YYNote Privacy Policy
Welcome to the products and services provided by YYNote! YYNote (or “we”) fully understands the importance of personal information to you and is solemnly committed to protecting the personal information and privacy security of users who use our products and services (collectively referred to as the “YYNote Services”) (collectively referred to as “users” or “you”). When you use YYNote Services, we may collect and use your relevant personal information (or “Personal Information” for short).
The “YYNote Privacy Policy” (hereinafter referred to as “this Privacy Policy”) applies to all YYNote Services we provide. When you use any of our individual services, you agree to be protected by this Privacy Policy and the specific privacy policy terms (hereinafter referred to as “Specific Terms”) issued for that individual service. In this case, both the Specific Terms and this Privacy Policy shall be effective for you simultaneously. If there are inconsistent agreements of the same type between the Specific Terms and this Privacy Policy, the Specific Terms shall prevail within the scope of their constraints. If this Privacy Policy does not apply to a specific individual service we provide, that service will clearly indicate the exclusion of this Privacy Policy in an appropriate manner.
We hope this Privacy Policy explains the processing rules corresponding to our collection and use of your relevant personal information, as well as the methods we provide for you to access, correct, delete, and protect this personal information, to better safeguard your rights and interests.
[Special Note] Please carefully read and understand this Privacy Policy (especially the content in bold or underlined) before using YYNote Services (minors please read accompanied by a guardian) to make an appropriate choice. Once you use our products or services, or continue to use them after we update this Privacy Policy, it means that you agree to this Privacy Policy and consent to us processing your relevant personal information according to this Privacy Policy.
This Privacy Policy will help you understand the following:
I. How We Collect and Use Your Personal Information
II. How We Use COOKIES or Similar Technologies
III. Personal Information We May Share, Transfer, and Disclose
IV. How We Retain, Store, and Protect Your Personal Information Security
V. How to Manage Your Personal Information
VI. Third-Party Services
VII. Age Restrictions
VIII. Notifications and Revisions
IX. Public Disclosure of Integrated Third-Party SDKs
X. Explanation of Application Self-Startup
XI. How to Contact Us
I. How We Collect and Use Your Personal Information
We collect your personal information primarily to make it easier and more satisfying for you and other users to use YYNote Services. YYNote’s goal is to provide all internet users with a safe, interesting, and educational online experience, and this information helps us achieve this goal.
(I) We will collect and obtain your personal information through the following途径:
- Information you provide. For example:(1) Information you provide to us when registering for a YYNote Services account or using YYNote Services;(2) Shared information you provide to third parties through YYNote Services, and information stored when you use YYNote Services.Please note that if you disclose your information in public areas within YYNote Services visible to other users (such as information you upload or post, or your responses to others’ uploads or posts), this information may be collected and used by others. If you find that others are improperly collecting or using your information, you can contact us through the feedback channels listed in the “How to Contact Us” section of this policy.
- Your information shared by third parties. That is, information about you shared by third parties when they use YYNote Services.
- Information we obtain. Information we collect, aggregate, and record when you use YYNote Services, such as log information, location information, and device information.
(II) We will collect and use the following types of your personal information for the following purposes:
We want to provide you with perfect products and services, so we continuously improve them. This means that as products and services iterate, expand, upgrade, etc., we may frequently introduce new services or business functions or redivide business functions, and may need to collect new personal information or change the purpose or method of using personal information. If we want to use your personal information for purposes not stated in this policy or collect other personal information not mentioned, we will separately obtain your consent through page prompts, interactive processes, website announcements, or other means in accordance with the law. Once you agree, these additional purposes will be considered part of this policy, and the additional personal information will also apply to this policy. During this process, you can contact us through the feedback channels listed in the “How to Contact Us” section of this policy, and we will provide you with answers as soon as possible.
- Help you complete registration and loginTo facilitate our provision of continuous and stable services and ensure the security of your use of YYNote Services, we need you to provide basic registration or login information, including mobile phone number, email address, and to create your account, username, and password. In some individual services, if you only need basic functions like browsing and searching, you do not need to register as a YYNote user or provide the above information.You can also provide or supplement other additional information (including your nickname, avatar, gender, region, personal profile) during registration, login, or subsequent use, which will help us provide you with a better service experience. However, if you do not provide this information, it will not affect your use of the basic functions of YYNote Services.
- Achieve identity verificationIn accordance with relevant laws, regulations, and regulatory requirements, or to meet needs such as real user identity verification, ensuring system and service security, and other specific service functions (including sharing and comment functions), we may need you to provide real identity information (e.g., name, ID document, phone number) and other necessary identity information to complete identity verification. If you do not provide the above information, we will not be able to provide you with related functions and services. For the purpose of identity verification, you agree and authorize us to provide, query, and verify your aforementioned identity information to relevant identity verification agencies (such as personal credit agencies, government departments, etc.) by ourselves or entrusted third parties.Please note that your identity information and biometric information are sensitive personal information. Please provide it cautiously. If you refuse to provide it, you may not be able to obtain related services, but it will not affect the normal use of other functions and services.
