“Cutout P map show” privacy policy

Last revision date: May 25,2020

Effective Date: 25 May 2020

Main Body: Wuhan Wangmi Technology Co. , Ltd.

This privacy policy will help you understand the following key policies:

1) we will collect some of your necessary information in order to ensure that the core functions and other functions of the product function properly

2) we will not share, provide, transfer or obtain your personal information from a third party unless you agree to do so;

3) we will strive to take reasonable security measures to protect your personal information. In particular, we will protect your sensitive personal information in a way that is common in the industry and will do our best to protect your business;

4) how you access, correct, delete personal information, revoke consent, and report complaints.

If you do not agree with this privacy policy and start using it, we will only collect the information necessary to maintain the basic functionality of this software, which will result in US not being able to provide you with complete products and services, but we will also use de-identification, encryption and other measures to protect this information. When you use it again, you will be deemed to have accepted and accepted that we will process your information in accordance with this policy if it is necessary to fulfill the contract and service.

We attach great importance to the protection of users’ personal information and will treat this information with due diligence and care. We will collect, preserve, use, share, disclose and protect your personal information in accordance with this privacy policy when you download, Install, open, browse, use (hereinafter referred to as “Use”) this software and related services. We would like to introduce you to the way we handle your personal information through this privacy policy, so we suggest that you read all the terms and conditions of this privacy policy carefully and thoroughly. You will be reminded of your information and rights in boldface format. Please read the following:

How we collect and use personal information

2. Our use of cookies and similar technologies

3. How We Store Personal Information

How We Share, transfer and publicly disclose personal information

How do we protect our personal information

6. Your Rights

Terms of use for minors

Revision and notification of privacy policy

Scope of application

How to contact us

Xi. Others

How we collect and use personal information

In the course of your use of the software and services, we will be in accordance with the legal, legitimate, necessary principles, the collection of information. The information we collect or request from you will be used to:

(1) to ensure the normal operation of the foundation of the product;

2. Realization of functions and services;

3. Optimize and improve products and services;

4. Secure products, services, and users

5. Recommend ads, information, etc. that you might be interested in

(1) personal information we collect and use on our own initiative

We collect the information that you provide when you use the service, and the information that you generate when you use the function or receive the service, as follows:

1. Ensure the normal operation of the software and services

When you use this software and related services, in order to ensure the normal operation of the software and services, we will collect your hardware model, operating system version number, network device hardware address (Mac) , IP address, software version number, network access mode and type, Operation Log, etc. . Please understand that this information is the basic information we must collect to provide services and ensure the proper operation of our products.

Provides you with matting, picture editing and other functions or services

(1) matting, picture editing functions need to store permissions in order to be able to save the processed pictures to the album

(2) matting and photo editing functions require camera privileges to capture and process images after they have been taken

(3) matting Photoshop needs access to device information that can be used to provide different features and experiences, product usage and Bug information, depending on the device and system version, hELP US continually improve the functionality and experience of our products

3. Use other third party code to count your information

(1) to reduce the number of bugs that affect your use of our product, and to improve the user experience by changing the interaction based on your behavior, we upload behavioral information and crash logs to Baidu mobile statistics platform, talkingdata platform, Data Rover statistics platform, Huawei data statistics, for detailed crash logs and behavioral analysis.

During your use of our products, we will show you third-party advertisements, information, etc. .

Serial number Permission name Access mode The purpose of obtaining this permission
1 Gets the device identification number and status Dynamic Access, user-initiated authorization 1. Used as a sign-in to identify real users rather than plug-in software, the basis of the machine
2. For the ad SDK to form a feature tag that provides you with more relevant ads
3. It is used to collect Bug information generated by the application so that we can better improve the product
2 Camera Dynamic Access, user-initiated authorization Use to open the photo album and use the photo to make the picture
3 Access Network Silent acquisition For user login registration
4 Get wi-fi status Silent acquisition Use to judge network quality, request data resource in WI-FI state
5 Read write storage permission Dynamic Access, user-initiated authorization For data caching, page caching, optimizing the presentation of a page, improving response time, and saving user-added and edited images locally
6 Get Network status Silent acquisition Used to determine whether the current network is available and can initiate network requests

You can access the third party platform privacy policy through the following link:

