Privacy Policy

Privacy Policy "Edit Word, XLSX - PDF Reader"


The company respects and attaches great importance to the protection of users' personal privacy.


To provide you with a more accurate and personalized service, we will use and


disclose your personal information in accordance with the provisions of this Privacy Policy. try


make every effort to protect the safety and reliability of your personal information.


This Privacy Policy describes how we will collect and use your personal information


your staff and help you understand your rights. Please read and understand carefully Main


this Privacy Policy before using our services.


This policy will help you understand the following:


1. Definition


2. How we collect and use your personal information


1. Definition


Personal Information: refers to various information recorded electronically


or other means that may determine the identity of a particular natural person, or


reflect the activities of a particular natural person alone or in combination with other information


other. For the purposes of this Privacy Policy, please refer to the information types


individuals listed in the "How We Collect and Use Personal Information" section


Your Person".


Sensitive personal information: refers to personal information once leaked, providing


unauthorized or abusive, which may jeopardize personal and financial safety


property, which is likely to result in damage to personal reputation, physical and mental health or


discriminated against. Sensitive personal information regarding privacy policy


This includes: your personally identifiable information (including ID cards); information


network identity (including account name, account alias and associated password


to the foregoing); other information (including address books, personal phone numbers,


multiplier) number, mobile number, itinerary information, browsing records, information


accommodation, precise location information). For sensitive personal information listed


listed above in this Privacy Policy. For your convenience while reading. Outside


the definition and the list are uniform here, we will still remind you to pay attention in


This privacy policy is in bold or highlighted font.


2. We do not collect user information except sharing it with other users


google tools (Admob, firebase).


We may share device information with advertising partners, but we


I will only give these partners indirect non-personally identifiable vertical cards


you and device, network, and channel information are identified or anonymized to help them improve


improve your ad's effective reach rate without identifying individuals.


In order to better serve our customers, we may use the tool development toolkit


third-party software tools (SDKs). We will also conduct security monitoring


strict for software tool development kit (SDK) and application programming interface


APIs are used by partners to obtain information to protect data security


of the user.


List of third-party SDKs:


Function: Ads SDK to serve ads to users


SDK: com.google.android.gms.ads (AdMob)


Purpose of use: advertising sdk providing advertising services to users


Types of data collected: IMEI, browser type and settings, operating system,


mobile network information (including operator name and phone number) and version number


apps, location info, mac address, etc


Privacy Policy: https://policies.google.com/privacy


At the same time, we will use the following permissions to allow users to experience


Better functions of this product:


1: Storage permission android.permission.WRITE_EXTERNAL_STORAGE


Intended use: for users to store or upload to edit documents


2: Network permission android.permission.INTERNET


Intended use: It is used to synchronize different states of the network,


evaluate the quality of the network, react to situations and handle other activities


each other, etc.


3: Network permission android.permission.ACCESS_NETWORK_STATE


Intended use: to get the status of network information, such as connection


Is the current network valid?


4: Network permission android.permission.ACCESS_WIFI_STATE


Intended use: Get WiFi status, used to get WiFi access status


Current and information about WLAN hotspots


5: Network permission android.permission.CHANGE_NETWORK_STATE


Intended use: change the network state to change the network state, for example


like can you connect to the internet


We will not share your personal information with any company or organization


or any other person other than our company, except in the following cases:


With your (and your guardian's) express consent or authorization or your choice


your voluntary choice;


We may share your personal information outside in accordance with laws and regulations


decisions, litigation and dispute resolution needs, or at the request of the authorities


administrative and judicial. For example, if we determine that you have broken the law and


provision or materially violate the rules of this agreement or to protect the


personal safety and property of users of our company and affiliates


or the public, we may disclose relevant information in accordance with laws and regulations


or platform-related agreement rules. Your personal information, including


includes violations and related actions we have taken against you.


For example, if you or the account you use upload illegal videos, illegal videos


legal and seriously violate our rules, laws and regulations


regulations and/or violate public order and fine customs, causing social impacts


significantly and damage the reputation of our platform, we may save


disclosures to you and penalties.


Share your personal information with our affiliates. In those


In such cases, we will only share necessary and binding personal information


required by the purposes set forth in this Privacy Policy. If their affiliates


I want to change the purpose of processing personal information, they will ask your permission again.


(2) Transfer


1. We will not transfer your personal information to any company or organization


any organization or individual, except in the following cases:


2. Transfer with express consent: After receiving your express consent,


we will transfer your personal information to other parties;


3. In the event of a merger, acquisition or liquidation of the company's bankruptcy, or other


other circumstances related to mergers, acquisitions, or liquidation of bankruptcy, if relevant


To the transfer of personal information, we will ask companies and organizations


new holder of your personal information continues to be subject to this If not,


We will ask companies, organizations and individuals to ask your permission again.


