Quick launch User Privacy Policy
Published: August 26, 2021
Effective Date: August 26, 2021
Tip Terms.
Your trust is very important to us, we understand the importance of personal information to you, we will take appropriate security protection measures in accordance with legal and regulatory requirements, and strive to protect the security of your personal information under control. In view of this, the Little Shortcut service provider (or "we") has established this User Privacy Policy (hereinafter referred to as "this Policy / this Privacy Policy") and reminds you that.
This Policy applies to all products and services provided by Quick launch, including but not limited to applications for computers, mobile smart terminals, web pages, software development kits (SDKs) and application programming interfaces (APIs) for third-party websites and applications,and products and services that are constantly being developed and innovated. If there is a separate privacy policy for one or more of the services provided by Quick launch, the privacy policy for those services, together with this Privacy Policy, will constitute a complete user privacy policy.
In particular, this policy does not apply to services provided to you by other third parties. To ensure a smooth product experience, you may receive content or web links from third parties. Please choose carefully whether to access links, content, products and services provided by third parties. Please read the privacy policies of these third parties carefully before submitting personal information to them.
Before using our products or services, please make sure you read and thoroughly understand this policy, especially the terms marked in bold/bold underline, which you should focus on, and make sure you fully understand and agree to it before you start using it. If you have any questions, comments or suggestions regarding the content of this policy, you
may contact us through the various contacts provided by Quick launch.
Part I. Definitions
Shortcuts: refers to the website (domain name is launch-app.snsxiong.com) and client developed and operated by the service provider of the "Shortcuts" platform, which is designed to provide users with tasks as the main content.
Small Shortcuts Service Provider: The team and organization that develops and provides the products and services of the "Small Shortcuts" task platform.
Child: means a minor under the age of fourteen.
Personal Information: Information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information.
Sensitive Personal Information: Personal information including identification numbers, personal biometric information, bank account numbers, property information, whereabouts, transaction information, child information, etc. (We will prominently identify specific sensitive personal information in bold in this Privacy Policy).
Personal information deletion: Refers to the act of removing personal information from the system involved in the realization of daily business functions, so that it remains unretrievable and inaccessible.
Part II Privacy Policy
This privacy policy section will help you understand the following.
I. How we collect and use your personal information
II. How we use cookies and similar technologies
How we share, transfer, and publicly disclose your personal information
Fourth, how we protect your personal information
V. How you manage your personal information
VI. How we handle personal information of children
VII. How your personal information is transferred globally
VIII. How to update this privacy policy
IX. How to contact us
I. How we collect and use your personal information
You understand and agree that
1、We are committed to creating a variety of products and services to meet your needs. Because we provide you with a variety of products and services, and different users choose to use the specific products / services range of differences, accordingly, the various functions and the type and scope of personal information collected and used will be different, please refer to the specific product / service features;.
2. In order to bring you a better product and service experience, we are continuously working to improve our technology, and we may introduce new or optimized features from time to time, which may require the collection and use of new personal information or change the purpose or manner of using personal information. In this regard, we will separately explain to you the purpose, scope and use of the corresponding information by updating this policy, pop-up windows, page prompts, etc., and provide you with the means to choose your own consent, and collect and use it after obtaining your express consent. In this process, if you have any questions, comments or suggestions, you can contact us through the various contact information provided in Article 9 "How to Contact Us", and we will provide you with answers as soon as possible.
(A) Help you become our user
1、Registration service
In order to help you become our user, so that we can provide you with user services. You need to provide your cell phone number to directly create an account (or verification code) to become our registered users
2、Information improvement
You can choose to further improve the account information of this product, such as filling in nicknames, gender and other information, but if you do not provide this information, it will not affect your use of the basic services provided by this product.
3、Account cancellation
In the case of meeting the agreed conditions of the service agreement of small shortcut single service and the relevant national laws and regulations, we will also provide the cancellation of registered accounts, you can contact customer service or follow the specific guidelines of the single service to operate.
(B) Customer service and problem solving
Contact us through customer service consultation and other means: When you contact us, we will collect the content of the consultation you provide and your contact information (account number, address, email, communication/call records and content or other contact information you leave) and other information in order to contact you or help you solve the problem, or record the relevant problems and results of the processing plan.
