AkeySpace Privacy Policy
Effective Date: December 12, 2023
Updated Date: December 12, 2023
Introduction
This Privacy Policy applies to the software and services provided by AkeySpace which is legally owned and developed by Hangzhou Mixiaomeng Technology Co., Ltd. (hereinafter referred to as "AkeySpace" or "We").
We value the protection of our users' privacy. When using our services (hereinafter referred to as "this application"), we may need to collect and use your relevant information in accordance with this Privacy Policy. We hope to explain to you how we collect, use, store, and share this information, as well as the ways in which we provide you with access, update, control, and protect this information.
This Privacy Policy is related to the services you use. We hope you will read it carefully, especially the terms marked in bold/underlined, to ensure that you fully understand and agree before using it. If you have any questions, comments, or suggestions about this Privacy Policy, please contact us through the contact information provided at the end of this policy.
When necessary, please follow the guidance of this Privacy Policy to make the choices you deem appropriate. Regarding the relevant technical terms involved in this Privacy Policy, we try to present them concisely and provide links for further explanations to help you understand. In order to help you better understand how we collect, use, and protect your personal information, we have also provided AkeySpace Privacy Policy Abstract for your reference.
To use or continue to use our services, you are deemed to have agreed and authorized us to collect, use, store and share your relevant information in accordance with this Privacy Policy.
This policy will help you understand the following contents:
I. The scope of application of this privacy policy
II. How we collect and use information
III. Circumstances of obtaining information in the "background state"
IV. How you view and manage your personal information
V. Partners involved in the data processing process and the transfer and disclosure of personal information
VI. Information security
VII. Prevention of account security risks
VIII. Protection of minors
IX. Policy updates
X. Contact us
I. The scope of application of the privacy policy
1. This policy applies to all products and services we provide to you through the AkeySpace app, akeyclub.com、akeyim.com、akeymall.com websites, as well as new forms that emerge with technological development.
Except for certain specific services, this Privacy Policy applies to all of our services. These specific services will be subject to specific privacy policies. Specific privacy policies for certain specific services will explain in more detail how we use your information in the services. The specific privacy policy for this service constitutes part of this Privacy Policy. If there is any inconsistency between the privacy policy of the relevant specific service and this Privacy Policy, the privacy policy of the specific service shall apply.
Please note that this Privacy Policy does not apply to the following situations:
Information collected by third-party services (including any third-party websites) accessed through our services;
Information collected by other companies or institutions that provide advertising services within our services.
II. How we collect and use information
To provide you with the basic functions of our products or services, you must authorize us to collect and use the necessary information that you actively provide when using our services and that is collected through automated means during your use of the functions or acceptance of the services. If you refuse, you will not be able to use our products or services normally. We will collect your information in the following ways:
1. Registration and Login
To help you register an account for this application so that you can use the software features of this application, we need to collect the following information from you:
You need to register an AkeySpace account with your mobile phone number. The mobile phone number is the necessary information to fulfill the requirements of national laws and regulations on network real-name registration. If you do not provide your mobile phone number for registration and login, we may not be able to provide you with services. You can bind your WeChat or AppleID as login credentials for your AkeySpace account. We can obtain the personal information you provide to fulfill the account management responsibility. The third-party SMS verification code service provider can only obtain the mobile phone number and cannot obtain any associated account information other than the mobile phone number.
2. Security certification
To comply with laws, regulations, and regulatory requirements, ensure the authenticity of user identities, prevent fraud, and safeguard the security of systems and services, when you use specific services or functions, we will collect your relevant information for identity verification, such as:
When applying to create a space, you can choose to create a space as an individual or as a business. You need to complete identity verification according to the prompts on the product page based on the type you choose and different scenarios.
Personal identity verification: You need to provide your true identity information (name, ID number, and facial recognition information, subject to the page prompts) to complete real-person verification. When conducting facial information real-person verification, we need to obtain your light sensor data to determine if the light source is sufficient.
Enterprise verification: You need to provide the basic information of your enterprise (business license, enterprise name, unified social credit code, legal person's name, legal person's ID number, legal person holding ID card photo, subject to the page prompts) to complete enterprise verification, and we will conduct manual review of this information.
