Soex User Privacy Policy
Introduction
Soex attaches importance to user information security and privacy protection, and makes every effort to prevent the leakage, destruction and loss of your information through reasonable and effective information security technology and management processes; to provide you with convenient information management options to enhance the convenience of your information management; to protect your communication secrets and safeguard your information and communication security. Soex strictly complies with laws and regulations, collects only the necessary information, and enhances the transparency of information processing, and integrates various factors such as laws, products, and design in all aspects of product or service development, incorporating the concept of privacy protection to provide you with more secure and reliable services.
We have created and follow this Soex User Privacy Policy (this "Policy") to explain to you, among other things, that:
- · What information we collect;
- · The purposes for which we collect information;
- · Your rights.
We hope you will read the Privacy Policy carefully and learn more about how we collect and use information so that you can better understand our services and make appropriate choices.
By using the Soex Services, you are agreeing to what we have stated in this policy.
Definition
Unless otherwise agreed, terms used in this policy shall have the following definitions.
Personal information: refers to all kinds of information recorded electronically or otherwise that can identify a natural person's personal identity alone or in combination with other information, including but not limited to a natural person's name, date of birth, personal biometric information, address, telephone number, etc.
1. Sensitive personal information: It refers to personal information that may endanger the safety of persons and property if leaked, illegally provided or misused, and is highly likely to lead to damage to personal reputation, physical and mental health or discriminatory treatment, etc. For example, personal sensitive information includes personal biometric information, bank account numbers, communication contents, etc.
2. Device: is a device that can be used to access the Soex Services, such as a desktop computer, laptop, tablet or smartphone.
3. Unique Device Identifier: (Unique ID or UUID) is a string of characters programmed into a device by the device manufacturer that can be used to uniquely identify the corresponding device (e.g., the phone's IMEI number). Unique Device Identifiers have a variety of uses, including serving ads when cookies cannot be used (e.g., in mobile applications).
4. IP Address: Each device that accesses the Internet is assigned a number, called an Internet Protocol (IP) address. These numbers are usually assigned based on geographic areas. IP addresses can often be used to identify where a device is located when it is connected to the Internet.
5. GPS: Short for Global Positioning System. The GPS signal receiver on the device you are using receives signals from GPS satellites and uses the incoming information to calculate your location.
6. WIFI: Wi-Fi is a technology that allows electronic devices to connect to a wireless local area network (WLAN), commonly referred to as a wireless network.
7. Base station, that is, public mobile communication base station, is a form of radio station, refers to a certain radio coverage area, through the mobile communication exchange center, and cell phone terminals for information transmission between the radio transceiver station.
8. SSL: (Secure Socket Layer) is a security protocol implemented over the Transport Communications Protocol (TCP/IP), which supports various types of networks and provides three basic security services, all of which use public key and symmetric key technologies to achieve information confidentiality.
9. Automatic collection: includes the following methods:
(1) Cookie (cookie file)
A cookie is a small text file that a web server places inside your client (your computer, cell phone or other smart terminal) when you browse the web and can be used to improve your experience, as described in the Cookie Policy Statement.
(2) Web beacon (Web beacon)
Web beacons are electronic image files or other technologies embedded in websites or emails that can be used to count the number of visitors, record if and when you view an email or website, or to use certain cookies.
(3) Log files (log files)
Log files store several pieces of data that are collected automatically. This data includes Internet Protocol (IP) addresses, browser types, Internet Service Providers (ISPs), referring/exit pages, operating systems, date/time stamps, and clickstream data.
(4) ET Tag (Entity Tag)
ET Tag is an HTTP protocol header that is transmitted behind the Internet browser and the Internet server and can be used instead of cookies to track individual users, allowing us to gain more insight and improve our services.
(5) JavaScript
JavaScript is a programming language used to create more interactive and dynamic web pages. JavaScript can set cookies, read cookies, and delete cookies.
Except as defined above, all other terms used in this Policy have the same meaning as those in the Soex Software License and Services Agreement. If you have questions, please contact us.
I. The information we collect
We collect only the information necessary to achieve the function of the product based on the principles of legality, legitimacy and necessity. Information We collect only the information necessary to perform the functions of our products.
- 1.1 Information you voluntarily provide when using our services
- 1.1.1 The information you fill in when you register your account.
For example, the nickname you filled in when you registered with Soex.
- 1.1.2 Information that you upload when using the Services.
For example, you are using an avatar uploaded by Soex.
- 1.1.3 Information that you submit through our customer service or when you participate in one of our events.
For example, the survey you fill out when you participate in our online activities may contain information such as your name, phone number, home address, etc.
Some of our services may require you to provide certain personally sensitive information to perform certain functions. If you choose not to provide such information, you may not be able to use certain features of the Services properly, but it will not affect your ability to use other features of the Services.
By voluntarily providing your personally sensitive information, you are consenting to our processing of your personally sensitive information for the purposes and in the manner described in this policy.
