隐私政策
更新日期:2022年【5】月【6】日
生效日期:2022年【5】月【6】日
本服务为【深圳市和为顺网络技术有限公司】提供,公司基本信息如下:
注册地址:【深圳市南山区本丽中山园路1001号TCL高新科技园E3栋1层A单元101房】
如果您对本政策或您个人信息的相关事宜有任何问题、意见或建议,请通过发邮件marketing@ip-com.com.cn或拨打400-665-0066与我们联系。
和为顺网络技术有限公司和IP-COM 工程宝 APP、IP-COM 工程宝 云平台 (以下简称“IP-COM“) 非常重视您的个人数据和隐私。在您仔细阅读、了解并同意本政策之前,请不要向IP-COM提交任何个人数据或隐私数据。
本政策说明IP-COM针对个人数据和隐私数据的主要策略,但是一个简单的政策并无法解决有关数据处理的所有疑虑,因此IP-COM可能会另外提供客户产品或服务专用的信息作为本政策的补充,以便在基于特殊目的处理个人数据时通知客户,请您在使用IP-COM产品或服务时,注意其他形式的此类通知。
在使用IP-COM产品及服务前,请您务必仔细阅读并透彻理解本《隐私政策》,在确认充分理解并同意后方使用相关产品和服务。
1. 我们收集您的个人信息的情形
1.1 建立账户、购买、注册产品或服务
如果您在线提交申请建立账户、购买、注册我们的产品或服务,包括履行您的采购订单、交付您的产品或服务、产品启用或验证、因您的要求而进行变更、提供技术支持或授权更新等,我们可能会要求您提供相应的个人数据,例如 您的姓名、邮件地址、手机号码、收货地址、产品信息、购买时间以及支付方式以便我们完成您订单的处理、下载产品和获得服务。
1.2 升级服务
IP-COM可能收集您终端产品的系统和应用程序信息,这是为了及时通知您有可用的系统和应用程序更新。为此目的收集的信息包括设备名称、系统和应用程序版本、操作系统和浏览器版本、地区和语言设置等。IP-COM对以上信息的处理仅限于通知您有应用程序更新可用。
1.3 故障定位
当您的设备或应用程序发生异常情况,且您选择将相关信息发送给IP-COM,让IP-COM或其合作方提供故障分析服务时,IP-COM可能会收集相关信息,包括设备型号、应用程序的名称和版本、设备识别号码、错误日志等。
1.4 我们会根据您所选择使用的具体功能收集、使用相应的个人信息:
1.4.1当您为使用IP-COM产品及服务而绑定您的设备时,我们会收集您绑定的产品序列号和产品验证码。这类信息是具有唯一性的产品基本信息,是绑定产品并进一步为您提供服务而必须收集的基础信息。
1.4.2当您安装软件并使用产品及服务时,为保障您账户使用安全,我们将读取您的电话状态权限,用于接收并记录设备的国际移动设备识别码(IMEI)。请您了解,该信息可标识已绑定的终端设备,是为保障服务安全正常运行所收集的数据。您也可不授予该权限,但这可能无法识别已绑定的终端设备。
1.4.3当您使用APP扫描二维码、拍摄照片时,我们将访问您的设备相机权限,您可在开启相机权限后使用该功能进行扫码识别、拍摄照片,以及特定场景下经您授权的人脸识别等功能。请您知晓,我们仅会在您主动授权时获取此权限,并在前台为您呈现拍摄界面。
1.4.4当您从手机相册中选择带有可识别二维码的照片,我们需要获取您的相册存储权限识别获取设备类型及设备序列号以完成添加;
1.4.5当您使用基于增值服务时,我们会收集与服务目的直接相关的您的个人信息,具体服务目的、信息内容等将以服务说明或使用规则形式向您提示。这类信息是我们为您提供各类增值服务所必须收集的信息,如果您拒绝提供,可能无法正常使用相关服务。
1.4.6在你分享或接收被分享的项目情形下,我们需要在本地访问你的剪切板,读取其中包含的口令、分享码、链接,以实现跳转、分享、活动联动等功能或服务。我们仅在本地识别出剪切板内容属于跳转、分享、活动联动等指令时才会将其上传我们的服务器。除此之外,我们不会上传你剪切板的其他信息至我们的服务器。
1.4.7我们需要获取您的应用进程信息,识别应用是否处于使用状态,进行用户活跃度情况统计分析。
1.5 安全保障与运维服务
为了满足《网络安全法》等法律法规及提供服务的基本要求,保障您的账号安全与系统运行安全,我们会收集您的使用我们的产品与/或服务过程中产生的相关信息,包括:
1.5.1在您使用服务管理您所绑定的设备时,我们会自动接收并记录相关设备的信息,包括类型、型号、固件编号、地址、系统版本号及系统设置。我们依赖这些信息向您提供服务及保障设备安全运行;例如,在系统设置为允许设备自动升级时(部分设备下默认启用此设置),我们将在有升级包时自动为您安装运行,以确保您的设备与您所使用的软件始终有效适配。
1.5.2为帮助我们更好地了解软件及相关服务的运行情况,以便确保运行与提供服务的安全,我们可能记录网络日志信息,以及使用软件及相关服务的频率、崩溃数据、报错或异常服务数据、异常设备的系统运行状态、总体安装与使用情况、性能数据等信息。
1.2 以位置为基础的服务
当您要求使用某些以地理位置信息为基础的服务时,例如:IP-COM可能会收集、使用及处理您设备的精准或粗略地理位置数据,以便IP-COM向您提供上述服务,收集的信息可包括您设备的账号、类型和型号,以及您设备的实时地理位置信息。IP-COM采用匿名方式收集地理位置信息,以提供并改善以位置为基础的产品和服务。
1.3 非个人信息的收集及使用
非个人信息是指无法识别特定个人身份的信息,例如我们网站的浏览人数、网页的点击次数。IP-COM会收集这类信息,以了解用户如何使用我们的网站、产品或服务,如此IP-COM才能进行改善,以满足客户的需求。IP-COM可以自行决定是否基于任何其他目的,收集、使用、移转或披露非个人信息。
