隐私政策
更新日期:2024年07月29日
生效日期:2024年08月05日
引言
欢迎您使用我们的产品和服务!
我们深知个人信息对您的重要性,我们将按法律法规要求为您的个人信息安全提供充分保障。为此,芜湖奇瑞信息技术有限公司(注册地址:安徽省芜湖市经济技术开发区长春路8号)(以下简称“我们”)特制定本《隐私政策》(以下简称“本政策)以帮助您充分了解,在您使用我们的产品和服务的过程中,我们会如何处理(包括收集、使用、存储、提供、公开、删除等,下同)和保护您的个人信息以及您可以如何管理您的个人信息。 在您开始使用我们的产品和服务前,请您务必仔细阅读和理解本政策,确保您充分理解和同意后再开始使用。 本政策中涉及的专业词汇,我们尽量以简明通俗的表述向您解释,以便于您理解。如对本政策内容有任何疑问、意见或建议,您可通过本政策提供的各种联系方式与我们联系。
适用范围
本政策适用于我们的【CheryGPT】平台网站(网址:https://www.cherygpt.com/)以及【CheryAI】移动端应用。
如我们书面授权的公司的产品或服务中使用了我们提供的产品和服务但未设独立的隐私政策的,则本政策同样适用于该部分产品和服务。
需要特别说明的是,本政策仅适用于【CheryGPT】平台网站以及【CheryAI】移动端应用自身提供的功能及服务,不适用于其他第三方通过【CheryGPT】平台网站以及【CheryAI】移动端应用提供的产品和服务,
您在选择使用第三方提供的产品和服务前应充分了解第三方的条款和隐私保护政策。
本政策部分将帮助您了解以下内容:
1. 我们如何收集和使用您的个人信息
2. 我们如何使用Cookie和同类技术
3. 我们如何委托处理、对外提供、转让、公开披露您的个人信息
4. 我们如何保障您的权利
5. 我们如何保护您的个人信息
6. 您的个人信息如何保存
7. 我们如何保护未成年人个人信息
8. 本政策如何更新
9. 如何联系我们
附录
1.我们如何收集和使用您的个人信息
在您使用我们的产品和服务时,我们需要收集和使用的您的个人信息包括如下:
1) 为实现向您提供我们产品和服务的基本功能,您须授权我们收集、使用的必要信息。如您拒绝提供相应信息,您将无法正常使用我们的产品和服务;
2) 为实现向您提供我们产品和服务的附加功能,您可选择授权我们收集、使用的信息。如您拒绝提供,您将无法正常使用相关附加功能或无法达到我们拟达到的功能效果,但并不会影响您正常使用我们产品和服务的基本功能。
3)根据法律法规要求,我们需要收集、使用的信息。
您可以通过《个人信息已收集清单》详细了解我们收集和使用您的个人信息的具体场景、相关信息类型、收集目的、收集方式及处理方式等内容。
1.1 注册成为我们的用户并进行登录
注册成为我们的用户,以便向您提供我们的产品和服务。为向您提供智能对话、图片解读等基础服务,您需要使用您的飞书APP扫描我们提供的二维码进行注册并登录。经过您的授权同意后,我们将获取您在飞书平台上的个人信息(姓名、头像以及您授权的其他信息),以便与我们的产品和服务进行绑定。完成绑定后,您可以使用您的飞书账号以扫码方式进行登录并使用本产品和服务。
1.2 您使用我们的产品和服务时所收集的信息
1)智能对话服务。
我们基于生成式人工智能模型技术向您提供对话及互动服务。为了向您提供对话及互动服务,我们可能会收集您主动输入的信息、内容指令,您在使用模型时的行为信息(包括您的点击、浏览、编辑等操作记录),以及您提供的反馈信息(包括点赞、点踩、提交反馈)。我们会对上述信息进行分析与计算,以便于更好地理解您的问题和上下文语境,从而为您提供更具有相关性的信息内容。
2)智能搜索。
当识别到您可能有搜索意图时,我们会收集、分析您主动输入的信息,以便向您提供便捷、快速的实时搜索结果。
3)用户反馈与服务。
为便于与您联系、尽快帮助您解决问题或记录相关问题的处理方案及结果,我们可能会保存您与我们的通信/通话记录及相关内容(包括账号信息、反馈信息、您为了证明相关事实提供的其他信息,或您留下的联系方式)。
当您投诉他人或被他人投诉时,为了保护您及他人的合法权益,我们可能会将您的账号/身份信息、联系方式、投诉相关内容提供给有关部门,以便及时解决投诉纠纷,但法律法规明确禁止提供的除外。
4)问卷调查。
为了提供服务及改进服务质量的合理需要,我们可能在我们的产品端向您发送问卷。在分析问卷时,我们会使用您的问卷答复信息,以及您与客服联系时您提供的其他信息;如您不愿意,您也可以拒绝参与问卷调查。
1.3 提供安全保障收集的信息
风控和安全管理。为提高您使用我们及我们关联公司、合作伙伴提供的服务的安全性,保护您或其他用户或公众的人身财产安全免遭侵害,更好地预防钓鱼网站、欺诈、网络漏洞、计算机病毒、网络攻击、网络侵入等安全风险,更准确地识别违反法律法规或相关协议规则的情况,
我们可能会收集您的个人信息、服务使用信息、设备信息、服务日志信息来进行身份验证、检测及防范安全事件,并依法采取必要的记录、审计、分析、处置措施。如您拒绝我们收集、使用前述信息,您将无法使用我们提供的安全管理功能或者无法达到预期功能效果。
当您在使用我们的产品和服务过程中,为识别您的账号异常状态,维护服务的正常运行,改进及优化您的体验(包括为了适配不同设备正确显示页面内容)并保障您的账号安全,我们可能会收集您的设备信息及您使用我们产品和服务的行为信息:
设备信息:为了保障产品与服务的安全运行、运营的质量及效率,我们可能会收集您的硬件型号、操作系统版本号、设备标识符(Android如AndroidID、OAID、SIM卡信息(如ICCID)、GAID,iOS如IDFV、IDFA;
不同的标识符在有效期、是否可由用户重置以及获取方式方面会有所不同)、网络设备硬件地址(设备MAC地址)、IP
地址、WLAN接入点(如SSID,BSSID)、蓝牙(Bluetooth)、基站、软件版本号、网络接入方式、类型、状态、网络质量数据、操作、使用、服务日志、设备传感器数据(如加速度传感器)。
日志信息:当您使用我们的网站或客户端提供的产品或服务时,我们会自动收集您对我们服务的详细使用情况,作为有关网络日志保存。例如您的搜索查询内容、IP地址、浏览器的类型、使用的语言、访问日期和时间、您访问的网页记录及您的操作日志信息。前述加粗信息属于您的敏感个人信息。如您拒绝我们收集、使用前述信息,您将无法享受优化的服务体验以及我们提供的账号安全保障功能,或者无法达到预期功能效果。
