Special Notice
Welcome to Wishe, we understand the importance of personal information to you and will do our best to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and to handling your personal information in accordance with the principles of lawfulness, propriety, necessity and good faith. Therefore, we have created this Privacy Policy ("Policy") so that you are fully aware of the information we collect when you use Wishe and the ways in which we provide you with access to, update, delete and protect that information.
Before you use Wishe, it is important that you read this policy carefully and fully understand the terms and conditions, and that you make the choices you deem appropriate in accordance with the guidelines in this Privacy Policy. We have tried to keep the relevant terms in this Privacy Policy as concise as possible and provide links to further explanations so that you can better understand them. If you have any questions, please contact us.
This policy will help you understand the following:
(1) How we collect and use your personal information
(2) How we use COOKIES or similar technologies
(4) How we share, transfer, and publicly disclose your personal information
(5) How we protect your personal information
(6) How you manage your personal information
(7) How we handle the personal information of minors
(8) How to update this privacy policy
(9) How to contact us
How we collect and use your personal information
2.1. Personal information is all kinds of information related to an identified or identifiable natural person recorded electronically or otherwise, excluding information after anonymization process. Sensitive personal information is personal information that, if leaked or used illegally, could easily lead to the infringement of a natural person's human dignity or endanger the safety of his or her person or property, including biometric, religious beliefs, specific identity, medical and health care, financial accounts, trajectory and other information, as well as the personal information of minors under 14 years of age.
2.2. We will collect and use personal information that you voluntarily provide in the course of using Wishe or as a result of using Wishe, as well as obtain your relevant personal information from third parties, in accordance with the principles of propriety, legality and necessity, for the purposes described in this policy as follows. If we want to use your personal information for purposes other than those described in this Policy, or to use information collected for a specific purpose, we will inform you in a reasonable manner and again obtain your consent prior to such use. When you cancel your account, we will stop using and delete the above information.
2.3. Circumstances in which you must authorize us to collect and use your personal information
2.3.1. Our Wishe includes some core functions and we may collect, store and use the following information about you in order to perform these functions. If you do not provide the relevant information, you will not be able to enjoy the products and services we offer. These features include
2.3.1.1. Account Registration, Login and Verification
When you register for a Wishe account, you will need to provide us with at least your own cell phone number that you intend to use, and we will verify that your identity information is valid by sending an SMS verification code or email.
2.3.1.2. Security Features
In order to improve the security of your use of our products and services, to protect your or other users' personal and property safety from infringement, to better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, and to more accurately identify violations of laws and regulations, we may collect, use or integrate your account information, transaction information, and device information to comprehensively determine your account and transaction risks, to identity verification, detection and prevention of security events, and take necessary record, audit, analysis and disposal measures in accordance with the law.
2.4. Circumstances under which you can choose the personal information you provide
2.4.1. In order to make your use of Wishe more convenient or enjoyable and thereby enhance your experience when using it, the following extensions of our functionality may mobile and use your personal information. If you do not provide this personal information, you can still use the core features of Wishe, but you may not be able to use the extended features we provide to you or you may need to fill in some information repeatedly. These extensions include
2.4.1.2. Geolocation-based extensions
If you use a location-based feature or service, we need you to authorize us to access your location and collect your location information. Your location information is sensitive personal information, so please be careful about providing it, and you can turn off such features and services from us by turning them off.
2.4.1.3. Extended Features Based on Address Book Information
When you agree to enable address book permissions, we will collect your address book information to facilitate your use of our products and services without having to manually enter the information of your contacts in your address book.
2.4.1.4. Camera-based extensions
You can use this extension for video recording, photo taking, code scanning and face recognition login. When you log in using face recognition, we will collect your facial information and restrict its use to the extent you authorize. In the future, we may apply face recognition technology to more scenarios, and we will confirm with you again if you want us to use your facial information to implement these extended features.
2.4.1.5. Extensions based on image or video uploads
You may upload your photo or video to Wishe to implement the feature name and we will use the image or video you upload for photo or video purposes.
2.4.1.6. Login using a third party account
When you log in to Wishe using a third party account (e.g. WeChat, QQ, Weibo, Apple ID), you are required to authorize the reading and sharing of public information (including one or more of nickname, avatar, region, gender, contact email) that you have published and recorded on that third party platform, subject to relevant laws and regulations, in order to and remember your login identity as our user.
2.4.1.7. Adding Account Information
After you have completed your account registration, you may continue to fill in your information in the Basic Information section, including your birthday, gender, and unit name. If you do not provide this information, it will not affect your use of specific technical services.
2.4.1.8. Change of account password
When you need to change your account password, please enter your new password to complete the reset. When you need to change your cell phone number, please enter your new cell phone number and SMS verification code. You can voluntarily bind your mailbox in the setting page, at this time, you need to provide your mailbox account and the SMS verification code we send to you for verification operation. If you need to set up a trusted device, you need to provide us with the name of the device you are using, the type of device and the last time you used it.
