* This privacy agreement is translated from Chinese, and the Chinese version
shall prevail.
This policy only applies to the product "WinPIM" and related services of YQSoft
Inc. (hereinafter referred to as "we").
The security of your personal information is of utmost importance to us. We have
always tried our best to protect the security of your personal information and
are committed to maintaining your trust in us. We will collect and use your
personal information in accordance with relevant laws, regulations and technical
specifications to help us provide you with better products and services. At the
same time, we promise to keep your personal information and other data strictly
confidential to ensure the safety of your personal information.
Please read this privacy policy (hereinafter referred to as "this policy")
carefully before using our products and services. Once you start using "WinPIM"
products and related services, it means that you agree to this policy.
Glossary
To help you understand the proprietary terms mentioned in this policy, we
have defined these proprietary terms:
Personally identifiable information: Personal information refers to various
information that can be individually or combined with other information to
identify the personal identity of a natural person, including but not limited to
the natural person’s name, date of birth, ID number, and personal biometric
information recorded by electronic or other means , Residential address,
telephone number, etc.
Personal sensitive information: Personal sensitive information refers to
personal information that, once leaked, illegally provided, or misused, may
endanger the safety of people and property, and easily lead to personal
reputation, physical and mental health damage, or discriminatory treatment. For
example, personal sensitive information includes ID number, personal biometric
information, bank account number, communication content, health and
physiological information, etc.
Non-personally identifiable information: recorded information related to the
user, but in fact information that cannot directly or indirectly identify you,
including personal information provided through de-identification, anonymization
or pseudonymization.
Cookie (cookie file): A cookie is a small text file placed on the client (in
your computer, mobile phone or other smart terminal) by the website server when
you browse the web. When you visit the corresponding website again, The website
can then recognize your browser through cookies. Cookies may store user
preferences and other information. You can configure your browser to reject all
cookies or display a prompt when a website sends cookies. However, without
cookies, some website features or services may not work properly.
De-identification: refers to the process of technical processing of personal
information to make it impossible to identify the subject of personal
information without resorting to additional information.
Anonymization: refers to the process in which the subject of personal
information cannot be identified through technical processing of personal
information, and the processed information cannot be restored.
1. How we collect and use your personal information
We will follow the principles of fairness, lawfulness and necessity, based on
the following functions and services, to collect and use the personal
information you voluntarily provide during the use of products (or services).
(1) Register an account
When you register and log in to the WinPIM account, you need to provide
according to the following registration methods:
Register with email: email address and set password
WinPIM also provides a local mode without registering an account. If you choose
not to register an account, you will not be able to synchronize your task data
between multiple devices, and once you uninstall the application, your local
mode task data will be lost.
(2) Application function
1. Sync data
Once you register an account and create data in the account, in order for you to
synchronize data between devices normally and completely, you need to allow us
to collect:
The contacts, calendars, tasks and notes you save in the software, and the
pictures and attachments you add to the data.
The information of the device you are editing (including: device model,
operating system version, unique device identifier)
The above information is only used for you to synchronize data between devices,
we will not read your data content.
(3) Permissions that will be applied for in the app
We need to apply for some system permissions that involve personal privacy to
ensure that some functions in the app can be used normally. We will apply for
authorization from you when you use these functions, and we will only access
your personal information after you have clearly obtained your authorization. If
you do not need to use these functions, you can refuse authorization; if you
have never used these functions, we will not request permission from you and
will not access your personal information.
The permissions we will apply for and the functions corresponding to these
permissions include:
Allow access to system calendar: When you want to import calendars, we will
request this permission. After obtaining authorization, you can directly import
system calendar events to the WinPIM file
Allow access to the address book: When you want to import the address book, we
will apply for this permission. After obtaining authorization, you can directly
import the address book to the WinPIM file
Allow writing to external storage space: We will apply for this permission when
you save attachments to your phone in the program. After obtaining
authorization, you can download the attachments in the program to the local
phone
Allow reading external storage space: when you upload attachments in the
program, we will apply for this permission
(4) Statistical services
We collect data based on your interaction with us and the choices you make,
including your privacy settings and the products and features you use. The data
we collect may include IP address, platform, timestamp, application identifier,
application version, terminal manufacturer, and terminal device operating system
version.
2. How we use cookies and other technologies
WinPIM will only use cookies on the www.winpim.net website. Cookies will not be used in Windows and Android App applications, and the www.winpim.net website will not be nested in any of our applications.
3. How do we share, transfer and publicly disclose your personal information(1) Sharing
Without your consent, we will not share your personal information with any other
company, organization or individual, except in the following cases:
Obtain your explicit consent or authorization: After obtaining your explicit
authorization, we will share your personal information with other parties.
