The Privacy Policy respects and protects the privacy rights of all users who use the network services provided by the Privacy Policy.
In order to provide you with a more accurate and personalized service, our Privacy Policy covers the way we collect, use, disclose, transmit and store your information.
However, the Privacy Policy will treat this information with a high degree of diligence and care.
This Privacy Policy will be updated from time to time.
By agreeing to the Service Usage Agreement of the Privacy Policy, you are deemed to have agreed to all contents of this Privacy Policy.
This Privacy Policy is an integral part of the Privacy Policy and Service Usage Agreement.
You are not obligated to provide the personal information we request, but in many cases, if you choose not to, we will not be able to provide you with our products or services or respond to any questions you may have.
1.How do we collect information
We collect only such information as is necessary to carry out the functions of the product in accordance with the principles of legality, legitimacy and necessity.
The main sources of personal information collected by our company are: information provided by you, information obtained during your use of our products or services, and your information shared by third parties.
We will collect and use your personal information for the purposes of the following product functions.
If you do not provide relevant information or do not agree to our collection of relevant information, you may not be able to register as our user or enjoy certain services provided by us, or you may not be able to achieve good service results.
1.If you provide account registration and login functions and services, you may be required to provide the following account registration information:
When you register an account, you will provide us with your mobile phone number and login password.When you choose to log in with a third-party account, we will read the profile picture and nickname information you used when registering with the third-party account.
The aforementioned third-party accounts include QQ, wechat, Weibo or other third-party accounts, and the third-party accounts actually accessed by the specific products and services shall prevail.The purpose of collecting such account information is
(1) to better provide you with services through account management.
By logging in to the account, you can synchronize your relevant information.
(2) If you provide real and effective mobile phone number, QQ number, Weibo number and wechat signal for binding, when you encounter the problem of lost registered account or forget the password, you can easily retrieve the account and password.
(3) We will de-identify the relevant information collected for statistical analysis, in order to more accurately understand the habits of users, and on this basis to constantly improve the product, improve the quality of service and improve the product user experience
2.Information submitted by you through our customer service or when you participate in our activities.
In order to get in touch with you in a timely manner, respond to customer service questions or related event information, you may provide us with your contact information for timely communication.
3 Device informationDevice information refers to the information about the device you use when using our products or services.
In order to adapt the products and services to the devices and provide security services, when you use the products or services, you will collect the device name, device model, device identifier, operating system and application version, language setting, resolution, and service provider network ID (PLMN) information about the devices you use to use the products or services of Sogou.
This information is collected to help us carry out bug analysis, ensure your normal use of our products and services, improve and optimize our product experience, and ensure the security of your account.
Unless otherwise expressly agreed in this Policy, we will not provide your device information to any third party.
However, we cannot guarantee that other third parties will not obtain your device information through other means and combine the device information with other information to identify you.
In case of any loss caused by this, you shall indemnify the third party.
The above equipment information is the basic information collected for the purpose of providing services.
If you do not want your equipment information to be collected by us, we may not be able to provide you with normal services.
4.Location informationLocation information refers to the information about your location collected when you enable the device location function and use location-based services, mainly including:When you turn on the device location function and use related products or services, we may use GPS, WiFi or other technical means to collect and process information about your actual location.
Whereabouts, track and precise location information is personally sensitive information, and our products or services will not collect such personal sensitive information except for the specific product or service function.Real-time information about your location provided by you or other users.
Includes shared information uploaded by you or others that shows where you are currently or have been, and geotagged information contained in photos shared by you or others.If you do not want to be accessed, you may choose to turn off related functions in your device or product/service, which may affect our ability to provide related services to you.
5.Log informationWhen you use products and services, the system may automatically collect certain information through cookies or other means and store it in the server logs, as necessary for the security of the services.
Such information may include:Details of your use of our Products and Services, which may include the web search terms you use, the addresses of the pages you visit, and details of other information and content you view or request in using the Services; Device or software information.
In addition to the device information mentioned above, we may collect the version number and browser type of the software you use.
In order to ensure the safety of your operating environment or to provide services, we will collect information about the mobile applications and other software you use.
Device event information, including crashes, system activity information and other relevant information.
6.Other information collected with your consentIn order to provide you with more convenient, better quality and personalized products or services, some specific functions of our products and services may require you to provide specific personal sensitive information to realize.
If you choose not to provide such information, you may not be able to use the corresponding functions normally, but your use of other functions in the Services will not be affected.
These features include:
(1) Camera-based (camera) application functions: You can complete video shooting, photo taking, code scanning and face recognition functions after opening the camera/camera permission.
