LookingCam Privacy Policy

Updated:September 20, 2023

Effective date:September 20, 2023

 

    LookingCam (hereinafter referred to as "this software") is a simple and easy-to-use picture and video editing and processing software provided by Rangu Technology Co., Ltd. (hereinafter referred to as "we"). We respect and attach great importance to the protection of users' personal privacy. In order for you to fully use our products and/or services, we will use and disclose your personal information in accordance with the provisions of this Privacy Policy. We are fully aware of the impact of personal information on importance to you and will do our best to protect the safety and security of your personal information. This Privacy Policy explains how this software will collect and use your personal information and help you understand your rights. Please read and understand this Privacy Policy carefully before using our services.

This policy will help you understand the following:
1. How we collect and use your personal information
2. How we use cookies and other similar technologies
3. How we share, transfer and publicly disclose your personal information
4. How we store and protect your personal information
5. Your rights (how you manage personal information, change the scope of authorization, and cancel your account)
6. How we protect children’s personal information
7. How your personal information is transferred globally
8. Notices and Revisions
9. Definition
10. Contact information
11. Instructions on third-party cooperation and sharing of information

We try our best to present this Privacy Policy in a clearer and easier-to-understand manner, so that we can truly convey the information we want to convey to you, and hope that you will provide us with certain information (which is likely to include your personal information) and your permission. Before we process and share certain information, we must have a clear understanding of the purpose, use and other aspects of collecting the information. In order to facilitate your reading and understanding, we will define specialized terms, please see the definitions in Section 10 of this Privacy Policy.

If you use the products and services of this software, it means that you agree with what we have stated in this policy. When using your information for purposes not covered by this privacy policy, we will ask for your consent in advance

This privacy policy applies to your access to and use of our products and services through this software application, this software's WeChat official account, and application programming interfaces (APIs) used by third-party websites and applications.

 

1. How we collect and use your personal information

1.1 When you use this software, we may obtain the following permissions from your terminal device, and you can choose to agree or reject them.

When you use our services, in order to identify abnormal account status, understand product adaptability, and ensure the network and operational security of providing services. To do this, we collect your:

1.1.1 Device status permissions

During your use of this software, in order to remember your identity, analyze your use of this software, and identify you as a user of this software, we will need to obtain your device's READ_PHONE_STATE permission to read the phone status and collect your device's IMSI, IMEI, OAID, device serial number, MAC, IP, AndroidID information, acceleration sensor and gyroscope sensor, etc. This permission requires your permission. If you refuse to provide it, it will only prevent you from using this function, but it will not affect the normal use of other functions. You can refuse when we request authorization from you or turn off the authorization through your device

1.1.2 Permission to read external storage

When you add pictures or videos from your mobile phone album to this software for making pictures/videos, we will need to obtain your device's READ_EXTERNAL_STORE permission to read external storage and collect the video and picture information in your mobile phone's storage space. (personal information). This permission requires your permission. If you refuse to provide it, it will only prevent you from using this function, but it will not affect the normal use of other functions. You can refuse when we request authorization from you or turn off the authorization through your device.

1.1.3 Permission to write to external storage

When you use this software to create pictures or videos and save the final synthesized pictures or videos to the album, we will need to obtain your device's WRITE_EXTERNAL_STORE permission to read the external storage and save the videos and videos in your phone's storage space. Picture information (personal information). This permission requires your permission. If you refuse to provide it, it will only prevent you from using this function, but it will not affect the normal use of other functions. You can refuse when we request authorization from you or turn off the authorization through your device

1.2 Personal information we directly collect and use

We will collect information that you actively provide when using the service as follows, as well as collect through automated means the information generated during your use of functions or acceptance of services:

1.2.1 Ensure the normal operation of products and services

When you use product-related services, in order to ensure the normal operation of the software and services, we will collect your device information (manufacturer, model, name, mobile phone power, operating system information, acceleration sensor and gyroscope sensor), device identification ( IMEI, OAID, MAC, AndroidID, IDFA, OpenUDID, GUID, SIM card IMSI, ICCID, IP), network information (WIFI information, network operator information, network type, network status), rough location information, operation log information and you Installed application information or running process information. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of our products.

