Update Date: May 17, 2023
Effective Date: May 17, 2023
In order to help you understand our rules for handling and protecting personal information, we have formulated a Privacy Policy ("Privacy Policy"). Please carefully read this privacy policy, especially the content displayed in bold. The equipment designated by the service provider does not belong to medical devices and is not used for clinical purposes. The equipment does not use any medical means to treat a certain disease. The final data analysis results disclosed to users are only reference values obtained by computer algorithms and do not involve any sensitive medical data. If you need to make medical decisions, you should consult a professional doctor in advance.If you have any questions, opinions or suggestions, you can contact us through the contact information in Section 10 of this Privacy Policy.
This privacy policy is applicable to the products or services provided to you by the developer Hangzhou Boyi Technology Co., Ltd. (hereinafter referred to as "we") through the Android system and iOS system (APP) "Boyi" and its related WeChat software applications, WeChat official account, web pages and other platforms. In order to provide you with better attentive service, we may collect and use your relevant information when you use our products or services. We attach great importance to the privacy and personal information protection of our users. Through this privacy policy, we would like to explain to you how we collect, use, store, share, and transfer this information when you use our products or services, as well as the ways we provide you with access, updates, deletion, and protection of this information.
Here are our special tips, please pay close attention to them:
We use bold or underlined writing to indicate all key content.
Our ways of realizing personal information rights include but are not limited to accessing or correcting, deleting, canceling, and receiving timely responses to ensure that you have control over your personal information.
We will strictly process your personal information in accordance with this policy and your consent.
We deeply understand the importance of personal information to you and will do our best to protect the security and reliability of your personal information.We are committed to maintaining your trust in us, adhering to the following principles, and protecting your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of selective consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take corresponding security measures in accordance with mature industry security standards to protect your personal information.
This privacy policy will help you understand the following:
1. What information have we collected
2. How we use your personal information
3. How do we collect and use children's personal information
4. Exceptions to obtaining authorization and consent
5. How do we store your personal information
6. How do we share, transfer, and publicly disclose your personal information
7. How do we protect your personal information
8. Your right to manage personal information
9. Scope, Changes, and Revisions of Privacy Policy
10. How to contact us
(1) Information related to the registration account function
When you register for a general account, we may collect your phone number, verification code matching results (sensitive personal information), etc.,and create your account, username, and password.Collecting this information is to assist you in completing general account registration and protect the security of your account; When you log in through third-party platforms such as WeChat, we do not require you to bind your phone number. You can choose to skip the step of binding your phone number without affecting the basic functions of your normal use. We record the obtained EEG data information (sensitive personal information) to ensure that we understand your current brain state and provide service content. The business functions we provide rely on the above information to operate. If you refuse to provide this information, you may not be able to register a general account properly.
You can also choose to fill in information such as nickname, date and time of birth, gender, etc. according to your own needs; After logging into your personal account, you can enter the "My" section to modify and improve your personal information. These pieces of information are not necessary for the operation of the business function, but they are of great significance for improving service quality, developing new products or services, etc. We will not force you to provide this information, and your refusal will not have a negative impact on the use of this business function.
After the user launches the application for the first time, clicking confirm in the agreement pop-up window represents agreement to the User Agreement, Privacy Policy, etc. During the use of the general software application, users can wear the device designated by the service provider at the same time.The service provider will analyze the user's brain data based on the brain waves (sensitive personal information) and other information recorded by the device, and disclose the results of the data analysis to the user. By agreeing to the Privacy Policy and using related functions, you agree and allow us to collect, maintain, process, anduse EEG recordings (sensitive personal information).
(2) Equipment information and log information
When you use our products and services,we may collect device information and log related information of your device to understand the adaptability of the product to different hardware devices, ensure the safety of the operating environment, and identify abnormal account states. We will collect the following information to analyze the usage status of the product, investigate the causes of crashes, reduce crashes, continuously improve our product, and ensure account and system security:
In order to ensure the secure operation, quality, and efficiency of software and services, we will collect your hardware model, operating system version number, device identifier (Android such as IMEI, AndroidID, OAID, IMSI, SIM card information (such as ICCID), GAID, MEID, iOS such as IDFV, IDFA; different identifiers may vary in validity, user reset, and acquisition methods), network device hardware address (MAC address), hardware serial number (SN), IP address, WLAN access point (such as SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service logs Sensor information (accelerometer) and other data.
