Last Updated: November 19, 2024

Privacy Policy

This policy applies only to the Wajibao products or services of Henan Zhengzhou Zhiqing Linghang Technology Co., Ltd. Last updated: November 14, 2024. The products and services covered by this privacy policy are provided by Zhengzhou Zhiqing Linghang Technology Co., Ltd. This policy will help you understand the following content. The registered address and office address are both located at Room 601, Unit B, 6th Floor, No. 1212 Hanghai East Road, Zhengzhou Area (Jingkai), Henan Free Trade Zone.
We deeply understand the importance of user information to you and will do our utmost to protect the security and reliability of your user information. We are committed to maintaining your trust in us and adhering to the following principles to protect your user information: principle of consistency between rights and responsibilities, principle of clear purpose, principle of choice and consent, principle of minimum necessity, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc. At the same time, we promise that we will adopt corresponding security protection measures to protect your user information in accordance with mature security standards in the industry. Please carefully read and understand this privacy policy before using our products (or services).

1. How We Collect and Use Your User Information

(1) Information We Collect and Use During Your Use of Our Products or Services

We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide such information, but in most cases, if you do not provide it, we may not be able to provide you with corresponding services or respond to problems you encounter:

When you use our services, we are allowed to collect information that you voluntarily provide to us or that is necessary to provide you with services, including: account password information, email address, mobile phone number, device information, external device connection information, device information (device serial number/IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/IP address/SIM card IMSI information, etc.), location information, network identity identification information, application list, clipboard, read and write storage device SD card.

The following provides detailed explanations of the information we use:

  1. Your account password information will be used to log into your account, ensure the security of your personal data, and prevent theft by other users.
  2. Your email address will be used as one of the login methods and can also be used as a way to retrieve and reset account passwords.
  3. Your mobile phone number will be used as one of the login methods and can also be used as a way to retrieve and reset account passwords.
  4. Your device information will be used to optimize software adaptation, such as the phone's screen resolution can optimize the layout of the software interface, and the phone's network mode is used to optimize and save user traffic information.
  5. Your external device connection information and external device status will be used to optimize software adaptation with third-party devices. For example, when connecting external GPS and Beidou positioning devices, different communication instructions can be sent through the device model to improve communication reliability.
  6. Your location information will be used to identify positioning differential information. Our software uses GPS, Beidou and other satellite positioning system differential technology to improve positioning accuracy. This technology can improve positioning accuracy to the centimeter level, but this technology requires sending the user's location information to the differential service provider's server to obtain appropriate differential data. At the same time, in order for the software to connect to third-party GPS and Beidou devices, Bluetooth communication is required, and when searching for Bluetooth, the Android system requires the use of location permissions, so Bluetooth search and connection will also require location permissions.
  7. Your network identity identification information will be used to reduce the risk of remote login and account theft.
  8. Your application list information will be used to verify whether other software developed by our company is installed, so as to facilitate data sharing and calling between our company's software.
  9. Your clipboard information will be used to quickly copy and paste data between different interfaces of the software, improving your work efficiency.
  10. Read and write storage SD card permissions will be used to read CAD files, read files that users want to import, save user-exported private data, and back up user private data.
  11. Your device information (device serial number/IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/IP address/SIM card IMSI information, etc.) will be used to identify the needs of individual function detection and binding devices, because individual functions are not open to all users and require authorization for specified devices to use.
  12. When using engineering stakeout or map-related functions, we will call the device's gyroscope, acceleration, and gravity sensors to identify and judge your device status, so as to provide users with intuitive directional information. Please understand that individual device sensor data does not involve any personal location information and cannot be combined with other information to identify the identity of a specific natural person.

The above information you provide will continue to authorize us to use during your use of this service. When you stop using the push service, we will stop using and delete the above information.

We guarantee that we will legally de-identify or anonymize the collected user information. Information that cannot identify the personal identity of a natural person individually or in combination with other information does not belong to personal information in the legal sense. If we combine non-personal information with other information to identify your personal identity, or use it in combination with your personal information, we will treat such information as your personal information and process and protect it in accordance with this privacy policy during the combined use period.

In order to better operate and improve our technology and services, or due to changes in business strategy, when the collection, use, and processing of user information required by the products or services we provide exceeds the above scope or when we want to use the collected user information for other purposes not specified in this privacy policy, or when we want to use information collected for specific purposes for other purposes, we will notify you within a reasonable period after obtaining user information or before processing user information and obtain your authorization and consent.

