Update: May. 20, 2022
1. How do we collect and use your personal information
Personal information refers to all kinds of information recorded in electronic or other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person, alone or in combination with other information.
We will only collect and use your personal information for the following purposes described in this policy:
1.1 Provide you with Internet phone service
1.1.1 register as a user
To use our service, you need to create an account so that we can provide you with services such as Internet phone calls, and provide a unique cell phone number and SMS verification code that you can be contacted .
If you log in through a third party account such as WeChat, we will obtain information about your corresponding third party account.
The data we collect when you register/login to the application may also include SDK/API/JS code version, browser, internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, iOS advertising identifier (IDFA), Android advertiser identifier, network card (MAC) address, cell phone number, the International Mobile Equipment Identifier (IMEI), device model, terminal manufacturer, terminal device OS version, session start/stop time, language location, time zone, and network status (WiFi, etc.).
1.1.2 Make internet phone call
In order for you to use the app's make a VoIP call feature, you need to grant the app access to the microphone; the data we collect when you make a call using the VoIP feature includes the called number, the start and end time of the call.
1.1.3 Cloud address book and make VoIP calls through mobile address book
In order to facilitate you to call phone numbers of mobile contacts, edit contact information, and use the cloud address book function in the app, you need to grant the app permission to read/modify your phone address book, and you can access the app to use other functions without providing this authorization.
1.1.4 Query/modify call records
In order to facilitate you to make VoIP calls through call logs in the application and to merge the call logs of this application with the call logs of your cell phone in some cell phones, you need to grant the application the permission to query/modify the call logs, without providing this authorization, you can access the application to use other functions. This part of information is not collected by the application.
1.1.5 Record calls and store them locally
In order for you to use the call recording function and view the number attribution information, you need to grant the application permission to read and write the phone storage, the recording file is stored locally, the application does not collect this information.
1.1.6 Function of edit avatar and call background
You can edit your avatar and related background in the app, in order to use this feature, you need to grant the app access to the camera, read photo albums, the app does not collect this information
1.1.7 Function of ivitation with prize
When you use the function of inviting your friends , the invitation link and invitation QR code generated by the App for you will contain the user's ID information in order to accurately issue the reward.
The above information you provide will continue to authorize us to use it during your use of this service. When you cancel your account, we will stop using and delete the above information.
1.2 To enhance service functions and improve service experience
In order to provide you with services that are better suited to you, our products and services may include products and services from third parties and links to third party websites. When you use these products or services, your information may also be collected. The third party SKDs that we currently access are as follows.
1.2.1 Umeng plus
18.104.22.168 Scenario Description: Statistical Analysis Services
SDK Name: Statistical Analysis SDK
Personal information field: collects device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to uniquely identify the device, which is a prerequisite for statistical analysis data. Collect geographic location to correct the geographical distribution of report data and provide anti-cheating services.
22.214.171.124 Scenario description: Invitation to share
SDK Name: Social Sharing SDK
Personal information field: collects device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to uniquely identify the device for sharing messages to the target device. Capture geographic location to screen sharing channels and provide anti-cheating services.
Third-party SDK provider name: Youmeng Tongxin (Beijing) Technology Co.
SDK name: Pangle
Scenario Description: Request advertising information
126.96.36.199 In order to provide ad placement and ad monitoring attribution, anti-cheating, the following device information may be obtained
[Android & iOS] Basic information such as device brand, model, software system version, resolution, network signal strength, device language, sensor information, etc.
[Android only] Android ID
[iOS only] Mobile phone system reboot time, total disk space, total system memory space, CPU number and other basic information, IDFV
In addition, based on the purpose of optimization of advertising effect, we may need to provide the following information to the penetrator.
[Dual-ended] IP address, wireless network SSID name, WiFi router MAC address, MAC address of the device (for iOS side, only for IOS3200 version or below)
[Android only] device identifier (such as IMEI, OAID, IMSI, ICCID, GAID (GMS service only), MEID, device serial number build_serial, specific fields differ depending on the hardware and software version)
[iOS only] device identifier (such as IDFA, specific fields vary by hardware and software version)
188.8.131.52 For the purpose of ad placement and anti-cheating, the following device information may be obtained
[Android only] Developer application name, application package name, version number, application front and back status
184.108.40.206 For the purpose of ad monitoring attribution, statistical analysis of ad placement, and anti-cheating, the following ad information may be obtained
[Android and iOS] Interaction data of display, click and conversion of ads
220.127.116.11 Possible access to location information for ad targeting and anti-cheating purposes
18.104.22.168 To reduce App crashes, provide stable and reliable services, obtain crash data, performance data, etc.
22.214.171.124 For the purpose of advertising and anti-cheating, we may also obtain other information such as operator information and device time zone
Third-party SDK provider name: Hubei JinriToutiao Technology Co.
