"Collage Maker" (hereinafter referred to as "this APP") is fully aware of the importance of personal information to you, attaches great importance to the protection of users' personal information and privacy rights, and will make every effort to protect the security and reliability of your information. It will never abuse or disclose your private information.
Please understand that before using all products and services of this APP, you should read and understand this Privacy Policy in full, clearly understand our processing rules for your personal information and other information, and make appropriate choices accordingly. If you do not agree to any content of this Privacy Policy, it means you choose to give up using all products and services of this APP, please stop using all products and services of this APP immediately. When you use any product or service of this APP, it means you agree to and fully understand all contents of this Privacy Policy.
The permissions and user information obtained by this APP follow the following principles: the principle of clear purpose, the principle of optional consent, the principle of minimization, the principle of openness and transparency, and the principle of consistency of rights and responsibilities. Before using our products, please read and understand the following instructions carefully:
When we provide services, we may collect, store and use the following information related to you. If you do not provide relevant information, you may not be able to register as our user, enjoy certain services we provide, or achieve the intended effect of relevant services.
Your shared information provided by other parties when using our services.
You are aware that we cannot obtain the personal information you provide to external third parties (excluding companies under the Collage Maker brand) or the personal information about you collected by external third parties, and we will never use unconventional methods (such as maliciously interfering with the APP data of the other party) to obtain your personal information without permission through software programs. If it is necessary to indirectly collect (such as sharing) your personal information from a third party due to business development needs, and we directly or jointly provide products or services for you, we (or the third party) will clearly inform you of the source, type, purpose of use, method, and the business function for which it is used, and the scope of authorized consent before collection (if the method and scope of use exceed the original authorization scope of you in the third party, we will obtain your authorization consent again). Such scenarios include when you log in to our products and/or services directly through a third-party account, the account information (including avatar, nickname) you authorize to share that we obtain from the third party; when some of our products/services are provided by business partners or jointly provided by us and business partners, in order to carry out the necessary/reasonable business smoothly, some of your information we indirectly collect from some business partners; and the information about you provided by other parties when using our products and/or services (including the content related to you released, including comments, pictures, photos, videos).
We always follow the principles of "legality, legitimacy and necessity", and collect your personal information only to realize service functions, ensure use security and optimize experience. The specific collection scenarios are as follows:
1. Information Automatically Collected During Function Use
When you use photo and picture collage, we may automatically collect:
2. Information You Actively Provide
When you use [Feedback], you may need to actively provide relevant information (such as problem description, contact information, uploaded files), which is only used to respond to your needs.
To realize the above functions, we may need to obtain the following permissions of your device (you can turn them off at any time in device settings; turning them off may affect the use of corresponding functions):
To realize auxiliary functions such as statistical analysis and advertising investment, we may access legal and compliant third-party SDKs. These SDKs may collect your device information (such as device identifiers, network information). For the specific collection scope and purpose, please refer to their official privacy policies. We will require them to strictly abide by this Policy and relevant laws and regulations.
You understand and acknowledge that, in order to provide you with more complete and high-quality products and services, we will authorize business partners to provide you with some services. In such cases, we may share some of your personal information with partners to provide better customer service and user experience. Please note that we will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share the personal information necessary for providing services. We will conduct security assessment and processing on the output form, circulation and use of information data to protect data security. At the same time, we will conduct strict supervision and management of partners. Once we find that they have illegal personal information processing behaviors, we will immediately terminate the cooperation and pursue their legal responsibilities. Currently, our partners include the following types, as detailed below:
1. SDK Name: AFNetWorking
2. SDK Name: Masonry
3. SDK Name: lottie-ios
4. SDK Name: SVProgressHUD
5. SDK Name: MJExtension
6. SDK Name: MJRefresh
7. SDK Names: UMAPM, UMCommon, UMDevice (Umeng Series SDKs)
8. SDK Name: FBSDKCoreKit
9. SDK Name: FirebaseAnalytics
When your behavior may violate laws and regulations, service terms, or involve disputes or complaints, we may collect necessary data such as relevant operation records and device information to fulfill legal responsibilities and handle disputes.
