

User Privacy Policy
Last Updated Date: March 19, 2024
Effective Date: March 19, 2024
Introduction and Important Notice
Welcome to the products and services provided by Shi Pu Information Technology (Shanghai) Co., Ltd. (hereinafter referred to as "we," "us," "our," or "SciOne Tech")!
Your trust is crucial to us. We understand the importance of personal information and corporate business data to you, and we will strictly comply with legal and regulatory requirements, taking appropriate security measures to do our utmost to protect the security and controllability of your information.
This "User Privacy Policy" (hereinafter referred to as "this Policy") aims to explain how we collect, use, store, share, transfer, and protect your personal information, as well as the rights you have regarding it. This Policy applies to all products and services we provide, including but not limited to the following clients:
- SciOne-Web Client
- SciOne-Mobile App Client
- SciOne-Central Control Console App Client
- SciOne-PDA App Client
- SciOne-Smart Small Screen App Client
- SciOne-Smart Large Screen App Client
Before using our products or services, please be sure to carefully read and thoroughly understand the entire content of this Policy, especially the terms marked in bold/bold underline. You should focus on reading these terms and start using our services only after confirming your full understanding and agreement. Once you start using our products or services, it signifies that you have fully understood and agreed to this Policy.
Please note: This Policy does not apply to any products or services provided by third parties. Such third-party products or services are subject to their own privacy policies, which they will explain to you separately.
If you have any questions, comments, or suggestions regarding this Policy, you can contact us through the contact methods provided in Section XI of this Policy.
This Policy will help you understand the following:
I. DefinitionsII. How We Collect and Use Your Personal Information
III. How We Use Cookies and Similar Technologies
IV. How We Share, Transfer, and Publicly Disclose Your Personal Information
V. How We Store Your Personal Information
VI. How We Protect Your Personal Information
VII. How You Can Manage Your Personal Information (Your Rights)
VIII. How We Handle Minors' Personal Information
IX. Third-Party SDKs and Services Description
X. How This Policy Is Updated
XI. How to Contact UsI. Definitions
- Personal Information: Refers to various kinds of information related to an identified or identifiable natural person recorded electronically or by other means, excluding anonymized information.
- Sensitive Personal Information: Refers to personal information that, once leaked or illegally used, could easily lead to the infringement of a natural person's personal dignity or endanger personal or property safety. Sensitive Personal Information involved in this Policy may include: personal biometric information (facial features), mobile phone numbers, precise location information, calendar information, device information (such as IMEI, IMSI, Android ID), login passwords, etc. We will prominently mark the Sensitive Personal Information involved in this Policy using bold text.
- Corporate Business Data: Refers to various types of data related to your enterprise operation and management that you input, upload, or generate while using our products or services, such as device information, room information, organizational structure, role permissions, inventory item information, etc. The processing of Corporate Business Data will follow the relevant service agreements (if any) signed separately between you and us. This Policy primarily regulates the processing activities of Personal Information.
- Personal Information Processor: Refers to the organization or individual that independently determines the purposes and means of processing in personal information processing activities. In this Policy, it refers to Shi Pu Information Technology (Shanghai) Co., Ltd.
- Affiliated Companies: Refers to the affiliated companies of SciOne Tech. For specific definitions, please refer to the relevant provisions of the Company Law of the People's Republic of China.
- De-identification: Refers to the process by which personal information is processed so that it cannot identify a specific natural person without the help of additional information.
- Anonymization: Refers to the process by which personal information is processed so that it cannot identify a specific natural person and cannot be restored.
II. How We Collect and Use Your Personal Information
During your use of our products/services, we will follow the principles of lawfulness, legitimacy, necessity, and integrity, and based on the purposes described in this Policy, collect and use your Personal Information.
(A) Personal Information You Need to Authorize Us to Collect and Use (Basic Business Functions)
To provide you with the core functions of our products/services, you must authorize us to collect and use necessary Personal Information. If you refuse to provide it, you will not be able to use the corresponding functions normally.
1. Account Registration and Login
- When you register for a SciOne account, you need to provide your enterprise name, your name, mobile phone number, and create a username and login password. We collect this information to help you complete the registration and create an account for you.
