privacy policy
Update: Jun. 17, 2024
{{enGsName}} (hereinafter referred to as "we") understands the importance of personal information to you and will do its utmost to protect your personal information safe and reliable. We are committed to maintaining your trust in us, abide by the following principles, and protect your personal information: the principle of unanimity of power and responsibility, the principle of clear purpose, the principle of choice and consent, the principle of least sufficient use, the principle of ensuring safety, the principle of subject participation, the principle of transparency . At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with the industry's mature security standards.The personal information we collect in the course of your use of our products will only be used for the purposes set out in this Privacy Policy.
Please read and understand this "Privacy Policy" carefully before using our products ‘WeCall’ (or services).
1. How do we collect and use your personal information
Personal information refers to all kinds of information recorded in electronic or other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person, alone or in combination with other information.
We will only collect and use your personal information for the following purposes described in this policy:
1.1 Provide you with Internet phone service
1.1.1 register as a user
To use our service, you need to create an account so that we can provide you with services such as Internet phone calls, and provide a unique cell phone number and SMS verification code that you can be contacted .
If you log in through a third party account such as WeChat, we will obtain information about your corresponding third party account.
The data we collect when you register/login to the application may also include SDK/API/JS code version, browser, internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, iOS advertising identifier (IDFA), Android advertiser identifier, network card (MAC) address, cell phone number, the International Mobile Equipment Identifier (IMEI), device model, terminal manufacturer, terminal device OS version, session start/stop time, language location, time zone, and network status (WiFi, etc.).
1.1.2 Make internet phone call
In order for you to use the app's make a VoIP call feature, you need to grant the app access to the microphone; the data we collect when you make a call using the VoIP feature includes the called number, the start and end time of the call.
1.1.3 Cloud address book and make VoIP calls through mobile address book
In order to facilitate you to call phone numbers of mobile contacts, edit contact information, and use the cloud address book function in the app, you need to grant the app permission to read/modify your phone address book, and you can access the app to use other functions without providing this authorization.
1.1.4 Query/modify call records
In order to facilitate you to make VoIP calls through call logs in the application and to merge the call logs of this application with the call logs of your cell phone in some cell phones, you need to grant the application the permission to query/modify the call logs, without providing this authorization, you can access the application to use other functions. This part of information is not collected by the application.
1.1.5 Record calls and store them locally
In order for you to use the call recording function and view the number attribution information, you need to grant the application permission to read and write the phone storage, the recording file is stored locally, the application does not collect this information.
1.1.6 Function of edit avatar and call background
You can edit your avatar and related background in the app, in order to use this feature, you need to grant the app access to the camera, read photo albums, the app does not collect this information
1.1.7 Function of ivitation with prize
When you use the function of inviting your friends , the invitation link and invitation QR code generated by the App for you will contain the user's ID information in order to accurately issue the reward.
The above information you provide will continue to authorize us to use it during your use of this service. When you cancel your account, we will stop using and delete the above information.
1.2 To enhance service functions and improve service experience
In order to provide you with services that are better suited to you, our products and services may include products and services from third parties and links to third party websites. When you use these products or services, your information may also be collected. The third party SKDs that we currently access are as follows.
1.2.1 Umeng plus
1.2.1.1 Scenario Description: Statistical Analysis Services
SDK Name: Statistical Analysis SDK
Personal information field: collects device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to uniquely identify the device, which is a prerequisite for statistical analysis data. Collect geographic location to correct the geographical distribution of report data and provide anti-cheating services.
1.2.1.2 Scenario description: Invitation to share
SDK Name: Social Sharing SDK
Personal information field: collects device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to uniquely identify the device for sharing messages to the target device. Capture geographic location to screen sharing channels and provide anti-cheating services.
Third-party SDK provider name: Youmeng Tongxin (Beijing) Technology Co.
1.2.2 Pangle
SDK name: Pangle
Scenario Description: Request advertising information
1.2.2.1 In order to provide ad placement and ad monitoring attribution, anti-cheating, the following device information may be obtained
[Android & iOS] Basic information such as device brand, model, software system version, resolution, network signal strength, device language, sensor information, etc.
[Android only] Android ID
[iOS only] Mobile phone system reboot time, total disk space, total system memory space, CPU number and other basic information, IDFV
In addition, based on the purpose of optimization of advertising effect, we may need to provide the following information to the penetrator.
