WinPIM Privacy Policy

* This privacy agreement is translated from Chinese, and the Chinese version shall prevail.

This policy only applies to the product "WinPIM" and related services of YQSoft Inc. (hereinafter referred to as "we").

The security of your personal information is of utmost importance to us. We have always tried our best to protect the security of your personal information and are committed to maintaining your trust in us. We will collect and use your personal information in accordance with relevant laws, regulations and technical specifications to help us provide you with better products and services. At the same time, we promise to keep your personal information and other data strictly confidential to ensure the safety of your personal information.

Please read this privacy policy (hereinafter referred to as "this policy") carefully before using our products and services. Once you start using "WinPIM" products and related services, it means that you agree to this policy.

Glossary

To help you understand the proprietary terms mentioned in this policy, we have defined these proprietary terms:

Personally identifiable information: Personal information refers to various information that can be individually or combined with other information to identify the personal identity of a natural person, including but not limited to the natural person’s name, date of birth, ID number, and personal biometric information recorded by electronic or other means , Residential address, telephone number, etc.
Personal sensitive information: Personal sensitive information refers to personal information that, once leaked, illegally provided, or misused, may endanger the safety of people and property, and easily lead to personal reputation, physical and mental health damage, or discriminatory treatment. For example, personal sensitive information includes ID number, personal biometric information, bank account number, communication content, health and physiological information, etc.
Non-personally identifiable information: recorded information related to the user, but in fact information that cannot directly or indirectly identify you, including personal information provided through de-identification, anonymization or pseudonymization.
Cookie (cookie file): A cookie is a small text file placed on the client (in your computer, mobile phone or other smart terminal) by the website server when you browse the web. When you visit the corresponding website again, The website can then recognize your browser through cookies. Cookies may store user preferences and other information. You can configure your browser to reject all cookies or display a prompt when a website sends cookies. However, without cookies, some website features or services may not work properly.
De-identification: refers to the process of technical processing of personal information to make it impossible to identify the subject of personal information without resorting to additional information.
Anonymization: refers to the process in which the subject of personal information cannot be identified through technical processing of personal information, and the processed information cannot be restored.

1. How we collect and use your personal information

We will follow the principles of fairness, lawfulness and necessity, based on the following functions and services, to collect and use the personal information you voluntarily provide during the use of products (or services).

(1) Register an account
When you register and log in to the WinPIM account, you need to provide according to the following registration methods:

Register with email: email address and set password
WinPIM also provides a local mode without registering an account. If you choose not to register an account, you will not be able to synchronize your task data between multiple devices, and once you uninstall the application, your local mode task data will be lost.

(2) Application function
1. Sync data
Once you register an account and create data in the account, in order for you to synchronize data between devices normally and completely, you need to allow us to collect:

The contacts, calendars, tasks and notes you save in the software, and the pictures and attachments you add to the data.
The information of the device you are editing (including: device model, operating system version, unique device identifier)
The above information is only used for you to synchronize data between devices, we will not read your data content.

(3) Permissions that will be applied for in the app
We need to apply for some system permissions that involve personal privacy to ensure that some functions in the app can be used normally. We will apply for authorization from you when you use these functions, and we will only access your personal information after you have clearly obtained your authorization. If you do not need to use these functions, you can refuse authorization; if you have never used these functions, we will not request permission from you and will not access your personal information.

The permissions we will apply for and the functions corresponding to these permissions include:

Allow access to system calendar: When you want to import calendars, we will request this permission. After obtaining authorization, you can directly import system calendar events to the WinPIM file
Allow access to the address book: When you want to import the address book, we will apply for this permission. After obtaining authorization, you can directly import the address book to the WinPIM file
Allow writing to external storage space: We will apply for this permission when you save attachments to your phone in the program. After obtaining authorization, you can download the attachments in the program to the local phone
Allow reading external storage space: when you upload attachments in the program, we will apply for this permission

(4) Statistical services
We collect data based on your interaction with us and the choices you make, including your privacy settings and the products and features you use. The data we collect may include IP address, platform, timestamp, application identifier, application version, terminal manufacturer, and terminal device operating system version.

2. How we use cookies and other technologies

WinPIM will only use cookies on the www.winpim.net website. Cookies will not be used in Windows and Android App applications, and the www.winpim.net website will not be nested in any of our applications.

3. How do we share, transfer and publicly disclose your personal information

(1) Sharing
Without your consent, we will not share your personal information with any other company, organization or individual, except in the following cases:

Obtain your explicit consent or authorization: After obtaining your explicit authorization, we will share your personal information with other parties.
Sharing under statutory circumstances: According to laws and regulations, litigation dispute resolution needs, or mandatory requirements or judicial rulings of government authorities, your personal information must be shared externally.
To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect the interests, property, or safety of the friendly files and their users or the public from damage

(2) Transfer
Without your consent, we will not transfer your personal information to any company, organization or individual, except in the following cases:

Obtain your explicit consent or authorization: After obtaining your explicit authorization, we will transfer your personal information to other parties.
In the event of a merger, acquisition or bankruptcy liquidation, the transfer of personal information may be involved. In this case, we will require new companies and organizations that hold your personal information to continue to be bound by this policy. If there are any changes to the collection and processing methods of personal information agreed in this policy, the company or organization will re-seek your authorization and consent.

(3) Public disclosure
Without your consent, we will not publicly disclose your personal information, except in the following cases:

Obtain your explicit consent or authorization.
We may disclose your personal information to competent authorities based on laws, legal procedures, litigation or mandatory requirements of government authorities. However, we guarantee that when the above situation occurs, we will require the disclosure requesting party to produce corresponding valid legal documents, and take safety protection measures that comply with the law and industry standards for the disclosed information.

