Document Scanner Privacy Policy

Thank you for trusting and using our products and services. We understand the importance of personal information to you, and thank you for your trust in us. Through this policy, we will explain to you how we will collect, store, protect, use and provide your information externally, and explain your rights. You should carefully read and fully understand this Privacy Policy before using our products/services. If you do not agree with the content of this policy, it may cause our products/services to fail to operate normally, or cannot achieve the service effect of our products/services to operate normally. You should immediately stop accessing/using our products/services. Your use or continued use of the products/services provided by us means that you fully understand and agree to all the contents of this Privacy Policy (including the updated version). We will make every effort to prevent your information from leaking, damaging and losing through reasonable and effective information security technology and management process. We strictly abide by laws and regulations to protect your communication secrets and provide you with safe communication services. In order to provide better services to you and other users, we only collect necessary information.

1、 Information collection

1. When you use the software and related services, we will collect, store and use the data related to your personal information, which can be used to receive verification code when you register, log in, bind your account password and retrieve it
The information you fill in and/or provide when you register, log in or use the software and services may include name, mobile phone number, email, address and other information that can identify the user individually or in combination.
If you log in in other ways, we will request your personal information from a third party. For the personal information we need but cannot be provided by a third party, we will still ask you to provide it. If you refuse to provide, you will be unable to use some services.
2. Your information we obtained from a third party
We may obtain your authorized account information (avatar, nickname, etc.) from a third party, and bind your third-party account with your account after you agree to this Privacy Policy, so that you can directly log in and use our products and/or services through the third-party account. We will use your personal information according to the agreement with the third party, after confirming the legitimacy of the source of personal information, and on the premise of complying with relevant laws and regulations.

2、 Storage of personal information
1. Location of information storage
In accordance with the provisions of laws and regulations, we will store your personal information collected and generated in the domestic operation process in the People's Republic of China. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow the relevant national regulations or ask for your consent.

2. Storage life

During your use of this platform, we will keep your personal information for a period not exceeding the period necessary for providing you with services. After you terminate the use of this platform or close the corresponding authorization, unless otherwise specified by laws and regulations for the retention period of specific information, we will delete or anonymize your information. If we stop operating the platform services, we will delete or anonymize your personal information held in accordance with applicable laws within a reasonable period of time.

3、 Use of information

1. Safety monitoring
In order to improve the security of your use of this platform, protect your or other users' or the public's personal property from being infringed, better prevent security risks such as phishing, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion, and more accurately identify violations of laws and regulations, when you use this platform, we will automatically collect your IP address, unique device identifier, hardware model and settings Operating system and application functions (such as MAC address) and your detailed use of our services, such as browsing records, time zone, regional and language settings, server logs (including access date and time), and application crash information, to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures according to law.
We will take reasonable and feasible measures to avoid collecting personal information irrelevant to the purpose of use. If we use your personal information beyond the stated purpose and the scope of direct or reasonable connection with the use, we will inform you and obtain your express consent before using your personal information.

4、 How do we share and publicly disclose your personal information

1. Sharing of personal information
We will not share or transfer your personal information to a third party, unless you have given your prior authorization, or the personal information shared or transferred is de identified information, and the sharing third party cannot re identify the subject of such information.
To share your personal information, we will follow the following principles:
Principle of authorization and consent: Without your consent, we will not share your personal information, unless the shared personal information is de identified information, and the sharing third party cannot re identify the natural person subject of such information. If the third party uses the information for purposes beyond the original authorized consent, they need to obtain your consent again.
The principle of legitimacy and minimum necessity: the shared data must have a legitimate and legitimate purpose, and the shared data must be limited to the extent necessary to achieve the purpose.
The principle of security prudence: We will carefully evaluate the purpose of the third party's use of shared information, comprehensively evaluate the security capabilities of these partners, and require them to follow the cooperation legal agreement. We will strictly monitor the security of software tool development kits (SDKs) and application program interfaces (APIs) that partners obtain information to protect data security.
2. Public disclosure of personal information
We will not publicly disclose your information unless we obtain your consent. However, according to laws, regulations, rules, other normative documents, mandatory administrative law enforcement or judicial requirements, if your personal information must be provided, we may disclose your personal information to administrative law enforcement or judicial authorities according to the required type and disclosure method of personal information. When we receive a request for disclosure, we require it to issue the corresponding legal documents on the premise that it complies with the laws and regulations. We only provide the data that the law enforcement and judicial departments have the legal right to obtain for specific investigation purposes. Under the premise of laws and regulations, the documents we disclose are protected by encryption measures.
Please understand that under the following circumstances, we do not need your authorization to share, transfer and publicly disclose your personal information according to laws, regulations and national standards:
(1) Those directly related to national security and national defense security;
(2) Those directly related to public safety, public health and major public interests;
(3) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(4) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent, except for circumstances expressly prohibited by laws and regulations;
(5) Your personal information disclosed to the public;
(6) Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.
According to the law, sharing and transferring personal information that has been de identified, and ensuring that the data receiver can not recover and re identify the subject of personal information, does not belong to the external sharing, transfer and public disclosure of personal information, and the processing of such data will not require another notice to you and your consent.

