privacy policy

Update: May. 20, 2022

Chengdu Ruianyun Technology Co., Ltd. (hereinafter referred to as "we") understands the importance of personal information to you and will do its utmost to protect your personal information safe and reliable. We are committed to maintaining your trust in us, abide by the following principles, and protect your personal information: the principle of unanimity of power and responsibility, the principle of clear purpose, the principle of choice and consent, the principle of least sufficient use, the principle of ensuring safety, the principle of subject participation, the principle of transparency . At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with the industry's mature security standards.The personal information we collect in the course of your use of our products will only be used for the purposes set out in this Privacy Policy.

Please read and understand this "Privacy Policy" carefully before using our products ‘WeCall’ (or services).

1. How do we collect and use your personal information
Personal information refers to all kinds of information recorded in electronic or other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person, alone or in combination with other information.
We will only collect and use your personal information for the following purposes described in this policy:
1.1 Provide you with Internet phone service
1.1.1 register as a user
To use our service, you need to create an account so that we can provide you with services such as Internet phone calls, and provide a unique cell phone number and SMS verification code that you can be contacted .
If you log in through a third party account such as WeChat, we will obtain information about your corresponding third party account.
The data we collect when you register/login to the application may also include SDK/API/JS code version, browser, internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, iOS advertising identifier (IDFA), Android advertiser identifier, network card (MAC) address, cell phone number, the International Mobile Equipment Identifier (IMEI), device model, terminal manufacturer, terminal device OS version, session start/stop time, language location, time zone, and network status (WiFi, etc.).
1.1.2 Make internet phone call
In order for you to use the app's make a VoIP call feature, you need to grant the app access to the microphone; the data we collect when you make a call using the VoIP feature includes the called number, the start and end time of the call.
1.1.3 Cloud address book and make VoIP calls through mobile address book
In order to facilitate you to call phone numbers of mobile contacts, edit contact information, and use the cloud address book function in the app, you need to grant the app permission to read/modify your phone address book, and you can access the app to use other functions without providing this authorization.
1.1.4 Query/modify call records
In order to facilitate you to make VoIP calls through call logs in the application and to merge the call logs of this application with the call logs of your cell phone in some cell phones, you need to grant the application the permission to query/modify the call logs, without providing this authorization, you can access the application to use other functions. This part of information is not collected by the application.
1.1.5 Record calls and store them locally
In order for you to use the call recording function and view the number attribution information, you need to grant the application permission to read and write the phone storage, the recording file is stored locally, the application does not collect this information.
1.1.6 Function of edit avatar and call background
You can edit your avatar and related background in the app, in order to use this feature, you need to grant the app access to the camera, read photo albums, the app does not collect this information
1.1.7 Function of ivitation with prize
When you use the function of inviting your friends , the invitation link and invitation QR code generated by the App for you will contain the user's ID information in order to accurately issue the reward.
The above information you provide will continue to authorize us to use it during your use of this service. When you cancel your account, we will stop using and delete the above information.
1.2 To enhance service functions and improve service experience
In order to provide you with services that are better suited to you, our products and services may include products and services from third parties and links to third party websites. When you use these products or services, your information may also be collected. The third party SKDs that we currently access are as follows.
1.2.1 Umeng plus
1.2.1.1 Scenario Description: Statistical Analysis Services
SDK Name: Statistical Analysis SDK
Personal information field: collects device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to uniquely identify the device, which is a prerequisite for statistical analysis data. Collect geographic location to correct the geographical distribution of report data and provide anti-cheating services.
1.2.1.2 Scenario description: Invitation to share
SDK Name: Social Sharing SDK
Personal information field: collects device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to uniquely identify the device for sharing messages to the target device. Capture geographic location to screen sharing channels and provide anti-cheating services.
Third-party SDK provider name: Youmeng Tongxin (Beijing) Technology Co.
1.2.2 Pangle
SDK name: Pangle
Scenario Description: Request advertising information
1.2.2.1 In order to provide ad placement and ad monitoring attribution, anti-cheating, the following device information may be obtained
[Android & iOS] Basic information such as device brand, model, software system version, resolution, network signal strength, device language, sensor information, etc.
[Android only] Android ID
[iOS only] Mobile phone system reboot time, total disk space, total system memory space, CPU number and other basic information, IDFV
In addition, based on the purpose of optimization of advertising effect, we may need to provide the following information to the penetrator.
[Dual-ended] IP address, wireless network SSID name, WiFi router MAC address, MAC address of the device (for iOS side, only for IOS3200 version or below)
[Android only] device identifier (such as IMEI, OAID, IMSI, ICCID, GAID (GMS service only), MEID, device serial number build_serial, specific fields differ depending on the hardware and software version)
[iOS only] device identifier (such as IDFA, specific fields vary by hardware and software version)