2 我们使用您的个人信息的情形
当我们需要履行在用户协议和/或服务合同下对您的义务、或我们受约束的法定义务或者经由评估我们认为对于保护我们或第三方的合法利益有必要时,我们将在取得您同意的前提下,出于本政策中描述的目的对您的个人信息进行处理。 我们将严格遵守本政策及其更新所载明的内容来使用您的个人信息。
2.1 我们会按照如下规则使用您的个人信息:
2.1.1我们会根据本政策的约定并为实现相应的产品与/或服务功能进行使用。
2.1.2我们可能会整合使用您的个人信息及/或我们以合法方式获取的与您的服务或产品使用行为有关的其他信息(下称“其他信息”),以预防、发现、调查欺诈、侵权、危害安全、非法或违反与我们或我们关联公司间协议的行为。
2.2 请您注意,您在使用我们的产品与/或服务时所提供或授权我们收集的所有个人信息,除非您删除、通过账号设置或系统设置拒绝我们收集,否则将在您使用我们的产品与/或服务期间持续授权我们使用。在您注销账号时,我们将停止使用并删除您的个人信息,法律法规另有规定的除外。
2.3 我们会对我们的产品与/或服务使用情况进行统计,并可能会与公众或第三方共享这些统计信息,以展示我们的产品与/或服务的整体使用趋势及/或形成与此有关的市场满意度调研报告、服务改善计划等研究成果。但这些统计信息不会包含您的任何身份识别信息。
2.4 当我们展示您的个人信息时,我们会采用包括内容替换、匿名处理方式对您的信息进行脱敏,以保护您的信息安全。
2.5 当我们要将您的个人信息用于本政策未载明的其它用途时,或基于特定目的收集而来的信息用于其他目的时,会通过您主动做出勾选的形式事先征求您的同意。
2.6 我们在此特别提示您注意,如信息无法单独或结合其他信息识别到您的个人身份,其不属于法律意义上您的个人信息;当您的信息可以单独或结合其他信息识别到您的个人身份时,这些信息在结合使用期间,将作为您的个人信息按照本政策处理与保护。
3 征得授权同意的例外
根据相关法律法规的规定,以下情形中收集您的个人信息无需征得您的授权同意:
(1) 与国家安全、国防安全有关的;
(2) 与公共安全、公共卫生、重大公共利益有关的;
(3) 与犯罪侦查、起诉、审判和执行等司法或行政执法有关的;
(4) 出于维护您或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;
(5) 您自行向社会公众公开的个人信息;
(6) 从合法公开披露的信息中收集个人信息的,如合法的新闻报告、政府信息公开等渠道;
(7) 根据与您签订和履行相关协议或其他书面文件所必需的;
(8) 用于维护所提供的产品及服务的安全稳定运行所必需的,例如发现、处置产品及服务的故障;
(9) 学术研究机构基于公共利益开展统计或学术研究所必要,且对外提供学术研究或描述的结果时,对结果中所包含的个人信息进行去标识化处理的;
(10) 法律法规规定的其他情形。
4. 如何披露您的个人数据
只有符合下列情况时,IP-COM才会披露您的个人数据。在下列情形之外,IP-COM绝不会将您的个人数据披露给第三方:
4.1您已明确同意:
在得到您的批准后,IP-COM才会将您的个人数据透露给其他公司;
4.2将您的个人数据披露给其他IP-COM分公司或授权合作的第三方:
IP-COM可能需要通过某些合作方为您提供某些服务,因此IP-COM需要将您的部分个人数据共享给合作方,以便丰富我们的服务以及满足您的需求,例如,当您决定在线购买IP-COM产品时,IP-COM将需要将您的个人数据提交给相关物流厂商,如此这些厂商才能将产品送达给您,或是允许我们的合作方提供其他客户服务给您。IP-COM严格禁止IP-COM分公司或授权第三方,将共享的信息用于其他目的。
4.3依法律要求,披露您的个人信息:
依法律、诉讼、司法机关或政府机关的要求,IP-COM可能会提供您的个人信息。在IP-COM涉及重组、合并或清算的情况下,您的个人数据可能也会提供给交易方。
5. 如何保留、更新、变更或检查您的个人数据
我们将在实现本隐私政策中所述目的所必需的期间内保留您的个人信息,除非法律要求或允许在更长的期间内保留这些信息。您应该对所提交的个人信息的准确性负责,IP-COM将尽到商业上合理的努力,确保您个人信息的准确性,IP-COM会根据您的要求,删除或修改信息。您可以发送邮件到ip-com@ip-com.com.cn与我们联络并提出您的要求。依据IP-COM的条款与协议,您可以随时管理您的个人信息。
6. 如何保护您的个人数据
IP-COM会采取一切合理的预防措施,我们已使用符合业界标准的安全防护措施保护您提供的个人信息,防止数据遭受未经授权访问、公开披露、使用、修改、损坏或丢失。
我们建立专门的管理制度、流程和组织以保障信息的安全:
(1)设立严格的数据使用和访问制度,采用严格的数据访问权限控制和多重身份认证技术保护个人信息,避免数据被违规使用。我们仅允许授权人员访问个人信息,并要求他们履行相应的保密义务。
(2)采取专门的数据和技术安全审计,设立日志审计和行为审计多项措施。
同时,我们还将采取其他安全保护措施:
(1)通过建立数据分类分级制度、数据安全管理规范、数据安全开发规范来管理规范个人信息的存储和使用。
(2)加强安全意识。我们还会举办安全和隐私保护培训课程,加强员工对于保护个人信息重要性的认识。
IP-COM会采取一切合理可行的措施,确保不收集无关的个人信息。我们只会在达成本政策所述目的的所需期限内保留您的个人信息,除非需要延长保留期或受到法律的允许。