请注意,单独的设备信息、日志信息等是无法识别特定自然人身份的信息。如果我们将这类非个人信息与其他信息结合用于识别特定自然人身份,或者将其与个人信息结合使用,则在结合使用期间,这类非个人信息将有可能被视为个人信息,除取得您授权或法律法规另有规定外,我们不会处理您的这些个人信息。
为了预防恶意程序、保障运营质量及效率,我们会收集正在运行的进程信息、页面的总体运行、使用情况与频率、页面崩溃情况、总体使用情况、性能数据。如您拒绝我们收集、使用前述信息,您将无法享受优化的服务体验以及我们提供的账号安全保障功能,或者无法达到预期功能效果。
1.4 第三方向我们提供的信息
我们将对其他用户进行与您相关的操作时收集关于您的信息,亦可能从我们的关联公司、合作第三方或通过其他合法途径获取您的个人信息。 例如,为向您提供部分功能,您同意运营商基于您个人的手机号码向我们发送短信验证码,否则无法为您提供注册及登录相关的功能;我们仅会在取得您的同意或者在法律法规规定的情形下,通过第三方收集您的个人信息。
1.5 您向我们提供的信息
在服务使用过程中,我们欢迎您对我们的产品和服务的使用体验问题进行反馈或提出建议,帮助我们更好地了解您使用我们产品或服务的体验和需求,改善我们产品或服务,为此我们会记录您的账号、姓名、联系信息、反馈的问题或建议,以便我们进一步联系您并向您反馈您我们的处理方案。
1.6 征得授权同意的例外
根据相关法律法规,以下情形中,我们处理(包括收集、使用、存储、提供、公开、删除等)您的个人信息无需获得您的授权同意:
a)为订立、履行您作为一方当事人的合同所必需
b)为履行法定职责或者法定义务所必需
c)为应对突发公共卫生事件,或者紧急情况下为保护自然人的生命健康和财产安全所必需
d)为公共利益实施新闻报道、舆论监督等行为,在合理的范围内处理您的个人信息
e)依照法律规定在合理的范围内处理您自行公开或者其他已经合法公开的个人信息
f)法律、行政法规规定的其他情形
请您注意,根据法律规定,经匿名化处理后的信息不属于个人信息,无法识别特定自然人且不能复原,我们对此类信息的处理将无需另行向您通知并征得您的同意。
2.我们如何使用Cookie和同类技术
2.1 Cookie的使用
为使您获得更轻松的访问体验,您使用我们的产品或服务时,我们会通过采用各种技术收集和存储您访问时的相关数据,在您访问或再次访问我们服务时,我们能识别您的身份,并通过分析数据为您提供更好更多的服务。包括使用小型数据文件识别您的身份,这么做是为了解您的使用习惯,帮您省去重复输入账户信息的步骤,或者帮助判断您的账户安全。这些数据文件可能是Cookie、Flash
Cookie,或您的浏览器或关联应用程序提供的其他本地存储(统称“Cookie”)。
请您理解,我们的某些服务只能通过使用Cookie才可得到实现。如果您的浏览器或浏览器附加服务允许,您可以修改对Cookie的接受程度或者拒绝Cookie,但拒绝Cookie在某些情况下您可能无法使用依赖于Cookie的服务的部分功能。
ETag(实体标签)是在互联网浏览器与互联网服务器之间背后传送的HTTP协议标头,可代替Cookie。ETag可以帮助我们避免不必要的服务器负载,提高服务效率,节省资源、能源,同时,我们可能通过ETag来记录您的身份,以便我们可以更深入地了解和改善我们的产品或服务。大多数浏览器均为用户提供了清除浏览器缓存数据的功能,您可以在浏览器设置功能中进行相应的数据清除操作。但请注意,如果停用ETag,您可能无法享受相对更佳的产品或服务体验。
网页上常会包含一些电子图像,称为“单像素 GIF 文件”或“网络 beacon”,它可以帮助网站计算浏览网页的用户或访问某些Cookie。
我们会通过网络beacon收集您浏览网页活动信息,例如您访问的页面地址、您先前访问的援引页面的位址、您停留在页面的时间、您的浏览环境以及显示设定等,以便我们为您提供更佳的服务体验
。前述加粗信息属于您的敏感个人信息,如您拒绝我们收集、使用前述信息,您可通过浏览器或用户选择机制拒绝或管理Cookies或同类技术。
2.2 SDK的使用
为保障我们客户端的稳定运行、功能实现,使您能够使用和享受更多的服务及功能,我们的应用中会嵌入授权合作伙伴的SDK或其他类似的应用程序。我们会尽到审慎义务,对合作方获取信息的软件工具开发包(SDK)进行严格的安全监测,以保护数据安全。
我们接入的第三方SDK主要服务于您以及其他的用户的需求,因此在满足新的服务需求及业务功能变更时,我们可能会调整我们接入的第三方SDK。我们会及时向您公开说明接入第三方SDK的最新情况。目前接入的第三方SDK列明详见
《个人信息共享及SDK清单》。
3.我们如何委托处理、对外提供、转让、公开披露您的个人信息
3.1 委托处理
上述功能/服务中,某些具体的功能或服务可能是由我们委托的服务提供商来为您提供客户支持,我们仅会出于为您提供该功能/服务支持这一目的向服务提供商委托处理该功能/服务项下所必要的个人信息。例如我们可能会委托广告、分析服务类的授权合作伙伴处理与广告覆盖面和有效性相关的信息,但除非得到您的许可,否则我们不会将您的个人身份信息与提供广告、分析服务的合作伙伴共享,或者我们会将这些信息进行去标识化处理,以便授权合作伙伴无法直接识别您个人。这类合作伙伴可能将上述信息与他们合法获取的其他数据相结合,以执行我们委托的广告服务或决策建议。
对我们委托处理个人信息的服务提供商,我们会与其签署严格的保密协议和委托处理协议,要求他们按照我们的要求、本政策以及其他任何相关的保密和安全措施来处理个人信息。在委托处理协议不生效、无效、被撤销或者终止时,我们会要求他们向我们返还或删除您的个人信息。
3.2 对外提供
我们不会与其他公司、组织和个人共享您的个人信息,但以下情况除外:
a.在获取您同意的情况下共享:获得您的明确同意后,我们会与其他方共享您的个人信息。
b.在法定情形下的共享:我们可能会根据法律法规规定、诉讼争议解决需要,或按行政、司法机关依法提出的要求,对外共享您的个人信息。
c.您主动选择情况下的共享:
1)第三方授权伙伴或合作伙伴的共享
