AkeySpace Privacy Policy(V1.1)
Updated Date: February 14, 2025
Introduction
This Privacy Policy applies to the software and services provided by AkeySpace which is legally owned and developed by Hangzhou Mixiaomeng Technology Co., Ltd. (hereinafter referred to as "AkeySpace" or "We").
We value the protection of our users' privacy. When using our services (hereinafter referred to as "this application"), we may need to collect and use your relevant information in accordance with this Privacy Policy. We hope to explain to you how we collect, use, store, and share this information, as well as the ways in which we provide you with access, update, control, and protect this information.
This Privacy Policy is related to the services you use. We hope you will read it carefully, especially the terms marked in bold, to ensure that you fully understand and agree before using it. If you have any questions, comments, or suggestions about this Privacy Policy, please contact us through the contact information provided at the end of this policy.
When necessary, please follow the guidance of this Privacy Policy to make the choices you deem appropriate. Regarding the relevant technical terms involved in this Privacy Policy, we try to present them concisely and provide links for further explanations to help you understand. In order to help you better understand how we collect, use, and protect your personal information, we have also provided AkeySpace Privacy Policy Abstract for your reference.
To use or continue to use our services, you are deemed to have agreed and authorized us to collect, use, store and share your relevant information in accordance with this Privacy Policy.
This Policy will help you understand the following contents:
I. The scope of application of this Privacy Policy
II. How we collect and use information
III. Circumstances of obtaining information in the "background state"
IV. How you view and manage your personal information
V. Partners involved in the data processing process and the transfer and disclosure of personal information
VI. Information security
VII. Prevention of account security risks
VIII. How we process children's personal information
IX. Policy updates
X. Contact us
I. The scope of application of the Privacy Policy
1. This Policy applies to all products and services we provide to you through the AkeySpace app, akeyim.com、akeyclub.com websites, as well as new forms that emerge with technological development.
Except for certain specific services, this Privacy Policy applies to all of our services. These specific services will be subject to specific privacy policies. Specific privacy policies for certain specific services will explain in more detail how we use your information in the services. The specific privacy policy for this service constitutes part of this Privacy Policy. If there is any inconsistency between the privacy policy of the relevant specific service and this Privacy Policy, the privacy policy of the specific service shall apply.
2. Please note that this Privacy Policy does not apply to the following situations:
Information collected by third-party services (including any third-party websites) accessed through our services;
Information collected by other companies or institutions that provide advertising services within our services.
II. How we collect and use information
To provide you with the basic functions of our products or services, you must authorize us to collect and use the necessary information that you actively provide when using our services and that is collected through automated means during your use of the functions or acceptance of the services. If you refuse, you will not be able to use our products or services normally. We will collect your information in the following ways:
1. Registration and Login
To help you register an account for this application so that you can use the software features of this application, we need to collect the following information from you:
You need to register an AkeySpace account with your mobile phone number, If you do not provide your mobile phone number for registration and login, we may not be able to provide you with services. You can bind your WeChat or AppleID as login credentials for your AkeySpace account. We can obtain the personal information you provide to fulfill the account management responsibility. The third-party SMS verification code service provider can only obtain the mobile phone number and cannot obtain any associated account information other than the mobile phone number.
2. Security certification
To comply with laws, regulations, and regulatory requirements, ensure the authenticity of user identities, prevent fraud, and safeguard the security of systems and services, when you use specific services or functions, we will collect your relevant information for identity verification, such as:
When applying to create a space, you can choose to create a space as an individual or as a business. You need to complete identity verification according to the prompts on the product page based on the type you choose and different scenarios.
Personal identity verification: You need to provide your true identity information (name, ID number, and facial recognition information, subject to the page prompts) to complete real-person verification. When conducting facial information real-person verification, we need to obtain your light sensor data to determine if the light source is sufficient.
Enterprise verification: You need to provide the basic information of your enterprise (business license, enterprise name, unified social credit code, name of legal representative, legal representative's ID number, photo of legal representative holding ID card, subject to the page prompts) to complete enterprise verification, and we will review this information.
If there is a scenario where it is necessary to determine your essential identity information according to law (such as protecting the rights and interests of minors, combating online fraud, identifying relevant subjects in administrative law enforcement or judicial litigation), you authorize us to obtain the necessary authentication information of your corresponding account for the above purposes.
3. Instant messaging
The instant messaging function provides you with a chat function with your friends, including private chat and group chat. You can send text, voice, and video messages in the chat interface. We will use this function to meet your real-time communication needs with your friends.
If you need to send voice messages, make voice or video calls, or send instantly captured photos or videos, you need to authorize AkeySpace to access the microphone or camera permissions of your device. During audio and video calls, AkeySpace needs to access your proximity sensor to implement automatic screen dimming. If you need to send photos or files, you need to authorize AkeySpace to access the album or file storage permissions of your device, otherwise, you will not be able to use it normally.