1.2.2.2 For the purpose of ad placement and anti-cheating, the following device information may be obtained
[Android only] Developer application name, application package name, version number, application front and back status
1.2.2.3 For the purpose of ad monitoring attribution, statistical analysis of ad placement, and anti-cheating, the following ad information may be obtained
[Android and iOS] Interaction data of display, click and conversion of ads
1.2.2.4 Possible access to location information for ad targeting and anti-cheating purposes
1.2.2.5 To reduce App crashes, provide stable and reliable services, obtain crash data, performance data, etc.
1.2.2.6 For the purpose of advertising and anti-cheating, we may also obtain other information such as operator information and device time zone
Third-party SDK provider name: Hubei JinriToutiao Technology Co.
1.2.3 Alipay
SDK name: App payment
Scenario Description: Integrate Alipay payment function in the App
Information Collection:
[Android] We collect commonly used device information (such as IMEI/IMSI, SIM card serial number/MAC address), network information, and geographic location information for security risk control during user login account and payment process, other than the above information, we do not collect other personal data information of users through third party applications.
[iOS] We collect commonly used device information (such as IMEI/IMSI, SIM card serial number/MAC address), network information, and geographic location information for the purpose of securing users' accounts. Other than the above information, we do not collect other personal data information of users through third-party applications.
Third-party SDK Provider: Alipay (China) Network Technology Co.
1.2.4 WeChat Payment
SDK name: WeChat Payment
Scenario Description: The merchant integrates the open SDK in the mobile application APP to call up the WeChat payment module to complete the payment mode
WeChat Pay (Tencent Technology (Shenzhen) Co., Ltd.) SDK will collect your device information (may include IMEI, IMSI, device MAC address, Android Id, device model, network type, wireless network list, wireless network MAC address, wireless network name, sensor information, SIM serial number information), location information, cell phone number, the collection of invoked Android privileges for personal information may include: ACCESS_COARSE_LOCATION, ACCESS_FINE_LOCATION, READ_PHONE_STATE, WRITE_EXTERNAL_STORAGE, ACCESS_NETWORK_STATE, ACCESS_WIFI_ STATE.
1.2.5 Tencent browsing service SDK
SDK name: Tencent browsing service ( TBS )
Scenario description: Network dial service
Information collection:
In order to realize the specific business functions of various Tencent browsing service SDK, we may need to collect relevant personal information from developers and/or end users. The following will list in detail the various business functions of the Tencent Browsing Service SDK and the personal information collected for the realization of these functions:
1.2.5.1 In order to control the grayscale distribution and data statistics of the X5 kernel version, we will apply to the developer to obtain the Mac address and unique device identification code (IMSI, AndroidID) of the end-user device, and finally the developer will obtain the authorization of the end-user (The way to obtains the authorization of the end user is determined by the system device developer and the developer's application) and the products and/or services provided by the developer, to decide whether to provide the above information.
1.2.5.2 In order to find the available X5 kernel version on the user's memory card in order to increase the user's X5 ratio, we will access the user's storage permission with the user's authorization; if this permission is not provided, it may affect your use of the X5 kernel ratio.
1.2.5.3 In order to accurately control the release of kernel version and switch, and based on the webview standard protocol, we need to obtain the user's mobile phone model to ensure the accuracy and effectiveness of the service.
1.2.5.4 In order to facilitate users to search and share the copied content, we need to access the clipboard and read the links and content contained in it, so as to ensure the realization of functions such as search and sharing.
Third-party SDK provider name: Shenzhen Tencent Computer System Co., Ltd.
When we want to use information collected for a specific purpose for other purposes, we will ask for your consent in advance.
2. how do we use cookies and similar technologies
2.1 Cookie
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, the website can store data such as your preferences or products in the shopping basket.
We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer. Most web browsers have a function to block cookies. However, if you do this, you will need to change user settings yourself each time you visit our website. To learn more about how to change your browser settings, please visit the following links: , , , and .
2.2 Web beacons and pixel tags
In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our websites. For example, the email we send you may contain a click URL that links to the content of our website. If you click the link, we will track the click to help us understand your product or service preferences and improve customer service. Web beacons are usually a transparent image embedded in a website or email. With the help of the pixel tag in the email, we can know whether the email is opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
2.3 Do Not Track (Do Not Track)
Many web browsers are equipped with Do Not Track function, which can issue Do Not Track requests to websites. At present, major Internet standards organizations have not established policies to regulate how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our websites will respect your choice.
3. How do we share, transfer and publicly disclose your personal information
3.1 Sharing
We will not share your personal information with any other companies, organizations and individuals, except for the following:
1). Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
2). We may share your personal information externally in accordance with the provisions of laws and regulations, or in accordance with the compulsory requirements of the competent government department.
3). Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share the necessary personal information and are bound by the purpose stated in this privacy policy. If an affiliated company wants to change the purpose of processing personal information, it will seek your authorization and consent again.
Our affiliates include: Chengdu Ruianyun Technology Co., Ltd.