(iii) To provide you with security
In order to prevent, detect, investigate fraud, compromise account security or other violations of our agreement with you, or to achieve the purpose of your visit, we will collect your network information, device information, cell phone model, hardware information and system information. To better prevent network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, and to more accurately identify violations of laws and regulations or our relevant agreement rules, we may use or integrate your membership information, device information, service log information, and information that our partners have obtained your authorization or shared in accordance with the law, to make a comprehensive determination of your account and transaction risks, to verify your identity, to detect and prevent security incidents, and take necessary record, audit, analysis and disposal measures in accordance with the law.
(D) Other
1、If the information you provide contains personal information of other users, you need to ensure that you have obtained legal authorization before providing such personal information to us.
2、If we use the information for other purposes not stated in this policy, or use the information collected for specific purposes for other purposes, or if we take the initiative to obtain your personal information from third parties, we will obtain your prior consent.
If we obtain your personal information indirectly from a third party, we will explicitly request the third party in writing to collect personal information after obtaining your consent in accordance with the law and inform you of the content of the information to be shared, and require your explicit confirmation before providing sensitive information to us for use, and require the third party to make a commitment to the legality and compliance of the source of personal information, and if the third party violates the law If the third party has violated the law, we will explicitly ask the other party to bear the corresponding legal responsibility; at the same time, our professional security team will carry out security reinforcement of personal information (including sensitive information reporting, encrypted storage of sensitive information, access rights control, etc.). We will use no less than the same protection means and measures as we do for our own users' personal information to protect the personal information indirectly obtained.
3、Exceptions for authorized consent
You fully understand and agree that we collect and use your personal information without your authorized consent in the following cases, and we may not respond to your requests for correction/correction, deletion, cancellation, withdrawal of consent, request for information.
(1) related to national security, national defense security.
(2) related to public safety, public health, and vital public interest.
(3) related to crime investigation, prosecution, trial and sentence enforcement and other judicial or administrative law enforcement
(4) For the purpose of safeguarding your or other individuals' life, property and other significant legitimate rights and interests but where it is difficult to obtain your consent
(5) Personal information that you disclose to the public on your own.
(6) Personal information collected from legitimate public disclosures, such as legitimate news reports, government information disclosure and other channels.
(7) Necessary for the conclusion and performance of relevant agreements or other written documents with you
(8) Necessary for maintaining the safe and stable operation of the products and/or services provided, such as detecting and disposing of malfunctions of products and/or services.
(9) Necessary for legitimate news reporting.
(10) necessary for academic research institutions to conduct statistical or academic research in the public interest and to de-identify the personal information contained in the results when providing the results of academic research or descriptions to the public
(11) Other circumstances as provided by laws and regulations.
Please be aware that, in accordance with applicable law, if we take technical and other necessary measures to process personal information in such a way that the recipient of the data cannot re-identify a specific individual and cannot recover it, or we may de-identify the information collected for research, statistical analysis and forecasting purposes, for the purpose of improving our content and layout, supporting products or services for business decisions, and improving our products and (including the use of anonymous data for machine learning or model algorithm training), such
processed data may be used without separate notice to you and without your consent.
4. If we cease to operate our products or services, we will promptly stop collecting your personal information, notify you of the cessation of operations on a case-by-case basis or by public announcement, and delete or anonymize the personal information we hold in connection with the shutdown.
II. How we use cookies and similar technologies
(A) Cookie
To ensure that the Quick launch Missions Platform works properly, to make your visit experience easier, and to recommend content that may be of interest to you, we may store on your computer or mobile device cookies, Flash cookies, or other local storage provided by your browser (or associated application) that typically contains an identifier, site name, and certain numbers and characters (collectively "cookies"). With the help of cookies, websites are able to store data such as your preferences.
If your additional services allow, you may modify your acceptance of cookies or refuse our cookies. for more information, please see AboutCookies.org. but if you do so, you may not enjoy a better experience with our services and in some cases may not be able to access our site safely and may need to, each time you visit our site change user settings each time you visit our site.
