Whatscan Web Privacy Policy

Time: July 17, 2024

We are well aware of the importance of personal information security and privacy protection, and we will protect your personal information and privacy in accordance with laws and regulations.


This guideline will help you understand intuitively and concisely how we collect, process and use personal information and how to protect your privacy. Your use or continued use of Voice video conversion means that you agree to our collection, use, storage and sharing of your relevant information in accordance with this policy. If you do not agree to this privacy policy and start using it, we will only collect the information necessary to maintain the basic functions of "Whatscan Web". This will prevent us from providing you with complete products and services, but we will also take appropriate measures to protect your information. For ease of understanding, the following "Whatscan Web" names are collectively referred to as this application.

This policy will help you understand the following:

1. How we collect and use your personal information
2. Provide you with security

3. Cookies and similar technologies

4. How we share, transfer or disclose your personal information

5. How we store and protect your personal information

6. How to update this policy

7. How to contact us

1. How we collect and use your personal information

We will follow the principles of legitimacy, lawfulness, and necessity to collect and use the personal information you actively provide during the use of this service or that is generated by the use of our products or services for the purposes stated in this policy. If we want to use your personal information for other purposes not specified in this policy, or use the collected information for other purposes based on specific purposes, we will inform you in a reasonable manner and ask you again before use. With your consent. If you have any comments, suggestions or questions about the content of this policy, you can contact us through the contact information at the end of the article.

We aim to provide safe, convenient and effective services to all users. In order to achieve the above goals and for the various functions of this policy, we will collect and use your information for the following purposes:


In order to ensure the safe operation of applications and related services, and to provide you with products and information display services that better meet your needs, we will collect device information and service log information when you use it.

Device information: including device type, device name, device model, MAC address, unique device identifier (for example: IMEI/android ID/IDFA/OPENUDID/GUID/SIM card/IMSI), operating system and application version, language settings, Resolution, login IP address, network device hardware address, network access method, service provider network ID (PLMN), device location-related information, network quality data, mobile network information (including operator name), product version number , browser type and other software and hardware information. In addition, we may write to the storage space of the device you use to access or use the App.


Please note that separate device information and service log information do not identify you as a specific natural person and are non-personal information. If we use such non-personal information in combination with other information and can identify you as a natural person, during the combined use period, we will treat the non-personal information as personal information and treat it in accordance with this Privacy Policy and relevant laws. Provide for its processing and protection (except for information that has been anonymized and de-identified during combined use and cannot identify specific individuals).

2.Provide you with security

In order to improve the security of your use of the services we provide and more accurately prevent phishing website fraud and Trojan viruses, we may use or integrate your account, user information, order information, device information, service log information and our associations Parties and partners obtain information authorized by you or shared in accordance with the law, and comprehensively judge your account and transaction risks based on your usage habits and commonly used software information, including verifying identity, preventing, discovering, and investigating possible fraud, network viruses, Security risks such as network attacks and violations of our or affiliated party agreements, policies or rules, etc., in order to protect the legitimate rights and interests of you, other users, us or affiliated parties, take necessary records in accordance with the law (such as links that we believe are risky) and take action Corresponding disposal measures.


3. Cookies and similar technologies

In order to ensure the normal and efficient operation of the application, provide you with an easier access experience, and recommend content that you may be interested in, we will store small data files named Cookies on your device terminal\system. Cookies usually contain identifiers, site names, and some numbers and characters. Cookies and similar device information identification technologies are commonly used technologies on the Internet. Cookies are mainly used to ensure the safety and efficient operation of products and services, to troubleshoot abnormal situations; to help you optimize your selection and interaction with ads; to protect your data security, etc. We will not use Cookies for any purpose other than those stated in this Privacy Policy. You can clear all cookies saved on your mobile device, and you have the right to accept or reject cookies. Most browsers will automatically accept Cookies, but you can usually modify the browser settings to reject Cookies according to your own needs; in addition, you can also clear all Cookies saved in the software. However, you may not be able to fully experience some of our convenient and secure service features.