4). Sharing with authorized partners: For the purposes stated in this privacy policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and only share the personal information necessary to provide services.
For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them and require them to process personal information in accordance with our instructions, this privacy policy and any other related confidentiality and security measures.
3.2 Transfer
We will not transfer your personal information to any company, organization or individual, except for the following:
3.2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
3.2.2 When it involves mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy, otherwise we will require that company or organization Ask you for authorization again.
3.3 Public disclosure
We will only publicly disclose your personal information in the following situations:
3.3.1 After obtaining your explicit consent;
3.3.2 Disclosure based on law: In the case of laws, legal procedures, litigation or mandatory requirements of government authorities, we may disclose your personal information publicly.
4. How do we protect your personal information
4.1 We have used security protection measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "service" is protected by SSL encryption; we also provide https secure browsing to our website; we will use encryption technology to ensure the confidentiality of data; Use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security and privacy protection training courses to strengthen the importance of employees for the protection of personal information understanding.
4.2 We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purpose stated in the cost policy, unless the retention period needs to be extended or permitted by law.
4.3 The Internet is not an absolutely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us keep your account safe.
4.4 The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management and protection facilities are damaged, resulting in unauthorized access to information, public disclosure, tampering, or destruction, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
4.5 After an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, you can independently prevent and Risk reduction recommendations, remedies for you, etc. We will promptly inform you of the relevant circumstances of the incident by mail, letter, telephone, push notification, etc., and when it is difficult to inform the personal information subject one by one, we will adopt a reasonable and effective way to release the announcement.
At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
5. Your rights to personal information
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you exercise the following rights over your personal information:
5.1 Access to your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise data access rights, you can access it yourself in the following ways:
Account Information-If you wish to access or edit the profile information and payment information in your account, change your password, add security information or close your account, etc., you can perform such operations through the app.
Call history-you can view or clear your call history, view and modify, and manage other data in the app.
5.2 Correct your personal information
When you find that the personal information we process about you is wrong, you have the right to ask us to make corrections.
5.3 Delete your personal information
In the following situations, you can submit a request to us to delete personal information:
5.3.1 If our handling of personal information violates laws and regulations;
5.3.2 If we collect and use your personal information without your consent;
5.3.3 If our handling of personal information violates the agreement with you;
5.3.4 If you no longer use our products or services, or you cancel your account;
5.3.5 If we no longer provide products or services for you.
If we decide to respond to your deletion request, we will also notify the entity that obtained your personal information from us and request that it be deleted in a timely manner, unless otherwise stipulated by laws and regulations or these entities obtain your independent authorization.
When you delete information from our service, we may not immediately delete the corresponding information in the backup system, but will delete this information when the backup is updated.
5.4 Change the scope of your authorized consent
Each business function requires some basic personal information to complete (see "Part 1" of this strategy). For the collection and use of additional collected personal information, you can give or withdraw your authorized consent at any time.
You can do it yourself in the following ways:
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out based on your authorization.
5.5 The personal information subject cancels the account
You can cancel the previously registered account at any time through the app.
After canceling the account, we will stop providing you with products or services, and delete your personal information according to your requirements, unless otherwise stipulated by laws and regulations.
5.6 Personal information subject obtains a copy of personal information
Under the premise of technical feasibility, such as data interface matching, we can also directly transfer a copy of your personal information to a third party you specify according to your requirements.
5.7 Automatic decision-making of constrained information system
In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legal rights, you have the right to ask us to explain, and we will also provide appropriate relief.
5.8 Respond to your above request
To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.
For your reasonable request, we will not charge a fee in principle, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. For those that are unreasonably repetitive,
require too many technical means (for example, need to develop new systems or fundamentally change existing practices), pose a risk to the legitimate rights and interests of others or are very impractical (for example, involving information stored on backup tapes) We may refuse the request.
In the following situations, as required by laws and regulations, we will not be able to respond to your request:
1). Related to national security and national defense security;
2). Related to public safety, public health, and major public interests;
3). Related to criminal investigation, prosecution and trial;
4). There is sufficient evidence that you have subjective maliciousness or abuse of rights;
5). Responding to your request will result in serious damage to the legal rights of you or other individuals and organizations.

