Privacy Policy

 

You are very welcome to download the APP of Mobi. In order to allow you to use the various services and consultations of this application with peace of mind, we hereby explain to you the privacy protection policy of this application to protect your rights and interests. Please read the following content in detail:

1. How we collect information

We only collect information necessary to implement product functions based on the principles of legality, legitimacy and necessity. The main sources of personal information collected by our company are: information provided by you, information obtained during your use of our products or services, and information shared by third parties. We will collect and use your personal information for the purposes of the following product functions. If you do not provide relevant information or do not agree to our collection of relevant information, you may not be able to register as our user or enjoy some of the services we provide. Or failure to achieve good service results.

1. To provide account registration, login functions and services, you may be required to provide the following account registration information:

When you register an account, you will provide us with your mobile phone number and login password.

When you choose to log in using a third-party account, we will read the avatar and nickname information you used when registering the third-party account. The aforementioned third-party accounts include Google, Facebook or other third-party accounts. The third-party account actually connected to specific products and services shall prevail.

The purpose of collecting the aforementioned account information is to (1) provide you with better services through account management. By logging in to your account, you can synchronize your relevant information. (2) If you provide a real and valid Google or Facebook account for binding, you can easily retrieve your account and password when you encounter problems with losing your registered account or forgetting your password. (3) We will de-identify the collected relevant information and conduct statistical analysis in order to more accurately understand users’ habits, and on this basis, we will continue to improve products, service quality and product user experience.

2. Information you submit through our customer service or when participating in events organized by us. In order to contact you in a timely manner and provide feedback on customer service issues or related activity information, you may provide us with your contact information for timely communication.

3. Device information

Equipment information refers to the information of the equipment you use when using our products or services. In order for products and services to make necessary adaptations to devices and provide security services, when you use products or services, your device name, device model, device identification code, operating system and application version, language settings, and resolution will be collected. , Service provider network ID (PLMN) related information. This information is collected to help us conduct bug analysis, ensure your normal use of our products and services, improve and optimize our product experience, and protect your account security. Except as otherwise expressly agreed in this policy, we will not provide your device information to any third party. However, we cannot guarantee that other third parties will not obtain your device information through other channels and combine the device information with other information to identify your personal identity. If this causes any losses to you, you should seek compensation from the third party. The above device information is basic information collected to provide services. If you do not want your device information to be collected by us, it may cause us to be unable to provide you with normal services.

4. Location information

Location information refers to the information about your location collected when you turn on the device positioning function and use related services based on location, which mainly includes:

When you turn on the device positioning function and use related products or services, we may use GPS, WiFi or other technical methods to collect and process information about your actual location. Whereabouts and precise positioning information are sensitive personal information. Our products or services will not collect such personal sensitive information except when required for specific product or service functions.

Real-time information provided by you or other users that includes your geographic location. This includes shared information uploaded by you or others showing your current or past geographical location, and geotagged information contained in photos shared by you or others.

If you do not want to be accessed, you can choose to turn off related functions in the device or product/service, but this may affect our ability to provide you with related services.

5. Log information

For the purpose of service security, when you use products and services, the system may automatically collect certain information through cookies or other methods and store it in server logs. Such information may include:

Detailed use of our products and services. This information may include the web search terms you use, the page address you visit, and other information and content details you browse or request when using the service; equipment or software information, In addition to the device information mentioned above, we may collect the version number of the software and browser type you are using. To ensure the security of your operating environment or as needed to provide services, we collect information about the mobile applications and other software you use. Device event information, including crashes, system activity information, and other related information.

6. Other information collected with your consent

In order to provide you with more convenient, better, and personalized products or services, some of the specific functions of some of our products and services may require you to provide specific personal sensitive information to implement. If you choose not to provide such information, you may not be able to use the corresponding functions normally, but this will not affect your use of other functions in the service. These features include:

(1) Camera (camera)-based application functions: You can complete the functions of video shooting, photo taking, QR code scanning and face recognition after turning on the camera/camera permission. We may apply facial recognition technology to more scenarios in the future, but at that time we will confirm with you again whether you are willing for us to use your facial information to implement these expanded functions.

