Release Date: March 14, 2025
Update Date: June 18, 2025
Overview
This policy will help you understand the following:
I. How we collect and use your personal information
II. How we store your personal information
III. How we protect your personal information
IV. How we provide personal information externally
V. How you can exercise your personal information rights
VI. Statement on third-party responsibility
VII. How we protect minors' information
VIII. Application and updates of this policy
IX. Explanation of key terms in this policy
MOBIWUSI is a range of products/services provided to users (hereinafter referred to as "you") by Hangzhou Mobi Data Technology Co., Ltd. (as the operator) (hereinafter collectively referred to as "we") through the following channels, including but not limited to apps, client software, and open platform accounts. We fully understand the importance of personal information to users ("you"). We attach great importance to protecting your personal information and privacy. Through this Privacy Policy (hereinafter referred to as the "Policy"), we would like to explain to you how we will process your personal information when you use our services, as well as the ways we provide for you to access, correct, delete, and protect such information. This policy is closely related to your use of our products/services. We recommend that you carefully read and fully understand the entire content of this policy and make the choices you deem appropriate. For clauses and personal information in this policy that have a significant impact on your rights and interests, we will highlight them in bold and/or underline them in the main text to draw your attention.
The key points are as follows:
1. To help you understand the types of information we need to collect and the purposes for using it when you use our services, we will explain them to you one by one in connection with specific services.
2. To provide services to you, we will collect your information in accordance with the principles of legality, legitimacy, necessity, and good faith.
3. If it is necessary to share your information with a third party in order to provide services to you, we will evaluate the legality, legitimacy, and necessity of the third party's collection of information. We will require the third party to take measures to protect your information and strictly comply with relevant laws, regulations, and regulatory requirements. In addition, we will obtain your consent or confirm that the third party has obtained your consent through methods such as confirmation agreements, copy confirmation in specific scenarios, and pop-up notices as required by laws, regulations, and national standards.
4. If it is necessary to obtain your information from a third party in order to provide services to you, we will require the third party to explain the source of the information and require the third party to ensure the legality of the information it provides. If our business involves personal information processing activities beyond the scope of authorization you originally granted to the third party when providing your personal information, we will obtain your explicit consent.
5. You may access and manage your information, set privacy functions, cancel your MOBIWUSI account, or file complaints and reports through the methods introduced in this policy.
I. How We Collect and Use Your Personal Information
1.1 In accordance with relevant laws, regulations, and national standards, we may process your personal information according to law in the following circumstances:
(1) Upon obtaining your consent;
(2) Where necessary for entering into and performing a contract at your request;
(3) Where necessary for fulfilling statutory duties or obligations, such as information required under laws and regulations related to anti-money laundering, anti-terrorist financing, real-name management, etc.;
(4) Directly related to national security or national defense security;
(5) Necessary to respond to public health emergencies, or in emergency situations to protect the life, health, and property safety of natural persons;
(6) Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
(7) The personal information collected has been disclosed to the public by you on your own initiative;
(8) Personal information collected from legally publicly disclosed information, such as lawful news reports and government information disclosures;
(9) Necessary for maintaining the secure and stable operation of the services provided, such as discovering and handling failures of products or services;
(10) Other circumstances prescribed by laws and regulations.
Please note that when the processing of your personal information falls under items (2) to (10) above, we may, in accordance with the requirements of applicable laws and regulations, process such information without obtaining your consent again.
1.2 Helping You Become Our User and Providing Account Services
1.2.1 Registration and Login of Accounts
To comply with the requirements of laws and regulations, you can use sharing and other user services only after registering and logging in to a MOBIWUSI account. Without registering or logging in, you may still browse.
Account Registration: When you register a MOBIWUSI account, you need to provide your mobile phone number to create the account. A mobile phone number is necessary information required to fulfill the national legal and regulatory requirements for online real-name registration. If you do not provide a mobile phone number for registration or login, we may be unable to provide you with sharing and other functions. At the same time, in order to improve your account information, you may provide non-mandatory registration information (such as avatar, account name, nickname, etc.) to complete your online identity information. When you use the avatar editing or image uploading functions, we will access your camera and photo album (storage) permissions after obtaining your authorized consent.