Sharing under statutory circumstances: According to laws and regulations,
litigation dispute resolution needs, or mandatory requirements or judicial
rulings of government authorities, your personal information must be shared
externally.
To the extent required or permitted by law, it is necessary to provide your
personal information to a third party in order to protect the interests,
property, or safety of the friendly files and their users or the public from
damage
(2) Transfer
Without your consent, we will not transfer your personal information to any
company, organization or individual, except in the following cases:
Obtain your explicit consent or authorization: After obtaining your explicit
authorization, we will transfer your personal information to other parties.
In the event of a merger, acquisition or bankruptcy liquidation, the transfer of
personal information may be involved. In this case, we will require new
companies and organizations that hold your personal information to continue to
be bound by this policy. If there are any changes to the collection and
processing methods of personal information agreed in this policy, the company or
organization will re-seek your authorization and consent.
(3) Public disclosure
Without your consent, we will not publicly disclose your personal information,
except in the following cases:
Obtain your explicit consent or authorization.
We may disclose your personal information to competent authorities based on
laws, legal procedures, litigation or mandatory requirements of government
authorities. However, we guarantee that when the above situation occurs, we will
require the disclosure requesting party to produce corresponding valid legal
documents, and take safety protection measures that comply with the law and
industry standards for the disclosed information.
4. How do we save your personal information
(1) Retention period
During the use of this product and service, we will continue to save your
personal information for you. If you exceed the service period, we will delete
it from time to time.
If we stop operations due to poor management or other reasons, we will
immediately stop the collection of your personal information and delete the
personal information that has been collected. We will make an announcement on
the website or communicate this situation to each user one by one in other
reasonable ways such as in-site notices, emails, etc.
(2) Conservation area
We store information obtained from the territory of the People's Republic of
China in the territory of the People's Republic of China. If some products or
services involve cross-border, we need to transfer your personal information
overseas. We will strictly follow the laws and regulations to implement and
ensure the security of your personal information.
5. How do we protect your personal information
The security of your personal information is very important to us. We will
strictly abide by relevant laws and regulations and take reasonable and feasible
measures recognized by the industry to protect your personal information.
Prevent unauthorized access, disclosure, use, and modification of information,
and avoid information damage or loss.
(1) Technical measures and data security measures
We have used industry-standard security protection measures to protect the
personal information you provide, to prevent unauthorized access, public
disclosure, use, and modification of data, and to prevent data damage or loss.
We will take all reasonable and feasible measures to protect your personal
information. For example, the data exchange between your browser and WinPIM
files is protected by SSL encryption; we also provide https secure browsing; we
will use encryption technology to ensure the confidentiality of data; we will
use trusted protection mechanisms to prevent data We have been maliciously
attacked; we have deployed an access control mechanism to ensure that only
authorized personnel can access personal information; and we will organize
security and privacy protection training courses to strengthen employees’
awareness of the importance of protecting personal information.
The Internet is not an absolutely secure environment, and email, instant
messaging, and communication with other our users are not encrypted. We strongly
recommend that you do not send personal information through such methods. Please
use a complex password to help us ensure the security of your account.
(2) Security incident handling
The Internet environment is not 100% secure, and we will do our best to ensure
or guarantee the security of any information you send to us. If our physical,
technical, or management protection facilities are damaged, resulting in
unauthorized access, public disclosure, tampering, or destruction of
information, resulting in damage to your legal rights, we will bear the
corresponding legal responsibility.
In the unfortunate event of a personal information security incident, we will
promptly inform you in accordance with the requirements of laws and regulations:
the basic situation and possible impact of the security incident, the disposal
measures we have taken or will take, and what you can independently prevent and
reduce risks Suggestions, remedies for you, etc. We will promptly inform you
about the incident by email, letter, telephone, push notification, etc. If it is
difficult to inform the subject of personal information one by one, we will take
a reasonable and effective way to issue an announcement.
At the same time, we will proactively report the handling of personal
information security incidents in accordance with the requirements of the
regulatory authorities.
6. Your right to manage personal information
We do our best to protect your rights to access, correct and delete your
personal information, so that you have the full ability to protect your privacy
and security. Your rights include:
(1) Access and correct your personal information
You have the right to access your personal information, except for exceptions
provided by laws and regulations. If you want to exercise data access rights,
you can access and correct it yourself in the following ways:
App lock password
Enter "Options", change or cancel the password, and turn off fingerprint
recognition.
If you are unable to access or correct this personal information through the
above methods, you can send an email to support@winpim.com. We will respond to
your request for access within 15 days.