- You can use the registered account or mobile phone number along with the login password or mobile dynamic verification code to log in and use our services.
- We may verify your user identity based on the information you provide to ensure that we are providing services to you personally.
2. Ensuring Stable Operation and Security of Services
- To ensure the safe and stable operation of the software and services, and to prevent, detect, and investigate fraud, security risks, illegal activities, or violations of agreements, policies, or rules with us or our Affiliated Companies, we need to collect your device information (including device model, operating system version, unique device identifiers (such as IMEI, IMSI, Android ID, IDFA, MAC address, device serial number), device environment, software list), log information (including login logs, operation logs, service logs), and IP address.
- This information is also used to understand product compatibility and identify abnormal account statuses. We may collect some of this information through third-party SDKs (such as Umeng Mobile Statistics), please see Section IX of this Policy for details.
(B) Personal Information You May Choose to Authorize Us to Collect and Use (Extended Business Functions)
To provide you with more convenient and higher-quality additional services, we may request your authorization to collect and use certain Personal Information when you use specific functions. If you refuse to provide it, you will not be able to use the relevant additional functions, but it will not affect your normal use of the basic business functions.
1. Additional Services Based on Precise Location Information
- When you use functions that require location-based services (such as customizing enterprise addresses, certain device management functions), we will request your authorization to access your precise location information (obtained via GPS, WLAN, base stations, etc.). You can choose to enable or disable this permission. We will not collect this information if the permission is not enabled.
2. Additional Services Based on Camera/Webcam
- After enabling the camera/webcam permission, you can use the QR code scanning function (e.g., for terminal network configuration, activation binding, viewing device details) or the photo/video shooting function (e.g., for facial recognition in specific scenarios, uploading credentials, etc.).
- When you use the facial recognition function, we will collect your facial feature information and strictly use it within the scope authorized by your consent. We only obtain information through the camera when you actively use the relevant function. If we need to use your facial information for other purposes, we will seek your separate consent again.
3. Additional Services Based on Photo Album (Image Library)
- After enabling the photo album permission, you can use the function to upload/read images/videos (e.g., uploading avatars, uploading device pictures, uploading problem feedback screenshots, etc.).
4. Additional Services Based on Calendar
- After you enable the permission to read/write to your calendar, we may collect your calendar information to provide you with records and reminders related to device maintenance, task planning, etc.
5. Additional Services Based on Phone State
- To ensure the security of your account and usage, in certain scenarios (e.g., verifying device uniqueness), we may need your authorization to read the native device identifier (such as IMEI).
Please note: You can view, enable, or disable the above permissions in your device settings or within our client (if applicable, e.g., in "Settings - Privacy - Permission Management"). Enabling any permission means you authorize us to collect and use the relevant Personal Information to provide you with the corresponding service; disabling any permission means you cancel the authorization, and we will no longer continue to collect and use the relevant Personal Information based on that permission, nor can we provide you with the service corresponding to that permission. Your decision to disable a permission will not affect the information collection and use previously carried out based on your authorization.
(C) Situations Where We Obtain Your Personal Information from Third Parties
We may obtain account information (avatar, nickname) that you have authorized to share from third parties. After you agree to this Policy, we will bind your third-party account with your SciOne account, allowing you to log in and use our products and/or services directly through the third-party account. We will use this Personal Information in compliance with relevant laws and regulations, after confirming the legality of the source of the Personal Information according to our agreement with the third party.
(D) Other Rules for Collecting and Using Personal Information
- Change of Purpose: If we use your information for purposes not specified in this Policy, or use information collected for a specific purpose for other purposes, we will seek your prior consent (for Sensitive Personal Information, we will seek your separate consent).
- Indirect Acquisition: If we indirectly obtain your Personal Information from a third party, we will explicitly require in writing before collection that the third party has lawfully obtained your authorization and consent, and inform you of the content of the shared information. For Sensitive Personal Information, your explicit confirmation is required before it is provided to us. We will require the third party to commit to the legality and compliance of the source of the information and will protect the indirectly obtained Personal Information using protection measures and standards no less stringent than those we apply to our own users' Personal Information.
- Information Concerning Others: If the information you provide contains Personal Information of other users, you must ensure that you have obtained lawful authorization before providing this information to us.