1.3 Security Management
When you use the services we provide, in order to ensure the normal operation of the software and services and confirm the uniqueness of users, we will collect information such as your device model, operating system, unique device identifiers (IMEI/AndroidID/OpenUDID/IMSI information), network device hardware address (MAC address), software version number, type and status of network access method, operation logs, hardware serial number, etc. This is used to ensure software-device compatibility, stability, and normal operation, to represent uniqueness, and to perform interface encryption processing so as to obtain backend data.
1.4 Your Personal Information We Collect Indirectly (Including Through Plug-ins or SDKs)
(1.4.1) Based on our cooperation with telecommunications carriers, when you use the mobile-phone-number login function of this application, upon your explicit consent, the carrier of the mobile phone number you use will send your mobile phone number to us, so that we can provide you with a fast login service.
(1.4.2) In order to connect to the network and request/download network resources, we will, through third parties, require you to provide network access permission and Wi-Fi status permission for requesting interfaces, images, downloads, and other related network resources.
(1.4.3) In order to request data according to different network conditions and improve user experience, we will, through third parties, require you to provide permission to change network status and permission to change Wi-Fi network status, for monitoring network connection status.
(1.4.4) In order to update and install the App in a timely manner and optimize user experience, we will, through third parties, require you to provide application installation permission.
(1.4.5) In order to collect device identifier information used to generate de-identified end-user device identifiers, complete device message push services, and basic mobile application statistics functions, we have integrated the Umeng Push and Analytics SDKs, which need to obtain your device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, and network information.
(1.4.6) In order to monitor application performance and locate where application issues occur, we have integrated the Umeng U-APM SDK, which needs to obtain your device information (IMEI/MAC/Android ID/OAID/IDFA/OpenUDID/GUID/SIM card IMSI/ICCID/geolocation, etc.) to uniquely identify the device so as to provide device application performance monitoring services; it also uses collected location information to provide anti-fraud services, remove fraudulent devices, and troubleshoot the causes of application performance crashes.
(1.4.7) In order to provide message push services for Huawei terminal devices, we have integrated the Huawei Push SDK, which needs to obtain your basic application information, in-app device identifiers, device hardware information, system basic information, and system settings information.
(1.4.8) In order to provide message push services for Xiaomi terminal devices, we have integrated the Xiaomi Push SDK, which needs to obtain your basic application information, device identifier information (OAID, Android ID), device hardware information, system basic information, and network information.
(1.4.9) In order to provide message push services for Honor terminal devices, we have integrated the Honor Push SDK, which needs to obtain your anonymous application identifier (AAID) and push message token.
(1.4.10) In order to provide message push services for OPPO terminal devices, we have integrated the OPPO Push SDK, which needs to obtain your basic application information, device identifier information (such as OAID, Android ID), device hardware information, system basic information, and network information.
(1.4.10) In order to provide message push services for vivo terminal devices, we have integrated the vivo Push SDK, which needs to obtain your basic application information, device identifier information (such as OAID, Android ID), device hardware information, and system basic information.
(1.4.11) In order to support WeChat account binding/login/sharing functions, we have integrated the WeChat Login SDK, which needs to obtain your permission to view the app list, your WeChat avatar and nickname information, the status of WeChat APP installation on your device, device model information, clipboard permissions, etc.
(1.4.12) In order to support Alipay account binding and login functions, we have integrated the Alipay Login SDK, which needs to obtain network permission to generate the Alipay download page.
(1.4.13) In order to support sharing to QQ and QQ Zone, we have integrated the QQ Connect SDK, which needs to obtain your device information, storage permission, network information, IP address, location information, communication log information, service log information, and other related information.
(1.4.14) In order to display different projects according to your current location, we need to obtain your location information and require you to provide geolocation permission.
Please understand that the services we provide are constantly updated and developed. If you choose to use other services not yet covered in the foregoing descriptions, and if based on such services we need to collect your information, we will separately explain to you the scope and purpose of information collection through page prompts, interactive processes, or agreement provisions. We will use, store, externally provide, and protect your information in accordance with this policy and the corresponding user agreement. If you choose not to provide the foregoing information, you may be unable to use a certain service or part of a service, but it will not affect your use of other services we provide.
