911proxy Privacy Policy

introduction

The 911proxy team (hereinafter referred to as "we" or "911proxy" or "the Company") is well aware of the importance of information security for individuals and enterprises (hereinafter referred to as "you" or "individuals", and enterprises are also referred to as "individuals" here), and we will protect your information and privacy security in accordance with legal provisions. We therefore specify this "911proxy" User Privacy Policy (hereinafter referred to as the "Privacy Policy") and remind you that: 911proxy official website, 911proxyApp (including but not limited to Windows, Ios, Android, HarmonyOS and other systems App, SDK, etc.) (hereinafter referred to as "911proxy") and other products of the Company linked to this Privacy policy. Before you use the "911proxy Official website", "911proxyApp", "911proxySDK" and the relevant services provided by our "wechat Public Account" and other platforms, please be sure to read and understand this privacy policy carefully, and use this platform and services after full understanding and consent. Once you start this platform and related services, it is deemed that you accept and approve the contents of this policy.

This Privacy policy will help you understand:

• We will collect and use your information in accordance with the privacy policy, but will not collect personal information in a mandatory manner just because you agree to this privacy policy.

• When you use or enable the relevant function or use the service, we will collect and use the relevant information necessary for the implementation of the function and service. Unless it is necessary information for the realization of basic business functions or required by laws and regulations, you may refuse to provide other functions or services without affecting them. We will specify what information is necessary in our Privacy policy.

• This Privacy Policy applies to your access to and use of our products and services through 911proxy official websites, 911proxy apps, 911proxy software development kits (SDKS) and application programming interfaces (apis) for third-party websites and applications.

• The following will help you learn more about how we collect, use, store, transmit, share, transfer (where applicable) and protect personal information; Help you understand how to query, access, delete, correct, and withdraw authorized personal information. Among them, we have highlighted the important contents of the terms concerning your personal information rights and interests in bold form, please pay special attention to them.

catalogue

911proxy Privacy Policy Article 1
1.How do we collect and use Personal Information Article 2
2.Application permission application and usage Article 4
3.How do we use similar technologies like cookies Article 5
4.How do we entrust, share, transfer, and publicly disclose personal information Article 5
5.How do we store Personal information Article 7
6.How do we protect the security of personal information Article 7
7.Manage your personal information Article 8
8.Minor clause Article 9
9.Privacy Policy changes and notices Article 9
10.Contact us Article 9

1、How do we collect and use Personal Information

We will collect the information you voluntarily provide when using the Platform and its services, as well as collect the information generated when you use the functions or accept the services in an automated manner in the following ways.

Phone, camera (camera), photo album (storage), calendar, and microphone permissions are not enabled by default, and are only used to achieve specific functions or services with your express authorization. You can also withdraw your authorization. In particular, even if we have obtained these sensitive permissions with your authorization, we will not collect your information when we are not using the relevant features or services. Please see below for specific permission or application and usage.

1.1 Registration and login

1.1.1 When you register, log in to 911proxy and related services, you can create an account through your mobile phone number, email, etc., we will send SMS verification code or email verification code to verify your identity is valid, and you can improve the relevant network identification information, collected to help you complete the registration. You can also choose to fill in some information (such as: avatar, nickname, etc.) according to your own needs to improve your information.

1.1.2 Based on our cooperation with the communication operator, when you use the "one-click login" function of 911proxy, after your express consent, the operator will send your mobile phone number to us in order to provide you with fast login services and experience. Mobile phone number is personal sensitive information, such as refusal will not be able to use "one-click login" registration or login 911proxy, but it will not affect your registration through other means, nor will it affect the normal use of other functions.

1.1.3 You can also use a third-party account to log in to 911proxy. At this time, you will authorize us to obtain the public information (profile picture, nickname and other information authorized by you) that you have registered on the third-party platform for binding with the 911proxy account, so that you can directly log in and use the product and related services through the third-party account.

1.1.4 The above information we collect and use is de-labeled, and the data analysis only corresponds to a specific code that cannot be directly associated with your identity, and will not be associated with your real identity.

1.2 Set and change the profile picture

When you set and change your avatar, we will ask you to authorize the camera and photo album permissions. If you refuse to authorize camera permissions, you will not be able to set or change your profile picture by taking photos. If you refuse to authorize the permission of the album, you will not be able to set or change your avatar by uploading pictures in the album, but the above does not affect your normal use of other functions.

