Picsys Privacy Policy
Picsys Privacy Policy
Release/Update Date: 01.01.2023
Effective date: 01.01.2023
【Overview】
Picsys (hereinafter also referred to as "we") attaches great importance to user privacy. We are fully aware of the importance of personal information to you, and promise to strictly abide by laws and regulations, refer to mature security standards in the industry, and do our best to protect your personal information in a safe and controllable manner. To this end, we have formulated this "Privacy Policy of Picsys" (hereinafter referred to as the "Policy") so that you can understand in detail how Picsys will collect, use, transmit, store and disclose your information under our products and/or services. Personal information and what rights you have. We treat and handle this policy with a high degree of prudence, and try to explain it to you in an easy-to-understand manner. Among them, the explanation of each technical term and its source are specifically listed in the form of an appendix; the content closely related to your rights will be highlighted in bold or underlined form; the permission acquisition instructions of each mobile application and the third-party SDK integration status, etc. A detailed description will be made in the form of a hyperlink.
This policy applies to all Picsys products and services, including the services provided by Picsys through its own branded smart hardware or various Picsys software, as well as some functions/services (such as small programs, Picsys Service under the official account) (hereinafter collectively referred to as "our products and/or services").
Our products and/or services have many types and are optimized from time to time. The personal information on which specific products or services depend may be different or may be adjusted after the issuance of this policy. Therefore, in addition to this policy, we will also use privacy reminders, supplementary statements, etc. (such as "Picsys Mobile Application Privacy Statement") to explain to you the processing of personal information under certain specific products or services; when using these products or When serving, please pay attention to reading the relevant prompts or statements. If the content is inconsistent with this policy, the former shall prevail within the bounds of the relevant prompts or statements.
This policy and its related documents are closely related to your use of our products and/or services. Please read and understand these documents (especially the terms we highlight) carefully before using our products and services to ensure that you fully understand them. Content and agree with our approach. You do not have to accept this policy or its related documents, but you should be aware that if you choose not to accept it, Picsys will not be able to provide you with a complete product or service, and may not be able to respond or solve your problems in certain specific scenarios. The problem. You can also choose to stop using our products or services. When you choose to continue to sign this policy or use it again, based on the necessity of providing products and services, it will be deemed that you have accepted and recognized it. In addition, after we update this policy (we will prompt you to update it), if you continue to use our products and/or services, it will be deemed that you agree to accept the content of this policy (including the updated version).
When our specific products or services cease to operate, we will notify you in advance through system notifications, announcements, text messages, emails, etc. and process your corresponding personal information in accordance with this policy or related documents. If we cease operations permanently, this policy will subsequently become invalid, and we will process all your personal information in accordance with applicable laws and regulations.
Before further reading and understanding this policy, please note that:
1) This policy does not apply to services provided by other companies or individuals (hereinafter referred to as "third-party services"). For the convenience of users or cooperation based on advertisements, drainage, etc. our products and/or services may contain third-party services or their links; however, since third parties will independently collect and process your personal information, Picsys has no control, therefore, Unless otherwise stipulated by law, Picsys is not responsible for third-party services. You need to read and refer to the privacy policies of these third parties, and independently determine whether to use their services.
2) Your understanding and cooperation are very important for us to protect the personal information and privacy of you and your associates. Your ID card, password, verification code and other information are kept by you. Please carefully evaluate the physical environment and electronic environment when storing, inputting, and using this information to prevent information leakage. In addition, our products and/or services may support you to collect or use content that contains personal information of others (for example, you can use Picsys equipment with a video recording function to view the activities of personnel within a specified range); in order to maintain the subject of personal information Legal rights, please carefully ensure that you have legally obtained the authorization and consent of the relevant subject before submitting to us or collecting personal information of others through our products and/or services. In particular, if the aforementioned information involves children's personal information, you need to obtain the consent of the corresponding child's guardian in advance.