1.3 Business functions of providing products and/or services to you

1.3.1 Picture and video content production

Picture and video content production is the core service we provide. When you produce videos and images by yourself, we will ask you to authorize camera permissions and storage (including SD card) permissions

During your use of our services, in order to identify abnormal account status, understand product adaptability, and ensure the security of the network and operations that provide services. To do this, we collect your:

Device information (including device model, operating system version, device settings, unique device identifier, network device hardware address MAC, mobile application list and other software and hardware feature information); device location-related information (including IP address) and personal Internet access records (Including browsing records, software usage records, and click records).

1.3.2 Log in/register/share works

When you log in/register, we will obtain your WeChat nickname and avatar information in order to manage your works and collection lists.

When you share a video produced by this software, we will obtain your WeChat or other sharing website nickname and avatar information.

In order to provide you with one-click login service, our products may integrate third-party SDK or other similar applications, such as Umeng SDK. Umeng SDK needs to collect your device’s International Mobile Equipment Identity (IMEI) and iOS advertising identifier. IDFA, mobile phone number and other necessary fields. For the security of your information, we have agreed on strict data security confidentiality obligations with third-party SDK service providers, and these companies will strictly abide by our data privacy and security requirements. We will not share your other personal information with them unless we obtain your consent. To help you better understand the types and uses of data collected by Umeng+, and how to protect your personal information, you can visit https://www.umeng.com/policy to learn about Umeng+’s privacy policy. We understand and respect your right to choose. If you do not want to participate in Umeng+ big data computing, you can also visit https://outdip.umeng.com/opt_out.html to exercise opt-out rights.

1.3.3 In order to ensure network security and improve our services, we will collect the details of your use of this software and save them as relevant logs, including the content you browse, the date and time of your visit, and the web page records you requested, Operating system, software version number, network IP information.

1.3.4 Information collected by the application in silent/background state. In order to analyze users' usage habits in complete usage scenarios, improve user experience and optimize the performance of our products and services, we will automatically collect your device MAC information from the device you use to access the application when the application is in silent/background state. , you can limit our collection of relevant information from your mobile device or the use of specific permissions by adjusting the "Settings" options of your mobile device. When you restrict our access to a certain permission, we may not be able to continue to provide you with corresponding services, and we may no longer process your corresponding information.

1.3.5 Special instructions related to face data

The image and video special effects provided by this software involve analyzing the facial information (such as facial feature coordinate points) in your photos. We will only analyze your facial information after your authorization and during the production process. After the production is completed, it will be immediately deleted and your facial data will not be persistently stored or shared with third parties.

Please note that individual device information and service log information are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, such non-personal information will be treated as personal information during the period of combined use, unless we obtain your authorization. Unless otherwise provided by laws and regulations, we will anonymize and de-identify such information

1.4 Description of photos and video data involving users

If you use the image and video upload function in this software, we will ask you to grant us permission to access the camera and album in order to obtain photos or videos on your mobile device. After we obtain your authorization, we will process the photos or videos. The photos or videos will be deleted immediately after the processing is completed, and the processed data will not contain any of your personal information. The above data, photos and renderings are neither stored nor shared/processed with any third parties. If your photos or videos contain portraits, they will be saved by the carrier (such as a mobile phone or other smart handheld terminal device) and its system when you uploaded the portrait materials. This software will not save your portrait characteristics unless you actively upload or With your prior permission.

1.5 Equipment permissions

In the process of providing services to this software, you need to open device access permissions to us. We will explain the purpose to you and obtain your consent when installing it for the first time or when you need to open permissions. By enabling these permissions, you authorize us to collect and use this information to implement corresponding functions. include:

We will ask during first installation or require authorization to use device storage read and write permissions in specific scenarios to import photos or videos to create the necessary materials for the album video function. This software will not abuse device storage read and write permissions to access files of other applications

We will ask during first installation or require authorization to use device information in specific scenarios: for determining account security, performing identity verification, locating crash logs, providing optimal solutions for information display, etc.

In the specific process of providing services, we also need to call more of your device permissions, including: obtaining your photo access permissions for the purpose of uploading pictures; obtaining your camera permissions for the purpose of taking pictures and uploading.