1.3 Browse line

When you browse a line, we may request permission to promote a quality line for you based on your current location and network operator. If you refuse to authorize the provision of location information, you will not be able to recommend high-quality lines through location information, but it will not affect your normal use.

1.4 search

When you use the 911proxy search service, we will collect your search keyword information and log records. In order to provide an efficient search service, some of the above content is temporarily stored on your local storage device, and can show you the search results and search history.

1.5 Real-name authentication

When you use the Services, you do so in accordance with the provisions of the Cybersecurity Law of the People's Republic of China (implemented on June 1, 2017) and relevant laws. You need to carry out real-name authentication first. We cooperate with Alipay (China) Network Technology Co., LTD. (hereinafter referred to as Alipay), and Alipay provides technical support. You need to provide your real name and ID number in order to complete the real name authentication. When you refuse to perform real name authentication, you will not be able to use the service, but the above does not affect your normal use of other functions.

1.6 Message notification

You acknowledge and agree that for your contact information (such as contact number) provided by you in the course of using the Products and/or Services, we may send multiple types of notifications to one or more of them in our operations for user message notification, identity verification, security verification, user experience research and other purposes; In addition, we may also use the mobile phone number collected in the aforementioned process to provide you with commercial information such as services, functions or marketing activities that may be of interest to you through SMS or phone calls, but please rest assured that if you do not want to accept such information, you can unsubscribe through the method provided in the mobile phone SMS, or you can contact us directly to unsubscribe.

1.7 Device information and service log information

a. In order to ensure the safe operation of the Platform and its related services, We collect your hardware model, operating system version number, international Mobile Device Identification number, unique device identifier (e.g Specific fields such as IMEI, Android, OAID, IMSI, ICCID, GAID, MEID, IDFV, IDFA may differ due to software and hardware versions.), network device hardware address (MAC), IP+ port, WLAN access point (SSID, BSSID), Bluetooth, base station, software version number, etc. Network access mode, type, status, network quality data, operation, usage, and service logs. We will apply to allow applications to obtain current or recently running application permissions for security risk control and push SDK to ensure the safe operation of software and services and the reach of messages.

b. In order to prevent malicious programs and as necessary for secure operations, we collect information about installed applications or running processes, the overall operation, usage and frequency of applications, application crashes, overall installation usage, performance data, and application sources.

c. We may use your account information, device information, service log information, and information that our affiliates and partners can share when authorized by you or in accordance with the law, to determine account security, perform identity verification, detect and prevent security incidents.

1.8 Change the purpose of collecting and using personal information

a. Please understand that as our business develops, the functions and services provided by this platform may be adjusted and changed. In principle, when the new function or service is related to the function or service currently provided by us, the personal information collected and used will be directly or reasonably related to the original purpose of processing. In cases that are not directly or reasonably related to the original purpose of processing, we will inform you again about the collection and use of your personal information and obtain your consent.

b. When you use the third-party services connected to this product, you may be required to submit your personal information (in some cases, including your identity information, contact information, transaction information, payment information and other personal sensitive information). You authorize us to provide this information to third parties who provide services to you and to obtain this information indirectly from third parties. If you refuse to collect such information from us, we will not be able to provide you with relevant functions and services, but it will not affect your use of core product and service functions. If you refuse to provide the above information or refuse authorization, you may not be able to use the corresponding products or services of our affiliates, or you may not be able to display relevant information, but it does not affect the use of the core services of 911proxy.

c. Third party SDK directory

1.9 Personal information collected and used with consent is exempt by law

Please understand that in the following circumstances, according to laws and regulations and relevant national standards, we do not need to obtain your authorization to collect and use your personal information:

a. Directly related to national security and national defense security

b. Directly related to public safety, public health or major public interests;

c. Directly related to criminal investigation, prosecution, trial and execution of judgments;

d. In order to protect the life, property and other major legitimate rights and interests of the personal data subject or other individuals, but it is difficult to obtain the consent of the person;

e. Your personal information collected is disclosed to the public by you;

f. Your personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels;

g. Necessary to enter into or perform a contract at your request;

h. Necessary to maintain the safe and stable operation of the software and related services, such as discovering and handling faults of the software and related services;

i. Necessary for legitimate journalism;

j. When an academic research institution carries out statistics or academic research in the public interest and provides the results of academic research or description to the outside world, it de-identifies the personal information contained in the results;

k. Other circumstances stipulated by laws and regulations.