我们会按照法律法规规定,将境内收集的用户个人信息存储于中国境内。我们不会向境外传输您的个人信息,除非法律有强制留存的要求。
您在使用产品或服务期间,我们将持续为您保存您的个人信息。如果您注销账号或主动删除个人信息,我们将依据《电子商务法》、《网络安全法》等法律法规规定在您注销账号或删除个人信息后一段时间内继续保存您的特定个人信息;例如,《中华人民共和国电子商务法》要求商品和服务信息、交易信息保存时间自交易完成之日起不少于三年。到期后,我们将立即删除或将其匿名化处理。
互联网环境并非百分之百安全,我们将尽力确保或担保您发送给我们的任何信息的安全性。如果我们的物理、技术或管理防护措施遭受破坏,导致信息被非授权访问、公开披露、篡改、或毁坏,导致您的合法权益受损,我们将承担相应的法律责任。
在不幸发生个人信息安全事件后,我们将按照法律法规的要求,及时向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的处置措施、您可自主防范和降低风险的建议、对您的补救措施等。我们将及时将事件相关情况以邮件、信函、电话、推送通知等方式告知您,难以逐一告知个人信息主体时,我们会采取合理、有效的方式发布公告。
同时,我们还将按照监管部门要求,主动上报个人信息安全事件的处置情况。
7. 如何处理未成年人的个人数据
如果法律有相关规定,IP-COM不会在未征得监护人同意的前提下收集未成年人的个人数据。我们只会在法律允许的范围内,或依当地法律取得监护人的同意,或是为保护未成年人而使用或披露有关未成年人的个人数据。未成年人的定义应考虑适用的法律,以及各国家和地区的文化惯例。
8. Cookie政策
为确保我们的网站正常运作,有时我们会在您的计算机或移动设备上放置小型数据文件,这类档案称为 Cookie。Cookie 是一种简易文本文件,由网站的服务器储存在您的计算机或移动设备上,且只有该服务器能检索到或读取该Cookie的内容。对于浏览器而言,每一个Cookie都是独一无二的。它包含某些匿名信息,例如唯一标识符、网站名称和一些数字和号码。它可以让网站记住诸如您的喜好或购物车内容等信息。
大部分的大型网站或互联网服务提供商都会在您访问期间(使用会话 Cookie)或再次访问(使用永续性 Cookie)时,启用该网站记住您的功能,以改善用户体验。Cookie能协助网站记住您的设定,您在计算机或移动设备上浏览网站时所使用的语言、字号及其他喜好,每次返回网站时,就不需要再次输入这些设定。如果某个网站未使用Cookie,每当您移至该网站的新网页时,就会将您视为新访问者,例如,当您输入详细数据并移至另一个网页时,该网页将无法辨识您的身份,也无法让您保持登入状态。
我们的Cookie不会用于识别您的个人身份,仅用于让您在访问时网站运作得更好和更方便。如需要,您可以控制或删除Cookie,您可以删除计算机上的所有Cookie,您也可以将大多数浏览器设置禁用Cookie。但如果这样做,每次访问我们的网站时,您可能都必须手动调整某些喜好设定。
IP-COM不会将Cookie用于本文所述之外的任何其他目的,也不会用于收集任何个人数据以满足任何其他目的。
9. 您的权利
我们将在实现本政策中所述目的所必需的期间内保留您的个人信息,除非法律要求或允许在更长的期间内保留这些信息。我们保障您对自己的个人信息行使以下权利:
9.1访问您的个人信息
您有权访问您的个人信息,法律法规规定的例外情况除外。如果您想行使数据访问权,可以通过以下方式自行访问:通过IP-COM ID登录IP-COM提供的WEB或者客户端。如果您无法通过上述链接访问这些个人信息,您可以随时与我们联络,可通过发送电子邮件至ip-com@ip-com.com.cn。
9.2更正您的个人信息
当您发现我们处理的关于您的个人信息有错误时,您有权要求我们作出更正。您可以通过“1.访问您的个人信息”中罗列的方式提出更正申请。
9.3 删除您的个人信息
在以下情形中,您可以向我们提出删除个人信息的请求:
9.3.1如果我们处理个人信息的行为违反法律法规;
9.3.2如果我们收集、使用您的个人信息,却未征得您的同意;
9.3.3如果我们处理个人信息的行为违反了与您的约定;
9.3.4如果您不再使用我们的产品与服务,或您注销了账号;
9.3.5如果我们不再为您提供产品或服务。
若我们决定响应您的删除请求,我们还将同时通知从我们获得您的个人信息的实体,要求其及时删除。除非法律法规另有规定,或这些实体获得您的独立授权。
9.4 改变授权同意的范围或撤回授权
您可以通过删除信息、关闭某项服务或功能、在软件中进行隐私设置、应用权限管理等方式改变您授权我们继续收集个人信息的范围或撤回您的授权。您也可以通过注销账号的方式,撤回我们继续收集您个人信息的全部授权。
您也需要理解,每个业务功能需要一些基本的个人信息才能得以完成,当您撤回同意或授权后,我们无法继续为您提供撤回同意或授权所对应的服务,也不再处理您相应的个人信息。但您撤回同意或授权的决定,不会影响此前基于您的授权而开展的个人信息处理。
9.5 个人信息主体注销账户
您可以通过客服或通过我们公示的方式申请注销您的账号。当您注销账号后,您将无法再以账号登录或使用我们的产品或服务。您将无法再通过此账号登录、使用前述服务,您曾获得的积分、订单、资格、优惠等视为您自行放弃,将无法继续使用。您理解并同意,我们无法协助您重新恢复前述服务。
如您在谨慎考虑后仍决定要注销您的IP-COM ID,您可以在您使用我们的产品或服务的相关功能页面注销您的账号。