The main points of this policy are as follows:
1. In order to facilitate you to understand the types and purposes of information we need to collect when you use our services, we will explain to you one by one in conjunction with specific services and/or client software.
2. In order to provide you with services and maintain the security of the business system, we will collect your personal information in accordance with the principles of lawfulness, fairness and necessity. At the same time, we will try our best to ensure the safety and order of your personal information use, processing, storage and other circulation processes through organizational construction, system specifications, and technical measures.
3. If you need to share your information with a third party in order to provide you with services, we will carefully evaluate the legality of the third party’s information collection, its data security capabilities and other factors, and provide information to you through this policy or related supplementary statements. You express relevant information.
4. You can exercise your personal information subject rights through the methods described in this policy, or contact our personal information protection officer for further instructions or explanations.
If you have any questions, comments or suggestions about this policy or your personal information related matters, please contact us by calling [+91-9019706827], and our customer service specialist will answer you as soon as possible.
[Policy text]
You can read the corresponding chapters according to the following index to learn more about the specific content of this policy:
Chapter 1: How we collect and use your personal information
1. the personal information we collect and use
2. Rules for the use of your personal information
3. The exception of obtaining authorization and consent in advance when collecting and using personal information
Chapter 2: How do we entrust the processing, sharing, transfer and public disclosure of your personal information
1. Entrusted processing
2. Sharing
3. Transfer
4. Public disclosure
5. Exceptions for prior authorization and consent for sharing, transfer, and public disclosure
Chapter 3: How do we protect and store your personal information
1. Protection and security measures of your personal information
2. Storage of your personal information
Chapter 4: Your Rights
1. Access and correction of personal information
2. Delete personal information
3. Change the scope of authorization and consent or withdraw authorization
4. cancel account
5. Constraint information system automatic decision-making
6. Obtain a copy of personal information and request response
Chapter 5: Third Party Services
Chapter 6: How do we deal with the personal information of minors
Chapter 7: Revision and update of this policy
Chapter 8: How to contact us
Chapter 1: How we collect and use your personal information
1. Personal information we collect and use
When using our products and/or services, you may need to actively submit to us or authorize us to collect and use personal information including the following two types:
(1) Information necessary to provide you with the basic business functions of our products and/or services. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally;
(2) Information needed to provide you with additional business functions of our products and/or services. If you refuse to provide it, you will not be able to use the relevant additional business functions or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic business functions of our products and/or services.
Remind you:
1) Our products and/or services are provided through different carriers, and there are differences in the specific products/services that different users choose to use; accordingly, the basic/additional functions and the type and scope of personal information collected and used will be different, please Subject to specific product/service functions;
2) Some services may require you to enable corresponding permissions on your terminal device, including location information (geographic location), camera (camera), photo album and storage, microphone (voice), address book, calendar and/or phone status Wait. You can view the specific permissions involved under each Picsys APP through the "Privacy Statement of Picsys Mobile Application", and through the "Settings-Application Permissions" of your device or "My-Settings-System Permission Settings" of each APP Turn on or off permissions at any time to manage your corresponding information authorization.
3) In order to bring you a better product and service experience, we are constantly striving to improve our technology, and then we may launch new or optimized functions from time to time, and may need to collect and use new personal information or change Purpose or method of using personal information. In this regard, we will separately explain to you the collection purpose, scope and method of use of the corresponding information by updating this policy, pop-up windows, page prompts, etc. and provide you with a way to choose your consent, and after obtaining your express consent Collect and use. During this process, if you have any questions, comments or suggestions, you can contact us through the various contact methods listed in this policy, and we will answer you as soon as possible.
We will collect and use your personal information to achieve the following functions and purposes of this policy:
(1) Registration, login account and verification:
By registering a Picsys account, you can get more comprehensive services and better experience in various Picsys software. In order to register a Picsys account, you need to provide your mobile phone number , password and verification code; this information is to meet the network real-name system requirements of relevant laws and regulations. If you refuse to provide it, you will not be able to successfully register. also:
1. You can choose to fill in supplementary information such as nickname, email address , region, ID card, etc. according to your own needs in order to use our other personalized services (the specific service content and corresponding information will be notified to you through system prompts, etc.), unless otherwise stated , Refusal to submit these supplementary information will not affect your use of the basic functions of the Picsys account.
