Unzip Tool Privacy Policy
Unzip Tool Privacy Policy

Unzip Tool Privacy Policy

This privacy policy is issued and effective by Liaoning Qisi Technology Co., Ltd. from October 13, 2022

Developer name: Liaoning Qisi Technology Co., Ltd

Official website: https://www.qisikeji.link/

Developer Contact: yanwei_liluo@163.com

This privacy policy will help you understand

(1) Decompression software steward is a tool APP developed by Liaoning Qisi Technology Co., Ltd. We will collect some of your necessary information to realize core functions such as compression package decompression, file compression, image compression and other functions;

(2) When you publish information, interact, register and authenticate or use location-based services, we may collect personal information such as name, ID card number, contact information, address book, audio and video files, and geographical location based on legal requirements or necessary to achieve functions. You have the right to refuse to provide us with such information or withdraw your authorization of such information. Please understand that refusing or withdrawing the authorization consent will result in your inability to use the relevant specific functions, but will not affect your use of other functions of “Decompression Software Manager”;

(3) We will store your personal information collected and generated in the process of domestic operations in the People’s Republic of China, and will not transfer the above information overseas. We will only retain your personal information for the period necessary for the purpose of providing the “Decompression Software Manager” software and related services;

(4) We will not share, provide, transfer or obtain your personal information from a third party, except with your consent;

(5) We will try to take reasonable security measures to protect your personal information. In particular, we will protect the security of your personal sensitive information in the way that is common in the industry and do our best to make commercial efforts;

(6) The way you access, correct, delete your personal information, withdraw your consent authorization, and cancel your account, complain and report.

If you do not expressly agree to this privacy policy and start using it, we will only collect the information necessary to maintain the use of the decompression function, which will lead to our inability to provide you with complete products and services, but we will also take de identification, encryption and other measures to protect this information. If you do not agree with this privacy policy, we cannot provide you with complete products and services, you can also choose to stop using it. When you choose to continue or reuse, it will be deemed that you have accepted and recognized our handling of your relevant information according to this policy based on the necessity of providing products and services. We attach great importance to the protection of users’ personal information and will treat such information with diligence and prudence. We will collect, save, use, share, disclose and protect your personal information in accordance with this Privacy Policy when you download, install, open, browse, register, log in, use (hereinafter collectively referred to as “use”) the “Decompression Software Manager” software and related services. We hope to introduce our handling methods of your personal information to you through this Privacy Policy, so we suggest that you carefully and completely read all the terms of this Privacy Policy. The content related to your information and rights will be highlighted in bold. Please read it carefully. This privacy policy is designed to help you understand the following contents: 1. How do we collect and use personal information 2. Our use of cookies and similar technologies 3. How do we store personal information 4. How do we share, transfer and publicly disclose personal information 5. How do we protect the security of personal information 6. Your rights 7. Terms of use for minors 8. Amendment and notification of the privacy policy 9. Scope of application 10 other

1、 How we collect and use personal information

When you use the “Decompression Software Manager” software and services, we will collect information according to the principles of legality, legitimacy and necessity. The information we collect or ask you to provide will be used to: 1. ensure the basic normal operation of the product; 2. Realize various functions and services; 3. Optimize and improve products and services; 4. Ensure the safety of products, services and users; 5. Comply with laws, regulations and national standards.

When you use our APP service, we will apply for the following necessary mobile phone sensitive information

·Mobile phone MAC address, MAC address is only used for login verification, various service authentication and click behavior statistics. When users use the APP, we will obtain MAC address information when necessary. The acquisition range is to obtain MAC address information when networking.

When you use our APP services, we will apply for the following necessary mobile APP client permissions to you to obtain the corresponding services.

·android.permission. INTERNET permission and network access permission are necessary. We will use the network to download the corresponding application data, setting information and perform network operations such as user registration and login;

·android.permission. ACCESS_ NETWORK_ STATE, check the network connection. During the use of the APP, the network is necessary. During the use of the service, we will check whether the user client has a network connection to remind the user to make the necessary network connection to obtain our service. For example, when obtaining services such as user registration and login;

·android.permission. ACCESS_ WIFI_ STATE, check the WLAN status. When APP downloads a large amount of data, we will judge the APP network connection to remind users whether the network is free, so as to save user traffic. For example, when sharing compressed files and other services;

·android.permission. WRITE_ EXTERNAL_ STORAGE, read, modify or delete the contents of the memory card. When users use our service to store a large amount of data, they inevitably need storage space. We use this permission to read, modify or delete the data of the APP client, so as to save the user’s mobile phone space. Such as compressed package storage, decompressed file storage and other services