为向您提供您所需的服务,我们可能向第三方授权合作伙伴或服务提供商共享您必要的个人信息,例如提供网站托管、资料分析及储存、即时通讯、客户服务、电子邮件传送、审计、营销以及其他类似服务的服务提供商。未经您的同意,上述被分享方无权将共享的个人数据用于任何其他用途。对我们与之共享个人数据的公司、组织和个人,我们会与其签署严格的数据处理协议,要求他们按照我们的说明、本政策以及其他任何相关的保密和安全措施来处理个人数据,并且我们会要求合作方的数据安全能力和信息安全资质要满足相关法律法规的要求。
2)与关联公司共享
为便于我们基于个人信息共同向您提供服务,我们可能会与关联公司共享您的必要个人信息。请您知悉,我们只会共享必要的个人信息(如为便于您使用账户使用我们关联公司产品或服务,我们会向关联公司共享您必要的账号信息),如果我们共享您的个人敏感信息或关联公司改变个人信息的使用及处理目的,将再次征求您的授权同意。
3.3 转让
我们不会将您的个人信息转让给任何公司、组织和个人,但以下情况除外:
a. 在获取明确同意的情况下转让:获得您的明确同意后,我们会向其他方转让您的个人信息。
b. 在我们发生合并、收购或破产清算情形,或其他涉及合并、收购或破产清算情形时,如涉及到个人信息转让,我们会要求新的持有您个人信息的公司、组织继续受本政策的约束,否则我们将要求该公司、组织重新向您征求授权同意。
3.4 公开披露
我们仅会在以下情况下,公开披露您的个人信息:
a. 获得您明确同意或基于您的主动选择,我们可能会公开披露您的个人信息;
b.
如果我们确定您出现违反法律法规或严重违反我们与您的相关协议规则的情况,或为保护用户或公众的人身财产安全免遭侵害,我们可能依据法律法规或相关协议规则征得您同意的情况下披露关于您的个人信息,包括相关违规行为以及已对您采取的措施。
4. 我们如何保障您的权利
4.1 访问个人信息
您可以通过发送邮件至 privacy@mychery.com,要求访问您提供的个人信息等资料。
4.2 更正、补充个人信息
若您发现我们收集、存储的个人信息不准确或不完整,因而您需要更新您的个人信息的,您有权做出更正或补充。您可以通过将您的更正、补充申请通过发送邮件至 privacy@mychery.com ,更正或补充个人信息。
4.3 复制个人信息
您可以将您的请求通过发送邮件至 privacy@mychery.com ,我们会将您的个人信息副本发送至您指定的电子邮箱。
4.4 撤回同意
您可以通过发送邮件至privacy@mychery.com撤回对我们获取您个人信息的授权。撤回对我们获取您个人信息的授权。当您撤回同意或授权后,可能导致我们无法为您继续提供撤回授权部分对应的服务。但您撤回同意或授权,不影响撤回前我们基于您的同意开展的个人信息处理。
4.5 删除个人信息
在以下情形中,您可以向我们提出删除个人信息的请求:
a.如果我们违反法律、行政法规或者违反约定处理个人信息;
b.如果处理目的已实现、无法实现或者为实现处理目的不再必要;
c.如果我们停止提供产品或者服务,或者保存期限已届满;
d.如果您撤回同意;
e.法律、行政法规规定的其他情形。
您可以通过发送邮件至privacy@mychery.com提出您的删除请求。若我们决定响应您的删除请求,我们还将同时通知从我们获得您的个人信息的第三方,要求其及时删除,除非法律法规另有规定,或这些第三方获得了您的独立授权。当您从我们产品和/或服务中删除信息后,我们可能不会立即在备份系统中删除相应的信息,但我们会停止除存储和采取必要的安全保护措施之外的处理,并会在备份更新或法律、行政法规规定的保存期限届满时删除这些信息。
如我们停止运营我们的产品或服务,我们将及时停止继续收集您个人信息的活动,将停止运营的通知以提前30天以公告的形式通知您,并依照所适用的法律对所持有的您的个人信息进行删除或匿名化处理。
4.6 注销账户
您可以通过发送邮件至privacy@mychery.com申请注销账号。除法律法规另有规定外,注销账号之后我们将停止为您提供服务,并根据您的要求删除您的个人信息。在法律、行政法规规定的保存期限未届满,或者删除个人信息从技术上难以实现的情况下,我们会停止除存储和采取必要的安全保护措施之外的处理。
4.7 个人信息处理规则的解释说明
您可以通过发送邮件至privacy@mychery.com要求我们对本隐私声明进行解释说明。
4.8 逝者相关权利
若您身故,您的近亲属为了自身的合法、正当利益,可以通过发送邮件至privacy@mychery.com对您的相关个人信息行使法律规定的查阅、复制、更正、删除等相关权利;您生前另有安排的除外。
4.9 您有权请求将个人信息转移至您指定的个人信息处理者
您有权请求将您的个人信息转移至您指定的个人信息处理者。如您需要转移您的个人信息,您可以通过发送邮件至privacy@mychery.com联系我们。在符合国家网信部门规定条件且技术可行的前提下,我们将根据您的要求将您的个人信息转移至您指定的个人信息处理者。
4.10 响应您的上述请求
如您或可能的您的监护人、近亲属及其他有权主体无法通过上述方式行使个人信息权利,您可以通过发送邮件至privacy@mychery.com与我们联系。我们可能需要验证您的身份,并在验证您的身份后15个工作日内作出响应您的请求,对于您提出的敏感个人信息删除请求,我们将在10个工作日内响应您的请求。
对于您合理的请求,我们原则上不收取费用,但对多次重复、超出合理限度的请求,我们将视情收取一定成本费用。对于那些无端重复、需要过多技术手段(例如,需要开发新系统或从根本上改变现行惯例)、给他人合法权益带来风险或者非常不切实际(例如,涉及备份磁带上存放的信息)的请求,我们可能会予以拒绝。
在以下情形中,我们将无法响应您的请求:
a. 与我们履行法律法规规定的义务相关的;
b. 与国家安全、国防安全直接相关的;
c. 与公共安全、公共卫生、重大公共利益直接相关的;
d. 与刑事侦查、起诉、审判和执行判决等直接相关的;
e. 我们有充分证据表明您存在主观恶意或滥用权利的;
f. 出于维护您或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;
g. 响应您的请求将导致您或其他个人、组织的合法权益受到严重损害的;
h. 涉及商业秘密的。
5.我们如何保护您的个人信息
5.1 为保护个人信息安全采取的技术、组织措施
1)技术安全防护