您可随时通过发送电子邮件至ip-com@ip-com.com.cn,或拨打400-665-0066与我们联络注销账号事宜。
对于需要人工处理的,我们将在15个工作日内完成处理。在注销账户之后,我们将停止为您提供产品或服务,并依据您的要求,删除您的个人信息,法律法规另有规定除外。
10. 本隐私政策的更新
10.1 IP-COM可能会不定期修改、更新本政策。您可以通过访问www.ip-com.com.cn获取本协议条款的最新版本。
10.2 未经您明确同意,我们不会限制您按照本政策所应享有的权利。对于重大变更,我们会以推送通知、弹窗、发送电子邮件等形式通知您。
10.3 本政策所指的重大变更包括但不限于:
10.3.1我们的服务模式发生重大变化。如处理个人信息的目的、类型、方式等发生变化;
10.3.2我们在所有权结构、组织架构等方面发生重大变化。如业务调整、破产并购、重组等引起的所有者变更等;
10.3.3用户信息委托处理、共享、转让或公开披露的主要对象发生变化;
10.3.4您使用我们服务时权利及其行使方式发生重大变化;
10.3.5我们负责处理个人信息安全的责任部门、联络方式及投诉渠道发生变化时;
10.3.6用户信息安全影响评估报告表明存在高风险时。
11、联系我们
如果您对我们的政策有任何疑问、意见或建议,您可以发送邮件到ip-com@ip-com.com.cn与我们联络。一般情况下,我们将在十五天内回复。
附录:
本服务下,我们接入的第三方SDK名称及运营者说明公示如下:
我们会对接入第三方SDK进行严格检测,并对您及时公开说明接入SDK的最新情况。
SDK名称 | 使用目的 | 功能类型 | 涉及个人信息 | 收集信息方式 |
com.huawei.hms | 为用户提供二维码识别功能 | 二维码扫描识别 | 视频、图片、音频、文字信息、录音、设备标识符(Android ID)、网络信息、应用内设备标识符、应用基本信息、设备的硬件信息、运营商信息(运营商的名称)、系统信息(系统设置、系统属性、设备型号、操作系统)、Wi-Fi信息(Wi-Fi状态)、有关您使用本应用的信息,隐私政策链接:https://developer.huawei.com/consumer/cn/doc/development/media-guides/sdk-data-security-0000001147828303 | SDK会上报API调用结果到BI服务器。SDK使用HTTPS对数据传输进行加密。BI数据按照用户归属地上报到不同区域的站点隔离,由BI服务器进行存储和数据安全保护 |
友盟SDK | 用户日活、注册统计 | 统计分析 | 设备信息及粗略位置:IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM卡IMSI/ICCID/IP、设备信息、粗略位置、手机号码IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM卡 IMSI/ICCID/IP、用户设备型号/品牌、操作系统及系统版本号、分辨率等,隐私权政策链接:https://www.umeng.com/page/policy | 采用 SSL 协议加密及 HTTPS 传输加密技术保障安全,采取加密、去标识化等安全措施脱敏处理 |
com.amap.api(高德) | 识别用户所在区域 | 地区定位 | 位置信息(经纬度、精确位置、粗略位置)、设备信息【如IP 地址、GNSS信息、WiFi状态、WiFi参数、WiFi列表、SSID、BSSID、基站信息、信号强度的信息、蓝牙信息、传感器信息(矢量、加速度、压力)、设备信号强度信息、外部存储目录、设备标识信息(IMEI、IDFA、IDFV、Android ID、MEID、MAC地址、OAID、IMSI、ICCID、硬件序列号)、当前应用信息(应用名、应用版本号)、设备参数及系统信息(系统属性、设备型号、操作系统、运营商信息),隐私权政策链接:https://lbs.amap.com/pages/privacy | 通过去标识化、加密传输和处理的安全处理方式 |
com.aliyun.sdk.android:AliyunPlayer、com.alivc.conan:AlivcConan (阿里集成) | 产品视频播放 | 产品信息展示 | UUID、设备型号、IP地址、WIFI状态、运营商信息,阿里 SDK个人信息处理规则链接:https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud202112151438_20307.html?spm=a2c4g.11186623.0.0.659c431azJ1Kko | 使用加密技术、去标识化、匿名化处理等手段来保护用户的个人信息 |
com.tencent.mm.opensdk(微信) | 微信三方登录、分享 | 账号登录、微信分享 | 微信头像、昵称信息,openId ,微信Open SDK个人信息处理规则链接:https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8 | 使用加密技术、去标识化、匿名化处理等手段来保护用户的个人信息 |
com.google.android.gms(谷歌登录)、 com.google.android | 三方登录 | 账号登录 | 设备标识符(BSSID、SSID、IMSI、IMEI、MEID、Android ID、SIM卡序列号)、设备MAC地址、应用列表,隐私政策链接: | 使用加密技术、去标识化、匿名化处理等手段来保护用户的个人信息 |