4. How we share, transfer or disclose your personal information

(1) Sharing

Except for the following situations, we will not share your personal information with any third party without your consent:

1. Sharing with your authorization and consent

We will share your personal information with other parties with your explicit consent.

2. Sharing under legal circumstances

We may share your personal information externally in accordance with legal provisions and litigation and dispute resolution needs, or in accordance with legal requirements from administrative and judicial authorities.

3. Information that must be shared when providing you with our services

Only by sharing your information can we realize the basic functions of this application service or provide you with the services you need.


Our partners include the following:

(1)  Security and data processing service providers. In order to ensure the safe operation of user accounts and applications and protect the legitimate rights and interests of users and us from infringement, third-party security service providers may collect your device information, network information, log information and other information. In addition, in order to maintain and continuously improve our services, we may share your information with data processing service providers, but we promise that we will not share your personally identifiable information with them without your consent.

(2)  Our advertising and analysis service authorized partners. Based on the need to optimize application services, we may provide your information to relevant partners. But unless we get your permission, we will not share your personal information (information that can identify you, such as name or email address) with partners that provide advertising and analysis services.

(3)  Other partners. To the extent permitted by laws and regulations, in order to comply with the law, protect the interests, property or safety of us and our affiliates, partners, you or other application users or the public from damage, such as to prevent fraud and other illegal activities and reduce credit Risks, we may share your personal information with other parties (excluding information sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this policy).


If you refuse our partners to collect the personal information necessary to provide services when providing services, you may not be able to use such third-party services in the application.

1. Assist in handling disputes or controversies between you and others in response to your legitimate needs;

2. Provide your information in response to the legal request of your guardian;

3. When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results will be anonymized;


7. Provided according to the user service agreement signed with you (including electronic agreement and application rules) or other legal documents.

(3) Public disclosure

We will only disclose your personal information under the following circumstances and under the premise of taking security measures that comply with industry standards:

1.We may disclose your personal information with your explicit consent or based on your active choice;

2. When it is necessary to provide your personal information in accordance with the requirements of laws, regulations, mandatory administrative enforcement or judicial requirements, we may disclose your personal information based on the required type of personal information and disclosure method. Subject to complying with laws and regulations, when we receive the above request to disclose information, we will require the recipient to issue corresponding legal documents, such as a subpoena or a letter of investigation.

(4) Use of third-party SDK

In order to ensure the stable operation and function realization of our client and enable you to use and enjoy more services and functions, our application will embed the SDK of a third-party service provider or other similar applications. The aforementioned third-party service providers may collect your relevant information, and their collection and use of relevant information do not apply to this privacy policy, but are subject to their own privacy policies. In order to protect your information security to the greatest extent, we recommend that you check the privacy terms of any third-party SDK services before using them. To protect your legitimate rights and interests, if you find that there are risks in this SDK or other similar applications, it is recommended that you immediately terminate the relevant operations and contact us promptly.


The above functions and services include account login, account security, message push, payment, sharing, cloud customer service and statistical analysis, etc. For details, please refer to the "Instructions for Collection and Use of Information by Third-Party SDKs

(5) Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information

According to relevant laws and regulations, sharing, transferring, and publicly disclosing your personal information in the following situations does not require your prior authorization and consent:

1. Necessary to perform legal obligations or legal duties;

2.  Collect and use within a reasonable scope in accordance with legal provisions that individuals disclose to the public on their own or other personal information that has been legally disclosed;

3.  Necessary to sign and perform a contract or other written documents with you;

4.  Other situations stipulated by laws and regulations.

Please understand that according to legal provisions, sharing, transferring, and publicly disclosing anonymized personal information do not constitute external sharing, transfer, and disclosure of personal information, and there is no need to notify you and obtain your consent.