(E) Exceptions to Obtaining Authorized Consent
According to relevant laws and regulations, we may collect and use your Personal Information without obtaining your authorized consent in the following situations:
- Necessary for concluding or performing a contract to which you are a party;
- Necessary for performing statutory duties or legal obligations (e.g., cooperating with regulatory requirements);
- Necessary for responding to public health emergencies, or for protecting the life, health, and property safety of natural persons in emergencies;
- Processing Personal Information within a reasonable scope for carrying out news reporting, public opinion supervision, and other activities for the public interest;
- Processing Personal Information disclosed by yourself or other legally disclosed Personal Information within a reasonable scope in accordance with the provisions of the Personal Information Protection Law;
- Other circumstances stipulated by laws and administrative regulations.
Please be aware: According to applicable laws, if we take technical measures and other necessary measures to process Personal Information such that the data recipient cannot re-identify specific individuals and the information cannot be restored (i.e., anonymization), or if we conduct de-identified research, statistical analysis, and prediction on the collected information to improve our products and services or support business decisions, then the use of such processed data does not require separate notification to you or your consent.
III. How We Use Cookies and Similar Technologies
To ensure the normal operation of the website, provide you with a more relaxed access experience, and recommend content that may interest you, we will store small data files called Cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With Cookies, websites can store data such as your preferences.
We will not use Cookies for any purpose other than those described in this Policy. You can manage or delete Cookies according to your preferences. You can clear all Cookies saved on your computer, and most web browsers have a function to block Cookies. However, if you do this, you will need to personally change user settings every time you visit our website.
In addition to Cookies, we may also use other similar technologies on the website, such as web beacons and pixel tags.
IV. How We Share, Transfer, and Publicly Disclose Your Personal Information
(A) Sharing
We value the protection of your Personal Information and will not share your Personal Information with any company, organization, or individual other than SciOne Tech, except in the following cases:
- With Your Explicit or Separate Consent: After obtaining your explicit consent, we will share your Personal Information with other parties. Specifically, when sharing your Sensitive Personal Information or providing your Personal Information to third parties, we will seek your separate consent.
- Sharing under Legal Circumstances: We may share your Personal Information externally in accordance with legal and regulatory provisions, the needs of litigation dispute resolution, or as required by administrative or judicial authorities according to law.
- Sharing with Affiliated Companies:
- Purpose: To facilitate providing you with unified products and services based on the SciOne platform account, identify account abnormalities, and protect the personal and property safety of our Affiliated Companies, other users, or the public from infringement.
- Scope: Your Personal Information may be shared within our Affiliated Companies. We will only share necessary Personal Information (such as account information, device information, operation logs, etc.), and the scope of sharing is bound by the purposes stated in this Policy.
- Rules: If we share your Sensitive Personal Information or if an Affiliated Company changes the purpose of using and processing Personal Information, we will again seek your authorization, consent, or separate consent. Affiliated Companies will adopt security protection measures no less stringent than those described in this Policy.
4. Sharing with Authorized Partners:
- Principle: We will only share necessary Personal Information with authorized partners (such as suppliers, service providers, etc.) for the legitimate, proper, necessary, specific, and explicit purposes stated in this Policy, to realize related services. Authorized partners can only access the information needed to perform their duties, are bound by confidentiality obligations, and may not use this information for any other purpose.
- Types and Purposes:
- Technical Infrastructure Services: Such as suppliers providing server and network services.
- Data Analysis Services: Such as partners helping us analyze service usage and measure service effectiveness (e.g., Umeng Mobile Statistics, see Section IX for details).
- Customer Service: Such as partners providing customer support.
- Payment Services: Such as payment institutions processing payments.
- Other Support Services: Such as partners providing map services or push notification services.
- Rules: We will conduct strict security assessments of the Application Programming Interfaces (APIs) and Software Development Kits (SDKs) used by authorized partners to obtain information and agree on strict data protection measures. We will inform you of the details of third-party SDKs (see Section IX). When sharing your Sensitive Personal Information with partners, we will obtain your separate consent.