We promise not to collect information unrelated to services; if the collection scope needs to be expanded due to business adjustments, we will inform you in advance and obtain your explicit consent.
(Ⅰ) In order to provide you with higher-quality and more suitable products and/or services, give you a better experience in using products and/or services, or for other purposes you agree to, under the premise of complying with relevant laws and regulations, we may use the personal information collected from you in one of our products and/or services alone or in combination with certain information from other services in a comprehensive statistical and analytical manner, so as to provide you with personalized services/targeted promotions. This includes us providing you with relevant personalized information, sharing information with our partners with your consent so that they can send you information about their products and services, etc. At the same time, we also provide you with an opt-out mechanism for relevant targeted promotions. However, without your consent, we will not actively transmit the aforementioned information to the third party), so that we can recommend the latest news in your area or more suitable service content to you;
(Ⅱ) We may collect your IP address, access date and time, your preferred network behavior, interest preferences and other information when you use our products and/or services to form a user profile to help us better understand how you access and use our products and/or services, maintain and improve our products and/or services, or respond to you in other aspects;
(Ⅲ) We may collect other information when you use our products and/or services for some other reasonable purposes, including: questionnaire responses, relevant information obtained from your interaction with companies under the Collage Maker brand/our partners for research and improvement, comprehensive statistics, data analysis or processing, other purposes with your consent or authorization, compliance with legal provisions or other reasonable purposes. If corresponding options are provided in relevant products and/or services, you can also actively request us to use the personal information you provided and stored in the product and/or service for other services of us or our partners.
As mentioned above, if a function or product/service that needs to collect your personal information is not explained in this Privacy Policy, or we exceed the purpose stated when collecting your personal information and the scope of direct or reasonable association, we will explain to you separately by updating this Privacy Policy, page prompts, pop-ups, message notifications, website announcements or other methods that are easy for you to know before collecting and using your personal information, and provide you with a way to choose to agree independently, and collect and use it only after obtaining your explicit consent.
You agree that we may share your personal information with affiliated parties that support our functions for the purpose of providing you with services. These supports include providing us with infrastructure technology services, payment services, data processing. The affiliated parties that support our functions have no right to use your personal information for purposes other than those specified in this Privacy Policy; if they need to change the purpose of processing personal information, they will obtain your authorization consent separately. Currently, we will not share your personal information with third parties other than affiliated parties. If it is necessary to share your personal information with third parties other than affiliated parties, we will seek your consent separately.
We will not transfer your personal information to any company, organization or individual. However, in the case of merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will inform you and require the new company or organization that holds your personal information to continue to be bound by this Personal Information Protection Policy; otherwise, we will require the company or organization to obtain your authorization consent again.
We will only disclose your personal information when we obtain your explicit consent separately, or based on legal provisions, or at the legitimate request of administrative or judicial authorities.
In cases where laws and regulations or administrative or judicial authorities require the provision of your personal information, we may disclose your personal information in accordance with the required type of personal information and disclosure method. On the premise of complying with the law, when we receive a request for such information disclosure, we will require the submission of corresponding legal documents, such as a subpoena or investigation letter. We will carefully review all requests to ensure they have a legal basis and are limited to data that law enforcement agencies are legally entitled to obtain for specific investigation purposes.
Except as otherwise specified by laws, regulations or regulatory authorities, we will only store your personal information for the necessary and shortest period required for the purposes stated in this Policy. If we terminate services or operations, we will promptly stop activities of continuing to collect your personal information, and at the same time, we will notify you in advance in accordance with relevant laws and regulations, and delete or anonymize your personal information after terminating services or operations, unless otherwise specified by laws, regulations or regulatory authorities.
The personal information collected and generated by us during operations within the People's Republic of China will be stored within China, except in the following cases:
For the above cases, we will ensure compliance with national laws and regulations and relevant regulatory requirements, and provide adequate protection for your personal information.
