Privacy Agreement

Privacy Policy

 

Updated date: January 10, 2022

Effective Date: January 10, 2022

Shenzhen Yuqiaofu Technology Co., Ltd. (hereinafter referred to as "we") is well aware of the importance of personal information to you. We will provide full protection for your personal information security in accordance with laws and regulations and refer to industry best practices. We are committed to Maintain your trust in us, abide by the following principles, and protect your personal information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of choice consent, the principle of least enough, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. In view of this, we have formulated this "Privacy Policy" (hereinafter referred to as "this policy / this privacy policy") to help you fully understand how we collect, use, share, Storage and protection of your personal information and how you manage your personal information.

Before using the products or services of this application, please read and understand this policy carefully, and use the relevant products or services after confirming your full understanding and agreement. Once you start using the products or services of this application, it means that you have fully understood and agreed to this policy. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the various contact methods provided by this application.

This Privacy Policy section will help you understand the following:

1. Definition and scope of application

2. How we collect and use your information;

3. How do we use cookies and similar technologies;

4. How we share, transfer and publicly disclose your information;

5. How do we protect your information;

6. How do you manage your information;

7. How do we handle the information of minors;

8. How your information is transferred globally;

9. How to update this Privacy Policy;

10. How to contact us

 

1. Definition and scope of application

Personal information: various information related to identified or identifiable natural persons recorded electronically or otherwise, excluding anonymized information.

Sensitive personal information: Sensitive personal information is personal information that, once leaked or illegally used, is likely to infringe on the personal dignity of natural persons or endanger the safety of personal and property, including biometrics, religious beliefs, specific identities, medical care, financial accounts, and whereabouts Trajectory information, and personal information of minors under the age of fourteen.

Personal information processing: including collection, storage, use, processing, transmission, provision, disclosure, deletion, etc. of personal information.

Deletion of personal information: refers to the act of removing personal information from systems involved in realizing daily business functions, so that it remains in a state that cannot be retrieved or accessed.

Anonymization of personal information: refers to the process in which personal information cannot identify a specific natural person after processing and cannot be restored. .

De-identification of personal information: refers to the process in which personal information is processed so that a specific natural person cannot be identified without additional information.

Device information: including device identifiers (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters And system information (device type, device model, operating system and hardware-related information), device network environment information (IP address, WiFi information, base station information and other network-related information), subject to the actual collection of the product.

Children: Refers to minors under the age of fourteen.

This policy applies to "GreenPrinter" products or services (hereinafter referred to as "this application")

2. How we collect and use your information

When you use our products/services, we need/may need to collect and use your personal information, including the following two types:

1. In order to provide you with the basic functions of our products/or services, you must authorize us to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally;

2. In order to provide you with additional functions of our products and/or services, you can choose to individually agree or disagree with the information we collect and use. If you refuse to provide it, you will not be able to use the relevant additional functions normally or fail to achieve our intended The functional effect achieved will not affect your use of our basic functions.

We hereby remind you: we are committed to creating a variety of products and services to meet your needs, because we provide you with a wide variety of products and services, and there are differences in the specific range of products/services that different users choose to use, so basically /Additional functions and the type and scope of personal information collected and used will be different, please refer to the specific product/service function.

 

The specific functional scenarios we provide you include:

1. To provide you with data/picture printing services

In order to better associate and bind devices and perform normal printing services, we will collect and use device information (including device identifiers (IMEI, Android ID, MAC, IMSI and other Device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters and system information (device type, device model, operating system and hardware-related information), device network environment information (IP address, WiFi information, base station information and other network-related information)), service log information (IP address, telecom operator, language used, access date and time).

2. To provide you with application service information

2.1 Information we collect during your use of the service

In order to provide you with a page display that better suits your needs and understand product suitability, we will collect information about the services you use and how you use them and correlate them, including:

2.1.1 Device information:

In order to ensure the safe operation of applications and services, we will collect your device model, application list (installation list), device name, device unique identifier, login IP address, product version number, and mobile network information.

Our products are developed based on DCloud uni-app (5+ App/Wap2App). During the running of the app, you need to collect your device's unique identification code (device ID, IMEI/android ID/, MAC, IMSI information) to provide statistical analysis services, and Improve performance and user experience through application startup data and exception error log analysis, and provide users with better services.

