《Cat Fill Light》Privacy Policy
Update Date: November 14th, 2024Effective date: November 14th, 2024
WIISOFT pay great attention to protect users personal information and privacy, we know the importance of personal information to you, and Corresponding security measures will be taken to protect your personal information in accordance with legal regulatory requirements and the industry's mature safety standards. We hope to clearly introduce you through this Privacy Policy When we call our products / services, how do we handle your personal information, and how we protect this information.
[Special Tips] Please read and fully understand this Privacy Policy before using the products / services we provide, and fully understand the fonts. Once you use or continue to use our products / services, you agree that we will handle your information in accordance with this Privacy Policy.
This Privacy Policy applies only to your personal information we have collected, as well as the services and features provided to you. Do not apply to any third party to collect your personal information, and any third party provided by any third party or Third-party information use rules.
I. The information we collect
Personal information refers to various information that can be used alone or other information to identify or reflect the activity of specific natural people. We will collect and use the following objects described in this policy. Your personal information:
1. Normal operation of the product
• When you use the relevant services of our products, in order to ensure the normal operation of the software and services, you may need to enable some sensitive permissions:
• Access phone status permissions. Collect your hardware serial number, operating system version number, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information), network device hardware address (MAC), IP address, software version number, network access method and type, and operation log information (such as service failure information) , collect this information to confirm your unique identity, facilitate our ability to provide you with consistent services, and help us understand the problems you encounter during the use process, and optimize our products.
• Access network status permissions. Used for software version upgrade detection and the normal use of third-party SDKs (see the specific list below).
• Read/write storage permission. Used to read and save album photos.
• Camera permission. Used to take photos.
2. Optimize products, services and users
• To help us better understand your usage, solve the problem you have appeared in the product. We may record network log information, and frequency, crash data, overall installation, usage,and use software and related services. Performance data and other information.
3. Carry out internal data analysis and research, third-party SDK statistical services, improve our products or services
• We collect data is based on your interaction with our choices, including your privacy settings and products and features you are using. Here are the SDK we are using, where the SDK code contains multiple Permissions, but we only allow SDK to use to read device ID permissions, view WLAN connections, switch network connections, read and write external memory cards, read mobile phone status and identity, access coarse position and precision positioning, retrieving running Application, read the list of installed applications.
• In addition, third parties also collect your device's device version, system version, generate ID, mobile phone style, mobile name, ICCID, BSSID, MAC address, IMSI, IMEI, OAID, AndroidID, IDFA, GUID, OpenUDID, We will allow third-party SDK to collect your personal information after you agree to the Privacy Policy. The permissions included in the
sdk (non-use permissions), and the information contained below:
SDK Name: Umeng statistics
Company entity: Beijing Youlang Network Technology Co., Ltd.
Contains permission code: View WLAN connection, use Bluetooth, get a rough location, get accurate position, read external memory card, read mobile phone status and identity, write external memory card, search Working application
Collect information scope: device version, system version, generate id, mobile phone style, mobile phone model,ANDROID ID, ICCID, BSSID, MAC address, IMSI, IMEI
Collection information purposes: for App User Data Statistics
Collect information mode: Adding data encryption technology to encrypt data, using de-dismissal display of information to identify anonymization
Privacy Policy Links: https://www.umeng.com/policy
4. Security guarantees
• To improve the security of our services, more accurately prevent phishing website fraud and Trojan virus, we may use or integrate your personal information and our related parties, partners get your authorization or according to law Shared information, comprehensively determine your account and trading risks based on your usage habits and common software information, including verification identity, prevention, discovery, survey possible fraud, network virus, cyber attacks and other security risks and violations of us or Related parties agreements, policies or rules, to protect you, other users, us or related parties, and record some link we think is risky (URL).
5. Other uses
• We use information to be used for other purposes that do not already have in this policy, or will request your authorization to consent alone when specific purpose collection information is used for other purposes.
