Privacy policy

Shenzhen Leqi Network Technology Co., LTD. ("we") understand the importance of personal information to you, and will do our best to protect your personal information security and reliability, we are committed to maintaining your trust in us, abide by the following principles, protect your personal information: the principle of consistency of authority and responsibility, the principle of clear purpose, the principle of choice of consent, at least enough principles, to ensure security principles, subject participation principles, the principle of transparency and so on. At the same time, we are committed to the industry's proven security solutions, to take appropriate security measures to protect your personal information. In view of this, we develop this User Privacy Policy (hereinafter referred to as the "This Policy / This Privacy Policy") and remind you that:

This policy applies toSmallGoGoproducts or services ("This Application").

Before using the products or services of this application, please be sure to read and thoroughly understand this policy and use the product or service after confirming your full understanding and consent. By starting to use the app's products or services, you fully understand and agree to this policy. If you have any questions, comments or suggestions about the content of this policy, you may contact us using the various contact details provided by this app.

This Privacy Policy section will help you understand the following:

I. How we collect and use your personal information;

II. How we use cookies and similar technologies;

III. How we share, transfer or publicly disclose your personal information;

IV. How we protect your personal information;

V. How you manage your personal information;

VI. How we handle the personal information of minors;

VII. How your personal information is transferred globally;

VIII. How to update this privacy policy;

IX. how to contact us;

I. How we collect and use your personal information

Personal information is information recorded electronically or in combination with other information that identifies or reflects the activities of a particular natural person, and we collect and use your personal information for the following purposes described in this policy:

1. Help you become our user

In order to complete the creation of an account so that we can provide you with services, you need to provide the following information: your email and other information. When you register, provide us with the registered email address (used to receive the verification code), and we will verify whether your identity is valid by sending the email verification code. You can modify and supplement your nickname, gender, avatar and other related information, all of which belong to your "account information". We collect the above information to provide you with account services and to protect your account security and prevent security risks.

In the course of use, if you provide the following additional information to complete your personal data, it will help us provide you with a better service and experience: your occupation, commonly used software, commonly used equipment and other information. But if you do not provide this information, it will not affect the basic functions of using this application product or service.

The above information you provide will continue to authorize us to use it during your use of this service. When you actively apply for cancellation of your account, we will make it anonymous or delete your personal information as soon as possible in accordance with the requirements of applicable laws and regulations.

2. Provide you with services

2.1 The information you provide to us

When you register an account or use our services, you provide us with relevant personal information, such as email addresses;

The shared information you provide to other parties through our services, and the information stored when you use our services. Before providing the aforementioned personal information of the other party to this application, you need to ensure that you have obtained their authorization and consent.

2.2 Information we collect during your use of the Services

In order to provide you with page display and search results that are more in line with your needs, to understand product adaptability, and to identify abnormal status of your account, we will collect information about the services you use and how you use them and associate these information. This information includes:

2.2.1 Device information:

To ensure the safe operation of your apps and services, we collect your device model number, device name, device unique identifier, login IP address, product version number, and mobile network information.

Developed based on the Ducloud uni-app (5+ App/Wap2App), our products need to collect your device's unique identification number (IMEI/android ID/IDFA, SIM IMSI information) during operation to provide statistical analysis services and improve performance and user experience through application startup data and exception error log analysis to provide users with better service.

Our products integrate a push SDK, which collects your device's unique identification number (IMEI/android ID/IDFA, MAC, OAID information) during application operation to facilitate user identification, and facilitates push link adjustment by service providers by obtaining application list (installation list) information to facilitate each other's shut-down SDK push process.

2.2.2 We grant specific permissions in the installation and use of the Software:

(1) Read photos or take photos

For example, when you modify profile picture information, comment, post comments, we ask you for album or camera permissions.

On some models, album read permissions are represented as "Read content on a memory card."

If you refuse to authorize album or camera permissions, you will not be able to use the features, but will not affect your normal use of other features of the app.

(2) Write album permissions

For example, when you use the download photo feature, we ask you for album write permissions or memory card write permissions.

On some models, album write permissions appear as "modify or delete content from memory cards."

(3) Get location permissions

For example, when you add device features using Bluetooth, we ask you for location permissions to better scan Bluetooth devices around you.

If you refuse to authorize the location permission, it will affect whether the APP can retrieve the surrounding Bluetooth devices, and the devices cannot be added, resulting in the inability to perform subsequent control operations.

(4) Get recording permission

For example, when you use the light effect pickup function in the light effect module, we will ask you for permission to record audio, that is, microphone permission, to collect audio stream information.