com.facebook.android(facebook登录) | 三方登录 | 账号登录 | 设备标识、GPS位置、相机访问权限、照片和相关元数据,隐私政策链接: https://www.facebook.com/privacy/policy | 使用加密技术、去标识化、匿名化处理等手段来保护用户的个人信息 |
com.twitter.sdk.android(twitter登录) | 三方登录 | 账号登录 | 设备标识 | 使用加密技术、去标识化、匿名化处理等手段来保护用户的个人信息 |
com.elvishew:xlog | 日志打印 | 日志 | 设备标识 | API获取本机信息 |
io.realm:realm-gradle-plugin | 数据库 | 数据存储 | 设备标识 | API获取本机信息 |
com.github.bumptech.glide(Glide图片加载) | 应用内图片预览、加载 | 图片加载 | 获取本地缓存图片文件,个人信息处理链接: | 使用加密技术来确保您的数据在传输过程中保持私密性 |
cn.jzvd:jiaozivideoplayer | 用于兼容播放音频和视频 | 产品视频播放 | 获取网络信息,IP地址,设备品牌,设备型号,设备名称,操作系统版本,屏幕尺寸 | 使用加密技术来确保您的数据在传输过程中保持私密性 |
io.reactivex.rxjava2:rxjava | 用于实现异步编程 | 网络请求 | 网络信息,IP地址,设备品牌,设备型号,设备名称,官方链接: https://github.com/ReactiveX/RxJava | 使用加密技术来确保您的数据在传输过程中保持私密性 |
com.squareup.retrofit2 | 用于发送请求,下载网络文件,访问网页 | 网络请求 | 网络信息,IP地址,设备品牌,设备型号,设备名称,操作系统版本,官方链接: https://github.com/square/retrofit
| 使用加密技术来确保您的数据在传输过程中保持私密性 |
Apache相关库: org.apache.poi、org.apache.commons、 Gson(org.json)、 com.jcraft:jsch、 org.connectbot:sshlib、 | 辅助开发、数据转换、加解密工具集、文件处理 | 辅助开发 | 获取设备信息,官方链接: https://www.apache.org/、http://www.apache.org/licenses/LICENSE-2.0 | 使用加密技术来确保您的数据在传输过程中保持私密性 |
org.Chromium(Chromium SDK) | 谷歌公司提供的辅助开发工具,用于分享功能实现 | 分享项目 | 获取本地剪切板内容、设备版本、IMSI、设备应用安装列表、网络设备制造商、MAC地址、网络运营商、Wifi信息、位置信息、手机制造商、ssid、bssid、IMEI,谷歌隐私政策链接: | 使用加密技术来确保您的数据在传输过程中保持私密性 |
UI相关三方库: com.github.CymChad(列表适配器)、com.scwang.smartrefresh(下拉刷新)、 com.jakewharton(事件绑定)、 com.contrarywind:Android-PickerView(地区选择)、 com.orhanobut(弹窗)、 com.github.PhilJay(统计图)、 com.flyco.tablayout(选项卡)、 com.geyifeng.immersionbar(沉浸导航栏)、 com.github.getActivity:ToastUtils(吐司提示)、 com.airbnb.android:lottie(动画)、 com.github.lihangleo2(阴影)、 com.haibin:calendarview(日历) | 提升开发效率和用户使用体验 | 辅助开发 | 获取设备标识信息,屏幕尺寸 | API接口调用 |
官方内置Api: Android(AndroidX相关库、AndroidX Support Library、Android Support Library Compat、Android Open Source Project、kotlin相关库、JavaWriter、javax inject、org.jetbrains.kotlinx) | 利用系统内置Api快速实现版本间类库的兼容、不同版本之间的对比、线程管理、系统基础组件UI、系统生命周期、文件管理、线程、定位等基础能力 | 辅助开发 | 安卓官方开发库,官方链接: https://developer.android.google.cn/index.html https://kotlinlang.org/api/latest/jvm/stdlib/kotlin.reflect/ | 系统API |
Privacy Policy
IP-COM Networks Co., Ltd. (hereinafter referred to as "IP-COM") takes your personal data and privacy very seriously. Please carefully read, understand and agree to this Policy before you submit any of your personal or private data to IP-COM.
