Release date of this edition: November 29, 2021
- Collection of personal information
- App end users' authorization and consent
- Sharing, transfer and public disclosure of personal information
- Protection of personal information
- Your rights to personal information
- Special protection of personal information of minors (including children)
- Applicable Law and Dispute Resolution
- Contact us
- Keyword description
# 1、Collection of personal information
1.1 Information you provide or we collect
When you register an account with this product or use the various business functions provided by this product, this product will collect the relevant information you provide Human information, under the condition of the existing technical level, is used to provide you with services, improve our service quality, and protect your account Household safety and compliance with national laws, regulations and regulatory requirements:
(1) User registration
** APP developers first need to register a product account to become a user of this product. When registering, APP developers need to At least provide us with the email address you used to register your account. **
(2) The functions necessary to realize our products and services
In order to implement the business functions of the Crasheye SDK, we need to collect relevant personal information from App developers and/or end users, Mainly include: equipment manufacturer and model, equipment disk space and network status, equipment software version information and operating system, Product crash information, IDFV, log information.
1.2 Information we obtain from third parties about APP developers and/or end point end users
We may indirectly obtain APP developers and/or terminal users from third parties authorized and agreed by APP developers (our partners) Personal information of end users, the personal information obtained is the minimum amount necessary to realize the necessary functions of this product and/or service.
1.3 Information that does not require prior authorization and consent from the App developer and/or end users
** (1) Directly related to national interests such as national security and national defense security; related to public safety, public health, public information, etc Directly related to significant public interests; **
(2) Directly related to criminal investigation, prosecution, trial and execution of judgments;
（3）In order to protect your or other individuals' life, property, reputation and other major legitimate rights and interests, but it is difficult to obtain the consent of the individual;
（4）The personal information collected is disclosed to the public by you；
（5）Collecting personal information from legally publicly disclosed information, such as legal coverage, government information disclosure and other channels;
（6）Necessary to provide you with products and services or perform the contract according to your requirements;
（7）Necessary to maintain the safe and stable operation of the products or services provided, such as detecting and disposing of product or service failures;
（8）Necessary for legitimate coverage;
（9）When it is necessary to carry out statistical or academic research in the public interest, and it provides academic research or described results to the public, de-identifying the personal information contained in the results;
（10）Related to the personal information controller's fulfillment of obligations stipulated by laws and regulations;
（11）Other circumstances stipulated by laws and regulations.
Special Note: If the information we collect cannot be identified by third-party developers and/or end users alone or in combination with other information Personal identity, which is not personal information in the legal sense.
1.4 Information collected to be supplemented due to service updates
Due to the nature of our services, please know and understand that our services will be continuously updated and improved Additions and changes can and may occur. If we need to supplement the collection of a specific information about you due to service updates and improvements, I According to the actual situation, we will revise this policy, obtain your authorization separately, page prompts, and publish announcements. One or more of them are stated to you separately for your consent.
1.5 Rules for the use of personal information
(1) We will, in accordance with this policy and/or the contract with the App developer, and only to realize the functions of this product and/or service, Process the personal information collected. If it is necessary to use the collected personal information for other purposes, we will use reasonable means Inform the app developer and use it after the app developer has obtained the consent of the end users.
(2) After the products and/or services we provide to the App developer cease to operate, or the App developer and/or end users After withdrawing the authorization of personal information, or after the app developer and/or end users cancel the account, we will reasonably Destroy or anonymize all personal information received from App developers and/or end users for a period of time, unless otherwise required by law There are rules.
# 2. Authorization and consent of App end users
App developers integrate this product into their apps, and in order to provide this product and/or service to end users, we will collect,
Store and process personal information from app developers and/or end users.
App developers are requested to acknowledge and agree:
2.1 The App Developer has complied and will continue to comply with applicable laws, regulations and regulatory requirements to collect, use and process the App Personal information of end users, including but not limited to formulating and publishing relevant personal information protection statements or Privacy Policies;
2.2 The App Developer has informed the App end users and has obtained sufficient, necessary and explicit authorization from the end users Intention and permission (including obtaining the authorization and consent of the child's guardian to provide personal information where the end user is a child), for the purpose of providing For the purposes of this product and/or service and corresponding to the functionality of the App, we will collect and share and how to use it (including permission Allow us to collect and process the personal information of App end users in accordance with the provisions of this statement;
2.3 Unless otherwise provided by applicable law, the App Developer has informed end users and obtained sufficient and necessary grants from end users Rights, consent and permission to allow us to process the personal information we have collected, and in compliance with relevant laws and regulations Under the premise, the information collected and processed can be used for the purposes specified in this policy;
2.4 App developers have provided end users with an easy-to-operate user rights realization mechanism, and explained that end users can How and when to exercise the right to choose, how to access, correct their personal information, and exercise the right to delete and change their authorization The scope of consent and other operations.
# 3. Sharing, transfer and public disclosure of personal information
3.2 We may share necessary personal information of App developers and/or end users with partners and third parties to Guarantee the smooth completion of services for app developers and/or end users. Our partners do not have the right to share individuals Information for any other purpose.
3.3 Transfer and public disclosure of personal information
According to relevant laws, regulations and national standards, we may share, transfer, and publicly disclose personal information in the following situations No prior authorization is required:
（1）Directly related to national security and national defense security;
（2）Directly related to public safety, public health, and major public interests；
（3）Directly related to criminal investigation, prosecution, trial and execution of judgments；
（4）In order to protect the life, property and other major legitimate rights and interests of personal information subjects or other individuals, but it is difficult to obtain the same Intended;
（5）You disclose personal information to the public on your own, or obtain your explicit consent or authorization in advance；
（6）Collecting personal information from legally publicly disclosed information, such as legal coverage, government information disclosure and other channels.