- 1.2 Information we obtain when you use the Services.
- 1.2.1 Log Information.
When you use our services, we may automatically collect relevant information and store it as service log information.
- (1)Device information.
For example Device model, operating system version, the unique device identifier , battery, signal strength, and other information.
- (2)Software information.
For example, the version number of the software, the type of browser. We may collect information about the mobile applications and other software you use in order to ensure the security of the operating environment or as necessary to provide the Services.
- (3) IP address.
- (4)Service log information.
For example, the information you search and view when using our services, service failure information, referral URLs, etc.
- (5)Communication log information.
For example, the accounts to which you have communicated while using our Services, the time and length of communication.
- 1.2.2 Location Information.
When you use location-related services, we may record information about the location of your device in order to provide you with the relevant services.
(1) When you use the Services, we may send you a message via IP address , GPS , WiFi or base station such as GPS, WiFi or base stations to obtain your geographic location information;
(2) Information provided by you or other users when using the Services may contain information about your geographic location, such as information about your area that may be included in the account information you provide, or geotagged information contained in photos shared by you or others;
- 1.2.3 Other Relevant Information.
To help you better use our products or services, we may collect relevant information. For example, we collect friend lists, group list information, and voiceprint profile information. To ensure that you can contact people you know when you use our services, we may encrypt the names and phone numbers of your contacts and collect only the encrypted information if you choose to enable the import address book feature.
- 1.3 Information shared by other users contains your information.
For example, photos posted or videos shared by other users may contain information about you.
- 1.4 Information obtained from third-party partners
We may obtain information that you generate or share when you use a Third Party Partner Service. For example, when you log in to a Third Party Partner Service using your Soex account, or when you log in to Dsyncle using your Third Party Partner Service account, we may obtain the name of the Third Party Partner Service you are logged into, the time you are logged in, or the time you are logged into Dsyncle to facilitate your authorization management.
Please read the user agreement or privacy policy of the third party partner service carefully.
II. How we use the information collected
We use the information we collect for the following purposes in strict compliance with the laws and regulations and our agreements with users. If we use your information for purposes other than those listed below, we will again explain this to you and ask for your consent.
- 2.1 Provision of services to you.
- 2.2 Meet your individual needs.
For example, language setting, location setting, personalized help service.
- 2.3 Product development and service optimization.
For example, when our system fails, we record and analyze the information generated when the system fails to optimize our services.
- 2.4 Security.
For example, we may use your information for purposes such as identity verification, security prevention, anti-fraud monitoring, archival backup, and security services for our customers. For example, security software that you download or install may detect malicious programs or viruses or identify fraudulent information for you.
- 2.5 Evaluate and improve the effectiveness of our advertising placement and other promotional and publicity activities.
- 2.6 Management software.For example, perform software certification, software upgrades, etc.
- 2.7 You are invited to participate in surveys about our services.
In order to provide you with a better experience, to improve our services or for other purposes with your consent, we may use information collected through certain services for our other services, subject to relevant laws and regulations. For example, information from your use of one of our services may be used to show you personalized content or advertisements in another service, for user research analysis and statistics, and other services.
To ensure the security of our services and to help us better understand the operation of our applications, we may record information such as how often you use the application, fault information, overall usage, performance data, and the source of the application. We do not combine the information we store in our analytics software with the personally identifiable information you provide in the application.
III. The information you share
You can share information about yourself with your friends, family and other users through our service. Please note that this may include sensitive information such as your personally identifiable information and personal property information. Please consider disclosing your relevant sensitive personal information carefully.
IV. How do you manage your information
4.1 You may access, modify and delete the personal information you provide in the course of using our services or you may contact us as directed by the notice.The scope and manner in which you can access, modify and delete your personal information will depend on the specific service you are using.For example, if you wish to stop sharing your geolocation information when using geolocation-related services, you can stop sharing through the cell phone location shutdown function, software and hardware service providers and communication service providers' shutdown methods, and we recommend you read the relevant guidelines carefully.
4.2 We will collect and use your information as described in this policy only to achieve the function of our products or services.If you find that we collect and use your personal information in violation of the laws and administrative regulations or the agreement between the parties, you can ask us to delete it. If you find that we have collected or stored your personal information in error, you may also ask us to correct it. Please contact us through the contact information listed in this policy.
4.3 When you access, modify and delete relevant information, we may require you to verify your identity in order to protect the security of your account.
4.4 Please understand that due to technical limitations, legal or regulatory requirements, we may not be able to meet all of your requests and we will respond to your request within a reasonable period of time.