(2) Delete your personal information
In the following situations, you can request us to delete personal information:
If our handling of personal information violates laws and regulations;
If we collect and use your personal information without obtaining your consent;
If our handling of personal information violates our agreement with you;
If you no longer use our products or services, or you cancel your account;
If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the
entities that have obtained your personal information from us and require them
to delete them in a timely manner, unless laws and regulations provide
otherwise, or these entities obtain your independent authorization. After you
delete information from our service, we may not delete the corresponding
information from the backup system immediately, but we will delete the
information when the backup is updated.
After you delete your account, we will also notify the entities that have
obtained your personal information from us and ask them to delete them in a
timely manner, unless laws and regulations provide otherwise, or these entities
obtain your independent authorization. After you delete information from our
service, we may not delete the corresponding information from the backup system
immediately, but we will delete the information when the backup is updated.
(3) Change the scope of your authorization
Each function requires some basic personal information to be completed. For the
collection and use of additional personal information, you can give or withdraw
your authorization and consent at any time.
After you withdraw your consent, we will no longer process the corresponding
personal information. However, your decision to withdraw your consent will not
affect the previous processing of personal information based on your
authorization.
(4) Cancel your account
If you need to log out of your account, please log in to the Friendship Computer
Client and go to "Web Synchronization"-"Options"-"Clear Cloud Data" to delete it
yourself.
After canceling your account, we will stop providing you with products or
services, and delete your personal information at your request, except as
otherwise provided by laws and regulations.
(5) Obtain a copy of personal information
You have the right to obtain a copy of your personal information. You can do
this by yourself: log in to the WinPIM file client and enter "File"-"Backup
Data" or "Import\Export".
(6) Automatic decision-making of restraint information system
In some business functions, we may only make decisions based on non-manual
automatic decision-making mechanisms including information systems and
algorithms. For example: push you emails with WinPIM usage skills, push emails
with recent feature updates, push user research or interactive activities. If
these decisions significantly affect your legal rights, you have the right to
ask us for an explanation, or you can choose to unsubscribe in the email.
(7) In response to your above request
To ensure safety, you may need to provide a written request or prove your
identity in other ways. We may ask you to verify your identity before processing
your request. For your request, we will respond within 15 days.
For your reasonable request, we do not charge fees in principle, but for
repeated requests that exceed reasonable limits, we will charge a certain cost
as appropriate. For those that are unreasonably repeated, require excessive
technical means (for example, the need to develop new systems or fundamentally
change existing practices), bring risks to the legitimate rights and interests
of others, or are very impractical (for example, involving information stored on
backup tapes) Request, we may refuse.
In the following situations, we will not be able to respond to your request in
accordance with laws and regulations:
Related to our fulfillment of our obligations under laws and regulations;
Related to national security and national defense security;
Related to public safety, public health, and major public interests;
Related to criminal investigation, prosecution and trial;
We have sufficient evidence to show that you have subjective malice or abuse of
rights;
To protect the life, property and other major legal rights of the personal
information subject or other individuals, but it is difficult to obtain the
consent of the person;
Responding to your request will cause serious damage to the legitimate rights
and interests of you or other individuals or organizations;
Involving trade secrets.
7. How do we deal with the personal information of minors
Our products, websites and services are mainly for adults. Without the
consent of their parents or guardians, children may not create their own user
accounts. Although local laws and customs have different definitions of
children, we treat anyone under the age of 14 as a child.
For the collection of children's personal information with parental consent, we
will only use or publicly disclose this information when permitted by law, the
parent or guardian's explicit consent, or is necessary to protect the child.
If we find that we have collected children’s personal information without first
obtaining verifiable parental consent, we will try to delete the relevant data
as soon as possible.
8. How to update this policy
As this privacy policy may be updated from time to time, you should check it
regularly to understand our plans and procedures for protecting the personal
information collected. Your continued use of the friendly and WinPIM file
service constitutes your consent to this privacy policy and any updated version.
For major changes, depending on the specific circumstances, we may also provide
a more significant notice explaining the specific changes to this policy.
Significant changes include but are not limited to:
Our service model has undergone major changes. Such as the purpose of processing
personal information, the type of personal information processed, the way of
using personal information, etc.;
We have undergone major changes in the ownership structure and organizational
structure. Such as changes in owners caused by business adjustments, bankruptcy
mergers, etc.;
Changes in the main objects of personal information sharing, transfer or public
disclosure;
Your right to participate in the processing of personal information and how to
exercise it has undergone major changes;
When our responsible department, contact information and complaint channels for
handling personal information security change;
When the personal information security impact assessment report shows that there
is a high risk.
9. How to contact us
If you have any questions, comments or suggestions about this privacy policy,
please contact us in the following ways:
Send an email to support@winpim.com