In order to prevent malicious programs, ensure operational quality and efficiency, we collect information on installed applications or running processes, overall application operation, usage and frequency, application crashes, overall installation and usage, performance data, and application sources.
We may use your account information, device information, service log information, as well as information authorized by you or lawfully provided to us by our affiliates and partners, to determine account security, transaction security, conduct identity verification, identify illegal and irregular situations, detect and prevent security incidents, and take necessary recording, analysis, and disposal measures in accordance with the law.
(3) Provide security protection function
In order to fulfill our obligation to maintain network security, improve the security of your use of services, ensure the safety of the operating environment, prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, and to prevent, discover and investigate potential illegal and irregular behaviors or violations of user service agreements, policies or rules,we and the application security SDK embedded in the application will automatically collect your device information, log informationand other authorized or legally shared information in the background, comprehensively judge your account risks, complete identity verification and detection, prevent security incidents, and take necessary recording, analysis and disposal measures in accordance with the law to protect the legitimate rights and interests of all parties from infringement.
Device information: including device identifiers (IMEI, IDFA, Android ID, MAC, OAID, IMSI, and other device related information), application information (application crash information, notification switch status, application installation list, application running list, and other application related information), device parameters and system information (device type, device model, operating system, and hardware related information), device network environment information (IP address, WiFi information, base station information, and other network related information). The actual collection situation of the product shall prevail.
Service log information: including browsing history, click view history, search query history, favorites, user feedback, shared information, as well as IP address, browser type, telecom operator, language used, access date and time.
(4) Call permissions to provide additional services
In order to provide you with more convenient and high-quality products and/or services, and strive to enhance your experience, we may collect and use your personal information by enabling system permissions in the following additional services provided to you. If you do not agree to enable the relevant permissions, it will not affect your use of the basic services provided by General Intent, but you may not be able to obtain the user experience brought by these additional services.
You can decide whether to grant or grant these permissions at any time.
Please note that by granting any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. By granting any permission, you cancel the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, nor can we continue to provide you with the services corresponding to that permission. Your decision to disable permissions will not affect the information collection and use previously conducted based on your authorization.
To provide you with more convenient and high-quality products and services, and enhance user experience, we apply for the following device permissions in the additional services we offer to you, and only obtain personal information from you when you use the relevant functions.
Camera/Camera Permissions:By accessing your camera, you can use it to capture images, photos, and participate in platform activities authorized by you in specific scenarios.
Album and storage permissions:After enabling album permissions, you can upload your photos/images/videos as well as locally cached audio and video files, making it easier for you to change your avatar, save report images, upload screenshots of any issues you encounter, or communicate with customer service about any problems you encounter. We may identify the issue you are facing and provide you with a solution based on the photos/images you upload.
Notification permission:If you end using the device, we may use notification permission to push a reminder that the data report has been generated. We will ask you through a pop-up window if you have enabled notification permissions.
Bluetooth permission:You need to use hardware pairing to connect to our software products, and we may use Bluetooth permission to control and use hardware connection services through Bluetooth. We will inquire when you use Bluetooth connection by jumping to the device system settings page.
(5) Information collected using cookies and similar technologies
We will place securecookies and related technologies (collectively referred to as "cookies")on your mobile device to collect information. Cookie is a small text file placed by the website server on the client (your computer, mobile phone, or other smart terminal) when you browse web pages, storing information related to user access to the website.
When you use our products and/or services, we may usecookies to collect some of your personal information, including your login information and your general browsing habits. We collect your login information through cookies to protect your information and account security, and to investigate cheating, hacking, and fraudulent activities targeting our products and services; Simplify the steps of repetitive operations (such as registration and login), avoid unnecessary server load, improve service efficiency, and save resources and energy; Improve our products and services. We collect your visit habits in order to facilitate your viewing of usage history, understand how you use our services, improve the user experience of our products and services, and provide reference data for the development of new products or features.