II. How We Store Your Personal Information
2.1 The personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. At present, we will not transmit the above information overseas. If we do transfer it overseas, we will strictly comply with the requirements of laws, regulations, and relevant regulatory authorities, explain to you the purpose of the cross-border transfer of personal information and the types of personal information involved, and require overseas institutions to keep your obtained personal information confidential through effective measures such as signing agreements and on-site inspections.
2.2 We will retain your personal information only for the period necessary for the purposes described in this policy and within the time limits required by laws, regulations, and regulatory provisions. For example, the E-Commerce Law of the People's Republic of China requires that information on goods and services and transaction information be retained for no less than three years from the date the transaction is completed. If you cancel your account or the retention period exceeds the necessary period, we will delete or anonymize the personal information we hold about you in accordance with applicable laws and regulations.
2.3 If we stop providing products/services or in similar circumstances, we will notify you at least thirty days in advance, and after stopping the products/services we will delete or anonymize the personal information we hold about you in accordance with applicable laws and regulations.
III. How We Protect Your Personal Information
3.1 In order to ensure the security of your information, after collecting your information, we will take various reasonable and necessary measures to protect it. For example, in the technical development environment, we only use de-identified information for statistical analysis; when providing research reports externally, we de-identify the information contained in the reports. We will store de-identified information separately from information that can be used to restore personal identity, ensuring that individuals are not re-identified in subsequent processing of de-identified information.
3.2 We promise that we will make information security protection reach industry-leading security standards. To ensure the security of your information, we are committed to using various security technologies and supporting management systems to minimize the risks of your information being leaked, damaged, misused, accessed without authorization, disclosed without authorization, or altered. For example: encrypted transmission via Secure Sockets Layer (SSL), encrypted storage of information, and strict restrictions on access to data centers. When transmitting and storing sensitive personal information (including personal biometric information), we will adopt security measures such as encryption, access control, and de-identification/anonymization.
3.3 We have established a department responsible for personal information protection and carry out personal information security impact assessments for personal information processing. At the same time, we have established relevant internal control systems and adopted the principle of minimum necessary authorization for staff who may have access to your information; we conduct system monitoring of staff behavior in processing your information, continuously train staff on relevant laws, regulations, privacy and security guidelines, and strengthen security awareness publicity, and organize all staff to participate in security examinations every year. In addition, our corresponding network/system has passed the national classified cybersecurity protection assessment. We also hire external independent third parties every year to assess our information security management system.
3.4 We have formulated an emergency plan for personal information security incidents and regularly organize internal personnel to conduct emergency response training and drills so that they can master their duties as well as emergency handling strategies and procedures. In the unfortunate event of a personal information security incident, we will inform you in a timely manner in accordance with the requirements of laws and regulations of: the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions you may take to prevent and reduce risks independently, and remedial measures for you. We will notify you of the relevant situation in a timely manner by sending emails, text messages, etc. Where it is difficult to notify each personal information subject one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security incidents to regulatory authorities as required. If your legitimate rights and interests are harmed, we will bear the corresponding legal liabilities.
3.5 Please be sure to properly keep your APP login name and other identity elements. When you use the products/services we provide, we will identify your identity through your login name and other identity elements. Once you disclose the foregoing information, you may suffer losses and adverse consequences. If you discover that your login name and/or other identity elements may have been or have already been disclosed, please contact us immediately so that we can take corresponding measures in a timely manner to avoid or reduce related losses.
3.6 After you terminate the use of a service, we will stop collecting and using your personal information, unless otherwise provided by laws, regulations, or regulatory authorities. If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations by individual delivery or public announcement, and delete or anonymize the personal information we hold about you.