5、 How do we protect your personal information

We adopt strict data processing authority control to prevent data from being used illegally; We use multiple data desensitization methods such as code printing and shielding to enhance the security of personal information in use; We use encryption technology widely used in the industry to encrypt and save your personal information, and isolate it through data isolation technology. For example, we encrypt all messages stored on our servers and your terminal devices. We always implement such technical measures and organizational management methods, and may revise and improve them from time to time to improve the overall security of the system.
Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that in the Internet industry, even if we try our best to strengthen the security measures, it is impossible to always guarantee the security of information 100% due to technical restrictions and possible malicious means. We will try our best to ensure the security of the personal information you provide us. Please be aware and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take positive measures to protect the security of your personal information and not disclose your account number and other personal information to others.
In case of any incident endangering network security, we will take corresponding remedial measures in time according to the emergency plan for network security incidents. If our physical facilities or technical protection measures are damaged, resulting in the disclosure, illegal provision or abuse of your personal information, causing damage to your legitimate rights and interests, we will assume corresponding responsibilities in strict accordance with the provisions of the law.

6、 Function description

We will collect and process user information for the following functions or purposes
Account login: To facilitate your use, we provide the account login function. You can log in through your mobile phone number. If you log in with your mobile phone number, we will collect your mobile phone number for account registration. If you want to cancel your account, you can refer to the "Account Cancellation" in this privacy instruction to cancel your account.
Vip privilege: for your convenience, we provide vip privilege function. You can log in to your account through your mobile phone number to activate vip privileges through WeChat/Alipay. We will collect your mobile phone number and your mobile phone imei or uuid as the only representation of members.
Notes on account cancellation
If you have given up your text scanning master account after careful consideration and meet all the cancellation conditions specified by the text scanning master, you can cancel yourself through the application. Click Logout Account to proceed with the logout process. During the logout process, your original identity information needs to be verified. After you logout, the following information will be cleared and cannot be retrieved:
-Membership and related rights and interests
-Identity information and third-party authorization information
The application for cancellation of the account of the text scanning master will take effect immediately after it is successful. Once it is cancelled, it will not be recoverable. Please back up all the information and data related to the text scanning master account before operation. Please keep the transaction vouchers, bills and other materials of order service, otherwise you may have to pay additional account and order inquiry fees, or you may not enjoy after-sales service. The text scanning master will not bear any responsibility for the adverse effects of your account cancellation application.

7、 Required Permissions

1) Storage Permissions<
It is used to cache software that requires some local data, such as KEY, imei, uuid, and software usage records of users after successful login.
2) Network connection permission
Our application needs to connect to the network. For the normal use of the networking function of the software
3) Network connection status permission
Our application needs to connect to the network. We check whether you have enabled mobile data or wifi to determine whether you have an network. When it is detected that you have no network, we will prompt you to enable it
4) Mount and unmount file system permissions
Used to update and upgrade the application
5) Camera permissions
Used for photo translation.
List of third-party SDKs:
SDK:com.facebook.fresco
Purpose: the default integration of the uni app basic module is used to load images on the nvue page
Collection data type: store personal files
Official website link: https://www.fresco-cn.org/

SDK:com.facebook
Purpose: This app uses the open source framework of Facebook to build the interface
Collection data type: no data is collected
Official website link: https://reactnative.dev/

SDK: wechat sdk android WeChat login
Purpose: log in with a third party of Tencent WeChat
Collection data type: no data is collected
Official website link: https://open.weixin.qq.com/

SDK: android.permission.READ_ PHONE_ STATE
Purpose: for app data and crash log statistics
Mobile data type: get mobile status (including mobile number, IMEI, IMSI permission, etc.)
Official website link: https://www.umeng.com/page/policy

SDK: com.qq. EPremium Collection SDK
Function: advertising SDK used to provide users with advertising services
Type of personal information collected: IMEI, MAC address, location information, identifier, usage data, diagnosis, other data
Privacy Policy: https://imgcache.qq.com/gdt/cdn/adn/uniondoc/ylh_sdk_privacy_statement.html

SDK: Pangolin SDK
Function: advertising SDK used to provide users with advertising services
Type of personal information collected: obtaining mobile phone status, including imei, network status, mac address, location information, identifier, usage data, diagnosis, and other data
Privacy Policy: https://www.pangle.cn/privacy

SDK: com.qq. EGuangDianTong
Function: advertising SDK used to provide users with advertising services
Type of personal information collected: obtaining mobile phone status, including imei, network status, mac address, location information, identifier, usage data, diagnosis, and other data
Privacy Policy: https://www.tencent.com/zh-cn/privacy-policy.html

SDK:com. Umeng UMENG (Youmeng SDK)
Purpose: user data statistics
Type of data collected: equipment identification information (IMEI/IP address/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/MAC address/geographic location, etc.)
Official website link: https://www.umeng.com/page/policy?spm=a213m0.17692878.0.0.6375378e01JMi9

SDK:com.google.android.gms.ads(AdMob)
Purpose: advertising sdk for providing users with advertising services
Type of data collected: IMEI, browser type and settings, operating system, mobile network information (including operator name and phone number), application version number, location information, mac address, etc
Privacy Policy: https://policies.google.cn/privacy

8、 Change

In the event of any significant change to this privacy policy, we will make reasonable efforts to advertise it to all users, for example, by issuing a notice on this platform; If you continue to visit or use this platform after the update of this privacy policy, you will be deemed to have accepted the updated privacy


9、 Protection of children's personal information

If you are a child under the age of 14, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using this platform.
We protect children's personal information in accordance with relevant national laws and regulations, and will only collect, use, store, share, transfer or disclose children's personal information when it is allowed by law, explicitly agreed by parents or other guardians or necessary to protect children; If we find that children's personal information has been collected without the prior consent of verifiable parents, we will try to delete the relevant information as soon as possible.
If you are the guardian of a child, please contact us through the contact information publicized in this privacy policy when you have questions about the personal information of the child under your custody.

Updated on: September 20, 2021
Effective date: September 20, 2021