6. How do we handle children's personal information
Our products, websites and services are mainly for adults. Without the consent of parents or guardians, children may not create their own user accounts.
For the collection of children's personal information with parental consent, we will only use or publicly disclose this information when permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.
Although local laws and customs define children differently, we consider anyone under 14 years old to be a child.
If we find that we have collected children's personal information without prior verifiable parental consent, we will try to delete the relevant data as soon as possible.

7. How your personal information is transferred globally
In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.
Since we provide products or services through resources and servers throughout the world, this means that, after obtaining your authorized consent, your personal information may be transferred to the overseas jurisdiction of the country where you use the products or services, or Received interviews from these jurisdictions.
Such jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will ensure that your personal information is adequately and equally protected in the People's Republic of China. For example, we will ask for your consent to transfer personal information across borders, or implement security measures such as de-identification of data before cross-border data transfer.

8. How to update this privacy policy
We may adjust or change this privacy policy in due course. Any updates to this privacy policy will be posted on our website with the time of the update. Except for the mandatory provisions of laws, regulations or regulatory provisions, adjustments or changes The content will be effective 7 days after notification or announcement. If you continue to use any of the services we provide or visit our related websites after the privacy policy is adjusted or changed, we believe that this means that you have fully read, understood and accepted the revised privacy policy and are bound by it.

9. how to contact us
We have established a dedicated personal information protection department (or personal information protection officer). If you have any questions, comments or suggestions regarding this privacy policy, please contact us by the following means.
Email: support@uwewe.cn
Normally, we will reply within 5 working days.

隐私协议

更新日期:2022年09月20日

成都瑞安云科技股份有限公司(以下简称“我们”)深知个人隐私的重要性,并会尽全力保护您的个人信息安全可靠。我们致力于维持您对我们的信任,恪守以下原则,保护您的个人信息:权责一致原则、目的明确原则、选择同意原则、最少必要原则、确保安全原则、主体参与原则、公开透明原则等。同时,我们承诺,我们将按业界成熟的安全标准,采取相应的安全保护措施来保护您的个人信息。我们在您使用我们产品的过程中所收集到的个人信息将只用于本《隐私权政策》中所规定的用途。