IV. How We Provide Personal Information Externally
4.1 Entrusted Processing
In order to improve information processing efficiency, reduce information processing costs, or improve information processing accuracy, we may entrust capable affiliated companies or other third parties to process your information on our behalf. We will require entrusted companies by written agreements, on-site audits, and other means to comply with strict confidentiality obligations and adopt effective confidentiality measures, prohibiting them from using this information for unauthorized purposes without your authorization. When the entrustment relationship is terminated, the entrusted party will no longer retain personal information. We promise to be responsible for this.
4.2 Sharing
4.2.1 Business Sharing
We promise to keep your information confidential. Except as otherwise provided by laws, regulations, and regulatory authorities, we only share your information with third parties in the following circumstances. Third parties include affiliated companies, cooperative institutions, and other partners. Before providing information to a third party, we will make commercially reasonable efforts to evaluate the legality, legitimacy, and necessity of the third party's collection of information. We will sign relevant legal documents with third parties and require them to comply with laws and regulations when processing your personal information, and do our best to require them to take protective measures for your information.
(1) Sharing necessary to provide services to you. Certain products or services may be provided by third parties or jointly by relevant service providers and third parties. Therefore, only by sharing your information can we provide you with the products or services you need, for example: providers of technical services and publishers of data assets.
(2) If you choose to participate in operational activities jointly carried out by us and third parties (such as lotteries, competitions, or similar promotional activities), we may share with them the information generated during the activity that is necessary for completing the activity (including but not limited to your exclusive invitation code and the quantity of data assets you hold), so that the third party can promptly issue prizes or provide services to you. Relevant service providers will clearly inform you, in accordance with the requirements of laws and regulations or national standards, on the activity rules page or through other means, of what kind of personal information needs to be provided to the third party.
(3) In cases where your explicit consent has been obtained in advance, we will share your information with third parties within the scope permitted by laws and regulations and not contrary to public order and good customs, according to the scope of your authorization.
4.2.2 Inquiry by Other Users
In order to ensure the accuracy of data asset transaction counterparties and avoid losses caused by entering the wrong account, others may search for you by your mobile phone number and view the nickname and avatar corresponding to your account, so that they can transfer data assets to you.
4.3 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
(1) After obtaining your explicit consent in advance;
(2) According to laws and regulations or mandatory administrative or judicial requirements;
(3) In the event of asset transfers, acquisitions, mergers, reorganizations, or bankruptcy liquidation involving the transfer of personal information, we will inform you of the relevant circumstances and require the new company or organization holding your personal information to continue to be bound by this policy. If the purpose of using personal information changes, we will require that company or organization to obtain your explicit consent again.
4.4 Public Disclosure
4.4.1 Except for the following circumstances, in principle we will not publicly disclose your information. If public disclosure is indeed necessary, we will inform you of the purpose of the disclosure, the types of information disclosed, and any sensitive information that may be involved, and obtain your explicit consent.
(1) When announcing the list of winners of activities, we will display winners' mobile phone numbers or account login names in a de-sensitized manner according to the specific participation rules of the activity;
(2) When issuing penalty announcements for violating accounts or fraudulent behavior, we will disclose relevant account information;
(3) Other circumstances prescribed by laws and administrative regulations.
4.4.2 We especially remind you that information you voluntarily publish or publicly share when using our products/services (such as sharing data assets you own) may involve your or others' personal information and even sensitive personal information (such as your account nickname, avatar, transaction information). Please carefully consider whether to publish or even publicly share such information when using our services.
V. How You Can Exercise Your Personal Information Rights
During your use of our products/services, in order to make it more convenient for you to access and manage your information and at the same time protect your personal information rights, we provide you with corresponding operational settings in the client. You may refer to the following guidance for operation.
5.1 Access, Correction, and Supplementation
You have the right to access, correct, and supplement your personal information, except where otherwise provided by laws and regulations. After logging into your account in the APP, you can manage your information in the following ways:
(1) Account Information: By visiting “Home Page - Personal Center in the upper right corner”, you can access, correct, and supplement your personal profile and account information.
(2) Asset Information: By visiting “Home Page - Total Assets”, you can check the order information of data assets purchased in your account.
