internet standards organization has established policies governing how websites should respond to such requests. However, if your browser has Do Not Track enabled, then all of our websites will respect your choice.

 
3. How do we share, transfer and publicly disclose your personal information
(1) Sharing
We will not share your personal information with any companies, organizations and individuals outside this product, except in the following cases:
(1) Sharing with explicit consent;
(2) Share your personal information externally in accordance with laws and regulations or the mandatory requirements of government authorities;
(3) Sharing with our affiliated companies: but we will only share necessary personal information and are bound by the purpose stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization again agree;
(2) Transfer
We will not transfer your personal information to any companies, organizations and individuals, except in the following cases:
(1) Assignment with express consent;
(2) Comply with the relevant agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents.
(3) Public disclosure
We will only publicly disclose your personal information in the following circumstances:
(1) After obtaining your express consent;
(2) We may publicly disclose your personal information under the mandatory requirements of laws, legal procedures, lawsuits or government authorities; when we receive the above-mentioned request for information disclosure, we will require the corresponding documents to be issued. legal documents, such as subpoenas or letters of inquiry.

 
4. How do we protect and manage your information
(1) We employ appropriate technical and organizational measures to protect the personal data collected and processed. The measures we employ are designed to provide a level of security commensurate with the risks of processing personal data. We employ Internet industry standard practices to protect your personal information from unauthorized access, disclosure, use, modification, damage or loss. To this end, we have established a personal information and privacy protection team (please refer to Section IX of this policy for the contact information of the person in charge of personal information protection), and we will take all reasonable and feasible measures to protect your personal information and ensure that no information related to the weather is collected. Personal information unrelated to the services provided by the forecaster.
(2) We will do our best to protect your personal information, but please understand that due to technical limitations and various malicious means that may exist, it is impossible to always guarantee 100% information security in the Internet industry. You need to understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control.
(3) In the event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or will take, and you can prevent and Recommendations to reduce risk, remedies for you, etc. We will promptly notify you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to publish an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
(4) When our products or services stop operating, we will notify you in the form of push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time.
 
5. How do you manage your personal information
We will do our best to take appropriate technical means to ensure that you can access, update and correct your registration information or other personal information you provide when using our products and/or services.
(1) Access to your personal information
You can access your personal information through mobile device access in the following ways: log in to your account and click "My" to enter your personal homepage and delete and/or clean up your personal information.
(2) Correcting or supplementing your personal information
When you find that the personal information we process about you is inaccurate, you can ask us to make corrections or supplements. For contact details, please refer to Section IX of this Policy on How to Contact Us.
(3) Delete your personal information
You can change the scope of your personal information that you authorize us to collect and use by logging in to your personal account to delete information, turn off the functions of related devices/tools, and set privacy settings in the Speech To Text program. You can also cancel all authorization for us to collect and use your personal information by canceling your account. After you cancel your account, we will stop using and delete your personal information unless otherwise stipulated by laws and regulations or otherwise agreed with you in writing.
You may request us to delete your personal information in the following circumstances:
(1) Our processing of personal information violates laws and regulations or our agreement with you;
(2) We fail to obtain your explicit consent for the collection and use of your personal information;
(3) We terminate the provision of our products or services to you or you voluntarily terminate the use of our products or services.
If you cannot access, update or delete such personal information through the above path, you can contact us at any time through the attached contact information, and we will respond to your request within seven days.
When you delete personal information, we may not delete the corresponding information from the backup system immediately, but will delete the information when the backup is updated. When you contact our customer service to apply for account cancellation, we will delete your personal information, except for the anonymized information that has been used for user portraits or cannot be deleted according to laws and regulations.
When we anonymize or delete your personal information, if your personal information has been shared, we will also notify relevant companies, organizations or individuals to anonymize or delete your personal information.
(4) Change the scope of your authorization and consent
You can change the access rights such as recording and positioning in the mobile phone device, or change the browser function settings, and change the setting options.
(5) The personal information subject cancels the account
We support you to cancel your previously registered account at any time, you can do it in the following ways: apply for cancellation by sending an email to chenfeng@palmmob.com;
After canceling your account, we will stop providing you with products or services, and delete your personal information according to your request, unless otherwise provided by laws and regulations.
(6) Responding to your above request
To ensure security, we may require you to verify your identity before processing your request when you make the above request. Generally, we will respond to your request within seven days. For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate.
 
6. HOW WE PROCESS CHILDREN'S PERSONAL INFORMATION
We do not exclude children (although local laws and customs have different definitions of children, we consider anyone under the age of fourteen to be a child) to create their own user accounts, based on the principle of the necessity of collecting information, we will not actively verify the age Information, if the guardian expressly disagrees with the child's account creation, he can contact us through the contact information in Section IX of this policy, and in other circumstances necessary to protect the child, we will suspend or limit the child's access to our products and/or services. usage of.

 
7. Storage of your personal information
Personal information collected and generated within the territory of the People's Republic of China will be stored in the territory of the People's Republic of China, and the relevant information will be kept for less than three years. If it exceeds three years, we will immediately delete or anonymize it.

 
8. How to update this policy
We may revise this Privacy Policy from time to time. Without your explicit consent, we will not reduce your rights in accordance with this Privacy Policy; for major changes, we will also use more prominent means such as APP client push notifications, We will notify you in the form of pop-up windows, emails, etc., so that you can keep abreast of changes to this policy. A material change refers to a significant change in our service model and an important adjustment to your rights and obligations under this Agreement. The changed version will be published in the Services and Privacy Agreement section.
Please note that we may make necessary corrections to paragraphs and errors in this policy without your consent.

 
9. How to contact us
The company has a dedicated compliance department to supervise personal information protection. For questions related to this policy or our privacy measures, you can contact us by the following methods: Email us at chenfeng@palmmob.com;
After receiving your call or visit, we will not give an initial reply or deal with your questions or your needs more than seven days at the latest, if you are not satisfied with our reply or treatment, especially if you think that we have harmed For the legitimate rights and interests related to your personal information, you can file a complaint or report to the regulatory authorities such as the Internet, telecommunications, public security, and industry and commerce, or file a lawsuit with the competent people's court.

 
10. Supplementary Provisions
We may cooperate with different third-party partners, including but not limited to promoting third-party products and/or services. We cannot exhaust the categories of third parties we may cooperate with here; however, you need to pay special attention to the relevant provisions of this policy Applies only to this product and/or service and does not apply to products and services to which third parties point through this product and service, or third-party links on this product. In this case, it is recommended that you carefully read and understand the privacy policy of the third party.
Release date: 2021.9.1
Update date: 2021.9.19