Privacy Policy
We respect your privacy and do our utmost to protect it.
To facilitate your login, use of related services, and to provide you with a more personalized user experience and services, we may collect and use your relevant information when you use our services. We will take security protection measures as required by laws and regulations to protect your user information security and controllability. We hope to explain to you through this privacy statement how we collect, use, store, and disclose your information when using Kuaiyizhi (collectively referred to as “this service”), and the methods we provide for you to access, update, control, and protect this information.
If you are a user in mainland China, we will collect and use your personal information in accordance with the “Cybersecurity Law of the People’s Republic of China,” “Information Security Technology Personal Information Security Specification” (GB/T 35273-2017), and other relevant laws and regulations to provide you with Kuaiyizhi products and/or services. We typically only collect your personal information with your consent. In certain cases, we may also collect your personal information based on legal obligations or the necessity to fulfill contracts, or may need personal information to protect your important interests or the interests of others.
By using our services, you agree that we may collect, use, store, and disclose your relevant information in accordance with this privacy statement, as well as the control and protection measures we provide to you. We hope to clearly introduce our processing methods for your information through this privacy policy, so we recommend that you read this privacy policy completely to help you understand how to maintain your privacy rights.
I. Scope of Declaration
The “information” in this privacy policy specifically refers to the information collected in Article II.
II. Scope of Information Collection
- 2.1 To complete necessary activities such as registration, management, and real-name authentication of Kuaiyizhi accounts, you need to submit true, legal, and valid information, including but not limited to name, contact person, email address, phone number, contact address information, etc.
- 2.2 To provide continuous services and ensure service quality, during your use of this service, we will record and save information about your login and use of this service, including but not limited to IP address, browser type, language used, access date and time, software and hardware characteristic information, user identifiers, and web browsing records, etc.
III. How Information is Collected
-
3.1 We collect your information through your active submission and corresponding records generated during your use of our services
-
3.2 We may collect and use your information through Cookies and other related technologies. Our specific purposes for using Cookies include:
- Remembering your identity. For example: Cookies help us identify you as our registered user;
- Analyzing your use of our services to provide you with more thoughtful personalized services, recommendations, etc.
-
3.3 You can refuse or manage Cookies through browser settings. However, please note that if Cookies are disabled, you may not be able to enjoy the best service experience, and the availability of certain functions may be affected.
-
3.4 Information recorded by Kuaiyizhi Cookies will be subject to this privacy statement.
IV. Information Use
To provide you with higher quality, more convenient, and secure services, in compliance with relevant laws and regulations, we may use the collected information for the following purposes:
- Providing services to you;
- Meeting your personalized needs. For example, language settings, location settings, personalized help services and instructions, or other responses to you and other users;
- Service optimization and development. For example, we will optimize our services based on information generated when the Kuaiyizhi system responds to your needs;
- Protecting Kuaiyizhi, Kuaiyizhi users, and Kuaiyizhi partners. For example, we will use your information for identity verification, security prevention, complaint handling, dispute coordination, fraud monitoring, etc. For example, when you use security features or other similar services, we will detect malicious programs or viruses, or help you identify fraudulent information;
- Providing you with more relevant services. For example, providing you with similar functions or services that may interest you;
- Inviting you to participate in surveys about our products and services;
- Other relevant scenarios where collected information may need to be used. If the usage scenario has no reasonable connection with the initial scenario, we will re-obtain your consent before using the information.
V. Information Disclosure
Without your consent, we will not share your information with any unrelated third parties, except in the following circumstances:
-
5.1 As our business continues to develop, we and our affiliated companies may engage in mergers, acquisitions, asset transfers, or similar transactions, and your information may be transferred as part of such transactions. We will comply with relevant laws and regulations, notify you before the transfer, ensure the confidentiality of information during the transfer, and continue to fulfill corresponding responsibilities and obligations after the change.
-
5.2 We may also disclose your information for the following reasons:
Compliance with applicable laws and regulations and other relevant provisions; Compliance with court judgments, rulings, or other legal procedures; Compliance with requirements of relevant government agencies or other authorized agencies; We have reasonable grounds to believe that compliance with laws and regulations and other relevant provisions is necessary; For purposes reasonably necessary to execute relevant service agreements or this privacy statement, maintain public interests, handle complaints/disputes, and protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliated companies, other users, or employees. Circumstances where you have legally authorized. If we disclose your information for the above reasons, we will promptly inform you based on compliance with relevant laws and regulations and this statement.