To realize the "real-person verification" service, this application integrates the "Financial Grade Real-person Verification SDK" provided by Alibaba Cloud Computing Co., Ltd., which needs to collect and use your device information, the face, voice, and identity information uploaded by the end user, terminal permission information, log information, and other information collected for the reasonable needs of providing services and improving service qualityPlease refer to the "Alibaba Cloud Financial Grade Real-person Verification SDK Privacy Policy" for details of the privacy policy.
If there is a scenario where it is necessary to determine your essential identity information according to law (such as protecting the rights and interests of minors, combating online fraud, identifying relevant subjects in administrative law enforcement or judicial litigation), you authorize us to obtain the necessary authentication information of your corresponding account for the above purposes.
3. Instant messaging
The instant messaging function provides you with a chat function with your friends, including one-on-one chat and group chat. You can send text, voice, and video messages in the chat interface. We will use this function to meet your real-time communication needs with your friends.
If you need to send voice messages, make voice or video calls, or send instantly captured photos or videos, you need to authorize AkeySpace to access the microphone or camera permissions of your device. During audio and video calls, AkeySpace needs to access your proximity sensor to implement automatic screen dimming. If you need to send photos or files, you need to authorize AkeySpace to access the album or file storage permissions of your device, otherwise, you will not be able to use it normally.
We will not actively collect your real-time communication records (i.e., chat records, including text, voice, video, pictures, and various documents). However, when we have reasonable grounds to suspect that you are engaged in illegal criminal activities or infringing upon the legitimate rights and interests of others through this application (such as receiving reports and complaints from others and having been filed by public security, procuratorial, and judicial departments), we may prohibit you from using some or all functions of this application.
4. Device information and log information
(1) For the following reasons, we need to collect your device information and log information.
Device information and log information will be used for fault analysis, identity verification, registration and login, customer service, security protection, fraud monitoring, archiving, and backup purposes to ensure the security of the products and services we provide to you; help us design new services and improve our existing services; allow us to better understand how you access and use our services; used for software authentication or managing software upgrades. Device information and log information are the basis for us to provide services. If you refuse to provide them, you will not be able to use this application.
Usage information of this application: the version number of this application you are using, the overall operation of the software, usage, and frequency. This type of data is confidential.
Log information related to network security incidents. This type of information is information required by law to be collected. If you do not want this information to be collected by us, you will not be able to use this application.
(2) Device information refers to the device information used when you use this application.
We will collect your device brand, device model, screen resolution, system version, IP address, Wi-Fi MAC address, and device unique identification information including Andriod ID. The specific usage is as follows:
Use Android ID to identify the uniqueness of the device, prevent user accounts from being stolen by other devices, enhance user security, and protect user privacy;
To provide communication functions, a network is required, and the MAC address will be automatically obtained when using the network;
When the App connects to the server, the server will automatically obtain the IP address. Since IP addresses are usually allocated based on regions, they can be used to distinguish the approximate login location source of users. By obtaining IP addresses, servers can prevent illegal elements from logging in through risky IP addresses, enhance software security, and ensure the security of user information. At the same time, the server will encrypt and save the IP addresses, without the risk of leakage of user personal information.
5. Message notifications
During your use of AkeySpace services, we may send you one or more types of messages.
To ensure that you can receive push notifications normally and avoid missing any messages, we have enabled the self-start and associated start of other apps.
To achieve message push, this application integrates the following third-party SDKs:
(1) Xiaomi Push
To implement the "Xiaomi Push" service, this application integrates the "Xiaomi Push SDK" and requires the use of the device's OAID and encrypted Android ID.
Purpose of Use: Push information to Xiaomi devices.
Use Scenario: Alert users to check for new messages when they arrive on the device.
Third-party SDK Name: Xiaomi Push SDK
Third-party Name: Xiaomi Technology Co., Ltd.
Types of Personal Information Involved: IMEI/OAID (applicable to Android Q and above systems), IMEI MD5/MEIDMD5, Android ID, VAID, AAID, and your MID (applicable to MIUI system), device model, WI-FI information, device information (BSSID, SSID), and the list of applications currently running.
Collection Method: SDK native collection
Privacy Policy Link: "Xiaomi Push Privacy Policy"
(2) Huawei Push
To implement the "Huawei Push" service, this application integrates the "Huawei Push SDK", which requires the use of the device's AAID or OAID.
Purpose of Use: Push information to Huawei devices.
Use Scenario: Alert users to check for new messages when they arrive on the device.
Third-party SDK Name: Huawei Push SDK
Third-party Name: Huawei Software Technologies Co., Ltd.
