Office File Viewer Privacy policy

Bayesian LTD respects and values the protection of users’ personal privacy rights. In order to provide you with more accurate and personalized services, we will use and disclose your personal information in accordance with the provisions of this privacy policy. We are well aware The importance of personal information to you, and we will do our best to protect the safety and reliability of your personal information. This privacy policy explains how we will collect and use your personal information and help you understand your rights. Please read and understand this privacy policy carefully before using our services. 

This policy will help you understand the following:
A、Definition
B、 How we collect and use your personal information
C、 How do we share, transfer, and publicly disclose your personal information
D、How do we protect and save your personal information
E、Your rights
F、Protection of minors
G、How to update this policy
H、Scope of application
I、How to contact us

A、Definition
Personal information: refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. For the personal information referred to in this privacy policy, please refer to the types listed in the clause "How do we collect and use your personal information"。
Personal sensitive information: refers to personal information that, once leaked, illegally provided, or misused, may endanger personal and property safety, and easily lead to personal reputation, physical and mental health damage, or discriminatory treatment. The sensitive personal information involved in this privacy policy includes: your personal identification information (including ID card); network identification information (including account name, account nickname and password related to the foregoing); other information (including address book, personal phone number) Number, mobile phone number, itinerary information, web browsing history, accommodation information, precise location information). For the personal sensitive information listed in this privacy policy as above. To make it easier for you to feel when reading. In addition to the unified definition and listing here, we will still remind you in this privacy policy by means of bold fonts or separate points out. 

B、How we collect and use your personal information
In the process of continuously improving product functions and optimizing product experience, we will only collect and use your personal information for the following purposes described in this policy:
(a)Help you register as a user of Office File Viewer
To help you complete the creation of your account so that we can provide you with registered user services, we provide you with a variety of registration channels for you to choose. When you choose to use your mobile phone number or email address to register, you need to provide us with your mobile phone number, email address and password (encrypted) personal sensitive information. We use this type of information to send verification code information for you to submit to verify your identity is it effective. 
When you choose to use a third-party account (such as WeChat, QQ, Weibo, etc.) to register and log in to the user account more conveniently, we will access and collect your expressly authorized personal information through indirect access (you are in the third-party account The avatar and nickname information in the, the specific public information and permissions authorized by different third-party accounts shall prevail) and bind your third-party account with your registered account. If you refuse to provide the information under a third-party account, you will not be able to choose to use the third-party account to register and log in. We promise the legitimacy of the source of third-party account channels for this type of personal information。 
In the process of registering as a Office File Viewer user and during use, you can choose whether to supplement your nickname (including real name), gender, profile picture (including real profile picture), birthday, constellation, location, and personal introduction information ( "Supplementary Information"), which will help us provide you with personalized and better user services。 
You know. We collect mobile phone number and e-mail address information to meet the real-name system requirements of relevant laws and regulations. If you do not provide such information, you may not be able to use our registered user service normally. However, if you do not provide mobile phone number, email address information, third-party account information and supplementary information, it will not affect the basic functions of your use of the service。 
When you use functions such as publishing information or exporting files and linking to the display location, we may ask you to authorize the geographic location permissions and collect location information related to this service. If you refuse to authorize the provision of precise geographic location authority information, you will not be able to use the associated function of displaying location information, but it will not affect other features of the product you are using。 
(b)Improve our products or services
We may also obtain other information about you for reasonable needs to improve our products or services, including relevant feedback information provided when you contact customer service, questionnaire response information sent to us when you participate in questionnaire surveys, and your relationship with us. Related information that we authorized to obtain when interacting with our affiliates and our partners. For the information collected from your various devices, we may associate them so that we can provide you with consistent services on these devices. We may combine information from one service with information from other services in order to provide you with services, personalized content and suggestions。 
(c)Information collected by third-party websites and analysis service providers
We may cooperate with third-party websites or analysis service providers to deliver advertisements to you, or to help us better understand the use of products and services, such as the length of service use. These third-party partners may collect relevant information about you, which may be transmitted to and stored by the relevant third-party partners. We have no control over the technologies used by third parties, and are not responsible for the third party's privacy policies, information processing policies, or the content on any third-party websites。 
(d)Provide you with security
In order to improve the security of your use of our services, protect the personal and property safety of you, other users or the public, and better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and more To accurately identify violations of laws and regulations or the company’s relevant agreements and rules, we may use or integrate your registration information, device information, web logs, and your application frequency, crash data, overall usage, performance data, and applications The source of the program and other information are used to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law. For example, we will comprehensively analyze abnormal user account activity, multi-terminal login, abnormal traffic, etc. to protect your account security。 
( e)Other purposes and uses
n compliance with the following circumstances, we will separately seek your consent in advance in accordance with the provisions of laws and regulations: 1. We use the information for other purposes and purposes not specified in this policy; 2. We use the information collected for specific purposes for other purposes.。
(f)Exceptions for obtaining authorization and consent
1、According to relevant laws and regulations, the collection of your personal information in the following situations does not require your authorization and consent:
2、Related to national security and national defense security;
3、Related to public safety, public health, and major public interests;
4、Related to criminal investigation, prosecution, trial, and execution of judgments;
5、In order to protect the life, property and other major legal rights of personal information subjects or other individuals, but it is difficult to obtain your own consent;
6、The personal information collected is disclosed to the public by yourself;
7、 Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
8、Necessary for signing a contract according to your requirements;
9、It is necessary to maintain the safe and stable operation of the products or services provided, such as discovering and disposing of product or service failures;
10、Necessary for legal news reports;
11、When it is necessary for academic research institutions to conduct statistical or academic research based on public interest, and when they provide academic research or description results to the outside, they de-identify the personal information contained in the results;
12、Other circumstances stipulated by laws and regulations;

