Privacy Policy
The Privacy Policy respects and protects the personal privacy rights of all users who use the Privacy Policy Web Services. In order to provide you with more accurate and personalized services, our Privacy Policy covers how we collect, use, disclose, transfer and store your information. However, this privacy policy will treat this information with a high degree of diligence and prudence. Privacy Policy This Privacy Policy will be updated from time to time. When you agree to the Privacy Policy Network Service Use Agreement, you are deemed to have agreed to the entire content of this Privacy Policy. This Privacy Policy is an integral part of the Privacy Policy Web Service Use Agreement. You are not required to provide the personal information we request, but in many cases, if you choose not to, we will not be able to provide you with our products or services or respond to any questions you may have.
1. How we collect information
We only collect the information necessary to realize the function of the product according to the principles of legality, legitimacy and necessity. The main sources of personal information collected by our company are: the information you provide, the information obtained during your use of our products or services, and your information shared by third parties. We will collect and use your personal information for the following product functions. If you do not provide relevant information or do not agree to our collection of relevant information, you may not be able to register as our user or enjoy some of the services we provide, Or can not achieve good service effect.
1. When you provide account registration, login functions and services, you may be required to provide the following account registration information:
When you register an account, you will provide us with your mobile phone number and login password.
When you choose to log in with a third-party account, we will read the avatar and nickname information you used when registering with the third-party account. The aforementioned third-party accounts include QQ, WeChat, Weibo or other third-party accounts, and the third-party accounts actually accessed by specific products and services shall prevail.
The purpose of collecting the aforementioned account information is (1) to provide you with better services through account management. By logging in to your account, you can synchronize your relevant information. (2) If you provide a real and valid mobile phone number, QQ number, Weibo number, and WeChat account for binding, when you encounter the problem of losing the registered account or forgetting the password, you can easily retrieve the account number and password. (3) We will de-identify the relevant information collected and conduct statistical analysis in order to more accurately understand the habits of users, and on this basis, continue to improve products, improve service quality and improve product user experience
2. The information you submit through our customer service or when you participate in events organized by us. In order to get in touch with you in a timely manner, feedback customer service questions or related activity information, you may provide us with your contact information for timely communication.
3. Device Information
Device information refers to the information of the device you use when using our products or services. In order to make necessary adaptations between products and services and devices and provide security services, when you use products or services, you will collect the device name, device model, device identification code, operating system and application version of Sogou's products or services. , language settings, resolution, service provider network ID (PLMN) related information. This information is collected to help us conduct bug analysis, ensure your normal use of our products and services, improve and optimize our product experience, and protect your account security. Except as otherwise expressly agreed in this policy, we will not provide your device information to any third party. However, we cannot guarantee that other third parties will not obtain your device information through other channels and combine the device information with other information to identify your personal identity, and you should claim compensation from the third party for any loss caused by this. The above device information is the basic information collected for the provision of services. If you do not want the device information to be collected by us, it may cause us to be unable to provide you with normal services.
4. Location Information
Location information refers to the information about your location that is collected when you turn on the device positioning function and use the relevant services provided based on location, mainly including:
When you turn on the device location function and use related products or services, we may use GPS, WiFi or other technical means to collect and process information about your actual location. Tracks and precise positioning information is personal sensitive information. Our products or services will not collect such personal sensitive information unless required for specific product or service functions.
Real-time information provided by you or other users that includes your geographic location. This includes shared information uploaded by you or others showing your current or past geographic location, and geotagged information contained in photos shared by you or others.
If you do not want to be accessed, you can choose to turn off the relevant functions in the device or product/service, but this may affect our provision of relevant services to you.
5. Log information
Necessary for service security, when you use products and services, the system may automatically collect certain information through cookies or other means and store it in server logs. Such information may include:
Detailed usage of our products and services, such information may include the web page search terms you use, the page addresses you visit, and other information and content details you browse or request when using the service; equipment or software information, In addition to the device information described above, we may collect the version number and browser type of the software you use. We collect information about the mobile applications and other software you use to ensure the security of your operating environment or to provide services. Device event information, including crashes, system activity information, and other relevant information.