This Policy provides major policies of IP-COM on your personal and private data; however, it is hardly possible to eliminate all doubts about data processing with a simple policy. Therefore, IP-COM may provide additional information exclusive to certain customer products or services as a supplement to this Policy, so that customers will be informed if personal data is processed for special purposes. Please note other forms of such notifications when you use IP-COM products or services.
Please carefully read and thoroughly understand this Privacy Policy before using IP-COM products and services, and use relevant products and services only after you are sure that you have fully understood and agreed to it.
1. Our collection of your personal information
1.1 When you create an account, purchase or register a product or service
If you submit an application online to create an account or purchase or register any of our products or services, including such applications as fulfillment of your purchase orders, delivery of your products or services, product activation or verification, making of changes at your request, provision of technical support, or license renewal, we may require you to provide corresponding personal data, such as your name, email address, mobile number, delivery address, product information, purchase time, and payment method to facilitate order processing, product download and service acquisition.
1.2 When you upgrade a service
IP-COM may collect the system and application information of your client to timely inform you of any available system and application updates. Information collected for such purpose includes such items as device name, system and application version, operating system and browser version, and regional and language settings. The above information is limited to be used by IP-COM only to notify you that application updates are available.
1.3 When you locate a fault
If an exception occurs to your device or application, and you choose to send relevant information to IP-COM and require IP-COM or its partners to provide fault analysis services, IP-COM may collect such information as device model, application name and version, device ID, and error log.
1.4 We will collect and use the corresponding personal information based on the specific function you select:
1.4.1 When you bind your device for using any IP-COM products and services, we will collect the product serial number and product verification code you bound. Such information is the unique basic product information that must be collected for binding the product and further providing relevant services for you.
1.4.2 When you are installing the software and using relevant products and services, to ensure your account security, we will request permission for your phone status for receiving and recording the International Mobile Equipment Identity (IMEI) of your phone. Please understand that such information can identify the client you bound and is collected to ensure safe and normal service operation. You can choose not to grant such permission, which however, will result in the failure to identify the client you bound.
1.4.3 When you use our application to scan a QR code or take a picture, we will request permission for your device camera. After granting the camera permission, you may use this function to perform such operations as scanning a QR code, taking pictures, and performing authorized face recognition in certain scenarios. Please be aware that we will only acquire this permission when your active authorization is given, and will present you the shooting interface.
1.4.4 When you select a picture with a recognizable QR code from your phone album, we need to acquire your album/storage permissions to identify and obtain device type and device SN to complete adding;
1.4.5 When you use a value-added service, we will collect your personal information directly related to the service purpose, and will inform you of the specific service purpose and information contents with a service description or service regulation. Such information must be collected for our provision of various value-added services. If you refuse, you may not be able to use relevant services properly.
1.5 Security protection and maintenance service
To meet the basic requirements of such laws and regulations as the Cybersecurity Law and the provision of services, and protect your account and system operation security, we will collect relevant information generated during your use of our products and/or services, including:
1.5.1 When you use our services to manage the device you bound, we will automatically receive and record information of the device, including type, model, firmware number, MAC address, system version number and system settings. We, relying on such information, provide services for you and ensure the safe operation of the device. For instance, when the system is set to allow automatic device upgrades (enabled by default for some devices), we will automatically install and run the upgrade package when an upgrade package is available to ensure your device and the software you are using are always effectively matched.
1.5.2 To help us better understand the operation of the software and relevant services and ensure operation and service security, we may record web log information and such information as the frequency of using the software and relevant services, crash data, error reporting or abnormal service data, system operation status of abnormal device, overall installations and usage, and performance data.
1.6 Location-based services
When you require using services based on geographic location information, for instance, IP-COM may collect, use and process the precise or rough geographic location data of your device for provision of the said services. The collected information includes your device account, type, model, and the real-time geographic location of your device. The location information is collected anonymously to provide and improve location-based products and services.
1.7 Collection and use of non-personal information
Non-personal information refers to information that cannot identify a specific individual, including the number of visitors to our website and the number of hits on our web page. IP-COM will collect such information to know how users use our website, products or services, so that we can improve ourselves to meet customer needs. IP-COM may decide whether to collect, use, transfer or disclose non-personal information for any other purposes at its own discretion.
2 Our use of your personal information
When we need to perform our obligations to you under the user agreement and/or service contract, or the legal obligations we are bound by, or we think it is necessary to protect the legitimate interests of us or third parties through evaluation, we will, with your consent, process your personal information for the purpose described herein. We will use your personal information in strict compliance with this Policy and its updates.
2.1 We will use your personal information according to the following rules:
2.1.1 We will use it in accordance with the provisions of this Policy and to realize the corresponding product and/or service functions.
2.1.2 We may integrate and use your personal information and/or other information legally obtained by us related to the use of your services or products (hereinafter referred to as "Other Information") to prevent, detect and investigate frauds, infringements, security hazards, and illegal acts or acts breaching agreements with us or our affiliates.
2.2 Please note that all personal information you provide or authorize us to collect when you are using our products and/or services will continue to be authorized to use by us during your use of our products and/or services unless you delete or refuse our collection through account settings or system settings. When you close your account, we will stop using and delete your personal information, unless otherwise stipulated by laws and regulations.
2.3 We will make statistics on the use of our products and/or services, and may share these statistics with the public or third parties to show the overall use trend of our products and/or services and/or form relevant market satisfaction research reports, service improvement plans and other research results. However, these statistics will not contain any of your identification information.