SDK product name Name of supplier Applications for APP products Scene description Collection mode Type of personal information Personal Information Field Purpose or purpose Is necessary information Information Processing Privacy Policy
Alipay pay SDK Alipay Android Login, pay Automatic collection of the relevant interface of the calling system Personal equipment information, location information, network information, personal communication information Device Information: Device Identifier (IMEI, IDFA, Android ID, Mac, OAID, etc.) , application information (application crash information, notification switch status, software list, etc.) , device parameters and system information (device type, device type, operating system and hardware related information) network information: IP address, wI-FI, cell towers, everything In order to let you more safe, the convenient sign-on APP, may choose to use the Alipay third party account authorization to sign-on APP, more convenient purchases in the APP payment service Yes Desensitizing display of personal information by means of de-labeling https://render.alipay.com/p/c/k2cx0tg8
Wechat SDK Wechat Android Login, pay Automatic collection of the relevant interface of the calling system Personal equipment information, Location Information, network information, personal communication information Device Information: Device Identifier (IMEI, IDFA, Android ID, Mac, OAID, etc.) , application information (application crash information, notification switch status, software list, etc.) , device parameters and system information (device type, device type, operating system and hardware related information) network information: IP address, wI-FI, cell towers, everything To make it easier and more secure for you to sign in to the APP, you can choose to use a third party account on wechat to authorize the APP, making it easier to purchase the paid services in the APP Yes Desensitizing display of personal information by means of de-labeling https://open.weixin.qq.com/cgi-bin/frame?t=news/protocol_developer_tmpl
Baidu Mobile statistics Baidu Android Statistical features for the App’s dimensions Automatic collection of the relevant interface of the calling system Personal equipment information, location information, network information, personal communication information Device Information: Device Identifier (IMEI, IDFA, Android ID, Mac, OAID, etc.) , application information (application crash information, notification switch status, software list, etc.) , device parameters and system information (device type, device type, operating system and hardware related information) network information: IP address, wI-FI, cell towers, everything For statistical breakdown logs as well as behavioral analysis Yes Desensitizing display of personal information by means of de-labeling https://www.baidu.com/duty/yinsiquan-policy.html
Talking data statistics TalkingData Android Statistical features for the App’s dimensions Automatic collection of the relevant interface of the calling system Personal equipment information, location information, network information, personal communication information Device Information: Device Identifier (IMEI, IDFA, Android ID, Mac, OAID, etc.) , application information (application crash information, notification switch status, software list, etc.) , device parameters and system information (device type, device type, operating system and hardware related information) network information: IP address, wI-FI, cell towers, everything For statistical breakdown logs as well as behavioral analysis Yes Desensitizing display of personal information by means of de-labeling https://www.talkingdata.com/privacy.jsp?languagetype=zh_cn
Data Rovers statistics Toutiao Android Statistical features for the App’s dimensions Automatic collection of the relevant interface of the calling system Personal equipment information, location information, network information, personal communication information Device Information: Device Identifier (IMEI, IDFA, Android ID, Mac, OAID, etc.) , application information (Application Crash Information, notification switch status, software list, etc.) , device parameters and system information (device type, device type, operating system and hardware related information) network information: IP address, wI-FI, cell towers, everything For statistical breakdown logs as well as behavioral analysis Yes Desensitizing display of personal information by means of de-labeling https://www.volcengine.com/docs/6256/64902
Huawei statistics Huawei Android Statistical features for the App’s dimensions Automatic collection of the relevant interface of the calling system Personal equipment information, location information, network information, personal communication information Device Information: Device Identifier (IMEI, IDFA, Android ID, Mac, OAID, etc.) , application information (application crash information, notification switch status, software list, etc.) , device parameters and system information (device type, device type, operating system and hardware related information) network information: IP address, wI-FI, cell towers, everything For statistical breakdown logs as well as behavioral analysis Yes Desensitizing display of personal information by means of de-labeling https://consumer.huawei.com/cn/privacy/privacy-policy/
Auroral IM Auroras Android By identifying the device information, the App is given the ability to send instant messages, and the location and network information is used to create smart tags for instant messaging in regions and groups. The overall implementation gives the App the ability to communicate instantaneously, to chat within the application, to contact customer service, to provide timely feedback on user issues, and to solve user issues Automatic collection of the relevant interface of the calling system Personal equipment information, location information, network information, personal communication information Device Information: Device Identifier (IMEI, IDFA, Android ID, Mac, OAID, etc.) , application information (Application Crash Information, notification switch status, software list, etc.) , device parameters and system information (device type, device type, operating system and hardware related information) network information: IP address, wI-FI, cell towers, everything Give the App instant messaging capabilities that allow it to chat within the application, contact customer service, provide timely feedback on users’ problems, and solve users’ problems Yes Desensitizing display of personal information by means of de-labeling https://www.jiguang.cn/license/privacy
Baidu Body Analysis API Baidu AI platform Android Access to user storage through the storage rights to upload pictures Baidu AI platform Automatic collection of the relevant interface of the calling system Network information, pictures stored by the user Network information: IP address, WiFi information, base station information and other related information, storage information: external storage information In order to achieve intelligent matting background removal Yes Desensitizing display of personal information by means of de-labeling https://ai.baidu.com/ai-doc/REFERENCE/kk3dwjg7d
Pick-up intelligence Smart pickup cutout Android Access to the user through the storage rights to the images stored, uploaded to the pickup smart Automatic collection of the relevant interface of the calling system Network information, pictures stored by the user Network information: IP address, WiFi information, base station information and other related information, storage information: external storage information In order to achieve intelligent matting background removal Yes Desensitizing display of personal information by means of de-labeling https://www.picup.shop/servicePrivacy.html
Optimal Sink Tencent Android By identifying device information and location and network information used to create smart tags that push smarter and better ads for users Automatic collection of the relevant interface of the calling system Personal equipment information, location information, network information, personal communication information Device Information: Device Identifier (IMEI, IDFA, Android ID, Mac, OAID, etc.) , application information (application crash information, notification switch status, software list, etc.) , device parameters and system information (device type, device type, operating system and hardware related information) network information: IP address, wI-FI, cell towers, everything Display third party ads Yes Desensitizing display of personal information by means of de-labeling https://www.tencent.com/zh-cn/privacy-policy.html
Pangolin Toutiao Android By identifying device information and location and network information used to create smart tags that push smarter and better ads for users Automatic collection of the relevant interface of the calling system Personal equipment information, location information, network information, personal communication information Device Information: Device Identifier (IMEI, IDFA, Android ID, Mac, OAID, etc.) , application information (application crash information, notification switch status, software list, etc.) , device parameters and system information (device type, device type, operating system and hardware related information) network information: IP address, wI-FI, cell towers, everything Display third party ads Yes Desensitizing display of personal information by means of de-labeling https://partner.oceanengine.com/privacy