We will ask and obtain your consent in the form of a pop-up window in specific scenarios. You can also manage device permissions through the application permission settings page of this software to allow or refuse us to collect and use your personal information.

 

2. Use of cookies and similar technologies

Similar technologies such as cookies and device information identification are commonly used technologies on the Internet. When you use the services of this software, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information when you access and use this product. We promise not to use Cookies for any other purpose than those stated in this Privacy Policy. We use cookies and similar technologies mainly to achieve the following functions or services:

2.1 Ensure the safe and efficient operation of products and services

We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you log in to the service safely or whether you have encountered theft, fraud or other illegal activities. These technologies will also help us improve service efficiency and improve login and response speeds.

2.2 Help you obtain an easier access experience

Using this type of technology can help you avoid repeating the steps and processes of filling out personal information and entering search content (examples: record searches, form filling).

2.3 Troubleshooting of abnormal service problems

2.3.1 In the template content sharing page, we may use cookies to record browsing activities to recommend information to you, troubleshoot abnormal situations related to crashes and delays, and explore better service methods.

2.4 Clearing Cookies

Most devices provide users with the function of clearing cached data. You can perform the corresponding data clearing operation in the device's settings function. If you clear it, you may not be able to use the services or corresponding functions provided by us that rely on Cookies.

 

3. How we share, transfer and publicly disclose your personal information

3.1 Sharing

3.1.1 Sharing principle

3.1.1.1 Authorization and consent principle: We will not share your personal information without your consent, unless the personal information shared is de-identified information and the sharing third party cannot re-identify the natural person subject of such information. If the third party uses the information for a purpose beyond the scope of the original authorization, they need to obtain your consent again

3.1.1.2 The principle of legality, legitimacy and minimum necessity: the data shared must have a legitimate and legitimate purpose, and the data shared must be limited to what is necessary to achieve the purpose.

3.1.1.3 Security and Prudence Principle: We will carefully evaluate the purpose of third parties using shared information, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with legal cooperation agreements. We will conduct strict security monitoring on the software tool development kit (SDK) and application program interface (API) used by partners to obtain information to protect data security

3.1.2 Sharing information to realize functions or services

When you use the functions provided by our partners or third parties in this software, or when software service providers, smart device providers, and system service providers jointly provide you with services, we will implement the business requirements. Necessary information is shared with these partners and third parties.

3.1.3 Achieve shared information for security and analysis statistics

3.1.3.1 Ensure the security of use: We attach great importance to the security of accounts, services and content. In order to protect the security of your and other users’ accounts and property, and to protect your and our legitimate rights and interests from illegal infringement, we and our partners or service providers Necessary device, account and log information may be shared.

3.1.3.2 Analyze product usage: In order to analyze the usage of our services and improve user experience, statistical data on product usage (crash, flashback) may be shared with partners or third parties. These data are difficult to share with other users. The information is combined to identify you personally

3.1.3.3 Academic research and scientific research: In order to enhance scientific research capabilities in related fields and promote the level of scientific and technological development, we may share de-identified or anonymized data with scientific research institutes, universities and other institutions on the premise of ensuring data security and legitimate purposes. The data.

3.1.3.4 Help you participate in marketing promotion activities

When you choose to participate in relevant marketing activities organized by us, our partners or third parties, you may be required to provide your name, mailing address, contact information, and bank account information. This information is personal sensitive information, and refusing to provide it may affect your participation in related activities, but it will not affect other functions. Only with your consent will we share this information with partners or third parties to ensure that you receive consistent service experience in joint activities, or to entrust a third party to cash out rewards to you in a timely manner

Currently, our partners include the following types:

Service platform or service provider: This software product is connected to a variety of third-party services. When you choose to use this third-party service, you authorize us to provide this information to the third-party service platform or service provider so that it can provide you with services based on the relevant information. When a third party accesses our products/or services, your information will be obtained through the third-party account. The actions of the third-party service platform or service provider have nothing to do with our company, and the third party shall bear the corresponding responsibility.