5. Based on Your Active Choice: When you use certain services provided by third parties through the SciOne platform (e.g., calling third-party services through platform interfaces), we will, based on your choice and after obtaining your consent, share the necessary Personal Information to realize the service with the third-party service provider.
(B) Transfer
We will not transfer your Personal Information to any company, organization, or individual, except in the following cases:
- With Your Explicit or Separate Consent: After obtaining your explicit consent, we will transfer your Personal Information to other parties. Specifically, when transferring your Sensitive Personal Information, we will seek your separate consent.
- Company Merger, Acquisition, or Bankruptcy Liquidation: In the event of a merger, acquisition, bankruptcy liquidation, or other situations involving the transfer of Personal Information, we will require the new company or organization holding your Personal Information to continue to be bound by this Policy. Otherwise, we will require the company, organization, or individual to seek your authorization and consent again.
(C) Public Disclosure
We will only publicly disclose your Personal Information in the following circumstances:
- With Your Explicit or Separate Consent: After obtaining your explicit consent (or separate consent, if applicable), we may publicly disclose your Personal Information.
- Based on Law or Reasonable Grounds: We may publicly disclose your Personal Information under mandatory requirements of laws, regulations, legal procedures, litigation, or government authorities. Or, if we determine that you have violated laws or regulations or seriously violated SciOne platform-related agreements and rules, to protect the personal and property safety of SciOne platform users or the public from infringement, we may disclose your Personal Information based on laws and regulations or with your consent.
(D) Exceptions to Prior Authorized Consent for Sharing, Transfer, and Public Disclosure
According to relevant laws and regulations, sharing, transferring, or publicly disclosing your Personal Information does not require your prior authorized consent in the following situations:
- Necessary for concluding or performing a contract to which you are a party;
- Necessary for performing statutory duties or legal obligations;
- Necessary for responding to public health emergencies, or for protecting the life, health, and property safety of natural persons in emergencies;
- Processing Personal Information within a reasonable scope for carrying out news reporting, public opinion supervision, and other activities for the public interest;
- Processing Personal Information disclosed by yourself or other legally disclosed Personal Information within a reasonable scope in accordance with the provisions of the Personal Information Protection Law;
- Other circumstances stipulated by laws and administrative regulations.
Please be aware: According to applicable laws, if we take technical measures and other necessary measures to process Personal Information such that the data recipient cannot re-identify specific individuals and the information cannot be restored (anonymization), then the sharing, transfer, or public disclosure of such processed data does not require separate notification to you or your consent.
V. How We Store Your Personal Information
(A) Storage Location
Personal Information collected and generated within the territory of the People's Republic of China (for the purpose of this Policy, "China" excludes Hong Kong, Macau, and Taiwan) will be stored within China.
Currently, we do not transfer Personal Information outside of China. If future business development necessitates transferring your Personal Information abroad, we will strictly follow the provisions of laws and regulations, separately inform you of the purpose of the transfer, the recipient, security measures, etc., obtain your separate consent, and ensure that the storage complies with legal and regulatory requirements.
(B) Storage Period
We will only retain your Personal Information for the minimum period necessary to achieve the purposes described in this Policy, unless there are mandatory retention requirements by law or regulations, or you separately authorize a longer period. We determine the storage period for Personal Information primarily based on the following criteria:
- Necessary to fulfill the service purposes related to you, maintain corresponding service and business records, and respond to your possible inquiries or complaints;
- Necessary to ensure the security and quality of the services we provide to you;
- Whether you agree to a longer retention period;
- Whether there are other special agreements or legal/regulatory provisions regarding the retention period (e.g., the E-commerce Law of the People's Republic of China requires that information on goods and services, and transaction information be kept for no less than three years from the date of completion of the transaction).
After the storage period expires, we will delete your Personal Information or anonymize it according to applicable legal requirements. If deletion is technically difficult, we will cease processing activities other than storage and taking necessary security protection measures.
(C) Cessation of Operation
If we cease operating our products or services, we will promptly stop collecting your Personal Information, notify you of the cessation of operation individually or by public announcement, and delete or anonymize the Personal Information related to the discontinued business that we hold.
VI. How We Protect Your Personal Information
We attach great importance to the security of your Personal Information and have adopted industry-standard, reasonably feasible security measures to protect your information from unauthorized access, public disclosure, use, modification, damage, or loss.
