This Privacy Policy applies to users of Quick Tracking SAAS Services.
Privacy Policy
Effective date: October 29, 2021
Prompt Terms
Hangzhou Hillingyang Intelligent Service limited Company (hereinafter referred to as" we" or" hillock Sheep", registered address: [Building 3, 969 Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou]) Attach great importance to the protection of personal information. When you use the services provided by [Hillock] (hereinafter referred to as"Investors Sheep service"), we will collect and use you and your end users in accordance with this privacy policy (i. e." end users of your product" or" the end user of your product", the same as below) personal information. We want this Privacy Policy to provide you with a clear picture of how we handle personal information about you and your end users, so we encourage you to read this Privacy Policy in its entirety to help you understand how you will protect your privacy.
This privacy policy applies to the SDK services provided by Hillsheep Quick Tracking (Global Collection and Growth Analysis).
Before using [Hillingyang] products or services, please be sure to carefully read and thoroughly understand this privacy policy, especially the terms marked in bold underscores. You should focus on reading and use the relevant products or services after confirming your full understanding and consent. If you have any questions about this Privacy Policy, you can contact us through the contact information published in this Privacy Policy. If you do not agree with this Privacy Policy, you should stop using the [Hillock] service.
This Privacy Policy will help you understand the following:
How we collect and use your and your end users' personal information
How we use Beacon Cookie and networks
How we share, transfer and publicly disclose your and your end users' personal information
How we protect your and your end users' personal information
5. How to manage your and your end users' personal information
How we handle minors' information
7. Application scope and globalization statement of the SDK service
8. How to update this privacy policy
9 How to contact us
一、 how we collect and use your and your end users' personal information
We collect information in order to better, better and more accurate to complete the service you choose. We collect information as follows:
1 information that you provide to us.
When you activate the [Hillsheep] service and use the related services provided by [Hillsheep], you fill in, submit or access information, including your telephone number, email address, enterprise information, product information, promotion channels, application name-related data, etc.
When you conduct enterprise certification, we may also ask you to provide enterprise business license, unified social credit code, enterprise name, business term, location, detailed address, and enterprise certification Alipay and other information.
We collect this information in order to better provide services to you, in order to achieve this purpose, we will use your information for the following purposes:
1 () To provide you with all kinds of services, and to maintain and improve these services.
(2) We may use your personal information to prevent, detect, and investigate fraud, infringement, safety hazards, illegal or violations of agreements, policies or rules with us or [Hillock] affiliates to protect you, other users, or our or [Hillock] affiliates.
(3) Contact you to resolve the issue.
4 () with your permission.
2 information collected during your use of the service
(1) Quick Tracking SDK
Personal information collection fields:
SDK Type | Personal Information Field | Usage | Data Protection Mode |
Quick Tracking (Global Collection and Growth Analysis) SDK | OAID/GAID/MAC/IMEI/Android ID/IDFA/IDFV/OPENUDID/GUID/SIM card IMSI information /hardware serial number /mobile country code MCC( )、MNC( mobile network number | uniquely identifies devices for statistics such as the number of new devices | 1. SSL encryption and HTTPS transmission encryption are used to ensure security 2. Take encryption, de-identification, and other security measures to desensitize |
Use of personal information permissions:
Permission | Involving Products | Function Description |
ACCESS_NETWORK_STATE | Quick Tracking | Detects the network connection mode and prevents data transmission when the network is abnormal. This saves traffic and power consumption. |
READ_PHONE_STATE | Quick Tracking | Obtain the IMEI and hardware serial number of the user equipment, and use the IMEI and hardware serial number to uniquely identify the user to provide statistical analysis services. |
ACCESS_WIFI_STATE | Quick Tracking | Obtain the WIFI mac address. On a tablet device or TV box, the device cannot be identified by IMEI. We will use the WIFI mac address as the unique identifier of the user to provide normal statistical analysis services. |
INTERNET | Quick Tracking | Permissions that allow applications to network and send statistical data to provide statistical analysis services. |
Other non-personal data
In addition to the preceding personal information, the SDK service collects the following non-personal information data based on different dimensions provided by the service: SDK/API/JS code version, browser, internet service provider, platform, timestamp, application version, application distribution channel, device model, sensor parameters, terminal manufacturer, terminal operating system version, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage, etc.