SDK name: App payment
Scenario Description: Integrate Alipay payment function in the App
[Android] We collect commonly used device information (such as IMEI/IMSI, SIM card serial number/MAC address), network information, and geographic location information for security risk control during user login account and payment process, other than the above information, we do not collect other personal data information of users through third party applications.
[iOS] We collect commonly used device information (such as IMEI/IMSI, SIM card serial number/MAC address), network information, and geographic location information for the purpose of securing users' accounts. Other than the above information, we do not collect other personal data information of users through third-party applications.
Third-party SDK Provider: Alipay (China) Network Technology Co.
1.2.4 WeChat Payment
SDK name: WeChat Payment
Scenario Description: The merchant integrates the open SDK in the mobile application APP to call up the WeChat payment module to complete the payment mode
WeChat Pay (Tencent Technology (Shenzhen) Co., Ltd.) SDK will collect your device information (may include IMEI, IMSI, device MAC address, Android Id, device model, network type, wireless network list, wireless network MAC address, wireless network name, sensor information, SIM serial number information), location information, cell phone number, the collection of invoked Android privileges for personal information may include: ACCESS_COARSE_LOCATION, ACCESS_FINE_LOCATION, READ_PHONE_STATE, WRITE_EXTERNAL_STORAGE, ACCESS_NETWORK_STATE, ACCESS_WIFI_ STATE.
1.2.5 Tencent browsing service SDK
SDK name: Tencent browsing service ( TBS )
Scenario description: Network dial service
In order to realize the specific business functions of various Tencent browsing service SDK, we may need to collect relevant personal information from developers and/or end users. The following will list in detail the various business functions of the Tencent Browsing Service SDK and the personal information collected for the realization of these functions:
126.96.36.199 In order to control the grayscale distribution and data statistics of the X5 kernel version, we will apply to the developer to obtain the Mac address and unique device identification code (IMSI, AndroidID) of the end-user device, and finally the developer will obtain the authorization of the end-user (The way to obtains the authorization of the end user is determined by the system device developer and the developer's application) and the products and/or services provided by the developer, to decide whether to provide the above information.
188.8.131.52 In order to find the available X5 kernel version on the user's memory card in order to increase the user's X5 ratio, we will access the user's storage permission with the user's authorization; if this permission is not provided, it may affect your use of the X5 kernel ratio.
184.108.40.206 In order to accurately control the release of kernel version and switch, and based on the webview standard protocol, we need to obtain the user's mobile phone model to ensure the accuracy and effectiveness of the service.
220.127.116.11 In order to facilitate users to search and share the copied content, we need to access the clipboard and read the links and content contained in it, so as to ensure the realization of functions such as search and sharing.
Third-party SDK provider name: Shenzhen Tencent Computer System Co., Ltd.
When we want to use information collected for a specific purpose for other purposes, we will ask for your consent in advance.
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, the website can store data such as your preferences or products in the shopping basket.
2.2 Web beacons and pixel tags
In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our websites. For example, the email we send you may contain a click URL that links to the content of our website. If you click the link, we will track the click to help us understand your product or service preferences and improve customer service. Web beacons are usually a transparent image embedded in a website or email. With the help of the pixel tag in the email, we can know whether the email is opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
2.3 Do Not Track (Do Not Track)
Many web browsers are equipped with Do Not Track function, which can issue Do Not Track requests to websites. At present, major Internet standards organizations have not established policies to regulate how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our websites will respect your choice.
3. How do we share, transfer and publicly disclose your personal information
We will not share your personal information with any other companies, organizations and individuals, except for the following:
1). Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
2). We may share your personal information externally in accordance with the provisions of laws and regulations, or in accordance with the compulsory requirements of the competent government department.
Our affiliates include: Chengdu Ruianyun Technology Co., Ltd.
We will not transfer your personal information to any company, organization or individual, except for the following:
3.2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
3.3 Public disclosure
We will only publicly disclose your personal information in the following situations:
3.3.1 After obtaining your explicit consent;
3.3.2 Disclosure based on law: In the case of laws, legal procedures, litigation or mandatory requirements of government authorities, we may disclose your personal information publicly.