We attach great importance to information security, have established a dedicated security team, and take all reasonably feasible measures to protect your personal information:
1. Data Security Technical Measures
We will adopt security protection measures that meet industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed, used or modified without authorization, and to avoid data damage or loss.
Our services adopt a variety of encryption technologies. For example, in some services, we will use encryption technology (such as SSL) to encrypt and store your personal information, and isolate it through isolation technology to protect your personal information.
When using personal information, such as information display and information correlation calculation, we will adopt a variety of data desensitization technologies to enhance the security of information in use.
We will also adopt strict data access permission control and multi-factor authentication technology to protect personal information and prevent unauthorized use of data.
2. Other Security Measures We Take to Protect Personal Information
We have an industry-advanced data security management system centered on data and surrounding the data life cycle. We enhance the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We manage and standardize the storage and use of personal information by establishing data classification and grading systems, data security management specifications, and data security development specifications.
We conduct comprehensive security control over data through confidentiality agreements for information contacts, monitoring and auditing mechanisms.
We also hold security and privacy protection training courses to enhance employees' security awareness and their understanding of personal information protection policies and relevant procedures.
3. We only allow employees and partners who need to know this information to access your personal information, and have established strict access permission control and monitoring mechanisms. At the same time, we require all personnel who may have access to your personal information to fulfill corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or termination of the cooperative relationship with Collage Maker.
4. The Internet is not an absolutely secure environment, and communication methods such as email, instant messaging, social software or other service software with other users cannot be determined to be completely encrypted. We recommend that you use complex passwords when using such tools and pay attention to protecting your information security.
5. The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of the personal information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, and thus damaging your legitimate rights and interests, we will bear corresponding legal responsibilities.
6. Security Incident Handling
To respond to risks such as personal information leakage, damage, and loss, we have formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and corresponding handling processes. We have also established an emergency response team for security incidents. In accordance with the requirements of the security incident handling specifications, we activate security plans for different security incidents to stop losses, analyze, locate, formulate remedial measures, and cooperate with relevant departments to trace and crack down. We also regularly organize internal training and emergency drills to enable our relevant staff to master corresponding emergency response strategies and procedures.
In the event of an information security incident, we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation of the security incident and possible impacts, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. At the same time, we will promptly inform you of the relevant situation of the incident by email, letter, phone call, push notification, etc. If it is difficult to inform each information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also take the initiative to report the disposal of the information security incident in accordance with the requirements of the regulatory authorities.
Please understand that due to technical limitations and limitations in risk prevention, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to know that the system and communication network you use to access My Desktop services may have problems due to circumstances beyond our control.
Our products or services are mainly for adults (i.e., over 18 years old). In the process of providing products or services, we presume that you have corresponding civil capacity. If you are a minor (i.e., under 18 years old, the same below), we require you to ask your parents or other guardians to read this privacy policy carefully, and use our services or provide us with information on the premise of obtaining the consent of your parents or other guardians.
If you are the legal guardian of a minor, please pay attention to whether the minor under your guardianship uses our products or services after obtaining your authorization and consent. If you have any questions about the personal information of the minor under your guardianship, please contact us through the means specified in this privacy policy.
We encourage you to review our "Privacy Policy" every time you use our products or services. In order to provide you with better services, we will update the terms of this "Privacy Policy" according to product updates and relevant requirements of laws and regulations. Such updates form part of this "Privacy Policy". If such updates result in a substantial reduction or significant change in your rights under this "Privacy Policy", we will notify you by prompting in a prominent position, sending you a push message or other means before the policy takes effect. If you continue to use our services, it means that you have fully read, understood and agreed to be bound by the revised "Privacy Policy". To protect your legitimate rights and interests, we recommend that you check this policy regularly on the settings page of our platform. If you have any questions about this privacy policy or related issues when using this application, please feel free to contact us by email. Contact email: support@wimnswnp.cn