6. Please know, in the following circumstances, we collect and use personal information without the need for your authorization.
• In addition, in accordance with relevant laws, regulations and national standards, we may collect, using your related personal information without soliciting your authorization agrees:
• Directly related to national security, national defense safety; directly related to public security, public health, public informed;
• Directly related to crime investigations, prosecution, trial and judgment;
• It is difficult to agree to maintain your or other personal life, property, reputation, etc., but it is hard to agree;
• The personal information collected is open to the public itself;
• Collect personal information from the information of legitimate disclosure, such as legal news reports, government information disclosure and other channels;
• For maintenance of the security and stable operation of the supplied product or service, such as discovering, disposing of product or service;
• To carry out legitimate news reports;
• For public interest to carry out statistics or academic research, it provides the results of personal information contained in the results in the results of the results of the results or the results of the results;
• Other situations stipulated in laws and regulations.
II. How we share, transfer, disclose your personal information
1. Share personal information
We will not transfer your personal information to any company, organize and individual, except:
• Transfer in the case of obtaining clear consent: After obtaining your clear consent, we will transfer your personal information to other parties;
• When involving merging, acquisition or bankruptcy, if we involve personal information transfer, we will continue to be bound by this privacy policy in requesting new companies, otherwise we will ask the company. The organization will re-seek you to agree.
• Based on the statutory situation: according to the provisions of laws and regulations, the prosecution dispute resolves the need, or the requirements of administrative, judicial, etc., according to law,
2. Transfer personal information
We will not transfer your personal information to any company, organize and individual, except:
• Transfer in the case of obtaining clear consent: After obtaining your clear consent, we will transfer your personal information to other parties.
• When involving merging, acquisition or bankruptcy, if we involve personal information transfer, we will continue to be bound by this privacy policy in requesting new companies, otherwise we will ask the company. The organization will re-seek you to agree.
3. Publicly disclosed personal information
We only disclose your personal information under the following conditions and take the safety protection measures in line with industry standards:
• According to your needs, disclose the personal information you specified under the disclosure method you specifically agreed;
• According to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements must provide your personal information, we may disclose your personal information based on the required personal information type and disclosure. Under the premise of laws and regulations, when we receive the requested information of the above disclosure, we will require legal documents, such as subpoena or investigations.
III. How do we manage, view or delete your personal information
We respect your rights to your personal information. We guarantee your access, correction, delete such as personal information. You can also contact us in accordance with the notification guidelines. Your access, correction and delete personal information The scope and methods will depend on the specific services you use.
1, access, and correct your personal information In addition to the provisions of laws and regulations, you have the right to exercise access to your personal data. When you find that we have any personal information or other modifications, you have the right to pass privacy Policy Contact us to get in contact with us, asking us to correct. You exercise data access and correction methods include, but is not limited to: Your account information. If you want to access or modify the account information in the only technology product or service, including avatar, nickname, gender, birthday, regional information, mobile phone number, ID number and other real name verification information, Account password, etc. You can operate by accessing the only tour technology products or services.
2, delete your personal information
In the following cases, you can ask us to remove personal information, please contact us by contact us through this Privacy Policy:
If we deal with personal information behavior violations;
If we collect, use your personal information, but did not get your consent;
If we handle personal information violations with your agreement;
If you no longer use our products or services, or you log out your account;
When you or we assisted you to delete the relevant information, because of the applicable legal and security technology, we may not immediately return to the corresponding information in the system, but we will take reasonable measures to store relevant information security, until Backup can be cleared or achieved anonymous.
IV. Personal information security protection
• We strive to provide security for users information security to prevent leaks, loss, improper use, unauthorized access and disclosure. We use multi-faceted security measures to ensure that users personal information protection is reasonable. Safe level, including technical protection, management system control, security system guarantees, etc. We use industry-leading technical protection measures. The techniques we use include, but are not limited to, firewalls, encryption (such as SSL), demonstration Or anonymization processing, access control measures, etc. In addition, we will continue to strengthen the security capabilities of the software installed on your device. For example, we will complete some information encryption in your device to consolidate safe transfer; we will understand Your device installed application information and running process information to prevent malicious programs such as viruses, Trojans.
