Privacy Policy

 

The Privacy Policy respects and protects the personal privacy of all users of the Privacy Policy Web Services. In order to provide you with the service, our privacy policy covers the way we collect, use, disclose, transfer and store your information. However, the Privacy Policy treats such information with a high degree of diligence and duty of care. This Privacy Policy may be updated from time to time. By agreeing to the Privacy Policy Service Use Agreement, you agree to this Privacy Policy in its entirety. This Privacy Policy is an integral part of the Privacy Policy Network Services Usage Agreement. You are not required to provide the personal information we request, but in many cases, if you choose not to do so, we will not be able to provide you with our products or services or respond to any questions you may have.

Introduction

You acknowledge the matters relating to your use of the service, during which will collect, store, use, disclose and protect your personal information.

 

I. How we collect information

 

We collect only the information necessary to achieve the functionality of our products in accordance with the principles of legality, legitimacy and necessity. The main sources of personal information collected by our company are: information provided by you, information obtained in the course of your use of our products or services, and information about you shared by third parties. We may collect and use your personal information for the purposes of the following product features. If you do not provide relevant information or do not agree to our collection of relevant information, you may not be able to register as our user or enjoy certain services provided by us, or achieve good service results.

 

1. the information you submit through our customer service or when you participate in the activities we hold. In order to get in touch with you in a timely manner and provide feedback on customer service issues or relevant event information, you may provide us with your contact information for timely communication.

 

2. Equipment Information

 

Equipment information refers to information about the equipment you use to use our products or services. For the purpose of necessary adaptation of products and services to devices and provision of security services, information related to device name, device model, device identifier, operating system and application version, language setting, resolution, service provider network ID (PLMN) of your use of Sogou's products or services will be collected when you use the products or services. This information is collected to help us conduct bug analysis, ensure your normal use of our products and services, improve and optimize our product experience, and protect your account security. Except as otherwise expressly agreed in this policy, we will not provide your device information to any third party. However, we cannot guarantee that other third parties will not obtain your device information through other means and combine it with other information to identify you personally, and you shall recover from the third party for any loss caused by this. If you do not want your device information to be collected by us, we may not be able to provide normal services to you.

 

3. Log information

 

For service security purposes, certain information may be automatically collected by the system through cookies or other means and stored in server logs when you use the products and services. Such information may include

 

Details of your use of our products and services, such information may include the web search terms you use, the addresses of the pages you visit, and other information and content details you view or request when using the Services; device or software information, in addition to the device information described above, we may collect the version number, browser type of the software you use. We may collect information about the mobile applications and other software you use in order to ensure the security of your operating environment or as necessary to provide the Services. Device event information, including crashes, system activity information and other relevant information.

 

4. Other information collected with your consent

 

In order to provide you with more convenient, better quality, and personalized products or services, individual specific features of some of our products and services may require you to provide certain personally sensitive information to enable them. If you choose not to provide such information, you may not be able to use the corresponding feature properly, but it will not affect your ability to use other features of the service. These features include.

 

(1) Camera (camera)-based application functions: You can complete the functions of video shooting, photo taking, code scanning and face recognition with camera/camera permission turned on. We may apply face recognition technology to more scenarios in the future, but at that time we will reconfirm with you whether you want us to use your facial information for these extended functions.

 

(2) Photo/video access and upload application functions based on photo album (photo gallery/video gallery): you can use the corresponding functions to edit and process your photos/pictures/videos after enabling photo album permission.

 

(3) Application functions based on microphone and voice technology: You can use the microphone directly to record or implement the corresponding functions after opening the microphone permission. In these functions, we will collect your voice recordings to recognize the content of your voice and achieve the corresponding functional effects.

 

(4) Contacts-based applications: We will collect your contacts information after you turn on the contacts permission, so that you can use the corresponding functions to access your contacts information more conveniently, without having to enter them manually.

 

(5) Calendar-based application function: We will collect your calendar information for memo recording and reminder after you turn on the permission to read/write your calendar.

 

(6) Mobile phone file reading based application function: You can use the corresponding function to edit the files in your cell phone after you enable the permission of file reading/uploading.

 

You understand and agree that the above application features may require you to enable access to your camera (camera), photo album (photo gallery), microphone (voice), address book and calendar in your device to us for the collection and use of information involved in these features. Please note that we will obtain your consent in a pop-up window or similar prominent manner before collecting sensitive personal information. If you voluntarily provide us with your personally sensitive information, you consent to our processing of your personally sensitive information for the purposes and in the manner described in this policy

 

5. Information about you shared by other third parties

 

This includes two main situations: (1) Information posted by other users that may contain your information. (2) Information generated or shared by you when you use the services of third-party partners. When you use Weibo, QQ accounts and other third-party accounts to log into our software products or services, we need to verify your identity or bind your account information and associate the relevant accounts to our products or services with your authorization.

 

II. How we use the collected information

 

We strictly abide by the laws and regulations and the agreements with users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain to you again and ask for your consent.

 

1. to meet your individual needs: for example, language settings, location settings, personalized help services.

 

2. to provide you with services, product development and service optimization: for example, when our systems fail, we record and analyze the information generated when the systems fail and optimize our services.

 

3. to evaluate and improve the effectiveness of our advertising and other promotional and marketing activities.

 

4. to manage software: for example, to perform software certification, software upgrades, etc.

 

5. to invite you to participate in surveys about our services.

 

6. To collect and use your information in accordance with laws and regulations in the following cases, in which case your authorization is not required.

 

Related to national security, national defense security.

 

Related to public safety, public health, and vital public interests.

 

In connection with crime investigation, prosecution, trial and execution of judgment, etc.

 

For the purpose of safeguarding the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals but for which it is difficult to obtain the consent of the person.