(3) Publicity


1. We will only publicly disclose your personal information in the fields


following and on the basis of implementing security measures according to the standards of


branch:


2. According to your needs. Disclosure of personal information specified by you in a


disclosure to which you fully agree;


3. As required by laws and regulations, mandatory or required by law enforcement


judicial, we will only publicly disclose your personal information in the


the following case and on the basis of implementing standard security measures


of the industry:


4. According to your needs. Disclosure of personal information specified by you in a


disclosure to which you fully agree;


5. When it is necessary to provide your personal information as required by law


and regulations, enforcement agencies or judicial requirements. We can


disclose your personal information in the forms and methods of disclosure


request. Subject to laws and regulations, when we receive a request to disclose


information, we will require the presentation of the corresponding legal documents. We do


confidence that the information requested from us should be as transparent as possible


to the extent permitted by law and we will carefully consider all requests


to ensure that they have a legitimate basis. And only data that enforcement agencies


law has a legal right to obtain for specific investigative purposes.


(4) Exceptions to permission and consent before sharing, transferring


delivery and disclosure of personal information


1. In accordance with relevant laws and regulations, in the following cases


Here, sharing, transferring and publicly disclosing your personal information


Your prior permission and consent is required:


2. Directly related to national security and national defense security;


3. Matters directly related to public safety, public health and welfare


major public interest;


4. Matters related to investigation, prosecution, trial and execution of criminal judgments


the;


5. To protect the life and property of the personal information subject or individuals


other but it is difficult to obtain the consent of that individual;


6. Personal information disclosed by the subject providing personal information


general public;


7. Other situations as prescribed by law.


In accordance with the law, the sharing and transfer of personal information has been


de-identify and ensure that the recipient of the data cannot be recovered and identified


the subject of personal information is not sharing, transferring or disclosing


disclose personal information to the outside. will not be required to notify you


and get your consent.


4. How we protect and save your personal information


(1) Technical protection


To ensure the security of your information, we try to do many things


reasonable physical, electronic and management security measures in accordance with the standards of


industry to protect your information, so that your information is not leaked, damaged


or loss, including but not limited to SSL, encrypted information storage,


data center access control. We will use encryption technology to improve


improve the security of personal information; we will use protection mechanisms


reliable to prevent personal information from being maliciously hacked; we will deploy


access control mechanisms and make every effort to ensure that only those who


Only authorized person can access personal information.


(2) Complete institutional measures


We have built a protection system that covers all aspects of tax collection


collection, storage, use, circulation, destruction of personal information, incident reporting,


etc and establish technical support measures.


(3) Personnel safety management


We also strictly manage employees or outsourced employees who have


may have access to your information, including but not limited to


use different rights controls in different locations, sign agreements


non-disclosure agreements with them and employees' access and mass access rights


limited to system or legal conversion Requires system authorization of two


or more administrators when cooperating with law enforcement. We


will provide corresponding security measures to protect your information and provide


reasonable confidentiality under existing technology and we will do our best to keep information


your device is not leaked, damaged or lost. We will hold training courses


about security and privacy to raise employee awareness of the importance


of the protection of personal information.


(4) Sensitive information and password protection tips


Note about protecting sensitive personal information: information you share voluntarily


or even publicity where using our services may involve


your or someone else's personal information or even personally sensitive information.


Please consider more carefully whether to share or even share publicly


relevant information when using our services or not. We will try


Make every effort to keep any information you submit to us confidential. If facilities, techniques


damage to our technical or management facilities resulting in unauthorized access,


public disclosure, forgery or destruction of information, resulting in damage to rights and


your legitimate interests, we will take the corresponding legal responsibility. Finance


Your account has security protection functions, please keep your account information secure


and your password properly. We will make sure that your information is not stolen


lost, misused and altered through security measures such as backing up to


another server and encrypt the user password. Despite the security measures say


above, please understand that there is no "perfect security measure" on the information network.


Information disclosure tips and handling of password leaks: Please note that the Internet is not


is an absolutely safe environment, we will do our best to ensure the safety


confidentiality of any information you submit to us, please protect your personal information


your staff in a reasonable manner. Give to others only when necessary If you


discovered my personal information was exposed, especially account and password, happy


Please contact our customer service immediately. so that we have


suitable remedial measures.


(5) Handling information security incidents


In the unfortunate event of a personal information security incident, we will


notify you according to the requirements of laws and regulations: the basic situation and


possible impact of the security incident, the actions we have taken or will take


present, recommendations that you can make to prevent and reduce the risk, measures to


remedy for you, etc. We will notify you of related cases


view of the event via email, mail, phone, push notification, ... When it's difficult to notify


For each subject of personal information, we will appropriately disclose the notice


rational and effective. At the same time, we will also report the handling of security incidents


all personal information in accordance with the requirements of the management agency.


(6) How do we store your personal information


Storage location: The Company will comply with the provisions of laws and regulations.


Personal information collected and generated during operations in the country will


stored in the territory of the People's Republic of China, and shall not be


transmitted abroad. If the company has a need to transmit overseas due to demand


Business development will clearly communicate and obtain your consent.


Storage period: We will take reasonable and practical steps to avoid


collect irrelevant personal information. We will only keep personal information


your employees in the shortest time necessary to achieve your own goals


this book, unless you agree to an extended period of retention or are otherwise authorized by law


permission. After the storage period is exceeded, we will delete your personal information


or take technical measures to anonymize such information, unless the law and


regulations have other provisions.