Types of Personal Information Involved: Device information (SSID, BSSID, IMEI, Android_ID), and the list of applications currently running.
Collection Method: SDK native collection
Privacy Policy Link: "SDK Privacy and Security Statement"
(3) OPPO Push
To provide you with push notifications and ensure that communication messages reach your device in a timely manner, this application integrates the "OPPO Push SDK".
Purpose of Use: Push information to OPPO devices.
Use Scenario: Alert users to check for new messages when they arrive on the device.
Third-party SDK Name: OPPO Push SDK
Third-party Name: OPPO Guangdong Mobile Communications Co., Ltd.
Types of Personal Information Involved: Device identifiers (OAID, VAID, AAID, UDID), device-related information (IMEI, Serial Number, IMSI, User ID, Android ID, Google Advertising ID, phone region settings, device model), information about applications using push services, network-related information (such as IP or domain connection results, current network type), and notification bar status (such as notification bar permissions and user click behavior).
Collection Method: SDK native collection
Privacy Policy Link: "Push Personal Information Protection Policy"
(4) Meizu Push SDK
To provide you with push notifications and ensure that communication messages reach your device in a timely manner, this application integrates the "Meizu Push SDK".
Purpose of Use: Push information to Meizu devices.
Use Scenario: Alert users to check for new messages when they arrive on the device.
Third-party SDK Name: Meizu Push SDK
Third-party Name: Zhuhai Meizu Telecommunications Equipment Co., Ltd.
Types of Personal Information Involved: The list of applications currently running.
Collection Method: SDK native collection
Privacy Policy Link: "Meizu Push Privacy Agreement"
(5) NetEase Yidun Behavioral CAPTCHA SDK
To provide you with network verification code services and ensure that verification codes reach your device in a timely manner, this application integrates the "NetEase Yidun Behavioral CAPTCHA SDK".
Purpose of Use: Use NetEase Yidun Behavioral CAPTCHA when users verify their identity using mobile verification codes to prevent fraud.
Use Scenario: When users verify their identity by receiving mobile verification codes.
Third-party SDK Name: NetEase Yidun Behavioral CAPTCHA SDK
Third-party Name: Hangzhou NetEase Zhiqi Technology Co., Ltd.
Types of Personal Information Involved: Device brand, device name, device model, device system type, detailed settings, version information, network connection type and status, IP address, network operator information.
Collection Method: SDK native collection
Privacy Policy Link: "NetEase Yidun Privacy Policy"
(6) VIVO Push SDK
To provide you with push notifications and ensure that communication messages reach your device in a timely manner, this application integrates the "VIVO Push SDK".
Purpose of Use: Push information to VIVO devices.
Use Scenario: Alert users to check for new messages when they arrive on the device.
Third-party SDK Name: VIVO Push SDK
Third-party Name: Vivo Mobile Communications Co., Ltd.
Types of Personal Information Involved: The list of applications currently running and mobile storage permissions.
Collection Method: SDK native collection
Privacy Policy Link: "VIVO Privacy Policy"
(7) Alibaba Mobile Push SDK
To provide you with push notifications and ensure that communication messages reach your device in a timely manner, this application integrates the "Alibaba Mobile Push SDK", which requires device-related information such as the operating system, device model, Android system device identifier, operator information, and IP.
Purpose of Use: Push information to Android devices.
Use Scenario: Alert users to check for new messages when they arrive on the device.
Third-party SDK Name: Mobile Push SDK
Third-party Name: Alibaba Cloud Computing Co., Ltd.
Types of Personal Information Involved: Device information (including operating system, device model), IP, and operator information.
Collection Method: SDK native collection
Privacy Policy Link: "EMAS Privacy Policy"
6. Location Information
To provide you with location viewing, sending, and searching services, this application integrates the "Amap Open Platform SDK".
Purpose of Use: Sending/Sharing Location
Scenario of Use: Sending/Sharing Location
Third-Party SDK Name: Amap map SDK
Third-Party Name: Amap Software Co., Ltd.