C、How do we share, transfer, and publicly disclose your personal information
(A)Sharing and disclosur
We may share device information with partners that carry out advertising, but we will only provide these partners with indirect profile tags that cannot identify your personal identity and de-identified or anonymized device, network, and channel information to help them Improve the effective reach of advertisements without identifying personal identity。
 
In order to better serve our customers, we may use a third-party software tool development kit (SDK). We will conduct a comprehensive assessment of the security capabilities of these partners and require them to follow the cooperation legal agreement. We will also conduct strict security monitoring on the software tool development kit (SDK) and application program interface (API) used by the partners to obtain information to protect users' data security。
List of third-party SDKs :
SDK:com.facebook.fresco
The uni-app basic module is integrated by default, and is used for loading pictures on the nvue page
Type of data collected: Store personal files
Official website link:https://www.fresco-cn.org/

SDK:com.facebook
Purpose of use: This app uses facebook's open source framework to build an interface
Data collection type: No data is collected
Official website link:https://reactnative.dev/

SDK:wechat-sdk-android WeChat login
Purpose of use: use Tencent WeChat third-party login
Type of data collected: No data collected
Official website link:https://open.weixin.qq.com/

SDK: android.permission.READ_PHONE_STATE
Purpose of use: for app data and crash log statistics
Mobile phone data type: get mobile phone status (including mobile phone number, IMEI, IMSI authority, etc.)
Official website link:https://www.umeng.com/page/policy

SDK: com.qq.e Youlianghui SDK
Function: Advertising SDK used to provide users with advertising services
Types of personal information collected: IMEI, MAC address, location information, identifiers, usage data, diagnosis, other data
Privacy Policy: https://imgcache.qq.com/gdt/cdn/adn/uniondoc/ylh_sdk_privacy_statement.html

SDK: Pangolin SDK
Function: Advertising SDK used to provide users with advertising services
Types of personal information collected: Obtain mobile phone status, including imei, network status, mac address, location information, identifiers, usage data, diagnosis, and other data
Privacy Policy:https://www.pangle.cn/privacy

SDK: com.qq.e Guangdiantong
Function: Advertising SDK used to provide users with advertising services
Types of personal information collected: Obtain mobile phone status including imei, network status, mac address, etc., location information, identifiers, usage data, diagnosis, and other data
Privacy Policy:https://www.tencent.com/zh-cn/privacy-policy.html