(5) The third-party SDK integrated in this application and the corresponding permissions

glide image library (package name: com.bumptech.glide): used to load images natively; need to read and write to external memory.

TBS Tencent browsing service (package name: com.tencent.smtt): User webview displays URL and related HTML pages.

Tencent Bugly (package name: com.tencent.bugly): collects logs such as bugs during the use of the user APP.

(6) Read the contents of the SD card (read storage space permission)

Permission function description: Provide the function of reading data in the storage space of the mobile phone

Usage scenario: when you are using the teleprompter to add scripting functions

Purpose: The APP assists in completing the new script operation by accessing the text document in the SD card and extracting the copy in the text document.

2.2.3 Log information: 

When you use the services provided by our website or client, we will automatically collect your detailed usage of our services and save them as relevant web logs. For example, the content of your search query, Idiv address, browser type, telecom operator, language used, date and time of visit, and records of web pages you visit, etc.

Please note that separate device information, log information, etc. are information that cannot identify a specific natural person. If we combine this type of non-personal information with other information to identify a specific natural person, or combine it with personal information, during the combined use period, this type of non-personal information will be treated as personal information, unless you have obtained your authorization Or unless otherwise provided by laws and regulations, we will anonymize and de-identify this type of personal information.

When you contact us, we may save your communication/call records and content or the contact information you left in order to contact you or help you solve problems, or record the solutions and results of related problems.

3. Exceptions with authorized consent

In accordance with relevant laws and regulations, the collection of your personal information in the following circumstances does not require your authorized consent:

3.1 Related to national security and national defence security;

3.2 Related to public safety, public health and major public interests;

3.3 Related to criminal investigation, prosecution, trial and enforcement of sentences;

3.4 In order to safeguard the personal information subject or other individual's life, property and other significant legitimate rights and interests, but it is difficult to obtain your consent;

3.5 The personal information collected is made public by you;

3.6 Collecting personal information from information that is legally publicly disclosed, such as legitimate news reports, government information disclosure, etc.;

3.7 necessary to enter into a contract at your request;

3.8 necessary for maintaining the safe and stable operation of the provided service, such as discovery or service failure;

3.9 necessary for legitimate news coverage;

3.10 The de-identification of the personal information contained in the results of a statistical or academic research institute necessary for an academic research institution to conduct a statistical or academic research institute in the public interest and to provide the results of academic research or description to the outside world;

3.11 Other circumstances as prescribed by laws and regulations.

If we stop operating this application service, we will promptly stop continuing the activities of collecting your personal information, will notify you of the suspension of operations in the form of one-by-one delivery or announcement, and delete or anonymize the personal information we hold.

II. How we use cookies and similar technologies

1. Cookie

To ensure that your website works, give you a easier access experience, we store small data files called cookies on your computer or mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. Cookies enable websites to store data such as your preferences.

2. Website beacons and pixel tags

In addition to cookies, we use other similar technologies on our website, such as web beacons and pixel tags. For example, emails/text messages we send you may contain address links linking to the content of our website, and if you click on that link, we will track that click to help us understand your product or service preferences so that we can proactively improve the customer service experience. A Web beacon is usually a transparent image embedded in a Web site or e-mail message. With pixel tags in e-mail messages, we can find out if an e-mail message is open. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

III. How we share, transfer and publicly disclose your personal information

1. Share

We do not share your personal information with companies, organizations, and individuals other than this App Service Provider, except in the following cases:

1.1 Sharing with your express consent: Once you have your express consent, we will share your personal information with other parties.

1.2 Sharing in statutory circumstances: We may share your personal information with the public in accordance with laws and regulations, litigation dispute resolution needs, or as required by the administrative and judicial authorities in accordance with the law.

1.3 Sharing with Authorized Partners: For the purposes stated in this Privacy Policy, certain of our services will be provided jointly by us and our Authorized Partners. We may share some of your personal information with partners to provide better customer service and user experience. For example, arrange for a partner to provide services. We will only share your personal information for legitimate, legitimate, necessary, specific, and explicit purposes, and only the personal information necessary to provide the Services. Our partners do not have the right to use shared personal information for other purposes unrelated to the product or service.

Currently, our authorized partners include the following types:

1.3.1 Authorized partners in advertising and analytics services. Unless you have permission, we will not share your personally identifiable information (i.e., information that identifies you, such as your name or email address, mobile phone number, through which you can be contacted or identified) with partners who provide advertising and analytics services. We provide these partners with information about their advertising reach and effectiveness, not your personally identifiable information, or we aggregate that information so that it does not identify you personally. For example, we may only tell advertisers how well their ads are performing, or how many people have seen their ads or installed apps after seeing them, or provide these partners with personally identifiable statistics (e.g. "Male, 25-29 years old, in Beijing") to help them understand their audience or customers.