2. For services that require a Picsys account to be used, we may verify your user identity based on the above information provided by you to ensure that we are providing services for you.
(2) Picsys Cloud Service:
On the premise of login with Picsys account, you can bind your Picsys smart hardware products in Picsys APP and other Picsys software and perform remote control or management (ie "Picsys Cloud Service"). We will collect and use the corresponding personal information according to the specific functions you choose to use:
1. When you bind your Picsys device to use the Picsys cloud service, we will collect your bound product serial number and product verification code. This type of information is unique basic product information, and is the basic information that must be collected to bind products and further provide you with Picsys cloud services.
2. When you use the surveillance video preview function, we will collect a screenshot of your current video screen to facilitate you to identify the surveillance location; the screenshot will be deleted immediately the next day. You can refuse our collection through video encryption. It should be noted that, unless you additionally use value-added services based on video analysis and are authorized to Picsys accordingly, we will not view your video content and/or the above-mentioned video screenshots.
3. When you use remote intercom and other functions, we will collect the audio content you submit accordingly in order to implement this function for you. You can turn off the microphone permission through the system settings to refuse our collection, but this will prevent you from using this feature.
4. When you use the analysis or comparison function based on user reference information (including face/human shape recognition, license plate/vehicle recognition, voice recognition, text recognition, fingerprint unlocking), you need to enter face images, fingerprints, voices, etc. in advance Benchmark information so that we can extract and process the characteristic values of your benchmark information and implement related services on the hardware; if you refuse to provide it, you will not be able to use related functions.
5. When you turn on the message reminder function, we will collect screenshots of the video taken by your camera, and then push the screenshots to you as the content of the reminder message. You can turn off this feature through account settings.
6. When you use Picsys equipment or video or video sharing related functions, you may need to submit information such as the contact information of the relevant person ; if you refuse to provide it, you will not be able to use the related functions. What needs to be reminded is that sharing or similar functions will make your corresponding personal information public within the scope you specify. You must carefully decide whether to use it and be responsible for the relevant consequences yourself.
7. When you use value-added services based on Picsys Cloud, we will collect your personal information directly related to the purpose of the service. The specific service purpose and information content will be reminded to you in the form of service descriptions or usage rules. This type of information is the information we must collect to provide you with various value-added services. If you refuse to provide it, you may not be able to use the relevant services normally.
(3) Customer service:
We provide you with product and service consultation, use support, after-sales service and other customer services through various methods such as telephone and online systems. In order to facilitate contact with you, help you solve the problem as soon as possible or record the handling plan and results of related problems, we may collect and save your communication/call records and related content (including account information, order information, payment information, etc.) in accordance with this policy. Information, binding product information, other information you provide to prove relevant facts, or contact information you left), if you consult, complain, or provide suggestions for a specific order, we will use your account information and order information.
(4) Feedback:
You can publish information publicly through the feedback function we provide.
We will record the contact information, feedback questions or suggestions you submit when you use the above functions in order to improve our products or services and enhance your experience.
(5) Security assurance and operation and maintenance services:
In order to meet the "Cyber Security Law" and other laws and regulations and the basic requirements for providing services, and to protect your account security and system operation security, we will collect relevant information generated during your use of our products and/or services, including:
1. When you use Picsys Software and related services, we will receive and record the information about the equipment and location you used to install and use Picsys Software according to the specific permissions granted by you during the installation and use of the software, including your Mobile phone or computer hardware model, operating system version number, browser type, International Mobile Equipment Identity (IMEI), network device hardware address (MAC), IP address, software version number, network access method and type, operation log information. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of our products.