If you find that the corresponding information is incorrect, you may modify your information yourself according to the page prompts, or you may submit feedback via “Home Page - Personal Center in the upper right corner - Feedback” requesting correction. For security and identity verification considerations or according to laws, regulations, and regulatory provisions, you must pass verification before modifying your verified real name or bound mobile phone number.
5.2 Deletion
You may delete some of your information through the paths listed in 5.1, or apply to cancel your account to delete all of your information. If you discover that our collection or use of your personal information violates laws and regulations or violates our agreement with you, you may request us to delete personal information by contacting customer service.
5.3 Account Cancellation
You may apply to cancel your account through the following path: after logging into your account in the APP, by visiting “Home Page - Personal Center in the upper right corner - Cancel Account”, you can enter the account cancellation application process. When you meet the agreed account cancellation conditions and cancel the account related to a service, we will delete all personal information in that account in accordance with legal requirements. However, if the retention period prescribed by laws and regulations for relevant personal information has not expired, or there are other situations in which deletion is not suitable according to law, we will stop processing such information other than storage and taking necessary security protection measures.
5. 4 Notwithstanding the foregoing agreement, in accordance with relevant laws, regulations, and national standards, in the following circumstances we may be unable to respond to your request:
(1) Directly related to national security or national defense security;
(2) Directly related to public security, public health, or major public interests;
(3) Directly related to criminal investigation, prosecution, trial, or execution of judgments, etc.;
(4) Where there is sufficient evidence showing that you have subjective malice or abuse of rights;
(5) Where responding to your request would cause serious damage to the legitimate rights and interests of other individuals or organizations;
(6) Involving trade secrets.
5.5 When we cooperate with third parties to provide services to you, the third parties will inform you, according to their published privacy policies or other terms signed with you
(if any), of the relevant information about personal information processors, and will strictly protect your information and inform you of the means of exercising your personal information rights in accordance with applicable requirements. Please carefully read the relevant policies and terms. If you have any questions, you may consult the third-party institution according to the service you use.
5.6 If you have any questions about this policy, or any complaints or opinions regarding the processing of your personal information, you may contact us through the following channels:
(1) Feedback: “Home Page - Personal Center in the upper right corner - Feedback”
(2) Contact Us: “Home Page - Personal Center in the upper right corner - Contact Us” or directly by sending an email to contact@mobiwusi.com
The customer service department, together with the privacy protection department, will reply to you in a timely manner.
In order to ensure the security of your information, we need to first verify your identity and credential materials. We have established a customer complaint management mechanism, including a tracking process. We will reply within no more than fifteen working days.
VI. Statement on Third-Party Responsibility
6.1 Some of the services we provide need to be jointly provided for you by partners (for example, message reminders in the APP notification bar or payment services). For this reason, we will embed software development kits of partners (hereinafter referred to as “SDKs”) or other similar applications in the APP. For example, when you use different mobile devices, the Push SDK (message reminder service) provided by the mobile phone manufacturer needs to read your device identification number and network-related information for delivering notification-bar messages. We will conduct strict security testing on SDKs or other similar applications and require partners to take strict data protection measures to effectively safeguard your legitimate rights and interests.
VII. How We Protect Minors' Information
7.1 We attach great importance to the protection of minors' personal information. We expect parents or guardians to guide minors in using our services. We will protect the confidentiality and security of minors' information in accordance with relevant national laws and regulations.
7.2 If you are a minor, it is recommended that your parents or guardians read this policy and that you use our services or provide your information to us with the consent of your parents or guardians. For information collected with the consent of your parents or guardians, we will only use or publicly disclose such information where permitted by law, expressly agreed to by parents or guardians, or necessary to protect your rights and interests. If your guardian does not agree that you use our services or provide information to us in accordance with this policy, please immediately stop using our services and notify us promptly so that we can take corresponding measures.
7.3 If you are the parent or guardian of a minor and have questions about the information processing of the minor under your guardianship, please contact us through the contact methods provided above.
7.4 Special Reminder: Before children under the age of 14 and their guardians register an APP account for the child and use our services, please carefully read our specially formulated “Children's Personal Information Protection Rules”, and use our services or provide information to us with the consent of the child's parents or guardians.