We will not collect your chat records (i.e., chat records, including text, voice, video, pictures, and various documents). However, when we have reasonable grounds to suspect that you are engaged in illegal criminal activities or infringing upon the legitimate rights and interests of others through this application (such as receiving reports and complaints from others and having been filed by public security, procuratorial, and judicial departments), we may prohibit you from using some or all functions of this application.
4. Device information and log information
(1) For the following reasons, we need to collect your device information and log information.
Device information and log information will be used for fault analysis, identity verification, registration and login, customer service, security protection, fraud monitoring, archiving, and backup purposes to ensure the security of the products and services we provide to you; help us design new services and improve our existing services; allow us to better understand how you access and use our services; used for software authentication or managing software upgrades. Device information and log information are the basis for us to provide services. If you refuse to provide them, you will not be able to use this application.
Usage information of this application: the version number of this application you are using, the overall operation of the software, usage, and frequency. This type of data is confidential.
Log information related to network security incidents. This type of information is information required by law to be collected. If you do not want this information to be collected by us, you will not be able to use this application.
(2) Device information refers to the device information used when you use this application.
We will collect your device brand, device model, screen resolution, system version, IP address, Wi-Fi MAC address, and device unique identification information including Andriod ID. The specific usage is as follows:
Use Android ID to identify the uniqueness of the device, prevent user accounts from being stolen by other devices, enhance user security, and protect user privacy;
To provide communication functions, a network is required, and the MAC address will be automatically obtained when using the network;
When the App connects to the server, the server will automatically obtain the IP address. Since IP addresses are usually allocated based on regions, they can be used to distinguish the approximate login location source of users. By obtaining IP addresses, servers can prevent illegal elements from logging in through risky IP addresses, enhance software security, and ensure the security of user information. At the same time, the server will encrypt and save the IP addresses, without the risk of leakage of user personal information.
5. Third-party service support
During your utilization of AkeySpace services, we engage third-party service providers to deliver functionalities including : push notification systems, geolocation services (encompassing current position display, location sharing, and location search capabilities) , audio and video call service , behavioral CAPTCHA , facial recognition authentication, and in-app web browsing functionality. The specific categories of personal information collected, methodologies employed, and purposes for processing are comprehensively detailed in the Third-Party Shared List.
6. Timing of Information Acquisition
All information acquisition will only occur after the user starts the AkeySpace App, browses the user service agreement and privacy policy, and clicks the "Agree" button, and will only be acquired once each time the application is started.
The collected device information will not be stored in plain text but encrypted before being sent to the server for storage, eliminating the risk of user personal information leakage. The frequency of transmission is once per application startup.
Once again, we will minimize our reliance on the above-described device information and device permissions during the service process.
We ask for your understanding that the collection of device information is a prerequisite and basis for our service provision. As long as you install and open this application, we will collect your device information.
Individual device information cannot identify or determine the identity of a specific natural person, and we will de-identify, anonymize, and encrypt this information.
III. Circumstances of obtaining information in the "background state"
1. The main program of this application will not collect user personal information without user permission in silent and background states. The real-time communication function of this application App itself does not require additional user information.
2. When this application enters a silent or background state, if the network connection is restricted due to the phone system's energy saving or sleep, the App will not repeatedly attempt to access the network to maximize the power saving of the phone and improve the user experience.
IV. How you access and control your personal information
1. Access, correction, and deletion of personal information
We will take all possible appropriate technical means to ensure that you can access, correct, and delete your registered information or other personal information provided when using our services. You can access, correct, and delete your personal information by opening the edit icon on the personal settings page of the client software of this application. When accessing, correcting, and deleting the aforementioned information, we may ask you to verify your identity to ensure account security. If you want to obtain a copy of your personal information or transfer your personal information, you can contact us by email.
2. Change the scope of authorization
You can revoke our authorization by the permission request prompt window when this application is first run on your device or by modifying the permission settings corresponding to this application in the device settings. However, your denial of authorization may result in the unavailability of certain functions, such as the inability to take pictures and send pictures in real-time during chat if the camera permission is not enabled.
Among them, for the storage permission (photos, media, content, and files), it can be used to restore historical accounts, making it easier for users to retrieve and log in. If you are sensitive to this permission, you can deny authorization and log in directly by entering your account.
3. Account cancellation
You can complete the self-initiated cancellation application through [Settings]/[Account Settings] - [Accounts and Security] - [Delete your account]. If the self-cancellation fails due to server version issues, you can contact us by email.
After you cancel your account, we will stop providing you with products or services and delete or anonymize your personal information as required by law.
V. Partners involved in the data processing process and the transfer and disclosure of personal information
1. Basic Principles of Cooperation Handling
(1) Legal Principle: In the process of cooperating with partners, if data usage activities are involved, they must have a legal purpose and comply with the legal basis for legitimacy. If the partner's use of information no longer complies with the legal principle, they should not use your personal information anymore, or use it after obtaining the corresponding legal basis.
