Privacy Policy of Shenzhen Youcheng Technology Co., Ltd.

Shenzhen Youcheng Technology Co., Ltd. ("Youcheng", "we" or "our") pays great attention to protecting the personal information and privacy of users ("you"). We are well aware of the importance of personal information to you and will In accordance with the requirements of laws and regulations and mature security standards in the industry, take appropriate security protection measures to protect your personal information. We hope that through this privacy policy, we will provide you with a clear introduction to how we handle your personal information when using our products/services, and how we protect this information.
[Special Reminder] Please read carefully and fully understand this "Privacy Policy" before using the products/services we provide (we have bolded the font for the key content, please pay special attention to it) and make corresponding choices. Once you use or continue to use our products/services, it means that you agree to our processing of your relevant information in accordance with this privacy policy.
This privacy policy only applies to your personal information that we have collected, and the services and functions we provide to you. It does not apply to the collection of your personal information by any third party, the services provided by any third party or the third party's information usage rules.
1. Information we collect
Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. We will only collect and use your personal information for the following purposes described in this policy:
1. Required or non-essential permissions for the normal operation of the product
• When you use the related services of our products, in order to ensure the normal operation of the software and services, we will collect your hardware model, operating system version number, International Mobile Equipment Identity (IMEI), and International Mobile User Identity (IMSI), network device hardware address (MAC), IP address, iOS advertising identifier (IDFA), software version number, network access method and type, operation log information (such as service failure information), this type of information is for providing Basic information that the service must collect.
• Read and write external storage information. When we first launch the app, we will ask you to authorize the permission to read and write information on the external storage. We must apply for this permission to store data generated during the use of the product. In addition, it stores the user's personalized configuration information, caches the current usage status, and improves the next startup speed and usage path.
• Access rough location and precise positioning. Third-party SDK registered permissions, according to the user's location, provide personalized language configuration and advertisement recommendations that meet local characteristics
2. Optimize products, services and user safety
• To help us better understand your usage and solve your problems in the product. We may record network log information, as well as the frequency of using software and related services, crash data, overall installation, usage, performance data and other information.
3. Carry out internal data analysis and research, third-party SDK statistical services, and improve our products or services
• We collect data based on your interaction with us and the choices you make, including your privacy settings and the products and features you use. The following is the SDK we are using. The SDK code contains multiple permissions, but we only allow the SDK to use it to view WLAN connections, obtain rough locations, read and write external memory cards, read mobile phone status and identity, and retrieve running applications , Permissions.
• The permission code contained in the SDK is as follows (non-use permission):
sdk name contains permission code
Guangdiantong: Check WLAN connection, get rough location, get precise location, read external memory card, write external memory card, read phone status and identity, retrieve running applications
Youmeng componentized basic library: View WLAN connection, use Bluetooth, get rough location, get precise location, camera, read external memory card, read mobile phone status and identity, write external memory card, search is running Applications
Tencent browsing service: check WLAN connection, read external memory card, write external memory card, read mobile phone status and identity
Push: Check Wi-Fi connection, get rough location, get precise location, read external memory card, write external memory card, read phone status and identity
4. Provide you with security
• In order to improve the security of your use of the services we provide, and more accurately prevent phishing website fraud and Trojan horse viruses, we may use or integrate your personal information and our affiliates and partners to obtain your authorization or legally Shared information, based on your usage habits and commonly used software information to comprehensively judge your account and transaction risks, including verifying your identity, preventing, detecting, and investigating possible fraud, network viruses, network attacks and other security risks, as well as violating our or Affiliate agreements, policies, or rules, etc., to protect the legitimate rights and interests of you, other users, us, or related parties, and to record some links ("URLs") that we believe are risky.
5. Other uses
• When we use information for other purposes not specified in this policy, or use information collected for specific purposes for other purposes, we will separately seek your authorization and consent.
6. Please be aware that in the following situations, we do not need your authorization to collect and use personal information
• In addition, in accordance with relevant laws, regulations and national standards, we may collect and use your personal information in the following situations without asking for your authorization:
o Directly related to national security, national defense security and other national interests; directly related to major public interests such as public safety, public health, and public knowledge;
o Directly related to criminal investigation, prosecution, trial and sentence execution;
o To protect the life, property, reputation and other major legal rights of you or other individuals, but it is difficult to obtain your consent;
o The personal information collected is disclosed to the public by yourself;
o Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
o Necessary for signing and fulfilling the contract according to your requirements;
o Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and handling product or service failures;
o Necessary for the development of legal news reports;
o When it is necessary to carry out statistical or academic research for public interest, and when it provides the results of academic research or description to the outside, the personal information contained in the results is de-identified;
o Other circumstances stipulated by laws and regulations.
2. How do we share, transfer and publicly disclose your personal information
1. Sharing personal information
We will not transfer your personal information to any company, organization or individual, except in the following cases:
• Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
• When it involves a merger, acquisition or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will require the company , The organization asks you for authorization again.
• Under statutory circumstances: in accordance with the provisions of laws and regulations, the need for litigation dispute resolution, or the requirements of the administrative, judicial and other competent authorities according to law.
2. Transfer of personal information
We will not transfer your personal information to any company, organization or individual, except in the following cases:
• Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.
• When it involves a merger, acquisition or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will require the company , The organization asks you for authorization again.