SDK: com.tencent.mm.opensdk WXPay (WeChat Pay)
Purpose of use: to help users use WeChat Pay within the app
Type of data collected: device identification information
Official website link:https://payapp.weixin.qq.com/summeract/gdpr/home?lang=cn&nobutton=1 

SDK: com.alipay Alipay(Alipay payment) 
Purpose of use: to help users use Alipay in the app
Type of data collected: device identification information
Official website link:https://docs.open.alipay.com/54 

SDK:com.umeng UMENG(Youmeng SDK)
Purpose of use: user data statistics
Collected data type: device identification information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/MAC address/geographic location, etc.)
Official website link:https://www.umeng.com/page/policy?spm=a213m0.17692878.0.0.6375378e01JMi9

SDK:com.google.android.gms.ads(AdMob)
Purpose of use: advertising SDK to provide users with advertising services
Collected data types: IMEI, browser type and settings, operating system, mobile network information (including operator name and phone number) and application version number, location information, mac address, etc.
Privacy Policy:https://policies.google.cn/privacy

At the same time, we will use the following permissions to better allow users to experience the functions of this product:
1: Storage permission android.permission.WRITE_EXTERNAL_STORAGE
Purpose of use: for user storage or upload for document editing

2: Network permission android.permission.INTERNET
Purpose of use: Used to synchronize various states of the network, determine network quality, respond to different situations and handle various operations of users, etc。

3: Network permission android.permission.ACCESS_NETWORK_STATE
Purpose of use: to obtain network information status, such as whether the current network connection is valid

4: Network permission android.permission.ACCESS_WIFI_STATE
Purpose of use: Get WiFi status, used to get the current WiFi access status and WLAN hotspot information

5: Installation permission android.permission.REQUEST_INSTALL_PACKAGES
Purpose of use: Used to install permissions from unknown sources

6: Network permission android.permission.CHANGE_NETWORK_STATE
Purpose of use: Change the network status, change the network status, such as whether it can be connected to the Internet

7: android.permission.QUERY_ALL_PACKAGES
Purpose of use: new version upgrade push

We will not share your personal private information with any company, organization or individual other than our company, except in the following circumstances:
With your (and guardian's) explicit consent or authorization or your active choice;
We may share your personal information externally in accordance with laws and regulations, the need for litigation dispute resolution, or the requirements of administrative and judicial organs in accordance with the law. For example, if we determine that you have violated laws and regulations or seriously violated the rules of this agreement, or to protect the personal and property safety of our company and its affiliated company users or the public from infringement, we may disclose information about Your personal information, including related violations and the measures we have taken against you. For example, if you or the account you are using uploads illegal videos, illegal videos and seriously violates our rules, violates laws and regulations, and/or violates public order and good customs, causing significant social impact and causing reputational damage to our platform, we may publicly disclose you Information and penalties。 
Share your personal information with affiliates of this company. In such cases, we will only share necessary personal information and are bound by the stated purpose in this privacy policy. If our affiliates want to change the purpose of processing personal information, they will again seek your authorization and consent。
(B)Transfer
1. We will not transfer your personal information to any company, organization or individual, except in the following cases:
2. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
3. In the case of mergers, acquisitions or bankruptcy liquidation of our company, or other situations involving mergers, acquisitions or bankruptcy liquidation, if the transfer of personal information is involved, we will require new companies and organizations that hold your personal information to continue to receive this Restricted by the policy, otherwise we will require the company, organization and individual to seek authorization and consent from you again。 
(C)Public disclosure
1. We will only publicly disclose your personal information under the following circumstances and under the premise of adopting safety protection measures that comply with industry standards:
2. According to your needs. Disclose the personal information you specify in a disclosure method that you explicitly agree to;
3. According to the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we will only publicly disclose your personal information under the following circumstances and adopting safety protection measures that meet industry standards:
4. According to your needs. Disclose the personal information you specify in a disclosure method that you explicitly agree to;
5. In the case where your personal information must be provided in accordance with the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements. We may publicly disclose your personal information based on the required personal information types and disclosure methods. Under the premise of complying with laws and regulations, when we receive a request for information disclosure, we will require the presentation of corresponding legal documents. We firmly believe that the information requested from us should be as transparent as possible within the scope permitted by law. We will carefully review all requests to ensure that they have a legal basis. And it is limited to data obtained by law enforcement agencies for specific investigation purposes and with legal rights. 
(D)Exceptions for obtaining prior authorization and consent when sharing, transferring, or disclosing personal information
1. According to relevant laws and regulations, in the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:
2. It is directly related to national security and national defense security;
3. It is directly related to public safety, public health, and major public interests;
4. Related to criminal investigation, prosecution, trial, and execution of judgments;
5. In order to protect the life, property and other major legal rights of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;
6. The personal information collected is disclosed to the public by the subject of personal information on his own;
7. Other circumstances stipulated by laws and regulations.
According to laws and regulations, sharing and transferring personal information that has been de-identified, and ensuring that the data recipient cannot restore and re-identify the subject of personal information does not belong to the external sharing, transfer, and public disclosure of personal information. The storage and processing will not need to notify you separately and obtain your consent。 

