Release and update date: September 22, 2022 Effective Date: September 22, 2022
ChengDu Meta World Technology, Inc. (registered address: No. 3066, floor 3, building 1-2, No. 69, Junlong street, Jinjiang District, Chengdu, Sichuan) is the operator of Document Almighty King. We take the protection of the personal information and privacy of our users (“you”) very seriously. When you register, log in and use Document Almighty King, we will collect, use, save and share your relevant personal information. In order to present our handling of your personal information, we have formulated the “Document Almighty King Privacy Policy” (hereinafter referred to as “Privacy Policy”), and we promise to handle your personal information strictly in accordance with this Privacy Policy.
This Privacy Policy will help you understand the following: 1. How we collect and use your personal information 2. How we store your personal information 3. How we share, transfer and publicly disclose your personal information 4. How we use cookie technology 5. How third-party products or services obtain your personal information 6. How we protect your personal information 7. How do you manage your personal information 8. How we handle personal information of minors 9. How to update this privacy policy 10. How to contact us
We divide the business functions of Document Almighty King into two categories: basic business functions and extended business functions: (1) The basic business functions are the necessary functions for document scanning and management, including document scanning, storage, and management. (2) Extended business functions include OCR recognition based on scanned documents, and account personalization settings. (1) Circumstances in which we collect and use your personal information in basic business functions 1. Document Scanning When you scan documents and automatically crop, we need to call your device’s camera, photo album and clipboard permissions. We call the above permissions to help you complete document scanning and automatic cropping. This processing is done locally, and we will not collect and use your personal information. If you do not agree to us calling the above permissions, you may Crop and not be able to use our service normally. Please know that even if you have agreed to turn on the camera permission, relevant processing will only be carried out within the scope of the photos you take or choose. 2. Document reading and management When you scan, store, read and delete documents, we need to call your device storage, all document access and clipboard permissions. We invoke the above permissions to help you complete document reading, management, document search, document naming and content editing. Except for the documents you photographed and selected by yourself, we will not process your other documents in the storage space. , if you do not agree to our invocation of the above permissions, you may not be able to use our services normally because you cannot complete document reading and management. 3. Ensure basic security of network access and services In order to ensure the basic security of your account, network access and services, we need to call your device’s phone, Face ID permissions, and we need to collect your unique device identifiers (IMSI, IMEI, IDFA, AndroidID, Face ID, OAID, MEID, UUID (IDFV), device hardware serial number, unique identifier obtained by algorithm), language of mobile phone system, country, city, IP address, MAC address, device information (browser type, device type and model, CPU, system language , memory, operating system version, Wi-Fi status, timestamp and region, device motion parameters and carrier), your network behavior track (including clicks, participation time), software installation list, access date and time, service log information . We will combine the above information with the information provided or generated when you use the one-click login service, payment and settlement service, process and data analysis, and form user portraits and relevant risk control records for the account. We collect the above information from you for the purpose of Keep your account, network access and application running safe. 4. Guarantee the reliability and stability of the service In order to ensure the reliability and stability of the service, we need to collect your device model, operating system version, browser type, language used, method of accessing the network, network quality data, and document Almighty King registered account ID. We will also collect the running data and software crash data of Document Almighty King through Firebase SDK, Umeng SDK, and Huawei AGC SDK. We collect the above information from you to ensure the reliability and stability of the application operation.
We will keep your personal information within the minimum retention period required for the purposes sta@ted in this Privacy Policy, unless otherwise required by laws and regulations, or you have authorized us to extend the retention period. After the aforementioned period expires, we will delete or anonymize your personal information. We store your personal information in China. If you request to transfer your personal information overseas, please contact us at support@yuanma.live, and we will abide by relevant laws and regulations for processing. ## 3. How do we share, transfer and publicly disclose your personal information 1. Share You consent to our sharing of your personal information with affiliates that support our features in order to provide services to you. These supports include providing us with infrastructure technical services, payment services, data processing, and affiliates supporting our functions have no right to use your personal information for other purposes unrelated to the purposes stated in this Privacy Policy; For the purpose of processing the information, they will obtain your authorization and consent. We currently do not share your personal information with third parties other than related parties. If we need to share your personal information with third parties other than related parties, we will seek your consent separately. 2. Transfer We will not transfer your personal information to any company, organization or individual, but when a merger, acquisition or bankruptcy liquidation is involved, if the transfer of personal information is involved, we will inform you and require new holders of your personal information The company or organization that owns your company or organization will continue to be bound by this personal information protection policy, otherwise we will require the company and organization to seek your authorization and consent again. 3. Public Disclosure We will only publicly disclose your personal information when we obtain your explicit consent, or based on legal requirements, or the lawful requirements of administrative or judicial authorities. When it is necessary to provide your personal information as required by law, administrative authorities or judicial authorities, we may publicly disclose your personal information according to the type and disclosure method of the requested personal information. Under the premise of compliance with the law, when we receive the above-mentioned request to disclose information, we will require the issuance of corresponding legal documents, such as subpoenas or investigation letters. We will carefully review all requests to ensure they have a legitimate basis and are limited to data law enforcement authorities have legitimate authority to obtain for specific investigative purposes.
You agree and understand that in order to provide better services, our products may integrate or access third-party services, including SDK, API or H5. In order for you to better understand the types of third-party services and access methods, you can check the [Third-Party List] for further understanding.
We take the security of users’ personal information very seriously. To this end, we have adopted industry-wide data protection technologies and management measures, such as network isolation, data encryption, access control, identity authentication, malicious code prevention, and security audits. Please be aware that although we have taken reasonable measures to protect your information in accordance with the law, no system or network is absolutely secure. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will be liable to the extent required by law, and we will also We will do our best to investigate the legal responsibility of the infringer, and we hope that you will do your best to cooperate with our work. In the event of an unfortunate personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions you can take to prevent and reduce risks, remedies for you, etc. We will inform you of the relevant circumstances of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subjects one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities. Our responsible department for personal information security is the [Information Security Committee] and the email address is xiaoshitouerdian@cdymsjkjyxgs2.wecom.work.
Our Privacy Policy may change from time to time. We will post any changes to this Privacy Policy on this page. For major changes, we will also