VI. Information Storage
- 6.1 Information about you collected by Kuaiyizhi is stored on Kuaiyizhi servers located in mainland China.
- 6.2 Generally, we only retain your information during the period of providing services to you, and the retention time will not exceed the time necessary to fulfill the relevant usage purposes.
- 6.3 However, in the following circumstances, and only for purposes related to these circumstances, we may need to retain your information or part of your information for a longer period: - Compliance with applicable laws and regulations and other relevant provisions; - Compliance with court judgments, rulings, or other legal procedures; - Compliance with requirements of relevant government agencies or other authorized agencies; - We have reasonable grounds to believe that compliance with laws and regulations and other relevant provisions is necessary; - For purposes reasonably necessary to execute relevant service agreements or this privacy statement, maintain public interests, handle complaints/disputes, and protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliated companies, other users, or employees.
VII. Information Security
-
7.1 We strive to ensure information security to prevent loss, improper use, unauthorized access, or disclosure of information.
We use various security technologies to ensure information security. For example, we will implement security measures such as server multi-backup and password encryption to prevent information leakage, damage, or loss; we establish strict management systems and processes to ensure information security. For example, we strictly limit the scope of personnel who can access information and conduct audits, requiring them to comply with confidentiality obligations; we attach importance to information security compliance work and establish good coordination and communication mechanisms with regulatory agencies and third-party evaluation agencies to promptly resist and handle various information security threats and provide comprehensive protection for your information security; but please understand that due to technical limitations and various malicious means that may exist, in the internet environment, even if we do our utmost to strengthen security measures, it is impossible to always ensure 100% information security. You need to understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control.
-
7.2 If personal information leakage and other security incidents occur, we will activate emergency response plans, prevent the expansion of security incidents, report in a timely manner in accordance with the “National Cybersecurity Incident Emergency Response Plan” and other relevant provisions, and inform you of the relevant situation through methods such as sending emails, push notifications, and announcements, and provide you with security recommendations.
-
7.3 To more effectively protect your information security, we also hope that you can strengthen your self-protection awareness. We are only responsible within the scope of Kuaiyizhi directly causing your personal information leakage, so please properly keep your account and password information to avoid leakage of your personal information. Unless you judge it necessary, do not provide your account password and other personal information to any third party.
VIII. Access and Control
- 8.1 You can access, modify, and delete your relevant information during the process of using our services. The methods for you to access, modify, and delete information will depend on the specific services you use.
- 8.2 If you find that we collect and use your information in violation of laws and regulations or the agreement between both parties, you can require us to delete it. If you find that the information we collect and store about you is incorrect and cannot be corrected by yourself, you can also require us to correct it.
- 8.3 When accessing, modifying, and deleting relevant information, we may require you to undergo identity verification to ensure account security. Please understand that due to technical limitations and legal requirements, some of your requests may not be able to be responded to.
- 8.4 Based on legal requirements and legitimate reasons such as ensuring information security, some of your information may not be accessible, modifiable, or deletable.
- 8.5 You can choose to withdraw consent for the processing of your information for certain non-basic functions or services, and choose to cancel your Kuaiyizhi account through contacting Kuaiyizhi administrators and appeal methods.
- 8.6 If you have questions about the implementation of the above rights, you can contact us through the relevant contact methods in “X. Contact Us”
IX. Changes
We may revise the terms of this privacy statement from time to time, and such revisions constitute part of this “Privacy Policy.” When important rule changes such as substantial reduction of your rights under this privacy statement or expansion of the scope of information collection and use may occur, we will notify you by posting prominent notices on the homepage or sending emails or other methods before the revision takes effect. In such cases, if you continue to use our services, it means you agree to be bound by the revised privacy statement.
X. Contact Us
If you have any questions or suggestions about these terms, please contact us according to the instructions on this page: https://kuaiyizhi.cn/en/meta/advice. We will review the issues involved as soon as possible and respond within thirty days after verifying your user identity.
XI. Terminology Explanation
The terms used in this privacy protection guide have the following definitions in their usual sense:
Personal Information: Personal information refers to various information recorded in electronic or other ways that can identify the identity of a natural person individually or in combination with other information, including but not limited to the name, date of birth, ID number, personal biometric information, address, phone number, etc. of a natural person.