Types of Personal Information Involved: Location Information (including GNSS information, IP address, WLAN hotspots, base station information, Bluetooth devices, and other sensor information used for positioning), Device Information (including unique identifiers of terminal devices (including IDFV, OAID, IMEI, MEID, IMSI), MAC address, operating system version, device brand and model, device configuration, operator type, application information (application name, application version number)), WiFi Information, currently running application list, and mobile storage permissions
Collection Method: SDK Local Collection
Privacy Policy Link: "Amap Open Platform Privacy Policy"
7. Audio and Video Call Services
To implement audio and video call services, this application integrates the real-time audio and video RTC SDK provided by Shanghai Zhaoyan Network Technology Co., Ltd. Shanghai Zhaoyan Network Technology Co., Ltd. will serve as a data trustee processor to collect, use, and protect your personal information in accordance with the "Shengwang SDK Privacy Policy".
8. In-App Web Access
To provide you with the ability to access internet web pages within the application, this application integrates the Tencent Browser com.tencent.smtt (TBS Tencent Browser Service, Tencent X5 Browser) SDK, which requires access to the Android ID.
For detailed privacy policies of the Tencent Browser SDK, please refer to the "Personal Information Protection Rules of Tencent Browser Service SDK".
9. Timing of Information Acquisition
All information acquisition will only occur after the user starts the AkeySpace App, browses the user service agreement and privacy policy, and clicks the "Agree" button, and will only be acquired once each time the application is started.
The collected device information will not be stored in plain text but encrypted before being sent to the server for storage, eliminating the risk of user personal information leakage. The frequency of transmission is once per application startup.
Once again, we will minimize our reliance on the above-described device information and device permissions during the service process.
We ask for your understanding that the collection of device information is a prerequisite and basis for our service provision. As long as you install and open this application, we will collect your device information.
Individual device information cannot identify or determine the identity of a specific natural person, and we will de-identify, anonymize, and encrypt this information.
III. Circumstances of obtaining information in the "background state"
1. The main program of this application will not collect user personal information without user permission in silent and background states. The real-time communication function of this application App itself does not require additional user information.
2. When this application enters a silent or background state, if the network connection is restricted due to the phone system's energy saving or sleep, the App will not repeatedly attempt to access the network to maximize the power saving of the phone and improve the user experience.
IV. How you access and control your personal information
1. Access, correction, and deletion of personal information
We will take all possible appropriate technical means to ensure that you can access, correct, and delete your registered information or other personal information provided when using our services. You can access, correct, and delete your personal information by opening the edit icon on the personal settings page of the client software of this application. When accessing, correcting, and deleting the aforementioned information, we may ask you to verify your identity to ensure account security. If you want to obtain a copy of your personal information or transfer your personal information, you can contact us by email.
2. Change the scope of authorization
You can revoke our authorization by the permission request prompt window when this application is first run on your device or by modifying the permission settings corresponding to this application in the device settings. However, your denial of authorization may result in the unavailability of certain functions, such as the inability to take pictures and send pictures in real-time during chat if the camera permission is not enabled.
Among them, for the storage permission (photos, media, content, and files), it can be used to restore historical accounts, making it easier for users to retrieve and log in. If you are sensitive to this permission, you can deny authorization and log in directly by entering your account.
3. Account cancellation
You can complete the self-initiated cancellation application through [Settings] - [Accounts and Security] - [Cancel Account]. If the self-cancellation fails due to server version issues, you can contact us by email.
After you cancel your account, we will stop providing you with products or services and delete or anonymize your personal information as required by law.
V. Partners involved in the data processing process and the transfer and disclosure of personal information
1. Basic Principles of Cooperation Handling
(1) Legal Principle: In the process of cooperating with partners, if data usage activities are involved, they must have a legal purpose and comply with the legal basis for legitimacy. If the partner's use of information no longer complies with the legal principle, they should not use your personal information anymore, or use it after obtaining the corresponding legal basis.
(2) Proper and Minimum Necessary Principle: Data usage must have a proper purpose and should be limited to what is necessary to achieve the purpose.
(3) Safe and Prudent Principle: We will carefully evaluate the purpose of the partner's use of data, comprehensively assess the partner's security and protection capabilities, and require them to follow the legal agreement of cooperation. We will conduct strict security monitoring of the software development kit (SDK) used by the partner to obtain information to ensure data security.
2. Scope of Partners
We may share your personal information with third-party service providers, contractors, and agents to provide you with our services and achieve the purposes described in the "How We Collect and Use Information" section, fulfill our obligations and exercise our rights under this Privacy Policy, and understand, maintain, and improve our services.
