Privacy Policy for "Picwiz - One-Click Image editor" App
This Privacy Policy will help you understand:
(1) To ensure the normal operation of the product, provide core functions such as ai image generation and download and other functions, we will collect some of your necessary information;
(2) When you use services related to image generation and download, we may collect personally sensitive information such as camera and photo album based on legal requirements or the necessity of function implementation. You have the right to refuse to provide us with such information or withdraw your consent for the authorization of such information. Please note that refusing or withdrawing the authorization consent for the above-mentioned personally sensitive information will prevent you from using the relevant specific functions, but will not affect your use of other functions of "Picwiz";
(3) We will store your personal information collected and generated during our domestic operations within the territory of the People's Republic of China, and will not transmit the above-mentioned information overseas. We will only retain your personal information for the period necessary to provide the software and related services of "Picwiz";
(4) We will not share, provide, transfer your personal information to third parties or obtain your personal information from third parties, unless with your consent;
(5) We will strive to take reasonable security measures to protect your personal information. In particular, we will adopt industry-common methods and make our best commercial efforts to protect the security of your personally sensitive information;
(6) The methods for you to access, correct, delete personal information and withdraw consent authorization, as well as the methods for canceling your account and making complaints and reports.
If you do not agree to this Privacy Policy but still start using the product, we will only collect the information necessary to maintain the basic functions of "Picwiz". This will prevent us from providing you with complete products and services, but we will still adopt measures such as de-identification and encryption to protect this information.
We attach great importance to the protection of users' personal information and will treat such information with due diligence and prudence. When you download, install, launch, browse, register, log in to and use (hereinafter collectively referred to as "use") the software and related services of "Picwiz", we will collect, store, use, share, disclose and protect your personal information in accordance with this Privacy Policy. We hope to inform you of our methods of processing your personal information through this Privacy Policy, so we recommend that you carefully and completely read all clauses of this Privacy Policy. Among them, the contents related to your information and rights will be highlighted in bold to draw your attention, and we ask you to focus on reading these parts.
This Privacy Policy is intended to help you understand the following contents: I. How We Collect and Use Personal Information II. Our Use of Cookies and Similar Technologies III. How We Store Personal Information IV. How We Share, Transfer and Publicly Disclose Personal Information V. Third-Party SDKs VI. How We Protect the Security of Personal Information VII. Your Rights VIII. Terms for Minors IX. Revision and Notification of the Privacy Policy X. Scope of Application
I. How We Collect and Use Personal Information
In the course of your use of the software and services of "Picwiz", we will collect information in accordance with the principles of legality, legitimacy and necessity. The information we collect or ask you to provide will be used for: 1. Ensuring the normal operation of the basic functions of the product; 2. Implementing various functions and services; 3. Optimizing and improving products and services; 4. Ensuring the security of products, services and users' use; 5. Complying with the provisions of laws, regulations and national standards.
(I) Personal Information We Actively Collect and Use
We will collect the information you actively provide when using the services and the information generated during your use of functions or acceptance of services in the following ways: 1. Ensuring the normal operation of the software and related services of "Picwiz" 2. When you use "Picwiz" and its related services, to ensure the normal operation of the software and services, we will collect your hardware model, operating system version number, International Mobile Equipment Identity (IMEI), network device hardware address (MAC), IP address, software version number, network access method and type, operation logs and other information. Please note that this information is the basic information we must collect to provide services and ensure the normal operation of the product.Providing you with functions such as image download Image download is one of the core functions of "Picwiz". To realize this function, we will request you to authorize sensitive permissions for the camera and photo album. If you refuse to authorize the necessary permissions for certain services, you will not be able to use the relevant functions, but it will not affect your normal use of other functions of "Picwiz". Please note that we have carried out de-identification/anonymization processing when collecting and using the above-mentioned information, and data analysis only corresponds to specific codes that cannot be directly associated with the user's identity. 4. Ensuring the security of products, services and users' use To help us better understand the operation of "Picwiz" and its related services and ensure the security of operation and service provision, we may record network log information, as well as information such as the frequency of using the software and related services, crash data, overall installation and usage status, and performance data.
(II) Handling of Changes in the Purpose of Collecting and Using Personal Information
Please note that with the development of our business, the functions and services provided by "Picwiz" may be adjusted and changed. In scenarios that have no direct or reasonable connection with the original purpose, if we collect and use your personal information, we will inform you again and obtain your consent.