- Maintain normal operation of basic functionsWhile you use our services, to provide you with basic functions like browsing and searching, and to identify abnormal account status, understand product compatibility, and ensure the network and operational security of YYNote Services to maintain the normal operation of the aforementioned basic functions, we may directly or indirectly collect and store information about the services you use and how you use them, and associate this information. This information includes:(1) Log Information: When you use our services (including background running status), we may automatically collect detailed information about your use of our services, saved as relevant network logs. For example: your login account, search query content, IP address, browser type, telecom operator, network environment, language used, access date and time, web pages you visit, browsing history, Push open records, dwell time, refresh records, post records, follows, subscriptions, favorites, and shares.(2) Device Information: When you use our services (including background running status), we may receive and record information about the device you are using. This includes: device model, operating system and version, client version, device resolution, package name, device settings, process and software list, device identifiers (IMEI/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information), software and hardware characteristic information, information related to the device’s location (e.g., IP address, GPS location, and WLAN access point, Bluetooth, and base station sensor information that can provide relevant information). To collect the above basic personal device information, we will request access to your device information permissions. We collect this information to provide you with our basic services and functions. If you refuse to provide the above permissions, it may result in your inability to use YYNote Services.Please note that device information and log information alone are information that cannot identify a specific natural person. If we combine this type of non-personal information with other information to identify a specific natural person, or combine it with personal information, then during the period of combined use, this non-personal information will be regarded as personal information. Unless we obtain your authorization or unless otherwise stipulated by laws and regulations, we will anonymize and de-identify this type of personal information. During the period of combined use, this information will be treated and protected as your personal information according to this policy.
- Provide services to you(1) When you use YYNote Services, upload and/or publish information, and perform related actions (e.g., inputting and/or uploading voice, documents within YYNote Services), we will collect the information you upload, publish, or generate, and use your nickname, avatar, and published content for display. Please note that the information you publish publicly may contain your personal information or sensitive personal information. Please consider carefully before publishing. If the information you publish involves others’ personal information, you should obtain their consent before publishing.(2) When you use the YYNote “Link Collection” function and copy-paste information within YYNote, we will access the content in your device’s clipboard locally. We will not upload the content of your clipboard to our servers.(3) When you use certain advertising interaction functions (like shaking), we will access your gyroscope sensor, accelerometer, and gravity sensor; when you use the camera function within YYNote, we will access your accelerometer to optimize anti-shake effects. Please understand that individual device sensor data does not involve any personal location information and cannot be combined with other information to identify a specific natural person.
- Help you complete orders, make payments, and deliver goods or services to you(1) When you order specific goods and/or services within YYNote Services, our system will generate an order for purchasing those goods and/or services. During the ordering process, you need to provide at least the recipient’s personal identity information, name, shipping address, postal code, recipient, contact phone number, and payment status information. If you refuse to provide such information, we will not be able to complete the related delivery service. If you order goods or services for others through YYNote Services, you need to provide the aforementioned information of the actual orderer. Before providing us with the aforementioned information of the actual orderer, you must ensure that you have obtained their authorization and consent. When you use specific recognition functions of YYNote Services, we will collect and store the images, text, and voice information you upload. Our relevant recognition programs will process and analyze this data and return corresponding text results.(2) To display your account’s transaction information and ensure transaction security, we will collect information generated during your use of YYNote Services (e.g., goods or services purchased, specific order number, order creation time, transaction amount) to display to you and facilitate your order management.(3) To complete order payment, deliver goods or services, confirm transaction status, and provide you with after-sales and dispute resolution services, we will collect your account, order, transaction, payment, and logistics information related to the transaction progress through the transaction objects, payment institutions, logistics companies, etc., selected by you based on the transaction, or share your transaction information with the aforementioned service providers.
- Provide you with customer service or other user response functionsWhen you contact our customer service or use other user response functions (e.g., submitting after-sales applications, personal information protection complaints or suggestions, other customer complaints and demands), we may need you to provide necessary personal information to match and verify your user identity to protect your account and system security. We may also save your contact information (the method you used to contact us or other contact methods you proactively provided), records and content of your communications/calls with us, and other necessary information related to your requests to contact you or help you resolve issues, or record the handling solutions and results of related issues.
- Your personal information obtained indirectlyBased on the YYNote Services you choose to use, we may obtain relevant information about you authorized for sharing from affiliates or third-party partners. For example, when you use a third-party platform account to log in to YYNote Services, we will obtain relevant information under that third-party account (including: username, nickname, avatar, subject to your authorized content) based on your authorization, and after you agree to this policy, bind your third-party account with your YYNote Services account, allowing you to log in and use YYNote Services directly through the third-party account. We will collect and use this information in compliance with relevant laws and regulations, and based on agreements with affiliates or third-party partners,确信其信息来源合法的前提下.
- Provide security assurance for youTo improve the security of the services provided by us and our partners, protect the personal and property safety of you, other users, or the public from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusion, and more accurately identify situations that violate laws, regulations, or relevant agreements and rules of YYNote Services, we may collect, use, or integrate your account information, transaction information, device information, log information, and personal information obtained from our affiliates and partners with your authorization or based on law, to comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.You understand and agree that after collecting your personal information, we will use technical means to de-identify the data. De-identified personal information cannot identify your identity. Under these circumstances, we have the right to use the de-identified personal information to analyze the user database and use it commercially.
- You understand and agree that some individual services may require you to enable specific access permissions on your device to achieve the collection and use of information involved in these permissions. For example:(1) If we access your location information, it is to associate the location information with Bluetooth for scanning and connecting to nearby cloud pen devices;(2) If we access your photo album, it is to allow you to access and upload photos, images, or videos from your device, for example, to submit related issues to us for troubleshooting;(4) If we access your microphone, it is to allow you to use voice to create content and use the voice transcription function;(5) After you allow us to enable storage permissions, we can obtain information such as your photos, media content, and files. This is to facilitate you to share and store your information at any time;(6) If you allow us to enable the phone permission (Android system), we will read mobile network information to identify the network status, supporting the “Download offline cache only when connected to WIFI” function. Simultaneously, we will also read your device information to collect device model information in case of crashes for quick troubleshooting and improved application stability. You can also actively turn off this permission in the settings;(7) If you allow us to enable the IDFA ad tracking permission (iOS system), we will read the device advertising identifier, used for collecting device model information, etc., in case of crashes for quick troubleshooting and improved application stability. You can also actively turn off this permission in the settings.When you need to turn off any functional permission, most mobile devices support this need. Please refer to or contact your mobile device service provider or manufacturer for specific methods. Please note that enabling any permission represents your authorization for us to collect and use relevant personal information to provide you with corresponding services. Once you turn off any permission, it means you have canceled the authorization. We will no longer continue to collect and use relevant personal information based on that permission and will be unable to provide you with the service corresponding to that permission. However, your decision to turn off permissions will not affect the previous collection and use of personal information based on your authorization.
