Privacy Policy

Updated: February 1, 2022
Effective Date: February 1, 2022

callPhone (hereinafter referred to as "this application" or "we") is well aware of the importance of personal information security. This application will adopt security protection measures in accordance with the requirements of laws and regulations to protect your personal information and privacy. Therefore, this application formulates a "Privacy Policy" (hereinafter referred to as "Privacy Policy") and reminds you: before using " " and related services (defined as the "User Agreement"), please be sure to read and thoroughly understand this "Privacy Policy" Policy", after confirming your full understanding and agreement, follow the guidelines to make your appropriate choices.

This Privacy Policy will help you understand:

• This application will collect and use your information in accordance with the Privacy Policy, but will not collect personal information in a packaged manner in a mandatory bundle just because you agree to this Privacy Policy.

• When you use or enable relevant functions or use services, we will collect and use relevant information necessary for the realization of functions and services. Unless it is necessary to achieve basic business functions or required by laws and regulations, you can refuse to provide it without affecting other functions or services. We will itemize what is necessary information in our Privacy Policy.

• If you are not logged in to your account, we will use the identifier information corresponding to the device to ensure the basic function of information push. If you are logged in to your account, we will push information based on your account information.

• Accurate geographic location, camera, microphone, photo album (storage), phone, calendar permissions, will not be enabled by default, and will only be used for specific functions or services with your express authorization, and you can also withdraw authorized. It is important to point out that even if we obtain these sensitive permissions with your authorization, we will not collect your information when the relevant features or services are not required. For specific permission application and permission usage, please refer to: Application permission application and usage description

• This Privacy Policy applies to your access to and use of our products and services through applications, official websites, software development kits (SDKs) and application programming interfaces (APIs) for use by third-party websites and applications. Serve.

The following will help you learn more about how we collect, use, store, transmit, share, transfer (if applicable) and protect personal information; help you understand how to query, access, delete, correct, and withdraw authorized personal information. Among them, important content such as the terms of your personal information rights and interests has been highlighted in bold, please pay special attention.

I. How we collect and use personal information

Second, our use of cookies and similar technologies

3. How do we store personal information

4. How do we share, transfer and publicly disclose personal information

5. How do we protect the security of personal information

6. Your rights

7. Terms of Use for Minors

VIII. Revision and Notice of Privacy Policy

IX. Scope of application

X. Others

I. How we collect and use personal information

(1) Personal information we actively collect and use

We will collect the information you actively provide when you use the service, and collect the information you generate in the process of using the function or accepting the service through automated means in the following ways:

1. Registration, authentication, login " " and related services

(1) When you register and log in to " " and related services, you can create an account with your mobile phone number, and we will verify whether your identity is valid by sending a SMS verification code, and you can improve the relevant network identification. Information (avatar, username), which is collected to help you complete your registration. You can also choose to fill in personal introduction and other information to improve your personal information according to your own needs.

(2) You can also use a third-party account to log in. At this time, you will authorize us to obtain the public information (avatar, nickname, region, gender, and other information you authorize) registered on the third-party platform, and register it on the third-party platform. After you agree to this "Privacy Policy", bind your third-party account to your account, so that you can log in directly through the third-party account and use the product and related services.

(3)Your registered account can use or log in to related party products (such as China Agricultural Service), and obtain related services or use related functions.

(4) When you need to use the identity authentication function or related services, according to relevant laws and regulations, you may need to provide your real identity information (real name, ID number, and the information required for real-name authentication) other information) to complete real-name verification. This information is sensitive personal information and you can refuse to provide it. If you refuse to provide it, you may not be able to obtain related services, but it will not affect the normal use of other functions and services.

(5) We will collect Unique Device Identifier (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to provide your account at the same time only on one device Log in on your device to keep your account safe.

Be

(6) We will obtain the software installation list, and by checking the changes in the list of apps installed on the user's mobile phone, determine whether it is the user's login behavior, thereby reminding the user to pay attention to account security. Of course, some malware and cheats can also be found, so as to maintain the security of the mobile phone system environment.

2. Information browsing and consulting services

(1) In order to ensure the quality of the recommended content and recommend information that may be of interest to you or provide you with more suitable consulting services, we may collect necessary log information.

(2) The log information used for information display and consulting services includes:

The behavior information you operate and use: click, follow, favorite, search, browse, share

Your Unsolicited Information: Feedback, Posts, Likes, Comments

Geolocation information: GPS information, WLAN access points, sensor information such as Bluetooth and cell towers

(3) GPS information is sensitive personal information, if you refuse to provide it, we will not recommend information to you based on GPS information, and will not affect the normal use of other functions.