Please note that the information you voluntarily release or even share publicly when using our services may involve your or others' personal information or even personal sensitive information, such as your transaction information, and the text you choose to upload containing personal information when you evaluate. Various forms of information such as pictures or videos. Please consider more carefully when using our services whether to publish or even share relevant information publicly, and bear the relevant responsibilities yourself.


If the information you provide contains the personal information of other users, you need to ensure that you have obtained legal authorization and assume relevant responsibilities before providing such personal information to us. If it involves children's personal information, you need to obtain the consent of the corresponding child's guardian before publishing. In the above circumstances, the guardian has the right to contact us through the channels specified in this policy to request correction or deletion of the child's personal information.


5. How we store and protect your personal information

(1) Storage of personal information

1. Where information is stored

We will store the collected user personal information in China or the country/region where the user is located in accordance with laws and regulations.

2. Duration of information storage

Generally speaking, we only retain your personal information for the time necessary to achieve the purpose, such as the email address you filled in when giving feedback. In the above circumstances, we will require the data recipient to process the personal information in accordance with our instructions, this Privacy Policy and other relevant confidentiality and security measures. In addition to the above circumstances, if cross-border transmission of data occurs, we will separately inform you of the purpose of the data transfer, recipients, etc. in a pop-up window or email, and obtain your authorization and consent. We will require the data recipient to have sufficient data protection capabilities to protect your personal information.

(2) Protection measures for personal information

We will take the following measures to protect your personal information:

1. Data security technical measures

We will adopt security protection measures that comply with industry standards, including establishing reasonable system specifications and security technologies to prevent your information from unauthorized access, use, public disclosure, modification, damage or loss.

We will take all reasonable and feasible technical measures to protect your personal information.

2. Other security measures we take to protect information

We implement comprehensive security control over data through information contact confidentiality agreements, monitoring and auditing mechanisms and other means. We will also hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting information.

3.Please know and understand that the Internet is not an absolutely secure environment. We strongly recommend that you use a safe method and use complex passwords to help us ensure the security of your account. If you find that your personal information has been leaked, especially your account or password, please contact us immediately according to the contact information provided in this privacy policy so that we can take appropriate measures.


We will take all reasonable and feasible measures to try our best to avoid collecting irrelevant personal information.


6. Security incident handling

When trading online goods or services with a third party through this application, you will inevitably disclose your personal information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your personal information properly and provide it to others only when necessary.

In order to deal with possible risks such as leakage, damage and loss of personal information, we will try our best to ensure the security of your personal information. However, please understand that due to technical limitations and limitations of risk prevention, even if we have tried our best to strengthen security measures, we will not Information cannot always be guaranteed to be 100% secure. You need to understand that the systems and communication networks you use to access application services may have problems due to circumstances beyond our control. After an unfortunate personal information security incident occurs, we will immediately set up a special emergency response team, activate an emergency plan, prevent the security incident from expanding, and promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken Or the disposal measures to be taken, suggestions for you to prevent and reduce risks on your own, remedial measures for you, etc. We will promptly notify you of the incident-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

7. How to contact us

If you have any complaints, questions, comments or suggestions about this policy or personal information-related matters, you can contact us by sending an email to [email protected]. Under normal circumstances, we will respond to you within fifteen working days.


Attachment 1 "Permission Application and Usage Instructions"

1. In order to ensure the safe and stable operation of this application, we will apply for or use relevant permissions of the operating system based on actual business scenarios;

2. In order to protect your right to know, we use the following list to display the relevant operating system permissions that the product may apply for and use. You can manage the relevant permissions according to actual needs;

3. According to product upgrades, the types and purposes of application and use permissions will change based on product functions. We will adjust the list in a timely manner based on these changes to ensure that you are informed of the application and use of permissions in a timely manner;

4. Please be aware that for the functional and security needs of our business and products, we will consider using third-party SDKs based on actual business scenarios. These third parties will also apply for or use relevant operating system permissions;


Operating system application permission list

1.Privacy - Network Extensions Usage Description Network permissions

Permission function description: network permissions

Usage scenarios and purposes: Used to send and receive network data, access privacy policies, user agreement links and other network requests.