3. Public disclosure of personal information
We will only publicly disclose your personal information under the following circumstances and under the premise of adopting industry-standard safety protection measures:
• According to your needs, disclose your designated personal information in a disclosure method that you explicitly agree to;
• In cases where your personal information must be provided in accordance with the requirements of laws, regulations, compulsory administrative law enforcement or judicial requirements, we may publicly disclose your personal information based on the required personal information types and disclosure methods. Under the premise of complying with laws and regulations, when we receive the above-mentioned request for information disclosure, we will require the corresponding legal documents, such as subpoenas or investigation letters, to be issued.
Three, personal information security protection
• We strive to provide protection for user information security to prevent information leakage, loss, improper use, unauthorized access and disclosure, etc. We use multi-faceted security protection measures to ensure that the protection of users' personal information is at a reasonable level of security, including technical protection means, management system control, security system protection and many other aspects. At the same time, we adopt industry-leading technical protection measures. The technical methods we use include but are not limited to firewalls, encryption (such as SSL), de-identification or anonymization, access control measures, etc. In addition, we will continue to strengthen the security capabilities of the software installed on your device. For example, we will complete part of the information encryption work locally on your device to consolidate secure transmission; we will understand the application information installed on your device and the running process information to prevent malicious programs such as viruses and Trojan horses.
• In the unfortunate event of a personal information security incident, we will immediately set up a special emergency response team to initiate an emergency response plan to prevent the expansion of security incidents, and promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident , The disposal measures we have taken or will take, suggestions that you can independently prevent and reduce risks, remedial measures for you, etc. We will promptly inform you about the incident by email, letter, telephone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
• Information storage location, duration and transfer
The place where the information is stored, (subject) shall comply with the provisions of laws and regulations, and store the personal information of users collected in the country.
• Period of information storage
(Subject) Only keep the user's personal information within the shortest period stipulated by law for the purpose of fulfilling the purpose. However, in the following cases, we may change the storage time of personal information due to the need to comply with legal requirements:
• 1) To comply with applicable laws and regulations and other relevant regulations;
• 2) To comply with court judgments, rulings or other legal procedures;
• 3) To comply with the requirements of relevant government agencies or legally authorized organizations;
• 4) Those who are directly related to major public interests such as public safety, public health, and public knowledge have reason to believe that they need to comply with relevant regulations such as laws and regulations;
• 5) Purposes reasonably necessary to implement relevant service agreements or this policy, safeguard the public interest, and protect the personal and property safety or other legal rights of our customers, us and/or affiliates, other users or employees ;
• 6) When this product or service ceases to operate, we will notify users in the form of push notifications, announcements, etc., and delete or anonymize the collected personal information within a reasonable period of time.
Four, personal information protection of minors
• We attach great importance to the protection of personal information of minors. Our website and services are mainly for minors. If you are a minor, it is recommended that you ask your parents or guardians to read this privacy policy carefully, and use our services or provide us with information with the consent of your parents or guardians.
• In the case of collecting personal information of minors by using our products or services with the consent of their parents or guardians, we will only use them when permitted by laws and regulations, with the explicit consent of the parents or guardians, or necessary to protect minors , Share, transfer or disclose this information.
• If we find that we have collected personal information of minors without the prior consent of a verifiable parent or legal guardian, we will try to delete the relevant data as soon as possible.
Fifth, your rights
We attach great importance to the management of your personal information, and do our best to protect your personal information inquiries, access, modification, deletion, withdrawal of consent and authorization, account cancellation, complaints and reports, and privacy settings, etc., so that you Have the ability to protect your privacy and safety.
• Change the scope of your authorization consent or revoke authorization
• Change or withdraw sensitive information permissions
You can delete information in Youcheng products, change privacy settings, turn off geographic location and external storage information in the operating system of the device itself, change the scope of consent or withdraw your authorization
• Refuse to accept push and marketing information
You can turn off "Push Notification" by setting to reject the push of messages, turn on or off the programmatic ad display setting by "Ad Settings", and unsubscribe by replying to "TD" etc. We send your marketing SMS.
• Complaints
You can make a complaint or report in accordance with our publicized system. If you think that your personal information rights may be infringed, or you find clues that infringe your personal information rights (for example, you think that our collection of your personal information violates legal regulations or mutual agreement), you can click User Feedback to enter the user feedback interface and We contact. We will promptly report your complaints and reports after verification.
• Visit Privacy Policy
You can view the entire content of this privacy policy on the homepage or on the app settings page.
• Stop operation to inform you
If we stop operations, we will promptly stop the collection of your personal information, notify you of the suspension of operations in the form of one-by-one delivery or announcement, and delete or anonymize the personal information we hold. deal with.
VI. Notice and Amendment
• In order to provide you with better services, our business will change from time to time, and this privacy policy will be adjusted accordingly. Without your explicit consent, we will not reduce your rights under this privacy policy. We will remind you of relevant content updates by issuing updated versions on our website and mobile terminals or by other means. Please visit us to keep abreast of the latest privacy policy. Under the aforementioned circumstances, if you continue to use our services, you agree to accept and be bound by this revised policy.
VII. How to contact us
• If you have any complaints and reports on our personal information processing behavior, you can pass
• 1. Uorange website (http://www.uorange.net)
• 2. Email (70570090@qq.com)
Contact us and give a full description. We will respond to your request and try our best to resolve it within 30 days of verifying your identity.
• Company Name: Shenzhen Youcheng Technology Co., Ltd.
• Registered company address: 1205, Central Business Building, No. 87, Fuhua 1st Road, Futian Street, Futian District, Shenzhen
• Common office address of the company: 22nd Floor, District B, Fortune Center, Fengxi District, Chaozhou City, Guangdong Province;