为保障您的信息安全,我们已采取符合业界标准、合理可行的安全防护措施保护您的信息,防止个人信息遭到未经授权访问、公开披露、使用、修改、损坏或丢失。例如,在您的客户端与服务器之间交换数据时受TLS协议加密保护;我们同时对网站提供HTTPS协议安全浏览方式;我们会使用加密技术提高个人信息的安全性;我们会使用受信赖的保护机制防止个人信息遭到恶意攻击;我们会部署访问控制机制,尽力确保只有授权人员才可访问个人信息;以及我们会举办安全和隐私保护培训课程,加强员工对于保护个人信息重要性的认识。
2)安全体系认证
我们有行业先进的以数据为核心,围绕数据生命周期进行的数据安全管理体系,从组织建设、制度设计、人员管理、产品技术等方面多维度提升整个系统的安全性。目前,我们的重要信息系统已经通过ISO27001以及网络安全等级保护三级测评认证。
3)人员安全管理
我们对可能接触到您的信息的员工或外包人员也采取了严格管理,包括但不限于根据岗位的不同采取不同的权限控制,与他们签署保密协议,监控他们的操作情况等措施。我们会按现有技术提供相应的安全措施来保护您的信息,提供合理的安全保障,我们将尽力做到使您的信息不被泄漏、毁损或丢失。我们会举办安全和隐私保护培训课程,加强员工对于保护个人信息重要性的认识。
我们会采取各种预防措施来保护您的个人信息,以保障您的个人信息免遭丢失、盗用和误用,以及被擅自取阅、披露、更改或销毁。为确保您个人信息的安全,我们有严格的信息安全规定和流程,并有专门的信息安全团队在公司内部严格执行上述措施。
5.2 提供个人信息可能存在的安全风险
互联网环境并非百分之百安全,尽管我们有这些安全措施,但请注意在互联网上不存在“完善的安全措施”,我们将尽力确保您的信息的安全性。
5.3 个人信息安全事件的告知
若发生个人信息安全事件,我们将按照法律法规的要求向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的处置措施、您可自主防范和降低风险的建议、对您的补救措施等。事件相关情况我们将以邮件、信函、电话、推送通知等方式告知您,难以逐一告知个人信息主体时,我们会采取合理、有效的方式发布公告。同时,我们还将按照监管部门要求,上报个人信息安全事件的处置情况。
6.您的个人信息如何保存
6.1 存储地点
我们将在中华人民共和国境内运营服务中收集和产生的个人信息存储在中华人民共和国境内服务器及公有云上。 目前,我们不会将上述信息传输至境外。
以下情形下,我们会在履行了法律规定的义务后,向境外实体提供您的个人信息:
a. 适用的法律有明确规定;
b. 获得您的明确授权;
c.您通过互联网进行跨境交易等个人主动行为。
6.2 存储时间
我们会采取合理可行的措施存储您的个人信息,尽力避免收集无关的个人信息。我们只会在仅限于达成本政策所述目的所需的期限以及所适用法律法规所要求的期限内保留您的个人信息。例如,我们将依据《中华人民共和国网络安全法》的要求,就您使用应用服务留存相关的网络日志不少于六个月。我们判断前述期限的标准包括:
a. 完成与您相关的服务目的、维护相应服务及业务记录、应对您可能的查询或投诉;
b. 保证我们为您提供服务的安全和质量;
c. 您是否同意更长的留存期间;
d.是否存在保留期限的其他特别约定。
在您的个人信息超出保留期间后,我们会根据适用法律的要求删除您的个人信息,或使其匿名化处理。
7.我们如何保护未成年人个人信息
在我们提供的服务中,我们推定您具有相应的民事行为能力。
我们的产品和服务仅面向成年人,我们不向未成年人提供产品和服务。我们不允许未成年人注册账号或使用我们的产品和服务,并且不会主动有意收集任何未成年人的信息。
如果任何时候监护人有理由相信我们收集了儿童的个人信息,请通过本政策载明的联系方式联系我们,我们会采取措施尽快删除相关信息。
8.本政策如何更新
我们的隐私政策可能不时进行更新。未经您明确同意我们不会限制您按照本政策所应享有的权利。我们会公告发布对本政策所做的任何变更。
对于重大变更,我们还会提供更为显著的通知(包括我们会通过应用程序内公告通知或向您提供弹窗提示)。
本政策所指的重大变更包括但不限于:
a.我们的服务模式发生重大变化。如处理用户个人信息的目的、处理的个人信息种类、用户个人信息的处理方式等(该等变更我们还将取得您的同意 );
b.我们在控制权、组织架构等方面发生重大变化。如业务调整、破产并购等引起的所有者变更等;
c.用户个人信息共享、转让或公开披露的主要对象发生变化(该等变更我们还将取得您的同意 );
d.我们负责处理用户个人信息安全的责任部门、联络方式及投诉渠道发生变化时; );
e.用户个人信息安全影响评估报告表明存在高风险时。
9.如何联系我们
如果您对我们的隐私政策或个人信息处理有任何疑问、意见或建议, 可以及时通过邮寄或发送电子邮件方式与我们联系,我们的联系方式如下:
芜湖奇瑞信息技术有限公司
地址:安徽省芜湖市经济技术开发区长春路8号
电子邮箱:privacy@mychery.com
一般情况下,我们将在收到您相关联系信息并核实您身份后15个工作日内回复。
如果您对我们的回复不满意,特别是您认为我们的个人信息处理行为损害了您的合法权益,您还可以向网信、电信、公安及工商等监管部门进行投诉或举报或通过具有管辖权的法院提起诉讼来寻求解决方案。
附录 相关定义
1) 个人信息:指以电子或者其他方式记录的与已识别或者可识别的自然人有关的各种信息,不包括匿名化处理后的信息。
2)
敏感个人信息:敏感个人信息是一旦泄露或者非法使用,容易导致自然人的人格尊严受到侵害或者人身、财产安全受到危害的个人信息,包括生物识别、宗教信仰、特定身份、医疗健康、金融账户、行踪轨迹等信息,以及不满十四周岁未成年人的个人信息(我们将在本政策中对具体敏感个人信息以粗体形式进行显著标识)。
3) 儿童:是指不满十四周岁的未成年人。
4) 个人信息删除:指在实现日常业务功能所涉及的系统中去除个人信息的行为,使其保持不可被检索、访问的状态。
5) 匿名化:指个人信息经过处理无法识别特定自然人且不能复原的过程。
Privacy Policy
Updated Date: July 29, 2024
Effective Date: August 5, 2024
Introduction
Welcome to use our products and services!