- Exceptions to obtaining authorized consentAccording to relevant laws and regulations, collecting your information in the following circumstances does not require your authorized consent:(1) Directly related to national security and national defense security;(2) Directly related to public security, public health, and significant public interests;(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;(4) Where it is necessary to protect the life, property, and other significant legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the individual;(5) The personal information is disclosed to the public by yourself;(6) Necessary for concluding or performing a contract according to your requirements;(7) Collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels;(8) Necessary for conducting legal news reports;(9) Other circumstances stipulated by laws and regulations.
- Notice regarding sensitive personal informationSensitive personal information refers to personal information that, once leaked, illegally provided, or abused, may endanger personal and property safety, and极易 lead to damage to personal reputation, physical and mental health, or discriminatory treatment, etc. The information provided by you or collected by us above may contain your sensitive personal information, including name, ID number, consumption records, transaction information, web browsing history, and location information. Please be cautious and pay attention to sensitive personal information. You agree that we can process your sensitive personal information for the purposes and methods described in this policy.
II. How We Use COOKIES or Similar Technologies
(I) COOKIES
We or our third-party partners may obtain and use your information through COOKIES or similar technologies and store this information as log information.
By using COOKIES, we provide users with a simple and easy network experience. A COOKIE is a small amount of data sent from a web server to your browser and stored on your computer’s hard drive. We use COOKIES to benefit our users. For example, to make logging into the YYNote virtual community faster, you can choose to store your username in a COOKIE. This makes it more convenient and quicker the next time you want to log in to YYNote’s services. COOKIES help us determine the pages and content you connect to, the time you spend on specific YYNote services, and the YYNote services you choose.
COOKIES allow us to serve you better and faster, and improve your experience on YYNote Services. However, you should be able to control whether and how your browser accepts COOKIES. Please check the documentation that came with your browser for more information on this.
We and third-party partners may collect and use your information through COOKIES or similar technologies and store this information.
Our use of our own COOKIES or similar technologies may be for the following purposes:
- Remember your identity. For example: COOKIES or similar technologies help us recognize you as a registered user or save preferences or other information you provide to us;
- Analyze your use of our services. We may use COOKIES or similar technologies to understand what activities you use YYNote Services for, or which services are most popular;
- Advertising optimization. COOKIES or similar technologies help us provide you with relevant ads based on your information rather than general advertising.
While using COOKIES or similar technologies for the above purposes, we may provide aggregated non-personally identifiable information collected through COOKIES or similar technologies to advertisers and other partners for analyzing how you and other users use YYNote Services and for advertising services.
There may be COOKIES or similar technologies placed by advertisers and other partners on YYNote Services. These COOKIES and/or similar technologies may collect non-personally identifiable information related to you to analyze how users use these services, send you ads you might be interested in, or evaluate the effectiveness of advertising services. The collection and use of this information by these third-party COOKIES or similar technologies are not subject to this policy but are constrained by their own information protection statements. We are not responsible for third-party COOKIES or similar technologies.
You can refuse or manage COOKIES or similar technologies through your browser or user choice mechanisms. But please note that if you disable COOKIES or similar technologies, we may not be able to provide you with the best service experience, and some services may not function properly. At the same time, you will still receive advertisements, but their relevance to you will be reduced.
(II) Web Beacons and Pixel Tags
In addition to Cookies, we may use other similar technologies such as web beacons and pixel tags on our website. Emails we send you may contain links to content on our website. If you click on such a link, we will track this click to help us understand your product or service preferences to proactively improve the customer service experience. Web beacons are typically transparent images embedded in websites or emails. With the help of pixel tags in emails, we can know whether an email has been opened. If you do not wish your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
III. Personal Information We May Share, Transfer, and Disclose
(I) Sharing
We attach great importance to the protection of your personal information. Except for the following circumstances, we will not share your personal information with any third party other than us and our affiliates without your consent:
- Providing services to you. We may share your information with partners and other third parties to realize the functions of YYNote Services, allowing you to normally use the services you need. For example: payment institutions providing payment services, partners providing data services (including online advertising monitoring, data statistics, data analysis), third-party logistics companies;
- Maintaining and improving our services. We may share your personal information with partners and other third parties to help us provide you with more targeted and improved services, for example: communication service providers that send emails or push notifications on our behalf;
- Sharing with third parties such as partners who entrust us with promotion,目的是为了使该等委托方了解推广的覆盖面和有效性. For example, we can inform the entrusting party how many people saw their promotional information or purchased the entrusting party’s goods after seeing this information, or provide them with statistical information that cannot identify individuals to help them understand their audience or customers;
- Necessary sharing with affiliates. To facilitate our provision of consistent services to you based on a unified account system and to facilitate your unified management, and ensure system and account security, etc., your personal information may be shared between us and our affiliates as necessary.