  1. Register, authenticate and log in to “Decompression Software Manager” and related services (1) When you register and log in to “Decompression Software Manager” and related services, you can create an account through your mobile phone number, and we will send a SMS verification code to verify whether your identity is valid, and you can improve the relevant network identity information (such as avatar, nickname and password), which is collected to help you complete your registration. You can also choose to fill in gender, birthday, region, introduction and other information according to your own needs to improve your personal information. (2) You can also use a third-party account (such as WeChat) to log in to the decompression software steward. You will now authorize us to obtain your public information (avatar, nickname, etc.) registered on the third-party platform, and after you agree to this privacy policy, bind your third-party account with your decompression software steward account, so that you can directly log in through the third-party account and use this product and related services.
  2. It provides you with decompression function or service. You can actively obtain file read and write permissions It is used to decompress packages, download and store them locally 4. To help us better understand the operation of the “decompress software steward” and related services, so as to ensure the safety of operation and service provision, we may record network log information, as well as the frequency of using software and related services, crash data, overall installation, usage, performance data and other information.

(2) We may obtain your personal information from a third party. 1. When you log in to the “Decompression Software Manager” with a third-party account, we will collect the nickname, avatar and other information of the third-party account. 2. Information collected by us due to users’ use of our products or services, for example, information published by other users may contain some of your information (such as information related to you in comments, messages, pictures and texts, audio and video).

(3) Please understand that with the development of our business, the functions and services of the “Decompression Software Manager” may be adjusted and changed. When the new function or service is related to the use of the decompression function, the personal information collected and used is directly or reasonably related to the original purpose. When we collect and use your personal information in situations that are not directly or reasonably related to the original purpose, we will inform you again and obtain your consent.

(4) For personal information that is exempted from collection and use according to law, please understand that we do not need your authorization to collect and use your personal information according to laws, regulations and relevant national standards under the following circumstances: (1) those directly related to national security and national defense security; (2) Those directly related to public safety, public health and major public interests; (3) Directly related to criminal investigation, prosecution, trial and execution of judgments; (4) It is difficult to obtain my consent for the purpose of protecting the life, property and other major legitimate rights and interests of the personal information subject or other individuals; (5) Your personal information collected is disclosed to the public by yourself; (6) Your personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels; (7) Necessary for signing or performing the contract according to your requirements; (8) It is necessary to maintain the safe and stable operation of the “Decompression Software Manager” software and related services, such as finding and handling the faults of the “Decompression Software Manager” software and related services; (9) Necessary for legal news reporting; (10) Academic research institutions are necessary to carry out statistics or academic research based on the public interest, and conduct de identification of the personal information contained in the results when providing academic research or described results; (11) Other circumstances stipulated by laws and regulations.

Please note that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; When your information can identify your personal identity alone or in combination with other information, or when we will be unable to establish contact with any specific personal information in combination with other personal information, during the combined use, these information will be treated and protected as your personal information in accordance with this privacy policy.

2、 Use of cookies and similar technologies

Cookies and similar technologies are commonly used in the Internet. When you use the “Decompression Software Manager” software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We use cookies and similar technologies to achieve the following functions or services:

(1) To ensure the security and efficient operation of products and services, we may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you have logged in to the service safely, or whether you have encountered illegal acts such as embezzlement and fraud. These technologies will also help us improve service efficiency and speed up login and response.

(2) Help you get easier access experience Using such technologies can help you avoid repeating the steps and processes of filling in your personal information and entering search content (for example, implementing the one click login process and recording search history).

3、 How we store personal information

(1) Location of information storage We store your personal information collected and generated in the process of domestic operations in the People’s Republic of China in accordance with laws and regulations. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow the relevant national regulations and ask for your consent.

(2) Storage Period We will only retain your personal information during the period necessary for the purpose of providing “Decompression Software Manager” and services, such as audio and video information you released. We will retain relevant information during the period when you have not withdrawn, deleted or cancelled your account. After the necessary period, we will delete or anonymize your personal information, unless otherwise specified by laws and regulations.

4、 How do we share, transfer and publicly disclose personal information

(1) Sharing and transfer of personal information We will not share or transfer your personal information to a third party unless you have given your prior authorization, or the personal information shared or transferred is de identified information, and the sharing third party cannot re identify the natural person subject of such information.