2. When you use Picsys cloud service to manage your bound smart electronic hardware device, we will automatically receive and record the relevant device information, including type, model, firmware number, MAC address, system version number and system settings. We rely on this information to provide you with services and ensure the safe operation of the device; for example, when the system is set to allow automatic device upgrades (this setting is enabled by default in some devices), we will automatically install and run the upgrade package for you to ensure Your device is always effectively adapted to the Picsys software you are using.
3. In order to help us better understand the operation of Picsys Service, so as to ensure the safety of operation and service provision, we may record network logs or equipment log information, as well as the frequency of using software, equipment and related services, crash data, and error reporting Or abnormal service data, system operating status of abnormal equipment, overall installation and usage, performance data and other information.
Please note that separate device information, log information, etc. are information that cannot identify a specific natural person. If we combine this type of non-personal information with other information to identify the identity of a specific natural person, or combine it with personal information, during the combined use period, this type of non-personal information may be treated as personal information. Unless otherwise provided by your authorization or laws and regulations, we will anonymize and de-identify this type of personal information.
2. Rules for the use of your personal information
1. We will use your personal information in accordance with the following rules:
(1) We will use the products and/or services in accordance with the provisions of this policy.
(2) We may use your personal information and/or other information related to your service or product usage that we have obtained in a lawful manner (hereinafter referred to as "other information") to prevent, detect, and investigate fraud, Acts that infringe, endanger safety, illegal, or violate agreements with us or our affiliated companies.
(3) When you access third-party services through our products and/or services, we will share personal information within the scope of your authorization with the third-party service provider based on your authorization.
(4) Other purposes approved by you.
2. Please note that all personal information you provide or authorize us to collect when you use our products and/or services will continue to be stored and used during your use of our products and/or services. After you refuse our collection through account settings or system settings, we will stop the collection accordingly (maybe therefore unable to provide you with corresponding services); but unless you delete your personal information in accordance with the law, your The refusal to collect will not affect our processing and storage of personal information based on your previous authorization.
3. We will make statistics on the usage of our products and/or services, and may share these statistical information with the public or third parties to show the overall usage trend of our products and/or services and/or form related to this Research results such as market satisfaction survey reports and service improvement plans. But these statistics will not contain any identifying information about you.
4. When we display your personal information, we will desensitize your information including content replacement and anonymization to protect your information security.
5. When we want to use your personal information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, we will ask you in advance through the form of making a check on your own initiative. Agreed.
6. We hereby specifically remind you that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify you alone or in combination with other information When you are personally identifiable or when we will not be able to use any specific personal information in combination with other personal information of you, this information will be treated and protected as your personal information in accordance with this privacy policy during the combined use.
3. Exceptions for obtaining prior authorization and consent when collecting and using personal information
You are fully aware that, in accordance with the "Information Security Technology Personal Information Security Specification" and its legal basis, the collection and use of your personal information in the following situations does not require your authorization and consent:
1. Related to Picsys's fulfillment of obligations stipulated by laws and regulations;
2. It is directly related to national security and national defense security;
3. It is directly related to public safety, public health, and major public interests;
4. It is directly related to criminal investigation, prosecution, trial and judgment execution;
5. In order to protect your personal or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain your consent;
6. The personal information involved is disclosed to the public by you yourself;
7. According to you and us to sign and perform the contract or other written documents necessary;
8. Collect your personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
9. Necessary for maintaining the safe and stable operation of our products and/or services, such as discovering and disposing of product and/or service failures;
10. Other circumstances stipulated by laws and regulations.
Chapter 2: How do we entrust the processing, sharing, transfer and public disclosure of your personal information
1. Entrusted processing
Entrusted processing refers to the process by which Picsys, as a personal information controller, entrusts us to process user information within the scope of legal authorization and entrusts other companies or agency representatives with professional analysis techniques or capabilities (including our affiliated companies). We usually adopt entrusted processing under the business of SMS and email sending, intelligent comparative analysis, etc. We hope to improve the efficiency of information processing and reduce the cost of information processing. We will require the entrusted company to comply with strict confidentiality obligations and take effective confidentiality measures through written agreements, on-site audits, etc. and prohibit them from using this information for purposes that are not authorized by you; at the same time, once the entrustment relationship is terminated, we will require them to immediately Delete your personal information.