We will collect your (device identifier, application list, IMEI, MAC,) and other information in the silent/background state to identify the identity information of the device. the

 

2.1.2 According to the specific permissions granted by you during software installation and use:

(1) Permission to read photos or take photos

On some models, the album read permission is displayed as "read the contents of the memory card".

If you refuse to authorize the provision of photo album or camera permissions, you will not be able to use the corresponding functions, but it will not affect your normal use of other functions of this application.

(2) Write album permissions

   When you use the function of downloading pictures, we will ask you for the permission to write to the photo album or the permission to write to the memory card. On some models, the album write permission is displayed as "modify or delete the content in the memory card".

(3) The third-party SDK integrated in this application and the corresponding permissions

uni-app integrates the following three-party SDKs by default to ensure its operation:

Ali weexSDK (package name: com.taobao): The uni-app basic module is integrated by default, which is used to render the nvue page engine of uniapp, store personal files, read external storage, and write to external storage. fresco image library (package name: com.facebook.fresco): The uni-app basic module is integrated by default, which is used for nvue page loading pictures, stored personal files, reading external storage, and writing external storage.

In order to ensure operation, this application integrates the following three-party SDKs:

The glide image library (package name: com.bumptech.glide): used to load images natively; it needs to read and write to the external memory.

Google native page library (package name: com.google.android): used for native rendering page engine;

Getui SDK (package name: com.igexin.sdk, com.getui.gtc ): used to push system notifications and discount notifications to you; it needs to obtain device information, application list information, and network status.

2.1.3 Service log information: including after-sales service, IP address, language used, access date and time.

When you use the products or services provided by our clients, we will automatically collect your detailed usage of our services and save them as relevant web logs. For example, your Idiv address, the language you use, the date and time of your visit, and the records of the web pages you visit, etc.

Please note that individual device information, log information, etc. are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, during the combined use, such non-personal information will be regarded as personal information, unless authorized by you Or unless otherwise stipulated by laws and regulations, we will anonymize and de-identify such personal information.

When you contact us, we may save your communication/call records and content or your contact information and other information in order to contact you or help you solve problems, or record the solutions and results of related problems.

2.2 Your personal information collected by us indirectly

You can use the products or services provided by our affiliated companies through the link portal provided by us through this application account. In order to facilitate us to provide you with a one-stop service based on the associated account and to facilitate your unified management, we will show you in this application. information or recommend information you are interested in. You can discover and use the above services through functions such as basic information and authentication information in the personal center.

When you use the above services through our products or services, you authorize us to receive, summarize, and analyze your personal information from our affiliated companies based on actual business and cooperation needs. event information.

If you refuse to provide the above information or refuse to authorize, you may not be able to use the corresponding products or services of this application normally, or you may not be able to display relevant information, but it will not affect core services such as browsing with this application and participating in some activities that do not require privacy authorization.

3. To provide you with security

Please note that in order to ensure the authenticity of user identities, to provide you with better security, to improve the security of your use of the services provided by us, our affiliated companies and partners, and to protect the personal and property safety of you or other users or the public from being Infringement, to better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and to more accurately identify violations of laws and regulations or the relevant agreement rules of this application, we may use or integrate your equipment Information, related network logs, and information that our affiliated companies and partners have obtained your authorization or shared in accordance with the law to comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary records, audits, Analysis and handling measures.

4. Exceptions to Authorization and Consent

According to relevant laws and regulations, the collection of your personal information in the following situations does not require your authorization and consent:

4.1 Related to national security and national defense security;

4.2 Related to public safety, public health, and major public interests;

4.3 Related to criminal investigation, prosecution, trial and execution of judgments;

4.4 In order to protect the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain your consent;

4.5 The collected personal information is disclosed to the public by you;

4.6 Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;

4.7 Necessary to enter into a contract at your request;

4.8 It is necessary to maintain the safe and stable operation of the provided products or services, such as discovering and handling product or service failures;

4.9 Necessary for legitimate news reporting;

4.10 When it is necessary for an academic research institution to carry out statistical or academic research based on the public interest, and provide the results of academic research or description to the outside world, it de-identifies the personal information contained in the results;

4.11 Other circumstances stipulated by laws and regulations.

If we stop operating this application product or service, we will stop collecting your personal information in a timely manner, notify you of the notice of cessation of operation by delivery or announcement one by one, and delete or anonymize the personal information we hold deal with.