In particular, you are reminded that if the information cannot identify you individually or in combination with other information, it is not your personal information in the legal sense; When your information can be individually or in combination with other information to identify you personally, or when we will not be able to establish a connection with any specific personal information to use with other personal information, such information during the combined use, as your personal information will be treated and protected in accordance with this Privacy Policy. According to the law, the sharing and transfer of de-identified personal information, and ensuring that the data recipient cannot recover and re-identify the subject of personal information, does not belong to the sharing, transfer and public disclosure of personal information, and the processing of such data will not need to notify you separately and obtain your consent.

2.Application permission application and usage

2.1 In order to ensure the implementation and security of the functions of the 911proxy product, we may apply for or use the relevant permissions and functions of the operating system;

2.2 In order to protect your right to know, we show the operating system permissions that the product may apply for and use in the following list. You can manage the relevant permissions according to the actual situation;

2.3 According to the upgrade of the product, the application, the use of permissions and purposes may change, we will timely adjust the list according to these changes to ensure that you are informed of the application and use of permissions in a timely manner;

2.4 Please be aware that we may use third party SDKS for the functional and security needs of our business and products, and these third parties may also apply for or use relevant operating system permissions;

2.5 In the course of use, you may use H5 pages or small programs developed by third parties, and these plug-ins or small programs developed by third parties may also apply for or use the relevant operating system permissions for business functions.

3.How do we use similar technologies like cookies

Similar technologies such as cookies and device information identification are commonly used in the Internet. When you use 911proxy and related services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device in order to collect and identify information about your access to and use of the Product. We promise not to use cookies for any purpose other than those described in this Privacy Policy. We use cookies and similar technologies primarily to achieve the following functions or services:

Phone, camera (camera), photo album (storage), calendar, and microphone permissions are not enabled by default, and are only used to achieve specific functions or services with your express authorization. You can also withdraw your authorization. In particular, even if we have obtained these sensitive permissions with your authorization, we will not collect your information when we are not using the relevant features or services. Please see below for specific permission or application and usage.

3.1 Ensure the safe and efficient operation of products and services

We may set authentication and security cookies or anonymous identifiers that allow us to verify that you have logged into the Service securely or that you have been subjected to theft, fraud or other wrongdoing. These technologies will also help us improve service efficiency and speed up login and response times.

3.2 Help you have an easier access experience

Using such techniques can help you eliminate the steps and process of entering a search (example: record search)

3.3 To recommend, show and push content that you may be interested in

a. We may use such technology to understand your preferences and usage habits, to conduct data analysis, to improve products and services, and to recommend information or features of interest to users.

b. In the shared pages of 911proxy, we may use cookies to record browsing activity, to recommend information to you and to troubleshoot crashes, delays, and to explore better ways to serve.

4.How do we entrust, share, transfer, and publicly disclose personal information

4.1 Principles we need to follow

4.1.1 Principle of consent:

We will not share your personal information without your consent, unless the personal information shared is de-identified information and the natural person subject of such information cannot be re-identified by the sharing third party. If third parties use the information for purposes beyond the scope of the original consent, they will need to obtain your consent again.

4.1.2 Principles of legality and least necessity:

The data to be shared must have a legitimate purpose, and the data to be shared is necessary to achieve the purpose.

4.1.3 Principles of safety and prudence:

We will carefully assess the purposes for which third parties use the shared information, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with the legal agreement on cooperation. We will carry out strict security monitoring of software tool development kits (SDKS) and application program interfaces (apis) from which partners obtain information to protect data security.

4.2 Information that needs to be shared and transferred in order to implement [911proxy] functions and/or services, ensure security and analyze statistics

4.2.1 Implement shared information about functions and services

Real name authentication function: If you become a user of 911proxy, in order to complete the authentication process, we need to access the real name authentication process of "Alipay", you can perform the relevant authentication process in the [Personal Center]. If you refuse to provide the IP address, you will not be able to use related functions, but it does not affect the normal use of other functions.