• After unfortunate, we will immediately set up a special emergency group, start an emergency plan, prevent security incidents, and inform you in time in accordance with laws and regulations: basic situation and possible impact of safety incidents We have taken or will take place to prevent and reduce risk recommendations. We will inform you of the event-related situations in time. When informing the personal information entity one by one, we will take reasonable and effective ways. At the same time, we will actively report the disposition of personal information security incidents in accordance with the requirements of the regulatory authorities.
• Information storage location, time limit and transfer
Storage information Location, (main) compliance with laws and regulations, the personal information collected in the territory is stored in the territory.
• Storage information
(main) only reserves the user's personal information for the implementation of the purpose in the shortest period of law. But in the following circumstances, we may change the storage time of personal information due to the need to meet legal requirements:
• 1) is relevant for complying with applicable laws and regulations;
• 2) is the provisions of complying with the court decision, ruling or other legal proceedings;
• 3) is the requirements of complying with relevant government agencies or statuto authorization organizations;
• 4) is directly related to public security, public health, public infoliration, etc.
• 5) To implement relevant service protocols or this policy, maintain social public interests, to protect our customers, our or related companies, other users or employees, personal property safety or other legitimate rights and interests
• 6) When this product or service stops operation, we will notify the user, for example, push notifications, announcements, etc., and delete or anonymize the personal information collected or anonymized within a reasonable period.
V. Personal information protection of minors
We attach great importance to the protection of personal information of minors. Our website and services are mainly for unacuished. If you are minors, it is recommended that you ask your parents or guardians to carefully read this privacy policy, and Use our services or provide information to us if your parents or guardians agrees.
• We will only use our products or services to use our products or services to use our products or services, we will only use the laws and regulations to express the use of the parents or guardians to expressly agree or protect the minors necessary. , Sharing, transfer or disclosing this information.
• If we find that he collects personal information of minors in the case where you have proven parents or statutory guardians, they will try to delete relevant data as soon as possible.
VI. Your right
We attach great importance to your management of personal information, and do our best to protect your personal information, visit, modify, delete, withdrawal, authorization, logout account, complaint report, and setup privacy functions so that you have the ability Promote your privacy and security.
• Change your authorization consent or revocation authorization
• change or withdraw sensitive information rights
You can delete information in the only home product, change the privacy settings, and turn off the location of the geographic location in the device itself, and the external storage information, etc.
• Refuse to receive push and marketing information
You can turn off the Push Notification rejection message, Advertising Settings opens or closes the programming settings, by replying to TD , etc. We send your marketing SMS.
• complaint report
You can complain or report according to our publicity system. If you think your personal information rights may be violated, or discover clues to violate personal information rights (for example, we think we collect your personal information violation of legal provisions or both sides Conventions), you can contact us by clicking on user feedback. We will feed back your complaints and reports after we check.
• Access Privacy Policy
You can view all the contents of this Privacy Policy on the home, or in the App Settings page.
• Stop operation to tell you
As us to stop operation, we will stop collecting your personal information, will stop the operations in the form of delivery or announcement in the form one by one, and delete or anonymize your personal information held. Processing.
VII. Notification and revision
• To provide you with better service, our business will change from time to time, this privacy policy will also adjust. We will not cut your rights under this Privacy Policy without you clearly. We will By issuing an update version on our website, you can remind you to update your related content, please visit us in time to learn about the latest privacy policy. In the foregoing, if you continue to use our services, Agree to accept the revised policy and constraint.