请在使用我们的产品“微微电话”(或服务)前,仔细阅读并了解本《隐私权政策》。

一、我们如何收集和使用您的个人信息 “个人信息”是指以电子或者其他方式记录的能够单独或者与其他信息结合识别特定自然人身份或者反映特定自然人活动情况的各种信息。
我们仅会出于本政策所述的以下目的,收集和使用您的个人信息:
(一)为您提供网络电话服务
1、注册成为用户
你使用我们的服务,需要创建账号,便于我们为您提供网络电话拨打等服务,并提供可以通话联络的的唯一手机号码、短信息验证码。
如果您通过微信等第三方账号登录,我们将获取您对应第三方账号的相关信息。
您注册/登录应用时,我们收集的数据还可能包括SDK/API/JS代码版本、浏览器、互联网服务提供商、IP地址、平台、时间戳、应用标识符、应用程序版本、应用分发渠道、独立设备标识符、iOS广告标识符(IDFA)、安卓广告主标识符、网卡(MAC)地址、手机号码、国际移动设备识别码(IMEI)、设备型号、终端制造厂商、终端设备操作系统版本、会话启动/停止时间、语言所在地、时区和网络状态(WiFi等)等。
2、拨打网络电话
为便于您使用应用的拨打网络电话功能,您需要授予应用对麦克风的使用权限;您使用网络电话功能拨打电话时,我们收集的数据包括被叫号码、通话开始、结束时间。
3、云通讯录及通过手机通讯录拨打网络电话
为便于您在应用中拨打手机联系人的电话号码、编辑联系人信息,以及使用云通讯录功能,需要您授予应用读取/修改手机通讯录的权限,不提供此授权可以进入应用使用其他功能。
您使用云通讯录功能备份通讯录时,我们会收集您手机通讯录信息。
4、查询/修改通话记录
为便于您在应用中通过通话记录拨打网络电话以及在部分手机中将本应用通话记录和手机通话记录合并,需要您授予应用查询/修改通话记录的权限,不提供此授权,可以进入应用使用其他功能。这部分信息应用没有收集。
5、对通话进行录音并存储在本地
为便于您使用通话录音功能以及查看号码归属地信息,您需要授予应用读写手机存储的权限,录音文件存储在本机,应用没有收集此信息;
6、编辑头像、通话背景功能
您可以编辑应用中您的头像及相关背景,为使用此功能,您需要授予应用访问摄像头、读取相册的权限,应用没有收集此信息。
7、邀请好友获得奖励的功能
当您使用邀请好友的功能时,App为您生成的邀请链接和邀请二维码将包含用户的ID信息,以便准确发放奖励。
您提供的上述信息,将在您使用本服务期间持续授权我们使用。在您注销账号时,我们将停止使用并删除上述信息。
(二)为增强服务功能和改善服务体验
为向您提供更适合您的服务,我公司的产品和服务可能包括第三方的产品和服务,以及第三方网站的链接。当您使用这些产品或服务时,也可能收集您的信息。目前我公司接入的第三方SKD如下:
(1)友盟+
SDK 名称:统计分析 SDK
场景描述:统计分析服务
个人信息字段:采集设备标识符(IMEI/Mac/android ID/IDFA/OPENUDID/GUID、SIM 卡 IMSI 信息),用于唯一标识设备,这是统计分析数据的前提。采集地理位置矫正报表数据地域分布,提供反作弊服务。
SDK 名称:社会化分享 SDK
场景描述:邀请分享
个人信息字段:采集设备标识符(IMEI/Mac/android ID/IDFA/OPENUDID/GUID、SIM 卡 IMSI 信息),用于唯一标识设备,以便向目标设备分享消息。采集地理位置甄别分享通道,提供反作弊服务。
第三方SDK公司名称:友盟同欣(北京)科技有限公司
(2)穿山甲
SDK 名称:穿山甲
场景描述:广告投放合作
a. 为了提供广告投放及广告监测归因、反作弊,可能获取以下设备信息:
【双端】设备品牌、型号、软件系统版本、分辨率、网络信号强度、设备语言、传感器信息等基础信息
【仅Android】AndroidID
【仅iOS】手机系统重启时间、磁盘总空间、系统总内存空间、CPU数目等基础信息、IDFV
另外基于广告投放效果优化的目的需要可能向穿山甲提供如下信息:
【双端】IP地址、无线网SSID名称、WiFi路由器MAC地址、设备的MAC地址(如为iOS端,则仅适用于IOS3200以下版本)
【仅Android】设备标识符(如IMEI、OAID、IMSI、ICCID、GAID(仅GMS服务)、MEID、设备序列号build_serial,具体字段因软硬件版本不同而存在差异)
【仅iOS】设备标识符(如IDFA,具体字段因软硬件版本不同而存在差异)
b. 为了广告投放、反作弊,可能获取以下设备信息
【仅Android】开发者应用名、应用包名、版本号、应用前后台状态
c. 为了广告监测归因、广告投放统计分析、反作弊,可能获取如下广告信息
【双端】对广告的展示、点击及转化等交互数据
d. 为了广告定向投放及反作弊,可能获取位置信息
e. 为了减少App崩溃、提供稳定可靠的服务,获取崩溃数据、性能数据等
f. 为了广告投放、反作弊,还可能获取运营商信息、设备时区等其他信息
第三方SDK公司名称:湖北今日头条科技有限公司
(3)支付宝
SDK 名称:App支付
场景描述:在 App 应用中集成支付宝支付功能
信息采集:
【Android】采集常用设备信息(如IMEI/IMSI、SIM卡序列号/MAC地址)、网络信息以及地理位置信息,用于用户登录账户和支付过程中的安全风控,除上述信息之外,我们不会通过第三方应用收集用户的其他个人数据信息。
【IOS】采集常用设备信息(如IMEI/IMSI、SIM卡序列号/MAC地址)、网络信息以及地理位置信息,用于保障用户的账号安全,除上述信息之外,我们不会通过第三方应用收集用户的其他个人数据信息。
第三方SDK公司名称:支付宝(中国)网络技术有限公司
(4)微信支付
SDK 名称:微信 APP 支付
场景描述:商户通过在移动端应用APP中集成开放SDK调起微信支付模块完成支付的模式
微信支付(腾讯科技(深圳)有限公司)SDK会收集您的设备信息(可能包括IMEI、IMSI、设备MAC地址、Android Id、设备型号、网络类型、无线网络列表、无线网络MAC地址、无线网络名称、传感器信息、SIM序列号信息)、位置信息、手机号,调用的收集个人信息的安卓权限可能包括
ACCESS_COARSE_LOCATION、ACCESS_FINE_LOCATION、READ_PHONE_STATE、WRITE_EXTERNAL_STORAGE、ACCESS_NETWORK_STATE、ACCESS_WIFI_STATE;
(5)腾讯浏览服务SDK
SDK名称:腾讯浏览服务(TBS)
场景描述:网络电话呼叫服务。
信息采集:
为实现各类腾讯浏览服务SDK的特定业务功能,我们可能需要向开发者和/或终端用户收集相关个人信息。以下将详细列出腾讯浏览服务SDK的各项业务功能及为实现该功能所收集的个人信息情况:
A、 为了控制X5内核版本灰度下发及数据统计,我们会向开发者申请获取终端用户设备Mac地址和唯一设备识别码(IMSI、AndroidID),最终由开发者基于其获取终端用户授权的情况(开发者获取终端用户授权的方式由系统设备开发方及开发者应用决定)以及开发者提供的产品和/或服务的情况,决定是否提供上述信息。
B、为了查找用户内存卡上的可用X5内核版本,以便提升用户的X5占比,我们会经用户授权同意后访问用户的存储权限;如果不提供该权限,可能会影响您使用X5内核的占比。
C、为了准确控制内核版本下发和开关下发,以及基于webview标准协议,我们需要获取用户的手机型号,从而保证服务的准确性、有效性。
D、为了便于用户搜索、分享已复制的内容,我们需要访问剪切板,读取其中包含的链接、内容,从而保证搜索、分享等功能的实现。
第三方SDK公司名称:深圳市腾讯计算机系统有限公司