(4) Based on the city corresponding to the IP address, we will show you, recommend local relevant information in your area or provide corresponding consulting services.

(5) The above information we collect and use has been de-identified. Data analysis only corresponds to specific codes that cannot be directly associated with your identity, and will not be associated with your real identity.

3. Provide you with information publishing functions or services

(1) When you post content, comments, evaluations, questions or answers, we will collect the information you post and display your nickname, avatar, post content, etc.

(2) When you use the functions of uploading pictures and publishing audio and video, we will ask you to authorize camera, photo album (storage), photos, and microphone permissions. If you refuse to provide authorization, you will not be able to use this function, but it will not affect your normal use of other functions of " ".

(3) When you post information and choose to display location, we will request you to authorize location permission and collect location information related to this service. If you refuse to provide authorization, you will not be able to use this function, but it will not affect your normal use of other functions of " ".

(4) When you use the live broadcast function, according to the requirements of laws and regulations, you may need to conduct real-name authentication through "face recognition" to verify your identity. During the process of real-name authentication, we and the third-party authentication agencies that provide authentication services require you to provide your real name, ID number, facial feature value, and other information required for real-name authentication. In addition, in order to implement the live broadcast function, we will ask you to authorize the camera and microphone permissions. This information is personal sensitive information, you can refuse to provide it, and it will not affect the normal use of other functions. This information is only for real-name authentication and the purposes stipulated by laws and regulations, and will not be used for other purposes without your express authorization.

4. Provide you with interactive features or services

(1) You actively follow and interact with accounts and topics you are interested in. When you browse, comment, bookmark, like or share content, we will collect the accounts you follow and show you the accounts you follow account post content.

(2) You acknowledge and agree that for your contact information (eg, contact number) provided by you in the process of using the products and/or services, we may contact one of them during our operation. or send multiple types of notifications for user message notification, identity verification, security verification, user experience research and other purposes; The purpose of providing commercial information such as services, functions or activities that you may be interested in, but please rest assured that if you do not want to accept these information, you can unsubscribe through the unsubscribe method provided in the SMS, or you can directly Contact us to unsubscribe.

(3) In order to realize the password sharing function, we need to access your clipboard and read the password, sharing code, and link contained in it, so as to realize functions or services such as jumping, sharing, and activity linkage.

5. Provide you with search, information display, communication, reminder services

(1) When you use the search service of " ", we will collect your search keyword information and log records. In order to provide efficient search services, some of the foregoing information will be temporarily stored in your local storage device, and may display search results and search history to you.

(2) In order to help you find the information you need quickly, we may collect your device information and browser type to provide you with the best way to display information. We will also use your above personal information in order to continuously improve and optimize the above functions.

(3) When you use the "Disease Recognition" function, we will request you to authorize camera and photo album (storage) permissions, collect the photos taken during the process of the above functions to provide you with the feedback function, and further optimize the service Improve your user experience. If you refuse to provide authorization, you will not be able to use this function, but it will not affect your normal use of other functions of " ".

6. Run a Marketing Campaign

When you choose to participate in the relevant marketing activities held by , you may be required to provide name, mailing address, contact information, ID number, and bank account information according to the activity. This information may include sensitive personal information, and if you refuse to provide this information, it may affect your participation in related activities or receiving prizes, but will not affect other functions.

7. Customer Service

(1) When you contact us or make an application for consultation, complaint, dispute resolution, etc., in order to protect your account and system security, We need you to provide the necessary personal information to verify your identity, Provide you with related services.

(2) In order to contact you, help you solve problems as soon as possible, or record the solutions and results of related problems, we may save your communication/call records with us and related content (including account information, order information, other information you provide in order to prove the relevant facts, or the contact information you leave).

(3) In order to provide services and improve service quality, we may also use your other information, including the relevant information you provide when you contact customer service.

8. Guaranteeing the safety of products, services and users

(1) Security function

We are committed to providing you with a safe and reliable product and use environment, and providing high-quality and reliable services is our core goal. The information collected in order to realize the security function is necessary information.

(2) Device information and log information

a. In order to ensure the safe operation of software and services, we will collect your hardware model, operating system version number, international mobile device identification number, unique device identifier, network device hardware address, IP address, WLAN access point , Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service log.

b. In order to prevent malicious programs and necessary for safe operation, we will collect installed application information or running process information, the overall operation of the application, usage and frequency, application crashes, overall installation usage, performance Data and application sources.

c. We may use your account information, device information, service log information, as well as information that we associate with this application, partners may share with your authorization or in accordance with the law, for judging account security, performing identity verification, testing and Prevent security incidents.