2.4 When we display your personal information, we will desensitize your information by including content replacement and anonymous processing to protect your information security.
2.5 If we want to use your personal information for other purposes not specified in this Policy, or the information collected for specific purposes for other purposes, we will ask for your consent in advance by presenting you the checking option for you to choose on your own initiative.
2.6 We hereby remind you that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; if your personal identity can be identified by your information alone or in combination with other information, the information will be treated and protected as your personal information in accordance with this Policy during its combined use.
3. Exceptions with authorized consent
According to relevant laws and regulations, your authorization and consent are not required for collection of your personal information under the following circumstances:
(1) related to national security and national defense security;
(2) related to public safety, public health and major public interests;
(3) related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and execution;
(4) for the purpose of safeguarding the life, property and other major legitimate rights and interests of yours or other individuals, but is difficult to obtain your consent;
(5) personal information disclosed to the public by yourself;
(6) personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(7) necessary according to agreements signed with you and performance of relevant agreements or other written documents;
(8) necessary for maintaining the safe and stable operation of the provided products and services, such as finding and handling the faults of products and services;
(9) personal information necessary for carrying out statistics or academic research by academic research institutions based on the public interest and is de-identified in the results of academic research or description provided to the outside world;
(10) other circumstances stipulated by laws and regulations.
4. How we disclose your personal data
IP-COM will disclose your personal data only if the following conditions are met. IP-COM will never disclose your personal data to a third party unless:
4.1 You have expressly agreed:
Only after your approval, IP-COM will disclose your personal data to other companies;
4.2 Disclose your personal data to other IP-COM branches or authorized third parties:
IP-COM may need to provide you with some services with the assistance of some partners, so IP-COM needs to share some of your personal data with the partners to enrich our services and meet your needs. For instance, when you decide to buy IP-COM products online, IP-COM will need to submit your personal data to relevant logistics manufacturers, so that these manufacturers can deliver the products to you, or allow our partners to provide other customer services to you. IP-COM strictly prohibits IP-COM branches or authorized third parties from using the shared information for other purposes.
4.3 Disclose your personal information as required by law:
At the request of law, litigation, judicial or government authorities, IP-COM may provide your personal information. If IP-COM involves reorganization, merger or liquidation, your personal data may also be provided to the counterparty.
5. How we keep, update, change or check your personal data
We will keep your personal information for the period necessary to achieve the purposes described in this Privacy Policy, unless required or permitted by law to keep such information for a longer period of time. You should be responsible for the accuracy of the personal information submitted and IP-COM will make commercially reasonable efforts to ensure the accuracy of your personal information. IP-COM will delete or change the information according to your requirements. You can send emails to ip-com@ip-com.com.cn to contact us and put forward your requirements. According to the terms and agreement of IP-COM, you can manage your personal information at any time.
6. How we protect your personal data
IP-COM will take all reasonable precautions. We have used security measures in line with industry standards to protect the personal information you provided from unauthorized access, public disclosure, use, change, damage or loss.
We have established special management systems, processes and organizations to ensure the security of information:
(1) Establish a strict data use and access system and adopt strict data access permission control and multiple identity authentication technology to protect personal information and avoid illegal use of data. We only allow authorized personnel to access personal information and require them to perform corresponding confidentiality obligations.
(2) Take special data and technical security audit, and set up log audit and behavior audit.
At the same time, we will also take other security measures:
(1) Establish data classification and grading system, data security management specification, and data security development specification to manage and standardize the storage and use of personal information.
(2) Strengthen safety awareness. We will also hold security and privacy training courses to enhance the awareness of employees of the importance of protecting personal information.
IP-COM will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only keep your personal information for the period required to achieve the purpose stated in the cost policy, unless the retention period needs to be extended or permitted by law.
We will store in China the personal information of users collected in China in accordance with laws and regulations. We will not transmit your personal information abroad unless there is a mandatory retention requirement by law.
We will keep your personal information for you during your use of products or services. If you close your account or actively delete your personal information, we will continue to save your specific personal information for a period of time after you closed your account or deleted your personal information in accordance with laws and regulations such as the Electronic commerce law and the Cybersecurity Law; For instance, the Electronic commerce law of the People's Republic of China requires that the storage time of commodity and service information and transaction information shall not be less than three years from the date of completion of the transaction. When that date arrives, we will delete the information immediately or anonymize it.
The internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technical or management protection measures are damaged and result in unauthorized access, public disclosure, tampering or destruction of information, and damage to your legitimate rights and interests as a result, we will bear corresponding legal responsibilities.
If a personal information security incident happened unfortunately, we will, in accordance with the requirements of laws and regulations, timely inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can take to independently prevent and reduce risks, and the remedial measures for you. We will timely inform you of the relevant information of the event by such means as email, letter, telephone, and notification. If it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to make an announcement.
At the same time, we will, in accordance with the requirements of regulatory authorities, actively report the disposal of personal information security incidents.
7. How we process personal data of minors
If the law has relevant provisions, IP-COM will not collect personal data of minors without the consent of the guardian. We will only, to the extent permitted by law, or obtain the consent of the guardian in accordance with local laws, or for the protection of minors, use or disclose personal data about minors. The definition of minors should take into account the applicable laws and the cultural practices of various countries and regions.