2.4.1.9. Access to third party applications
When you use third-party applications that you access in Wishe, we may obtain necessary personal information from the developers of such third-party applications and their technical service providers, such as device information and logs of operating behavior, for purposes such as providing technical support for interfacing. If your sensitive personal information is involved, we will obtain separate authorization from you. If you refuse to allow us to collect such personal information, all or part of the functionality of the third party application may not be available, but this will not affect your ability to use other features of Wishe.
The developers of such third party applications and technical service providers may collect and use your personal information directly in accordance with the privacy policies they provide, but we do not have access to such personal information. You are advised to read and confirm your understanding of such privacy policy before accepting the relevant services and providing personal information.
2.5. You are fully aware that we do not require your authorized consent to collect or use personal information in the following circumstances
2.5.1. in connection with national security or national defense security
2.5.2. related to public safety, public health, and significant public interest
2.5.3. Related to crime investigation, prosecution, trial and execution of judgment, etc.
2.5.4. For the purpose of safeguarding the life, property, and other significant legitimate rights and interests of the subject of personal information or other individuals but where it is difficult to obtain the consent of the individual.
2.5.5. Where the personal information collected is disclosed to the public by the subject of the personal information or the guardian himself/herself.
2.5.6. Where your personal information is collected from information that is lawfully and publicly disclosed, such as lawful news reports, government information disclosure and other channels.
2.5.7. Necessary to enter into a contract at your request.
2.5.8. Necessary to maintain the safe and stable operation of the products and/or services provided, such as the detection and disposal of product and/or service failures.
2.5.9. Necessary for legitimate press coverage.
2.5.10. Necessary for academic research institutions to conduct statistical or academic research in the public interest and to de-identify personal information contained in the results when providing the results of academic research or descriptions to the public.
2.5.11. Other cases stipulated by laws and regulations.
2.6. Cases in which we obtain your personal information from third parties
2.6.1. We may obtain personal information from third parties that you have authorized to share, and we will use such personal information in accordance with the agreement with the third party and after confirming the legitimacy of the source of the personal information and in compliance with the relevant laws and regulations.
How we use COOKIES or similar technologies
3.1. We may obtain and use information about you through the use of COOKIES or similar technologies and store that information as log information.
3.2. By using COOKIES, we provide users with a simple and easy web experience. A COOKIES is a small amount of data that is sent from a web server to your browser and stored on your computer's hard drive. We use COOKIES so that their users can benefit from them. For example, to make Wishe's login process faster, you can choose to store your username in COOKIES. COOKIES helps us to determine which pages and content you are connected to, how much time you spend on specific Wishe services and which Wishe services you have selected.
3.3. COOKIES makes it possible for us to serve you better and faster. You may refuse or manage COOKIES or similar technologies through your browser or user selection mechanism. However, please note that if you disable COOKIES or similar technologies, we may not be able to provide you with the best service experience and some services may not work properly.
3.4. We use our own COOKIES or similar technologies, which may be used for the following purposes:
3.4.1. remember your identity.
3.4.2. To analyze your use of our services.
3.4.3. advertising optimization.
3.5. If you wish to disable COOKIES, you can configure your browser: select "Reject COOKIES" or "Notify you when websites send COOKIES". Since our services are provided through the support of COOKIES, your access to Twitter may be affected or you may not have full access to our services after you disable COOKIES. When you do not disable COOKIES, you may be prompted, for example, whether to retain user information the next time you access this site in order to simplify the login process (e.g., automatic login).
How we share, transfer or publicly disclose your personal information
4.1. Entrusted Processing
4.1.1. If we entrust a third party with the handling of your personal information, we will agree with the entrustee on the purpose of the entrusted handling, the duration, the manner of handling, the type of personal information, the protection measures, and the rights and obligations of both parties, and will supervise the entrustee's personal information handling activities.
4.2. Sharing
4.2.1. We will share your personal information in accordance with the principles of "lawfulness and propriety, minimum necessity, and clarity of purpose". At the same time, we will conduct a personal information protection impact assessment in advance of personal information sharing activities, and take effective technical protection measures for the form of output, circulation, and use. At the level of cooperation agreements, we strictly require the information protection obligations and responsibilities of our partners, and sign protection agreements on data security with our business partners before cooperation.
We have developed the Third Party Sharing List to provide you with a clear and concise introduction of our main sharing of your personal information.
4.2.2. We will not share your information with any third parties outside of our company, except in the following cases:
(1) With your express prior consent or authorization.
(2) Sharing your information externally in accordance with applicable laws and regulations, the requirements of legal proceedings, and mandatory administrative or judicial requirements.
(3) Only when your personal information is shared to enable the core functions of our products and services or to provide the services you require.