1.3.2 Suppliers, service providers and other partners. We send information to suppliers, service providers, and other partners who support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, facilitating payments, or conducting academic research and research.

2. Transfer

We do not transfer your personal information to any company, organization or individual, except in the following cases:

2.1 Transfer with express consent: With your express consent, we will transfer your personal information to other parties;

2.2 In the event of a merger, acquisition or liquidation, or other liquidation, we will require new companies or organizations holding your personal information to remain bound by this policy in connection with the transfer of personal information, otherwise we will require the company, organization and individual to re-enlist your authorization consent.

3. Public disclosure

We will publicly disclose your personal information if:

3.1 We may publicly disclose your personal information with your express consent or on the basis of your voluntary choice;

3.2 If we determine that you have violated laws and regulations or seriously violated the rules of this Application, or to protect the personal and property of users or members of the public of the App and its affiliates from infringement, we may disclose personal information about you, including related violations, and the actions that the App has taken against you, in accordance with the laws and regulations or the relevant agreement rules of this Application with your consent.

4. Exceptions to the prior authorization of the sharing, transfer or public disclosure of personal information

Sharing, transferring, and publicly disclosing your personal information does not require your prior authorization to:

4.1 Related to national security and national defense security;

4.2 Related to public safety, public health, and major public interests;

4.3 Related to the investigation, prosecution, trial and enforcement of sentences;

4.4 in order to safeguard your or other individual's life, property and other significant legitimate rights and interests, but it is difficult to obtain my consent;

4.5 personal information that you disclose to the public on your own;

4.6 Where personal information is collected from information legally disclosed, such as legitimate news reports, government information disclosure, etc.

If, in accordance with the law, the sharing or transfer of de-identified personal information and ensuring that the data receiver is unable to recover and re-identify the subject of personal information, it shall not be subject to the external sharing, transfer and public disclosure of personal information, and the preservation and processing of such data will not require further notice to you and your consent.

IV. how we protect your personal information security

1. We have taken reasonable and feasible security measures to protect the personal information you provide from unauthorized access, public disclosure, use, modification, damage or loss. For example, when exchanging data between your browser and server, such as credit card information, we are protected by the Secure Socket Layer protocol encryption (or HTTPS protocol), we use encryption to improve the security of personal information, we use trusted protection against malicious attacks on personal information, we deploy access controls to try to ensure that only authorized personnel have access to personal information, and we conduct security and privacy training courses. Strengthen employee awareness of the importance of protecting personal information.

2. We have the industry's advanced data-based, data security management system around the data life cycle, from the organization and construction, system design, personnel management, product technology and other aspects of multi-dimensional to improve the security of the entire system.

3. We will take reasonable and practicable measures to avoid the collection of irrelevant personal information. We will only retain your personal information for the period required for the purposes described in the Cost Policy, unless an extension of the retention period is required or permitted by law.

4. The Internet is not an absolutely secure environment and we strongly recommend that you do not send personal information using communication methods other than 2000 as recommended by this application. You can connect and share with each other through our services. When you create communications, transactions or shares through our services, you may choose who you communicate, trade or share as a third party who can see information about your transaction, contact, exchange information or share content.

If you find that your personal information, especially your account or password, has been compromised, please contact this app customer service immediately so that we can take appropriate action in accordance with your application.

Please note that information that you voluntarily share or even publicly share when using our Services may involve personal or even personally sensitive information about you or others, such as your choice to upload images containing personal information in public, such as posting updates or in group chats, circles, etc. Please be more careful about whether to share or even publicly share relevant information when using our services.

Please use a complex password to help us keep your account secure. We will do our best to keep any information you send us secure. At the same time, we will also report the handling of personal information security incidents in accordance with regulatory requirements.

V. How you manage your personal information

You can access and manage your personal information by:

1. Access your personal information

You have access to your personal information, except in exceptional circumstances set forth in laws and regulations. You can access your personal information yourself by:

Profile - If you wish to access or edit gender, occupation, company, and other information in your profile, you can do so through My by logging into your account.

2. Correct or supplement your personal information

You have the right to ask us to correct or supplement any personal information we process about you when you find that there is an error. You may make a correction or supplementary request by way set out in this article "(i) Access to your personal information".

3. Delete your personal information

You may delete some of your personal information by the means set out in this article ,(i) Access to your personal information.