2. Sharing
Sharing refers to the process in which Picsys provides personal information to other personal information controllers, and both parties have independent control over the personal information. We promise to share your personal information with third parties only for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary for the realization of related purposes. At the same time, we will also do a good job of third-party management through strict access, confidentiality agreements, auditing and supervision, etc. and require them to handle relevant information with confidentiality and security measures no less than those required by this policy.
1. We will not share your personal information externally, except in the following circumstances:
1) Picsys has obtained the explicit authorization or consent of you or your guardian;
2) Judicial or administrative agencies and other competent agencies require us to disclose based on legal procedures;
3) To deal with disputes or disputes between you and others, or to protect you or Picsys and its affiliates, users of Picsys and the public interests from harm within the scope required or permitted by laws and regulations;
4) Sharing with our affiliated companies under the premise of not violating this policy;
5) Share with our partners in accordance with the relevant service agreements and usage rules between you and Picsys and for the purpose of serving you;
6) Other circumstances required or permitted by applicable laws and regulations such as the Cybersecurity Law.
2. Sharing by affiliated companies: Based on the unified account system and the consideration of consistent brand experience, the personal information we collect may be shared with or actually processed by our affiliated companies. We promise that we will only share necessary personal information, and this sharing of the constraints of the purpose of this policy; at the same time, we will ensure security through legal documents between affiliated companies, internal systems, and separation of employee permissions.
3. Sharing with partners: In order to provide you with more complete and high-quality products or services, we may share your personal information with third-party partners who support the functions of our products or services. These third parties assist us or provide you with services in their own name; the purpose of sharing your personal information with them is to realize the products or services you choose; the personal information we share with them is also limited to the provision of your personal information Content necessary for corresponding support.
At present, the third-party partners mentioned above include the following types:
1) Suppliers that provide operational support for Picsys's own products or services, including warehouse logistics providers, outsourced customer service, installers, authorized repairers, etc. We need to share your order information or product information with these suppliers in order to provide you with logistics and distribution, customer support and other related services;
2) Partners who provide a certain service with us, including duty service providers, key escrow service providers, third parties that jointly carry out marketing or promotion activities with us, etc. We will share the information necessary to complete the service with you based on the specific service you choose.
3) Third-party merchants that provide their own products or services through our user operation system, including third-party SDK operators, third-party developers who support Picsys account authorization login, partners who entrust us to conduct information promotion and advertising, etc. We may share your necessary account information, usage information, etc. with them so that they can provide you with related products or services.
4. The shared party may have its own independent privacy policy or related statement. We recommend that you review it carefully before making the relevant authorization and make the choice you think is appropriate.
3. Transfer
Transfer refers to the process of transferring control of personal information from Picsys to another personal information controller. We will not transfer your personal information to any company, organization or individual, except in the following cases:
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
2. According to laws and regulations or mandatory administrative or judicial requirements;
3. In the case of mergers, acquisitions, or bankruptcy liquidation, if the transfer of personal information is involved, we will require new companies and organizations that hold your personal information to continue to be bound by this policy, and renew the use of personal information when the purpose of use of personal information is changed. Ask you for authorization and consent.
4. Public disclosure
We will only publicly disclose your personal information under the following circumstances:
1. After obtaining your explicit consent;
2. Disclosure based on the law: In the case of laws, legal procedures, litigation or mandatory requirements of government authorities, or to protect the personal and property safety of Picsys users or the public from infringement, we may publicly disclose that we violate the law or Personal information related to breach of contract.