5. Your Rights


1. After you complete the account registration and perform proper identity verification


reasonable and necessary, you may view, modify and delete the personal information you submit. In


Under normal circumstances, you can browse, modify and delete the information you submit at any time


at any time, but for security and identity reasons, some information cannot be modified


Initial registration and verification information provided during registration.


2. We always put the protection of user information first, you have the right


Update or edit your information as you please. Before you update and


correct your information, to protect the security of your account and ensure


ensure that this update and repair is done by you, we will first


verify your identity, then update and correct your information.


3. If you don't want us to get some of your information, you can stop it


I get your information by closing some functions. After closing some positions


capacity, we will not be able to provide you with the respective services.


4. We respect the user's usage habits. If you decide not


use our products and services too, you can contact the staff


official customer service to request cancellation of your account. Before canceling the account


your account, we will verify your personal identity, security status, device


commonly used devices and other information to protect account security and ensure


that you perform the account cancellation. Special Note: Action of canceling your account


you are unchangeable. After you cancel your account, we will


delete or anonymize all information about your account instantly. We guarantee


guarantee that this information will not be disclosed and also, you will not be able to receive


services through the account have been cancelled.


5. Access to Privacy Policy: We will remind you of Privacy Policy


this when you first sign up for an account and decide for yourself to agree to


it. Alternatively, you can log in to your personal account in the mobile app


to view this Privacy Policy at any time. Of the entire content.


If we terminate the service or operation, we will notify you in advance


at least thirty days and delete or anonymize your personal information upon termination


service or activity.


6. Protection of minors


We attach great importance to the protection of the personal information of minors. If


you are a minor under the age of 18. Before you use related services


to edit documents. You should read and agree to this Privacy Policy


under the supervision and guidance of your parents or other guardians, and


when using our services or providing information to us with


consent of your guardian.


For the collection of personal information of minors using the


our products or services with the consent of a parent or guardian,


We will only use, share and transfer the personal information of minors


permitted by law and regulation, showing parental or guardian consent


or is necessary to protect the minor or to disclose this information. If we


I am aware that the personal information of minors has been collected without


Without prior verifiable parental consent, we will attempt to remove the information


the sooner the better.


7. How to update this policy


(1) The Company may amend this privacy policy from time to time and


We will not reduce your rights under this privacy policy without your consent


your express consent.


(2) After the Privacy Policy is updated. The company will show you the main


privacy book changed as push notification and pop-up box when you sign in


and update version. So that you can keep up to date with new versions of the Policy


this privacy. If you continue to use our services. Tell the truth


agree to accept the contents of this Policy as amended.


(3) For major changes, we will also provide more prominent announcements


(We will explain specific changes to the privacy policy by


ways, but not limited to, text messages, private messages, and special reminders


separate on the login page with a pop-up window). We will also


archive older versions of this policy for your review. Important changes


Important points addressed in this Privacy Policy include, but are not limited to


term in:


1. Our service model has undergone major changes. Such as item


purpose of processing personal information, the type of personal information is processed, how the personal information is processed


kernel used, etc.;


2. We have undergone major changes in ownership structure, organizational structure, etc.


Such as all changes due to business adjustments, mergers and acquisitions,


property, etc;


3. The main object of sharing, transferring or disclosing personal information


changed;


4. Substantial changes to your right to participate in the processing of personal information


person and how such information is to be exercised;


5. When there are changes to the department in charge, contact information and channels


complaints that we are responsible for handling about the security of personal information;


6. When the personal information security impact assessment report indicates that there is a risk


high.


8. Scope of application


This privacy policy applies to all services provided by the company and its affiliates


Its offers, including a client, a “Edit Word, XLSX - PDF Reader” website, etc. It


does not apply to third-party products with separate privacy policies and


are not associated with this Privacy Policy or Offer.


1. Other third party products or services, which may include products or


Websites and advertising are shown to you in personalized recommendations


personification or other products or websites linked to in the Service


"Manage word documents";


2. Other third parties advertise the “Edit Word, XLSX - PDF Reader” service.


Your use of these third-party services (including any personal information


which you provide to these third parties) will be governed by these terms


The services and privacy policies of these third parties (not the Privacy Policy


this). Please read the terms of the third party carefully. Please protect information


your personal information reasonably and only make it available to third parties when necessary.


“Edit Word, XLSX - PDF Reader” and related services are described in this Privacy Policy


This password may vary depending on the mobile phone model, system version, version


software application version and other elements that you use. Products and services


ultimately subject to the software "Edit Word, XLSX - PDF Reader" and related services


that you use.


If you have any questions, comments or suggestions regarding the content of the Privacy Policy,


You can contact us by logging in to the "Feedback" page.


in the app "Edit Word, XLSX - PDF Reader" or email craflo.mdy@gmail.com.


9. How to contact us


If you have any questions, comments or suggestions regarding this Privacy Policy. Friend


can contact us through the official message. We will consider


related issues as soon as possible and respond immediately after confirmation


Verify your user identity. In general, we will respond to your request


within thirty days.