privacy policy

Update: Nov. 25, 2022

Chengdu Ruianyun Technology Co., Ltd. (hereinafter referred to as "we") understands the importance of personal information to you and will do its utmost to protect your personal information safe and reliable. We are committed to maintaining your trust in us, abide by the following principles, and protect your personal information: the principle of unanimity of power and responsibility, the principle of clear purpose, the principle of choice and consent, the principle of least sufficient use, the principle of ensuring safety, the principle of subject participation, the principle of transparency . At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with the industry's mature security standards.The personal information we collect in the course of your use of our products will only be used for the purposes set out in this Privacy Policy.

Please read and understand this "Privacy Policy" carefully before using our products ‘WeCall’ (or services).

1. How do we collect and use your personal information
Personal information refers to all kinds of information recorded in electronic or other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person, alone or in combination with other information.
We will only collect and use your personal information for the following purposes described in this policy:
1.1 Provide you with Internet phone service
1.1.1 register as a user
To use our service, you need to create an account so that we can provide you with services such as Internet phone calls, and provide a unique cell phone number and SMS verification code that you can be contacted .
If you log in through a third party account such as WeChat, we will obtain information about your corresponding third party account.
The data we collect when you register/login to the application may also include SDK/API/JS code version, browser, internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, iOS advertising identifier (IDFA), Android advertiser identifier, network card (MAC) address, cell phone number, the International Mobile Equipment Identifier (IMEI), device model, terminal manufacturer, terminal device OS version, session start/stop time, language location, time zone, and network status (WiFi, etc.).
1.1.2 Make internet phone call
In order for you to use the app's make a VoIP call feature, you need to grant the app access to the microphone; the data we collect when you make a call using the VoIP feature includes the called number, the start and end time of the call.
1.1.3 Cloud address book and make VoIP calls through mobile address book
In order to facilitate you to call phone numbers of mobile contacts, edit contact information, and use the cloud address book function in the app, you need to grant the app permission to read/modify your phone address book, and you can access the app to use other functions without providing this authorization.
1.1.4 Query/modify call records
In order to facilitate you to make VoIP calls through call logs in the application and to merge the call logs of this application with the call logs of your cell phone in some cell phones, you need to grant the application the permission to query/modify the call logs, without providing this authorization, you can access the application to use other functions. This part of information is not collected by the application.
1.1.5 Record calls and store them locally
In order for you to use the call recording function and view the number attribution information, you need to grant the application permission to read and write the phone storage, the recording file is stored locally, the application does not collect this information.
1.1.6 Function of edit avatar and call background
You can edit your avatar and related background in the app, in order to use this feature, you need to grant the app access to the camera, read photo albums, the app does not collect this information
1.1.7 Function of ivitation with prize
When you use the function of inviting your friends , the invitation link and invitation QR code generated by the App for you will contain the user's ID information in order to accurately issue the reward.
The above information you provide will continue to authorize us to use it during your use of this service. When you cancel your account, we will stop using and delete the above information.
1.2 To enhance service functions and improve service experience
In order to provide you with services that are better suited to you, our products and services may include products and services from third parties and links to third party websites. When you use these products or services, your information may also be collected. The third party SKDs that we currently access are as follows.
1.2.1 Umeng plus Scenario Description: Statistical Analysis Services
SDK Name: Statistical Analysis SDK
Personal information field: collects device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to uniquely identify the device, which is a prerequisite for statistical analysis data. Collect geographic location to correct the geographical distribution of report data and provide anti-cheating services. Scenario description: Invitation to share
SDK Name: Social Sharing SDK
Personal information field: collects device identifiers (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to uniquely identify the device for sharing messages to the target device. Capture geographic location to screen sharing channels and provide anti-cheating services.
Third-party SDK provider name: Youmeng Tongxin (Beijing) Technology Co.
1.2.2 Pangle
SDK name: Pangle
Scenario Description: Request advertising information In order to provide ad placement and ad monitoring attribution, anti-cheating, the following device information may be obtained
[Android & iOS] Basic information such as device brand, model, software system version, resolution, network signal strength, device language, sensor information, etc.
[Android only] Android ID
[iOS only] Mobile phone system reboot time, total disk space, total system memory space, CPU number and other basic information, IDFV
In addition, based on the purpose of optimization of advertising effect, we may need to provide the following information to the penetrator.
[Dual-ended] IP address, wireless network SSID name, WiFi router MAC address, MAC address of the device (for iOS side, only for IOS3200 version or below)
[Android only] device identifier (such as IMEI, OAID, IMSI, ICCID, GAID (GMS service only), MEID, device serial number build_serial, specific fields differ depending on the hardware and software version)
[iOS only] device identifier (such as IDFA, specific fields vary by hardware and software version) For the purpose of ad placement and anti-cheating, the following device information may be obtained