1. Technical Measures:
- We use SSL protocol to encrypt data exchange between your browser and the server and provide HTTPS secure browsing for our website.
- We use encryption technologies (such as Transport Layer Security TLS/SSL, storage encryption) to enhance the security of Personal Information.
- We use trusted protection mechanisms (such as firewalls, anti-virus scanning) to prevent Personal Information from malicious attacks.
- We deploy access control mechanisms, adopting the principle of least privilege, to ensure that only authorized personnel can access Personal Information, and conduct audits of data access.
- Our important information systems have passed cybersecurity classified protection assessments (e.g., Level 3) and/or relevant international certifications (e.g., ISO27001).
2. Management Measures:
- We have established a comprehensive data security management system and internal control procedures, enhancing security from multiple dimensions including organizational structure, system design, personnel management, and product technology.
- We have appointed a Personal Information Protection Officer and a dedicated team responsible for handling Personal Information security matters.
- We sign confidentiality agreements with employees and partners who may access your Personal Information and conduct security and privacy protection training to strengthen employee awareness.
3. Security Incident Response:
- We have formulated emergency response plans for Personal Information security incidents and conduct regular drills.
- In the unfortunate event of a Personal Information security incident, we will, in accordance with legal and regulatory requirements, immediately activate the emergency plan, take remedial measures, and promptly inform you of: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, remedial measures for you, etc. We will inform you via email, letter, phone, push notification, etc.; if it is difficult to inform individuals one by one, we will adopt reasonable and effective methods to issue public announcements.
- At the same time, we will also proactively report the handling of Personal Information security incidents to regulatory authorities as required.
4. Your Cooperation:
- The internet environment is not absolutely secure. We strongly recommend that you do not use communication methods not recommended by the SciOne platform to send your information, and properly keep your account name and password information. Please use complex passwords to help us ensure the security of your account.
- If you discover that your Personal Information (especially your account or password) has been leaked, please contact our customer service immediately so that we can take appropriate measures according to your request.
- Please note that information you voluntarily share or even publicly share when using our services may involve your or others' Personal Information, or even Sensitive Personal Information. Please consider this more carefully.
VII. How You Can Manage Your Personal Information (Your Rights)
We attach great importance to your rights to manage your Personal Information and make every effort to protect your rights to know, decide, access, copy, correct, supplement, delete, withdraw consent, and cancel your account, so that you have full capacity to protect your privacy and security.
(A) Accessing, Correcting, and Supplementing Your Information
You have the right to access, correct, or supplement your information. You can do this yourself through the following methods:
- Log in to the SciOne-Web client, go to the "Personal Center" or relevant settings page to view or modify personal data, account information, etc.
- Log in to the SciOne-Mobile App client, go to "My" or relevant settings page to view or modify personal data information, etc.
- If you cannot perform these operations through the above methods, or wish to access, correct, or supplement other information, you can contact us at any time through the contact methods provided in Section XI of this Policy.
(B) Deleting Your Information
You can request us to delete your Personal Information in the following situations:
- If the purpose of our processing Personal Information has been achieved, cannot be achieved, or is no longer necessary to achieve the processing purpose;
- If we stop providing products or services, or the retention period has expired;
- If you withdraw your consent;
- If our processing of Personal Information violates laws, regulations, or our agreement with you;
- Other circumstances stipulated by laws and administrative regulations.
You can request deletion through the following methods:
- Delete some of your information through the self-service operations listed in "(A) Accessing, Correcting, and Supplementing Your Information" (e.g., unbinding, modifying avatar, etc.).
- Submit a deletion request to us through the contact methods provided in Section XI of this Policy.
Please note: If we decide to respond to your deletion request, we will also notify, as much as possible, the entities that obtained your Personal Information from us and require them to delete it promptly (unless otherwise stipulated by laws and regulations, or these entities have independently obtained your authorization). After you or we assist you in deleting the relevant information, due to applicable laws and security technology limitations, we may not be able to immediately delete the corresponding information from the backup system. We will securely store your Personal Information and isolate it from any further processing until the backup can be cleared or anonymized. If the retention period stipulated by laws and administrative regulations has not expired, or if deleting the Personal Information is technically difficult, we will stop processing activities other than storage and taking necessary security protection measures.