(ii) Cookie-Like Technology
In addition to cookies, we may use web beacons, pixel tags, ETags, and other similar technologies.
For example, an email we send you may contain a link to an address that links to content on our site, and if you click on that link, we track that click to help us understand your product or service preferences so that we can proactively improve our customer service experience. A web beacon is typically a transparent image embedded in a website or email. With the help of a pixel tag in the email, we can tell if the email was opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
ETag (Entity Tag) is an HTTP protocol header that is transmitted behind the Internet browser and the Internet server and can replace cookies. ETag can help us avoid unnecessary server load, increase the efficiency of our services, save resources, energy, and we may use ETag to record your identity so that we can gain more insight and improve our products or services. Most browsers provide users with the ability to clear browser cache data, and you can perform the appropriate data clearing operations in the browser settings function. However, please note that if you disable ETag, you may not be able to enjoy a relatively better product or service experience.
III. How we share, transfer and publicly disclose your personal information
(A) Sharing
We will not share your personal information with companies, organizations and individuals other than the small shortcut service providers, except for the following cases.
1、Sharing under legal circumstances:We may share your personal information to the public in accordance with laws and regulations, litigation, dispute resolution needs, or as requested by administrative or judicial authorities in accordance with the law.
1、Sharing under legal circumstances: We may share your personal information to the outside world in accordance with laws and regulations, litigation, dispute resolution needs, or as requested by administrative or judicial authorities in accordance with the law.
2. Sharing with express consent: We may share your personal information with other parties after obtaining your express consent.
3. Sharing with authorized partners: We may entrust authorized partners to provide certain services to you or perform functions on our behalf, and we will only share your information for the lawful, legitimate, necessary, specific and explicit purposes stated in this Privacy Policy.
Currently, our authorized partners include the following types.
(1) Authorized partners in the content analysis services category. The content may be provided to you by our partners or in conjunction with software service providers, smart device providers, or system service providers (hereinafter referred to as "Service Providers"). We do not share your personally identifiable information with our partners who provide content and analytics services unless we have your permission to do so. We may engage these partners to process information related to content coverage and effectiveness, but we will not provide your personally identifiable information. We will share de-identified personal information with these Service Providers, etc., to create an indirect population profile based on aggregate statistics and algorithmic feature and preference analysis, without identifying you personally. Class partners may combine the above information with other data they have legitimate access to in order to perform the content services or decision-making recommendations we have commissioned.
(2) Vendors, Service Providers and Other Partners. We send information to vendors, service providers, and other partners who support our business by providing technical infrastructure services commissioned by us, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, facilitating payments, or conducting academic research and surveys.
We conduct strict security checks on the application programming interfaces (APIs), software tool development kits (SDKs) that our authorized partners use to access the information in question, and agree with our authorized partners on strict data protection measures to make them handle personal information in accordance with the purpose of our engagement, the service description, this Privacy Policy, and any other relevant confidentiality and security measures.
(ii) Transfer
We will not transfer your personal information to any company, organization or individual, except for the following.
(1) Transfer with express consent: we will transfer your personal information to other parties after obtaining your express consent.
(2) In the event of a merger, acquisition or bankruptcy liquidation situation of our product service provider, or other situations involving merger, acquisition or bankruptcy liquidation involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this policy, or we will require the company, organization and individual to seek authorized consent from you again.
(iii) Public Disclosure
We will only disclose your personal information publicly if we
(1) With your express consent or based on your unsolicited choice, we may disclose your personal information publicly.
(2) If we determine that you have violated laws and regulations or seriously violated the rules of the relevant agreement of this product, or to protect the personal and property safety of users of this product and its affiliates or the public from infringement, we may disclose personal information about you with your consent in accordance with laws and regulations or the rules of the relevant agreement of this product, including the relevant violations and the measures that this product has taken against you.
(D) Exceptions to prior authorized consent for sharing, transferring, or publicly disclosing personal information
In the following cases, prior authorized consent is not required for sharing, transferring, or publicly disclosing your personal information.
1、Related to national security or national defense security
2、Related to public safety, public health, and significant public interest
3, related to crime investigation, prosecution, trial and execution of judgments, etc.