If your device or device add-on services allow, you may modify your acceptance of cookies or refuse our cookies. But if you do so, it may affect your safe use of the app in some cases and may require changing user settings every time you use the app.
(6) Tips on Personal Sensitive Information
Personal sensitive information refers to personal information that, once leaked or illegally used, can easily lead to the infringement of a natural person's personal dignity or endanger their personal and property safety, including biometric, religious beliefs, specific identities, medical and health information, financial accounts, whereabouts, and personal information of minors under the age of fourteen. Sensitive information will be highlighted in bold or underlined in this policy. The information provided by you or collected by us above may include your personal sensitive information, such as verification code matching results, health and physiological information, EEG data, and location information. Please be cautious and pay attention to sensitive personal information. You agree that we may process your sensitive personal information for the purposes and in the manner described in this policy.
(7) Other
As mentioned above, if a function or product/service that requires the collection of your personal information is not described in this privacy policy, or if we use your personal information beyond the purpose claimed at the time of collection, or if we update the way, scope, and purpose of collecting information, we will separately explain to you through updating this privacy policy, page prompts, pop ups, message notifications, website announcements, or other means that are convenient for you to know, and provide you with the option to choose and agree. After obtaining your consent, we will collect and use your personal information.
(1) Based on your account information, device information, and usage of our services, we will gather and understand your usage of our services, improve the design and functionality of our products and services, optimize user experience, and provide necessary phone follow ups or email/SMS notifications to you according to the contact information you provide.
(2) In order to improve the security of your use of our services and those provided by our partners, protect your or other users' or the public's personal and property safety from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, and more accurately identify violations of laws and regulations or our relevant agreement rules, we may use or integrate your account information, device information, application usage information, and information obtained by our partners with your authorization or shared in accordance with the law.
(3) If we use the information for purposes not specified in this policy, or if we use information collected for specific purposes for other purposes, we will seek your consent in advance.
(4) We have the right to conduct technical analysis on the entire user information database and commercially utilize the analyzed and organized user database without disclosing individual user privacy information. We will take commercially reasonable and feasible measures to protect the security of users' personal information, utilizing available security technologies and procedures to safeguard users' personal information from unauthorized access, use, or disclosure.
We attach great importance to the protection of children's personal information. If you are a child, we request that you ask your parents or other guardians to carefully read this privacy information protection policy and use our services or provide information to us with the consent of your parents or other guardians.
If you are a child, we request that you ask your parents or other guardians to carefully read this privacy information protection policy and use our services or provide information to us with the explicit consent of your parents or other guardians. We will only use, share, transfer or disclose personal information of children collected with the consent of parents or other guardians for the use of our products or services, as permitted by laws and regulations, with the explicit consent of parents or guardians, or as necessary to protect minors. If your parents or other guardians do not agree to your use of our services or provision of information to us in accordance with this policy, please immediately terminate your use of our services and notify us promptly so that we can take appropriate measures. If the guardian finds that we have collected personal information of minors without their consent, they can contact us through the contact information in Section 10, and we will try our best to delete the relevant data as soon as possible.
The protection of children's personal information will also apply to strict personal information access control systems and personal information processing records and control measures. We always follow the principle of minimum sufficient authorization and take corresponding technical measures to avoid illegal duplication and downloading of children's personal information as much as possible.
The emergency plan for personal information security incidents that we have developed will also apply to the protection of children's personal information. We regularly organize internal personnel to receive emergency response training and drills, so that they can master their job responsibilities, emergency response strategies, and procedures. We will promptly inform children and their guardians of the relevant situation of the event through APP push notifications, email/short messages. When it is difficult to inform them one by one, we will take reasonable and effective measures to release relevant warning information. At the same time, we will proactively report the handling of children's personal information security incidents in accordance with regulatory requirements.