(III) Personal Information Collected and Used Without Needing to Obtain Consent in Accordance with the Law
Please understand that in the following circumstances, in accordance with laws, regulations and/or relevant national standards, we may collect and use your personal information without obtaining your authorization and consent: (1) Information directly related to national security and national defense security; (2) Information directly related to public security, public health and major public interests; (3) Information directly related to criminal investigation, prosecution, trial and execution of judgments; (4) Information collected for the purpose of protecting the life, property and other major legitimate rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the consent of the person concerned; (5) Personal information that you have disclosed to the public by yourself; (6) Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels; (7) Information necessary for signing and performing contracts at your request; (8) Information necessary for maintaining the safe and stable operation of the software and related services of "Picwiz", such as detecting and handling faults of the software and related services of "Picwiz"; (9) Other circumstances stipulated by laws and regulations. It is particularly important for you to note that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or when we use data that cannot be associated with any specific personal information in combination with other your personal information, such information will be treated and protected as your personal information in accordance with this Privacy Policy during the period of combined use.
II.Our Use of Cookies and Similar Technologies
We will never collect the cookies information
III. How We Store Personal Informatio
(I) Location of Information Storage
In accordance with the provisions of laws and regulations, we will store your personal information collected and generated during our domestic operations within the territory of the People's Republic of China. At present, we will not transmit the above-mentioned information overseas; if we need to transmit it overseas, we will comply with the provisions of laws and regulations and seek your explicit consent.
(II) Storage Period
We will only retain your personal information for the period necessary to provide "Picwiz" and its services. For example, your account information will be retained by us during the period when you have not withdrawn, deleted or canceled your account. After the expiration of the necessary period, we will delete your personal information or conduct anonymization processing on it, unless otherwise stipulated by laws and regulations.
IV. How We Share, Transfer and Publicly Disclose Personal Information
(I) Sharing, Transfer of Personal Information and Collection by Third Parties
We will not share or transfer your personal information to third parties, unless with your prior authorization and consent, or the shared or transferred personal information is anonymized information, and third parties cannot re-identify the natural person subject based on such information. 1. Sharing with Affiliates to Realize Relevant Functions or Services When you use the content synchronization function provided by the related services of "Picwiz" and its affiliates, the services you receive among the products provided by us and our affiliates are consistent. To facilitate the unified management of your information, with your explicit consent, we may share your personal information with these affiliates. When you choose to log in through the authorization of a specific third-party account and use the relevant functions provided by the third party, the function provider will, in accordance with its user agreement and privacy policy and with your consent, collect and process the personal information necessary to realize these functions, including but not limited to: (1) When you use the wallet payment function service provided by the cooperation between a third-party service provider and a third-party payment company, the third-party payment company needs to collect your name, bank card type and number, validity period, mobile phone number and other information. The above-mentioned information belongs to personally sensitive information; refusing to provide such information will only prevent you from using this function, but will not affect your normal use of other functions. 2. Sharing with Business Partners to Realize Specific Functions 3. When a software service provider, smart device provider or system service provider jointly provides services for you with us, we will share the data necessary for realizing the functions with the third party.Prudent Evaluation of Third Parties with Whom Personal Information is Shared and Restriction of Their Liabilities (1) With your consent, we will only share the necessary information with third parties to achieve the purpose. If a third party really needs to use personal information beyond the scope of the aforementioned authorization due to business needs, the third party shall seek your independent consent again. 4. (2) For third parties with whom we share your personal information, such third parties will sign a confidentiality agreement with us. At the same time, we will evaluate their data security capabilities and environment and require third parties to process such information with confidentiality and security measures not lower than those required by this Privacy Policy.Transfer of Personal Information in Case of Acquisition, Merger and Restructuring With the continuous development of our business, we may conduct mergers, acquisitions and asset transfers, and your personal information may be transferred accordingly. In the event of the aforementioned changes, we will continue to protect your personal information in accordance with laws and regulations and security standards not lower than those required by this Privacy Policy, or require the successor of the personal information to continue to protect your personal information; otherwise, we will require the successor to obtain your authorization and consent again.
(II) Public Disclosure of Personal Information
Except for announcing the necessary information of relevant accounts when imposing penalties on violating accounts and fraudulent acts, we will not publicly disclose your information, unless in accordance with the provisions of national laws and regulations or with your independent consent. When publicly disclosing your personal information, we will adopt security protection measures that meet industry standards.