We recognize the significance of personal information to you and are committed to fulfilling our legal and regulatory obligations to safeguard its security. Our registered address is No. 8 Changchun Road, Economic and Technological Development Zone, Wuhu City, Anhui Province. In this document, we refer to ourselves as "we", "our", or "us". We have crafted this Privacy Policy to provide you with a comprehensive understanding of how we manage your personal information, including its collection, use, storage, provision, disclosure, and deletion, during your engagement with our products and services. This policy outlines our practices and the measures we take to protect your data, as well as the avenues available to you for managing your personal information. Before you start using our products and services, please be sure to read and understand this policy carefully to ensure that you fully understand and agree with it before you start using it. We have tried to explain the specialized terms used in this policy in a simple and popular way so that you can understand them. If you have any questions, comments or suggestions about the contents of this policy, you can contact us through the various contact information provided in this policy.
Scope of Application
This Policy applies to our [CheryGPT] platform website (address:https://www.cherygpt.com/) and [CheryAI] mobile application.
This Policy also applies to products and services provided by companies that we have
authorized in writing to use in their products or services but do not have a separate privacy
policy.
In particular,this Policy applies only to the features and services provided by the
CheryGPT Platform Website and the CheryAI Mobile App, and not to the products and services provided by other
third parties through the CheryGPT Platform Website and the CheryAI Mobile App, and you should be fully aware
of the following before choosing to use the products and services provided by a third party
You should be fully aware of the third party's terms and privacy
policy before choosing to use the products and services provided by the third party.
This policy section will help you understand the following :
1. How we collect and use your personal information
2. How we use cookies and similar technologies
3. How we entrust processing, disclose to external parties, transfer, and publicly disclose your personal information
4. How we protect your rights
5. How we protect your personal information
6. How your personal information is stored
7. How we protect the personal information of minors
8. How this policy is updated
9. How to contact us
Appendix: Relevant Definitions
1. How we collect and use your personal information
When you use our products and services, we need to collect and use your personal information as follows:
1)Necessary information that you authorize us to collect and use in order to provide you with the basic
functions of our products and services. If you refuse to provide the information, you will not be able to use
our products and services normally;
2)In order to provide you with additional functions of our products and services, you may choose to authorize
the information we collect and use. If you refuse to provide, you will not be able to use the relevant
additional functions normally or not be able to achieve the effect of the functions we intend to achieve, but it
will not affect your normal use of the basic functions of our products and services.
3)Information we need to collect and use according to laws and regulations.
You can learn more about the specific scenarios in which we collect and use your personal information, the types
of relevant information, the purpose of collection, the collection method and the processing method through the
List
of Personal Information Collected
1.1 Registering as our user and logging in
To use our products and services, you need to register as our user. In order to provide you with basic services such as intelligent dialog and picture interpretation, you need to use your Flying Book APP to scan the QR code provided by us to register and login. After your authorized consent, we will obtain your personal information (name, avatar and other information authorized by you) on the Flying Book platform in order to bind with our products and services. Once bound, you can use your Flying Book account to log in and use the Products and Services by scanning the code.
1.2 Information collected when you use our Products and Services
1)Intelligent Dialog Service
We provide you with dialog and interactive services based on generative artificial intelligence(AI)modeling
technology. In order to provide you with dialogue and interactive services, we may collect information you
actively input, content instructions, information about your behavior when using the model (including records of
your clicks, browsing, editing, and other operations), and information about the feedback you provide (including
liking, stepping on, and submitting feedback). We will analyze and calculate the above information in order to
better understand your questions and contextual context, so as to provide you with more relevant information
content.
2)Intelligent Search
When we recognize that you may have a search intent, we will collect and analyze the information you actively
enter in order to provide you with convenient and fast real-time search results.
3)User feedback and service
In order to facilitate contact with you, help you solve the problem as soon as possible or record the handling
plan and results of the relevant issues, we may save your communication/call records with us and related content
(including account information, feedback information, other information you provide to prove the relevant facts,
or contact information left by you)
When you complain about others or are complained about by others, in order to protect the legitimate rights and
interests of you and others, we may provide your account/identity information, contact information, and
complaint-related content to the relevant authorities for timely resolution of complaint disputes, except where
such provision is expressly prohibited by laws and regulations.
4)Questionnaires
To improve service quality and meet legitimate needs, we may send you questionnaires about our products. When
analyzing these questionnaires, we will use your questionnaire response information, as well as other
information you provide when you contact our customer service. You have the option to opt out of the survey if
you wish.
1.3 Information Collected to Provide Security
Risk Control and Security Management. In order to improve the security of your use of the services provided by
us and our affiliates and partners, to protect your or other users' or the public's personal and property safety
from infringement, to better prevent phishing websites, fraud, network vulnerabilities, computer viruses,
network attacks, network intrusion and other security risks, and to more accurately identify violations of laws,
regulations or rules of the relevant agreements, we may collect your personal information,service usage
information, equipment information, service log information for identity verification, detection and prevention
of security incidents, and take necessary measures for recording, auditing, analyzing and disposal in accordance
with the law. If you refuse to allow us to collect and use the aforementioned information, you will not be able
to use the security management functions provided by us or will not be able to achieve the expected functional
effects.When you use our products and services, in order to identify the abnormal state of your account,
maintain the normal operation of the services, improve and optimize your experience (including for the purpose
of adapting different devices to display the page content correctly) and safeguard the security of your account,
we may collect information about your device and your behavioral information on the use of our products and
services:
Device Information: To ensure the safe operation, quality, and efficiency of our
products and services, we may collect your hardware model, operating system version number, device identifiers
(for Android, such as AndroidID, OAID, SIM card information (e.g., ICCID), GAID; for iOS, such as IDFV, IDFA;
different identifiers may vary in terms of their validity period, whether they can be reset by the user, and how
they are obtained), network device hardware address (device MAC address), IP address, WLAN access points (e.g.,
SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network
quality data, operations, usage, service logs, and device sensor data (e.g., accelerometer) .