- Achieving other purposes described in Article I “How We Collect and Use Personal Information” of this policy;
- Fulfilling our obligations and exercising our rights under this policy or other agreements we have reached with you;
- Within the limits permitted by laws and regulations, to comply with the law, maintain the interests, property, or safety of us and our affiliates or partners, you, or other YYNote users or the public from damage, such as preventing illegal activities like fraud and reducing credit risks, we may exchange information with other companies and organizations. However, this does not include selling, renting, sharing, or otherwise disclosing information for profit in violation of the commitments made in this policy;
- In response to your legal needs or with your authorized consent;
- In response to the legitimate requests of your guardian to provide your information;
- Provided according to the individual service agreement signed with you (including electronically signed agreements and corresponding platform rules) or other legal document agreements;
- Provided based on academic research;
- Provided based on social public interests that comply with laws and regulations.
We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes. For companies, organizations, and individuals with whom we share personal information, we sign strict confidentiality agreements requiring them to process the information according to our instructions, this policy, and any other relevant confidentiality and security measures.
(II) Transfer
- As our business continues to develop, we may undergo mergers, acquisitions, asset transfers, or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company or organization to seek your authorization and consent again.
- After obtaining your explicit consent, we will transfer your personal information to a third party.
(III) Disclosure
We will only disclose your personal information under the following circumstances and while taking security protection measures that comply with industry standards:
- Disclose the information you specify in the manner you explicitly agree to, based on your needs;
- Where it is necessary to provide your information according to the requirements of laws, regulations, mandatory administrative law enforcement, or judicial requirements, we may disclose your information according to the required information type and disclosure method. In compliance with laws and regulations, when we receive such requests for information disclosure, we will require the recipient to issue corresponding legal documents, such as a subpoena or investigation letter. We firmly believe that information requested from us should be as transparent as possible within the limits permitted by law. We carefully review all requests to ensure they have a legal basis and are limited to data that law enforcement agencies have the legal right to obtain for specific investigation purposes.
(IV) Exceptions to prior authorization consent for sharing, transferring, and disclosing information
In the following circumstances, sharing, transferring, or disclosing your information does not require prior authorization and consent:
- Directly related to national security and national defense security;
- Directly related to public security, public health, and significant public interests;
- Directly related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial, and execution of judgments;
- Where it is necessary to protect the life, property, and other significant legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the individual;
- Information that you have disclosed to the public yourself;
- Information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels;
- Related to our fulfillment of obligations stipulated by laws and regulations.
According to legal provisions, sharing, transferring, or disclosing de-identified personal information, and ensuring that the data recipient cannot restore and re-identify the information subject, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require separate notification to you or obtaining your consent.
IV. How We Store and Protect Personal Information
(I) Storage of Personal Information
Unless otherwise stipulated by laws, regulations, or regulatory authorities, we only store your personal information for the period necessary for the purposes stated in this policy and for the shortest time limit. If we terminate the service or operation, we will promptly stop collecting your personal information, simultaneously comply with relevant laws and regulations to notify you in advance, and delete or anonymize your personal information after termination of service or operation, unless otherwise stipulated by laws, regulations, or regulatory authorities.
Personal information collected and generated during our operations within the People’s Republic of China is stored within China, except for the following circumstances:
- Clearly stipulated by laws and regulations;
- Your authorization and consent are obtained;
- The YYNote services you use involve cross-border transactions, and YYNote needs to provide your personal information overseas.
For the above situations, we will ensure implementation in accordance with national laws, regulations, and relevant regulatory provisions and provide sufficient protection for your personal information.
(II) Protection of Personal Information
We attach great importance to information security, have established a dedicated security team, and take all reasonably feasible measures to protect your personal information:
- Data security technical measuresWe will adopt security protection measures that meet industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from unauthorized access, use, alteration, and to avoid damage or loss of data.Our services use various encryption technologies. For example, in some YYNote services, we will use encryption technology (e.g., SSL) to encrypt and save your personal information and use isolation technology for isolation to protect your personal information.When using personal information, for example, information display and information association calculation, we use various data desensitization technologies to enhance security during use.We also adopt strict data access权限 controls and multi-factor authentication technology to protect personal information and avoid data being used improperly.
- Other security measures we take to protect personal informationWe have an industry-advanced data-centric data security management system围绕数据生命周期, improving the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We manage and standardize the storage and use of personal information by establishing data classification and grading systems, data security management specifications, and data security development specifications.We implement comprehensive security controls on data through information接触者 confidentiality agreements, monitoring, and auditing mechanisms.We also hold security and privacy protection training courses to enhance employees’ security awareness and understanding of personal information protection policies and related procedures.
- We only allow company employees and partners who need to know this information to access your personal information and have set strict access权限 controls and monitoring mechanisms. We also require all personnel who may come into contact with your personal information to fulfill corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or termination of the cooperative relationship with us.
- The Internet is not an absolutely secure environment, and communication methods such as email, instant messaging, social software, or other service software with other users cannot be确定是否完全加密. We recommend that you use complex passwords when using such tools and pay attention to protecting your information security. When communicating with third parties or purchasing goods and services through YYNote Services, you will inevitably have to disclose your information to the transaction counterparty or potential counterparty, such as contact information or postal address. Please protect your information properly and only provide it to others when necessary.
- The Internet environment is not 100% secure. We will尽力确保或担保您发送给我们的个人信息的安全性. If our physical, technical, or administrative protective facilities are compromised, resulting in unauthorized access, public disclosure, alteration, or destruction of personal information, causing damage to your legitimate rights and interests, we will bear corresponding legal responsibility.
