PicCollage Privacy Policy
PicCollage Privacy Policy

PicCollage Privacy Policy

This privacy policy will help you understand

(1) PicCollage is a tool APP developed by Liaoning Qisi Technology Co., Ltd. In order to realize core functions such as PicCollage downloading, PicCollage usage, PicCollage sharing and other functions, we will collect some of your necessary information;
(2) When you publish information, interact, register and authenticate, or use services based on geographical location, based on legal requirements or necessary to implement functions, we may collect your name, ID number, contact information, address book, audio and video Personal information such as files, geographical location, etc. You have the right to refuse to provide us with this information, or to withdraw your authorization and consent to this information. Please understand that refusing or withdrawing authorization consent will cause you to be unable to use relevant specific functions, but it will not affect your use of other functions of “PicCollage”;
(3) We will store your personal information collected and generated during domestic operations within the territory of the People’s Republic of China, and will not transfer the above information overseas. We will only retain your personal information for the period necessary for the purpose of providing the “PicCollage” software and related services;
(4) We will not share, provide, transfer or obtain your personal information from third parties without your consent;
(5) We will strive to take reasonable security measures to protect your personal information. In particular, we will use common industry methods and use our best commercial efforts to protect the security of your personal sensitive information;
(6) How you access, correct, delete personal information and withdraw consent, as well as how to cancel your account and make complaints and reports.

If you do not expressly agree to this privacy policy and start using it, we will only collect the information necessary to maintain the use of the PicCollage, which will cause us to be unable to provide you with complete products and services, but we will also use measures such as de-identification and encryption. to protect this information. If you do not agree with this privacy policy, we will not be able to provide you with complete products and services, and you can also choose to stop using it. When you choose to continue or use again, based on the necessity to provide products and services, it will be deemed that you accept and acknowledge that we process your relevant information in accordance with this policy. We attach great importance to the protection of users’ personal information and will treat this information with diligence and prudence. When you download, install, open, browse, register, log in, and use (hereinafter collectively referred to as “use”) the “PicCollage” software and related services, we will collect, save, use, share, disclose and protect you in accordance with this “Privacy Policy” your personal information. We hope to introduce to you how we handle your personal information through this Privacy Policy, so we recommend that you read all the terms of this Privacy Policy carefully and completely. Among them, the content related to your information and rights will be highlighted in bold to remind you to pay attention. Please read it carefully. This privacy policy is designed to help you understand the following: 1. How we collect and use personal information 2. Our use of cookies and similar technologies 3. How we store personal information 4. How we share, transfer and publicly disclose personal information 5 , How we protect the security of personal information 6. Your rights 7. Terms of use for minors 8. Privacy policy revisions and notices 9. Scope of application 10. Others
1. How we collect and use personal information
When you use the “PicCollage” software and services, we will collect information based on the principles of legality, legitimacy and necessity. The information we collect or ask you to provide will be used to: 1. Ensure the normal operation of the product; 2. Implement various functions and services; 3. Optimize and improve products and services; 4. Ensure the safety of products, services and users; 5. Comply with laws, regulations and national standards.
When you use our APP services, we will apply for the following necessary mobile phone sensitive information from you
·Mobile phone MAC address. The MAC address is only used for login verification, various service authentication and statistical click behavior. When the user uses the APP, we will obtain the MAC address information when necessary. The scope of acquisition is during network operations. , the MAC address information will be obtained.
When you use our APP services, we will apply to you for the following necessary mobile APP client permissions to obtain corresponding services.
·android.permission.INTERNET permission, network access permission is necessary, we will use the network to download the corresponding application data, setting information and perform network operations such as user registration and login;
·android.permission.READ_PHONE_STATE permission, it is necessary to obtain device identifier permission. We will use WeChat login SDK for third-party login, and Umeng+SDK to collect user statistics;
·android.permission.ACCESS_NETWORK_STATE, check the network connection. When using the APP, the network is necessary. During the use of the service, we will check whether the user client has a network connection to remind the user to make the necessary network connection. Get our services. For example, when obtaining services such as PicCollage download, user registration and login;
·android.permission.ACCESS_WIFI_STATE, check the WLAN status. When the APP is downloading a large amount of data, we will judge the APP network connection status to remind the user whether the network is free to save user traffic. For example, when downloading PicCollages and other services;
·android.permission.WRITE_EXTERNAL_STORAGE, read, modify or delete the contents of the memory card. When users use our services and store large amounts of data, storage space is inevitably needed. We use this permission to read the data of the APP client. Remove, modify or delete to save user’s mobile phone space. For example, when performing services such as PicCollage storage, video file storage, emoticon file storage, etc.