Log information: When you use our website or client to access products or services,
we automatically collect detailed information about your use of our services and save it as relevant web logs.
For example, the content of your search queries, IP address, type of browser, language used, date and time of
access, records of web pages you visit, and your operational log information. The aforementioned bolded
information is considered your sensitive personal information. If you refuse to allow us to collect and use the
aforementioned information, you will not be able to enjoy the optimized service experience and the account
security features we provide, or you may not achieve the expected functionality.
Please note that Individual pieces of device information and log information are not capable of identifying a
specific natural person. If we combine such non-personal information with other information for the purpose of
identifying a specific natural person, or if we use it in conjunction with personal information, such
non-personal information may be treated as personal information during the period of such combined use. We will
not process your personal information unless we have obtained your authorization or are otherwise required by
law or regulation.
To prevent malicious software and ensure the quality and efficiency of our operations, we collect information on
running processes, overall operation, usage and frequency of pages, page crashes, overall usage, and performance
data. If you refuse to allow us to collect and use the aforementioned information, you will not be able to enjoy
the optimized service experience and the account security features we provide, or you may not achieve the
expected functionality.
1.4 Information provided by third parties
We will collect information about you when we perform operations related to you for other users, and may also obtain your personal information from our affiliates, cooperating third parties, or through other legal means. For example, in order to provide you with some functions, you agree that the operator sends us an SMS verification code based on your personal cell phone number, otherwise it will not be able to provide you with the functions related to registration and login; we will only collect your personal information through a third party when we have obtained your consent or in the cases stipulated by laws and regulations.
1.5 Information you provide to us
During the use of our services, we welcome your feedback or suggestions on the experience with our products and services to help us better understand your experience and needs, and to improve our products and services. For this purpose, we will record your account number, name, contact information, and the issues or suggestions you provide so that we can further contact you and provide feedback on our processing plan.
1.6 Exceptions to authorized consent
According to relevant laws and regulations, we do not need to obtain your consent to process (including
collection, use, storage, provision, disclosure, deletion, etc.) your personal information in the following
circumstances:
a) Necessary for the conclusion or performance of a contract to which you are a party
b) Necessary to fulfill statutory duties or obligations
c) Necessary to respond to a public health emergency or to protect the life, health, and property safety of
natural persons in an emergency
d) To process your personal information within a reasonable scope for the purpose of news reporting, public
opinion monitoring, and other actions in the public interest
e) To process your personal information within a reasonable scope in accordance with the law that you have
disclosed on your own or that has been legally disclosed by others
f) Other circumstances stipulated by laws and administrative regulations
Please note that, according to the law, information that has been anonymized is not
considered personal information, cannot identify a specific natural person, and cannot be restored. We will
not need to notify you and obtain your consent for the processing of such information.
2. How we use cookies and similar technologies
2.1 Use of Cookies
To provide you with a smoother access experience, when you use our products or services, we collect and store
relevant data from your visits using various technologies. This allows us to recognize your identity when you
access or revisit our services and analyze data to offer you better and more services. This includes using small
data files to identify you, which helps us understand your usage habits, save you from repeatedly entering
account information, or help determine the security of your account. These data files may be Cookies, Flash
Cookies, or other local storage provided by your browser or associated applications (collectively referred to as
"Cookies").
Please understand that some of our services can only be realized through the use of cookies. If your browser or
browser add-ons allow, you can modify your acceptance level of Cookies or refuse Cookies, but refusing Cookies
may prevent you from using some features of the services that rely on them.
ETag (Entity Tag) is an HTTP protocol header transmitted between internet browsers and internet servers, which
can replace Cookies. ETag can help us avoid unnecessary server loads, improve service efficiency, and save
resources and energy. At the same time, we may use ETag to record your identity so that we can better understand
and improve our products or services. Most browsers provide users with the functionality to clear browser cache
data, which you can perform in the browser settings. However, please note that disabling ETag may prevent you
from enjoying an optimal product or service experience.
Web pages often contain electronic images known as "single-pixel GIF files" or "web beacons," which can help
websites calculate the number of users browsing the page or accessing certain Cookies.
We collect information about your web browsing activities through web beacons, such as the
page address you visit, the address of the referring page you visited earlier, the time you stay on the page,
your browsing environment, and display settings, to provide you with a better service experience. The
aforementioned bolded information is considered your sensitive personal information. If you refuse us to
collect and use the aforementioned information, you can refuse or manage Cookies or similar technologies
through your browser or user selection mechanisms.
2.2 Use of SDKs
To ensure the stable operation and functionality of our client, enabling you to use and enjoy more services and
features, our applications may include SDKs or other similar application programs from authorized partners. We
will fulfill our due diligence to conduct strict security monitoring of the software development kits (SDKs)
obtained by our partners to protect data security.
The third-party SDKs we integrate mainly serve the needs of you and other users. Therefore, when meeting new
service demands and business function changes, we may adjust the third-party SDKs we integrate. We will promptly
disclose to you the latest situation regarding the integration of third-party SDKs. For details of the currently
integrated third-party SDKs, please refer to the
Personal
Information Sharing and SDK List.
3. How we entrust processing, disclose to external parties, transfer, and publicly disclose your personal information
3.1 Entrusted for processing
In the aforementioned functionalities/services, certain specific features or services may be provided to you by service providers we entrust for customer support. We will only entrust the necessary personal information for the provision of these features/services to the service providers for the sole purpose of supporting you. For example, we may entrust authorized partners for advertising and analytics services to handle information related to ad coverage and effectiveness, but we will not share your personally identifiable information with advertising or analytics partners without your permission, or we will anonymize this information so that the authorized partners cannot directly recognize you. Such partners may combine the above information with other data they legally obtain to perform the advertising services or decision-making recommendations we entrust.
For service providers we entrust with personal information processing. We will sign strict confidentiality agreements and entrustment processing agreements with them, requiring them to process personal information according to our requirements, this policy, and any other relevant confidentiality and security measures. When the entrustment processing agreement is not effective, invalid, revoked, or terminated, we will require them to return or delete your personal information.