4.2.2 Enable shared information for security and analysis statistics

a. Security of use: We attach great importance to the security of accounts, services and content. In order to ensure the security of your and other users' accounts and property, and to protect you and our legitimate rights and interests from unlawful infringement, we may share necessary equipment, account and log information with related parties or service providers.

b. Analysis of Product usage: In order to analyze the use of our services and improve the user experience, we may share with affiliates or third parties de-identified data of product origin and usage (crashes, flash downs, duration of use, etc.), which is difficult to identify you in combination with other information.

c. Academic research and research: In order to improve the scientific research capacity in related fields and promote the level of scientific and technological development, we may share de-identified or anonymized data with scientific research institutes, universities and other institutions on the premise of ensuring data security and legitimate purposes.

4.2.3 Help you participate in marketing promotions

When you choose to participate in relevant marketing activities organized by us, our affiliates or third parties, you may be required to provide your name, mailing address, contact information, and bank account information. This information is personally sensitive and refusal to provide it may affect your participation in the relevant activities, but will not affect other functions. Only with your consent will we share this information with affiliates or third parties in order to ensure that you receive consistent services in joint activities, or entrust third parties to redeem rewards to you in a timely manner.

4.2.4 Push notification

In order to adapt the message push function to the terminal model you are using, we may share the phone model, version and related information with the terminal device manufacturers (Huawei, Xiaomi, Apple, Meizu, Vivo, Oppo, etc.) through SDK and other technologies.

4.2.5 payment

Payment functions are provided to you by third party payment institutions that we work with. Third parties may need to collect your name, card type and card number, expiration date and mobile phone number. The card type and card number, expiration date and mobile phone number are personal sensitive information, which is necessary for the payment function. Refusing to provide the information will cause you to be unable to use the function, but will not affect the normal use of other functions.

4.3 transfer

a. We will not transfer your personal information to any other third party unless we have your express consent.

b. As our business continues to grow, we may engage in mergers, acquisitions, asset transfers, and your personal information may be transferred. In the event of such changes, we will require the successor to protect your personal information in accordance with laws and regulations and security standards no lower than those set forth in this Privacy Policy, otherwise we will require the successor to obtain your authorization and consent again.

4.4 Make public

a. We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. When we publicly disclose your personal information, we use security measures that meet industry standards.

b. When we announce the punishment of illegal accounts and fraud, we will disclose the information of relevant accounts.

4.5 Personal information shared, transferred and publicly disclosed with consent is exempt according to law

Please understand that in the following circumstances, according to laws and regulations and national standards, we do not need to obtain your authorization and consent to share, transfer and publicly disclose your personal information:

a.Directly related to national security and national defense security;

b.Directly related to public safety, public health or major public interests;

c. Directly related to criminal investigation, prosecution, trial and execution of judgments;

d. In order to protect the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to get the consent of the person;

e. Personal information you disclose to the public on your own;

f. Collecting personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels.

5.How do we store Personal information

5.1 Storage location

We store your personal information collected and generated during our domestic operations in the territory of the People's Republic of China in accordance with laws and regulations. At present, we do not transfer the above information abroad, and if we do, we will comply with the relevant national regulations or seek your consent.

5.2 Storage life

We only retain your personal information for as long as is necessary for the purpose of providing 911proxy and the Services, and we will retain the relevant information for as long as you do not withdraw, delete or cancel your account. After the necessary period, we will delete or anonymize your personal information, except as otherwise provided by laws and regulations.

6.How do we protect the security of personal information

6.1 We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and administrative aspects) to protect your personal information and prevent the personal information you provide from being improperly used or unauthorized access, public disclosure, use, modification, damage, loss or disclosure.

6.2 We will use no less than industry standard encryption technology, anonymization processing and relevant reasonable and feasible means to protect your personal information, and use security protection mechanisms to prevent your personal information from malicious attacks.

6.3 We will establish a special security department, security management system, data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology in a timely manner.

6.4 Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always ensure 100% security of information. We will do our best to ensure the security of the personal information you provide to us.

6.5 You acknowledge and understand that the systems and communications networks you use to access our Services may be subject to problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account passwords and related personal information to others.

6.6 We will develop emergency response plans and immediately initiate emergency response plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. In the event of a user information security incident (leakage, loss), we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you. We will timely inform you of the relevant events by push notification, email, letter, SMS and other relevant forms. If it is difficult to inform you one by one, we will make announcements in a reasonable and effective manner. At the same time, we will also report the disposal of user information security incidents in accordance with the requirements of relevant regulatory authorities.