4、For the purpose of safeguarding your or other individuals' life, property and other significant legitimate rights and interests but it is difficult to obtain your consent
5、Personal information that you disclose to the public on your own.
6、Personal information collected from legitimate public disclosures, such as legitimate news reports, government information disclosure and other channels.
According to the law, sharing or transferring personal information that has been de-identified and ensuring that the recipient of the data cannot recover and re-identify the subject of the personal information is not an act of sharing, transferring or publicly disclosing personal information to the public, and there will be no need to separately notify you and obtain your consent for the preservation and processing of such data.
IV. How we protect the security of your personal information
(a) We have taken reasonable and feasible security measures in accordance with industry standards to protect your information from unauthorized access, public disclosure, use, modification, damage or loss. For example, the exchange of data between your client and server is protected by SSL protocol encryption; we also provide HTTPS protocol for secure browsing of the Quick launch website; we use encryption technology to enhance the security of personal information; we use trusted protection mechanisms to prevent malicious attacks on personal information; we deploy access control mechanisms and make every effort to ensure that only authorized personnel have access to We will use trusted protection mechanisms to prevent malicious attacks on personal information; we will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; and we will conduct security and privacy training courses to enhance employee awareness of the importance of protecting personal information.
(b) We have an industry-advanced data security management system that is data-centric and revolves around the data lifecycle, and we will improve the security of the entire system in multiple dimensions, including organizational construction, system design, personnel management, and product technology.
(c) We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only retain your personal information for as long as necessary to achieve the purposes described in this policy, unless there is a mandatory retention requirement by law. In turn, the criteria we use to determine the aforementioned period
include.
1. ensuring the security and quality of the services we provide to you.
2、Whether you agree to a longer retention period.
3. whether there is any other special agreement on the retention period.
After your personal information has been retained beyond the retention period, we will delete your personal information or make it anonymous for processing in accordance with the requirements of applicable law.
(d) The Internet is not an absolutely secure environment, and when using the services of Quick launch, we strongly recommend that you do not send your information using communication methods other than those recommended by the Mission Platform. You can connect and share with each other through our services. When you create a share through our Services, you can independently choose who you share with as a third party who can see information related to your share content,
etc.
Please note that the information you voluntarily share or even publicly share when using our Services may involve personal information or even personally sensitive information about you or others. Please consider more carefully whether to share or even publicly share relevant information when using our services.
We will make every effort to safeguard the security of any information you send to us. If our physical, technical or administrative safeguards are compromised, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will assume appropriate legal liability.
(e) We will update and disclose the security risks, personal information security impact assessment report and other relevant contents from time to time, which you can obtain through our announcement method.
(f) After the unfortunate occurrence of personal information security events, we will inform you in accordance with the requirements of laws and regulations: the basic situation of the security event and the possible impact, the disposal measures we have taken or will take, the recommendations you can independently prevent and reduce the risk, the remedial measures for you, etc. We will inform you by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to publish the announcement.
At the same time, we will also report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.
V. How you manage your personal information
You can access and manage your personal information in the following ways.
(a) Access to your personal information
(1) You have the right to access your personal information, except for the exceptions provided by laws and regulations. You can access your personal information by yourself in the following ways.
Account Information - If you wish to access or edit your personal profile information in your account, you may perform such action by logging into your account.
(2) If you are unable to access such personal information through the above path, you may contact us at any time through the online customer service provided by Quick launch. We will respond to your request for access within 15 days.
(3) For other personal information generated in the course of your use of our products or services, we will provide it to you in accordance with the arrangements set forth in "Paragraph (7) of this Article in response to your request above".
(ii) Correction or addition of your personal information
When you discover an error in the personal information we process about you, you have the right to request that we correct or supplement it. You may make a request for correction or supplementation in the manner specified in "(a)
Access to your personal information".
(iii) Deletion of your personal information
(1) You may make a request to us to delete your personal information in the following cases.
1、If our handling of personal information violates laws and regulations.
2、If we collect and use your personal information without your explicit consent.
3、If our handling of personal information is in serious violation of the agreement with you.
4、If you no longer use our products or services, or if you voluntarily cancel your account.
5、If we permanently stop providing products or services to you.