D、How do we protect and save your personal information
(A)Technical protection
To protect your information security, we strive to adopt various reasonable physical, electronic and management security measures that meet industry standards to protect your information, so that your information will not be leaked, damaged or lost, including but not limited to SSL, encrypted storage of information, and access control of the data center. We will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent malicious attacks on personal information; we will deploy access control mechanisms to try our best to ensure that only authorized personnel can access personal information。 
(B)Perfect system measures
We have formulated a protection system covering all aspects of personal information collection, storage, use, circulation, destruction, and incident handling reports, and established supporting technical measures。
(C)Personnel safety management
We have also adopted strict management of employees or outsourced personnel who may have access to your information, including but not limited to adopting different authority controls according to different positions, signing confidentiality agreements with them, and batch access and acquisition of employees are limited to system migration or legal Cooperating with law enforcement work must be authorized by the system of two or more management personnel. We will provide corresponding security measures to protect your information in accordance with existing technology and provide reasonable security guarantees. We will try our best to prevent your information from being leaked, damaged or lost. We will organize security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information。 
(D)Tips for sensitive information and password protection
Note on the protection of sensitive personal information: The information you voluntarily share or even publicly share when using our services may involve your or others’ personal information or even personal sensitive information. Please consider more carefully whether to share or even publicly share relevant information when using our services. We will do our best to ensure the security of any information you send to us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility. Your account has security protection function, please keep your account and password information properly. We will use security measures such as backing up to other servers and encrypting user passwords to ensure that your information is not lost, abused or altered. Despite the aforementioned security measures, but at the same time, please understand that there is no "perfect security measure" on the information network。 
Information disclosure reminder and password leakage processing: Please note that the Internet is not an absolutely secure environment. We will try our best to ensure the security of any information you send to us. Please properly protect your personal information. Only provide it to others when necessary. If you find that your personal information has been leaked, especially your account and password have been leaked, please contact our customer service immediately. So that we can take corresponding measures。 
( E)Information security incident handling
In the unfortunate event of a personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions that you can independently prevent and reduce risks, Remedies for you, etc. We will inform you of the incident-related situation by email, letter, telephone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will adopt a reasonable and effective way to publish an announcement. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities。 
(F)How do we save your personal information
Storage location: The company will comply with laws and regulations. The personal information collected and generated in the course of domestic operations is stored in the People's Republic of China, and such information will not be transmitted overseas. If the company needs to transmit overseas due to business development needs, it will be clearly notified and your consent will be obtained。 
Storage period: We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only retain your personal information for the shortest period required to achieve the purpose of the policy, unless you agree to extend the retention period or are permitted by law. After the retention period is exceeded, we will delete your personal information or take technical measures for anonymization, unless otherwise provided by laws and regulations。 