VIII. Application and Updates of This Policy
8.1 In order to provide you with better services, the products/services we provide may change from time to time, and this policy will also be updated accordingly; we will also update the relevant clauses of this policy according to changes in national laws and regulations. The updated policy will take effect from the effective date announced in the update notice.
8.2 When any of the following major changes occur, we will update this policy in due course:
(1) Changes in our basic circumstances, for example: changes in ownership due to mergers, acquisitions, or reorganizations;
(2) Changes in the scope, purpose, or rules for collecting, storing, and using personal information;
(3) Changes in the recipients, scope, or purposes of externally providing personal information;
(4) Changes in the ways you access and manage personal information;
(5) Changes in data security capabilities or information security risks;
(6) Changes in channels and mechanisms for user inquiries and complaints, as well as external dispute resolution institutions and contact methods;
(7) Other changes that may have a significant impact on your personal information rights and interests.
8.3 If this policy is updated, we will notify you by publishing an announcement on the official website. In order for you to receive notices in a timely manner, it is recommended that you notify us promptly when your contact information is updated. If you continue to use the products/services we provide after the updated policy takes effect, it means that you have fully read, understood, and accepted the updated policy and are willing to be bound by it.
IX. Explanation of Key Terms in This Policy
Personal Information: various kinds of information related to an identified or identifiable natural person recorded electronically or by other means, excluding information that has been anonymized.
Sensitive Personal Information: personal information that, once leaked or illegally used, may easily cause harm to the dignity of natural persons or endanger personal or property safety, including biometric identification, religious belief, specific identity, medical health, financial accounts, travel traces, and other information, as well as the personal information of minors under the age of fourteen.
Processing of Personal Information: includes the collection, storage, use, processing, transmission, provision, disclosure, and deletion of personal information.
Account Information: refers to APP account-related information elements used to identify your identity, including your APP ID (including the bound Alipay account ID), mobile phone number, password, SMS verification code, avatar, nickname, profile, ID number, and biometric information.
Developer Information:
Hangzhou Mobi Data Technology Co., Ltd.
Contact Information: contact@mobiwusi.com
Release Date: March 10, 2025
X. Directory of Integrated Third-Party SDKs
Umeng+ Message Push SDK
Purpose of Use: APP message push
Types of Personal Information Collected: device Mac address, unique device identifier (IMEI/android ID/IDFA/OPENUDID/GUID/SIM card IMSI information/ICCID)
Company Name: Umeng Tongxin (Beijing) Technology Co., Ltd.
Official Website Link: https://www.umeng.com/
Privacy Policy Link: https://www.umeng.com/page/policy
Umeng+ Mobile Analytics SDK
Purpose of Use: APP operation statistics and analysis
Types of Personal Information Collected: device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information
Company Name: Umeng Tongxin (Beijing) Technology Co., Ltd.
Official Website Link: https://www.umeng.com/
Privacy Policy Link: https://www.umeng.com/page/policy
Umeng+ Performance Monitoring U-APM SDK
Purpose of Use: device application performance monitoring
Types of Personal Information Collected: device information (IMEI/MAC/Android ID/OAID/IDFA/OpenUDID/GUID/SIM card IMSI/ICCID/geolocation, etc.)
Company Name: Umeng Tongxin (Beijing) Technology Co., Ltd.
Official Website Link: https://www.umeng.com/
Privacy Policy Link: https://www.umeng.com/page/policy
HTTPDNS-android SDK
Purpose of Use: domain name resolution
Types of Personal Information Collected: none
Company Name: Hangzhou Alibaba Cloud Intelligent Technology Co., Ltd.
Privacy Policy Link: https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloudsuit_bu1_ali_cloud202112071754_83380.html?spm=a2c4g.11186623.0.0.598730e5wsglWa
Xiaomi Push SDK
Purpose of Use: provide message push services for Xiaomi terminal devices
Types of Personal Information Collected: device identifier OAID, encrypted Android ID, device manufacturer, device model, device memory, operating system version
Company Name: Beijing Xiaomi Mobile Software Co., Ltd.