If you are the parent or other guardian of a child, please pay attention to whether the child under your guardianship is using our services after obtaining your authorized consent. If you have any questions about the personal information of the child you are monitoring, please contact us through the contact information provided in Section 10.
According to relevant laws and regulations, the collection of your personal information in the following situations does not require your authorization and consent:
Related to our obligations under laws and regulations;
Directly related to national security and defense security;
Directly related to public safety, public health, and major public interests;
Directly related to criminal investigation, prosecution, trial, and execution of judgments;
For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain your personal authorization and consent;
The personal information involved is disclosed by you to the public on your own;
Necessary to sign and fulfill the contract according to your request;
Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;
Necessary for maintaining the safe and stable operation of the provided products or services, such as detecting and handling product or service failures;
Necessary for legitimate news reporting;
Other circumstances stipulated by laws, regulations or national standards.
Due to our global resources and servers providing products or services, this means that with your authorized consent, your personal information may be transferred to or accessed from overseas jurisdictions in the country/region where you use the products or services. Such jurisdictions may have different data protection laws, or even no relevant laws in place. In such cases, we will ensure that your personal information receives sufficient and equal protection within the territory of the People's Republic of China. For example, we may request your consent for cross-border transfer of personal information, or implement security measures such as data de identification before cross-border data transfer.
We only store your personal information during the necessary period for the purposes of this policy and within the time limit required by laws and regulations. At the expiration of the above-mentioned period, we will delete your personal information or anonymize it, or securely store your personal information and separate it from other data processing when anonymization or deletion is impossible (such as when your personal information is already stored in a backup).
If we cease to operate our products or services, we will promptly cease the activity of collecting your personal information and notify you of the cessation of operation in the form of an announcement. Meanwhile, we will process your personal information in accordance with the second paragraph of this section.
(1) Sharing
We will not share your personal information with any company, organization, or individual unless we have obtained your explicit consent. Except for the following situations:
We may share your personal information with external parties in accordance with laws and regulations, litigation dispute resolution needs, or as required by administrative or judicial authorities in accordance with the law.
Within the scope permitted by laws and regulations, it is necessary to share your personal information in order to protect our or our partners', your or other general users', or the public's interests, property, or safety from harm.
Share with third-party partners.We may entrust third-party partners to process personal information on our behalf, or share your personal information with partners who have business relationships with us. But we only allow partners who need to know this information to access your information, and have established strict access control and monitoring mechanisms for this purpose. If these obligations are not fulfilled, legal responsibility may be pursued or our cooperation relationship may be suspended. And we will only share your personal information for legal, legitimate, and necessary purposes, and will only share personal information necessary for providing services. Unless otherwise authorized by you, our partners have no right to use the shared personal information for any other purpose. Our partners include the following types:
(1) A service provider that provides technical and consulting services. We may share your personal information with third-party service providers who support us in providing services. These service providers include institutions that provide us with infrastructure technology services, data processing, verification, valuation, credit review, risk control, and customer service. But we require these service providers to only use your information for the purpose of providing services to us, and not for their own benefit.
(2) Authorized partners for advertising and analytics services. We will not share your personal information with third-party advertisers, analytics service providers (such as application traffic monitoring service providers), or other partners unless we have obtained your explicit authorization and consent. We may provide these partners with aggregated information, anonymized information, or other information that does not personally identify you, but we will not share any of your identity information, account information, or other identifiable information. We will conduct technical testing and behavioral audits on such partners or service providers from time to time, and require them to comply with the cooperation legal agreement to ensure that they collect and use data in accordance with the law, regulations, and agreements to the maximum extent possible.
(2) The principle of sharing
Principle of Authorization and Consent: Sharing your personal information with our affiliates or third parties requires your authorization and consent, unless the shared personal information is de identified and the sharing third party cannot re identify the natural person subject of such information. If related parties or third parties use information for purposes beyond the scope of the original authorization and consent, they need to obtain your consent again.
The principle of legality, legitimacy, and minimum necessity: Data shared with related parties or third parties must have a legitimate and legitimate purpose, and the shared data must be limited to what is necessary to achieve the purpose.