(4) We may share your personal information with our affiliates for the purposes of providing you with relevant products or services based on our offerings, showing you content that may be of interest, protecting the security of your account and transactions, etc. We will share your personal information with our affiliates as described in this Privacy Policy, but we will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy. If our affiliates wish to change the purposes for which personal information is processed, they will again seek your authorized consent.
(5) We may share your information content information with third parties, such as partners, to ensure the successful completion of the services provided to you. However, we will only share your personal information for lawful, legitimate, necessary, specific, and explicit purposes, and only as much personal information as is necessary to provide the services. Our partners are not authorized to use shared personal information for any other purpose.
(6) Provided for academic research purposes.
(7) Provided in accordance with individual service agreements or other legal documents signed with you.
4.3. Transfer
4.3.1. Transfer is the process of transferring control of personal information to another company, organization or individual.
4.3.2. We will not transfer your personal information to any third party outside of our company, except for the following cases:
(1) With your prior express consent or authorization.
(2) As our business continues to grow, in the event of a merger, acquisition or bankruptcy liquidation, your information may be transferred as part of such a transaction. If the transfer of personal information is involved, we will require the new company, organization, or individual holding your personal information to continue to be bound by this policy, or we will require that company, organization, or individual to seek your authorized consent again.
4.4. Public Disclosure
4.4.1. We will not publicly disclose your personal information to any third party outside of our company, except for the following circumstances:
(1) We may publicly disclose your personal information as required by laws and regulations, litigation, dispute resolution, or as requested by administrative or judicial authorities in accordance with the law.
(2) We may disclose the information specified by you under the disclosure method you expressly agreed to according to your needs.
How we protect your personal information
5.1. We have always attached great importance to protecting the security of our users' personal information, and to this end we have adopted protective measures such as security technology and organization and management in accordance with industry standards to minimize the risk of disclosure, destruction, misuse, unauthorized access, unauthorized disclosure and alteration of your information.
5.1.1. Technical Measures for Data Security
5.1.1.1. We will adopt security measures in accordance with industry standards, including the establishment of reasonable systems and security technologies to prevent unauthorized access to and modification of your personal information, and to avoid damage to or loss of data.
5.1.1.2. Our network services adopt encryption technologies such as transport layer security protocols and provide browsing services through https and other means to ensure the safety of user data in the process of transmission.
5.1.1.3. We adopt encryption technology to encrypt and save users' personal information, and isolate it through isolation technology.
5.1.1.4. When personal information is used, such as personal information display and personal information association calculation, we use various data desensitization technologies including content replacement and SHA256 to enhance the security of personal information in use.
5.1.1.5. We use strict data access rights control and multiple identity authentication technologies to protect personal information and avoid unauthorized use of data.
5.1.1.6. We use automatic code security checks and data access log analysis technology to conduct personal information security audits.
5.1.2. Other security measures we take to protect personal information
5.1.2.1. We manage to regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.
5.1.2.2. We provide comprehensive security control of data through information contactor confidentiality agreements, monitoring and auditing mechanisms.
5.1.2.3. We established a data security committee and set up a special department for information protection and a data security emergency response organization to promote and guarantee the security of personal information.
5.1.2.4. We will hold security and privacy training courses to enhance employees' security awareness and knowledge of personal information protection policies and related procedures.
5.2. Please be aware that while we will do our best to ensure the security of any information you send us, the Internet environment is not 100% secure and we can not be held responsible for any risks or losses arising from or related to it.
5.3. After the unfortunate occurrence of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation of the security incident and the possible impact, the measures we have taken or will take to deal with it, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you. We will promptly inform you of the procedures related to the incident by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also report the disposition of personal information security incidents in accordance with the requirements of regulatory authorities.
How you manage your personal information
6.1. We attach great importance to your management of personal information and make every effort to protect your access, correction, deletion, withdrawal of consent and other legal rights with respect to personal information so that you have the full ability to maintain your privacy and personal information security.
6.2. Accessing and correcting your personal information
6.2.1. Except as provided by law or regulation, you have the right to access and correct your personal information at any time, including, in particular
(1) Account information:
(2) Browsing information:
(3) Comment information:
6.2.2. Please contact us at any time if you need access to or correction of other personal information generated in the course of your use of our products and services. We will respond to your request in the manner and within the time period set forth in this Privacy Policy.
6.3. Deletion of your personal information
6.3.1. You may make a request to us to delete personal information in the manner set out in this policy in the following circumstances:
(1) If our handling of personal information violates laws and regulations.
(2) If you no longer use our products and services, or if you cancel your account.
(3) If we stop providing products and services, or if the retention period has expired.
(4) If you withdraw your consent.
(5) If the purposes for which we process personal information have been fulfilled, can not be fulfilled, or are no longer necessary to fulfill the purposes of processing.