[Android only] Developer application name, application package name, version number, application front and back status For the purpose of ad monitoring attribution, statistical analysis of ad placement, and anti-cheating, the following ad information may be obtained
[Android and iOS] Interaction data of display, click and conversion of ads Possible access to location information for ad targeting and anti-cheating purposes To reduce App crashes, provide stable and reliable services, obtain crash data, performance data, etc. For the purpose of advertising and anti-cheating, we may also obtain other information such as operator information and device time zone
Third-party SDK provider name: Hubei JinriToutiao Technology Co.
1.2.3 Alipay
SDK name: App payment
Scenario Description: Integrate Alipay payment function in the App
Information Collection:
[Android] We collect commonly used device information (such as IMEI/IMSI, SIM card serial number/MAC address), network information, and geographic location information for security risk control during user login account and payment process, other than the above information, we do not collect other personal data information of users through third party applications.
[iOS] We collect commonly used device information (such as IMEI/IMSI, SIM card serial number/MAC address), network information, and geographic location information for the purpose of securing users' accounts. Other than the above information, we do not collect other personal data information of users through third-party applications.
Third-party SDK Provider: Alipay (China) Network Technology Co.
1.2.4 WeChat Payment
SDK name: WeChat Payment
Scenario Description: The merchant integrates the open SDK in the mobile application APP to call up the WeChat payment module to complete the payment mode
WeChat Pay (Tencent Technology (Shenzhen) Co., Ltd.) SDK will collect your device information (may include IMEI, IMSI, device MAC address, Android Id, device model, network type, wireless network list, wireless network MAC address, wireless network name, sensor information, SIM serial number information), location information, cell phone number, the collection of invoked Android privileges for personal information may include: ACCESS_COARSE_LOCATION, ACCESS_FINE_LOCATION, READ_PHONE_STATE, WRITE_EXTERNAL_STORAGE, ACCESS_NETWORK_STATE, ACCESS_WIFI_ STATE.
1.2.5 Tencent browsing service SDK
SDK name: Tencent browsing service ( TBS )
Scenario description: Network dial service
Information collection:
In order to realize the specific business functions of various Tencent browsing service SDK, we may need to collect relevant personal information from developers and/or end users. The following will list in detail the various business functions of the Tencent Browsing Service SDK and the personal information collected for the realization of these functions: In order to control the grayscale distribution and data statistics of the X5 kernel version, we will apply to the developer to obtain the Mac address and unique device identification code (IMSI, AndroidID) of the end-user device, and finally the developer will obtain the authorization of the end-user (The way to obtains the authorization of the end user is determined by the system device developer and the developer's application) and the products and/or services provided by the developer, to decide whether to provide the above information. In order to find the available X5 kernel version on the user's memory card in order to increase the user's X5 ratio, we will access the user's storage permission with the user's authorization; if this permission is not provided, it may affect your use of the X5 kernel ratio. In order to accurately control the release of kernel version and switch, and based on the webview standard protocol, we need to obtain the user's mobile phone model to ensure the accuracy and effectiveness of the service. In order to facilitate users to search and share the copied content, we need to access the clipboard and read the links and content contained in it, so as to ensure the realization of functions such as search and sharing.
Third-party SDK provider name: Shenzhen Tencent Computer System Co., Ltd.
When we want to use information collected for a specific purpose for other purposes, we will ask for your consent in advance.
2. how do we use cookies and similar technologies
2.1 Cookie
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, the website can store data such as your preferences or products in the shopping basket.
We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer. Most web browsers have a function to block cookies. However, if you do this, you will need to change user settings yourself each time you visit our website. To learn more about how to change your browser settings, please visit the following links: , , , and .
2.2 Web beacons and pixel tags
In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our websites. For example, the email we send you may contain a click URL that links to the content of our website. If you click the link, we will track the click to help us understand your product or service preferences and improve customer service. Web beacons are usually a transparent image embedded in a website or email. With the help of the pixel tag in the email, we can know whether the email is opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
2.3 Do Not Track (Do Not Track)
Many web browsers are equipped with Do Not Track function, which can issue Do Not Track requests to websites. At present, major Internet standards organizations have not established policies to regulate how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our websites will respect your choice.
3. How do we share, transfer and publicly disclose your personal information
3.1 Sharing
We will not share your personal information with any other companies, organizations and individuals, except for the following:
1). Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
2). We may share your personal information externally in accordance with the provisions of laws and regulations, or in accordance with the compulsory requirements of the competent government department.
3). Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share the necessary personal information and are bound by the purpose stated in this privacy policy. If an affiliated company wants to change the purpose of processing personal information, it will seek your authorization and consent again.
Our affiliates include: Chengdu Ruianyun Technology Co., Ltd.
4). Sharing with authorized partners: For the purposes stated in this privacy policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and only share the personal information necessary to provide services.