- Security incident handlingTo address potential risks such as personal information leakage, damage, and loss, we have formulated multiple systems clarifying the classification and grading standards of security incidents and vulnerabilities and corresponding handling procedures. We have also established an emergency response team for security incidents. According to security incident handling specifications, we initiate security plans for different security incidents for loss stopping, analysis, positioning, formulating remedial measures, and tracing and combating jointly with relevant departments. We also regularly organize internal training and emergency drills so that our relevant staff master相应的应急处置策略和规程. After the unfortunate occurrence of an information security incident, we will inform you in a timely manner according to the requirements of laws and regulations: the basic situation of the security incident and its possible impact, the measures we have taken or will take, suggestions for you to prevent and reduce risks independently, and remedial measures for you, etc. We will simultaneously inform you of the incident-related situation via email, letter, phone, push notification, etc. When it is difficult to inform each information subject individually, we will adopt reasonable and effective methods to publish announcements. At the same time, we will also proactively report the handling of information security incidents to regulatory authorities as required.
Please understand that due to technical limitations and the limitations of risk prevention, even though we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the systems and communication networks you use to access YYNote Services may have problems due to circumstances beyond our control.
Please be sure to keep your account, password, and other identity elements safe. When you use YYNote Services, we will identify your identity through your account, password, and other identity elements. Once you disclose the aforementioned information, you may suffer losses, and it may have adverse effects on you. If you find that your account, password, and/or other identity elements may be or have been leaked, please contact us immediately so that we can take timely measures to avoid or reduce related losses.
V. How to Manage Your Personal Information
(I) Access, Update, and Deletion
We encourage you to update and modify your personal information to make it more accurate and effective.
If you want to query, modify, or delete part of your information, please log in to the YYNote account settings page. We have provided relevant operation guides and settings. For your information collected through COOKIES or similar technologies, we have also explained the selection mechanism provided to you in Part II “How We Use COOKIES or Similar Technologies” of this policy.
You can also contact us through the feedback channels listed in the “How to Contact Us” section of this policy or through online customer service, and we will handle it for you. We will adopt appropriate technical means or contact channels to allow you to access, update, and delete your personal information or other information provided when using YYNote Services, unless otherwise stipulated by laws and regulations.
Unless otherwise stipulated by laws and regulations, when you correct or delete your personal information, we may not immediately correct or delete the corresponding information from the backup system but will correct or delete this information when the backup is updated.
(II) Public and Sharing
Many of our services allow you to publicly share your relevant information not only with your social network but also with all users using the service. For example, information you upload or post in YYNote, your responses to information uploaded or posted by others, uploading or publishing your information in public areas within YYNote visible to non-specific users, including location data and log information related to this information. As long as you do not delete the information you publicly disclose or share, the relevant information may remain in the public domain; even if you delete shared information, it may still be independently cached, copied, or stored by other users or third parties not under our control, or saved in the public domain by other users or such third parties. If you disclose information through the above channels, we are not responsible for the resulting leakage of your information. Therefore, we remind and ask you to carefully consider whether to publicly disclose or share your information through the above channels.
(III) Account Cancellation
We provide you with ways to cancel your account. Under the conditions consistent with our service terms and relevant national laws and regulations, you can choose to contact us through the feedback channels listed in the “How to Contact Us” section of this policy or through online customer service, and we will respond to you as soon as possible.
After your account is canceled, we will stop providing you with all or part of YYNote Services and, based on your requirements, delete your personal information or anonymize it, unless otherwise stipulated by laws and regulations.
(IV) Change the Scope of Your Authorization and Consent
You can always choose whether to disclose personal information to us. Some personal information is necessary to use YYNote Services, but the provision of most other information is up to you. You can change the scope of your authorization for us to continue collecting information or withdraw your authorization by deleting information, turning off device functions, canceling your account, etc.
After withdrawing authorization, we cannot continue to provide you with the services corresponding to the withdrawn authorization and will no longer process your corresponding information. However, your decision to withdraw authorization will not affect the previous information processing based on your authorization.
(V) Obtain a Copy of Personal Information
If you need a copy of your personal information, you can contact us through the feedback channels listed in the “How to Contact Us” section of this policy or through online customer service. After verifying your identity, we will provide you with a copy of your personal information within our services (including basic information, identity information), unless otherwise stipulated by laws and regulations or agreed in this policy.
(VI) Responding to Your Above Requests
To ensure security, you may need to make a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. For reasonable requests, we原则上不收取费用, but for repeated requests multiple times beyond a reasonable limit, we will charge a certain cost fee depending on the situation. For requests that are groundlessly repetitive, require excessive technical means (e.g., requiring the development of new systems or fundamental changes to current practices), pose risks to the legitimate rights and interests of others, or are very impractical (e.g., involving information stored on backup tapes), we may refuse them.
In the following circumstances, we will be unable to respond to your request:
- Related to our fulfillment of obligations stipulated by laws and regulations;
- Directly related to national security and national defense security;
- Directly related to public security, public health, and significant public interests;
- Directly related to criminal investigation, prosecution, trial, and execution of judgments;
- We have sufficient evidence that you have subjective malice or abuse rights;
- Necessary for protecting the life, property, and other significant legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the individual;
- Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
- Involving trade secrets.