You can request the deletion of personal information from us in the following situations:

3.1 If our handling of personal information violates laws and regulations;

3.2 If we collect and use your personal information without your express consent;

3.3 If our handling of personal information is a serious breach of our agreement with you;

3.4 If you no longer use our products or services;

3.5 If we permanently no longer provide you with products or services.

If we decide to respond to your request for deletion, we will also, to the extent possible, notify the persons who obtained your personal information from us and request their prompt deletion, unless otherwise required by law or regulations, or if they are independently authorized by you.

When you delete information from our services, we may not immediately remove the information from the backup system, but we do delete it when the backup updates.

4. Change the scope of your authorized consent

Each business may require some basic personal information to complete (see "Article 1" of this Privacy Policy). In addition, for the collection and use of additional personal information, you may contact customer service in this application to request or withdraw your authorized consent.

When you withdraw your consent, we will no longer process the personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously conducted on the basis of your authorization.

5. Constraint information system automatic decision-making

In some business functions, we may make decisions based only on non-manual automated decision-making mechanisms, including information systems, algorithms, and so on. If these decisions significantly affect your legitimate interests, you have the right to ask us for an explanation, and we will provide a means of appeal without infringing the trade secrets or other user rights and interests of the App, as well as the public interest.

6. In response to your above request

To be safe, you may need to make a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

We will respond within 30 days. If you are not satisfied, you can also initiate a complaint through this app customer service.

We do not charge you in principle for your reasonable request, but we will charge you a fee for repeated requests that exceed reasonable limits. We may reject requests that are unprovoked and repetitive and require too many technical means (e.g., the need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical.

We will not be able to respond to your request in the following cases, as required by law and regulation:

6.1 Related to national security and national defence security;

6.2 Related to public safety, public health and major public interests;

6.3 Related to the investigation, prosecution, trial and enforcement of sentences;

6.4 If there is sufficient evidence of subjective malice or abuse of rights by the subject of personal information;

6.5 Responding to your request will result in serious damage to the legitimate rights and interests of you or other individuals or organizations;

6.6 Involved in trade secrets.

If you are unable to access such personal information through the above path, you can contact us at any time via this app's customer service. We will respond to your request for access within 30 days.

We will provide you with any other personal information you generate in the course of using our products or services in accordance with the arrangements in this article (vii) responding to your above request.

VI. How we handle the personal information of minors

Minors may not create their own user accounts without the consent of their parents or guardians. If you are a minor, we recommend that you ask your parent or guardian to read this Privacy Policy carefully and use our services or provide us with the consent of your parent or guardian.

We will only use, share, transfer or disclose this information if permitted by law and regulations, with the express consent of the parent or guardian, or necessary to protect the minor.

VII. How your personal information is transferred worldwide

Personal information collected and generated in our operations in the People's Republic of China is stored in China, except in the following cases:

7.1 Laws and regulations are clearly defined;

7.2 obtain your express authorization;

7.3 Your personal initiative, such as cross-border live streaming/posting of updates over the Internet.

In these cases, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

VIII. How to update this privacy policy

Our privacy policy may change.

We will not limit your rights under this Privacy Policy without your express consent. For material changes, we will provide significant notice (including that we will notify you or even provide you with SMS/email alerts through the app's publicity and the app's public number notification).

Significant changes within the meaning of this policy include, but are not limited to:

8.1 There has been a significant change in our service model. such as the purpose for which personal information is processed, the type of personal information processed, how personal information is used, etc.

8.2 We have undergone significant changes in control, etc. such as owner changes arising from mergers and acquisitions, etc.;

8.3 Changes in the main objects of personal information sharing, transfer or public disclosure;

8.4 Your right to participate in the processing of personal information and the manner in which it is exercised has changed significantly;

8.5 When the departments, contact details and complaint channels that we are responsible for handling the security of personal information change;

8.6 When the security impact assessment report for personal information indicates a high risk. We will also archive older versions of this Privacy Policy for your review.

IX. how to contact us

9.1 If you have any questions, comments or suggestions about the content of this policy, you may contact us through "My" - "Contact Customer Service" in the small program customer service and APP;

9.2 If you find that personal information may be disclosed, you can report it through feedback from this APP;

Company name: Shenzhen Leqi Network Technology Co., LTD.

Office address: 1st Floor, Building 9, Yazhou Industrial Park, Longgang Dist., Shenzhen, Guangdong, China

Contact: 0755-28283350

Email: app@smallrig.com

Version effective date: August 15, 2022

Last update date: October 19, 2022