VIII. How to contact us
• If you have any complaint reporting requirements for our personal information processing behavior, you can pass
• Website http://www.wiisoft.cn
• Email (Linweijie@wiisoft.cn)
Contact us and fully describe, we will answer your request and try to solve your request within 10 days of your identity.
• Company Name: WIISOFT Technology Co., Ltd.
• Company Address: 22nd Floor, Fortune Center, Fengxi District, Chaozhou City, Guangdong Province, China
[Special Tips] Please read and fully understand this Privacy Policy before using the products / services we provide, and fully understand the fonts. Once you use or continue to use our products / services, you agree that we will handle your information in accordance with this Privacy Policy.
This Privacy Policy applies only to your personal information we have collected, as well as the services and features provided to you. Do not apply to any third party to collect your personal information, and any third party provided by any third party or Third-party information use rules.
Personal information refers to various information that can be used alone or other information to identify or reflect the activity of specific natural people. We will collect and use the following objects described in this policy. Your personal information:
1. Normal operation of the product
• When you use the relevant services of our products, in order to ensure the normal operation of the software and services, you may need to enable some sensitive permissions:
• Access phone status permissions. Collect your hardware serial number, operating system version number, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information), network device hardware address (MAC), IP address, software version number, network access method and type, and operation log information (such as service failure information) , collect this information to confirm your unique identity, facilitate our ability to provide you with consistent services, and help us understand the problems you encounter during the use process, and optimize our products.
• Access network status permissions. Used for software version upgrade detection and the normal use of third-party SDKs (see the specific list below).
• Read/write storage permission. Used to read and save album photos.
• Camera permission. Used to take photos.
2. Optimize products, services and users
• To help us better understand your usage, solve the problem you have appeared in the product. We may record network log information, and frequency, crash data, overall installation, usage,and use software and related services. Performance data and other information.
3. Carry out internal data analysis and research, third-party SDK statistical services, improve our products or services
• We collect data is based on your interaction with our choices, including your privacy settings and products and features you are using. Here are the SDK we are using, where the SDK code contains multiple Permissions, but we only allow SDK to use to read device ID permissions, view WLAN connections, switch network connections, read and write external memory cards, read mobile phone status and identity, access coarse position and precision positioning, retrieving running Application, read the list of installed applications.
• In addition, third parties also collect your device's device version, system version, generate ID, mobile phone style, mobile name, ICCID, BSSID, MAC address, IMSI, IMEI, OAID, AndroidID, IDFA, GUID, OpenUDID, We will allow third-party SDK to collect your personal information after you agree to the Privacy Policy. The permissions included in the
sdk (non-use permissions), and the information contained below:
SDK Name: Umeng statistics
Company entity: Beijing Youlang Network Technology Co., Ltd.
Contains permission code: View WLAN connection, use Bluetooth, get a rough location, get accurate position, read external memory card, read mobile phone status and identity, write external memory card, search Working application
Collect information scope: device version, system version, generate id, mobile phone style, mobile phone model,ANDROID ID, ICCID, BSSID, MAC address, IMSI, IMEI
Collection information purposes: for App User Data Statistics
Collect information mode: Adding data encryption technology to encrypt data, using de-dismissal display of information to identify anonymization
Privacy Policy Links: https://www.umeng.com/policy
4. Security guarantees
• To improve the security of our services, more accurately prevent phishing website fraud and Trojan virus, we may use or integrate your personal information and our related parties, partners get your authorization or according to law Shared information, comprehensively determine your account and trading risks based on your usage habits and common software information, including verification identity, prevention, discovery, survey possible fraud, network virus, cyber attacks and other security risks and violations of us or Related parties agreements, policies or rules, to protect you, other users, us or related parties, and record some link we think is risky (URL).
5. Other uses
• We use information to be used for other purposes that do not already have in this policy, or will request your authorization to consent alone when specific purpose collection information is used for other purposes.
6. Please know, in the following circumstances, we collect and use personal information without the need for your authorization.