VI. Third-Party Services
YYNote Services may access or link to social media or other services provided by third parties (including websites or other service forms). This includes:
(I) You can use the “Share” button to share certain content to third-party platforms, or you can use third-party services to log in to YYNote Services. These functions may collect your personal information (including your log information) and may place COOKIES on your device to function normally;
(II) We provide you with links through advertisements or other means of our services, enabling you to link to third-party services or websites;
(III) Other situations of accessing third-party services. For example, to achieve the purposes stated in this policy, we may access SDKs or similar applications (such as embedded code, plugins, etc.) provided by third-party service providers to provide you with better customer service and user experience. Currently, the third-party service providers we mainly integrate include the following types:
- Used for advertising-related services, including ad display, ad statistics and monitoring, ad delivery and ad attribution, anti-cheating, etc.;
- Used for message push functions, including mobile manufacturer Push pushes, specific event reminders, etc.;
- Used for payment-related services, including order payment, transaction behavior verification, revenue settlement, payment information summary statistics, etc.;
- Used for obtaining device location permissions, collecting device information and log information, etc., with your consent;
- Used for third-party authorization services, including third-party account login, sharing relevant content to third-party products, etc.;
- Used to support product function modules, including voice recognition, image recognition, translation, online customer service, connecting smart hardware, etc.;
- Used to optimize product performance, including improving hardware pairing capability, reducing server costs, hotfixing functions, etc.;
- Used for account security and product reinforcement-related services, including network monitoring, domain name resolution, anti-hijacking, anti-spam and anti-cheating, encryption and decryption services, etc.;
- Used for exception reporting and statistical analysis functions, including统计APP异常,统计并分析APP用户数据, etc.
Some integrated third-party SDKs or similar applications may collect your personal information (including background running status), including but not limited to IMEI, IMSI, device MAC address, software list, device serial number, android ID, WiFi SSID, WiFi BSSID. If you use such services provided by third parties within our services, you agree that they will directly collect and process your information. We evaluate the legality, legitimacy, and necessity of such third-party services collecting personal information, require these third parties to take protective measures for your personal information, and strictly comply with relevant laws, regulations, and regulatory requirements. To provide you with product and service dynamics in a timely manner, we push activity notifications, etc., to you through your device’s system notifications. To achieve the message push function, we have integrated message push SDKs. Depending on the device brand and system version you use, the APP may perform necessary self-startup. You can turn off the message push function in the device settings. You can understand the basic situation of the main third-party SDKs we integrate through Part IX of this document, “Public Disclosure of Integrated Third-Party SDKs”. You can also choose to contact us through the feedback channels listed in the “How to Contact Us” section of this policy, and we will respond to you as soon as possible.
Third-party social media or other services are operated by the relevant third parties. Your use of such third-party social media services or other services (including any information you provide to such third parties) is subject to the third party’s own terms of service and information protection statement (not this policy), which you need to read carefully. This policy only applies to the personal information we collect and does not apply to any services provided by third parties or the information use rules of third parties. If you find that these third-party social media or other services pose risks, it is recommended that you terminate the relevant operations to protect your legitimate rights and interests and contact us promptly.
VII. Age Restrictions
If you are a minor under the age of 18, please be sure to let your parents or guardians read this Privacy Policy carefully and use our services or provide us with personal information only with the consent of your parents or guardians. We will protect the relevant personal information of minors in accordance with relevant national laws and regulations. If parents or guardians discover that the relevant minor’s personal information was filled in by the minor themselves and needs to be modified or deleted, please feel free to contact us.
VIII. Notifications and Revisions
We may modify the terms of this Privacy Policy from time to time, and such modifications constitute part of this Privacy Policy. For major changes, we will provide more prominent notice. If you do not agree to such changes, you can choose to stop using YYNote Services; if you continue to use YYNote Services, it means you agree to be bound by the revised Privacy Policy.
We encourage you to review our privacy policy each time you use YYNote Services.
We may issue service-related announcements when necessary (e.g., when we suspend a service due to system maintenance). You may not be able to cancel these service-related, non-promotional announcements.
Finally, you must keep your account and password information confidential. In any case, please keep it safe and secure.
IX. Public Disclosure of Integrated Third-Party SDKs in Our Application
| Third-Party SDK Name | Third-Party Company Name | How It Collects and Uses Your Personal Information | Privacy Policy Link |
|---|---|---|---|
| AGC App Linking SDK | Huawei Software Technologies Co. | Huawei will only collect and use your personal information for the purposes and methods described below. If we want to use the collected personal information for other purposes not stated herein, we will clearly inform you in a reasonable manner by ourselves or through the developer, and obtain your consent again or obtain other legal basis. Get Link Information Function: When an app integrated with AGC App Linking SDK is launched for the first time, the SDK supports obtaining link information to reach specified content within the app. To provide linking capability, the SDK collects information from the developer app calling the SDK interface. Processed personal information includes: Clipboard (clipboard data). Data is synchronously deleted when the link/app is deleted by the developer. Product Operation and Maintenance: To ensure stable SDK operation, ensure network security as required by laws and regulations, and improve product operation strategies, the SDK directly collects information from the developer app calling the SDK interface and uploads it to the server for statistical analysis. Processed personal information includes: Device information (AAID, Android version number), App information (app package name, app version number). | SDK Privacy Security Statement |
| AGC Remote Configuration SDK | Huawei Software Technologies Co. | Product Operation and Maintenance: To ensure stable SDK operation, ensure network security as required by laws and regulations, and improve product operation strategies, the SDK directly collects information from the developer app calling the SDK interface and uploads it to the server for statistical analysis. Processed personal information includes: Device information (Android version number, language, country, AAID, chip type), App information (app package name, app version number). | SDK Privacy Security Statement |