6.7 We would like to remind you that once you leave 911proxy and related services, browse or use other websites, services and content resources, we will not have the ability and direct obligation to protect any personal information you submit in software and websites other than 911proxy and related services. Whether you log in, browse or use the above software, whether the website is based on a link or a guide to 911proxy.

7.Manage your personal information

7.1 Change or withdraw the scope of authorization

7.1.1 Change or revoke sensitive permission Settings

You can turn off cameras, albums, and geolocation permissions in the device's own operating system to change consent or withdraw your authorization. We will no longer collect information related to these permissions after the authorization is withdrawn.

7.1.2 Change or withdraw authorized information processing

Specific business functions and services will require your information in order to complete, when you withdraw consent or authorization, we can not continue to provide you with the corresponding functions and services to withdraw consent or authorization, and no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect our previous processing of personal information based on your authorization.

7.2 Access, delete, and correct your personal information

7.2.1 Access personal account information

You can query, access your avatar, nickname, author introduction, you can query, access in [I] - [Edit profile]. However, for security and identification reasons (such as number appeal services), you may not be able to modify the initial registration information submitted at registration. If you really need to modify this type of registration information, you can go to https://www.911proxy.com, log in [Personal Center] - click the profile picture - [Account Settings] in the upper right corner to make changes.

7.3 How to cancel your account

You can apply to cancel your account, if you apply, please send an email to [email protected], we will deal with it as soon as possible. Before you cancel your account, we will verify your personal identity, security status, device information, etc. You acknowledge and understand that the act of cancelling your account is irreversible, and when you cancel your account, we will delete the relevant information about you or anonymize it, except as otherwise provided by laws and regulations.

7.4 Access Privacy Policy

You can view the full contents of this Privacy Policy on the registration page, or by logging in to your personal account [My] - [About Us] - [Privacy Policy].

7.5 Complaint and report

You can make a complaint or report in accordance with our published system. If you believe that your personal information rights may have been infringed, or if you find clues of infringement of personal information rights, you can contact us at [[email protected]]. After checking, we will feedback your complaint and report within [15] working days.

7.6 Cease operation to inform you

If we cease operations, we will promptly stop the activities of collecting your personal information, notify you of the notice of cessation of operations in the form of one-by-one delivery or announcement, and delete or anonymize your personal information held by us.

7.7 alter

In the event of any material changes to this Privacy Policy, we will use reasonable efforts to inform all users, for example by Posting notices on the Platform; However, you should periodically review this Privacy Policy to check for changes. We will also update the "Update Date" and "Effective Date" at the top of this Privacy Policy. Your continued access to or use of the Platform after this Privacy Policy has been updated shall constitute your acceptance of the updated Privacy Policy. If you do not agree to the updated Privacy Policy, you must stop accessing or using the Platform.

8.Minor clause

a.Our services are mainly for adults. Minors should not use the Service without the consent of a parent or guardian. We protect minors' personal information in accordance with relevant national laws and regulations, and will only collect, use, share or disclose minors' personal information when permitted by law, with the express consent of parents or other guardians or necessary for the protection of minors; If we become aware that a minor's personal information has been collected without prior verifiable guardian consent, we will try to delete the information as soon as possible.

b. If you are the guardian of a minor, if you have any questions about the personal information of a minor under your custody, please contact us through the contact information published in this Privacy Policy.

9.Privacy Policy changes and notices

9.1 In order to provide you with better services, 911proxy and related services will be updated and changed from time to time, we will revise this privacy policy in time, these amendments form a part of this privacy policy and have the same effect as this privacy policy, without your express consent, we will not reduce your rights under the current effective Privacy policy.

9.2 After this Privacy Policy is updated, we will issue an updated version in 911proxy and remind you of the updated content through the official website (https://www.911proxy.com) or other appropriate means before the updated terms take effect, so that you can keep abreast of the latest version of this Privacy Policy. We will also promptly update the "Update Date" and "Effective Date" at the top of this Privacy Policy. If you continue to use the Service, you agree to accept the entire content of this revised Privacy Policy, but if the updated content requires additional user information from you, we will again ask for your consent in a prominent manner.

10.Contact us

a.If you have complaints, suggestions or questions about the protection of personal information, you can send them to [email protected], we will review the problem as soon as possible, and reply as soon as possible after verifying your user identity.

b.If you have any questions, comments or suggestions about the platform and the content of this Privacy Policy, you can send an email to [email protected]. We will give timely feedback after receiving your email.