• In addition, in accordance with relevant laws, regulations and national standards, we may collect, using your related personal information without soliciting your authorization agrees:
• Directly related to national security, national defense safety; directly related to public security, public health, public informed;
• Directly related to crime investigations, prosecution, trial and judgment;
• It is difficult to agree to maintain your or other personal life, property, reputation, etc., but it is hard to agree;
• The personal information collected is open to the public itself;
• Collect personal information from the information of legitimate disclosure, such as legal news reports, government information disclosure and other channels;
• For maintenance of the security and stable operation of the supplied product or service, such as discovering, disposing of product or service;
• To carry out legitimate news reports;
• For public interest to carry out statistics or academic research, it provides the results of personal information contained in the results in the results of the results of the results or the results of the results;
• Other situations stipulated in laws and regulations.
1. Share personal information
We will not transfer your personal information to any company, organize and individual, except:
• Transfer in the case of obtaining clear consent: After obtaining your clear consent, we will transfer your personal information to other parties;
• When involving merging, acquisition or bankruptcy, if we involve personal information transfer, we will continue to be bound by this privacy policy in requesting new companies, otherwise we will ask the company. The organization will re-seek you to agree.
• Based on the statutory situation: according to the provisions of laws and regulations, the prosecution dispute resolves the need, or the requirements of administrative, judicial, etc., according to law,
2. Transfer personal information
We will not transfer your personal information to any company, organize and individual, except:
• Transfer in the case of obtaining clear consent: After obtaining your clear consent, we will transfer your personal information to other parties.
• When involving merging, acquisition or bankruptcy, if we involve personal information transfer, we will continue to be bound by this privacy policy in requesting new companies, otherwise we will ask the company. The organization will re-seek you to agree.
3. Publicly disclosed personal information
We only disclose your personal information under the following conditions and take the safety protection measures in line with industry standards:
• According to your needs, disclose the personal information you specified under the disclosure method you specifically agreed;
• According to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements must provide your personal information, we may disclose your personal information based on the required personal information type and disclosure. Under the premise of laws and regulations, when we receive the requested information of the above disclosure, we will require legal documents, such as subpoena or investigations.
We respect your rights to your personal information. We guarantee your access, correction, delete such as personal information. You can also contact us in accordance with the notification guidelines. Your access, correction and delete personal information The scope and methods will depend on the specific services you use.
1, access, and correct your personal information In addition to the provisions of laws and regulations, you have the right to exercise access to your personal data. When you find that we have any personal information or other modifications, you have the right to pass privacy Policy Contact us to get in contact with us, asking us to correct. You exercise data access and correction methods include, but is not limited to: Your account information. If you want to access or modify the account information in the only technology product or service, including avatar, nickname, gender, birthday, regional information, mobile phone number, ID number and other real name verification information, Account password, etc. You can operate by accessing the only tour technology products or services.
2, delete your personal information
In the following cases, you can ask us to remove personal information, please contact us by contact us through this Privacy Policy:
If we deal with personal information behavior violations;
If we collect, use your personal information, but did not get your consent;
If we handle personal information violations with your agreement;
If you no longer use our products or services, or you log out your account;
When you or we assisted you to delete the relevant information, because of the applicable legal and security technology, we may not immediately return to the corresponding information in the system, but we will take reasonable measures to store relevant information security, until Backup can be cleared or achieved anonymous.
• We strive to provide security for users information security to prevent leaks, loss, improper use, unauthorized access and disclosure. We use multi-faceted security measures to ensure that users personal information protection is reasonable. Safe level, including technical protection, management system control, security system guarantees, etc. We use industry-leading technical protection measures. The techniques we use include, but are not limited to, firewalls, encryption (such as SSL), demonstration Or anonymization processing, access control measures, etc. In addition, we will continue to strengthen the security capabilities of the software installed on your device. For example, we will complete some information encryption in your device to consolidate safe transfer; we will understand Your device installed application information and running process information to prevent malicious programs such as viruses, Trojans.
