This policy only applies to the product "Journey" and related services of Hangzhou Xianfeng Network Technology Co., Ltd. (hereinafter referred to as "we").
Your personal information security is crucial to us, and we have always made every effort to protect your personal information security, committed to maintaining your trust in us. We will collect and use your personal information in accordance with relevant laws, regulations, and technical specifications to help us provide you with better products and services. Meanwhile, we promise to strictly keep your personal information and other data confidential to ensure the security of your personal information.
We have established this privacy policy and would like to remind you to carefully read and understand it before using the pen, in order to make appropriate choices.
Table of contents
Explanation of Nouns
1. How to Collect and Use Your Personal Information
2. How do we share, transfer, and publicly disclose your personal information
III. How to Save Your Personal Information
4. How to Protect Your Personal Information
5. Your Right to Manage Personal Information
6. How to update this policy
7. How to Contact Us
Explanation of nouns
In order to help you understand the proprietary terms mentioned in this policy, we have defined these proprietary terms:
Personal Identity Information: Personal information refers to various types of information recorded electronically or in other ways that can individually or in combination with other information identify the personal identity of a natural person.
Personal sensitive information: Personal sensitive information refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, and is highly likely to cause damage to personal reputation, physical and mental health, or discriminatory treatment.
Non personally identifiable information: Recorded information related to users that cannot directly or indirectly identify your identity, including personal information provided through de identification, anonymization, or pseudonymization.
Log files: Log files store several automatically collected data. Such data includes Internet Protocol (IP) address, browser type, Internet Service Provider (ISP), reference/exit page, operating system, date/time stamp, click stream data, etc.
Deidentification: refers to the process of using technical processing of personal information to prevent it from identifying the subject of personal information without the need for additional information.
Anonymization: refers to the process of using technical processing of personal information to make the subject of personal information unrecognizable, and the processed information cannot be restored.
How do we collect and use your personal information
We will follow the principles of legitimacy, legality, and necessity to collect and use personal information voluntarily provided by you during the use of products (or services) based on the following functions and services.
(1) Register an account
When you register and log in to a simple pen account, you need to provide the following registration methods:
Register using a phone number:
Phone number and set login password
Login using a third-party account (WeChat): The third-party account ID provided by WeChat
Jianbi also provides a local mode without the need to register an account. If you choose not to register an account, you will not be able to synchronize your task data between multiple devices, and once you uninstall the application, your local mode task data will be lost.
(II) Application Functions
1. Synchronize simple pen data
Once you register an account and create data such as simple pens and tasks in your account, in order for you to synchronize data between devices normally and completely after unlocking the advanced version, you need to allow us to collect:
Your brief title, date, background, content, tags, configuration.
The above information is only used for synchronizing pen data between various devices, and we will not read your content.
2. Submit feedback
When you submit feedback within the application, to ensure that we can accurately understand and screen the issues you encounter, we may collect information including:
your email, Log files、 Device model and operating system version.
3. Bind third-party accounts or services
When you choose to bind WeChat to your account, you need to provide us with the WeChat third-party ID.
4. Cutting plate
To help users paste records more conveniently, we will click the paste button on the editing page and copy the data from theclipboardto paste it into the content data box.
5. Others
You can choose to provide us with and allow us to collect the following information by improving your personal information:Nickname. This information is not necessary for the operation of various business or system functions, and we will not force you to provide this information. Refusal will not have an adverse effect on the use of the pen.
(III) Permissions that will be applied for within the application
We need to apply for some system permissions that involve personal privacy to ensure that certain functions within the application can be used normally. We will apply for authorization from you when you use these features, and only after obtaining your authorization will we access your personal information. If you do not need to use these features, you can refuse authorization; If you have never used these features, we will not apply for permission from you or access your personal information.
The permissions we will apply for and their corresponding functions include:
1. Allow reading external storage space
Used to add local images
2. Allow fingerprint reading permission
Used to set up a fingerprint lock to protect your application
3. Allow camera permissions
Used for you to take photos and take notes
(IV) Third party SDK services
We collect data based on your interaction with us and the choices you make, including your privacy settings and the products and features you use.
*WeChat login/WeChat payment
Third party SDK operator: Shenzhen Tencent Computer Systems Co., Ltd.
In app scenario description: Used for users to log in through WeChat and unlock the advanced version function through payment.