4. How do we save your personal information


(1) Retention period
During the use of this product and service, we will continue to save your personal information for you. If you exceed the service period, we will delete it from time to time.

If we stop operations due to poor management or other reasons, we will immediately stop the collection of your personal information and delete the personal information that has been collected. We will make an announcement on the website or communicate this situation to each user one by one in other reasonable ways such as in-site notices, emails, etc.

(2) Conservation area
We store information obtained from the territory of the People's Republic of China in the territory of the People's Republic of China. If some products or services involve cross-border, we need to transfer your personal information overseas. We will strictly follow the laws and regulations to implement and ensure the security of your personal information.

5. How do we protect your personal information

The security of your personal information is very important to us. We will strictly abide by relevant laws and regulations and take reasonable and feasible measures recognized by the industry to protect your personal information. Prevent unauthorized access, disclosure, use, and modification of information, and avoid information damage or loss.

(1) Technical measures and data security measures
We have used industry-standard security protection measures to protect the personal information you provide, to prevent unauthorized access, public disclosure, use, and modification of data, and to prevent data damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, the data exchange between your browser and WinPIM files is protected by SSL encryption; we also provide https secure browsing; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data We have been maliciously attacked; we have deployed an access control mechanism to ensure that only authorized personnel can access personal information; and we will organize security and privacy protection training courses to strengthen employees’ awareness of the importance of protecting personal information.

The Internet is not an absolutely secure environment, and email, instant messaging, and communication with other our users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.

(2) Security incident handling
The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legal rights, we will bear the corresponding legal responsibility.

In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and what you can independently prevent and reduce risks Suggestions, remedies for you, etc. We will promptly inform you about the incident by email, letter, telephone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement.

At the same time, we will proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

6. Your right to manage personal information

We do our best to protect your rights to access, correct and delete your personal information, so that you have the full ability to protect your privacy and security. Your rights include:

(1) Access and correct your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise data access rights, you can access and correct it yourself in the following ways:

App lock password
Enter "Options", change or cancel the password, and turn off fingerprint recognition.
If you are unable to access or correct this personal information through the above methods, you can send an email to support@winpim.com. We will respond to your request for access within 15 days.

(2) Delete your personal information
In the following situations, you can request us to delete personal information:

If our handling of personal information violates laws and regulations;
If we collect and use your personal information without obtaining your consent;
If our handling of personal information violates our agreement with you;
If you no longer use our products or services, or you cancel your account;
If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us and require them to delete them in a timely manner, unless laws and regulations provide otherwise, or these entities obtain your independent authorization. After you delete information from our service, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.

After you delete your account, we will also notify the entities that have obtained your personal information from us and ask them to delete them in a timely manner, unless laws and regulations provide otherwise, or these entities obtain your independent authorization. After you delete information from our service, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.

(3) Change the scope of your authorization
Each function requires some basic personal information to be completed. For the collection and use of additional personal information, you can give or withdraw your authorization and consent at any time.

After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

(4) Cancel your account
If you need to log out of your account, please log in to the Friendship Computer Client and go to "Web Synchronization"-"Options"-"Clear Cloud Data" to delete it yourself.

After canceling your account, we will stop providing you with products or services, and delete your personal information at your request, except as otherwise provided by laws and regulations.

(5) Obtain a copy of personal information
You have the right to obtain a copy of your personal information. You can do this by yourself: log in to the WinPIM file client and enter "File"-"Backup Data" or "Import\Export".

(6) Automatic decision-making of restraint information system
In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems and algorithms. For example: push you emails with WinPIM usage skills, push emails with recent feature updates, push user research or interactive activities. If these decisions significantly affect your legal rights, you have the right to ask us for an explanation, or you can choose to unsubscribe in the email.

(7) In response to your above request
To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. For your request, we will respond within 15 days.

For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. For those that are unreasonably repeated, require excessive technical means (for example, the need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) Request, we may refuse.

In the following situations, we will not be able to respond to your request in accordance with laws and regulations:

Related to our fulfillment of our obligations under laws and regulations;
Related to national security and national defense security;
Related to public safety, public health, and major public interests;
Related to criminal investigation, prosecution and trial;
We have sufficient evidence to show that you have subjective malice or abuse of rights;
To protect the life, property and other major legal rights of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;
Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
Involving trade secrets.

7. How do we deal with the personal information of minors

Our products, websites and services are mainly for adults. Without the consent of their parents or guardians, children may not create their own user accounts. Although local laws and customs have different definitions of children, we treat anyone under the age of 14 as a child.

For the collection of children's personal information with parental consent, we will only use or publicly disclose this information when permitted by law, the parent or guardian's explicit consent, or is necessary to protect the child.

If we find that we have collected children’s personal information without first obtaining verifiable parental consent, we will try to delete the relevant data as soon as possible.

8. How to update this policy

As this privacy policy may be updated from time to time, you should check it regularly to understand our plans and procedures for protecting the personal information collected. Your continued use of the friendly and WinPIM file service constitutes your consent to this privacy policy and any updated version.

For major changes, depending on the specific circumstances, we may also provide a more significant notice explaining the specific changes to this policy. Significant changes include but are not limited to:

Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
We have undergone major changes in the ownership structure and organizational structure. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;
Changes in the main objects of personal information sharing, transfer or public disclosure;
Your right to participate in the processing of personal information and how to exercise it has undergone major changes;
When our responsible department, contact information and complaint channels for handling personal information security change;
When the personal information security impact assessment report shows that there is a high risk.

9. How to contact us

If you have any questions, comments or suggestions about this privacy policy, please contact us in the following ways:

Send an email to support@winpim.com