[Dual-ended] IP address, wireless network SSID name, WiFi router MAC address, MAC address of the device (for iOS side, only for IOS3200 version or below)
[Android only] device identifier (such as IMEI, OAID, IMSI, ICCID, GAID (GMS service only), MEID, device serial number build_serial, specific fields differ depending on the hardware and software version)
[iOS only] device identifier (such as IDFA, specific fields vary by hardware and software version)
1.2.2.2 For the purpose of ad placement and anti-cheating, the following device information may be obtained
[Android only] Developer application name, application package name, version number, application front and back status
1.2.2.3 For the purpose of ad monitoring attribution, statistical analysis of ad placement, and anti-cheating, the following ad information may be obtained
[Android and iOS] Interaction data of display, click and conversion of ads
1.2.2.4 Possible access to location information for ad targeting and anti-cheating purposes
1.2.2.5 To reduce App crashes, provide stable and reliable services, obtain crash data, performance data, etc.
1.2.2.6 For the purpose of advertising and anti-cheating, we may also obtain other information such as operator information and device time zone
Third-party SDK provider name: Hubei JinriToutiao Technology Co.
1.2.3 Alipay
SDK name: App payment
Scenario Description: Integrate Alipay payment function in the App
Information Collection:
[Android] We collect commonly used device information (such as IMEI/IMSI, SIM card serial number/MAC address), network information, and geographic location information for security risk control during user login account and payment process, other than the above information, we do not collect other personal data information of users through third party applications.
[iOS] We collect commonly used device information (such as IMEI/IMSI, SIM card serial number/MAC address), network information, and geographic location information for the purpose of securing users' accounts. Other than the above information, we do not collect other personal data information of users through third-party applications.
Third-party SDK Provider: Alipay (China) Network Technology Co.
1.2.4 WeChat Payment
SDK name: WeChat Payment
Scenario Description: The merchant integrates the open SDK in the mobile application APP to call up the WeChat payment module to complete the payment mode
WeChat Pay (Tencent Technology (Shenzhen) Co., Ltd.) SDK will collect your device information (may include IMEI, IMSI, device MAC address, Android Id, device model, network type, wireless network list, wireless network MAC address, wireless network name, sensor information, SIM serial number information), location information, cell phone number, the collection of invoked Android privileges for personal information may include: ACCESS_COARSE_LOCATION, ACCESS_FINE_LOCATION, READ_PHONE_STATE, WRITE_EXTERNAL_STORAGE, ACCESS_NETWORK_STATE, ACCESS_WIFI_ STATE.
Third-party SDK provider name: Shenzhen Tencent Computer System Co., Ltd.
When we want to use information collected for a specific purpose for other purposes, we will ask for your consent in advance.
2. how do we use cookies and similar technologies
2.1 Cookie
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, the website can store data such as your preferences or products in the shopping basket.
We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer. Most web browsers have a function to block cookies. However, if you do this, you will need to change user settings yourself each time you visit our website. To learn more about how to change your browser settings, please visit the following links:
2.2 Web beacons and pixel tags
In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our websites. For example, the email we send you may contain a click URL that links to the content of our website. If you click the link, we will track the click to help us understand your product or service preferences and improve customer service. Web beacons are usually a transparent image embedded in a website or email. With the help of the pixel tag in the email, we can know whether the email is opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
2.3 Do Not Track (Do Not Track)
Many web browsers are equipped with Do Not Track function, which can issue Do Not Track requests to websites. At present, major Internet standards organizations have not established policies to regulate how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our websites will respect your choice.
3. How do we share, transfer and publicly disclose your personal information
3.1 Sharing
We will not share your personal information with any other companies, organizations and individuals, except for the following:
1). Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
2). We may share your personal information externally in accordance with the provisions of laws and regulations, or in accordance with the compulsory requirements of the competent government department.
3). Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share the necessary personal information and are bound by the purpose stated in this privacy policy. If an affiliated company wants to change the purpose of processing personal information, it will seek your authorization and consent again.
4). Sharing with authorized partners: For the purposes stated in this privacy policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and only share the personal information necessary to provide services.
For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them and require them to process personal information in accordance with our instructions, this privacy policy and any other related confidentiality and security measures.
3.2 Transfer
We will not transfer your personal information to any company, organization or individual, except for the following:
3.2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
3.2.2 When it involves mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy, otherwise we will require that company or organization Ask you for authorization again.
3.3 Public disclosure
We will only publicly disclose your personal information in the following situations:
3.3.1 After obtaining your explicit consent;
3.3.2 Disclosure based on law: In the case of laws, legal procedures, litigation or mandatory requirements of government authorities, we may disclose your personal information publicly.
4. How do we protect your personal information
4.1 We have used security protection measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "service" is protected by SSL encryption; we also provide https secure browsing to our website; we will use encryption technology to ensure the confidentiality of data; Use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security and privacy protection training courses to strengthen the importance of employees for the protection of personal information understanding.
4.2 We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purpose stated in the cost policy, unless the retention period needs to be extended or permitted by law.