For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them and require them to process personal information in accordance with our instructions, this privacy policy and any other related confidentiality and security measures.
3.2 Transfer
We will not transfer your personal information to any company, organization or individual, except for the following:
3.2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
3.2.2 When it involves mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy, otherwise we will require that company or organization Ask you for authorization again.
3.3 Public disclosure
We will only publicly disclose your personal information in the following situations:
3.3.1 After obtaining your explicit consent;
3.3.2 Disclosure based on law: In the case of laws, legal procedures, litigation or mandatory requirements of government authorities, we may disclose your personal information publicly.
4. How do we protect your personal information
4.1 We have used security protection measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "service" is protected by SSL encryption; we also provide https secure browsing to our website; we will use encryption technology to ensure the confidentiality of data; Use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security and privacy protection training courses to strengthen the importance of employees for the protection of personal information understanding.
4.2 We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purpose stated in the cost policy, unless the retention period needs to be extended or permitted by law.
4.3 The Internet is not an absolutely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us keep your account safe.
4.4 The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management and protection facilities are damaged, resulting in unauthorized access to information, public disclosure, tampering, or destruction, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
4.5 After an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, you can independently prevent and Risk reduction recommendations, remedies for you, etc. We will promptly inform you of the relevant circumstances of the incident by mail, letter, telephone, push notification, etc., and when it is difficult to inform the personal information subject one by one, we will adopt a reasonable and effective way to release the announcement.
At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
5. Your rights to personal information
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you exercise the following rights over your personal information:
5.1 Access to your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise data access rights, you can access it yourself in the following ways:
Account Information-If you wish to access or edit the profile information and payment information in your account, change your password, add security information or close your account, etc., you can perform such operations through the app.
Call history-you can view or clear your call history, view and modify, and manage other data in the app.
5.2 Correct your personal information
When you find that the personal information we process about you is wrong, you have the right to ask us to make corrections.
5.3 Delete your personal information
In the following situations, you can submit a request to us to delete personal information:
5.3.1 If our handling of personal information violates laws and regulations;
5.3.2 If we collect and use your personal information without your consent;
5.3.3 If our handling of personal information violates the agreement with you;
5.3.4 If you no longer use our products or services, or you cancel your account;
5.3.5 If we no longer provide products or services for you.
If we decide to respond to your deletion request, we will also notify the entity that obtained your personal information from us and request that it be deleted in a timely manner, unless otherwise stipulated by laws and regulations or these entities obtain your independent authorization.
When you delete information from our service, we may not immediately delete the corresponding information in the backup system, but will delete this information when the backup is updated.
5.4 Change the scope of your authorized consent
Each business function requires some basic personal information to complete (see "Part 1" of this strategy). For the collection and use of additional collected personal information, you can give or withdraw your authorized consent at any time.
You can do it yourself in the following ways:
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out based on your authorization.
5.5 The personal information subject cancels the account
You can cancel the previously registered account at any time through the app.
The cancellation function is located at: "Me"-"Settings"-"My Information"- "Account Security" - "Cancel Account".
After canceling the account, we will stop providing you with products or services, and delete your personal information according to your requirements, unless otherwise stipulated by laws and regulations.
5.6 Personal information subject obtains a copy of personal information
Under the premise of technical feasibility, such as data interface matching, we can also directly transfer a copy of your personal information to a third party you specify according to your requirements.
5.7 Automatic decision-making of constrained information system
In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legal rights, you have the right to ask us to explain, and we will also provide appropriate relief.
5.8 Respond to your above request
To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.
For your reasonable request, we will not charge a fee in principle, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. For those that are unreasonably repetitive,
require too many technical means (for example, need to develop new systems or fundamentally change existing practices), pose a risk to the legitimate rights and interests of others or are very impractical (for example, involving information stored on backup tapes) We may refuse the request.
In the following situations, as required by laws and regulations, we will not be able to respond to your request:
1). Related to national security and national defense security;
2). Related to public safety, public health, and major public interests;
3). Related to criminal investigation, prosecution and trial;
4). There is sufficient evidence that you have subjective maliciousness or abuse of rights;
5). Responding to your request will result in serious damage to the legal rights of you or other individuals and organizations.