V. The information we share
We follow the laws and regulations and impose strict restrictions on the sharing of information, such as
5.1 we may share your personal information with third parties with your prior consent;
5.2 For external processing purposes only, we may share your personal information with third party partners (third party service providers, contractors, agents, application developers, etc., e.g., communication service providers who send email or push notifications on our behalf, mapping service providers who provide location services to us), who may not be located in your jurisdiction, to allow them to process your personal information for us in accordance with our instructions, privacy policies, and other relevant confidentiality and security measures to process said information for us and to use it for the following purposes:
5.2.1 Providing our services to you;
5.2.2 to achieve the purposes described in the "How we use the information we collect" section;
5.2.3 to perform our obligations and exercise our rights under the Dsyncle Software License and Services Agreement or this Policy;
5.2.4 Understand, maintain and improve our services. If we share your information with these third parties, we will use encryption, anonymization and other means to keep your information secure.
5.3 As our business continues to grow, when a merger, acquisition, asset transfer or other transaction occurs that results in the sharing of your personal information to a third party, we will inform you of the circumstances through push notifications, announcements, etc., and continue to protect or require new administrators to continue to protect your personal information in accordance with laws and regulations and standards no less stringent than those required by this policy.
5.4 We may use the information we collect for big data analysis. For example, we use the information we collect for analysis to form city heat maps or industry insight reports that do not contain any personal information. We may disclose and share statistically processed, non-identifiable information with our partners for the purpose of understanding how users use our Services or to inform the public about general usage trends of our Services.
5.5 We may disclose your personal information for the following purposes:
5.5.1 Compliance with applicable laws and regulations and other relevant provisions;
5.5.2 to comply with the provisions of court judgments, decisions or other legal proceedings
5.5.3 Comply with the requirements of relevant government agencies or other legally authorized organizations;
5.5.4 we are reasonably satisfied that compliance with relevant regulations, such as laws and regulations, is required;
5.5.5 for purposes that are reasonable and necessary to enforce the relevant Service Agreement or this Policy, to protect the public interest, to protect the personal property of our customers, our or our affiliates, other users or employees or other legitimate rights and interests.
VI. Information we may send to you
6.1 Information push
When you use our services, we may send you emails, text messages, information or push notifications. You can choose to unsubscribe on your device by following our relevant prompts.
6.2 Service related announcements
We may send you service-related announcements when necessary (for example, when a service is suspended for system maintenance). You may not be able to cancel these service-related announcements that are not advertisements in nature.
Ⅶ. the location and duration of the stored information
7.1 Location of stored information
We comply with laws and regulations and store the personal information collected from users in locations permitted by laws and regulations.
7.2 Duration of stored information
In general, we will retain your personal information for the minimum time necessary to achieve the purpose. However, we may change the duration of storage of personal information due to the need to comply with legal requirements in the following cases:
7.2.1 To comply with applicable laws and regulations and other relevant provisions;
7.2.2 To comply with the provisions of a court judgment, ruling or other legal process;
7.2.3 To comply with the requirements of the relevant government agency or legally authorized organization;
7.2.4 we are reasonably satisfied that compliance with relevant regulations, such as laws and regulations, is required;
7.2.5 for purposes reasonably necessary to enforce the relevant Service Agreement or this Policy, to protect the public interest, to protect the personal property of our customers, our or our affiliates, other users or employees or other legitimate rights and interests.
In the event that our products or services are discontinued, we will notify you by, for example, push notification, announcement, etc, and delete or anonymize your personal information within a reasonable period of time.
VIII. Information Security
We provide appropriate security for your information to protect it from loss, improper use, unauthorized access or disclosure.
8.1 We strictly comply with laws and regulations to protect the confidentiality of users' communications.
8.2 We will use a variety of security protections within a reasonable level of security to safeguard information. For example, we use encryption technologies (e.g., TLS, SSL ), anonymization processes, etc. to protect your personal information.
8.3 We have established special management systems, processes and organizations to ensure information security. For example, we strictly limit the scope of people who access information, require them to comply with confidentiality obligations, and conduct reviews.
8.4 In the event of a security incident such as the leakage of personal information, we will initiate emergency plans to prevent the expansion of the security incident and inform you in the form of push notifications, announcements, etc.
IX. Protection of minors
We take the protection of personal information of minors very seriously. In accordance with the relevant laws and regulations, if you are a minor under the age of 18, you should obtain prior consent from your parent or legal guardian before using Dsyncle's services. If you are the guardian of a minor, please contact us if you have any questions regarding the personal information of the minor in your custody.
X. Scope of application
This policy applies to all of our services. However, some services have specific privacy guidelines/statements that describe
more specifically how we handle your information in connection with that service. In the event of any inconsistency between this Policy and the privacy guidelines/statement of a particular service, that particular privacy guidelines/statement shall prevail.
Please note that this policy does not apply to services provided by other companies or individuals. For example,
you may use your Dsyncle account to access services provided by other companies or individuals.
Your use of such third party services is governed by their privacy policies (not this Policy) and you need to read them carefully.
XI. Changes
We may revise the contents of this Policy from time to time. If such changes would result in a material diminution of your rights under this Policy, we will notify you, including by prominently displaying a notice on the page, before the changes become effective.
In such case, by continuing to use our Services, you agree to be bound by the revised Policy.