(III) Personal Information Shared, Transferred and Publicly Disclosed Without Needing to Obtain Consent in Accordance with the Law
Please understand that in the following circumstances, in accordance with laws, regulations and/or relevant national standards, we may share, transfer and publicly disclose your personal information without obtaining your authorization and consent: (1) Information directly related to national security and national defense security; (2) Information directly related to public security, public health and major public interests; (3) Information directly related to criminal investigation, prosecution, trial and execution of judgments; (4) Information used for protecting the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain your consent; (5) Personal information that you have disclosed to the public by yourself; (6) Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
V. Third-Party SDKs
To provide complete services, we use third-party SDKs.
(I) Alibaba OSS
● Company: Alibaba Cloud Computing Co., Ltd. ● Usage Scenario: Triggered after the user completes the image operation. ● Purpose of Use: Cloud storage and protection of data. ● Personal Information Fields Collected by the SDK: Device model, operating system version, device settings, MAC address, IMEI, IDFA, OAID, other device identifier hardware and software feature information, and device location-related information (including IP address, GPS location, and Wi-Fi access points, Bluetooth and base station information that can provide relevant information). ● Sharing Method: Collected by the SDK. ● Rules for Processing Personal Information by the SDK: http://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud201902141711_54837.html?spm=5176.19600209.J_9220772140.78.294112easpBlFa
(II) Alibaba Cloud Number Authentication Service SDK
● Company: Alibaba Cloud Computing Co., Ltd. ● Usage Scenario: When the user uses the one-click login function with a mobile phone number. ● Purpose of Use: Providing one-click login, number verification and security verification services for APP users. ● Personal Information Fields Collected by the SDK: To realize the gateway number retrieval technology, the Alibaba Cloud Number Authentication SDK needs to obtain the local phone number, device identifiers (including IDFV and OAID), device hardware information (including device model and device hardware manufacturer), operating system information (including operating system version), network information (including network type, operator name, network IP address, network status and network standard), SIM card information (including SIM card status and subId), and application information (including BundleId, package name and package signature). ● Sharing Method: Collected by the SDK and transmitted through de-identification, encrypted transmission and other security methods. ● Rules for Processing Personal Information by the SDK: http://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud201902141711_54837.html?spm=5176.19600209.J_9220772140.78.294112easpBlFa
\VI. How We Protect the Security of Personal Information
(I) We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management measures) to protect your personal information and prevent the personal information you provide from being misused or accessed, publicly disclosed, used, modified, damaged, lost or leaked without authorization. (II) We will use encryption technologies, anonymization processing and other reasonable and feasible means not lower than those of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked. (III) We will establish a special security department, security management system and data security process to ensure the security of your personal information. We adopt strict data use and access systems to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technologies in a timely manner. (IV) Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant legal provisions have been complied with, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always ensure 100% security of information. We will do our best to ensure the security of the personal information you provide to us. You acknowledge and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and other personal information to others. (V) We will formulate emergency response plans and immediately activate the emergency response plans when a user information security incident occurs to strive to prevent the impact and consequences of such security incident from expanding. Once a user information security incident (such as leakage and loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation of the security incident and its possible impact, the disposal measures we have taken or will take, the suggestions for you to independently prevent and reduce risks, and the remedial measures for you. We will promptly inform you of the relevant situation of the incident in the form of push notifications, emails, letters, text messages, etc.; if it is difficult to inform you one by one, we will issue an announcement in a reasonable and effective way. At the same time, we will also report the disposal of the user information security incident to the relevant regulatory authorities in accordance with their requirements. (VI) We hereby specially remind you that the personal information protection measures provided in this Privacy Policy only apply to the software and related services of "Picwiz". Once you leave "Picwiz" and its related services and browse or use other websites, services and content resources, we will have no ability or obligation to protect any personal information you submit on software and websites other than the software and related services of "Picwiz", regardless of whether you log in to, browse or use the above-mentioned software and websites through links or guidance of "Picwiz".
VII. Your Rights
We attach great importance to your management of personal information and do our best to protect your rights to access, modify (update or correct), delete your personal information and withdraw authorization consent, so that you have sufficient ability to protect your privacy and security.
How can you contact us?
If you have any questions, comments, or concerns about our Privacy Policy or our data practices, please contact us at huakehuake@gmail.com. We will respond to your inquiry as soon as possible.