(2) Your personal information that we may obtain from third parties

1. When you use a third-party account to log in to " ", with your express consent, we will collect the nickname, avatar, region, gender and other information authorized by you of the third-party account.

2. Information collected by users due to the use of our products or services, for example, information published by other users may contain some of your information (such as: comments, messages, posting pictures, texts, audio and video related to information about you).

3. You fill in the reservation information when you use the related products or services provided by our affiliates (for example: the relevant reservation information you fill in when you use the channel in "China Agricultural Service") .

(3) Processing of changes in the purpose of collecting and using personal information

Please understand that with the development of our business, there may be adjustments and changes to the functions and services provided by " ". In principle, when the new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly or reasonably related to the original processing purpose, we will inform you again when we collect and use your personal information and obtain your consent.

(4) Personal information that is exempted from the collection and use of consent in accordance with the law

Please understand that in the following cases, according to laws and regulations and relevant national standards, we do not need your authorization and consent to collect and use your personal information:

(1) Those directly related to national security and national defense security;

(2) Directly related to public safety, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and execution of judgments;

(4) It is difficult to obtain the consent of the person in order to protect the life and property of the personal information subject or other individuals and other major legitimate rights and interests;

(5) Your personal information collected is disclosed to the public by you;

(6) Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

(7) Necessary to sign or perform a contract according to your request;

(8) Necessary for maintaining the safe and stable operation of " " and related services, such as discovering and disposing of failures of " " and related services;

(9) Necessary for legitimate news reporting;

(10) It is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing academic research or description results, the personal information contained in the results is de-identified;

(11) Other circumstances stipulated by laws and regulations.

You are specially reminded that if the information cannot identify you individually or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify you alone or in combination with other information When we use data that cannot be linked to any specific personal information in combination with other personal information about you, such information will be treated and protected as your personal information in accordance with this Privacy Policy during the combined use.

Second, the use of cookies and similar technologies

Cookies and similar technologies are commonly used technologies on the Internet. When you use " " and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you visit and use this product. We use Cookies and similar technologies are mainly used to achieve the following functions or services:

(1) Ensuring the safe and efficient operation of products and services

We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you are safely logged in to the service, or whether you have encountered illegal acts such as theft or fraud. These technologies also help us improve the efficiency of our services and improve login and responsiveness.

(2) Helping you get an easier access experience

Using such technologies can help you avoid repeating the steps and processes you take to fill out your personal information and enter your search content (examples: record searches, form fills).

(3) Recommend, display and push content or accounts that may be of interest to you

We may use cookies and similar technologies to understand your preferences and usage habits, conduct consultation or data analysis, to improve product services, recommend information or functions of interest to users, and optimize your choice of advertising.

In the sharing page of , we may use cookies to record browsing activities to recommend information to you, troubleshoot abnormal situations related to crashes, delays, and explore better service methods.

Most browsers provide users with the function of clearing browser cache data. You can perform corresponding data clearing operations in the browser settings function. If you clear it, you may not be able to use the services or corresponding functions provided by the company that rely on cookies due to these modifications.

Three, how do we store personal information

(1) Location of information storage

We store your personal information collected and generated during domestic operations in the People's Republic of China in accordance with laws and regulations. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow the provisions of laws and regulations and seek your consent.

(2) Storage period

We only retain your personal information for the period necessary for the purpose of providing " " and related services. Your posted information, comments, likes and other information will not be withdrawn, deleted or cancelled. We will retain the relevant information. After the necessary period, we will delete or anonymize your personal information, unless otherwise provided by laws and regulations.

4. How do we share, transfer and publicly disclose personal information

(1) Public disclosure of personal information

1. We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. We publicly disclose your personal information using industry-standard security safeguards.

2. We will disclose the necessary information of the relevant accounts when making announcements of penalties for illegal accounts and fraudulent behaviors.

3. Your publicly published works and concerns will be displayed on your personal homepage.

4. When you participate in the activities organized by the platform, your avatar and nickname may be displayed in the rankings, winning lists and other lists.