Software and hardware/system service providers: When third-party software and hardware/system products or services are combined with the products or services of this software to provide you with services, with your authorization, we will provide you with the third-party software and hardware/system service providers. Necessary personal information so that you can use the service, or for us to analyze the use of our products and services to improve your experience.

Advertising and information service providers/advertisers: We will not share your personal information with advertising and information service providers without your authorization. However, we may share information with advertising or information service providers or advertisers that has been processed and cannot identify you and cannot be recovered by the recipient.

You can consult the appendix table of this privacy policy to learn more about the identity of the service provider, the type of information shared, and other information in the above situations.

At the same time, you should be aware and understand that relevant products may contain links to websites, applications, products and services operated by other independent third parties. We do not make any express or implied guarantees for these third-party websites, applications, products and services. We guarantee that such links are only provided to facilitate users to browse relevant pages. When you visit such third-party websites, applications, products and service links, you shall separately agree to the privacy policy or personal information protection terms provided to you. We and these third-party websites, applications, products and service providers each bear independent personal information protection responsibilities to you within the scope of legal provisions and mutual agreements.

3.2 Transfer

3.2.1 We will not transfer your personal information to any other third party unless we obtain your explicit consent.

3.2.2 As our business continues to develop, we may undergo mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. When the aforementioned changes occur, we will require the successor to protect your personal information in accordance with laws and regulations and security standards no lower than those stated in this Privacy Policy. Otherwise, we will require the successor to obtain your authorization and consent again.

3.3 Public display

3.3.1 We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. When we publicly disclose your personal information, we will adopt security protection measures that comply with industry standards.

3.3.2 When announcing penalties for illegal accounts and fraudulent activities, we will disclose the information of the relevant accounts,

3.4 Personal information that is exempted from consent to sharing, transfer, and public disclosure in accordance with the law

Please understand that in the following circumstances, in accordance with laws, regulations and national standards, we do not need to obtain your authorization to share, transfer, and publicly disclose your personal information:

3.4.1 Directly related to national security and national defense security;

3.4.2 Directly related to public safety, public health, and major public interests;

3.4.3 Directly related to criminal investigation, prosecution, trial and judgment execution;

3.4.4 To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

3.4.5 Personal information that you disclose to the public on your own;

3.4.6 Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

3.4.7 Necessary to sign or perform a contract at your request;

3.4.8 Necessary to maintain the safe and stable operation of software and related services, such as discovering and handling faults in software and related services;

3.4.9 Necessary for legitimate news reporting;

3.4.10 When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results will be de-identified;

3.4.11 Other situations stipulated by laws and regulations.

 

4. How we store and protect your personal information

4.1 Storage period

During the use of this software product and service, we will continue to save your personal information for you. After you cancel your account or actively delete the above information, we will delete or anonymize your personal information, unless otherwise provided by laws and regulations.

When our products or services cease operations, we will notify you in the form of push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period.

4.2 Protected areas

In accordance with the provisions of laws and regulations, we will store your personal information collected and generated during domestic operations within the territory of the People's Republic of China. Currently, we will not transfer the above information overseas. If we transfer it overseas, we will comply with relevant national regulations or seek your consent.

4.3 Protective measures

4.3.1 Our technical measures to protect your personal information

From the perspective of the life cycle of data, we have established security protection measures in all aspects of data collection, storage, display, processing, use, destruction, etc., and adopt different control measures according to the level of information sensitivity, including but not limited to access control, SSL (Secure Socket Layer) encrypted transmission, AES256bit or above encryption algorithm for encrypted storage, desensitized display of sensitive information, etc.

If a security incident such as personal information leakage occurs, we will activate an emergency plan to prevent the security incident from expanding, and inform you in the form of push notifications, announcements, etc.

4.3.2 Our management measures to protect your personal information

We have also adopted strict management of employees who may have access to your information and can monitor their operations. We have established an approval mechanism for important operations such as data access, internal and external transmission and use, desensitization, and decryption, and have signed confidentiality agreements with the above employees. , conduct background checks on a large number of people who have access to personal sensitive information, etc. At the same time, we also regularly conduct information security training for employees, requiring employees to form good operating habits in daily work and enhance data protection awareness

4.3.3 Please understand

Despite the aforementioned security measures, please also understand that there are no "perfect security measures" on the Internet. We will provide corresponding security measures based on existing technologies to protect your information and provide reasonable security protection. We will try our best to prevent your information from being leaked, damaged or lost.