E、Your rights
1. After you complete your account registration and conduct reasonable and necessary identity verification, you can view, modify, and delete the personal information you submit. Under normal circumstances, you can browse, modify, and delete the information submitted by yourself at any time, but for security and identification considerations, certain initial registration information and verification information provided during registration are not included in the list of modifications。 
2. We always put the protection of user information in the first place, and you have the right to update or correct your information independently. Before you update and correct your information, in order to protect the security of your account and ensure that this update and correction is your own operation, we will first verify your identity, and then update and correct the information。 
3. If you do not want some of your information to be obtained by us, you can prevent us from obtaining your information by turning off the corresponding part of the function. After turning off some of the functions, we will not be able to provide you with the corresponding service。
4. We respect the user's usage habits. If you decide not to use our products and services anymore, you can contact the official customer service staff to request cancellation of your account. Before canceling your account, in order to protect the security of your account and to ensure that this account cancellation is your own operation, we will verify your personal identity, security status, commonly used equipment and other information. Special reminder ,Your account cancellation is irreversible. Once you cancel your account, we will immediately delete or anonymize all information about your account. We guarantee that this information will not be leaked, and at the same time, you will not be able to obtain services through a cancelled account 
5. Access to the privacy policy: We will prompt you of this privacy policy when you register for an account for the first time and you will make your own decision to agree to it. In addition, you can log in to your personal account in the mobile application to view this privacy policy at any time The entire contents of. If we terminate the service or operation, we will notify you at least 30 days in advance, and delete or anonymize your personal information after terminating the service or operation。 

F、Protection of minors
We value the protection of the personal information of minors. If you are a minor under 18 years of age. Before you use the word document form editing related services. You should read and agree to this privacy policy together under the supervision and guidance of your parents or other guardians, and use our services or provide us with information with the consent of your guardian。 
In the case of collecting personal information of minors by using our products or services with the consent of their parents or guardians, we will only use, share, or transfer them when permitted by laws and regulations, the parents or guardians have expressly agreed to, or are necessary to protect minors Or disclose this information. If we discover that the personal information of minors has been collected without prior verifiable parental consent, we will try to delete the relevant information as soon as possible。

G、How to update this policy
(1) The company may revise this privacy policy in due course. Without your explicit consent, we will not reduce your rights in accordance with this privacy policy。
(2) After the privacy policy is updated. The company will show you the changed privacy policy in the form of push notifications and pop-ups when you log in and update the version. So that you can keep abreast of the new version of this privacy policy. If you continue to use our services. Indicates that you agree to accept the content of this revised policy。 
(3) For major changes, we will also provide more noticeable notifications (we will explain the specific changes to the privacy policy by including but not limited to text messages, private messages, and special prompts on the login page with pop-up windows). We will also archive the old version of this policy for your review. The major changes referred to in this privacy policy include but are not limited to: 
1. Significant changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc
2. Significant changes have taken place in our ownership structure and organizational structure. Such as all changes caused by business adjustments, bankruptcy mergers, etc.;
3. The main objects of personal information sharing, transfer or public disclosure have changed;
4. Your right to participate in the processing of personal information and how to exercise it has undergone major changes;
5. When the department responsible for handling personal information security, contact information and complaint channels change;
6. When the personal information security impact assessment report shows that there is a high risk.

H、Scope of application
This privacy policy applies to all services provided by Bayesian LTD. and its affiliates, including the "word document form editing" client, website, etc., and does not apply to separate privacy policies that are not included in this privacy Third-party products or services of the right policy。
1. Other third-party products or services, which may include products or websites and advertising content shown to you in personalized recommendations or other products or websites linked to in the "Word Document Form Editing" service;
2. Other third parties who advertise for the "Office File Viewer" service.
Your use of these third-party services (including any personal information you provide to these third parties) will be governed by the terms of service and privacy policies of these third parties (not this privacy policy). Please read the third party's terms carefully for specific provisions . Please properly protect your personal information and provide it to third parties only when necessary. 
The "word document form editing" and related services described in this privacy policy may vary according to factors such as the phone model, system version, and software application version you are using. The final products and services are subject to the "word document table editing" software and related services you use。 
If you have any questions, comments or suggestions about the content of this privacy policy, you can log in to the "Feedback" page in the "Office File Viewer" client or send an email to chenfeng@palmmob.com to contact us。

I、 How to contact us
If you have any questions, comments or suggestions about this privacy policy. You can contact us through official announcements. We will review the issues involved as soon as possible and respond promptly after verifying your user identity. Under normal circumstances, we will respond to your request within thirty days。
Release Date: 2021.9.1
Update date: 2021.9.18