Principle of safety and prudence: We will carefully evaluate the purpose of sharing information with related parties and third-party data, comprehensively assess the security capabilities of these partners, and require them to comply with cooperation laws and agreements. We will conduct strict security monitoring on the software development kits (SDKs) and application programming interfaces (APIs) used by our partners to obtain information, in order to protect data security.
(3) Access to third-party SDKs
To ensure the stable operation and functional implementation of our client, and to enable you to use and enjoy more services and features, our application will embed SDK or other similar applications from authorized partners. We will conduct strict security checks on the application programming interfaces (APIs) and software development kits (SDKs) used by authorized partners to obtain relevant information, and agree with authorized partners on strict data protection measures to process personal information in accordance with this policy and any other relevant confidentiality and security measures.
When you use the relevant services provided by the authorized partner in general, the service plugin will collect and process your personal information. Please note that third-party SDKs may have certain changes in data processing types due to version upgrades, policy adjustments, and other reasons. Please refer to their official instructions for accuracy. We strongly recommend that you review and understand the privacy policy of any third-party SDK service before using it.
To ensure the implementation of Banyi's features and the secure and stable operation of the application, we may integrate software development kits (SDKs), application programming interfaces (APIs), application plugins, or other code provided by our partners, or use other forms of cooperation to achieve the relevant purposes.
We will conduct strict security monitoring of the code from partners that access information to protect data security.
The integrated partners are listed in the directory below. For details on how our partners handle data, please refer to their respective privacy policies or service agreements.
Please note that the types of data processed by our partners' code may change due to version upgrades, policy adjustments, etc. Please refer to their official statements for the most up-to-date information.
| SDK Name | Developer | Scope of Information Collected | Purpose of Use | Privacy Policy Link |
|---|---|---|---|---|
| 移动智能终端补充设备标识体系统一调用SDK | 中国信息通信研究院 |
Device Information: Device manufacturer, device model, device brand, terminal operating system version Application Information: Application package name Network Information: IP address |
Used to generate a supplementary device identifier to address situations where the device identifier cannot be obtained on Android systems, ensuring the implementation of functions such as in-app statistical analysis and security risk control. | http://www.msa-alliance.cn/col.jsp?id=120 |
| 微信OpenSDK Android | 深圳市腾讯计算机系统有限公司 |
Device Information: Device identifiers (Android ID, OAID), device model, system version Application Information: Application list information Network Information: Wi-Fi status, IP address Other: Shared images or content |
To support WeChat authorized login, sharing, and favorites functions within Android applications. | https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8 |
| 微信OpenSDK iOS | 深圳市腾讯计算机系统有限公司 |
Device Information: Device identifier (IDFV), device model, system version Network Information: Wi-Fi status, IP address Other: Shared images or content |
To support WeChat authorized login, sharing, and favorites functions within iOS applications. | https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8 |
| QQ互联sdk(Android版本) | 深圳市腾讯计算机系统有限公司 |
Device Information: Device model, operating system version, unique device identifiers (e.g., OAID for Android, IDFA/IDFV for iOS) Network Information: Network type, Wi-Fi information, IP address Storage Information: Shared image/video files Application Information: Information about running processes |
To support QQ authorized login and sharing functions. | https://wiki.connect.qq.com/qq%e4%ba%92%e8%81%94sdk%e9%9a%90%e7%a7%81%e4%bf%9d%e6%8a%a4%e5%a3%b0%e6%98%8e |
| 腾讯QQ互联 | 深圳市腾讯计算机系统有限公司 |
Device Information: Device model, operating system version, unique device identifiers (e.g., OAID for Android, IDFA/IDFV for iOS) Network Information: Network type, Wi-Fi information, IP address Storage Information: Shared image/video files Application Information: Information about running processes |
To support QQ authorized login and sharing functions. | https://wiki.connect.qq.com/qq%e4%ba%92%e8%81%94sdk%e9%9a%90%e7%a7%81%e4%bf%9d%e6%8a%a4%e5%a3%b0%e6%98%8e |
(4) Transfer
We will not transfer your personal information to any other company, organization, or individual, except in the following circumstances:
Obtaining your explicit consent or authorization in advance; After obtaining your explicit consent or authorization, we will transfer your personal information to other parties;
Provide necessary information in accordance with applicable laws, regulations, legal procedures, mandatory administrative or judicial requirements;
Provided in accordance with relevant agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;
As our business develops, we may engage in mergers, acquisitions, asset transfers, or other similar transactions. If the relevant transaction involves the transfer of your personal information, we will require the new company, organization, and individual holding your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization, and individual to obtain your authorization and consent again.