8. Cookie policy
To ensure the normal operation of our website, sometimes we will place small data files on your computer or mobile device, which are called cookies. A cookie is a simple text file stored on your computer or mobile device by the server of the website and its contents can only be retrieved or read by the server. Each cookie is unique to the browser. It contains some anonymous information, such as unique identifiers, website names, and some digits and numbers. It allows websites to remember information such as your preferences or shopping cart content.
Most large-scale websites or internet service providers will enable the website to remember you during your visit (using session cookies) or revisit (using persistent cookies) to improve user experience. Cookies can help websites remember your settings such as language, font size and other preferences you used when browsing websites on your computer or mobile devices, so that you will not need to re-configure such settings every time you return to the websites. If a website does not use cookies, then every time you enter a new web page of the website, you will be deemed as a new visitor. For instance, when you enter the detailed data and move to another web page, the web page will fail to identify you or to keep you logged in.
Our cookies will not be used to identify your identity, but only to make the website work better and more conveniently when you visit. If necessary, you can control or delete cookies, or you can delete all cookies on your computer, or disable cookies in most browsers. However, if you do, you may have to manually adjust some preferences every time you visit our website.
IP-COM will not use cookies for any purpose other than those described herein, nor will they be used to collect any personal data for any other purpose.
9. Your rights
We will keep your personal information for the period necessary to achieve the purposes described in this Policy, unless required or permitted by law to keep such information for a longer period of time. We guarantee that you exercise the following rights to your personal information:
9.1 Access to your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise the data access right, you can follow these ways by yourself: log in to the web UI or application provided by IP-COM using IP-COM ID. If you fail to access the personal information through the above channels, you can contact us at any time by sending emails to ip-com@ip-com.com.cn.
9.2 Correction of your personal information
If you find that there are errors in your personal information processed by us, you have the right to ask us to make corrections. You can apply for correction using the methods listed in "1. Access to your personal information".
9.3 Deletion of your personal information
You can request us to delete your personal information in the following cases: 9.3.1 if our handling of personal information violates laws and regulations;
9.3.2 if we collect and use your personal information without your consent;
9.3.3 if our handling of personal information violates the agreement with you;
9.3.4 if you no longer use our products or services, or you closed your account;
9.3.5 if we no longer provide products or services for you.
If we decide to respond to your deletion request, we will also notify the entities that obtain your personal information from us and ask them to delete it in time unless otherwise provided by laws and regulations or these entities have obtained your independent authorization.
9.4 Change of the scope of authorization consent or authorization withdrawal
You can change the scope of personal information you authorized us to continue to collect or withdraw your authorization by such means as deleting information, closing a service or function, setting privacy in the software, or applying permission management. You can also withdraw all your authorization to our continuing to collect your personal information by closing your account.
You also need to understand that each business function needs some basic personal information to be completed. When you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous personal information processing based on your authorization.
9.5 Closing of personal information subject account
You can apply for closing of your account through customer service or through means we publicly announced. After you close your account, you will no longer be able to log in or use our products or services with your account. You will no longer be able to log in or use the above services using this account. The points, orders, qualifications and discounts you have obtained will be deemed to be abandoned by you and you will not be able to continue to use them. You understand and agree that we cannot assist you in resuming the above services.
If you decide to close your IP-COM ID after careful consideration, you can close your account on the relevant function page of our products or services you are using.
You can email to ip-com@ip-com.com.cn at any time or call 400-665-0066 to contact us for account closing.
For affairs requiring manual processing, we will complete the processing within 15 working days. After account closing, we will stop providing you with products or services and delete your personal information according to your requirements, unless otherwise stipulated by laws and regulations.
10. Update of this Privacy Policy
10.1 IP-COM may modify and update this policy from time to time. You can obtain the latest version of the terms of this agreement by visiting www.ip-com.com.cn.
10.2 Without your express consent, we will not limit your rights under this Policy. For major changes, we will notify you in such forms as notification, pop-up window, and email.
10.3 Major changes referred to in this Policy include but are not limited to:
10.3.1 Major changes in our service mode, such as the purpose, type and method of processing personal information;
10.3.2 Major changes in our ownership structure and organizational structure, such as owner changes caused by such factors as business adjustment, bankruptcy, M & A, and reorganization;
10.3.3 Changes in main objects of user information entrusted processing, sharing, transfer or public disclosure;
10.3.4 Major changes in your rights and the way you exercise them during your use of our services;
10.3.5 Changes in the responsible department, contact information and complaint channel for handling personal information security;
10.3.6 High risk indicated by the user information security impact assessment report.
11. Contact us
If you have any questions, comments or suggestions about our policy, you can send emails to ip-com@ip-com.com.cn to contact us. In most cases, we will reply within 15 days.
Appendix:
Under this service, the names of the third-party SDKs we access and the description of the operator are publicized as follows:
We will strictly detect the accessed third-party SDKs and publicly explain the latest information of the accessed SDKs to you in a timely manner.
SDK Name |
Intended Use |
Function Type |
Involved Personal Information |
Storage of Collected Information |
com.huawei.hms |
Provision of QR code recognition for users |
QR code scanning recognition |
Operator logo, network type, country code, device model, Android version number, device type, times of scanning, decoding time, code format |
The SDK will report the API invocation result to the BI server. The SDK encrypts the data transmitted using HTTPS. BI data will be reported to the sites in different areas for isolation according to the location of users, and will be stored and protected by the BI server. |
com.huawei.agconnect |
Assistance to com.huawei.hms in QR code recognition |
QR code scanning for recognition |
/ |
/ |