(2) Other
In addition to the above information, we may also collect other information from you for reasonable needs to provide services and improve service quality, including relevant information you provide when contacting us, the questionnaire reply information you send to us when participating in the questionnaire survey, and the relevant information we collect when you interact with [Hillock]'s affiliates and [Hillock] partners. At the same time, in order to improve the security of your use of [Hillock] services and more accurately prevent phishing website fraud and Trojan virus, we may determine the risks of your account by understanding your network usage habits and your commonly used software information, and may record some URL that we think are risky. Please note that individual device information, service log are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information will be regarded as personal information during the combined use. Unless authorized by you or otherwise provided by laws and regulations, we will anonymize and de-identify such information.
3. How we use the collected information
In order to comply with national laws, regulations and regulatory policies, and to provide services to developers and end users, we will use users' personal information in the following situations:
(1) In order to achieve the purposes and uses described in "How We Collect and Use Your and Your End Users' Personal Information" in this Privacy Policy;
(2) In order to ensure and improve the safety and stability of the products and services provided by Hillsheep and Hillsheep's affiliates, protect the legitimate rights and interests of you, Hillsheep or Hillsheep's affiliates, as well as the national and social public interests from infringement and loss, better prevent, discover and investigate phishing websites, fraud, infringement, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, to more accurately identify situations that violate laws and regulations, agreements and rules reached between you and Hillsheep and Hillsheep's affiliates, or endanger national and public security, we may use or integrate your equipment information, location information, service logs and other information that Hillsheep's affiliates obtain your authorization or share according to law, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law;
(3) When we want to use personal information for other purposes not specified in this privacy policy, we will notify you in advance, and we will ask you to notify the end user and seek the end user's consent.
4. How do you use the Hillsheep SDK?
To ensure that your app is legal and compliant, you must use the Hillsheep SDK service in accordance with current laws, regulations, or regulatory requirements. You must perform the following steps:
1. Make sure that you have upgraded the SDK to the latest version that meets the new regulations.
2. Please be sure to inform users of the use of the SDK in the Privacy Policy. The terms and conditions are as follows:
SDK name: Hillysheep Quick Tracking (Global Collection and Growth Analysis) SDK
Service type: SDK service
Type of personal information to be collected: OAID/GAID/MAC/IMEI/Android ID/IDFA/IDFV/OPENUDID/GUID/SIM card IMSI information /hardware serial number /MCC( mobile country code )、MNC( mobile network number)
Privacy Policy Link: https://www.lydaas.com/wow/z/lydaas/default/personal-information-protection?spm=a1z24v7z.27090185.6248881200.26.5eb356d2ruUlgW
3. Make sure that you can initialize the SDK after you authorize the Privacy Policy.
Make sure that you use the SDK service in compliance with the preceding instructions. If you use the SDK service in compliance with the preceding instructions, you bear the risks and losses incurred by the SDK service.
How Beacon We Use Cookie and Networks
In order to make your access experience easier, when you visit the [Hillsheep] platform or use the services provided by [Hillsheep], we may identify your identity through small data files. This is to help you save the steps of repeatedly entering registration information or help you judge the security of your account. These data files may be cookies, Flash cookies, or other local storage provided by your browser or associated applications (hereinafter referred to as "cookies").
Please understand that some of our services can only be achieved through the use of cookies. If your browser or browser add-on services allow it, you can open your browser's settings options, select privacy settings, check "Do not track", or disable cookies so that your data will not be tracked by us. Webpages often contain electronic images (called "single-pixel GIF files" or "web Beacon"). Using web Beacon can help websites calculate users browsing web pages or access certain cookies. We will collect information about your browsing activities through web Beacon. For example, the address of the page you visited, the address of the reference page you previously visited, the time you stayed on the page, your browsing environment, and display settings.