5. Customer service and after-sales functions

In order to protect your account and system security, we need you to provide necessary personal information to verify your membership when you contact us or submit an application for handling disputes during and after sales. At this time, our customer service and after-sales functions may use your account information and order information.

In order to facilitate contact with you, help you solve problems as soon as possible, or record the solutions and results of related problems, we may save your communication/call records and related content (including account information, order information, and information provided by you to prove relevant facts) other information, or the contact information you left), if you consult, complain or provide suggestions for specific orders, we will use your account information and order information.

In order to provide services and improve the reasonable needs of service quality, we may also use other information about you, including relevant information you provide when you contact customer service, and questionnaire response information you send to us when you participate in questionnaire surveys.

 

3. How do we use cookies and similar technologies

1. Cookies

Cookies and similar device information identification technologies are commonly used technologies on the Internet. When you use our services, we may use related technologies to send one or more cookies or anonymous identifiers (hereinafter referred to as "Cookies") to your device , to collect, identify and store your information when you visit and use this product. We promise not to use cookies for any purpose other than those stated in this privacy policy. We use cookies mainly to ensure the security of our products and services , Efficient operation, allows us to confirm the security status of your account and transaction, troubleshoot crashes and delays, and help you save the steps and processes of filling out forms and entering search content.

At the same time, we may use cookies to show you information or functions that you may be interested in, and to optimize your choice of advertisements. Most browsers provide users with the function of clearing browser cache data, and you can make corresponding data Clearly operate, or modify the acceptance of cookies or reject our cookies, you may not be able to use Cookie's services or corresponding functions.

2. Web beacons and pixel tags

Besides Cookie, we also use other similar technologies such as web beacon and pixel tag on our website. For example, the emails/text messages we send to you may contain an address link to the content of our website. If you click on the link, we will track this click to help us understand your product or service preferences so that we can actively improve Customer service experience. A web beacon is usually a transparent image embedded in a website or email. With the help of pixel tags in emails, we can know whether the emails are opened. If you do not want your activities to be tracked down in this way, you can unsubscribe from our mail list at any time.

 

4. How do we share, transfer and publicly disclose your information

1. Sharing

We will not share your personal information with companies, organizations and individuals other than this application service provider, except in the following cases:

1.1 Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

1.2 Sharing under statutory circumstances: We may share your personal information externally in accordance with the provisions of laws and regulations, the needs of litigation dispute resolution, or the legal requirements of administrative and judicial authorities.

1.3 Sharing with affiliated companies: In order to facilitate us to jointly provide services to you based on associated accounts, recommend information that you may be interested in, or protect the personal and property safety of affiliated companies of this application or other users or the public from infringement, your personal information may Will be shared with our affiliated companies. We will only share necessary personal information (for example, we will share your necessary account information with affiliated companies in order to facilitate your use of this application account to use our affiliated company's products or services), if we share your personal sensitive information or affiliated companies change The use and processing purpose of personal information will ask for your authorization and consent again.

1.4 Sharing with authorized partners: only to achieve the purpose stated in this privacy policy, some of our services will be jointly provided by us and authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, arranging for partners to provide services. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for other purposes unrelated to products or services.

Please note that the information you share voluntarily or even publicly when using our services may involve personal information or even sensitive personal information of you or others, please consider and make a decision more carefully.

Currently, our authorized partners include the following types:

1.4.1 Authorized partners for advertising and analysis services. Unless we have your permission, we will not combine your personally identifiable information (information that can identify you, such as your name or email address, mobile phone number, through which you can be contacted or identify you) with advertising , Partner sharing of analysis services. We may provide these partners with information about the reach and effectiveness of their advertising without providing your personally identifiable information, or we may aggregate this information so that it does not personally identify you. For example, we may tell an advertiser how their ad performed, or how many people saw their ad or installed an app after seeing it, or partner with them, only if the advertiser agrees to abide by our advertising guidelines. Partners provide non-personally identifiable statistical information (such as "Male, 25-29 years old, located in Beijing") to help them understand their audience or customers.