4. Ensure the safety of products, services and users

To help us better understand the operation of this software and related services in order to ensure the security of operation and provision of services, we use third-party statistical tools to record network log information, and the frequency of use of software and related services, crash data, overall installation, usage, performance data and other information.

Please understand that the above information is collected and used in a de-identifying/anonymizing process, and the data analysis only corresponds to specific codes that can not be directly associated with the user’s identity.

(1) handling of changes in the purpose for which personal information is collected and used

Please understand that with the development of our business, we may adjust the function and service of this software. In principle, when new features or services are associated with cutout, image editing, or other usage scenarios, the personal information collected and used will be directly or reasonably related to the purpose of the original processing. In situations where there is no direct or reasonable connection to the original purpose, we collect and use your personal information and will inform again, with your consent.

(2) exemption from obtaining consent to collect and use personal information according to law

Please understand that we do not require your authorization to collect and use your personal information in accordance with laws, regulations and/or relevant national standards in the following situations:

(1) directly related to national security or national defense;

(2) directly related to public safety, public health and major public interests;

(3) directly related to criminal investigation, prosecution, trial, execution of judgment, etc

(4) it is difficult to obtain the consent of the principal party of personal information or other important legal rights and interests such as life and property;

(5) the personal information collected is publicly disclosed to the public by yourself;

(6) collect your personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;

Necessary for the execution and performance of the contract in accordance with your requirements;

(8) other circumstances as prescribed by laws and regulations.

Note that if the information can not be identified to your personal identity alone or in combination with other information, it is not your personal information in the legal sense; When your information can be identified as your personal identity alone or in combination with other information, or when we combine data with other personal information that we can not relate to any particular personal information, this information will be treated and protected as your personal information in accordance with this privacy policy.

2. Use of cookies and similar technologies

Cookies and similar technologies are commonly used in the internet. When you use this software and related services, we may use technology to send one or more cookies or anonymous identifiers to your device to collect and store information about your access to and use of this product. We may set cookies or anonymous identifiers for authentication and security to ensure the safe and efficient operation of our products and services, helping us to improve the efficiency of our services and the speed of login and response. Using these techniques can also help you avoid repeating the steps and processes of selecting personalization settings (for example, recording the status of the options in the settings) , helping you to have an easier access experience.

3. How We Store Personal Information

(1) location of information storage

In accordance with the provisions of laws and regulations, we will be in the domestic operation of the collection and production of your personal information stored in the legal and regulatory location.