| AGC In-App Messaging SDK | Huawei Software Technologies Co. | Product Operation and Maintenance: To ensure stable SDK operation, ensure network security as required by laws and regulations, and improve product operation strategies, the SDK directly collects information from the developer app calling the SDK interface and uploads it to the server for statistical analysis. Processed personal information includes: Device information (AAID, Android version number, language, country, chip type), App information (app package name, app version number). | SDK Privacy Security Statement |
| AGC Crash Service SDK | Huawei Software Technologies Co. | Locate Crash Cause Function: AGC Crash Service SDK supports locating the current app’s running status and crash cause. To provide this capability, the SDK collects information from the developer app calling the SDK interface. Processed personal information includes: Network information (network type), Crash information. Personal information is synchronously deleted when the app is deleted by the developer. Product Operation and Maintenance: To ensure stable SDK operation, ensure network security as required by laws and regulations, and improve product operation strategies, the SDK directly collects information from the developer app calling the SDK interface and uploads it to the server for statistical analysis. Processed personal information includes: Device information (AAID, Android version number, device model, product brand, storage space status, memory usage status, screen orientation, screen size, language, rooted or not), App information (app package name, app version number). | SDK Privacy Security Statement |
| AGC Performance Management SDK | Huawei Software Technologies Co. | Application Performance Data Reporting Authorization and Isolation Function: To support application performance data reporting authorization and isolation. Processed personal information includes: Account information (developer information: CP ID, Product ID, Client ID, AGC App ID). Analyze Application Network Issues Function: For app developers, to analyze and locate app network issues by resolving operator information from IP addresses. Processed personal information includes: Network information (network connection type, WiFi status, operator information). Product Operation and Maintenance: To ensure stable SDK operation, ensure network security as required by laws and regulations, and improve product operation strategies, the SDK directly collects information from the developer app calling the SDK interface and uploads it to the server for statistical analysis. Processed personal information includes: App information (app name, app package name, app version number, SDK version information, AAID; app startup performance info, page load performance info, lag info, network performance info, foreground/background event info, CPU and memory usage info, interaction performance info, ANR event info, session random identifier; game scene performance events (scene name, scene load status), log callback events (custom logs), custom performance trace events (custom attributes, custom metrics)), Device information (device model, device hardware info, device usage info, OS info, system properties, system settings, user device identifiers, IP address, general location info (country, city)). | SDK Privacy Security Statement |
| Huawei Push SDK | Huawei Software Technologies Co. | Message Push Service: To provide developers with convenient and secure message push services, ensuring you receive notification messages from the developer app, the SDK directly collects information from the developer app calling the SDK interface. Processed personal information includes: App basic information (App ID, Push service version number, HMS Core version number), In-app device identifiers (AAID, Push Token), Device hardware information (device type), System basic information (system type, system version), System setting information (country code). Product Operation and Maintenance: To ensure stable SDK operation and统计SDK接口调用成功率, the SDK directly collects information from the developer app calling the SDK interface. Processed personal information includes: App basic information (App ID, app version number, app package name, Huawei Push SDK version number), Device hardware information (device model), System basic information (system version). This information will not be associated with your personal identity; we cannot identify your identity. | SDK Privacy Security Statement |
| Tencent Mobile Open Platform SDK | Shenzhen Tencent Computer Systems Co. | To achieve pop-up display, call system components strongly related to system version (like system browser), and for background reporting and issue monitoring (including quickly locating and resolving system compatibility issues), when the app initializes the QQ Connect SDK, collect the app end user’s [Operating system information, SSID/BSSID]; To achieve QQ Connect SDK background reporting and issue monitoring (including quickly locating and resolving model compatibility issues), when the app initializes the QQ Connect SDK, collect the app end user’s [Device model information]; To call the ability of the app end user to pull up Mobile QQ to pass information through the QQ Connect SDK (iOS version), when the app uses the share function and pulls up Mobile QQ, apply to call the app end user’s [Clipboard] (this calling behavior is limited to information related to the QQ Connect SDK and will not obtain or upload user clipboard information); To achieve the purpose of the app end user using the QQ Connect SDK (Android version) to share multimedia files to QQ, Qzone, or set avatars, when the app developer provides related services in a non-fileprovider way, call the app end user’s [Photo album, memory card permissions]. To achieve QQ Connect SDK (Android version) functions like sharing to QQ/TIM, adding friends, etc., and to determine whether QQ or TIM is installed on the user’s phone,需要收集App终端用户的 [应用列表信息] (need to collect app end user’s [Installed application list information]). | SDK Privacy Security Statement(Link likely in Chinese) |
| QQ Connect SDK | Shenzhen Tencent Computer Systems Co. | (Same as above for Tencent Mobile Open Platform SDK, as they are often bundled) To achieve pop-up display, call system components strongly related to system version…, collect [Operating system info, SSID/BSSID]; for monitoring, collect [Device model info]; for iOS sharing, apply to call [Clipboard]; for Android multimedia sharing, call [Photo album, memory card permissions] if non-fileprovider; for Android sharing/friending, collect [Installed application list info] to check for QQ/TIM. | SDK Privacy Security Statement(Link likely in Chinese) |