(C) Changing the Scope of Your Authorized Consent (Withdrawing Consent)
Each business function requires some basic Personal Information to be completed. For the collection and use of Personal Information for extended business functions, you can give or withdraw your authorized consent at any time.
You can do this yourself through the following methods:
- Disable relevant permissions in your device settings (such as location, camera, calendar, etc.).
- Manage permissions on the relevant settings page of our client (e.g., "Settings - Privacy - Permission Management," the specific path depends on the actual interface).
- Contact us through the contact methods provided in Section XI of this Policy.
Please note: When you withdraw consent, we will no longer process the corresponding Personal Information. However, your decision to withdraw consent will not affect the validity of Personal Information processing activities carried out based on your prior authorization.
(D) Canceling Your Account
You have the right to cancel your SciOne account. You can apply for cancellation through the following methods:
- Non-Enterprise Administrator Users: Please contact the administrator of your enterprise. The enterprise administrator can log in to the SciOne-Web client and delete your account in "System Settings - Account Management" (this operation is equivalent to cancellation).
- Enterprise Administrator Users: Please contact us through the contact methods provided in Section XI of this Policy to submit a cancellation request. We will process your request after verifying your identity and relevant circumstances.
After you cancel your account, we will stop providing products or services to you and, upon your request, delete your Personal Information or anonymize it, unless otherwise stipulated by laws and regulations. Account cancellation is an irreversible operation, please decide carefully.
(E) Obtaining a Copy of Your Personal Information (Right to Copy)
You have the right to obtain a copy of your Personal Information. If you need to obtain a copy, you can contact us through the contact methods provided in Section XI of this Policy. We will provide it to you upon your request, provided it complies with relevant legal provisions and is technically feasible.
(F) Right to Data Portability
If you need to transfer your Personal Information to another Personal Information Processor designated by you, under conditions stipulated by the national cyberspace administration department, you can contact us through the contact methods provided in Section XI of this Policy. We will provide you with the transfer path according to law.
(G) Restricting Automated Decision-Making by Information Systems
In certain business functions, we may make decisions based solely on non-manual automated decision-making mechanisms, including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will also provide appropriate remedies (without infringing upon our trade secrets, the rights and interests of other users, or the public interest).
(H) Protection of Deceased Users' Personal Information
If our user unfortunately passes away, their next of kin, for their own legitimate and proper interests, can exercise rights such as accessing, copying, correcting, and deleting the deceased's relevant Personal Information according to law (unless the deceased made other arrangements before their death). Please contact us through the contact methods provided in Section XI of this Policy and provide necessary supporting documents.
(I) Responding to Your Above Requests
To ensure security, when you exercise your rights, we may first ask you to verify your identity (e.g., requiring you to provide a written request or other means). We will provide a response or reasonable explanation within 15 working days after receiving your request and verifying your identity.
For your reasonable requests, we generally do not charge a fee. However, for requests that are repetitive or exceed reasonable limits, we may charge a certain cost fee as appropriate. We may refuse requests that are baseless and repetitive, require excessive technical means (e.g., needing to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical, and we will explain the reasons for refusal.
In the following situations, according to legal and regulatory requirements, we will not be able to respond to your request:
- Related to our performance of obligations stipulated by laws and regulations;
- Directly related to national security or defense security;
- Directly related to public safety, public health, or major public interests;
- Directly related to criminal investigation, prosecution, trial, and judgment execution, etc.;
- Where we have sufficient evidence to show that you have subjective malice or are abusing your rights;
- For the purpose of safeguarding the major legitimate rights and interests, such as life and property, of you or other individuals, but it is difficult to obtain the individual's consent;
- Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
- Involving trade secrets.
If you are not satisfied with our response, or believe that our Personal Information processing activities have harmed your legitimate rights and interests, you have the right to file a complaint or report to relevant regulatory authorities, or file a lawsuit with a people's court with jurisdiction according to law.
VIII. How We Handle Minors' Personal Information
Our products and services are primarily aimed at adults (especially enterprise users). We generally do not actively collect Personal Information from minors under the age of 14.