5. Exceptions for obtaining prior authorization and consent when sharing, transferring, and publicly disclosing personal information
Please understand that, in accordance with applicable laws, regulations and national standards such as the Cyber Security Law, the Information Security Technology Personal Information Security Specification, etc. in the following situations, we do not need to ask you to share, transfer, and publicly disclose your personal information Authorized consent:
1. Related to Picsys's fulfillment of obligations stipulated by laws and regulations;
2. It is directly related to national security and national defense security;
3. It is directly related to public safety, public health, and major public interests;
4. It is directly related to criminal investigation, prosecution, trial and judgment execution;
5. In order to protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain the consent of the person;
6. Your personal information disclosed to the public on your own;
7. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
In addition, in accordance with the aforementioned laws and regulations, if you provide personal information that has been de-identified and ensure that the data recipient cannot restore and re-identify the subject of personal information, you will not be required to notify you or obtain your consent.
Chapter 3: How do we protect and store your personal information
1. Protection and security measures of your personal information
1. We will make all reasonable efforts to protect the personal information we have obtained, and a dedicated data security department will protect the personal information.
In order to prevent users' personal information from being illegally accessed, copied, modified, transmitted, lost, destroyed, processed or used in unexpected and unauthorized situations, we have and will continue to take the following measures to protect your personal information:
1) The user's personal information is encrypted and stored by adopting encryption technology, and is isolated by isolation technology.
2) Establish a strict data use and access system, adopt strict data access authority control and multiple identity authentication technologies to protect personal information, and prevent data from being used in violation of regulations. We only allow authorized personnel to access personal information and require them to fulfill the corresponding confidentiality obligations.
2. Special reminders for personal biometric information:
1) Unless otherwise prompted, identification and authentication based on personal biometric information are only implemented on your local device, and we will not return this information to the server; that is, Picsys Cloud only receives the verification results and does not collect you Biometric information;
2) Under the business functions that must collect biometric information (such as face recognition value-added services), we will try our best to ensure security by storing only summary information, AES encryption and other measures.
3. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, in view of the open nature of the network environment, we cannot guarantee the security of your personal information when communicating through unsafe channels. Therefore, we strongly recommend that you take active measures to ensure the security of your personal information, such as: setting complex passwords, regularly changing account passwords, not disclosing your account password and other personal information to others, and cautiously using information sharing or sharing functions. In addition, you should understand that when your information is leaked due to your personal disposal (such as sharing, etc.), Picsys will only bear limited legal liabilities in accordance with effective judicial judgments.
4. There are always various risks of information leakage in the network environment. When accidents, force majeure and other circumstances cause your information to leak risks, we will try our best to control the situation and promptly inform you of the cause of the incident, the security measures we have taken, and you Security measures that can be taken proactively and other relevant situations.
5. In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can independently prevent and reduce Risk suggestions, remedial measures for you, etc. At the same time, we will promptly notify you of the incident by email, letter, telephone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement. If the relevant incident involves children's personal information, we will notify the children and their guardians in accordance with the law. At the same time, we will report to the corresponding competent authority in accordance with the requirements of laws and regulations.
2. Storage of your personal information
1. Picsys will not transfer your personal Information, unless it is required to implement regulations or has otherwise obtained your express consent.
Chapter 4: Your Rights
In accordance with relevant laws, regulations, and standards, as well as common practices in other countries and regions, we guarantee that you exercise your personal information subject rights in accordance with the law. Each Picsys software provides an online exercise channel (the specific support range may be different).
Take the "Picsys" APP that is most frequently used by Picsys users as an example, you can conveniently exercise the following personal information subject rights:
1. Access or correct personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise the right to access data, you can access it yourself in the following ways:
1. Your account information: In the Picsys APP client, you can enter the personal information and account security page through "My" under the main interface to query and update registration information such as nickname, mobile phone number, password, and email. You can also check your login terminal. Other Picsys software can be set accordingly on the "My" page.
2. Your usage of Picsys cloud service. Under the Picsys APP client, you can view your bound Picsys devices through "Devices" under the main interface, and view the device model, serial number, and user guide through the "Settings" page at the upper right corner of the single device preview box And other product information, as well as usage information such as the device’s network access method, value-added service usage, and sharing status.