If we share your personal information with any of the above third parties, we will strive to ensure that the third party complies with this Privacy Policy and other appropriate confidentiality and security measures when using your personal information. For details, please refer to the "Third-Party Shared List" and the third-party privacy policy.
3. Information Transfer
If we need to transfer personal information due to reasons such as merger, division, dissolution, or declaration of bankruptcy, we will notify you of the name and contact information of the recipient. The recipient will continue to comply with this policy and other legal obligations. If the recipient changes the original processing purpose or method, the recipient shall obtain your consent again.
4.Information Disclosure
We will not disclose your personal information publicly unless required by law, regulations, or upon your proactive choice or otherwise obtaining your separate consent. When we disclose your personal information, we will use industry-standard security protection measures.
5. Circumstances where your consent is waived by law
Please understand that in the following circumstances, according to laws, regulations, and national standards, we do not need to obtain your authorization and consent to provide or disclose your personal information to partners or third parties:
(1) Necessary for the conclusion or performance of a contract at your request;
(2) Necessary for the performance of legal duties or obligations;
(3) Directly related to national security or national defense security;
(4) Necessary to protect the life, health, and property safety of natural persons in emergency situations or emergencies;
(5) Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;
(6) Processing personal information within a reasonable scope for the implementation of news reporting and public opinion supervision in the public interest;
(7) Other circumstances stipulated by laws, administrative regulations.
6. Complaints submitted by you voluntarily
If you encounter any violation behavior while using this product, you can report it at any time. In this case, we may disclose the complaint information you submit at the request of relevant judicial authorities in accordance with administrative and judicial orders and laws and regulations.
VI. Information security
1. We will only retain your personal information for the period necessary for the purposes described in this Privacy Policy and the time limit required by laws and regulations. When the storage period of your personal information expires or our product or service stops operating, we will delete your personal information or anonymize it, except as otherwise provided by law.
2. We use various security technologies and procedures to prevent the loss, improper use, unauthorized access, or disclosure of information. In some services, we will use encryption technology to protect the personal information you provide. However, please understand that due to technological limitations and the possibility of various malicious means, in the Internet industry, despite our best efforts to enhance security measures, it is impossible to always guarantee 100% information security. You need to know that the system and communication network you use to access our services may have problems due to factors outside our control.
3. The personal information we collect will be stored in China.
VII. Prevention of account security risks
When using AkeySpace for communication and collaboration, please properly protect your personal information and only provide it to others when necessary to avoid information theft or even telecommunication network fraud.
Please consider carefully the content of information you upload, publish, and exchange through our services. In some cases, you can control the scope of users who have access to the information you share through the privacy settings of some of our services. If you request to delete your relevant information from our services, please operate through the method provided in the special service terms.
VIII. Protection of minors
We require users to be at least 18 years old when registering as AkeySpace users, and we have taken corresponding measures, but we do not have the ability to verify whether you are actually 18 years old. Therefore, when you use the services and functions we provide, we presume that you have the corresponding capacity for civil conduct. If you are a minor, please stop using the services and functions provided by AkeySpace. If you insist on using it, we strongly recommend that you ask your parents or other guardians to carefully read this policy and use our services or provide information to us with the consent of your parents or other guardians.
If you are the parent or other guardian of a minor, please pay attention to whether the minor is using our services with your authorized consent. If you have any questions about the personal information of a minor, please contact us.
IX. Policy updates
We may update and revise the terms of this Privacy Policy from time to time, and the revised terms will form part of this Privacy Policy. If the revision results in a substantial reduction of your rights under this Privacy Policy, we will notify you by prominently displaying a prompt on the homepage or sending you an email or otherwise before the revision takes effect. In such a case, if you continue to use our services, it means that you agree to be bound by the revised Privacy Policy.
X. Contact us
You can contact us in the following ways, and we will respond to your request within 15 days:
1.If you have any questions, comments, or suggestions about the content of this policy, including complaints or contacting the person in charge of personal information protection, you can contact us through the "Feedback".
You can also contact us by sending an email to account@akeyclub.com. Our office address is: No. 501, 2nd Street, Baiyang Sub-district, Qiantang New District, Hangzhou City, Zhejiang Province. Please note that we may not respond to questions unrelated to this policy or your rights to personal information.
If you are not satisfied with our reply, especially if you believe that our processing of personal information has damaged your legitimate rights and interests, you can file a lawsuit with the court having jurisdiction over the defendant's domicile.