6. How do we handle children's personal information
Our products, websites and services are mainly for adults. Without the consent of parents or guardians, children may not create their own user accounts.
For the collection of children's personal information with parental consent, we will only use or publicly disclose this information when permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.
Although local laws and customs define children differently, we consider anyone under 14 years old to be a child.
If we find that we have collected children's personal information without prior verifiable parental consent, we will try to delete the relevant data as soon as possible.

7. How your personal information is transferred globally
In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.
Since we provide products or services through resources and servers throughout the world, this means that, after obtaining your authorized consent, your personal information may be transferred to the overseas jurisdiction of the country where you use the products or services, or Received interviews from these jurisdictions.
Such jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will ensure that your personal information is adequately and equally protected in the People's Republic of China. For example, we will ask for your consent to transfer personal information across borders, or implement security measures such as de-identification of data before cross-border data transfer.

8. How to update this privacy policy
We may adjust or change this privacy policy in due course. Any updates to this privacy policy will be posted on our website with the time of the update. Except for the mandatory provisions of laws, regulations or regulatory provisions, adjustments or changes The content will be effective 7 days after notification or announcement. If you continue to use any of the services we provide or visit our related websites after the privacy policy is adjusted or changed, we believe that this means that you have fully read, understood and accepted the revised privacy policy and are bound by it.

9. how to contact us
We have established a dedicated personal information protection department (or personal information protection officer). If you have any questions, comments or suggestions regarding this privacy policy, please contact us by the following means.
Normally, we will reply within 5 working days.





一、我们如何收集和使用您的个人信息 “个人信息”是指以电子或者其他方式记录的能够单独或者与其他信息结合识别特定自然人身份或者反映特定自然人活动情况的各种信息。
SDK 名称:统计分析 SDK
个人信息字段:采集设备标识符(IMEI/Mac/android ID/IDFA/OPENUDID/GUID、SIM 卡 IMSI 信息),用于唯一标识设备,这是统计分析数据的前提。采集地理位置矫正报表数据地域分布,提供反作弊服务。
SDK 名称:社会化分享 SDK
个人信息字段:采集设备标识符(IMEI/Mac/android ID/IDFA/OPENUDID/GUID、SIM 卡 IMSI 信息),用于唯一标识设备,以便向目标设备分享消息。采集地理位置甄别分享通道,提供反作弊服务。
SDK 名称:穿山甲
a. 为了提供广告投放及广告监测归因、反作弊,可能获取以下设备信息:
b. 为了广告投放、反作弊,可能获取以下设备信息
c. 为了广告监测归因、广告投放统计分析、反作弊,可能获取如下广告信息
d. 为了广告定向投放及反作弊,可能获取位置信息
e. 为了减少App崩溃、提供稳定可靠的服务,获取崩溃数据、性能数据等
f. 为了广告投放、反作弊,还可能获取运营商信息、设备时区等其他信息
SDK 名称:App支付
场景描述:在 App 应用中集成支付宝支付功能
SDK 名称:微信 APP 支付
微信支付(腾讯科技(深圳)有限公司)SDK会收集您的设备信息(可能包括IMEI、IMSI、设备MAC地址、Android Id、设备型号、网络类型、无线网络列表、无线网络MAC地址、无线网络名称、传感器信息、SIM序列号信息)、位置信息、手机号,调用的收集个人信息的安卓权限可能包括
A、 为了控制X5内核版本灰度下发及数据统计,我们会向开发者申请获取终端用户设备Mac地址和唯一设备识别码(IMSI、AndroidID),最终由开发者基于其获取终端用户授权的情况(开发者获取终端用户授权的方式由系统设备开发方及开发者应用决定)以及开发者提供的产品和/或服务的情况,决定是否提供上述信息。