3. Personal information that you cannot access and correct: In addition to the information listed above, we are unable to provide you with access and correction services for some of your personal information. This information is mainly to improve your user experience and ensure transaction security The collected information of your equipment and personal information necessary to ensure the normal operation of the business functions you have selected. We will use the above information within the scope of your authorization. You cannot access and correct it, but you can contact us to delete or anonymize it.
2. Delete personal information
The information that you can directly clear or delete on our product and/or service pages, including order information, is the same as the above-mentioned access or correction path;
In the following situations, you can request us to delete other personal information:
(1) If our handling of personal information violates laws and regulations;
(2) If we collect and use your personal information without your consent;
(3) If our handling of personal information violates our agreement with you;
(4) If you have cancelled your Picsys account;
(5) If we terminate the service and operation.
If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us and require them to delete them in a timely manner, unless laws and regulations provide otherwise, or these entities obtain your independent authorization.
After you delete information from our service, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.
3. Change the scope of authorization and consent or withdraw authorization
You can change the scope of your authorization to continue to collect personal information or withdraw your authorization by deleting information, turning off a certain service or function, setting privacy settings in the Picsys website or software, and managing application rights. You can also withdraw all our authorization to continue to collect your personal information by canceling your account.
Please understand that each business function requires some basic personal information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with services corresponding to the withdrawal of your consent or authorization, and will no longer process your corresponding personal information . However, your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.
4. cancel the account
You can cancel the previously registered account at any time, you can contact our customer service, or operate by yourself in the following ways:
The specific path of the Picsys APP client is: Homepage-"My"-"Account Management"-"Cancel Account".
Please note that account cancellation is an irreversible operation. After you cancel your account, we will stop providing you with products or services, all rights and interests under your account will be cleared, and your personal information will be deleted and cannot be retrieved. Laws and regulations Unless otherwise specified.
5. Constraint information system automatic decision-making
Currently, there is no situation in the business function of Picsys that only makes decisions based on non-manual automatic decision-making mechanisms including information systems and algorithms. If we think it is necessary to use the aforementioned technical means during the operation, we will inform you in time; if you think that these decisions significantly affect your legal rights, you have the right to ask us to explain, and we will not infringe upon Picsys’s business Provide complaint methods under the premise of secret or other user rights and social public interest.
6. Obtain a copy of personal information and request response
If you are unable to manage your personal information through the above methods, or you need to obtain a copy of the corresponding personal information, or you have other personal information rights appeals, you can use other methods listed in this policy to contact us. In order to ensure safety, we may need you to provide a written request or prove your identity in other ways. We will respond to your request within 15 days after receiving your feedback and verifying your identity.
For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. For those that are unreasonably repeated, require too many technical means (for example, the need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) Request, we may reject it.
According to applicable laws, regulations and national standards such as the "Cyber Security Law", "Information Security Technology Personal Information Security Regulations" and other applicable laws, regulations and national standards , we may not be able to respond to your request in the following situations:
1) Related to Picsys's fulfillment of obligations stipulated by laws and regulations;
2) Directly related to national security and national defense security;
3) Directly related to public safety, public health, and major public interests;
4) Related to criminal investigation, prosecution, trial, and execution of judgments;
5) There is sufficient evidence to show that you have subjective malice or abuse of rights;
6) In order to protect your or other individuals’ life, property and other major legal rights and interests, but it is difficult to obtain your own consent;
7) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
8) Involving trade secrets;
9) Other circumstances stipulated by applicable laws and regulations.