  1. Prudent evaluation and responsibility constraints on third party subjects sharing personal information (1) With your consent, we will only share information necessary to achieve the purpose with the third party. If a third party really needs to use personal information beyond the above authorization due to business needs, the third party will need to ask for your consent again. (2) For the third parties with whom we share your personal information, those third parties will sign a confidentiality agreement with us. At the same time, we will evaluate its data security capability and environment and require a third party to handle such information with confidentiality and security measures no less than those required by this privacy policy.
  2. Transfer of personal information during acquisition, merger and reorganization With the continuous development of our business, we may carry out merger, acquisition and asset transfer, and your personal information may be transferred accordingly. In the event of the aforementioned changes, we will continue to protect or require the successor of personal information to continue to protect your personal information in accordance with laws and regulations and the security standards not lower than those required by this privacy policy, otherwise we will require the successor to obtain your authorization and consent again.

(2) For the public disclosure of personal information, we will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent, except that we will disclose the necessary information of relevant accounts when we make a punishment announcement for illegal accounts and fraud. We will adopt security measures that meet the industry standards when we publicly disclose your personal information.

(3) Please understand that under the following circumstances, according to laws, regulations and national standards, we do not need your authorization to share, transfer and publicly disclose your personal information without your consent (1) it is directly related to national security and national defense security; (2) Those directly related to public safety, public health and major public interests; (3) Directly related to criminal investigation, prosecution, trial and execution of judgments; (4) It is difficult to obtain your consent to protect your or other personal life, property and other major legitimate rights and interests; (5) Personal information you disclose to the public; (6) Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.

5、 How we protect personal information

(1) We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being accessed, disclosed, used, modified, damaged, lost or disclosed improperly or without authorization. (2) We will protect your personal information with reasonable and feasible means such as encryption technology and anonymous processing that are no less than those of the industry peers, and use security protection mechanisms to prevent your personal information from being maliciously attacked. (3) We will establish a special security department, security management system and data security process to ensure your personal information security. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner. (4) Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please pay attention to the technical limitations and solvability. In the Internet industry, even if you try your best to strengthen security measures, it is impossible to always ensure the security of information 100%. We will try our best to ensure the security of the personal information you provide us. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take positive measures to protect the security of your personal information, including but not limited to the use of complex passwords, regular password changes, and not disclosing your account password and other personal information to others. (5) We will formulate an emergency response plan and immediately launch the emergency response plan in case of user information security incidents, so as to prevent the impact and consequences of such security incidents from expanding. In the event of user information security incidents (leakage, loss, etc.), we will promptly inform you of the basic information and possible impact of security incidents, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you in accordance with the requirements of laws and regulations. We will timely inform you of the event in the form of email, letter, SMS, etc. If it is difficult to inform each other, we will take a reasonable and effective way to publish an announcement. At the same time, we will report the disposal of user information security incidents according to the requirements of relevant regulatory authorities. (6) We would like to remind you that the personal information protection measures provided in this privacy policy are only applicable to the “Decompression Software Manager” software and related services. Once you leave the “Decompression Software Manager” and related services, browse or use other websites, services and content resources, we have no ability and obligation to protect any personal information submitted by you in the software and websites other than the “Decompression Software Manager” software and related services, regardless of whether you log in, browse or use the above software and websites based on the link or guidance of the “Decompression Software Manager”.

6、 Your rights

We attach great importance to your management of personal information, and do our best to protect your right to access, modify (update or correct), delete and withdraw your authorization consent to your personal information, so that you can protect your privacy and security (1) Complaints and reports You can make complaints or reports according to our published system. If you think your personal information rights may be infringed, or find clues to infringe your personal information rights, you can contact us by clicking “Settings” to enter the suggestion feedback interface. We will feed back your complaints and reports within 30 days after verification. (2) To access the privacy policy, you can view all the contents of this privacy policy on the registration page, or in [About] – [Privacy Policy] (3) Inform you of the right to stop operation If we stop operation, we will stop collecting your personal information in a timely manner, notify you of the notice of stopping operation in the form of one by one delivery or announcement, and delete or anonymize your personal information held

7、 Minor Terms If you are a minor under the age of 18, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using the “unzipped software butler” software and related services. We protect the personal information of minors in accordance with relevant national laws and regulations, and will only collect, use, share or disclose the personal information of minors when it is allowed by law, explicitly agreed by parents or other guardians or necessary to protect minors; If we find that we have collected the personal information of minors without the prior consent of verifiable parents, we will try to delete the relevant information as soon as possible. If you are the guardian of a minor, please contact us through the contact information publicized in this privacy policy when you have questions about the personal information of the minor under your guardianship.