为确保网站正常运转,我们会在您的计算机或移动设备上存储名为 Cookie 的小数据文件。Cookie 通常包含标识符、站点名称以及一些号码和字符。借助于 Cookie,网站能够存储您的偏好或购物篮内的商品等数据。
我们不会将 Cookie 用于本政策所述目的之外的任何用途。您可根据自己的偏好管理或删除 Cookie。您可以清除计算机上保存的所有 Cookie,大部分网络浏览器都设有阻止 Cookie 的功能。但如果您这么做,则需要在每一次访问我们的网站时亲自更改用户设置。如需详细了解如何更改浏览器设置,请访问以下链接:Internet Explorer、Google Chrome、Mozilla Firefox、Safari 和 Opera。
除 Cookie 外,我们还会在网站上使用网站信标和像素标签等其他同类技术。例如,我们向您发送的电子邮件可能含有链接至我们网站内容的点击 URL。如果您点击该链接,我们则会跟踪此次点击,帮助我们了解您的产品或服务偏好并改善客户服务。网站信标通常是一种嵌入到网站或电子邮件中的透明图像。借助于电子邮件中的像素标签,我们能够获知电子邮件是否被打开。如果您不希望自己的活动以这种方式被追踪,则可以随时从我们的寄信名单中退订。
(三)Do Not Track(请勿追踪)
很多网络浏览器均设有 Do Not Track 功能,该功能可向网站发布 Do Not Track 请求。目前,主要互联网标准组织尚未设立相关政策来规定网站应如何应对此类请求。但如果您的浏览器启用了 Do Not Track,那么我们的所有网站都会尊重您的选择。

我们的关联公司包括: 成都瑞安云科技股份有限公司。
4、与授权合作伙伴共享:仅为实现本隐私权政策中声明的目的,我们的某些服务将由授权合作伙伴提供。我们可能会与合作伙伴共享您的某些个人信息,以提供更好的客户服务和用户体验。例如,我们聘请来提供第三方数据统计和分析服务的公司可能需要采集和访问个人数据以进行数据统计和分析。在这种情况下,这些公司 必须遵守我们的数据隐私和安全要求。我们仅会出于合法、正当、必要、特定、明确的目的共享您的个人信息,并且只会共享提供服务所必要的个人信息。

(一)我们已使用符合业界标准的安全防护措施保护您提供的个人信息,防止数据遭到未经授权访问、公开披露、使用、修改、损坏或丢失。我们会采取一切合理可行的措施,保护您的个人信息。例如,在您的浏览器与“服务”之间交换数据(如信用卡信息)时受 SSL 加密保护;我们同时对我们网站提供 https 安全浏览方式;我们会使用加密技术确保数据的保密性;我们会使用受信赖的保护机制防止数据遭到恶意攻击;我们会部署访问控制机制,确保只有授权人员才可访问个人信息;以及我们会举办安全和隐私保护培训课程,加强员工对于保护个人信息重要性的认识。


尽管当地法律和习俗对儿童的定义不同,但我们将不满 14 周岁的任何人均视为儿童。