3.2 Disclosure to external parties
We do not share your personal information with other companies, organizations, or individuals, except in the
following cases:
a. Sharing with your consent: After obtaining your explicit consent, we will share your personal information
with other parties.
b. Sharing under legal circumstances: We may share your personal information with others according to legal
regulations, the need for litigation dispute resolution, or as required by administrative or judicial
authorities according to the law.
c. Sharing under your voluntary choice:
1)Sharing with third-party authorized partners or collaborators
To provide you with the services you need, we may share necessary personal information with third-party authorized partners or service providers, such as service providers for website hosting, data analysis and storage, instant messaging, customer service, email delivery, auditing, marketing, and other similar services. Without your consent, the parties with whom we share this information are not allowed to use the shared personal data for any other purposes. For companies, organizations, and individuals with whom we share personal data, we will sign strict data processing agreements with them, requiring them to process personal data according to our instructions, this policy, and any other relevant confidentiality and security measures, and we will ensure that the data security capabilities and information security qualifications of our partners meet the requirements of relevant laws and regulations.
2)Sharing with affiliated companies
To facilitate us to jointly provide you with services based on personal information, we may share necessary personal information with affiliated companies. Please be aware that we will only share necessary personal information (for example, to facilitate the use of your account to use our affiliated companies' products or services, we will share necessary account information with affiliated companies), and if we share your personal sensitive information or if the affiliated company changes the purpose of use and processing of personal information, we will seek your authorization and consent again.
3.3 Transfer
We will not transfer your personal information to any company, organization or individual, except in the
following cases:
a. Transfer with explicit consent: We will transfer your personal information to other parties after obtaining
your explicit consent.
b. In the event of a merger, acquisition, or bankruptcy liquidation of ours, or in other cases involving merger,
acquisition, or bankruptcy liquidation, if it involves the transfer of personal information, we will require the
new company or organization holding your personal information to continue to be bound by this policy; otherwise,
we will require that company or organization to seek your authorization and consent again.
3.4 Public disclosure
We will only publicly disclose your personal information in the following cases:
a. With your explicit consent or based on your voluntary choice, we may publicly disclose your personal
information;
b. If we determine that you have violated laws and regulations or seriously violated the relevant agreement
rules with us, or to protect the personal and property safety of users or the public from infringement, we may
disclose your personal information, including related violations and measures taken against you, with your
consent according to laws and regulations or relevant agreement rules.
4. How we protect your rights
4.1 Access to personal information
You may request access to the personal information you have provided by sending an e-mail to privacy@mychery.com..
4.2 Correction and supplement of personal information
If you find that the personal information we have collected or stored is inaccurate or incomplete, and you need to update your personal information, you have the right to make corrections or supplements. You may correct or supplement your personal information by sending an e-mail to privacy@mychery.com with your request for correction or supplement.
4.3 Copying Personal Information
You may make your request by sending an email to privacy@mychery.com , and we will send a copy of your personal information to the email address you specify.
4.4 Withdrawal of Consent
You may withdraw your authorization for us to access your personal information by sending an email to privacy@mychery.com. To withdraw authorization for us to access your personal information. When you withdraw your consent or authorization, it may result in us being unable to continue to provide you with the services to which the withdrawn authorization relates. However, your withdrawal of consent or authorization does not affect the processing of personal information that we carried out on the basis of your consent prior to the withdrawal.
4.5 Deletion of personal information
You may request us to delete your personal information in the following cases:
a. If we process personal information in violation of laws or administrative regulations or in violation of an
agreement;
b. If the purpose of the processing has been achieved, cannot be achieved, or is no longer necessary to achieve
the purpose of the processing;
c. If we stop providing products or services or if the retention period has expired;
d. If you withdraw your consent;
e.In other cases stipulated by laws and administrative regulations.
You can make your request for deletion by sending an email to privacy@mychery.com. If we decide to respond to your request for deletion, we will also simultaneously notify the third parties from whom we obtained your personal information and ask them to delete it in a timely manner, unless otherwise stipulated by laws and regulations, or if these third parties are independently authorized by you. When you delete information from our products and/or services, we may not immediately delete the corresponding information in our backup system, but we will stop processing it other than storing it and taking the necessary security measures, and we will delete it when the backup is updated or when the retention period stipulated by laws and administrative regulations expires.
If we cease to operate our products or services, we will promptly cease activities that continue to collect your personal information, notify you of the cessation of operation by means of an announcement 30 days in advance, and delete or anonymize your personal information held in accordance with applicable laws.
4.6 Account cancellation
You can request to cancel your account by sending an email to privacy@mychery.com. Unless otherwise provided by laws and regulations, we will stop providing services to you after account cancellation and delete your personal information at your request. In the event that the retention period stipulated by laws and administrative regulations has not expired, or that deletion of personal information is technically difficult to achieve, we will stop processing other than storing and taking the necessary security measures.
4.7 Explanation of personal information processing rules
You can request an explanation of this privacy statement by sending an e-mail to privacy@mychery.com.
4.8 Rights of the deceased
If you pass away, your close relatives may exercise the rights to inspect, copy, correct, and delete your personal information as stipulated by law for their legitimate and proper interests by sending an email to privacy@mychery.com, unless you have made other arrangements.
4.9 Right to request personal information transfer
You have the right to request the transfer of your personal information to a personal information processor you designate. If you need to transfer your personal information, you can contact us by sending an email to privacy@mychery.comProvided that it complies with the conditions stipulated by the national cyberspace administration and is technically feasible, we will transfer your personal information to the personal information processor you designate according to your request.
4.10 Responding to your request
If you or possibly your guardian, close relatives and other entitled subjects are unable to exercise their rights to personal information in the manner described above, you may contact us by sending an email to privacy@mychery.com. We may need to verify your identity and respond to your request within 15 business days of verifying your identity, and for your request to delete sensitive personal information, we will respond to your request within 10 business days.
For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. We may refuse requests that are unnecessarily repetitive, require excessive technical means (for example, the development of a new system or a fundamental change in existing practices), pose a risk to the legal rights of others, or are highly impractical (for example, involving the backing up of information stored on magnetic tapes).
We will not be able to respond to your request in the following circumstances:
a. Related to our fulfillment of obligations stipulated by laws and regulations;
b. Directly related to national security or defense security;
c. Directly related to public safety, public health, or significant public interests;
d. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
e. We have sufficient evidence that you are malicious or abusing rights;
f. To protect your or another person's life, property, or other significant legitimate interests, but it is
difficult to obtain consent;
g. Responding to your request will cause serious damage to the legitimate interests of you or another person or
organization;
h. Involving trade secrets.