(2) Exceptions to Obtaining Authorization and Consent

Please understand that according to laws, regulations and relevant national standards, in the following circumstances, we do not need to obtain your authorization and consent to collect and use your user information:

  1. Directly related to national security and national defense security;
  2. Directly related to public security, public health, and major public interests;
  3. Directly related to criminal investigation, prosecution, trial, and judgment execution;
  4. For the purpose of maintaining your or other individuals' life, property and other major legitimate rights and interests but it is difficult to obtain the person's consent;
  5. The user information we collect is disclosed by you to the public;
  6. Your user information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
  7. Necessary for signing or performing contracts according to your requirements;
  8. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling faults in software and related services;
  9. The personal information controller is a news organization and it is necessary for conducting legal news reporting;
  10. Academic research institutions conduct statistics or academic research based on public interests, and when providing academic research or descriptive results to the outside world, de-identify the personal information contained in the results.
  11. Other circumstances stipulated by laws and regulations.

2. How We Use Cookies and Similar Technologies

(1) Cookies

To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, websites can store your access preference data.

We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have the function to block cookies. But if you do this, you need to personally change user settings every time you visit our website.

(2) Web Beacons and Pixel Tags

In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our websites. For example, emails we send to you may contain click URLs that link to content on our website. If you click on the link, we will track this click to help us understand your product or service preferences and improve customer service. Web beacons are usually transparent images embedded in websites or emails. With the help of pixel tags in emails, we can know whether emails are opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

(3) Do Not Track

Many web browsers have Do Not Track functionality, which can send Do Not Track requests to websites. Currently, major Internet standards organizations have not established relevant policies to specify how websites should respond to such requests. But if your browser has Do Not Track enabled, then all our websites will respect your choice.

3. How We Share, Transfer, and Publicly Disclose Your User Information

(1) Sharing

We will not share your user information with any other companies, organizations, and individuals, except in the following circumstances:

  1. Sharing with explicit consent: After obtaining your explicit consent, we will share your user information with other parties.
  2. We may share your user information externally according to laws and regulations or mandatory requirements of government authorities.
  3. Sharing with our affiliated companies: Your user information may be shared with our affiliated companies. We will only share necessary user information and are bound by the purposes stated in this privacy policy. If affiliated companies want to change the processing purpose of user information, they will seek your authorization and consent again.
  4. Sharing with authorized partners: Only to achieve the purposes stated in this policy, some of our services will be provided by authorized partners. We may share some of your user information with partners to provide better customer service and user experience. We will only share your user information for legal, legitimate, necessary, specific, and clear purposes, and will only share user information necessary to provide services. In order to better operate and improve technology and services, you agree that we and authorized partners may use the collected information for other services and purposes under the premise of complying with relevant laws and regulations.

The following lists specific authorized partners and provides links to the privacy policies of these third parties. We recommend that you read the privacy policies of these third parties:

(a) Statistical service provider: Statistical technical services are provided by Beijing Ruixun Lingtong Technology Co., Ltd. We may collect your device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/IP address/SIM card IMSI information, etc.) and provide it to Beijing Ruixun Lingtong Technology Co., Ltd. for providing you with statistical technical services. For details, please visit "Umeng Statistics Privacy Policy". Umeng Statistics Privacy Policy link: https://www.umeng.com/page/policy

(b) Advertising and media: We may share the collected information with advertising, media, and our other authorized partners for commercial purposes including optimizing advertising placement and improving marketing effectiveness.

(c) Push service provider: Push technical services are provided by Mewei Bookmark (Beijing) Information Technology Co., Ltd. We may provide your device platform, device manufacturer, device brand, device identification code and other device information, application list information, network information, and location-related information to Mewei Bookmark (Beijing) Information Technology Co., Ltd. for providing you with push technical services.

For companies, organizations, and individuals with whom we share user information, we will sign strict confidentiality agreements with them, requiring them to handle user information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.

(2) Transfer

We will not transfer your user information to any company, organization, or individual, except in the following circumstances:

  1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your user information to other parties;
  2. In the event of merger, acquisition, or bankruptcy liquidation, if user information transfer is involved, we will require the new company or organization holding your user information to continue to be bound by this privacy policy, otherwise we will require the company or organization to seek authorization and consent from you again.

(3) Public Disclosure

We will only publicly disclose your user information in the following circumstances:

  1. After obtaining your explicit consent;
  2. Disclosure based on law: In the case of law, legal procedures, litigation, or mandatory requirements of government authorities, we may publicly disclose your user information.

(4) Exceptions to Obtaining Authorization and Consent in Advance When Sharing, Transferring, and Publicly Disclosing Information

Please understand that according to laws, regulations, and relevant national standards, in the following circumstances, we do not need to obtain your authorization and consent to share, transfer, and publicly disclose your user information:

  1. Directly related to national security and national defense security;
  2. Directly related to public security, public health, and major public interests;
  3. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
  4. For the purpose of maintaining your or other individuals' life, property and other major legitimate rights and interests but it is difficult to obtain the person's consent;
  5. Information you voluntarily disclose to the public;
  6. Collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.