(2) Personal information that is exempted from consent to share, transfer, and public disclosure in accordance with the law

Please understand that in the following cases, according to laws, regulations and national standards, we do not need your authorization and consent to share, transfer, and publicly disclose your personal information:

(1) Those directly related to national security and national defense security;

(2) Directly related to public safety, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and execution of judgments;

(4) For the protection of your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;

(5) Your personal information disclosed to the public by yourself;

(6) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

5. How do we protect the security of personal information

(1) We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or without authorization be accessed, publicly disclosed, used, modified, damaged, lost or leaked.

(2) We will protect your personal information with reasonable and feasible means such as encryption technology and anonymization processing that are no less than industry peers, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

(3) We will establish a special security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data usage and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner.

(4) Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist in the Internet industry , even if we do our best to strengthen security measures, it is not always possible to ensure that the information is 100% secure, and we will do our best to ensure the security of the personal information you provide to us. You know and understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account passwords, SMS verification codes and other personal information to others.

(5) We will formulate contingency plans, and immediately activate contingency plans when user information security incidents occur, in an effort to prevent the impact and consequences of such security incidents from expanding. In the event of a user information security incident (leakage, loss, etc.), we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can voluntarily Recommendations for preventing and mitigating risks, remedies for you, etc. We will promptly notify you of the relevant information of the event in the form of push notifications, emails, letters, text messages, etc. When it is difficult to inform you one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

(6) We would like to remind you that the personal information protection measures provided in this "Privacy Policy" only apply to " " and related services. Once you leave " " and related services, browse or use other websites, services and content resources, we have no ability and obligation to protect any personal information you submit on software and websites other than " " and related services, regardless of your login, Browsing or using the above software, whether the website is based on " " links or guidance.

VI. YOUR RIGHTS

We attach great importance to the management of your personal information, and do our best to protect your rights to query, access, modify, delete, withdraw consent and authorization, cancel your account, make complaints and report, and set up privacy functions for your personal information, so that you can Have full capabilities to protect your privacy and security.

(1) Access, delete and correct your personal information

You can manage your information in the following ways:

1. Access personal account information:

You can inquire, access, and correct your avatar, user name, profile and other basic information. You can inquire, access, and correct in the "Edit Profile" or "System Settings" of .

2. Query access, correction, and unfollow your account; query access fans, visitor information:

Enter - click "My" - click "Follow" to access the follow account, you can also unfollow; click "Followers" to check the number of followers - click the number of followers to display the user name and avatar of the followers.

3. Query access, change, delete your favorite records: Click "My" - click "My Favorites" to enter query access, delete.

4. Delete postings, questions and answers, comments:

(1) Published content: Enter Click "My" to enter "Dynamic" - click the "..." symbol in the upper right corner of a single content to delete;

(2) Comment content: You can delete your comment by visiting a single comment content and visiting the page.

5. Query order: Enter Click "My" - click "My Order" to query.

(2) Independent choice and control of personalized recommendation information

1. Independently decide to receive information

Our relevant information recommendation and other functions may be made based on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. When you are not interested in the information we push or want to reduce certain information recommendations, you can click Push the "X" in the information bar and select the relevant reason to block. This will help you control and make independent decisions about the push information.

2. Information required for self-subscription

In the follow channel, it will be displayed according to the account information you actively choose to follow, and you can choose to follow or unfollow.

3. You can also contact us by logging into the "User Feedback" page of the " " client, and we will respond to your feedback in a timely manner.

(3) Change the scope of your authorization and consent or withdraw authorization

You can turn off the relevant permissions in the device's own operating system to change the scope of consent or withdraw your authorization. We will no longer collect information related to these permissions after the authorization is withdrawn.

Please understand that certain business functions and services will require your information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization. Your corresponding personal information is also no longer processed. However, your decision to withdraw your consent or authorization will not affect the personal information processing previously carried out by this application based on your authorization.

(4) Cancelling your account

You can apply for account cancellation by clicking "My" - "Settings" - "System Permissions" on the " "client". For the cancellation process and content, please refer to "Account Cancellation Instructions". Before you cancel your account, We will verify your personal identity, security status, device information, etc. You know and understand that the act of canceling your account is irreversible. Except as otherwise provided by laws and regulations.

(5) Complaints and reports

If you think that your personal information rights may be infringed, or find clues that violate your personal information rights (for example: think that we collect your personal information in violation of legal provisions or mutual agreement), you can pass the "my"-" User Feedback" page to contact us. We will promptly feedback your complaints and reports after verification.

(VI) Access to Privacy Policy

You can view the entire content of this "Privacy Policy" on the registration page, or log in to the "My-Settings" page of your personal account, or view the entire content of this "Privacy Policy" through the home page of the web page.