5. How we protect your personal information
5.1 Technical and organizational measures to protect personal information
1)Technical security measures
To ensure the security of your information, we have implemented security measures that comply with industry standards and are reasonable and feasible to protect your information from unauthorized access, public disclosure, use, modification, damage, or loss. For example, data exchanged between your client and our server is protected by encryption under the TLS protocol; we also provide secure browsing methods through HTTPS protocol on our website; we use encryption technology to enhance the security of personal information; we employ trusted protection mechanisms to prevent malicious attacks on personal information; we deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we conduct security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.
2)Security system certifications
We have an industry-advanced data security management system centered around the data lifecycle, which enhances the security of the entire system from multiple dimensions including organizational construction, system design, personnel management, and product technology. Currently, our key information systems have passed ISO27001 and the third-level evaluation certification of network security protection.
3)Personnel security management
We also strictly manage employees or outsourced personnel who may come into contact with your information, including but not limited to different access controls based on their positions, signing confidentiality agreements with them, and monitoring their operational activities. We will provide corresponding security measures to protect your information according to existing technology, provide reasonable security protection, and strive to prevent your information from being leaked, destroyed, or lost. We will conduct security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.
We will take various preventive measures to protect your personal information to ensure it is safeguarded against loss, theft, misuse, unauthorized access, disclosure, alteration, or destruction. To ensure the security of your personal information, we have strict information security regulations and procedures, and a dedicated information security team strictly implements the above measures within the company.
5.2 Potential security risks in providing personal information
The Internet environment is not one hundred percent safe. Although we have these security measures, please note that there is no such thing as "perfect security measures" on the Internet, and we will do our best to ensure the security of your information.
5.3 Notification of personal information security incidents
In the event of a personal information security incident, we will notify you in accordance with the requirements of laws and regulations: the basic situation and potential impact of the security incident, the measures we have taken or will take, suggestions for you to independently guard against and reduce risks, and remedial measures for you, etc. We will inform you of the relevant situation of the incident by email, letter, telephone, push notification, and other means, and if it is difficult to inform each individual subject of personal information, we will take reasonable and effective ways to publish announcements. At the same time, we will also report the handling of personal information security incidents to the regulatory department as required.
6. How your personal information is stored
6.1 Storage location
We store the personal information collected and generated during the operation of our services within the territory of the People's Republic of China on servers and public clouds within the territory of the People's Republic of China. Currently, we do not transfer the above information overseas. 目前,我们不会将上述信息传输至境外。
Under the following circumstances, we will provide your personal information to overseas entities after
fulfilling the obligations stipulated by law:
a. There are clear provisions in the applicable laws;
b. Obtain your explicit authorization; or
c. You engage in cross-border transactions and other personal active behaviors through the Internet.
6.2 Storage duration
We will take reasonable and feasible measures to store your personal information and strive to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy and the period required by applicable laws and regulations. For example, we will retain relevant network logs for no less than six months in accordance with the requirements of the Cybersecurity Law of the People's Republic of China for your use of application services. The criteria for determining the aforementioned period include:
a. Completing the service purpose related to you, maintaining corresponding service and business records, and
responding to your possible inquiries or complaints;
b. Ensuring the security and quality of the services we provide to you;
c. Whether you agree to a longer retention period;
d. Whether there are other special agreements on the retention period.
After your personal information exceeds the retention period, we will delete your personal information or
anonymize it according to the requirements of applicable laws.
7. How we protect the personal information of minors
In the services we provide, we presume that you have the corresponding capacity for civil conduct.
Our products and services are only for adults, and we do not provide products and services to minors. We do not
allow minors to register accounts or use our products and services, and we will not actively and intentionally
collect any information of minors.
If at any time a guardian has reason to believe that we have collected a child's personal information, please
contact us through the contact information provided in this policy, and we will take measures to delete the
relevant information as soon as possible.
8. How this policy is updated
Our privacy policy may be updated from time to time. We will not restrict your rights under this policy without your explicit consent. We will announce any changes made to this policy.
For significant changes, we will also provide more noticeable notifications (including notifications through
in-app announcements or pop-up alerts).
The significant changes referred to in this policy include, but are not limited to:
a. Major changes in our service model, such as the purposes of processing user personal information, types of
personal information processed, and methods of processing user personal information (for such changes, we will
also obtain your consent);
b. Major changes in our control and organizational structure, such as changes in ownership due to business
adjustments, bankruptcy, mergers, and acquisitions;
c. Major changes in the main entities with whom we share, transfer, or publicly disclose user personal
information (for such changes, we will also obtain your consent);
d. Changes in our department responsible for the security of user personal information, contact methods, and
complaint channels;
e. High-risk findings indicated in the user personal information security impact assessment report.
9. How to contact us
If you have any questions, comments, or suggestions about our privacy policy or the handling of your personal information, you can reach out to us by mail or email. Our contact information is as follows:
Wuhu Chery Information Technology Co., Ltd.
Address: No. 8 Changchun Road, Economic and Technological Development Zone, Wuhu City, Anhui Province, China
Email: privacy@mychery.com
In general, we will respond within 15 working days after verifying your identity and receiving your
inquiry.
If you are not satisfied with our response, particularly if you believe that our handling of your personal
information has harmed your legitimate rights, you may lodge a complaint or report to regulatory authorities
such as the Cyberspace Administration, telecommunications, public security, or industry and commerce
departments. You may also file a lawsuit in a court with jurisdiction to seek resolution.
Appendix: relevant definitions
1) Personal Information: Refers to various types of information recorded electronically or otherwise, related to
an identified or identifiable natural person, excluding anonymized information.
2) Sensitive Personal Information: Sensitive personal information is personal data that, if leaked or misused,
can easily lead to infringement on a natural person’s dignity or endanger personal or property safety. This
includes information such as biometric data, religious beliefs, specific identities, medical health, financial
accounts, and location tracking, as well as information about minors under the age of 14 (specific sensitive
personal information is highlighted in bold within this policy).
3) Child: A minor under the age of 14.
4) Personal Information Deletion: Refers to the act of removing personal information from systems involved in
daily business functions, rendering the information unretrievable and inaccessible.
5) Anonymization: Refers to the process by which personal information is processed so that it can no longer be
used to identify a specific individual and cannot be restored.