Updated April 23, 2023. _Effective date: April 23, 2023
PopChaaat is a product provided by us. In order to explain how we collect, use and store your personal information and what rights you have, we will use this guide to inform you about these matters, the key points of which are as follows.
How we collect and use your Record Screen Data
The screen recording function is used for OCR (text recognition) purposes only, and currently has no other uses. We will not collect any data.
How we collect and use your personal information
Personal information is information recorded electronically or otherwise that, alone or in combination with other information, identifies a particular natural person or reflects the activities of a particular natural person. We will only collect and use your personal information for the following purposes described in this policy.
(i) Conducting internal data analysis and research, third-party SDK statistical services to improve our products or services, [Note: AUA] We collect data based on your interactions with us and the choices you make, including your privacy settings and the products and features you use. The data we collect may include SDK/API/JS code versions, browsers, internet service providers, IP addresses, platforms, timestamps, application identifiers, application versions, application distribution channels, standalone device identifiers, iOS advertising identifiers (IDFA), Android advertiser identifiers, network card (MAC) addresses, international mobile device identifiers (IMEI), and Device model, device manufacturer, OS version of the device, session start/stop time, language location, time zone and network status (WiFi, etc.), hard drive, CPU and battery usage.
(ii) Ad placement, we use Google ads within the app, Google may record ad logo ids
We will seek your prior consent to use the information for purposes other than those set out in this policy. We will seek your prior consent to use information collected for a specific purpose for other purposes.
(ii) Web beacons and pixel tags In addition to cookies, we use other similar technologies on our websites, such as web beacons and pixel tags. For example, an email we send you may contain a clickable URL that links to content on our site, and if you click on the link, we track that click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image that is embedded in a website or email. With the help of pixel tags in emails, we are able to know if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
(iii) Do Not Track. Many web browsers include a Do Not Track feature that allows Do Not Track requests to be made to websites. At this time, the major Internet standards organizations have not established policies on how websites should respond to such requests. However, if you have Do Not Track enabled on your browser, all of our websites will respect your choice.
How We Share, Transfer, and Publicly Disclose Your Personal Information
(C) Public Disclosure
We will only publicly disclose your personal information in the following circumstances. 1. with your express consent. 2、Disclosure based on the law: we may disclose your personal information publicly in the case of mandatory requirements by law, legal proceedings, litigation or government authorities.
How we protect your personal information
(i) We have implemented industry standard security safeguards to protect the personal information you provide to us from unauthorised access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable steps to protect your personal information. For example, data exchanged between your browser and the Service (such as credit card information) is protected by SSL encryption; we also provide https secure browsing on our website; we use encryption technology to ensure the confidentiality of data; and we use trusted protection mechanisms to protect data from malicious attacks.
(ii) We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; and (iii) We will conduct security and privacy training sessions to enhance our employees' awareness of the importance of protecting personal information.
(ii) We will take all reasonably practicable steps to ensure that no unrelated personal information is collected. We will only retain your personal information for as long as necessary to achieve the purposes stated in this policy, unless a longer retention period is required or permitted by law.
(c) The Internet is not an absolutely secure environment, and email, instant messaging, and communication with other our users are not encrypted, and we strongly advise you not to send personal information through these means. Please use complex passwords to help us keep your account secure.
(d) The Internet environment is not 100% secure and we will do our best to ensure or warrant the security of any information you send to us. If our physical, technical, or managerial safeguards are compromised, resulting in unauthorized access, public disclosure, alteration, or destruction of information, and your legal rights are damaged, we will be liable for the corresponding legal liability.
(E) In the unfortunate occurrence of personal information security incidents, we will, in accordance with the requirements of laws and regulations, timely inform you: the basic situation of the security incident and the possible impact, we have taken or will take disposal measures, you can prevent and reduce the risk of independent advice, your remedial measures and so on. If it is difficult to inform the subject of personal information one by one, we will make announcements in a reasonable and effective manner. At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
In accordance with China's relevant laws, regulations and standards, as well as the prevailing practices in other countries and regions, we ensure that you exercise the following rights with respect to your personal information. Note: We do not currently record any user information.
How we handle children's personal information
We currently do not record any user information.
How is your personal information transferred globally?
In principle, the personal information we collect and generate within the People's Republic of China will be stored in the People's Republic of China. As we provide our products or services through resources and servers located around the world, this means that, with your authorised consent, your personal information may be transferred to, or accessed from, jurisdictions outside the country in which you use our products or services. Such jurisdictions may have different data protection laws, or may not even have established laws. In such cases, we will ensure that your personal information is adequately protected to the same extent as it would be in the People's Republic of China. For example, we may request your consent for cross-border transfers of personal information, or implement security measures such as data de-identification prior to cross-border data transfers.
Contact with us
When you have other complaints, suggestions, or questions about a minor's personal information, please contact us at email@example.com. We will review the issue as soon as possible and respond to you within thirty working days.
You can contact us by emailing firstname.lastname@example.org.