4. How We Protect Your User Information

(1) We have used security protection measures that meet industry standards to protect the user information you provide, preventing data from unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonable and feasible measures to protect your user information. For example, data exchanged between your browser and "Services" is protected by SSL encryption; we also provide https secure browsing for websites; we use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent data from malicious attacks; we deploy access control mechanisms to ensure that only authorized personnel can access user information; and we hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting user information.

(2) We will take all reasonable and feasible measures to ensure that irrelevant user information is not collected. We will only retain your user information for the period required to achieve the purposes described in this policy, unless an extended retention period is required or permitted by law.

(3) The Internet is not an absolutely secure environment, and email, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send user information through such methods.

(4) The Internet environment is not 100% secure, and we will do our best to ensure the security of any information you send to us. Even though we have made great efforts and taken all reasonable and necessary measures, it is still possible that your user information may be illegally accessed, illegally stolen, illegally tampered with or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of information networks and voluntarily bear them.

(5) After the unfortunate occurrence of a user information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation of the security incident and possible impacts, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, remedial measures for you, etc. We will promptly inform you of the relevant situation of the incident by email, letter, telephone, push notification, etc. When it is difficult to inform user information subjects one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also actively report the handling of user information security incidents in accordance with the requirements of regulatory authorities.

5. Your Rights

In accordance with relevant laws, regulations, and standards of China, as well as common practices in other countries and regions, we guarantee that you exercise the following rights regarding your own user information:

(1) Access Your User Information

You have the right to access your user information, except in circumstances stipulated by laws and regulations. If you want to exercise data access rights, you can access them yourself through the following methods: www.wajibao.com

If you cannot access this user information through the above link, you can contact us using our web form at any time, or send an email to liu@bingce.com. We will reply to your access request within 30 days.

For other user information generated during your use of our products or services, as long as we do not need to invest too much, we will provide it to you. If you want to exercise data access rights, please send an email to liu@bingce.com.

(2) Correct Your User Information

When you find that the user information we process about you is incorrect, you have the right to request us to make corrections. You can submit correction applications through the methods listed in "(1) Access Your User Information". If you cannot correct this user information through the above link, you can contact us using our web form at any time, or send an email to liu@bingce.com. We will reply to your correction request within 30 days.

(3) Delete Your User Information

In the following circumstances, you can request us to delete user information:

  1. If our processing of user information violates laws and regulations;
  2. If we collect and use your user information without obtaining your consent;
  3. If our processing of user information violates our agreement with you;
  4. If you no longer use our products or services, or you cancel your account;
  5. If we no longer provide products or services to you.

We will evaluate your deletion request, and if it meets the corresponding regulations, we will take corresponding steps to process it. When you make a deletion request to us, we may require you to verify your identity to ensure account security. After you delete information from our services, due to applicable laws and security technology, we may not immediately delete the corresponding information from the backup system. We will securely store your information until the backup can be cleared or anonymized.

(4) Change the Scope of Your Authorization and Consent

Each business function requires some basic user information to be completed (see "Part 1" of this policy). For the collection and use of user information, you can give or withdraw your authorization and consent at any time. You can operate by yourself in the following ways: find this application in Android system settings application management, find permission management, and you can turn on or off certain permissions.

When you withdraw consent, we will no longer process the corresponding user information. Please also note that your withdrawal of authorization and consent may lead to certain consequences, such as we may not be able to continue to provide you with corresponding services or specific functions, but your decision to withdraw consent will not affect the user information processing previously carried out based on your authorization.

(5) User Information Subject Account Cancellation

You can cancel your previously registered account at any time. You can operate in the following ways: send an email to liu@bingce.com, and we will provide manual service. After canceling your account, we will stop providing you with products or services and delete or anonymize your information according to your requirements, except as otherwise provided by laws and regulations. This may also result in you losing access to data in your account, so please operate with caution.

(6) User Information Subject Obtains Copy of User Information

You have the right to obtain a copy of your user information. You can operate in the following ways: send an email to liu@bingce.com, and we will provide manual service. Under technically feasible conditions, such as data interface matching, we can also directly transfer your user information copy to a third party you specify according to your request.

(7) Constrain Automatic Decision-Making of Information Systems

In some business functions, we may make decisions based solely on non-human automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request us to provide explanations, and we will also provide appropriate remedies.