We may apply face recognition technology to more scenarios in the future, but at that time we will confirm with you again whether you would like us to use your facial information to achieve these extended functions.
(2) Application functions of photo/video access and upload based on photo album (photo library/video library) : You can use corresponding functions to edit your photo/picture/video after opening the permission of the album.
(3) Application function based on microphone voice technology: you can directly use the microphone to record or achieve the corresponding function after opening the microphone permission.
In these functions, we will collect your recording to identify your voice content and achieve the corresponding functional effect.
(4) Application function based on address book information: We will collect your address book information after you open the address book permission, so that when you use the corresponding function, you can more convenient access to the contact information in your address book, no manual input.(5) Calendar-based application function: After you open the permission to read/write your calendar, we will collect your calendar information for memo records and reminders.(6) Application function based on mobile phone file reading: You can use the corresponding function to edit the files in the mobile phone after you open the permission to read/upload the files.You understand and agree that the above application functions may require you to enable access rights of your camera (camera), photo album (photo library), microphone (voice), address book and calendar to us in your device to realize the collection and use of information involved in these functions.
Please note that before collecting sensitive personal information, we will obtain your consent through pop-ups or similar conspicuous means.
By voluntarily providing your sensitive personal information, you agree that we will process your sensitive personal information according to the purpose and manner set forth in this Policy
7.Your information shared by other third partiesThere are two main scenarios:
(1) Information posted by other users may contain information about you.
(2) Information generated or shared by you when you use the services of third-party partners.
When you log in to our software products or services using your Weibo, QQ or other third-party accounts, we need to verify your identity or bind your account information, and associate relevant accounts with our products or services with your authorization.
2.How do we use the information we have collected
We strictly abide by the provisions of laws and regulations and the agreement with users, and use the collected information for the following purposes.
If we use your information for more than the following purposes, we will explain to you again and obtain your consent.
1.Meet your personalized needs: for example, language setting, location setting, personalized help service.
2.To provide you with services, product development and service optimization: for example, when our system fails, we will record and analyze the information generated during the system failure to optimize our services.
3.Security guarantee: For example, we will use your information for identity verification, security prevention, anti-fraud monitoring, archiving backup, customer security services and other purposes.
For example, the security software you download or install will detect malicious programs or viruses, or identify fraud information for you.
4 Recommend ads, information, etc., that you may be interested in.
5.To evaluate and improve the effectiveness of our advertising and other promotional and promotional activities.
6.Software management: for example, software certification, software upgrades, etc.
7.Invite you to participate in a survey about our services.
8.Collect and use your information in accordance with laws and regulations under the following circumstances, in which case you do not need to obtain your authorization.Related to national security and national defense security;Those relating to public security, public health or major public interests;Those related to the investigation, prosecution, trial and execution of judgments of crimes;For the purpose of safeguarding the life, property and other major legitimate rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the consent of the person concerned;Necessary for the safe and stable operation of the products and/or services provided, including the discovery and disposal of product and/or service failures, etc.;Necessary for legitimate news reporting;Where an academic research institution conducts statistics or academic research based on the public interest and provides the results of academic research or description to the public, the personal information contained in the results is de-identified;Other circumstances as stipulated by laws and regulations.
9.Other uses approved by you.In order to make your experience better, improve our services or for other purposes agreed by you, we may use the information collected through some services for other purposes of our services, subject to the relevant laws and regulations.
For example, the information you collect when using one of our services may be used in another service to show you personalized content or advertisements, for user research analysis and statistics, etc.In order to ensure the security of the service and help us better understand the operation of our application, we may record relevant information, for example, how often you use the application, failure information, overall usage, performance data, and the origin of the application.
We do not combine the information we store in our analytics software with the personally identifiable information you provide in your application.
3.How do we share, transfer and publicly disclose your personal information
We are fully aware of our legal liabilities in case of damage to the subject of personal information caused by illegal sharing, transfer and public disclosure of personal information.
All sharing, transfer and public disclosure of your personal information shall be carried out in strict accordance with the following provisions:
(1) SharingIt is one of our basic principles to respect users' privacy.
We will not share your personal information with any company, organization or individual except in the following circumstances:
1.Sharing with Express Consent: With your express consent, we will share your personal information with other parties.
2.We may share your personal information with other parties as required by judicial or administrative authorities.
3.Sharing with Affiliated parties: Your personal information may be shared with our affiliated companies.
We will only share necessary personal information subject to the purposes stated in this Privacy Policy.
If the Affiliate wants to change the purpose of processing personal information, it will again seek your authorized consent.