4. How do we protect your personal information
4.1 We have used security protection measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "service" is protected by SSL encryption; we also provide https secure browsing to our website; we will use encryption technology to ensure the confidentiality of data; Use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security and privacy protection training courses to strengthen the importance of employees for the protection of personal information understanding.
4.2 We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purpose stated in the cost policy, unless the retention period needs to be extended or permitted by law.
4.3 The Internet is not an absolutely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us keep your account safe.
4.4 The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management and protection facilities are damaged, resulting in unauthorized access to information, public disclosure, tampering, or destruction, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
4.5 After an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, you can independently prevent and Risk reduction recommendations, remedies for you, etc. We will promptly inform you of the relevant circumstances of the incident by mail, letter, telephone, push notification, etc., and when it is difficult to inform the personal information subject one by one, we will adopt a reasonable and effective way to release the announcement.
At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
5. Your rights to personal information
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you exercise the following rights over your personal information:
5.1 Access to your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise data access rights, you can access it yourself in the following ways:
Account Information-If you wish to access or edit the profile information and payment information in your account, change your password, add security information or close your account, etc., you can perform such operations through the app.
Call history-you can view or clear your call history, view and modify, and manage other data in the app.
5.2 Correct your personal information
When you find that the personal information we process about you is wrong, you have the right to ask us to make corrections.
5.3 Delete your personal information
In the following situations, you can submit a request to us to delete personal information:
5.3.1 If our handling of personal information violates laws and regulations;
5.3.2 If we collect and use your personal information without your consent;
5.3.3 If our handling of personal information violates the agreement with you;
5.3.4 If you no longer use our products or services, or you cancel your account;
5.3.5 If we no longer provide products or services for you.
If we decide to respond to your deletion request, we will also notify the entity that obtained your personal information from us and request that it be deleted in a timely manner, unless otherwise stipulated by laws and regulations or these entities obtain your independent authorization.
When you delete information from our service, we may not immediately delete the corresponding information in the backup system, but will delete this information when the backup is updated.
5.4 Change the scope of your authorized consent
Each business function requires some basic personal information to complete (see "Part 1" of this strategy). For the collection and use of additional collected personal information, you can give or withdraw your authorized consent at any time.
You can do it yourself in the following ways:
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out based on your authorization.
5.5 The personal information subject cancels the account
You can cancel the previously registered account at any time through the app.
After canceling the account, we will stop providing you with products or services, and delete your personal information according to your requirements, unless otherwise stipulated by laws and regulations.
5.6 Personal information subject obtains a copy of personal information
Under the premise of technical feasibility, such as data interface matching, we can also directly transfer a copy of your personal information to a third party you specify according to your requirements.
5.7 Automatic decision-making of constrained information system
In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legal rights, you have the right to ask us to explain, and we will also provide appropriate relief.
5.8 Respond to your above request
To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.
For your reasonable request, we will not charge a fee in principle, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. For those that are unreasonably repetitive,
require too many technical means (for example, need to develop new systems or fundamentally change existing practices), pose a risk to the legitimate rights and interests of others or are very impractical (for example, involving information stored on backup tapes) We may refuse the request.
In the following situations, as required by laws and regulations, we will not be able to respond to your request:
1). Related to national security and national defense security;
2). Related to public safety, public health, and major public interests;
3). Related to criminal investigation, prosecution and trial;
4). There is sufficient evidence that you have subjective maliciousness or abuse of rights;
5). Responding to your request will result in serious damage to the legal rights of you or other individuals and organizations.
6. How do we handle children's personal information
Our products, websites and services are mainly for adults. Without the consent of parents or guardians, children may not create their own user accounts.
For the collection of children's personal information with parental consent, we will only use or publicly disclose this information when permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.
Although local laws and customs define children differently, we consider anyone under 14 years old to be a child.
If we find that we have collected children's personal information without prior verifiable parental consent, we will try to delete the relevant data as soon as possible.
7. How your personal information is transferred globally
In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.
Since we provide products or services through resources and servers throughout the world, this means that, after obtaining your authorized consent, your personal information may be transferred to the overseas jurisdiction of the country where you use the products or services, or Received interviews from these jurisdictions.
Such jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will ensure that your personal information is adequately and equally protected in the People's Republic of China. For example, we will ask for your consent to transfer personal information across borders, or implement security measures such as de-identification of data before cross-border data transfer.
9. how to contact us
Normally, we will reply within 5 working days.