(2) storage period

We will only keep your personal information for the period necessary for the purpose of providing this software and service. After the necessary period, we will delete or anonymize your personal information, except as otherwise provided by laws and regulations.

How We Share, transfer and publicly disclose personal information

(1) sharing

Respect for user privacy is one of our basic principles. We do not share your personal information with any company, organization or individual except:

Share with express consent: With Your Express consent, we share your personal information with others.

2. We may share your personal information with others as required by judiciary or executive branch.

3. Share with affiliates: your personal information may be shared with our affiliates. We will only share necessary personal information and are bound by the stated purposes of this privacy policy. If the associated company wants to change the purpose of personal information processing, will again seek your authorization to agree.

4. Sharing with authorized partners: For the purposes stated in this policy only, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legitimate, legitimate, necessary, specific and specific purposes, and only for the personal information necessary to provide the service, for example, you must share your information with the logistics company when you buy our products online. Our partners are not authorized to use shared personal information for any other purpose. We have strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, require them to process personal information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.

(II) transfer

We will not transfer your personal information to any company, organization or individual, except as follows:

Transfer with express consent: With Your Express consent, we transfer your personal information to other parties.

(3) public disclosure

We will only disclose your personal information publicly if:

1. Disclose the personal information you specify in a form of disclosure that you expressly agree to

In cases where your personal information is required by law, regulations, administrative enforcement or judicial requirements, we may publicly disclose your personal information depending on the type of personal information required and the manner of disclosure. Subject to the laws and regulations, when we receive such a request for disclosure, we will require the relevant legal documents, such as subpoenas or letters of inquiry.

Please understand that we do not require your authorization to share, transfer or publicly disclose your personal information in accordance with laws and regulations and/or relevant national standards

(1) directly related to national security or national defense;

(2) directly related to public safety, public health and major public interests;

(3) directly related to criminal investigation, prosecution, trial, execution of judgment, etc

(4) for the sake of protecting your or other personal life, property and other important legal rights and interests, but it is difficult to obtain your consent;

(5) personal information that you have disclosed to the public on your own;

(6) collecting personal information from lawfully disclosed information, such as lawful news reports, government information disclosure, etc. .

5. How do we protect our personal information

(1) we attach great importance to the security of your personal information and will strive to take reasonable security measures (both technical and managerial) to protect your personal information, prevent personal information provided by you from being improperly used or unauthorized access, public disclosure, use, modification, damage, loss or leakage.

(2) we will protect your personal information by using reasonable and feasible means such as encryption technology, anonymization, etc. that are no less than those of our peers in the industry. We will also use security protection mechanisms to prevent malicious attacks against your personal information.

We will establish a special security department, security management system, data security process to protect your personal information security. We have strict data usage and access policies to ensure that only authorized personnel can access your personal information and conduct security audits of data and technology in a timely manner.

(d) although the above reasonable and effective measures have been taken and the standards required by the relevant legal provisions have been complied with, please understand that due to technical constraints and the possible existence of various malicious means, in the internet industry, even if we do our best to strengthen security measures, it is not always possible to guarantee 100% security of information, we will do our best to ensure that you provide us with the security of personal information. You are aware and understand that the systems and communication networks you use to access our services may be affected by factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information.

(E) we will draw up contingency plans and activate contingency plans immediately in the event of user information security incidents, in an effort to prevent the impact and consequences of such security incidents from spreading. In the event of a user information security incident (leakage, loss, etc.) , we will, in accordance with the requirements of laws and regulations, to inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, your own prevention and risk reduction proposals, your remedial measures, etc. . We will inform you in the form of push notification, email, letter, short message and so on. When it is difficult to inform you one by one, we will take a reasonable and effective way to publish the announcement. At the same time, we will also be in accordance with the requirements of the relevant regulatory authorities to report the handling of user information security incidents.

(6) we would like to remind you that the personal information protection measures provided by this privacy policy are only applicable to this software and related services. We do not have the ability and obligation to protect any personal information submitted by you outside of this software and related services by accessing or using other websites, services and content resources, whether you log on, view, or use the above software, the site is based on this software link or boot.

6. Your Rights

We attach great importance to the management of your personal information and do our best to protect your right to access, modify (update or correct) , delete and revoke your authorized consent, to enable you to have the full ability to protect your privacy and security.

Manage and withdraw the information that authorizes you

You can revoke your consent, change the scope of your authorization to continue collecting personal information, or revoke your authorization by turning off functionality, changing application permissions in device settings, and so on. Please understand that certain business functions and services will require your information to complete, and when you withdraw your consent or authorization, we can not continue to provide you with the corresponding functions and services to withdraw your consent or authorization, no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect your previous personal information processing based on your authorization.