Consequences of refusal: inability to use the Internet

2.Privacy - Tracking Usage Description tracking permission

Permission function description: Tracking permissions

Usage scenarios and purposes: In order to improve your experience when using the product and reduce the interruption and impact of content advertising on you, we need you to allow the APP to obtain your device identifier (IDFA).

Consequences of refusing to provide: We cannot analyze the cause of the program error.

3.Privacy - System Album Storage Permission

Permission Function Description: Album Permission

Usage Scenario and Purpose: For users to save the material resources in the Quotes Status function

Consequence of rejection: Unable to save the specified material resources to the system album


Attachment 2 "This application is connected to the third-party SDK directory"

In order to realize the relevant functions of the cost-effective application and ensure the safe and stable operation of the application, we will access the software development kit (SDK) provided by a third party according to the needs of actual business scenarios to achieve relevant purposes.


We will conduct strict security monitoring on the software tool development kit (SDK) used by partners to obtain information to protect data security.


The relevant third-party SDKs we access are listed in the catalog.


Please note that third-party SDKs may have certain changes in data processing types due to version upgrades, policy adjustments, etc. Please refer to the official description of their formulas.

1. Umeng SDK

Purpose of use: Provide statistical analysis services, basic anti-cheating capabilities and message push

Information obtained: device MAC address, unique device identifier (IMEI/OPENUDID/GUID), advertising identifier, SIM card IMSI information, network status, WiFi status, WiFi MAC address

Device permissions called: obtain network status, access WiFi status, allow applications to connect to the Internet

Privacy policy: https://www.umeng.com/page/policy

2.AdMob SDK

Purpose of use: push advertising information to users, anti-cheating

Obtain information: unique identifier, device type and settings, operating system, mobile network information (including carrier name and phone number) and app version number, IP address, crash reports

Device permissions called: obtain network status, access WiFi status, read and write external storage, read mobile phone status and identity

Privacy Policy: https://policies.google.cn/privacy

Attachment 3"Subscription Notice for this App"
1. Introduction

Whatscan Web provides a subscription service to meet your specific needs. Our subscription service allows you to enjoy more features and services when using Whatscan Web.

 

2. Subscription Service Content

For the specific content of Whatscan Web subscription service, please refer to the content listed on the subscription page in the app.

 

3. Subscription Fees

Whatscan Web subscription service may require a certain fee, the specific fee is subject to the subscription page in the app.

 

4. Subscription Period and Automatic Renewal

The subscription period of Whatscan Web subscription service is subject to the subscription page in the app. If you select the automatic renewal option, your subscription will automatically renew unless you turn off the automatic renewal option before the subscription expires. If you cancel the automatic renewal option, your subscription will automatically expire after the expiration.

 

5. Cancellation of Subscription

You can cancel your subscription at any time before the subscription expires. After you cancel your subscription, we will no longer charge you for the subscription service. If you cancel your subscription before the subscription expires, we will not refund any fees.

If you want to cancel your subscription, please follow the steps below:

(1) Open the App Store app.

(2) Click "My Account" and enter your Apple ID password.

(3) Find Whatscan Web in "Subscriptions" and click "Manage".

(4) Turn off subscription in "Auto-Renewal".

 

6. Subscription Refund

If you require a refund for the Whatscan Web subscription service, you can apply to us through the in-app feedback channel and we will process your application as soon as possible after receiving your application.

 

7. Changes and Termination of Agreement

We reserve the right to modify this Agreement at any time, and the modified Agreement will be posted in the App. If you do not agree to the modified Agreement, you should immediately stop using the Whatscan Web subscription service. If you continue to use the Whatscan Web subscription service, you will be deemed to have accepted the modified Agreement. We may terminate this Agreement at any time, and you will no longer be able to use the Whatscan Web subscription service after termination.

 

8. Contact Information

If you have any questions during the use of this application, please contact us by sending an email to [email protected].