4.4 Self-protection of personal account information

Your account has security protection function. Please keep your account and password information properly, and do not tell others your password. If you find that your personal information has been leaked, especially your account number and password, please contact us immediately. Contact customer service so that we can take appropriate measures.

Please save or back up your text, pictures and other other information in a timely manner. You need to understand and accept that the system and communication network you use to access our services may cause problems due to factors beyond our control.

 

5. Your rights (how to manage information, change the scope of authorization, cancel your account)

5.1 Access your personal information

You have the right to access your personal information, except for exceptions provided by laws and regulations. You can log in to your account and click "My" to enter your personal homepage to view your personal information.

You can also contact us at any time to access your personal information. We will respond to your access request within 15 days after receiving the access information. For other personal information generated during your use of our products or services, we will provide it to you in accordance with the relevant arrangements in this article "(6) Responding to your above request"

5.2 Correct or supplement your personal information

When you find errors in the personal information we process about you, you have the right to ask us to make corrections or additions. You may make a correction or supplement request through the methods listed in "(1) Access to your personal information".

5.3 Delete your personal information

You can make a request to us to delete personal information under the following circumstances

5.3.1 If our handling of personal information violates laws and regulations;

5.3.2 If we collect and use your personal information without your explicit consent;

5.3.3 If our handling of personal information seriously violates the agreement with you;

5.3.4 If you no longer use our products or services, or you actively cancel your account;

5.3.5 If we permanently no longer provide you with products or services.

You can contact us at any time to delete some of your personal information. If we decide to respond to your deletion request, we will also try our best to notify the subjects who obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these subjects obtain your independent authorization. When you delete information from our services, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.

5.4 Change the scope of your authorization and consent

Each business function may require some basic personal information to be completed. In addition, for the collection and use of additional personal information, you can give or withdraw your authorization by contacting customer service. When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

5.5 Cancel account

You have the right to cancel your account of this software. After logging in to your account, you can perform online operations by accessing the "Settings" - "Account Cancellation" page on our App page. After you actively cancel your account, we will stop providing you with products or services. You know and understand that the act of canceling your account is irreversible. When you cancel your account, we will delete or anonymize your relevant information, unless otherwise provided by laws and regulations.

We would like to kindly remind you that during the cancellation period of this software account, if your software account is involved in disputes, including but not limited to complaints, reports, lawsuits, arbitrations, investigations by state authorities, etc., this software has the right to terminate this software on its own initiative. Cancellation of the software account without your consent.

Once the software account is canceled, it cannot be recovered. Please back up all information and data related to the account before operating. By canceling your software account, you will no longer be able to use your software account, and you will not be able to retrieve any content and information in your software account and related to your account.

5.6 Respond to your above request

For security reasons, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will respond as soon as possible. If you are not satisfied, you can also initiate a complaint through the customer service phone number. In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical.

In the following circumstances, we will not be able to respond to your request in accordance with legal and regulatory requirements:

5.6.1 Relevant to national security and national defense security;

5.6.2 Relevant to public safety, public health, and major public interests;

5.6.3 Relevant to criminal investigation, prosecution, trial and execution of judgments;

5.6.4 There is sufficient evidence that the personal information subject has subjective malice or abused his rights;

5.6.5 Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

5.6.6 Involving business secrets.

 

6. How we protect children’s personal information

Our products, websites and services are primarily intended for adults. Children may not create their own user accounts without the consent of a parent or guardian. For cases where we collect personal information from children with parental consent, we will only use or publicly disclose this information as permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.

Although local laws and customs may define children differently, we consider anyone under the age of 14 to be a child. If we discover that a child's personal information has been collected without prior verifiable parental consent, we will seek to delete the data as quickly as possible.

If you are a guardian of a child and you have any questions about the personal information of the child under your guardianship, please contact us through the contact information disclosed in this privacy policy.