(2) access privacy policy

You can view the full contents of this privacy policy in the settings-privacy policy section of the client.

(3) to inform you of your right to cease operation

If we stop operation, we will promptly stop the collection of your personal information activities, will stop operation notice in the form of a one-by-one service or notice to inform you, and the possession of your personal information for removal or anonymous processing.

7. Minor clause

If you are a minor under the age of 18, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using this software and related services.

We protect the personal information of minors in accordance with relevant laws and regulations of the state, the collection, use, sharing or disclosure of the personal information of a minor shall only be permitted by law and necessary for the express consent of the parent or other guardian or for the protection of the minor; If we find that personal information about a minor has been collected without prior and verifiable parental consent, we will try to delete the information as soon as possible.

If you are the guardian of a minor, please contact us through the contact information published in this privacy policy if you have any questions about the personal information of the minor under your care.

Revision and notification of privacy policy

(a) in order to provide you with better services, this software and related services will be updated and changed from time to time. We will revise this privacy policy in a timely manner, the amendment forms part of this privacy policy and has the same effect as this privacy policy. However, without your express consent, we will not reduce your rights under this privacy policy currently in force.

(b) after the update of this privacy policy, we will remind you of the updated content in an appropriate manner in the application client and before the updated terms take effect, so that you can keep abreast of the latest version of this privacy policy. If you continue to use our services, you agree to accept the content of the revised policy, but if the updated content requires the collection of sensitive personal information such as audio and video, contact information, geographical location, etc. , your consent will again be sought in a significant way.

(3) for major changes, we will also provide more prominent notifications (including but not limited to emails, text messages, private messages, or special reminders on the browsing page to indicate changes in privacy policy, so please read them carefully again) .

Significant changes to this privacy policy include but are not limited to:

1. There’s been a major change in our service model. Such as the purpose of personal information processing, the type of personal information processing, the use of personal information, etc.

2. We have had major changes in ownership structure, organizational structure, etc. . Such as Business Adjustment, bankruptcy merger and acquisition caused by changes in ownership, etc.

3. The main object of personal information sharing, transfer or public disclosure has changed;

4. Your right to participate in the processing of personal information and how it is exercised has changed significantly;

5. We are responsible for handling changes in the department responsible for personal information security, contact information and channels of complaint.

Scope of application

This privacy policy applies to all services provided by Wuhan Wangmi Technology Co. , Ltd. and its associated parties, including this client, website, etc. , does not apply to third party products or services that have a separate privacy policy and are not covered by this privacy policy.

This privacy policy does not apply to:

1. Other third-party products or services, which may include products or websites and advertising content shown to you in personalized recommendations or other products or websites linked to in this software service;

2. Other third parties advertising the software service.

Your use of these third-party services (including any personal information you provide to these third parties) will be governed by these third-party terms of service and privacy policies (not this privacy policy) , please read the terms of the third party carefully. Please protect your personal information and provide it only to third parties if necessary.

The software and related services described in this privacy policy may vary depending on the phone model, system version, software application version, and so on. The final products and services are based on the software and related services you use.

How to contact us

1. If you have any questions, comments or suggestions regarding the content of this privacy policy, you may send an email to moreapps. . Service@gmail.com. Com contact us.

2. You can also contact us by e-mail (moreapps.service@gmail. Com) if you believe that we have violated any laws or regulations or agreed with you to collect and use your personal information, and ask for your personal information to be deleted. We will confirm the issue as soon as possible, and by a person to verify your user identity in a timely manner to reply and deal with.

Xi. Others

(a) the headings in this “Privacy policy” are for convenience and readability only and shall not affect the meaning or interpretation of any provision of this privacy policy.

(2) definitions of terms related to this “Privacy policy” :

1. “Associated Party” means any company, institution or legal representative of such company or institution that is or will be controlled, controlled or under joint control of such company or institution. “Control” means the ability, directly or indirectly, to influence the management of the company in question, whether through ownership, voting shares, contracts or other legally recognized means.

2. De-labeling is the process by which the subject of personal information can not be identified without the help of additional information.

3. Anonymization is a process in which the subject of personal information can not be identified and the processed information can not be recovered through the technical processing of personal information.

(3) the copyright of this “Privacy Policy” is owned by Wuhan Wangmi Technology Co. , Ltd. . We have the right to interpret and modify it to the extent permitted by law.