当我们要将信息用于本策略未载明的其它用途时,会事先征求您的同意。
(一)Cookie
为确保网站正常运转,我们会在您的计算机或移动设备上存储名为 Cookie 的小数据文件。Cookie 通常包含标识符、站点名称以及一些号码和字符。借助于 Cookie,网站能够存储您的偏好或购物篮内的商品等数据。
我们不会将 Cookie 用于本政策所述目的之外的任何用途。您可根据自己的偏好管理或删除 Cookie。您可以清除计算机上保存的所有 Cookie,大部分网络浏览器都设有阻止 Cookie 的功能。但如果您这么做,则需要在每一次访问我们的网站时亲自更改用户设置。如需详细了解如何更改浏览器设置,请访问以下链接:Internet Explorer、Google Chrome、Mozilla Firefox、Safari 和 Opera。
(二)网站信标和像素标签
除 Cookie 外,我们还会在网站上使用网站信标和像素标签等其他同类技术。例如,我们向您发送的电子邮件可能含有链接至我们网站内容的点击 URL。如果您点击该链接,我们则会跟踪此次点击,帮助我们了解您的产品或服务偏好并改善客户服务。网站信标通常是一种嵌入到网站或电子邮件中的透明图像。借助于电子邮件中的像素标签,我们能够获知电子邮件是否被打开。如果您不希望自己的活动以这种方式被追踪,则可以随时从我们的寄信名单中退订。
(三)Do Not Track(请勿追踪)
很多网络浏览器均设有 Do Not Track 功能,该功能可向网站发布 Do Not Track 请求。目前,主要互联网标准组织尚未设立相关政策来规定网站应如何应对此类请求。但如果您的浏览器启用了 Do Not Track,那么我们的所有网站都会尊重您的选择。