6. Other information collected with your consent
In order to provide you with more convenient, high-quality, and personalized products or services, some specific functions of some of our products and services may require you to provide specific personal sensitive information to achieve. If you choose not to provide such information, you may not be able to use the corresponding functions normally, but it will not affect your use of other functions in the service. These features include:
(1) Application functions based on camera (camera): You can complete the functions of video shooting, photographing, scanning code and face recognition after enabling the camera/camera permission. We may apply face recognition technology to more scenarios in the future, but at that time we will confirm with you again whether you would like us to use your facial information to implement these extended functions.
(2) Application functions for accessing and uploading pictures/videos based on albums (picture library/video library): You can use the corresponding functions to edit your photos/pictures/videos after enabling the album permission.
(3) Application functions based on microphone voice technology: You can directly use the microphone to record or implement corresponding functions after enabling the microphone permission. In these functions, we will collect your recordings to identify your voice content and achieve corresponding functional effects.
(4) Application function based on address book information: We will collect your address book information after you enable the address book permission, so that you can more conveniently access the contact information in your address book when using the corresponding function, without the need for Re-enter manually.
(5) Calendar-based application function: After you enable the permission to read/write your calendar, we will collect your calendar information for memo records and reminders.
(6) Application function based on mobile phone file reading: You can use the corresponding function to edit the files in the mobile phone after enabling the file reading/uploading permission.
You understand and agree that the above application functions may require you to enable us to access your camera (camera), photo album (picture gallery), microphone (voice), address book and calendar in your device in order to achieve all these functions. The collection and use of the information involved. Please note that before collecting personal sensitive information, we will obtain your consent in a pop-up window or similar prominent means. If you voluntarily provide your personal sensitive information, you agree that we will process your personal sensitive information in accordance with the purposes and methods described in this policy
7. Your information shared by other third parties
It mainly includes two situations: (1) Your information may be included in the information posted by other users. (2) Information generated or shared when you use third-party partner services. When you use Weibo, QQ account and other third-party accounts to log in to our software products or services, we need to verify your identity or bind Your account information, and link the relevant account to our products or services with your authorization.
2. How we use the information we collect
We strictly abide by the provisions of laws and regulations and the agreement with users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain to you again and obtain your consent.
1. Meet your personalized needs: for example, language settings, location settings, personalized help services.
2. To provide you with services, product development and service optimization: For example, when our system fails, we will record and analyze the information generated when the system fails to optimize our services.
3. Security: For example, we will use your information for identity verification, security protection, anti-fraud monitoring, archive backup, customer security services, etc. For example, security software you download or install detects malicious programs or viruses, or identifies fraudulent messages for you.
4. Recommend advertisements, information, etc. that may be of interest to you.
5. To evaluate and improve the effectiveness of our advertising and other promotional and promotional activities.
6. Software management: For example, software certification, software upgrade, etc.
7. Invite you to participate in surveys about our services.
8. In accordance with laws and regulations, your relevant information is collected and used in the following situations, without your authorization.
related to national security and national defense security;
Those related to public safety, public health, and major public interests;
related to criminal investigation, prosecution, trial and execution of judgments;
In order to protect the life and property of the personal information subject or other individuals, but it is difficult to obtain the consent of the individual;
Necessary for maintaining the safe and stable operation of the products and/or services provided, including finding and dealing with faults in the products and/or services;
necessary for legitimate news reporting;
When it is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing academic research or description results, the personal information contained in the results is de-identified;
Other circumstances stipulated by laws and regulations.
9. Other uses with your consent.
In order to give you a better experience, improve our services or other purposes with your consent, we may use the information collected through certain services for our other services, subject to relevant laws and regulations. For example, the information when you use one of our services is used to display personalized content or advertisements to you in another service, and for user research analysis and statistics and other services.
To ensure the security of our services and to help us better understand how our applications are performing, we may log information such as how often you use the applications, failure information, overall usage, performance data, and the origin of the applications. We do not combine the information we store in analytics software with personally identifiable information you provide in the app.
3. How do we share, transfer and publicly disclose your personal information
We are fully aware of the legal responsibilities that should be borne by the personal information subject due to illegal sharing, transfer, and public disclosure of personal information. For all sharing, transfer, and public disclosure of your personal information, we will strictly follow the following terms:
(1) Sharing
Respecting the privacy of users is one of our basic principles. We will not share your personal information with any company, organization or individual except in the following circumstances:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
2. We may share your personal information externally in accordance with the requirements of judicial authorities or administrative authorities.