| WeChat Open SDK | Shenzhen Tencent Computer Systems Co. | 1.1.1 To enable users to use the share/collect to WeChat function, share images等内容到微信朋友圈或微信收藏, we will collect and transmit to the WeChat APP the images or content actively selected by the user in the third-party app, but we will not use the aforementioned information for user association and tracking. 1.1.2 To enable users to log in to third-party apps using their WeChat avatar and nickname, after confirming user authorization, we will provide the WeChat avatar and nickname information actively selected by the user to the third-party app. 1.1.3 To enable users to use the WeChat Pay function in third-party apps, we will collect the WeChat Pay order identifier generated by the third-party app when the user initiates payment and transmit it to the WeChat APP, and after the user performs the payment operation, transmit the status information of whether the payment was successful to the third-party app. Please note that the WeChat Pay function is provided by Tenpay Payment Technology Co., Ltd. (hereinafter referred to as “Tenpay Company”). To learn more about the privacy policy of the WeChat Pay function, please refer to the “Tenpay Privacy Policy”. 1.1.4 The aforementioned content regarding the collection and use of personal information applies to both iOS and Android systems. 1.1.5 Specifically, on the Android system, we will verify the installation status of the WeChat APP on the user’s device to confirm whether the device can achieve the relevant capabilities of the Open SDK. If the WeChat APP is not installed on the device, the user will be unable to use the functions realized by the WeChat Open SDK capabilities. 1.1.6 If the user uses the iOS system, to achieve adaptation of the aforementioned 1.1.2 related functions across different devices in the iOS system, we will collect the user’s device model information and store it locally on the device. 1.2 To achieve the corresponding functions of the SDK product, during the user’s use of the WeChat Open SDK related capabilities through the third-party app, we will apply for the following permissions through the third-party app: 1.2.1 If the user uses the iOS system, to achieve the information transmission between the third-party app and the WeChat APP involved in the aforementioned 1.1 related functions in the iOS system, we need to call the iOS clipboard permission and write and read the aforementioned related information in the clipboard. | SDK Privacy Security Statement(Link likely in Chinese) |
| Xiaomi Push SDK | Beijing Xiaomi Mobile Software Co. | To push relevant information provided by third-party apps to your device terminal in a timely manner. If you are integrating the Android version, when you register to use Xiaomi Push services, we collect your device identifier OAID and encrypted Android ID, as well as application information using the push service, such as app package name, version number, and running status. If you are integrating the iOS version, we collect IDFV (if not collectible, then not collected), app package name, and version number. To provide you with push services. If integrating Android, for sending notifications about software updates or new product releases (including marketing information), evaluating ad effectiveness, etc., we collect message creation, delivery, and click timestamps and temporarily store message content obtained from the third-party app and pushed to you. For iOS version, similarly for sending notifications and evaluating ads, we collect creation/delivery timestamps and temporarily store message content. To push and display messages tailored to your device, etc. For Android: we also collect device-related information like device manufacturer, model, memory, OS version, Xiaomi Push SDK version, device region (country/area), SIM carrier name (read locally, not uploaded), current network type (local), WiFi status. For iOS: device model, OS version, Xiaomi Push SDK version. You can change how you receive push messages via notification bar settings. To provide push services according to your settings (Android), we collect your notification bar settings info (e.g., blocked status, lock screen pop-up settings). We may associate information collected from your various devices to provide consistent service across them. We use this information for analysis and developing statistics related to our product/service use to improve our products/services. | SDK Privacy Security Statement |
| OPPO Push SDK | Guangdong Heytap Technology Co. | To provide you with push services, send notifications about software updates or new product releases, etc. (including but not limited to marketing information for our and related third-party products/services), you agree that we temporarily store message content obtained from the developer and collect your device-related information (e.g., IMEI or OAID, Serial Number, IMSI, User ID, Android ID, Google Advertising ID, phone Region settings, device model, phone battery level, phone OS version and language), application information using the push service (e.g., APP package name and version number, running status), Push SDK version number, network-related information (e.g., IP or domain connection result, current network type), message sending result, notification bar status (e.g., notification permission, user click behavior), lock screen status (e.g., whether locked, allows lock screen notifications). | SDK Privacy Security Statement |
| Vivo Push SDK | Vivo Mobile Communication Co. | (1) To push relevant information provided by the app developer to your device terminal, we collect your device identification information (e.g., IMEI, EmmCID, UFSID, ANDROIDID, GUID, GAID, OPENID, VAID, OAID, RegID, encrypted Android ID), application software information using the push service (e.g., app package name, version number, APPID, installation, uninstallation, factory reset, running status), device manufacturer, network-related information (e.g., IP address, network type), country code, device type. (2) To provide you with push services, we collect the timestamp of message creation, delivery, and click, and temporarily store message content obtained from the third-party app and pushed to you. (3) To push and display messages tailored to your device, etc., we collect your Push SDK version number, device model, OS version, current network type, message sending result, notification bar status (e.g., notification permission, user click behavior), lock screen status (e.g., whether locked, allows lock screen notifications). (4) To ensure the stability of the push service connection and avoid push delays, we collect your IP address for device network optimization. We only process your IP address locally and do not upload this data to the server or use it to identify you. (5) We may associate information collected from your various devices to provide consistent service. We use this information for analysis and developing statistics related to our product/service use to better improve them, like optimizing folded message algorithms. (6) To provide you with contextual message push services, we may use your phone system status information, application behavior data (see “AI Service Engine Privacy Statement”). (7) To provide you with better service, we may collect your push information content, notification bar status to form a user profile (see “vivo Service Privacy Statement”). | SDK Privacy Security Statement |
X. Explanation of Application Self-Startup
The application has a widget (desktop plugin) function. Widgets do not have the ability to update data independently. Widget data relies on the App’s data and the App’s network communication. Therefore, even if the application is closed, when the data relied upon by the desktop plugin needs to be updated, the App may self-start to update the data.
XI. How to Contact Us
If you have complaints and reports regarding personal information security, or if you have any questions, comments, or suggestions regarding this Privacy Policy or matters related to your personal information, as well as questions about this Privacy Policy or YYNote’s privacy measures, please contact us. Email address: [service@yynote.cn].
If you need to cancel your account, please log in to the App or PC client and use the [Account Management] -> [Cancel/Delete Account] function to delete your account and account-related data.
Revision Date: 2023-04-17
Dongguan Kaihong Network Technology Co., Ltd.