3. How we share, transfer and publicly disclose your and your end users' personal information
1、 sharing
We are obligated to keep your information confidential and will not sell or rent your information and that of end users to third parties for marketing or illegal purposes. We will not share your end-user personal information with any third party except:
(1) Obtain prior personal information right subject's consent or authorization.
2 () in accordance with laws and regulations or administrative or judicial requirements.
(3) If your end user is a qualified intellectual property complainant and has filed a complaint, at the request of the respondent, disclose to the respondent so that both parties can handle possible rights disputes.
(4) You may only share your End User's information to provide the Services or to deal with your End User's disputes or disputes with others.
(5) on the premise of complying with laws and regulations, share your personal information and that of your end users with [Hillsheep]'s affiliates subject to the purposes stated in this Privacy Policy.
Transfer of 2、
We will not transfer your end users' personal information to any third party unless:
1 () Obtain your End User's explicit consent.
(2) In the case of mergers, acquisitions or bankruptcy liquidation, such as the transfer of personal information, we will require new companies and organizations that hold your end user's personal information to continue to be bound by this privacy policy, otherwise we will require the company and organization to re-ask your end user for authorization and consent.
3. Public disclosure
We will only publicly disclose your end users' personal information
1 () with your or your end user's explicit consent;
(2) Law-based disclosure: In the case of law, legal process, litigation or government authority mandatory requirements, we may publicly disclose your or your end user's personal information.
(3) In an emergency, it is reasonable to judge to protect us, our customers, end users or other people's important legal rights.
IV. How we protect your personal information and that of your end users
In order to protect your and your end users' information, we will strive to take reasonable physical, electronic and administrative security measures to protect your information in accordance with industry standards, and use our best reasonable efforts to ensure that your information and your end users' information will not be disclosed, destroyed or lost. Exchange data between your browser and the server is subject to SSL protocol encryption protection; we provide HTTPS we will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent malicious attacks on personal information; we will deploy RAM mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
We have an industry-advanced data security management system that takes data as the core and focuses on the data lifecycle. We have established a compliance system based on relevant laws, regulations, and standards. We also improve the security of the entire system from the aspects of organization construction, system design, personnel management, and product technology.
The information we collect is kept in a safe operating environment that is not open to the public. To prevent unauthorized access to your information, we store it on servers protected by firewalls and possibly encrypted. However, no system is absolutely safe, please understand that there is no perfect security measures "". Even with our best efforts, we may not be able to prevent unauthorized access to your personal information and that of your end users. In addition, because of the inability to determine whether the statements of others are true, we may be deceived by unreliable, misleading or illegal information.
If a personal information security incident unfortunately occurs, we will inform you or your end users of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you and your end users can independently prevent and reduce risks, and the remedial measures for you and your end users, etc. in accordance with the requirements of laws and regulations. We will inform you and your end users of the incident by email, letter, phone call, push notification, etc. When it is difficult to inform the personal information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only retain your and your end users' personal information for the period required to achieve the purposes described in this Privacy Policy, unless there is a mandatory retention requirement by law. And our criteria for judging the aforementioned period include:
1. Complete your service purposes, maintain corresponding service and business records, and respond to your possible business needs;
2, to ensure that we provide you with service safety and quality;
3. Do you agree to a longer retention period;
4, whether there is a retention period of other special agreement.
After your personal information exceeds the retention period, we will delete your personal information or make it anonymous as required by applicable laws.
5. How to manage your personal information
You can use the following methods to access and manage your information.
1, enquire, correct and supplement your information. We will endeavor to enable you to review, correct or supplement the information you have with us. To review, correct or supplement, please visit our website and log in to your account to do so. If the exercise of a right cannot be operated on the account page, you can contact us through the contact information provided in this privacy policy, and we will assist you in the corresponding operation.