(5) Disclosure
We will only publicly disclose your personal information under the following circumstances and with industry standard security measures in place:
According to your needs, disclose the personal information you have specified in the disclosure method that you have explicitly agreed to;
In accordance with the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information based on the required type and disclosure method. Subject to compliance with laws and regulations, when we receive a request for disclosure of the aforementioned information, we will require the issuance of corresponding legal documents, such as subpoenas or verification letters. We firmly believe that the information requested from us should be kept as transparent as possible within the limits permitted by law. We have carefully reviewed all requests to ensure that they have legal basis and are limited to data obtained by law enforcement agencies for specific verification purposes and with legitimate rights.
We have taken security measures that comply with industry standards to protect the personal information you provide, preventing unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your personal information. include:
Banyi has set up a dedicated personal information protection officer responsible for handling various matters related to Fanyi's products and services that may involve user personal information, as well as planning and developing the company's privacy policy, reviewing user usage agreements for each product, supervising the work principles and information processing mechanisms of each product, etc.
We have formulated an overall policy and security strategy for information security work in accordance with the requirements of information security level protection, established a security management system covering hosts, data, applications, management, and other levels, set up a technical department as the functional department for information security management work, clarified the responsibilities, division of labor, and skill requirements of various departments and positions within the security management organization, and formulated clear standards for personnel recruitment and resignation management.
Our server systems that store users' personal information are all operating systems that have been securely reinforced. We will conduct account audits and monitor server operations. If a server operating system is found to have security issues with external announcements, GAC will immediately perform a server security upgrade to ensure the security of all GAC server systems and applications.
We regularly hold training sessions on personal information protection laws and regulations for our staff to enhance their awareness of user privacy protection.
We have developed an emergency plan for information security incidents and allocated sufficient resources to ensure its implementation. We conduct annual training on emergency plans and emergency event drills. If our physical, technological, or management protective measures are unfortunately compromised, we will promptly activate emergency plans to prevent the escalation of security incidents, report to the national regulatory authorities in accordance with legal requirements, and promptly adopt reasonable and effective methods such as display and announcement to inform you of the basic situation, possible impact, measures taken or to be taken of security incidents.
Please understand that due to technological limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% information security. You need to understand that accessing the systems and communication networks we use may cause issues due to situations beyond our control.
During your use of our products and services, you can access and manage your personal information through the following methods:
(1) Accessing and correcting your personal information
You can log in to your personal account on Fanyi to check and correct your Fanyi account information and the information you provide.
(2) Delete your personal information
When the following situations occur, you have the right to request the general deletion of your personal information:
We illegally collected your personal information without seeking your consent.
We have processed your personal information in violation of legal and regulatory requirements.
We have violated our agreement with you to use and process your personal information.
You have cancelled your account, uninstalled, or stopped using our products or services.
We have stopped providing services to you.
You can contact us through the methods provided in Section 10 of this Privacy Policy to request the deletion of your personal information. We will reply within 15 working days after confirming your user identity. When we delete your personal information from the server, we may not immediately delete the corresponding data from the backup system, but we will delete this information when the backup is updated.
(3) Revoke your authorization or change the scope of your authorized consent
Please understand that each business function requires some necessary personal information to be completed. When you withdraw your consent or authorization, we cannot continue to provide you with the services and functions corresponding to the withdrawal of consent or authorization, nor will we process your corresponding personal information. But your decision to withdraw consent or authorization will not affect the personal information processing previously carried out based on your authorization.