3. Sharing with affiliates: Your personal information may be shared with our affiliates. We will only share necessary personal information and subject to the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization again.
4. Sharing with authorized partners: Some of our services will be provided by authorized partners only for the purposes stated in this policy. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and explicit purposes, and will only share personal information necessary to provide services, such as sharing your personal information with a logistics company when you purchase our products online. information. Our partners are not authorized to use the shared personal information for any other purpose.
For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
(2) Transfer
We will not transfer your personal information to any companies, organizations and individuals, except in the following cases:
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.
2. When a merger, acquisition or bankruptcy liquidation is involved, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to continue to be bound by this privacy policy. Ask for your authorization again.
(3) Public disclosure
We will only publicly disclose your personal information in the following circumstances:
1. Disclose the personal information you specify under the disclosure method that you expressly agree to
2. When it is necessary to provide your personal information according to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information according to the required type and disclosure method of personal information. Under the premise of compliance with laws and regulations, when we receive the above-mentioned request for information disclosure, we will require the issuance of corresponding legal documents, such as subpoenas or investigation letters.
4. How we protect your personal information
1. We have used industry-standard security safeguards to protect the personal information you provide against unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably practicable steps to protect your personal information. For example, the exchange of data (such as credit card information) between your browser and the "service" is protected by SSL encryption; we also provide https secure browsing methods for the website; we will use encryption technology to ensure the confidentiality of data; we will use Trusted protection mechanisms to prevent malicious attacks on data; we deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information .
2. We will take all reasonably practicable measures to ensure that no irrelevant personal information is collected. Unless we obtain your written permission, we will retain your personal information for 36 months after you delete or cancel your account. After this period, we will anonymize or destroy your personal information.
3. The Internet is not an absolutely secure environment, and emails, instant messaging, and communications with other users are not encrypted, we strongly recommend that you do not send personal information through such means. Please use a complex password to help us keep your account secure.
4. The internet environment is not 100% secure and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
5. In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with Article 42(2) of the Cybersecurity Law: the basic situation and possible impact of the security incident, and the measures we have taken or will take measures, recommendations for self-prevention and mitigation of risks, remedies for you, etc. We will promptly notify you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to publish an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
5. How do you manage your personal information
1. In the process of using our services, you can access, modify and delete the registration information and other personal information you provide, or you can contact us according to the notification guidelines. The extent and manner in which you access, modify and delete personal information will depend on the specific service you use.
For example, if you want to stop sharing your geographic location information when you use geographic location-related services, you can stop sharing by turning off the mobile phone location function, the closing method of software and hardware service providers and communication service providers. It is recommended that you read the relevant guidelines carefully .
2. We will collect and use your information only to realize the functions of our products or services as described in this policy.
If you find that we collect and use your personal information in violation of laws, administrative regulations or mutual agreement, you can ask us to delete it.
If you find that your personal information collected and stored by us is inaccurate, you can also ask us to correct it.
When you access, modify and delete relevant information, we may require you to authenticate to protect the security of your account.
3. In the following cases, according to the requirements of laws and regulations, we will not be able to respond to your request:
Directly related to national security and national defense security.
Directly related to public safety, public health, and major public interests.
Directly related to criminal investigation, prosecution, trial and execution of judgments.
There is sufficient evidence that you have subjective malice or abuse of rights.
Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.
involving trade secrets.
6. Personal information about children
Our products, websites and services are primarily aimed at adults. Minors may not create their own user accounts without the consent of their parents or guardians. For the collection of minors' personal information with parental consent, we will only use or publicly disclose this information when required by judicial or administrative authorities, when the parent or guardian expressly consents, or is necessary to protect minors.
Although local laws and customs define minors differently, we consider anyone under the age of 16 to be a minor.
If we discover that we have collected personal information from minors without prior verifiable parental consent, we will try to delete the data as soon as possible.
7. How to update this policy
Our Privacy Policy will be updated from time to time.
Generally, we will not reduce your rights under this Privacy Policy. We will post an updated version on this page and notify you of any changes to this Policy by means of a pop-up or a pop-up equivalent, and by agreeing to you, you agree to be bound by the revised Policy.