Official Website Link: https://dev.mi.com/
Privacy Policy Link: https://dev.mi.com/console/doc/detail?pId=1822
Huawei Push SDK
Purpose of Use: provide message push services for Huawei terminal devices
Types of Personal Information Collected: basic application information, in-app device identifiers, device hardware information, system basic information, and system settings information
Company Name: Huawei Software Technologies Co., Ltd.
Official Website Link: https://developer.huawei.com/
Performance Acceleration Library
Purpose of Use: optimize device performance and provide acceleration services
Types of Personal Information Collected: none
Company Name: Huawei Software Technologies Co., Ltd.
Official Website Link: https://developer.huawei.com/
Privacy Policy Link: https://developer.huawei.com/consumer/cn/doc/development/graphics-Guides/sdk-data-security-0000001050700772
Honor Push SDK
Purpose of Use: provide message push services for Honor terminal devices
Types of Personal Information Collected: anonymous application identifier (AAID), push message token
Company Name: Beijing Xiaomi Mobile Software Co., Ltd.
Official Website Link: https://developer.honor.com/
Privacy Policy Link: https://developer.hihonor.com/cn/kitdoc?category=%E5%9F%BA%E7%A1%80%E6%9C%8D%E5%8A%A1&kitId=11002&navigation=guides&docId=personal-data-processing.md&token=
OPPO Push SDK
Purpose of Use: provide message push services for OPPO terminal devices
Types of Personal Information Collected: basic application information, device identifier information (such as OAID, Android ID), device hardware information, system basic information, and network information
Company Name: Guangdong HuanTai Technology Co., Ltd.
Official Website Link: https://open.oppomobile.com/opush/
Privacy Policy Link: https://open.oppomobile.com/new/developmentDoc/info?id=10288
vivo Push SDK
Purpose of Use: provide message push services for vivo terminal devices
Types of Personal Information Collected: basic application information, device identifier information (such as OAID, Android ID), device hardware information, and system basic information
Company Name: Vivo Mobile Communication Co., Ltd.
Official Website Link: https://vpush.vivo.com.cn/
Privacy Policy Link: https://dev.vivo.com.cn/documentCenter/doc/652
WeChat Open SDK
Purpose of Use: WeChat authorized login
Types of Personal Information Collected: WeChat avatar and nickname information actively provided, device installation status of WeChat APP, device model information, clipboard permission
Company Name: Shenzhen Tencent Computer Systems Co., Ltd.
Official Website Link: https://developers.weixin.qq.com/
Privacy Policy Link: https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8
QQ/QQ Zone Sharing SDK
Purpose of Use: social platform sharing
Types of Personal Information Collected: device information, storage permission, network information, IP address, location information, communication log information, service log information, and other related information
Company Name: Shenzhen Tencent Computer Systems Co., Ltd.
Official Website Link: https://developers.weixin.qq.com/
Privacy Policy Link: https://privacy.qq.com/
Alipay Login SDK
Purpose of Use: integrate Alipay login function
Types of Personal Information Collected: obtain network permission to generate the Alipay download page
Company Name: Alipay (China) Network Technology Co., Ltd.
Official Website Link: https://open.alipay.com/
Privacy Policy Link: https://opendocs.alipay.com/open/067lid?pathHash=133c99bb
Bugly Android SDK
Purpose of Use: bug troubleshooting
Types of Personal Information Collected: device identifier information (IMEI/Mac/android ID/IDFA)
Company Name: Shenzhen Tencent Computer Systems Co., Ltd.
Official Website Link: https://bugly.qq.com
Glide Image Loading SDK
Purpose of Use: load and display images
Types of Personal Information Collected: read external storage card permission, write external storage card permission
Company Name: Personal Project
Official Website Link: https://github.com/bumptech/glide
mmkvSDK
Purpose of Use: local data storage
Types of Personal Information Collected: none
Company Name: Personal Project
Official Website Link: https://github.com/Tencent/MMKV
FFmpegSDK
Purpose of Use: obtain audio waveform data
Types of Personal Information Collected: none
Company Name: Personal Project
Official Website Link: https://github.com/arthenica/ffmpeg-kit