Personal Sensitive Information: Personal sensitive information refers to personal information that, once leaked, illegally provided, or abused, may harm personal and property safety, and is extremely likely to cause damage to personal reputation, physical and mental health, or discriminatory treatment. For example, personal sensitive information includes ID numbers, personal biometric information, bank account numbers, communication content, health and physiological information, etc.
Device: Device refers to devices that can be used to access Kuaiyizhi products and/or services, such as desktop computers, laptops, tablets, or smartphones.
Unique Device Identifier: A unique device identifier (unique ID or UUID) refers to a string of characters programmed into the device by the device manufacturer, which can be used to identify the corresponding device in a unique way (such as the IMEI number of a mobile phone). Unique device identifiers have various uses, including providing advertisements when Cookies cannot be used (such as in mobile applications).
IP Address: Every device connected to the internet is assigned a number called an Internet Protocol (IP) address. These numbers are usually assigned based on geographic regions. IP addresses can usually be used to identify the location where the device is located when connected to the internet.
SSL: SSL (Secure Socket Layer), also known as Secure Sockets Layer, is a security protocol implemented on the transmission communication protocol (TCP/IP). SSL supports various types of networks while providing three basic security services, all achieved through the use of public key and symmetric key technology to achieve information confidentiality.
Information Collection Technology: The “automatic collection” we mentioned in the ”Kuaiyizhi Privacy Protection Guide” includes the following methods: A. Cookie (Cookie files) Cookies are small text files that website servers place in the client (your computer, mobile phone, or other smart terminal) when you browse web pages. When you visit the corresponding website again, the website can identify your browser through Cookies. Cookies may store user preferences and other information. You can configure your browser to reject all Cookies or display prompts when websites send Cookies. However, without Cookies, certain website functions or services may not work properly. For details, see the ”Kuaiyizhi Cookie Guide”. B. Web beacon (web beacon) Web beacons are electronic image files or other technologies embedded in websites or emails that can be used to count visitor numbers, record whether and when you view emails or websites, or to use certain Cookies. C. Log files (log files) Log files store several automatically collected data. This data includes Internet Protocol (IP) addresses, browser types, Internet Service Providers (ISP), referral/exit pages, operating systems, date/time stamps, and clickstream data, etc. D. ET Tag (entity tag) ET Tag is an HTTP protocol header transmitted behind the Internet browser and Internet server, which can replace Cookies to track individual users, allowing us to better understand and improve our services. E. JavaScript JavaScript is a programming language used to create more interactive and dynamic web pages. JavaScript can set Cookies, read Cookies, and delete Cookies.
Affiliated Companies: Refers to any company or institution that one party now or in the future controls, is controlled by, or is under common control with. “Control” means the ability to directly or indirectly influence the management of the mentioned company, whether through ownership, voting shares, contracts, or other legally recognized methods.
Algorithm: The process or series of rules that computers follow when performing problem-solving operations.
Application Data Cache: Application data cache refers to a data storage mechanism on devices. Using it has many benefits, such as allowing web applications to run without an internet connection, and improving the performance of related applications by increasing content loading speed.
Using Browser for Web Storage: The “using browser for web storage” mechanism allows websites to store data in the browser on the device. If this mechanism is used in “local storage” mode, data can be stored across various sessions. This way, users can still access the corresponding data even after closing and reopening the browser. One of the technologies that helps achieve web storage is HTML 5.
Account: As long as you register an account and provide us with some personal information (as explained in section 3.1 of this guide), you can use our services. When you access Kuaiyizhi, the system will use this account information to authenticate you to prevent unauthorized personnel from accessing your account.
Non-personal Identity Information: Information recorded in relation to users but which actually cannot directly or indirectly identify your identity, including personal information provided through de-identification, anonymization, or pseudonymization methods.
De-identification: Refers to the technical processing of personal information so that the personal information subject cannot be identified without the assistance of additional information.
Anonymization: Refers to the technical processing of personal information so that the personal information subject cannot be identified, and the processed information cannot be restored.
Server Logs: Like most websites, our servers automatically record web page requests you make when visiting the website. These “server logs” usually include your web requests, Internet Protocol addresses, browser types, browser languages, the date and time of requests, and one or more Cookies that can uniquely identify your browser.