Yunshu is a product of Hangzhou EagleCloud Security Technology Inc. (registered in Room 301, Building 7, Xixitang Business Center, Cangqian Street, Yuhang District, Hangzhou City, Zhejiang Province. Hereinafter referred to as "we" or "Eaglecloud") network access tools to provide services. In order to explain how eaglecloud collects, uses and stores your personal information and what your rights are, this policy will help you to understand the following, the main points of which are as follows.
I. How we collect and use your user information
II. How we protect and store your user information
III.How we keep your information secure
IV. How we share or publicly disclose your information
V. Your rights
VI. How we handle information about individuals who are minors
VII. How this policy is updated
VIII. Other considerations
IX.Contact Us
Yunshu respects and protects the privacy of all users of the service. In order to provide you with a more accurate and personalised service, Yunshu will use and disclose your personal information as set out in this Privacy Policy. Yunshu will not disclose this information to the public or provide it to third parties. This privacy policy is an integral part of the agreement for the use of Yunshu services. Please read and understand this Privacy Policy carefully before using our products (or services). You are not authorized to use the eaglecloud service unless you have fully read, fully understood and accepted all of the terms of this agreement.
I. How we collect and use your user information
In the course of your use of the Yunshu services, the Yunshu will collect information that you provide on your own initiative or as a result of your use of the services in the following manner, in order to provide you with the services, to optimise our services and to safeguard your account security.
Collected Information | Purpose |
---|---|
Mobile application list | Check whether the VPN process is functioning normally. |
Photos | Submit feedback. |
Files | Submit feedback. |
IP address | Used to determine intranet access policies. |
Device GPS | Used to determine intranet access policies. |
Device model | Used to determine intranet access policies. |
Operating system | Collect device information for intranet access. |
Login IP address | Used to determine intranet access policies. |
Connection type | Check network status (Wi-Fi/5G). |
Network quality data | Used to determine intranet access policies. |
(b) You may choose to provide us with your fingerprint feature value information, this information is sensitive information, fingerprints are collected to help you use the fingerprint function more easily and quickly, if you refuse to provide this information will only make you unable to use the fingerprint function, but does not affect your normal use of other functions of Yunshu.
(c) We will collect the list of mobile applications, clipboard, photos or files stored in the phone for help and feedback in order to provide you with a better service.
(d) We collect location information from you and we may collect location information based on your IP address, your device's GPS or other device sensor data in order to provide you with better service (for example, to connect you to the nearest and fastest server). You can stop the collection of your geolocation information by turning off the location feature, which will not affect your normal use of other features of the Yunshu.
(e) When you register for the Yunshu service, we will collect information about your software, disk file information, running process information, to collect this information in order to better operate and improve our technology and services, or for business strategy changes to help you better use the Yunshu, but also to better protect the security of the Yunshu account you use.
(f) We will collect your device model, operating system, unique device identifier (means a string of characters programmed into the device by the device manufacturer which can be used to identify the corresponding device in a unique way), login IP address, Yunshu version number, mode, type and status of access to the network, network quality data, device accelerator (e.g. gravity sensing device), operation log, service log information (e.g. information about your search and viewing operation in Such information is the basic information that must be collected for the provision of services, and is collected to protect your normal use of our services, to maintain the normal operation of our services, to improve and optimise our service experience and to protect the safety of your account.
(g) When you use the Yunshu internet connection feature, the operation will be recorded and the records will be stored on our servers as storage is necessary to enable this functionality. We will store this information in an encrypted form and you may delete it at any time. Unless you choose to do so or comply with relevant laws and regulations. We do not provide the above information externally or use it for other purposes than this function.
(h) In accordance with relevant laws and regulations and national standards, we may collect and use your relevant personal information without seeking your authorized consent in the following cases: 1) in connection with the personal information controller's fulfillment of obligations under laws and regulations
2) directly related to national security or national defense; 3) directly related to public safety, public health, or significant public interests; 4) directly related to criminal investigations, prosecutions, trials, and execution of judgments; 5) for the purpose of protecting the life, property, and other significant legitimate rights and interests of the subject of personal information or other individuals, but it is difficult to obtain your authorized consent; 6) where the personal information involved personal information is disclosed to the public by the subject of personal information himself/herself; 7) necessary for the conclusion and performance of a contract at the request of the subject of personal information; 8) necessary for the collection of personal information from lawfully publicly disclosed information, such as lawful news reports, government information disclosure and other channels; 9) necessary for the maintenance of the safe and stable operation of the products or services provided, such as the detection and disposal of malfunctions of products or services; 10) where the controller of personal information is a news organization and it is necessary for legitimate news reporting; 11) where the controller of personal information is an academic research organization and it is necessary for statistical or academic research in the public interest, and it de-identifies the personal information contained in the results of the academic research or description when providing the results to the public.
Please understand that the features and services we provide to you are constantly being updated and developed, and if a feature or service is not described above and collects information from you, we will seek your consent by separately explaining the content, scope and purpose of the information collection through page prompts, interactive processes, website announcements, etc. Please note that at present, Yunshu will not actively obtain your personal information from third parties outside of Hangzhou EagleCloud Security Technology Inc. If we need to obtain your personal information indirectly from a third party for business development in the future, we will make clear to you the source, type and scope of use of your personal information before we obtain it, and if the personal information processing activities required by Yunshu to carry out business exceed the scope of your authorized consent when you originally provided personal information to the third party, we will obtain your express consent before processing such personal information; in addition, we will also Strictly comply with relevant laws and regulations and require third parties to safeguard the legality of the information they provide.