User information required for SDK: IMEI IMSI, MAC address, device serial number, hardware serial number SIM card serial number ICCID、;Android ID、OAID、SSID、BSSID; System settings, system properties, device model, device brand, operating system; IP address, network type, operator information Wi Fi status Wi Fi parameters Wi Fi list; Software installation list.
SDK Privacy Policy/User Agreement:
https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy
*
Alipay payment SDK
Third party SDK operator: Alipay (China) Network Technology Co., Ltd.
In application scenario description: Risk control when unlocking the advanced version function for payment.
User information required for SDK: IMEI IMSI, MAC address, device serial number, hardware serial number SIM card serial number ICCID、;Android ID、OAID、SSID、BSSID; System settings, system properties, device model, device brand, operating system; IP address, network type, operator information Wi Fi status Wi Fi parameters Wi Fi list; Software installation list.
SDK Privacy Policy/User Agreement:
https://opendocs.alipay.com/common/02kiq3
*360 reinforcement
Third party SDK operator: Beijing Hongxiang Technology Services Co., Ltd.
In app scenario description: used to detect app faults and diagnose, App security reinforcement protection, piracy detection service, threat environment detection service to help users quickly solve abnormal situations.
User information required for SDK: MD5 for application package name, version, and signature file; Basic device information, such as network type, system operating language environment, operating system version name, operating system version, model, system version, manufacturer, terminal motherboard name, brand, device memory size, phone screen resolution, and operating environment; Used for basic reinforcement services.
Network information, terminal environment information.
SDK Privacy Policy/User Agreement:
https://jiagu.360.cn/#/global/help/322
(V) Application self start
*Scene
Note update, application launch updates desktop widget content.
*Purpose
Automatically update desktop widget content to help users display the latest notes
*Rules
Launch desktop widget updates when note updates occur
(VI) Other Usage Instructions
When we need to use your information for other purposes not specified in this policy, we will seek your consent in advance. When we need to use information collected for specific purposes for other purposes, we will seek your consent in advance.
2. How do we share, transfer, and publicly disclose your personal information
(1) Sharing
Without your consent, we will not share your personal information with any other company, organization, or individual, except in the following circumstances:
Obtaining your explicit consent or authorization: After obtaining your explicit authorization, we will share your personal information with other parties.
Sharing under legal circumstances: According to laws and regulations, litigation dispute resolution needs, or mandatory requirements of government regulatory authorities or judicial rulings, it is necessary to share your personal information with the public.
Within the scope required or permitted by law, it is necessary to provide your personal information to third parties in order to protect the interests, property, or safety of Jian Bi and its users or the general public from harm
(II) Transfer
Without your consent, we will not transfer your personal information to any company, organization, or individual.
(III) Public Disclosure
Without your consent, we will not publicly disclose your personal information, except in the following circumstances:
Obtain your explicit consent or authorization b>
Based on legal, procedural, litigation, or mandatory requirements from government authorities, we may disclose your personal information to authorized authorities. But we guarantee that in the event of the above situation, we will require the disclosure requester to provide corresponding valid legal documents and take security measures that comply with laws and industry standards for the disclosed information.
Thirdly, how can we save your personal information
(1) Shelf life
During your use of this platform, we will continue to store your personal information for a period not exceeding the period necessary to provide you with services. After you terminate the use of this platform or close the corresponding authorization, unless otherwise specified by laws and regulations for specific information retention periods, we will delete or anonymize your information.
If we cease operations due to poor management or other reasons, we will immediately stop collecting your personal information and delete the collected personal information. We will announce this situation on the website or communicate it to each user through internal notifications, emails, and other reasonable means.
(II) Storage Area
We will store the information obtained from within the territory of the People's Republic of China. If some products or services involve cross-border transactions, we need to transmit your personal information to foreign countries. We will strictly follow the provisions of laws and regulations and ensure the security of your personal information.
4. How can we protect your personal information
Your personal information security is crucial to us. We will strictly comply with relevant laws and regulations, take reasonable and feasible measures recognized in the industry, and protect your personal information. Prevent unauthorized access, disclosure, use, and modification of information, and prevent information damage or loss.
(1) Technical Measures and Data Security Measures
We have used security measures that comply with industry standards to protect the personal information you provide, preventing unauthorized access, public disclosure, use, modification of data, and preventing data damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data between your browser and us
SSL encryption protection; We will use trusted protection mechanisms to prevent data from being maliciously attacked; We have deployed access control mechanisms to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(II) Security Incident Handling
The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technological, or management protective facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, which damages your legitimate rights and interests, we will bear corresponding legal responsibilities.