1.4.2 Suppliers, Service Providers and Other Partners. We send information to suppliers, service providers and other partners who support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertisements and services, providing customer service, payment facilitation Or conduct academic research and surveys.

2. Transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

2.2 In the case of mergers, acquisitions or bankruptcy liquidation, or other mergers, acquisitions or bankruptcy liquidation, if personal information transfer is involved, we will require new companies and organizations that hold your personal information to continue to be bound by this policy , otherwise we will require the company, organization and individual to seek your authorization again.

3. Public disclosure

We will publicly disclose your personal information under the following circumstances:

3.1 Based on your active choice and other separate consents, we may publicly disclose your personal information;

3.2 If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of this application, or in order to protect the personal and property safety of users of this application and its affiliated companies or the public from infringement, we may, in accordance with laws and regulations or relevant agreements of this application, The rules disclose your personal information with your consent, including relevant violations and the measures this app has taken against you.

4. Exceptions to obtaining prior authorization and consent when sharing, transferring, and publicly disclosing personal information

In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

4.1 Related to national security and national defense security;

4.2 Related to public safety, public health, and major public interests;

4.3 Related to criminal investigation, prosecution, trial and execution of judgments;

4.4 In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain the consent of the person;

4.5 Personal information that you disclose to the public by yourself;

4.6 Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.

According to the law, sharing and transferring personal information that has been de-identified and ensuring that the data recipient cannot restore and re-identify the subject of personal information is not an act of external sharing, transfer and public disclosure of personal information. Storage and processing will not require further notice to you and your consent.

 

5. How do we protect your information

1. We have taken reasonable and feasible security protection measures in line with common industry solutions to protect the security of the personal information you provide, and prevent personal information from being accessed, publicly disclosed, used, modified, damaged or lost without authorization. For example, when exchanging data (such as credit card information) between your browser and the server, it is protected by SSL (Secure Socket Layer) protocol encryption (that is, HTTPS protocol); we will use encryption technology to improve the security of personal information; we will use Trusted protection mechanisms prevent malicious attacks on personal information; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to strengthen employees' importance of protecting personal information understanding.

2. We have an industry-leading data security management system centered on data and centered around the data life cycle, which improves the security of the entire system from multiple dimensions, such as organizational construction, system design, personnel management, and product technology.

3. We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extended retention period is required or permitted by law.

4. The Internet is not an absolutely safe environment. We strongly recommend that you do not send personal information using communication methods not recommended by this application. You can connect and share with each other through our services. When you create a communication, transaction or sharing through our services, you can independently choose the object of communication, transaction or sharing, as a third party who can see your transaction content, contact information, communication information or sharing content and other related information.

If you find that your personal information, especially your account or password, has been leaked, please contact the customer service of this application immediately so that we can take corresponding measures according to your application.

Please note that the information you share voluntarily or even publicly when using our services may involve personal information or even sensitive personal information of you or others, such as when you post news or choose to upload personal information in public places such as group chats and circles picture of. Please consider more carefully whether to share or even publicly share relevant information when using our services.

Please use a complex password to help us ensure the security of your account. We will do our best to keep any information you send us secure. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

 

6. How do you manage your information

You can view and manage your information in the following ways, and we will respond to your request in compliance with legal and regulatory requirements:

1. Delete your personal information

You can delete some of your personal information through the methods listed in "(1) Access to your personal information" in this article.

In the following situations, you can submit a request to us to delete personal information through customer service:

1.1 If our handling of personal information violates laws and regulations;

1.2 If we collect and use your personal information without your explicit consent;

1.3 If our handling of personal information seriously violates the agreement with you;

1.4 If our processing purposes have been achieved, cannot be achieved or are no longer necessary to achieve the processing purposes;

1.5 If we stop providing products or services, or the retention period has expired.

If we decide to respond to your deletion request, we will also notify the subjects who obtained your personal information from us as much as possible at the same time, and ask them to delete them in a timely manner (unless otherwise stipulated by laws and regulations, or these subjects have obtained your authorization independently) .

When you or we assist you to delete relevant information, we may not be able to immediately back up the deletion response information from the backup system due to the legal and security technology restrictions used, and we will safely store your personal information and limit any further access to it. processing until the backup can be cleared or anonymized.