(1) Processing of changes in the purpose of collecting and using personal information Please understand that with the development of our business, there may be adjustments and changes to the functions and services provided by “PicCollage”. When new features or services are related to PicCollage download usage scenarios, the personal information collected and used is directly or reasonably related to the original purpose. In situations that are not directly or reasonably related to the original purpose, we will notify you again and obtain your consent when we collect and use your personal information.
(2) Personal information that is exempted from the collection and use of consent in accordance with the law. Please understand that in the following situations, in accordance with laws, regulations and relevant national standards, we do not need to obtain your authorization to collect and use your personal information: (1) Directly related to national security and national defense security; (2) Directly related to public security, public health, major public interests; (3) Directly related to criminal investigation, prosecution, trial and judgment execution; (4) For reasons of Protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the individual; (5) Your personal information collected is disclosed to the public by you on your own; (6) From legal public disclosure Your personal information collected from the information, such as legal news reports, government information disclosure and other channels; (7) Necessary to sign or perform a contract according to your request; (8) Used to maintain “PicCollage” software and related Necessary for the safe and stable operation of the service, such as discovering and handling faults in “PicCollage” software and related services; (9) Necessary for legitimate news reporting; (10) Academic research institutions carrying out statistical or academic research based on public interests When it is necessary and the results of academic research or description are provided to the outside world, the personal information contained in the results will be de-identified; (11) Other situations stipulated by laws and regulations.
In particular, you are reminded that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or we When data that cannot be linked to any specific personal information is used in combination with other personal information of yours, during the combined use period, the information will be treated and protected as your personal information in accordance with this Privacy Policy.
2. Use of cookies and similar technologies
Cookies and similar technologies are commonly used technologies on the Internet. When you use the “PicCollage” software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We use cookies and similar technologies mainly to achieve the following functions or services:
(1) To ensure the safe and efficient operation of products and services. We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you log in to the service safely or whether you have encountered illegal activities such as theft or fraud. These technologies will also help us improve service efficiency and improve login and response speeds.
(2) Help you obtain an easier access experience. Using such technology can help you avoid repeating the steps and processes of filling in personal information and entering search content (for example: implementing a one-click login process and recording search history).
3. How we store personal information
(1) Location of information storage We will store your personal information collected and generated during domestic operations in the territory of the People’s Republic of China in accordance with the provisions of laws and regulations. At present, we will not transfer the above information overseas. If we transfer it overseas, we will follow relevant national regulations and seek your consent.
(2) Storage period We only retain your personal information for the period necessary for the purpose of providing “PicCollages” and services, for example, the audio and video information you posted. During the period when you have not withdrawn, deleted or canceled your account, We will retain relevant information. After the necessary period has passed, we will delete or anonymize your personal information, unless otherwise provided by laws and regulations.
4. How we share, transfer and publicly disclose personal information
(1) Sharing and transfer of personal information We will not share or transfer your personal information to third parties unless you obtain your prior authorization and consent, or the personal information shared or transferred is de-identified information, and the shared third party The third party cannot re-identify the natural person subject of such information.
1. Prudent evaluation and liability restrictions for third parties who share personal information (1) With your consent, we will only share with third parties the information necessary to achieve the purpose. If a third party really needs to use personal information beyond the scope of the aforementioned authorization due to business needs, the third party will need to seek your consent again. (2) For third parties with whom we share your personal information, these third parties will sign confidentiality agreements with us. At the same time, we will evaluate its data security capabilities and environment and require third parties to handle such information with confidentiality and security measures no less than those required by this Privacy Policy.
2. Transfer of personal information during acquisitions, mergers, and reorganizations As our business continues to develop, we may conduct mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. When the aforementioned changes occur, we will continue to protect your personal information in accordance with laws and regulations and security standards no lower than those required by this Privacy Policy or require the successor of personal information to continue to protect your personal information. Otherwise, we will require the successor to re-obtain your personal information. Your authorization and consent.
(2) Public disclosure of personal information. Except when we disclose necessary information about relevant accounts when announcing penalties for illegal accounts or fraudulent activities, we will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. . When we publicly disclose your personal information, we will adopt security protection measures that comply with industry standards.
(3) Personal information that is exempted from consent to sharing, transfer, and public disclosure in accordance with the law. Please understand that in the following situations, in accordance with laws, regulations and national standards, we do not need to obtain your authorization to share, transfer, or publicly disclose your personal information. Agree that (1) directly related to national security and national defense security; (2) directly related to public security, public health, major public interests; (3) directly related to criminal investigation, prosecution, trial and judgment execution, etc.; ( 4) To protect your or other individuals’ major legitimate rights and interests such as life and property but it is difficult to obtain your consent; (5) Personal information that you disclose to the public on your own; (6) From legally publicly disclosed information Collect personal information, such as legal news reports, government information disclosure and other channels.
5. How we protect the security of personal information
(1) We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used inappropriately or without authorization. Accessed, publicly disclosed, used, modified, damaged, lost or disclosed. (2) We will use reasonable and feasible means such as encryption technology and anonymization that are no lower than those of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked. (3) We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology in a timely manner. (4) Although the above reasonable and effective measures have been taken and the standards required by relevant laws have been complied with, please consider the limitations of technology and the various malicious means that may exist in the Internet industry. Although we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. We will try our best to ensure the security of the personal information you provide to us. You know and understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing your passwords regularly, and not disclosing your account password and other personal information to others. (5) We will formulate an emergency response plan and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (leakage, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can independently Suggestions on preventing and reducing risks, remedial measures for you, etc. We will inform you of the relevant information in a timely manner through emails, letters, text messages, etc. When it is difficult to inform you one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities. (6) We would like to remind you that the personal information protection measures provided in this privacy policy only apply to the “PicCollage” software and related services. Once you leave “PicCollage” and related services and browse or use other websites, services and content resources, we have no ability or obligation to protect any personal information you submit in software or websites other than “PicCollage” software and related services, regardless of You log in, browse or use the above software and websites

发表回复

您的电子邮箱地址不会被公开。 必填项已用*标注