• After unfortunate, we will immediately set up a special emergency group, start an emergency plan, prevent security incidents, and inform you in time in accordance with laws and regulations: basic situation and possible impact of safety incidents We have taken or will take place to prevent and reduce risk recommendations. We will inform you of the event-related situations in time. When informing the personal information entity one by one, we will take reasonable and effective ways. At the same time, we will actively report the disposition of personal information security incidents in accordance with the requirements of the regulatory authorities.
• Information storage location, time limit and transfer
Storage information Location, (main) compliance with laws and regulations, the personal information collected in the territory is stored in the territory.
• Storage information
(main) only reserves the user's personal information for the implementation of the purpose in the shortest period of law. But in the following circumstances, we may change the storage time of personal information due to the need to meet legal requirements:
• 1) is relevant for complying with applicable laws and regulations;
• 2) is the provisions of complying with the court decision, ruling or other legal proceedings;
• 3) is the requirements of complying with relevant government agencies or statuto authorization organizations;
• 4) is directly related to public security, public health, public infoliration, etc.
• 5) To implement relevant service protocols or this policy, maintain social public interests, to protect our customers, our or related companies, other users or employees, personal property safety or other legitimate rights and interests
• 6) When this product or service stops operation, we will notify the user, for example, push notifications, announcements, etc., and delete or anonymize the personal information collected or anonymized within a reasonable period.
We attach great importance to the protection of personal information of minors. Our website and services are mainly for unacuished. If you are minors, it is recommended that you ask your parents or guardians to carefully read this privacy policy, and Use our services or provide information to us if your parents or guardians agrees.
• We will only use our products or services to use our products or services to use our products or services, we will only use the laws and regulations to express the use of the parents or guardians to expressly agree or protect the minors necessary. , Sharing, transfer or disclosing this information.
• If we find that he collects personal information of minors in the case where you have proven parents or statutory guardians, they will try to delete relevant data as soon as possible.
We attach great importance to your management of personal information, and do our best to protect your personal information, visit, modify, delete, withdrawal, authorization, logout account, complaint report, and setup privacy functions so that you have the ability Promote your privacy and security.
• Change your authorization consent or revocation authorization
• change or withdraw sensitive information rights
You can delete information in the only home product, change the privacy settings, and turn off the location of the geographic location in the device itself, and the external storage information, etc.
• Refuse to receive push and marketing information
You can turn off the Push Notification rejection message, Advertising Settings opens or closes the programming settings, by replying to TD , etc. We send your marketing SMS.
• complaint report
You can complain or report according to our publicity system. If you think your personal information rights may be violated, or discover clues to violate personal information rights (for example, we think we collect your personal information violation of legal provisions or both sides Conventions), you can contact us by clicking on user feedback. We will feed back your complaints and reports after we check.
• Access Privacy Policy
You can view all the contents of this Privacy Policy on the home, or in the App Settings page.
• Stop operation to tell you
As us to stop operation, we will stop collecting your personal information, will stop the operations in the form of delivery or announcement in the form one by one, and delete or anonymize your personal information held. Processing.
• To provide you with better service, our business will change from time to time, this privacy policy will also adjust. We will not cut your rights under this Privacy Policy without you clearly. We will By issuing an update version on our website, you can remind you to update your related content, please visit us in time to learn about the latest privacy policy. In the foregoing, if you continue to use our services, Agree to accept the revised policy and constraint.
• If you have any complaint reporting requirements for our personal information processing behavior, you can pass
• Website http://www.wiisoft.cn
• Email (Linweijie@wiisoft.cn)
Contact us and fully describe, we will answer your request and try to solve your request within 10 days of your identity.
• Company Name: WIISOFT Technology Co., Ltd.
• Company Address: 22nd Floor, Fortune Center, Fengxi District, Chaozhou City, Guangdong Province, China