 

Necessary for maintaining the safe and stable operation of the products and/or services provided, including the detection and disposal of malfunctions of products and/or services, etc.

 

Necessary for legitimate news reporting.

 

Where necessary for academic research institutions to conduct statistical or academic research in the public interest and to de-identify the personal information contained in the results when providing the results of academic research or descriptions to the public.

 

Other cases stipulated by laws and regulations.

 

7. other uses with your consent.

 

In order to provide you with a better experience, improve our services, or for other uses with your consent, we may use the information collected through certain services for our other services, subject to relevant laws and regulations.

 

To ensure the security of our services and to help us better understand the operation of our applications, we may record information such as how often you use the application, fault information, overall usage, performance data, and the source of the application. We do not combine the information we store in our analytics software with the personally identifiable information you provide in the application.

 

III. How we share, transfer, and publicly disclose your personal information

 

We are fully aware of our legal liability in the event of damage to the subject of personal information caused by illegal sharing, transfer, or public disclosure of personal information, and we will strictly follow the following terms for all sharing, transfer, and public disclosure of your personal information.

 

(i) Sharing

 

Respect for user privacy is a basic principle of ours. We will not share your personal information with any company, organization or individual except in the following cases.

 

1銆丼haring with obtaining explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

 

2. We may share your personal information with external parties as required by judicial or administrative authorities.

 

(ii) Transfer

 

We will not transfer your personal information to any company, organization or individual, except for the following cases.

 

1銆乀ransfer with obtaining explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.

 

2銆両n the event of a merger, acquisition or bankruptcy and liquidation involving the transfer of personal information, we will ask the new company or organization holding your personal information to continue to be bound by this privacy policy before we ask the company or organization to seek your authorized consent again.

 

(iii) Public Disclosure

 

We will disclose your personal information publicly only under the following circumstances.

 

1銆丏isclosure of your specified personal information under the disclosure method you expressly agreed to

 

2. If we are required to provide your personal information by law, regulation, mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information in accordance with the type of personal information requested and the manner of disclosure. Subject to laws and regulations, when we receive a request to disclose information as described above, we will require that a legal document, such as a subpoena or letter of inquiry, must be issued in connection with it.

 

 

IV. How we protect your personal information

 

1. We have used industry-standard security measures to protect the personal information you provide against unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable steps to protect your personal information. For example, the exchange of data (such as credit card information) between your browser and the Service is protected by SSL encryption; we also provide https secure browsing of the Site; we use encryption technology to ensure the confidentiality of data; we use trusted protection mechanisms to prevent malicious attacks on data; we deploy We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; and we will conduct security and privacy training courses to enhance employee awareness of the importance of protecting personal information.

 

We will take all reasonably practicable steps to ensure that no unrelated personal information is collected. Unless we have your written permission, we will retain your personal information for 36 months after you delete or cancel your account, after which time your personal information will be anonymized or destroyed.

 

The Internet is not an absolutely secure environment, and since e-mail, instant messaging, and communication with other users are not encrypted, we strongly recommend that you do not send personal information through such means. Please use complex passwords to help us keep your account secure.

 

4. The Internet environment is not 100% secure and we will do our best to ensure or warrant the security of any information you send to us. If our physical, technical, or administrative safeguards are breached, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legal rights, we will be liable.

 

5. After the unfortunate occurrence of a personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you in accordance with the provisions of the second paragraph of Article 42 of the Network Security Law. We will promptly inform you of the event-related situation by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also take the initiative to report the disposition of personal information security incidents in accordance with the requirements of the regulatory authorities.

 

V. How you manage your personal information

 

1. You can access, modify and delete your registration information and other personal information provided by you in the process of using our services, or you can contact us in accordance with the notification guidelines. The scope and manner of your access, modification and deletion of personal information will depend on the specific service you use.

 

For example, if you wish to stop sharing your geolocation information while using geolocation-related services, you may do so through the cell phone location shutdown feature, hardware and software service providers and communication service providers, and you are advised to read the relevant guidelines carefully.

 

2. We will collect and use your information for the sole purpose of implementing the functions of our products or services as described in this policy.

 

If you find that we collect and use your personal information in violation of the laws and administrative regulations or the agreement between the parties, you can ask us to delete it.

 

If you find that we have collected and stored your personal information in error, you can also ask us to correct it.

 

When you access, modify and delete the relevant information, we may ask you to verify your identity in order to protect the security of your account.

 

3. In the following cases, we will not be able to respond to your request in accordance with the requirements of laws and regulations.

 

Directly related to national security and national defense security.

 

Directly related to public safety, public health, and significant public interests.

 

Directly related to crime investigation, prosecution, trial and execution of judgment, etc.

 

Where there is sufficient evidence of subjective malice or abuse of your rights.

 

Where responding to your request will result in serious damage to the legitimate rights and interests of you or other individuals or organizations.

 

Those that involve trade secrets.

 

VI. Personal information about children

 

Our products, websites and services are primarily intended for adults. Minors are not allowed to create their own user accounts without the consent of their parents or guardians. In the case of personal information collected from minors with parental consent, we will only use or publicly disclose this information when required by judicial or administrative authorities, when expressly agreed to by the parent or guardian, or when necessary to protect the minor.

 

Although local laws and customs define minors differently, we treat anyone under the age of 16 as a minor.

 

If we find ourselves collecting personal information from minors without prior verifiable parental consent, we will seek to delete the relevant data as soon as possible.

 

VII. How this policy is updated

 

Our privacy policy will be updated from time to time.

 

In general, we will not reduce your rights under this Privacy Policy. We will post an updated version on this page and notify you of any changes to this Policy in a pop-up box or in a manner that is as prominent as the pop-up box, and by agreeing to this, you agree to be bound by this Policy as amended.