4.3 The Internet is not an absolutely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us keep your account safe.
4.4 The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management and protection facilities are damaged, resulting in unauthorized access to information, public disclosure, tampering, or destruction, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
4.5 After an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, you can independently prevent and Risk reduction recommendations, remedies for you, etc. We will promptly inform you of the relevant circumstances of the incident by mail, letter, telephone, push notification, etc., and when it is difficult to inform the personal information subject one by one, we will adopt a reasonable and effective way to release the announcement.
At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
5. Your rights to personal information
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you exercise the following rights over your personal information:
5.1 Access to your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise data access rights, you can access it yourself in the following ways:
Account Information-If you wish to access or edit the profile information and payment information in your account, change your password, add security information or close your account, etc., you can perform such operations through the app.
Call history-you can view or clear your call history, view and modify, and manage other data in the app.
5.2 Correct your personal information
When you find that the personal information we process about you is wrong, you have the right to ask us to make corrections.
5.3 Delete your personal information
In the following situations, you can submit a request to us to delete personal information:
5.3.1 If our handling of personal information violates laws and regulations;
5.3.2 If we collect and use your personal information without your consent;
5.3.3 If our handling of personal information violates the agreement with you;
5.3.4 If you no longer use our products or services, or you cancel your account;
5.3.5 If we no longer provide products or services for you.
If we decide to respond to your deletion request, we will also notify the entity that obtained your personal information from us and request that it be deleted in a timely manner, unless otherwise stipulated by laws and regulations or these entities obtain your independent authorization.
When you delete information from our service, we may not immediately delete the corresponding information in the backup system, but will delete this information when the backup is updated.
5.4 Change the scope of your authorized consent
Each business function requires some basic personal information to complete (see "Part 1" of this strategy). For the collection and use of additional collected personal information, you can give or withdraw your authorized consent at any time.
You can do it yourself in the following ways:
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out based on your authorization.
5.5 The personal information subject cancels the account
You can cancel the previously registered account at any time through the app.
The cancellation function is located at: "Me"-"Settings"- "Cancel Account".
After canceling the account, we will stop providing you with products or services, and delete your personal information according to your requirements, unless otherwise stipulated by laws and regulations.
5.6 Personal information subject obtains a copy of personal information
Under the premise of technical feasibility, such as data interface matching, we can also directly transfer a copy of your personal information to a third party you specify according to your requirements.
5.7 Automatic decision-making of constrained information system
In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legal rights, you have the right to ask us to explain, and we will also provide appropriate relief.
5.8 Respond to your above request
To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.
For your reasonable request, we will not charge a fee in principle, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. For those that are unreasonably repetitive,
require too many technical means (for example, need to develop new systems or fundamentally change existing practices), pose a risk to the legitimate rights and interests of others or are very impractical (for example, involving information stored on backup tapes) We may refuse the request.
In the following situations, as required by laws and regulations, we will not be able to respond to your request:
1). Related to national security and national defense security;
2). Related to public safety, public health, and major public interests;
3). Related to criminal investigation, prosecution and trial;
4). There is sufficient evidence that you have subjective maliciousness or abuse of rights;
5). Responding to your request will result in serious damage to the legal rights of you or other individuals and organizations.
6. How do we handle children's personal information
Our products, websites and services are mainly for adults. Without the consent of parents or guardians, children may not create their own user accounts.
For the collection of children's personal information with parental consent, we will only use or publicly disclose this information when permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.
Although local laws and customs define children differently, we consider anyone under 14 years old to be a child.
If we find that we have collected children's personal information without prior verifiable parental consent, we will try to delete the relevant data as soon as possible.
7. How your personal information is transferred globally
In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.
Since we provide products or services through resources and servers throughout the world, this means that, after obtaining your authorized consent, your personal information may be transferred to the overseas jurisdiction of the country where you use the products or services, or Received interviews from these jurisdictions.
Such jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will ensure that your personal information is adequately and equally protected in the People's Republic of China. For example, we will ask for your consent to transfer personal information across borders, or implement security measures such as de-identification of data before cross-border data transfer.
8. How to update this privacy policy
We may adjust or change this privacy policy in due course. Any updates to this privacy policy will be posted on our website with the time of the update. Except for the mandatory provisions of laws, regulations or regulatory provisions, adjustments or changes The content will be effective 7 days after notification or announcement. If you continue to use any of the services we provide or visit our related websites after the privacy policy is adjusted or changed, we believe that this means that you have fully read, understood and accepted the revised privacy policy and are bound by it.
9. how to contact us
We have established a dedicated personal information protection department (or personal information protection officer). If you have any questions, comments or suggestions regarding this privacy policy, please contact us by the following means.
Email: support@uwewe.cn
Normally, we will reply within 5 working days.