三、我们如何共享、转让、公开披露您的个人信息
(一)共享
我们不会向其他任何公司、组织和个人分享您的个人信息,但以下情况除外:
1、在获取明确同意的情况下共享:获得您的明确同意后,我们会与其他方共享您的个人信息。
2、我们可能会根据法律法规规定,或按政府主管部门的强制性要求,对外共享您的个人信息。
3、与我们的关联公司共享:您的个人信息可能会与我们关联公司共享。我们只会共享必要的个人信息,且受本隐私政策中所声明目的的约束。关联公司如要改变个人信息的处理目的,将再次征求您的授权同意。
我们的关联公司包括: 成都瑞安云科技股份有限公司。
4、与授权合作伙伴共享:仅为实现本隐私权政策中声明的目的,我们的某些服务将由授权合作伙伴提供。我们可能会与合作伙伴共享您的某些个人信息,以提供更好的客户服务和用户体验。例如,我们聘请来提供第三方数据统计和分析服务的公司可能需要采集和访问个人数据以进行数据统计和分析。在这种情况下,这些公司 必须遵守我们的数据隐私和安全要求。我们仅会出于合法、正当、必要、特定、明确的目的共享您的个人信息,并且只会共享提供服务所必要的个人信息。
对我们与之共享个人信息的公司、组织和个人,我们会与其签署严格的保密协定,要求他们按照我们的说明、本隐私政策以及其他任何相关的保密和安全措施来处理个人信息。
(二)转让
我们不会将您的个人信息转让给任何公司、组织和个人,但以下情况除外:
1、在获取明确同意的情况下转让:获得您的明确同意后,我们会向其他方转让您的个人信息;
2、在涉及合并、收购或破产清算时,如涉及到个人信息转让,我们会在要求新的持有您个人信息的公司、组织继续受此隐私政策的约束,否则我们将要求该公司、组织重新向您征求授权同意。
(三)公开披露
我们仅会在以下情况下,公开披露您的个人信息:
1、获得您明确同意后;
2、基于法律的披露:在法律、法律程序、诉讼或政府主管部门强制性要求的情况下,我们可能会公开披露您的个人信息。

四、我们如何保护您的个人信息
(一)我们已使用符合业界标准的安全防护措施保护您提供的个人信息,防止数据遭到未经授权访问、公开披露、使用、修改、损坏或丢失。我们会采取一切合理可行的措施,保护您的个人信息。例如,在您的浏览器与“服务”之间交换数据(如信用卡信息)时受 SSL 加密保护;我们同时对我们网站提供 https 安全浏览方式;我们会使用加密技术确保数据的保密性;我们会使用受信赖的保护机制防止数据遭到恶意攻击;我们会部署访问控制机制,确保只有授权人员才可访问个人信息;以及我们会举办安全和隐私保护培训课程,加强员工对于保护个人信息重要性的认识。
(二)我们会采取一切合理可行的措施,确保未收集无关的个人信息。我们只会在达成本政策所述目的所需的期限内保留您的个人信息,除非需要延长保留期或受到法律的允许。
(三)互联网并非绝对安全的环境,而且电子邮件、即时通讯、及与其他我们用户的交流方式并未加密,我们强烈建议您不要通过此类方式发送个人信息。请使用复杂密码,协助我们保证您的账号安全。
(四)互联网环境并非百分之百安全,我们将尽力确保或担保您发送给我们的任何信息的安全性。如果我们的物理、技术、或管理防护设施遭到破坏,导致信息被非授权访问、公开披露、篡改、或毁坏,导致您的合法权益受损,我们将承担相应的法律责任。
(五)在不幸发生个人信息安全事件后,我们将按照法律法规的要求,及时向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的处置措施、您可自主防范和降低风险的建议、对您的补救措施等。我们将及时将事件相关情况以邮件、信函、电话、推送通知等方式告知您,难以逐一告知个人信息主体时,我们会采取合理、有效的方式发布公告。
同时,我们还将按照监管部门要求,主动上报个人信息安全事件的处置情况。