(2) Proper and Minimum Necessary Principle: Data usage must have a proper purpose and should be limited to what is necessary to achieve the purpose.
(3) Safe and Prudent Principle: We will carefully evaluate the purpose of the partner's use of data, comprehensively assess the partner's security and protection capabilities, and require them to follow the legal agreement of cooperation. We will conduct strict security monitoring of the software development kit (SDK) used by the partner to obtain information to ensure data security.
2. Scope of Partners
We may share your personal information with third-party service providers, contractors, and agents to provide you with our services and achieve the purposes described in the "How We Collect and Use Information" section, fulfill our obligations and exercise our rights under this Privacy Policy, and understand, maintain, and improve our services.
If we share your personal information with any of the above third parties, we will strive to ensure that the third party complies with this Privacy Policy and other appropriate confidentiality and security measures when using your personal information. For details, please refer to the Third-Party Shared List and the third-party privacy policy.
3. Information Transfer
If we need to transfer personal information due to reasons such as merger, division, dissolution, or declaration of bankruptcy, we will notify you of the name and contact information of the recipient. The recipient will continue to comply with this Policy and other legal obligations. If the recipient changes the original processing purpose or method, the recipient shall obtain your consent again.
4.Information Disclosure
We will not disclose your personal information publicly unless required by law, regulations, or upon your proactive choice or otherwise obtaining your separate consent. When we disclose your personal information, we will use industry-standard security protection measures.
5. Circumstances where your consent is waived by law
Please understand that in the following circumstances, we do not need to obtain your authorization and consent to provide or disclose your personal information to partners or third parties:
(1) Necessary for the conclusion or performance of a contract at your request;
(2) Necessary for the performance of legal duties or obligations;
(3) Directly related to social security;
(4) Necessary to protect the life, health, and property safety of natural persons in emergency situations or emergencies;
(5) Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;
(6) Processing personal information within a reasonable scope for the implementation of news reporting and public opinion supervision in the public interest;
(7) Other circumstances stipulated by laws, administrative regulations.
6. Complaints submitted by you voluntarily
If you encounter any violation behavior while using this product, you can report it at any time. In this case, we may disclose the complaint information you submit at the request of relevant judicial authorities in accordance with administrative and judicial orders and laws and regulations.
VI. Information security
1. We will only retain your personal information for the period necessary for the purposes described in this Privacy Policy and the time limit required by laws and regulations. When the storage period of your personal information expires or our product or service stops operating, we will delete your personal information or anonymize it, except as otherwise provided by law.
2. We use various security technologies and procedures to prevent the loss, improper use, unauthorized access, or disclosure of information. In some services, we will use encryption technology to protect the personal information you provide. However, please understand that due to technological limitations and the possibility of various malicious means, in the Internet industry, despite our best efforts to enhance security measures, it is impossible to always guarantee 100% information security. You need to know that the system and communication network you use to access our services may have problems due to factors outside our control.
3. The personal information we collect will be stored in China.
VII. Prevention of account security risks
When using AkeySpace for communication and collaboration, please properly protect your personal information and only provide it to others when necessary to avoid information theft or even telecommunication network fraud.
Please consider carefully the important personal privacy you upload, publish, and exchange through our services. In some cases, you can control the scope of users who have access to the information you share through the privacy settings of some of our services. If you request to delete your relevant information from our services, please operate through the method provided in the special service terms.
VIII. How we process children's personal information
1. AkeySpace is a business tool application, and its functions and content are not suitable for children. Therefore, if you are a child under the age of 14, please stop using AkeySpace immediately and cancel the corresponding account.
2. We will strictly abide by relevant laws and regulations, will not actively seek to collect children's personal information, and have not designed any functions or services for children. If you think we may have collected children's personal information or found that children are using AkeySpace, please contact us in time, and we will respond quickly and handle it properly.
IX. Policy updates
We may update and revise the terms of this Privacy Policy from time to time, and the revised terms will form part of this Privacy Policy. If the revision results in a substantial reduction of your rights under this Privacy Policy, we will notify you by prominently displaying a prompt on the homepage or sending you an email or otherwise before the revision takes effect. In such a case, if you continue to use our services, it means that you agree to be bound by the revised Privacy Policy.
X. Contact us
You can contact us in the following ways, and we will respond to your request within 15 days:
1.If you have any questions, comments, or suggestions about the content of this Policy, including complaints or contacting the person in charge of personal information protection, you can contact us through the "Feedback".
2.You can also contact us by sending an email to account@akeyclub.com. Please note that we may not respond to questions unrelated to this Policy or your rights to personal information.
3.If any dispute or controversy arises between you and AkeySpace or the server operator regarding this Policy, you shall first resolve it through friendly negotiation; if the negotiation fails, you agree to submit the dispute or controversy to the Hangzhou Arbitration Commission.
(ENDS)