(8) Responding to Your Above Requests

For security reasons, you may need to provide a written request or prove your identity in other ways. We may first require you to verify your identity before processing your request.

We will respond within thirty days. If you are not satisfied, you can also complain through the following channels: complain to relevant departments. For your reasonable requests, we generally do not charge fees, but for requests that are repeated multiple times and exceed reasonable limits, we will charge certain cost fees depending on the situation. For requests that are groundlessly repeated, require excessive technical means (for example, require developing new systems or fundamentally changing current practices), bring risks to the legitimate rights and interests of others, or are very impractical, we may refuse. Please also understand that due to security considerations, requirements of relevant laws and regulations, or technical limitations, we may not be able to respond to some of your requests, such as the following circumstances:

  1. Related to the user information controller's fulfillment of obligations stipulated by laws and regulations;
  2. Directly related to national security and national defense security;
  3. Directly related to public security, public health, and major public interests;
  4. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
  5. The user information controller has sufficient evidence to show that the user information subject has subjective malice or abuses rights;
  6. For the purpose of maintaining the life, property and other major legitimate rights and interests of the user information subject or other individuals but it is difficult to obtain the person's consent;
  7. Responding to the user information subject's request will cause serious damage to the legitimate rights and interests of the user information subject or other individuals and organizations;
  8. Involving trade secrets.

6. How Your User Information is Stored and Transferred Globally

In principle, user information collected and generated within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. We will only retain your user information for the period required for the purposes and uses described in this policy and the shortest period stipulated by laws and regulations. After exceeding the above retention period, we will delete your user information or anonymize it according to the requirements of applicable laws and regulations. Except as otherwise provided by laws and regulations, or for the purposes of public interest, scientific and historical research, or with your separate authorization and consent, we may need to retain relevant data for a longer period.

Since we provide products or services through resources and servers distributed around the world, this means that after obtaining your authorization and consent, your user information may be transferred to jurisdictions outside the country/region where you use the products or services, or be accessed from these jurisdictions.

Such jurisdictions may have different data protection laws or may not have established relevant laws. In such cases, we will ensure that your user information receives adequate equivalent protection within the territory of the People's Republic of China. For example, we will request your consent for cross-border transfer of user information, or implement security measures such as data de-identification before cross-border data transfer.

7. Protection of Minors

According to the provisions of relevant laws and regulations, if you are a child under 14 years old, before using relevant products or services, you should obtain the consent of your parents or legal guardians in advance according to the registration and use process, and your parents or legal guardians should help you complete the product or service registration process so that you can use the products or services we provide. If you have relevant questions or rights requests regarding the protection of personal information of children under your guardianship, please contact us through the contact information disclosed in Part 9. We will process and respond to you within a reasonable time.

8. Third-Party SDK Description

  1. Third-party name: Alipay (China) Network Technology Co., Ltd.
  2. Types of personal information collected: Android ID, OAID, AAID, SSID, BSSID; system settings, system properties, device model, device brand, operating system; IP address, network type, operator information, Wi-Fi status, Wi-Fi parameters, Wi-Fi list.

Purpose of use:

  1. Ensure the security of user accounts and funds as well as the safe and stable operation of payment services.
  2. Fulfill legal obligations such as anti-money laundering, anti-terrorist financing, and anti-telecom network fraud.
  3. Achieve network link selection and optimization to improve user experience.

9. How This Policy is Updated

Our privacy policy may change. Without your explicit consent, we will not reduce the rights you should enjoy according to this privacy policy. We will publish any changes made to this policy on this page.

For major changes, we will also provide more prominent notices. Major changes referred to in this policy include but are not limited to:

  1. Major changes in our service model, such as the purpose of processing user information, the type of user information processed, the way user information is used, etc.;
  2. Major changes in our ownership structure, organizational structure, etc., such as owner changes caused by business adjustments, bankruptcy and mergers, etc.;
  3. Changes in the main objects of user information sharing, transfer, or public disclosure;
  4. Major changes in your rights regarding user information processing and the way they are exercised;
  5. When our responsible department for handling user information security, contact information, and complaint channels change;
  6. When the user information security impact assessment report indicates high risks.

We will also archive old versions of this policy for your review.

10. How to Contact Us

If you have any questions, comments, or suggestions about this privacy policy, please contact us in the following ways:

Email: liu@bingce.com

Phone: 13657190002

We have established a dedicated department for user information protection. You can contact relevant personnel in the following ways: liu@bingce.com

We will review the issues involved as soon as possible and provide feedback within 15 working days or the period stipulated by laws and regulations.

If you are not satisfied with our reply, especially if our user information processing behavior has damaged your legitimate rights and interests, you can also seek solutions through the following external channels: complain to relevant departments.