五、您的个人信息权利
按照中国相关的法律、法规、标准,以及其他国家、地区的通行做法,我们保障您对自己的个人信息行使以下权利:
(一)访问您的个人信息
您有权访问您的个人信息,法律法规规定的例外情况除外。如果您想行使数据访问权,可以通过以下方式自行访问:
账户信息——如果您希望访问或编辑您的账户中的个人资料信息和支付信息、更改您的密码、添加安全信息或关闭您的账户等,您可以通过app执行此类操作。
通话记录——您可以在app中查看或清除您的通话记录、查看和修改以及管理其他数据。
(二)更正您的个人信息
当您发现我们处理的关于您的个人信息有错误时,您有权要求我们做出更正。
(三)删除您的个人信息
在以下情形中,您可以向我们提出删除个人信息的请求:
1、如果我们处理个人信息的行为违反法律法规;
2、如果我们收集、使用您的个人信息,却未征得您的同意;
3、如果我们处理个人信息的行为违反了与您的约定;
4、如果您不再使用我们的产品或服务,或您注销了账号;
5、如果我们不再为您提供产品或服务。
若我们决定响应您的删除请求,我们还将同时通知从我们获得您的个人信息的实体,要求其及时删除,除非法律法规另有规定,或这些实体获得您的独立授权。
当您从我们的服务中删除信息后,我们可能不会立即备份系统中删除相应的信息,但会在备份更新时删除这些信息。
(四)改变您授权同意的范围
每个业务功能需要一些基本的个人信息才能得以完成(见本策略“第一部分”)。对于额外收集的个人信息的收集和使用,您可以随时给予或收回您的授权同意。
您可以通过以下方式自行操作:
当您收回同意后,我们将不再处理相应的个人信息。但您收回同意的决定,不会影响此前基于您的授权而开展的个人信息处理。
(五)个人信息主体注销账户
您随时可通过app注销此前注册的账户。
在注销账户之后,我们将停止为您提供产品或服务,并依据您的要求,删除您的个人信息,法律法规另有规定的除外。
(六)个人信息主体获取个人信息副本
在技术可行的前提下,例如数据接口匹配,我们还可按您的要求,直接将您的个人信息副本传输给您指定的第三方。
(七)约束信息系统自动决策
在某些业务功能中,我们可能仅依据信息系统、算法等在内的非人工自动决策机制做出决定。如果这些决定显著影响您的合法权益,您有权要求我们做出解释,我们也将提供适当的救济方式。
(八)响应您的上述请求
为保障安全,您可能需要提供书面请求,或以其他方式证明您的身份。我们可能会先要求您验证自己的身份,然后再处理您的请求。
对于您合理的请求,我们原则上不收取费用,但对多次重复、超出合理限度的请求,我们将视情收取一定成本费用。对于那些无端重复、需要过多技术手段(例如,需要开发新系统或从根本上改变现行惯例)、给他人合法权益带来风险或者非常不切实际(例如,涉及备份磁带上存放的信息)的请求,我们可能会予以拒绝。
在以下情形中,按照法律法规要求,我们将无法响应您的请求:
1、与国家安全、国防安全有关的;
2、与公共安全、公共卫生、重大公共利益有关的;
3、与犯罪侦查、起诉和审判等有关的;
4、有充分证据表明您存在主观恶意或滥用权利的;
5、响应您的请求将导致您或其他个人、组织的合法权益受到严重损害的。

六、我们如何处理未成年人的个人信息
我们的产品、网站和服务主要面向成人。如果没有父母或监护人的同意,未成年人不得创建自己的用户账户。
对于经父母同意而收集儿童个人信息的情况,我们只会在受到法律允许、父母或监护人明确同意或者保护儿童所必要的情况下使用或公开披露此信息。
尽管当地法律和习俗对儿童的定义不同,但我们将不满 14 周岁的任何人均视为儿童。
如果我们发现自己在未事先获得可证实的父母同意的情况下收集了儿童的个人信息,则会设法尽快删除相关数据。

七、您的个人信息如何在全球范围转移
原则上,我们在中华人民共和国境内收集和产生的个人信息,将存储在中华人民共和国境内。
由于我们通过遍布全球的资源和服务器提供产品或服务,这意味着,在获得您的授权同意后,您的个人信息可能会被转移到您使用产品或服务所在国家/地区的境外管辖区,或者受到来自这些管辖区的访问。
此类管辖区可能设有不同的数据保护法,甚至未设立相关法律。在此类情况下,我们会确保您的个人信息得到在中华人民共和国境内足够同等的保护。例如,我们会请求您对跨境转移个人信息的同意,或者在跨境数据转移之前实施数据去标识化等安全举措。

八、本隐私权政策如何更新
我们可能适时会对本隐私权政策进行调整或变更,本隐私权政策的任何更新将以标注更新时间的方式公布在我们网站上,除法律法规或监管规定另有强制性规定外,经调整或变更的内容一经通知或公布后的7日后生效。如您在隐私权政策调整或变更后继续使用我们提供的任一服务或访问我们相关网站的,我们相信这代表您已充分阅读、理解并接受修改后的隐私权政策并受其约束。

九、如何联系我们
我们设立了个人信息保护专职部门(或个人信息保护专员),如果您对本隐私政策有任何疑问、意见或建议,通过以下方式与我们联系。
邮箱:support@uwewe.cn。
一般情况下,我们将在5个工作日内回复。