8、 Amendment and notification of privacy policy

(1) In order to provide you with better services, the “Decompression Software Manager” software and related services will be updated and changed from time to time, and we will revise this privacy policy from time to time, which constitutes a part of this privacy policy and has the same effect as this privacy policy. However, without your explicit consent, we will not reduce your rights under the currently effective privacy policy. (2) After this privacy policy is updated, we will issue an updated version on the “Decompress Software Manager” application client, and remind you of the updated content in an appropriate way before the updated terms take effect, so that you can know the latest version of this privacy policy in time. If you continue to use our service, you agree to accept the revised content of this policy, but if the updated content needs to capture audio and video, obtain your address book, contact information, geographical location and other personal sensitive information, you will still be asked for your consent in a significant way again. (3) For major changes, we will also provide more significant notices (we will explain the specific changes to the privacy policy by including but not limited to email, SMS, private messages or special prompts on the browsing page). Major changes referred to in this privacy policy include but are not limited to: 1. Major changes in our service model. For example, the purpose of processing personal information, the type of personal information processed, and the use mode of personal information; 2. Significant changes have taken place in our ownership structure and organizational structure. Such as all changes caused by business adjustment, bankruptcy merger, etc; 3. The main objects of personal information sharing, transfer or public disclosure have changed; 4. Your right to participate in personal information processing and the way you exercise it have changed significantly; 5. When the responsible department, contact information and complaint channel for handling personal information security change.

9、 Scope of application

This privacy policy applies to all services provided by Liaoning Qisi Technology Co., Ltd. and its affiliates, including decompressing software butler clients, applets, etc. It does not apply to third-party products or services that have a separate privacy policy and are not included in this privacy policy. This privacy policy does not apply to 1. other third-party products or services, which may include other products or websites linked to H5 and advertising content or unzipped software butler services; 2. Other third parties advertising the one click decompression software butler service. Your use of these third-party services (including any personal information you provide to these third parties) will be subject to the terms of service and privacy policy of these third parties (not this privacy policy). Please read the terms of the third party carefully for specific provisions. Please protect your personal information properly and provide it to a third party only when necessary. The “Decompression Software Manager” and related services described in this privacy policy may vary depending on the mobile phone model, system version, software application version and other factors you use. The final products and services are subject to the “Decompression Software Manager” software and related services you use. If you have any questions, comments or suggestions about the content of this privacy policy, you can contact us by logging in the “Feedback” page in the “Decompression Software Manager” client.

10、 Other

(1) The headings in this “Privacy Policy” are only for convenience and reading, and do not affect the meaning or interpretation of any provisions in this “Privacy Policy”.

(2) Definitions of related words in this “Privacy Policy” 1. “Decompression Software Manager” software and related services refer to the products and services provided to you by the Company and its affiliates through legally owned and operated client applications labeled “Decompression Software Manager”, including but not limited to the automatic click function of mobile phone screen 2. Related parties refer to any company, institution that a party now or in the future controls, is controlled by or is under common control with, and the legal representative of the above company or institution. “Control” refers to the ability to directly or indirectly influence the management of the mentioned company, whether through ownership, voting shares, contracts or other legally recognized ways. 3. Personal information refers to all kinds of information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information, including personal identity information (name, date of birth, ID card number, including ID card, military officer card, passport, driver’s license), facial features, address, contact telephone, address book Network identification information (including account name, account nickname, email address, password and password protection questions and answers related to the above); Property information, transaction information, personal Internet access records (network browsing records, click records, etc.), personal common equipment information (including hardware model, equipment MAC address, operating system type, unique equipment identification code of software list, etc.), personal location information, etc. 4. Personal sensitive information refers to personal information that, once disclosed, illegally provided or abused, may endanger personal and property safety, and may easily lead to damage to personal reputation, physical and mental health or discriminatory treatment. Personal sensitive information in this privacy policy includes: personal identity information (ID card number, including ID card, military officer card, passport, driver’s license), facial recognition features; Property information and transaction information; Network identification information (including account name, account nickname, email address, password and password protection questions and answers related to the above); Other information (including address book, personal telephone number, travel information, and accurate positioning information). 5. De identification refers to the process of making it impossible to identify the subject of personal information without using additional information through technical processing of personal information. 6. Anonymization refers to the process of making the subject of personal information unrecognized and the processed information unrecoverable through the technical processing of personal information

(3) The copyright of this “Privacy Policy” is owned by Liaoning Qisi Technology Co., Ltd. We have the right to interpret and modify it to the extent permitted by law.

发表回复

您的电子邮箱地址不会被公开。 必填项已用*标注