(2) Application functions based on photo album (picture library/video library) access and upload of pictures/videos: You can use the corresponding functions to edit your photos/pictures/videos after opening the photo album permissions.

(3) Application functions based on microphone voice technology: You can directly use the microphone to record or implement corresponding functions after turning on the microphone permission. In these functions, we will collect your recordings to identify your voice content and achieve corresponding functional effects.

(4) Application functions based on address book information: We will collect your address book information after you enable the address book permission, so that you can more conveniently access the contact information in your address book when using the corresponding function. No need to Enter it manually again.

(5) Calendar-based application functions: After you enable the permission to read/write your calendar, we will collect your calendar information for memo recording and reminders.

(6) Application functions based on mobile phone file reading: You can use the corresponding functions to edit files on your mobile phone after turning on the permission to read/upload files.

You understand and agree that the above application functions may require you to enable us to access your camera (camera), photo album (picture gallery), microphone (voice), address book and calendar in your device in order to realize these functions. Collection and use of information covered. Please note that before collecting sensitive personal information, we will obtain your consent through a pop-up window or similar prominent means. If you actively provide your personal sensitive information, you agree that we will process your personal sensitive information in accordance with the purposes and methods described in this policy.

7. Your information shared with other third parties

There are mainly two situations: (1) Information posted by other users may contain your information. (2) Information generated or shared when you use third-party partner services. When you use Weibo, QQ accounts and other third-party accounts to log in to our software products or services, we need to verify your identity or bind Your account information will be linked to our products or services with your authorization.

2. How we use the collected information

We strictly abide by the provisions of laws and regulations and agreements with users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain it to you again and obtain your consent.

1. Meet your personalized needs: for example, language settings, location settings, personalized help services.

2. Provide you with services, product development and service optimization: For example, when our system fails, we will record and analyze the information generated when the system fails and optimize our services.

3. Security: For example, we will use your information for identity verification, security prevention, anti-fraud monitoring, archiving backup, customer security services, etc. For example, security software you download or install can detect malicious programs or viruses, or identify scams for you.

4. Recommend advertisements, information, etc. that may be of interest to you.

5. Evaluate and improve the effectiveness of our advertising and other promotions and promotional activities.

6. Management software: For example, software certification, software upgrades, etc.

7. Invite you to participate in surveys about our services.

8. In accordance with laws and regulations, we will collect and use your relevant information in the following situations. In this case, your authorization is not required.

Related to national security and national defense security;

Relevant to public safety, public health, and major public interests;

Relevant to criminal investigation, prosecution, trial and judgment execution, etc.;

To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the individual;

Necessary to maintain the safe and stable operation of the products and/or services provided, including discovering and handling product and/or service failures, etc.;

Necessary for legitimate news reporting;

When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results will be de-identified;

Other situations specified by laws and regulations.

9. Other uses with your consent.

In order to give you a better experience, improve our services, or for other purposes with your consent, we may use the information collected through certain services for our other services, subject to compliance with relevant laws and regulations. For example, the information you use when using one of our services will be used to display personalized content or advertisements to you in another service, and for user research analysis and statistics, etc.

To ensure the security of the Service and help us better understand how our Application is running, we may record relevant information, such as how often you use the Application, failure information, overall usage, performance data, and the origin of the Application. We do not combine the information we store in our analytics software with the personally identifiable information you provide within the Application.

3. How we share, transfer and publicly disclose your personal information

We are fully aware of the legal liability we shall bear when illegal sharing, transfer, and public disclosure of personal information causes damage to personal information subjects. We will strictly comply with the following terms for all sharing, transfer, and public disclosure of your personal information:

(1) Sharing

Respecting user privacy is one of our basic principles. We will not share your personal information with any company, organization or individual except in the following circumstances:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information externally in accordance with the requirements of judicial or administrative agencies.