2, account cancellation and deletion of your personal information.
If you do not wish to continue to use our products, you can contact us through the contact information provided in this privacy policy and submit an application to cancel your account. We will usually15 we will respond to your application request within two working days. However, for the security of your account, we will identify you, verify and process your request. We will need you to submit sufficient and valid identity information. After the account is canceled, we will no longer provide services for you. If you want us to delete your personal information, you can also submit an application to us to delete your personal information.
3. Obtain a copy of personal information.
You have the right to obtain a copy of your basic personal data by sending us a request. Where technically feasible, such as data interface matching, we can also directly transfer a copy of your personal information to a third party designated by you at your request.
If your end users need to obtain a copy of their personal information, you can initiate a request to us. When we complete the end user's identity verification, we will return the copy of their personal information.
How we handle minors' information
We take the protection of minors' personal information very seriously. If your application is developed for minors, please take necessary measures to ensure that the registration and use of your end users have obtained the consent of their guardians. At the same time, you should fulfill the corresponding notification obligations in your privacy policy. Note that as a minor application, you must comply with the review standards and guidelines for minor applications in the application market. This will not affect the application shelves or normal operations.
Subject to existing technologies and business models, it is difficult for us to actively identify minors' information. If a minor's guardian discovers that there is unauthorized collection of minors' personal information, the guardian can notify us to delete it. In the above situation, we will also take the initiative to delete it.
7. Scope of SDK services
Our SDK provides services for developers in China. We will store your data in China. In order to prevent you from violating local regulations due to your lack of understanding of the data protection laws and policies of your end user's country or region, we strongly recommend that you use the [Hillingyang] service only in the mainland of the People's Republic of China. If you use [Hillsheep] services outside the mainland of the People's Republic of China (including the Hong Kong Special Administrative Region, Macao Special Administrative Region, and Taiwan), you shall comply with the legal requirements for cross-border transmission and transfer, and assume all risks that may arise. If [Hillsheep] suffers any loss, you are responsible for fully compensating us. If you provide services in the European Union, our business may require us to transfer your end users' personal data to countries outside the European Union. These countries may offer a different level of data protection than EU countries. As the entrusted processor of your end-user personal data, we will take appropriate measures to ensure that confidentiality obligations are fulfilled and that measures such as standard contractual clauses are implemented.
8. How to update this Privacy Policy
We may adjust or change this privacy policy in due course, and any update of this privacy policy will be published in the form of marking the update time. Unless otherwise mandatory provisions of laws, regulations or regulatory provisions, the adjusted or changed content will take effect upon notification or publication of the 7 after the date. We will not limit your rights under this Privacy Policy without your explicit consent. For major changes, we will also provide more prominent notifications (including notifications through website or client homepage announcements or even pop-up prompts to you).
This Privacy Policy refers to significant changes including but not limited to:
1. Our service model has changed significantly. Such as the purpose of processing user information, the use of user information, etc.
2. We have undergone major changes in control and organizational structure. Such as business adjustments, changes in owners caused by bankruptcy mergers and acquisitions, etc.
3, personal information sharing, transfer or public disclosure of the main object changes.
4. Your rights to participate in personal information processing and the manner in which they are exercised have undergone significant changes;
5, we are responsible for handling user information security responsibility department, contact and complaint channels change.
The personal information security impact assessment report indicates that there is a high risk.
9 How to contact us
If you have any questions, suggestions or complaints about this privacy policy, please contact the "personal information protection project team of Hangzhou lingyang intelligent service co., ltd." mailing address: "personal information protection project team of Hangzhou lingyang intelligent service co., ltd.", building 3, 969 wenyi west road, Yuhang district, Hangzhou. We will respond within 15 working days of receipt of the inquiry.
If you are not satisfied with our response, especially if you believe that our personal information processing has harmed your legitimate rights and interests, you can also file a lawsuit with the court of jurisdiction where the defendant is domiciled to seek a solution.