Chapter 5: Third Party Services
1. Third-party services that may involve the collection or sharing of personal information
Our products and/or services may be connected to or linked to websites or other services provided by third parties. include:
1. You can use the "Share" button to share some of your information to third-party services. These functions may collect your information (including your log information), and may install COOKIES on your computer to operate the above functions normally;
2. Other access to third-party services. For example, in order to achieve the purpose stated in this policy, we may access the SDK or other similar applications provided by third-party service providers (hereinafter collectively referred to as the "third-party SDK"), and collect certain information about you that we have collected in accordance with this policy. This information is shared with these third-party service providers in order to provide better customer service and user experience. Currently, the third-party SDKs we access mainly include the following types:
(1) Used for data monitoring/statistics, etc.
(2) Used for message push functions, including push push from mobile phone manufacturers, reminders of specific events, etc.
(3) For payment-related services, including order payment, transaction verification, income settlement, payment information summary statistics, etc.
(4) It is used to obtain device location permissions, collect device information and log information, etc. with your consent;
(5) Used for third-party authorization services, including sharing relevant content to third-party products, etc.
(6) Used to support product functional modules, including cloud storage video query, etc.
(7) Used to optimize product performance, including improving hardware distribution network capabilities, reducing server costs, etc.
(8) Used for account security and product reinforcement related services, including network monitoring, domain name resolution (HTTPDNS), anti-hijacking, anti-spam and anti-cheating, encryption and decryption services, etc.
2. Collection and sharing of personal information for third-party services
1. We will only share your information with relevant third-party service providers for legitimate, necessary, and specific purposes, and will do our best commercial efforts to require them to perform relevant confidentiality obligations and take corresponding security measures.
2. It should be reminded that, unless otherwise stated, third-party services are independently operated by relevant third parties; if you use their services or provide information to them, you are subject to the terms of service and/or privacy of those third parties. The protection protection statement (not this policy) is bound.
Third, the third-party SDK publicity in the Picsys mobile app
For each Picsys mobile application, we will list the names of third-party SDKs that we access and their privacy agreement links or permission opening instructions through the "Picsys Mobile Application Privacy Statement", so that you can understand your information more clearly. The use and protection of personal information. Among them, please refer to the third-party SDK information publicity page under the "Picsys" APP (link: third-party SDK information publicity page ).
Chapter 6: How do we deal with the personal information of minors
Picsys attaches great importance to the protection of personal information of minors. We do not use age recognition as a prerequisite when we provide products or services to users, but the nature of our products and/or services requires you to be an adult with full civil capacity. If you are a child or other minor under the age of 18, we ask you to ask your parents or other guardians to read this privacy policy carefully, and obtain the consent of your parents or other guardians and use our Services or provide us with information. If you collect or submit personal information of minors to us through our products and/or services for the purpose of interacting with children, please ensure that you have obtained the authorization and consent of their legal guardian in advance.
In the case of collecting personal information of minors with the consent of their parents or legal guardians, we will only use or publicly disclose this information when permitted by law, the parents or legal guardians have expressly agreed, or are necessary to protect the minors.
If parents or legal guardians have reason to believe that minors have submitted personal information to us without prior consent, or have questions about the protection of our minors’ personal information, please contact us through the methods listed at the beginning of this policy .
Chapter 7: Revision of this policy
We may make changes to this policy in due course. Without your explicit consent, we will not reduce your rights in accordance with this policy, nor will we actively adjust your personal information related settings. We will post any changes to this policy on this page.
For major changes, we will notify you in the form of push notifications, pop-up windows, emails, etc.
The major changes referred to in this policy include but are not limited to:
1) significant changes in our service model occurs. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.
2) Significant changes have taken place in our ownership structure and organizational structure. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.
3) The main objects of personal information sharing, transfer or public disclosure have changed;
4) Your right to participate in the processing of personal information and its forms and methods have undergone major changes;
5) When the department responsible for handling personal information security, contact information and complaint channels change;
6) When the personal information security impact assessment report shows that there is a high risk.
Chapter 8: How to contact us
If you have comments about this policy or your personal information related matters any questions, comments or suggestions, please call [+91-9019706827] contact our technical service. You can also send a letter as follows:
Zip code: 561203
Under normal circumstances, we will reply within fifteen days.