3. Sharing with affiliated parties: Your personal information may be shared with our affiliated companies. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy. If affiliated companies want to change the purpose of processing personal information, they will ask for your authorization and consent again.

4. Sharing with authorized partners: Only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share the personal information necessary to provide services. For example, you must share your personal information with logistics companies when you purchase our products online. information. Our partners have no right to use the shared personal information for any other purpose.

We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.

2. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to continue to be bound by this privacy policy. Ask for your authorization and consent again.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. Disclose the personal information specified by you in a disclosure method that you explicitly agree to

2. When it is necessary to provide your personal information in accordance with the requirements of laws, regulations, mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information based on the required type of personal information and disclosure method. Subject to complying with laws and regulations, when we receive the above request to disclose information, we will require the issuance of corresponding legal documents, such as a subpoena or a letter of investigation.

4. How we protect your personal information

1. We have used security measures that comply with industry standards to protect the personal information you provide to prevent data from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably feasible measures to protect your personal information. For example, the exchange of data (such as credit card information) between your browser and the "Service" is protected by SSL encryption; we also provide https secure browsing on the website; we will use encryption technology to ensure the confidentiality of data; we will use Trusted protection mechanisms prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information. .

2. We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. Unless we obtain your written permission, we will retain your personal information for and only 36 months after you delete or cancel your account. After this period, we will anonymize or destroy your personal information.

3. The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.

4. The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical or administrative safeguards are breached, resulting in unauthorized access to information If your legal rights and interests are damaged due to unauthorized access, public disclosure, tampering, or destruction, we will bear the corresponding legal liability.

5. After the unfortunate occurrence of a personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, your suggestions for self-prevention and risk reduction, and your remedial measures. We will promptly inform you of the relevant circumstances of the incident by email, letter, phone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also proactively report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.

V. How you manage your personal information

1. You can access, modify and delete the registration information and other personal information you provide during the use of our services, or contact us in accordance with the notification guidelines. The scope and method of your access, modification and deletion of personal information will depend on the specific services you use.

For example, if you want to stop sharing your location information when using location-related services, you can stop sharing by turning off the mobile phone positioning function, the software and hardware service providers, and the communication service providers. It is recommended that you read the relevant guidelines carefully.

2. We will collect and use your information only for the purpose of realizing the functions of our products or services as described in this policy.

If you find that we have collected and used your personal information in violation of the provisions of laws, administrative regulations or the agreement between the two parties, you can ask us to delete it.

If you find that the personal information we collected and stored is wrong, you can also ask us to correct it.

When you access, modify and delete relevant information, we may ask you to authenticate your identity to ensure the security of your account.

3. In the following circumstances, we will not be able to respond to your request in accordance with the requirements of laws and regulations:

Directly related to national security and national defense security.

Directly related to public security, public health, and major public interests.

Directly related to criminal investigation, prosecution, trial and execution of judgments.

There is sufficient evidence that you have subjective malice or abuse of rights.

Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations.

Involving trade secrets.

VI. Personal information about children

Our products, websites and services are mainly for adults. Minors may not create their own user accounts without the consent of their parents or guardians. In the case of collecting personal information of minors with parental consent, we will only use or disclose this information when required by judicial or administrative authorities, with explicit consent from parents or guardians, or when necessary to protect minors.

Although local laws and customs define minors differently, we regard anyone under the age of 16 as a minor.

If we find that we have collected personal information of minors without obtaining verifiable parental consent in advance, we will try to delete the relevant data as soon as possible.

VII. How to Update This Policy

Our privacy policy will be updated from time to time.

Generally, we will not reduce the rights you should enjoy under this privacy policy. We will post the updated version on this page and notify you of any changes made to this policy in a pop-up box or in a manner as prominent as a pop-up box. Once you agree, you agree to be bound by the revised policy.

If you have any questions about this privacy policy, you can consult this system by sending an email to [email protected]