In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with legal requirements of the basic situation and possible impacts of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the event through email, letter, phone, push notifications, and other means. If it is difficult to inform the personal information subject one by one, we will take reasonable and effective measures to publish an announcement.
At the same time, we will also proactively report the handling of personal information security incidents in accordance with regulatory requirements.
5. Your Right to Manage Personal Information
We do our best to protect your right to access, correct, and delete your personal information, so that you have the full ability to safeguard your privacy and security. Your rights include:
(1) Access and correct your personal information
You have the right to access your personal information, except in exceptional circumstances stipulated by laws and regulations. If you want to exercise data access rights, you can access and correct them yourself through the following methods:
*User nickname, enter the account details page, click on the nickname to modify it
*User's phone number, enter the account details page, click on the phone number to modify it
*Apply fingerprint lock, enter the settings page, and turn off fingerprint lock settings
If you are unable to access or correct these personal information through the above methods, you can submit feedback within the app or send an email to diaryfb@163.com . We will reply to your visit request within 15 days.
(II) Delete your personal information
In the following situations, you can request us to delete personal information:
*If our handling of personal information violates laws and regulations;
*If we collect and use your personal information without your consent;
*If our handling of personal information violates our agreement with you;
*If you no longer use our products or services, or if you cancel your account;
*If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations or with your independent authorization. When you delete information from our service, we may not immediately delete the corresponding information in the backup system, but we will delete this information during backup updates.
After you delete your account, we will also notify the entities that have obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or if these entities have obtained your independent authorization. When you delete information from our service, we may not immediately delete the corresponding information in the backup system, but we will delete this information during backup updates.
(III) Change the scope of your authorized consent
Each function requires some basic personal information to be completed. For the collection and use of additional personal information, you may grant or revoke your authorization at any time.
After you withdraw your consent, we will no longer process the corresponding personal information. But your decision to withdraw your consent will not affect the personal information processing previously carried out based on your authorization.
(4) Cancel Your Account
If you need to cancel your account, please click on "Cancel Account" below on the account information page and submit a cancellation application. We will complete the confirmation of account cancellation process within 3 days.
After canceling your account, we will stop providing you with products or services and delete your personal information at your request, except as otherwise provided by laws and regulations.
(V) Obtain a copy of personal information
You have the right to obtain a copy of your personal information, and you can operate it yourself by clicking on Export Backup in the settings. This function only supports exporting your pen data.
(VI) Respond to your above request
To ensure security, you may need to provide a written request or other means of proving your identity. We may first request you to verify your identity before processing your request. We will respond to your request within 15 days.
For your reasonable requests, we do not charge any fees in principle, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as involving information stored on backup tapes).
In the following situations, according to legal requirements, we will not be able to respond to your request:
*Related to our obligations under laws and regulations;
*Related to national security and national defense security;
*Related to public safety, public health, and major public interests;
*Related to criminal investigation, prosecution, and trial;
*We have sufficient evidence to indicate that you have subjective malice or abuse of power;
*For the purpose of protecting the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain my consent;
*Responding to your request will result in serious damage to your or other individuals or organizations' legitimate rights and interests;
*Involving trade secrets.
6. How to update this policy
As this privacy policy may be updated from time to time, you should regularly check to understand our plans and procedures for protecting the personal information we collect. Your continued use constitutes your consent to this privacy policy and any updated versions.
For significant changes, depending on the specific situation, we may provide more significant notices explaining the specific changes in this policy. Major changes include but are not limited to:
*Our service model has undergone significant changes. Such as the purpose of processing personal information, the type of personal information being processed, and the way personal information is used;
*We have undergone significant changes in ownership structure, organizational structure, and other aspects. Changes in ownership caused by business adjustments, bankruptcy mergers and acquisitions, etc;
*The main objects of personal information sharing, transfer, or public disclosure have changed;
*Your right to participate in personal information processing and the way you exercise it have undergone significant changes;
*When there are changes in the department responsible for handling personal information security, contact information, and complaint channels;
*When the personal information security impact assessment report indicates a high risk.
7. How to contact us
If you have any questions, opinions or suggestions regarding this privacy policy, please contact us through the following methods:
*Send feedback within the application
*Send an email to diaryfb@163.com