If you wish to revoke the device permissions granted to us, you can do so at any time through the following methods:
When you use the app, you can turn off the camera (photos), microphone (recording), notifications (messages), phone (device call status and identification code), change the scope of consent, or revoke your authorization in the "Settings" section of the device's operating system. After revoking the authorization, we will no longer use such permissions. Regarding the content that General intends to display to you, you can also revoke your authorization by entering the relevant page of General Intent. Turning off the content notification service will not affect your normal use of General Intent's other functions.
(4) Cancel your personal account
We provide you with the function to cancel your registered account. You should read and agree to the "General Intent Application Account Cancellation Agreement". If you meet the conditions stipulated in the service agreement and relevant national laws and regulations, you can log in to the General Intent APP and follow the page operation instructions for online cancellation. The cancellation function path is:Personal Center → Settings → Account Cancellation → I am aware of the risks, cancel immediately. Once you cancel your account, you will no longer be able to use the services of our full range of user products, so please proceed with caution. After account cancellation, we will cease to provide you with general services and, at your request, delete your personal information or anonymize it, except as otherwise provided by laws and regulations.
We will determine whether to support your cancellation request based on your usage of the products we provide in order to protect your or others' legitimate rights and interests. For example, if you have unused balance in your account, we will not immediately support your request and will prompt you to take appropriate action first. Unless otherwise stipulated by laws and regulations, after canceling your account, all information in your account will be cleared and your personal information will be deleted according to your request.
(5) In response to your above request
For your reasonable requests, we generally do not charge any fees, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may refuse requests that are unnecessarily repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as involving information stored on backup tapes).
We will not be able to respond to your request in the following situations:
Related to our obligations under laws and regulations;
Directly related to national security and defense security;
Directly related to public safety, public health, and major public interests;
Directly related to criminal investigation, prosecution, trial, and execution of judgments;
We have sufficient evidence to indicate that the personal information subject has subjective malice or abuse of rights;
For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;
Responding to your request will result in serious harm to the legitimate rights and interests of the personal information subject or other individuals or organizations;
Involving trade secrets.
If we decide not to respond to your request, we will inform you of the reasons for that decision and provide you with a channel for complaint.
As stated in the preamble of this privacy policy, this privacy policy applies to general products and services.
It should be noted that this policy does not apply to services provided to you by other third parties. For example, third-party services or websites that you connect to through general links. We will make every effort to urge these third parties to protect your personal information during our cooperation, but you understand that these services are independently provided to you by the third party, and the third party will be solely responsible for the processing of your personal information in accordance with their privacy policy or user agreement.
In addition, we are only responsible for the scope of liability specified in the terms of this agreement. The user understands and agrees that any third-party claims arising from their violation of the terms of this agreement shall be solely borne by the user.
Our privacy policy may change. We will not restrict your rights under this privacy policy without your explicit consent.
For significant changes to this privacy policy, we will also provide significant notifications (such as timely notification in the form of pop ups when software is updated or upgraded, or when you log in again).
The significant changes referred to in this policy include but are not limited to:
Our service model has undergone significant changes. Such as the purpose of processing personal information, the type of processing of personal information, and the way in which personal information is used;
We have undergone significant changes in terms of control and other aspects. Changes in ownership caused by mergers and acquisitions;
The main objects of personal information sharing, transfer or public disclosure have changed;
There has been a significant change in your right to participate in personal information processing and the way you exercise it;
When the responsible department, contact information, and complaint channels for handling personal information security change;
When the personal information security impact assessment report indicates the presence of high risks.
Hangzhou Banyi Technology Co., Ltd. is the operating entity of Banyi, with a contact address at 706, Building 3, Artificial Intelligence Town, Cangqian Street, Yuhang District, Hangzhou City, Zhejiang Province. If you have any questions, opinions, suggestions, or complaints about our privacy policy and the handling of your personal information, as well as exercising your personal information subject rights, please send an email to the official service email of Banyi manager@panbrain.com Please contact us and we will reply within 15 working days after verifying your user identity.