(7) To inform you of the suspension of operation

If we stop operating, we will stop collecting your personal information in a timely manner, notify you in the form of one-by-one delivery or announcement, and delete your personal information held or anonymized.

VII. Terms for minors

If you are a minor under the age of 18, before using " " and related services, you should read and agree to this "Privacy Policy" under the supervision and guidance of your parents or other guardians. We protect the personal information of minors in accordance with the relevant national laws and regulations, and will only collect, use, store, share, transfer or disclose unidentified information when permitted by law, with the explicit consent of parents or other guardians, or when necessary to protect minors. Personal information of adults; if we become aware that personal information of minors has been collected without prior verifiable parental consent, we will seek to delete the information as soon as possible. If you are the guardian of a minor, when you have questions about the personal information of the minor under your guardianship, please contact us through the contact information published in this Privacy Policy.

VIII. Revision and Notice of Privacy Policy

(1) In order to provide you with better services, " " and related services will be updated and changed from time to time, and we will revise this "Privacy Policy" from time to time, and these revisions form part of this "Privacy Policy" and have equivalent For the purposes of this Privacy Policy, we will not reduce your rights under the currently effective Privacy Policy without your express consent.

(2) After this "Privacy Policy" is updated, we will issue an updated version at " ", and remind you of the updated content through the official website announcement or other appropriate means before the updated terms take effect, so that you can keep abreast of the updated content. The latest version of this Privacy Policy.

Nine, third-party SDK mobile phone usage information description

In order to ensure the stable operation of Keruyun services or realize related functions, we may access software development kits (SDKs) provided by our affiliated third parties and/or authorized third parties to achieve the aforementioned purposes. We will do our duty of prudence and conduct strict security monitoring on the software tool development kits (SDKs) used by partners to obtain information to protect data security.

The third-party SDKs we access mainly serve the needs of you and other users. Therefore, we may adjust the third-party SDKs we access to meet new service requirements and business function changes. We will disclose to you the latest information on accessing third-party SDKs in this description in a timely manner. The third-party SDKs currently accessed by Keruyun are listed as follows:

Youmeng SDK

Functions: program exception error detection, version daily activity statistics; image or web page sharing

Type of personal information collected: device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/geolocation, etc.), software installation list

Link to Third Party Privacy Policy: https://www.umeng.com/page/policyClick to copy p>

IFLYTEK

Function: Provide voice input and recognition functions

Types of personal information collected: network status, device identifiers, storage, file reads and writes

Link to third-party privacy policy: https://www.xfyun.cn/doc/policy/privacy.html Click to copy

Tencent

Function: Provide update function, product creation, menu identification, positioning

Types of personal information collected: device identifiers, network monitoring, location information, device information

Link to third party privacy policy: https://lbs.qq.com/mobile/androidLocationSDK/androidGeoGuide/androidInfo Click to copy

Aurora

Function: message push

Type of personal information collected: device identifier, network monitoring, device IMEI, Wi-Fi_mac address, location information, software installation list

Link to third-party privacy policy: https://www.jiguang.cn/license/privacyClick to copy p>

Gode

Function: positioning, track collection

Types of personal information collected: location information, device information, Wi-Fi_mac address

Link to third party privacy policy: Click to copy

X. Scope of application

This "Privacy Policy" applies to all services provided by the operator. Unless otherwise specified in this "Privacy Policy", the terms used in this "Privacy Policy" have the same meanings as those defined in the "User Agreement". This Privacy Policy does not apply to:

1. Other third-party products or services, which may include products or websites and advertising content displayed to you in personalized recommendations or other products or websites linked to in the " " service;

2. Other third parties advertising services for " "

Your use of these third-party services (including any personal information you provide to these third parties) will be governed by the terms of service and privacy policies of those third parties (not this Privacy Policy), specifying Please read the terms of the third party carefully. Please properly protect your personal information and only provide it to third parties when necessary.

3. Please understand that the " " and related services described in this "Privacy Policy" may vary according to the mobile phone model, system version, software application version, mobile client and other factors you use. different. The final products and services are subject to the " " and related services you use.

Eleven, other

1. If you have complaints, suggestions or questions about personal information protection, you can send your questions to (callPhone2020@163.com) or mail them to the following address:

Accord International 3022 Big Data Department Data Security and Privacy Protection Center, Yuelu District, Changsha

We will review the issue as soon as possible and respond within fifteen business days of verifying your user identity.

2. If you have any questions, comments or suggestions about the content of this "Privacy Policy", you can contact us by logging in to the "User Feedback" page in the " " client