(2) When you delete information from our service, we may not immediately delete the corresponding information from the backup system, but will delete such information when the backup is updated.
(4) Change the scope of your authorized consent
Each business function requires some basic personal information in order to be completed (see "Section II" of this Privacy Policy). In addition, you may withdraw some of your authorization by unbinding, modifying your personal settings, deleting relevant information, or revoking some of your authorization by closing the function.
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out based on your authorization.
(V) Constraint on automatic decision-making in information systems
In some business functions, we may make decisions based solely on non-manual automated decision-making mechanisms, including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will provide a method of appeal without violating the trade secrets of the product or the rights and interests of other users or the public interest.
(f) Response to your request above
(1) For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity first before processing your request.
(2) We will respond within 15 days. If you are not satisfied, you may also initiate a complaint through the customer service contact information set forth in Article 9 of this Privacy Policy.
(3) In principle, we do not charge a fee for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a cost fee as appropriate. We may reject requests that are unnecessarily repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes to current practices), pose a risk to the legal rights of others, or are highly impractical.
(4) In the following cases, we will not be able to respond to your request in accordance with legal and regulatory requirements.
1、Related to national security or national defense security.
2、Related to public safety, public health, and significant public interests
3、Related to crime investigation, prosecution, trial and execution of judgment, etc.
4、where there is sufficient evidence of subjective malice or abuse of rights by the subject of personal information
5、Response to your request will lead to serious damage to the legitimate rights and interests of you or other individuals or organizations
6、where commercial secrets are involved.
VI. How we handle children's personal information
Children are not allowed to create their own user accounts without the consent of their guardians. If you are a child, we ask that you ask your guardian to read this privacy policy carefully and to use our services or provide us with information with the consent of your guardian.
In the case of personal information collected from children with the consent of their guardians to use our products or services, we will only use, share, transfer or disclose this information as permitted by law or regulation, with the express consent of the guardian, or as necessary to protect the child.
VII. How your personal information is transferred globally
Personal information collected and generated in our operations in the People's Republic of China is stored in China, except in the following cases.
1、Explicitly provided by laws and regulations.
2、Obtain your explicit authorization.
For the above cases, we will ensure that your personal information is adequately protected in accordance with this privacy policy. In the case of exit, the exit security assessment will be conducted in accordance with the relevant national regulations.
VIII. How to update this privacy policy
Our privacy policy may be changed, except for laws, regulations or regulatory provisions otherwise mandatory, the adjusted or changed content is effective 7 days after the notification or publication. If you continue to use any of the services provided by Little Shortcut or visit the relevant website or relevant application after the adjustment or change of the Privacy Policy, we believe that this means you have fully read, understood and accepted the revised Privacy Policy and are bound by it.
(1) We will not limit your rights under this Privacy Policy without your express consent. We will post any changes to the Privacy Policy on a dedicated page.
(2) We will also provide more prominent notice of material changes (including notice via posting on our website or even providing you with a pop-up notice).
Material changes within the meaning of this policy include, but are not limited to.
1. Significant changes to our service model. Such as the purpose of handling personal information, the type of personal information handled, the way personal information is used, etc.
2. Significant changes in our control, etc. such as change of owner caused by mergers and acquisitions, reorganization, etc.
3、Changes in the main recipients of personal information sharing, transfer or public disclosure.
4、Significant changes in your rights to participate in the handling of personal information and the way it is exercised.
5、When there is a change in the department responsible for handling personal information security, our contact method and complaint channel.
6、When the personal information security impact assessment report indicates the existence of high risk.
IX. How to contact us
You can contact us through the following ways, and we will reply to your request within 15 days.
(1) If you have any questions, comments or suggestions about the content of this policy, you can contact us by calling our customer service number or online customer service; our office address.
➢ Attn: Little Teeny Bear (Shenzhen) Technology Co.
Address: 1983 Creative Town, Longgang District, Shenzhen
Zip code: 518100
(2) If you are not satisfied with our response, especially you think our personal information processing behavior has damaged your legitimate rights and interests, you can also seek a solution by filing a lawsuit to the court with jurisdiction in the defendant's domicile.