2. Change the scope of your authorization and consent

Every business can require some basic personal information to be completed (see "Article 1" of this Privacy Policy). In addition, for the collection and use of additional personal information, you can contact the customer service of this app to apply for or withdraw your authorization.

Please note that we may not be able to respond to your request to change the scope of authorization for some types of personal information, such as the information necessary to realize the basic functions of this application or the information necessary for us to fulfill our obligations stipulated by laws and regulations. When you withdraw your authorization, we will no longer process the corresponding personal information, but your decision to withdraw your authorization will not affect our previous processing of personal information based on your authorization.

3. Constrained information system automatic decision-making

In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including algorithms. If these decisions affect your legitimate rights and interests, you can contact us through customer service.

4. To respond to your above request

For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

We will respond within 30 days. If you are not satisfied, you can also initiate a complaint through the customer service of this app.

For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. We may deny requests that are unnecessarily repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate rights and interests of others, or are highly impractical.

In the following situations, we will not be able to respond to your request in accordance with the requirements of laws and regulations:

4.1 Related to national security and national defense security;

4.2 Related to public safety, public health, and major public interests;

4.3 Related to criminal investigation, prosecution, trial and execution of judgments;

4.4 There is sufficient evidence that the personal information subject has subjective malice or abuse of rights;

4.5 Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

4.6 Involving commercial secrets.

 

 

7. How do we handle the information of minors

In digital office/study, communication and collaborative activities, we presume that you have the corresponding capacity for civil conduct. If you are a minor, we ask you to ask your parents or other guardians to read this policy carefully, and ask your parents or other guardians consent to use our services or provide information to us.

If you are a child under the age of 14, you and your guardian should carefully read the content of this privacy policy before you use our services, and ensure that you can use our services under the guidance of your guardian only after obtaining the consent of your guardian , to ensure your safety when using our services and conducting transactions.

If you are a parent or other guardian of a child, please pay attention to whether the child uses our services after obtaining your authorization and consent. If you have any questions about the personal information of the child, please contact our dedicated personal information protection department.

In the case of collecting personal information of minors with the consent of parents or guardians to use our products or services, we will only use, share, and transfer them as permitted by laws and regulations, with the explicit consent of parents or guardians, or as necessary to protect minors or disclose this information.

8. How your information is transferred globally

The personal information we collect and generate during our operations in the People's Republic of China will be stored in China, except for the following circumstances:

8.1 There are clear provisions in laws and regulations;

8.2 Obtain your express authorization;

8.3 Your personal initiative such as cross-border live broadcast/release news through the Internet.

In view of the above situations, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

9. How to update this Privacy Policy

In order to bring you a better product and service experience, we continue to work hard to improve our products, services and technologies. When new services and business processes change, we may update our privacy policy. We have informed you that according to this policy, the right to enjoy.

For major changes, we will also provide more prominent notifications (including we will notify you through small red dots or provide you with pop-up prompts),

Significant changes referred to in this policy include:

1. Significant changes have occurred in the business model of the product, such as the purpose of processing personal information, the type of processing personal information, and the way the personal information is used;

2. Changes in the main body of the privacy policy caused by business adjustments, transaction mergers and acquisitions, and the recipient of the new main body changes the original processing purpose and processing method;

3. The main object of personal information sharing or public disclosure changes;

4. Significant changes have occurred in the user's personal information rights and their exercise methods;

5. When the contact information and complaint channels of the person in charge of personal information protection change;

6. When the personal information protection impact assessment report shows that the existence of the product has a significant impact on personal rights; we will also archive the old version of this policy on the special page of this application for your reference.

 

10. How to contact us

you may To contact us by the following means, we will respond to your request within 15 days:

1. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the customer service of the mini program and "My" - "Contact Customer Service" in the APP;

2. If you find that your personal information may be leaked, you can report it through the feedback of this application;

Company Name: Shenzhen Yuqiaofu Technology Co., Ltd.

Office address: Room 1006, Building 18, Zhonghaixin Innovation Industry City, No. 11, Ganli 2nd Road, Gankeng Community, Jihua Street, Longgang District, Shenzhen

Registered address: Room 1006, Building 18, Zhonghaixin Innovation Industry City, No. 11, Ganli 2nd Road, Gankeng Community, Jihua Street, Longgang District, Shenzhen

Contact number: 18129821727

Emall: 670488606@qq.com