（7）Comply with the relevant agreement signed with you (including the user agreement signed online) or other legal documents。
（8）According to laws and regulations or mandatory administrative or judicial requirements。
# 5. Storage and protection of personal information
（1）User log information: The retention period is 60 days。
（2）Internet security protection technical measures record backup: retention period of at least 60 days。
In the event of termination of operation of our products, we will make an announcement in advance. After the retention period is exceeded, we Your personal information will be deleted or anonymized, but national laws, regulations, regulatory documents or the government Unless otherwise required by our policies, orders, etc., or to retain your personal information to fulfill our compliance obligations.
The personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.
** This product will make all reasonable efforts to protect its access to your personal information under the conditions of the current state of the art. To prevent your Personal information is illegally accessed, copied, modified, transmitted, lost, destroyed, disposed of in an accidental and unauthorized manner Management or use. We use multi-faceted security protection measures (including technical protection measures, management system measures, etc.) to Ensure a reasonable level of security for the protection of your personal information.
This product will use encryption technology (such as SSL), firewall, restrict unauthorized access, de-identification or anonymization And other technical means to protect your personal information. We will also continue to strengthen software security capabilities, such as the local completion of the device Encrypt part of the information to consolidate secure transmission; know the application information installed on your device and the process information running, To prevent malicious programs such as viruses and Trojans. < br > However, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if you do your best Security measures can be enhanced, and it is impossible to guarantee 100% security of information at all times. You need to know that you access our service The systems and communication networks used by the service may cause problems due to factors beyond our control.
We will continue to improve the relevant management system, and simultaneously establish relevant processes and organizations to further protect your personal information Prevent your personal information from being accessed, used or disclosed by unauthorized persons. We will strictly limit access to information Scope of personnel, and sign a non-disclosure agreement with the aforementioned personnel. Those who violate the obligation of confidentiality will be subject to the provisions of the management system Penalty. **
We will take all reasonably practicable steps to ensure that no irrelevant personal information is collected. We will only meet the requirements of this policy Retain your personal information for the period required for the stated purposes, unless an extended retention period is required or permitted by law.
5.3 Security Incident Handling
In the event of a security incident such as leakage, damage, or loss of personal information, we will activate an emergency plan to prevent the expansion of security incidents After a security incident occurs, we will promptly notify App developers and/or end users in the form of push notifications, emails, etc The basic situation of the whole incident, the dispositions and remedies we are about to or have taken, and our response to the app developer Suggestions for coping.
# 6. How app developers and/or end users manage their personal information
We attach great importance to the management of personal information by app developers and/or end users and make every effort to provide access to personal information
The rights to inquire, access, modify, delete, complain and report, and set privacy features, etc., to enable App developers and/or
End users have the ability to protect their own privacy and information security.
6.1 For App Developers
6.2 For App end users
Since App end users are not our direct customers, we recommend:
(2) When end users directly claim the rights of personal information subjects to us, necessary supporting documents shall be provided, and we will also Authenticate end users. We will verify the identity of end users with app developers to protect the end users app account If the number is safe, we will respond to relevant requests from end users;
(4) For personal information processing activities based on the consent of end users, end users have the right to withdraw the consent. Due to this There is no direct interactive dialogue interface between the product and end users, please end users directly claim the right to withdraw consent to the app developer Profit.
6.3 Respond to reasonable requests from App developers and/or end users
We will respond to reasonable requests from app developers and/or end users, such as unprovoked duplication, excessive technical means (For example, a new system needs to be developed or existing practices fundamentally changed), a risk to the legitimate rights and interests of others, or extraordinary Unrealistic requests, we may refuse.
We will not be able to respond to requests from App developers and/or end users in the following situations:
（1）Related to our performance of our obligations under laws and regulations；
（2）Directly related to national security and national defense security；
（3）Directly related to public safety, public health, and major public interests；
（4）Directly related to criminal investigation, prosecution, trial and execution of judgments;
（5）We have sufficient evidence that the App developer and/or end users have subjective malice or abuse of power；
（6）In order to safeguard the significant legitimate rights and interests of the life and property of the app developer and/or end users or other individuals, but it is very important It is difficult to get my consent；
（7）Responding to requests from app developers and/or end users will result in the legal rights of app developers or other individuals, organizations Benefits are seriously damaged;
（8）Involving trade secrets.
If the App developer and/or end users have doubts about the realization of the above rights, they may follow the methods described in Article 9 of this statement Contact us.
# 7. Special protection of personal information of minors (including children)
If you use third-party products and services through this product, the relevant information you provide to such third parties will also apply to the Privacy Policies of Third Parties.
# 9. Applicable Law and Dispute Resolution
# 10. Contact us
Our registered address is located on the 12th Floor, Block B, Jiachen International, No. 663, Vientiane South Road, Sichuan (Chengdu) Pilot Free Trade Zone, such as
Suggestions or complaints can be contacted as follows (in general, we will respond within 15 working days):
Contact information of our personal information protection officer: Tel: 028-85309911.
In order to protect your personal information and your rights and interests, for matters that may affect your personal information or other rights and interests, We may ask you to authenticate.
# Eleven, keyword description
Means a company or other legal entity controlled by a party, or controlled by a party, or jointly controlled by a third party, Control means that one party controls the state of the other party through control methods such as holding shares, majority voting rights, and agreements, or as determined by the people's court In other ways.