If we unknowingly collect Personal Information from minors, we will try to delete the relevant data as soon as possible upon discovery. If you believe that we may improperly hold information about a minor, please contact us through the contact methods provided in Section XI of this Policy.
If you are the guardian of a minor, please contact us through the contact methods provided in Section XI of this Policy if you have any questions regarding the Personal Information of the minor under your guardianship.
IX. Third-Party SDKs and Services Description
To ensure the stable operation and functionality of our client, and to enable you to use richer functions and services, our application may embed Software Development Kits (SDKs) or other similar applications from authorized partners. We conduct strict security checks on SDKs used by partners to obtain information to protect data security.
Currently, the third-party SDKs we integrate and related information are as follows:
- Umeng Mobile Statistics (Umeng SDK)
- Third-Party Company Name: Umeng Tongxin (Beijing) Technology Co., Ltd.
- Purpose of Use: For App statistical analysis, such as new users, active users, launch frequency, geographical distribution, page visit paths, etc., to help us understand product usage and optimize user experience.
- Types of Personal Information Collected: Device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information (IP address, WiFi information, base station information, etc.), application list information.
- Permissions Involved: May require access to network state (ACCESS_NETWORK_STATE), phone state (READ_PHONE_STATE), WiFi state (ACCESS_WIFI_STATE), etc. (subject to the actual permissions requested by the SDK).
- Collection Method: SDK native collection.
- Privacy Policy Link: https://www.umeng.com/page/policy (Please refer to the latest official link published by Umeng)
Please note: Third-party SDKs may change the types of data processed due to version upgrades, policy adjustments, etc. Please refer to their official published instructions. If you find risks associated with the SDKs we integrate, or wish to learn more detailed information, please contact us through the contact methods provided in Section XI of this Policy.
X. How This Policy Is Updated
Our Privacy Policy may change from time to time.
We will not reduce your rights under this Policy without your explicit consent. We will post any changes made to this Policy on this page.
For material changes, we will also provide more prominent notice (e.g., pop-up notifications within the App, push notifications, emails, or website announcements), and seek your consent again as required by law (if applicable).
Material changes referred to in this Policy include, but are not limited to:
- Significant changes in our service model, such as changes in the purpose of processing Personal Information, the types of Personal Information processed, the ways Personal Information is used, etc.;
- Significant changes in our ownership structure, organizational structure, etc., such as changes in ownership caused by business adjustments, bankruptcy mergers, etc.;
- Changes in the main objects of Personal Information sharing, transfer, or public disclosure;
- Significant changes in your rights regarding participation in Personal Information processing and the ways to exercise them;
- Changes in the responsible department, contact methods, and complaint channels for handling Personal Information security;
- When the Personal Information security impact assessment report indicates high risks.
We will also archive older versions of this Policy for your review. We recommend that you review this Policy periodically.
XI. How to Contact Us
We have appointed a Personal Information Protection Officer and established a dedicated team. If you have any questions, comments, or suggestions about this Privacy Policy, or wish to exercise your Personal Information rights, you can contact us through the following methods:
- Follow WeChat Official Account: 【iLabService释普信息科技】 (iLabService Shi Pu Information Technology), send a message within the official account.
- Send an email to: contact@ilabservice.com
- Company Name: Shi Pu Information Technology (Shanghai) Co., Ltd.
- Registered Address: Room 03, 4th Floor, No. 18, Lane 2777, Jinxiu East Road, China (Shanghai) Pilot Free Trade Zone
- Common Office Address: Room 03, 4th Floor, No. 18, Lane 2777, Jinxiu East Road, China (Shanghai) Pilot Free Trade Zone
Generally, we will respond within fifteen working days after receiving your question, comment, or suggestion and verifying your user identity.
If you are not satisfied with our response, especially if you believe that our Personal Information processing activities have harmed your legitimate rights and interests, you can also file a complaint or report to relevant regulatory authorities such as the Cyberspace Administration, Telecommunications Administration, Public Security Bureau, and Administration for Market Regulation, or file a lawsuit with a people's court with jurisdiction according to law.
iLabService - Ease Your Lab Operations Privacy Policy