4.Sharing with Authorized Partners: Some of our services will be provided by authorized partners only for the purposes stated in this Policy.
We may share certain of your personal information with authorized partners in order to provide better customer service and user experience.
We will only share your personal information for lawful, legitimate, necessary, specific and explicit purposes, and only if it is necessary to provide services, such as sharing your personal information with logistics companies when you purchase our products online.
Our partners have no right to use the shared personal information for any other purposes.We will sign strict confidentiality agreements with the companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
(2) TransferWe will not transfer your personal information to any company, organization or individual except in the following cases:
1.Transfer with Express consent: After obtaining your express consent, we will transfer your personal information to other parties.
2.In the case of merger, acquisition or bankruptcy liquidation, such as the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to seek authorization from you again.
(3) Public disclosureWe will only publicly disclose your personal information in the following circumstances:
1.Disclose your designated personal information in the manner of disclosure that you expressly agree to
2.If your personal information is required by laws, regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information in accordance with the type and disclosure method of personal information required.
Under the premise of complying with laws and regulations, when we receive the above request for disclosure of information, we will require the issuance of corresponding legal documents, such as subpoena or investigation letter.
4.How do we protect your Personal Information
1.We have adopted industry-standard security measures to protect the personal information you provide and prevent unauthorized access, public disclosure, use, modification, damage or loss of the data.
We will take all reasonably practicable measures to protect your personal information.
For example, when exchanging data (such as credit card details) between your browser and the Service, it is protected by SSL encryption; We also provide secure access to our websites via https; We will use encryption technology to ensure data confidentiality; We use trusted safeguards to protect data from malicious attacks.
We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; And we will conduct security and privacy training courses to enhance staff awareness of the importance of protecting personal information.
2.We will take all reasonably practicable measures to ensure that no irrelevant personal information is collected.
Unless we have your written permission, we will retain your personal information for 36 months and only after you delete or close your account, after which time we will anonymize or destroy your personal information.
3.The Internet is not an absolutely secure environment, and email, instant messaging, and communication with other users are not encrypted.
We strongly recommend that you do not send personal information in this way.
Please help us keep your account secure by using a complex password.
4.The Internet environment is not 100% secure and we will do our best to ensure or guarantee the security of any information you send us.
If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibilities.
5.In the event of an unfortunate personal information security incident, we will inform you in a timely manner in accordance with the provisions of the second paragraph of Article 42 of the Network Security Law: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you, etc.
We will timely inform you of the relevant situation of the incident by email, letter, telephone, push notification and other means.
If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to make announcements.
At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
5.How do you manage your personal information
1.You may access, modify and delete your registration information and other personal information during the use of our services, or you may also contact us in accordance with the notification guidelines.
The scope and method of your access, modification and deletion of personal information will depend on the specific services you use.For example, if you wish to stop sharing your location information when using location-based services, you can stop sharing by using the location-based shutdown function of your mobile phone, the shutdown methods of hardware and software service providers and communication service providers.
You are advised to read the relevant guidelines carefully.
2.We will collect and use your information in accordance with this policy only for the purpose of realizing the functions of our products or services.If you find that we collect or use your personal information in violation of laws, administrative regulations or mutual agreement, you may request us to delete it.If you find any errors in your personal information collected or stored by us, you may also request us to correct them.When you access, modify and delete relevant information, we may require you to verify your identity to ensure the security of your account.
3.In accordance with the requirements of laws and regulations, we will not be able to respond to your request under the following circumstances:Directly related to national security and national defense security.Those directly related to public security, public health or major public interests.Those directly related to the investigation, prosecution, trial and enforcement of judgments of crimes.Where there is sufficient evidence of subjective malice or abuse of rights on your part.Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.Those involving trade secrets.
6.Personal information about children
Our products, websites and services are primarily aimed at adults.
Minors are not allowed to create their own user accounts without the consent of their parents or guardians.
In cases where a minor's personal information is collected with parental consent, we will only use or publicly disclose this information if required by a judicial or administrative authority, with the express consent of the parent or guardian, or if it is necessary to protect the minor.Although local laws and customs define minors differently, we consider anyone under the age of 16 to be a minor.If we find that we have collected a minor's personal information without prior verifiable parental consent, we seek to delete the data as soon as possible.
7.How can this policy be updated
Our privacy policy will be updated from time to time.We will not normally reduce your rights under this Privacy Policy.
We will post an updated version on this page and notify you of any changes to this Policy by means of a pop-up box or an equally prominent pop-up box.
By agreeing to this, you agree to be bound by this Policy as amended.