 

7. How your personal information is transferred globally

The personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China and does not involve cross-border transmission, except for the following circumstances:

7.1 The applicable laws are clearly stipulated;

7.2 Obtain your explicit authorization;

7.3 You conduct cross-border transactions and other personal proactive behaviors through the Internet;

In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

If this product undergoes cross-border data processing in the future and it is indeed necessary to transfer relevant personal information collected within the country to overseas institutions, we will comply with the provisions of laws, administrative regulations and relevant regulatory authorities. And we will ask for your consent and permission again before transferring data across borders. At the same time, we make sure to detail the location and purpose of data transfer in our privacy policy so that you always know where your personal information is stored. At the same time, we will adopt corresponding encryption, anonymization and other technologies to ensure that your personal information is adequately protected during transmission.

 

8. Notices and Revisions

Our privacy policy may change. We will not reduce your rights under this Privacy Policy without your explicit consent. We will post any changes to this policy on this page.

After this Privacy Policy is updated, we will issue an updated version in this software application, and remind you of the updated content through in-app notifications or other appropriate means before the updated terms take effect, so that you can keep up to date with this Privacy Policy. Version.

Major changes referred to in this policy include but are not limited to:

8.1 Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;

8.2 We have undergone major changes in ownership structure, organizational structure and other aspects. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;

8.3 The main objects to whom personal information is shared, transferred or publicly disclosed change;

8.4 Significant changes in your rights to participate in the processing of personal information and how you exercise them;

8.5 When our responsible department, contact information and complaint channels for handling personal information security change;

8.6 When the personal information security impact assessment report indicates that there is a high risk.

We will also archive older versions of this policy for your review.

 

9. Definition

Personal information: refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. Personal information includes name, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, account password, property information, credit information, whereabouts, accommodation information, health and physiological information, transactions Information etc.

Sensitive personal information: refers to personal information that, once leaked, illegally provided or misused, may endanger personal and property safety, and can easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. Sensitive personal information includes ID number, personal biometric information, bank account number, communication records and content, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, and individuals of children under 14 years old (inclusive) Information etc.

De-identification: After collecting personal information, we will take technical and administrative measures to store de-identified data separately from information that can be used to recover the identification of individuals, and ensure that individuals are not re-identified in subsequent processing of personal information.

 

10. Contact information

Email: rgrg9898@163.com

 

11. Instructions on third-party cooperation and sharing of information

Partner name: Umeng Tongxin (Beijing) Technology Co., Ltd./Umeng+SDK

Purpose of cooperation: Provide statistical analysis services and calibrate report data accuracy through geographical location

Cooperation method: Embed third-party SDK, SDK collects and transmits personal information

Shared personal information fields: device information (IMEI, MAC, Android ID, IDFA, OpenUDID, GUID, SIM card IMSI, geographical location, IP, running processes, SD card basic information, etc.)

Privacy policy link: https://www.umeng.com/page/policy

 

Partner name: WeChat Open Platform

Purpose of cooperation: Provide third-party login sharing (excluding payment function)

Cooperation method: Embed third-party SDK, SDK collects and transmits personal information

Shared personal information fields: device MAC address, unique device identification code (IMEI, android ID, IDFA, OPENUDID, GUID, SIM card IMSI information)

Privacy policy link:

https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy

 

Partner name: Toutiao Pangolin Alliance Advertising/ByteDance SDK

Purpose of cooperation: Provide commercial effect advertising resources

Cooperation method: Embed third-party SDK, SDK collects and transmits personal information

Shared personal information fields: basic information such as device brand, model, software system version, resolution, sensor information, device MAC address, device identifier (IMEI, Android ID, IDFA, OPENUDID, GUID, SIM card IMSI information), application installation list, location information, IP address, running processes, etc.), performance data (such as crash data, performance data)

Privacy policy link: https://www.pangle.cn/privacy

Partner name: Bugly (com.tencent.bugly)

Purpose of cooperation: collect software performance logs

Cooperation method: Embed third-party SDK, SDK collects and transmits personal information

Shared personal information fields: device information (IMEI, Mac, android ID, IDFA, OPENUDID, GUID, SIM card IMSI, geographical location information)

Privacy policy link: https://privacy.qq.com/