6.4. Changing or withdrawing your consent
6.4.1. You may change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting information, turning off device features, making privacy settings on the Wishe website or in the software, etc. You may also withdraw your full authorization for us to continue collecting your personal information by canceling your account.
6.4.2. Please understand that Wishe may need to collect the necessary personal information in order to do so. When you withdraw your consent, we will not be able to continue to provide you with the services for which you have withdrawn your consent, but this will not affect the personal information processing services previously carried out on the basis of your authorization.
6.5. Cancellation of your account
6.5.1. You may cancel your previously registered account at any time by:
(1) Online cancellation
(2) By contacting Customer Service
6.5.2. After you cancel your account, the content, information, data, records, etc. under the account will be deleted or anonymized (except as otherwise provided by laws and regulations or required by regulatory authorities). Also, once the account is cancelled, it can not be restored.
6.6. Responding to your request above
6.6.1. If you are unable to exercise your rights in the manner described above, you may contact us using the contact information set forth in this Policy. To protect the security of your account, when you make such a request to us, we may ask you to verify your identity before processing your request.
6.6.2. In principle, we do not charge a fee for your reasonable requests, but we will charge a fee for repeated requests that exceed reasonable limits, as appropriate. We may reject requests that are repeated for no reason, require excessive technical means, pose a risk to the legal rights of others, or are very impractical.
6.6.3. Exceptions to Response Scenarios
We will not be able to respond to your request in the following circumstances:
(1) It is related to the performance of our obligations under laws and regulations.
(2) Directly related to national security or national defense security.
(3)Directly related to public safety, public health, and significant public interests.
(4) Directly related to criminal investigation, prosecution, trial and execution of judgments, etc.
(5)Where we have sufficient evidence of subjective malice or abuse of rights by the subject of personal information.
(6)When it is necessary to protect the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals , it is difficult to obtain their consent.
(7) Responding to the request of the subject of personal information will result in serious damage to the legitimate rights and interests of the subject of personal information or other individuals or organizations.
(8) Where commercial secrets are involved.
How we handle the personal information of minors
7.1. We take the protection of personal information of minors very seriously. If you are a minor under 18 years of age, you should obtain prior consent from your guardian before using our products and services. We will protect the personal information of minors in accordance with the provisions of relevant national laws and regulations.
7.2. We will not actively collect personal information directly from minors. In the case of collecting personal information from minors with the consent of their guardians, we will only use, share, transfer or disclose this information as permitted by law, with the consent of the guardian or as necessary to protect the minor.
7.3. If there is evidence that a minor has used our products and services without the consent of a guardian, we will consult with the relevant guardian and seek to delete the relevant personal information as soon as possible.
7.4. For minors under the age of 14, in addition to complying with the agreements in this Privacy Policy regarding users' personal information, we will uphold the principles of legitimate necessity, informed consent, clarity of purpose, safety and security, and utilization in accordance with the law, and strictly follow the requirements of the Regulations on the Protection of Children's Personal Information Network and other laws and regulations for storage, use, and disclosure, and will not exceed the period necessary to achieve the purpose of collection and use We will delete or anonymize children's personal information after the expiration date.
7.5. If you are a parent or other guardian of a minor under the age of 14, we may need to collect personal information from you about the child in your custody for the purposes necessary to perform the relevant services to you. If we need to collect personal information from you in connection with specific services, we will obtain your prior authorized consent and inform you of the purpose and use of the collection. If you do not provide the aforementioned information, you will not be able to enjoy the relevant services provided by us.
How this Privacy Policy is updated
8.1. Our privacy policy may change from time to time. We will post any changes to this Privacy Policy on the name of the populated platform. For material changes, we will provide more prominent notice of the specific changes to our Privacy Policy, such as through a special notice on the browser page. We will not reduce your rights under this Privacy Policy without your express consent.
8.2. Material changes to this Privacy Policy include, but are not limited to:
8.2.1. A material change in our service model.
8.2.2. A change in the principal parties to whom personal information is shared, transferred or publicly disclosed.
8.2.3. Significant changes in your rights to participate in the processing of personal information and how they are exercised.
8.2.4. Changes in our contact information and complaint channels.
8.2.5. When the personal information security impact assessment report indicates a high risk.
8.3. We will keep an older version of this Privacy Policy on file for your review.
How to contact us
9.1. If you have any questions, comments or suggestions regarding this Privacy Policy, please contact us via the official product email ckdpkkqnfpp@hotmail.com.
9.2. In general, we will respond within fifteen business days. If you are not satisfied with our reply, especially if our personal information processing behavior has harmed your legitimate rights and interests, you can also file a complaint or report to the supervisory departments of Internet information, telecommunications, public security and industry and commerce, or seek a solution by filing a lawsuit with the court with jurisdiction in the defendant's domicile.