II. How we protect and store your user information
(a) Eaglecloud will not transfer or disclose your personal information to any third party unless: a) Required by relevant laws and regulations or judicial or administrative authorities. b) Transferred to complete a merger, demerger, acquisition or asset transfer. c) Necessary to provide the services you request. d) Transferred or disclosed to any third party in accordance with the eaglecloud Privacy Policy or other relevant agreement rules. e) eaglecloud takes the protection of personal information of minors very seriously. If you do not have full civil capacity, you should obtain prior consent from your guardian before using eaglecloud's services.
(b) If in the future we need to obtain your personal information indirectly from a third party for business development, we will make clear to you the source, type and scope of use of your personal information before obtaining it. If Yunshu needs to carry out personal information processing activities for its business beyond the scope of your authorized consent when you originally provided your personal information to the third party, we will obtain your express consent before processing such personal information.
(c) We will store user personal information collected within the territory in accordance with laws and regulations within China. If the storage location of your personal information is transferred from within China to outside China, we will also strictly comply with the law.
(d) Duration of information storage We will only retain your personal information for as long as is necessary to achieve the purpose, for example: mobile phone number: whether you are logged in via your mobile phone number or already have a Yunshu account, if you need to use the Yunshu service, we need to always verify your mobile phone number (including the initial registered mobile phone number, bound mobile phone number, etc.) to ensure your normal use of the service. When you log out of your Yunshu account, we will delete the corresponding information.
In addition, we will also strictly comply with relevant laws and regulations and require third parties to safeguard the legality of the information they provide.
III. How to safeguard information security
(a) We endeavour to safeguard the security of users' information against loss, misuse, unauthorised access or disclosure. We will use various security protection measures within a reasonable level of security to safeguard information. For example, we will use encryption technology (e.g. SSL), anonymisation processes and other means to protect your personal information. (ii) We enhance the security of the software installed on your end of the device by means of constantly improving technology to prevent the disclosure of your personal information. For example, we complete partial encryption of information locally on your device for secure transmission.
(iii) In order to prevent viruses, Trojan horses or other malicious programs or websites, we may be aware of information about applications installed on your device, information about running processes or data hosted in the device's memory.
(d) To prevent fraud, number theft, impersonation of others and other unlawful acts and to conduct security checks may analyse data such as the use of unique device identifiers, login IP addresses, operation logs, geolocation information, etc. for security measures or security alerts, etc. We have established special management systems, processes and organisations to safeguard information. For example, we strictly limit the scope of persons accessing information, require them to comply with confidentiality obligations, and conduct audits. (v) In the event of a security incident such as leakage of personal information, we will initiate contingency plans to stop the security incident from expanding and inform you in the form of push notifications and announcements. At present, Yunshu has passed the national network security level protection (Level 3) assessment and record, and has met the requirements of international authoritative certification standards such as ISO27001, International Information Security Management System and TRUSTArc in terms of information security. We will do our best to protect your personal information. We also ask you to understand that no security measure can be infallible.
IV. How we share or publicly disclose your information
(i) We will not share information that can be used to personally identify you (such as your name or email address) with our partners unless you expressly authorise it. (ii) We will not provide your personal information to such third party subjects without your express consent. (c) As our business continues to develop, we may enter into transactions such as mergers, acquisitions, asset transfers, etc. We will inform you of the circumstances and continue to protect or require the new controller to continue to protect your personal information in accordance with the laws, regulations and standards no less stringent than those required by these guidelines. In addition, in accordance with relevant laws and regulations and national standards, we may share, transfer, or publicly disclose personal information without prior authorized consent from the subject of the personal information in the following cases: a) in connection with the performance of our obligations under laws and regulations; b) directly related to national security or national defense security; c) directly related to public safety, public health, or significant public interest; d) in connection with criminal investigations , prosecution, trial and execution of judgments, etc.; e) directly related to the protection of the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals but for which it is difficult to obtain the authorized consent of the individual; f) personal information that the subject of personal information discloses to the public on his or her own; g) personal information collected from information that is lawfully and publicly disclosed, such as lawful news reports, government information disclosure and other channels.
V. Your rights
(a) During your use of the Yunshu, in order that you can more easily access, correct and delete your personal information, while protecting your right to withdraw your consent to the use of personal information and to cancel your account.
(b) In addition, we have set up a complaint reporting channel, and your comments will be dealt with promptly. Please note that the operating settings may differ between different operating systems and different versions of the Yunshu software; in addition, we may also make adjustments to the operating settings in order to optimise your experience.
VI. How we handle information about underage individuals
We take the protection of personal information of minors very seriously.
In accordance with relevant laws and regulations, if you are a minor under the age of 18, you should obtain the prior written consent of your parent or legal guardian before using the Yunshu service. If you are the guardian of a minor, please contact us via the contact details in section IX if you have any queries relating to the personal information of a minor in your care.
VII. How this policy is updated
We may revise these guidelines from time to time. When the terms of the guidelines change, we will show you the changed guidelines in a push notification, pop-up window or other appropriate form when you log in and when the version is updated.
VIII. Other Notes
Eaglecloud's Privacy Policy is a general privacy policy that applies uniformly to eaglecloud, and the user rights and information security measures set forth in it apply to Yunshu users. If there is any inconsistency or contradiction between eaglecloud's Privacy Policy and these guidelines, please refer to these guidelines.
IX. Contact us
When you have other complaints, suggestions, issues related to personal information of minors, please contact us at https://www.eaglecloud.com/. You also can send your questions to mailto: Dataprivacy@eaglecloud.com or send this address: Room 301-1, Building 7, Xixitang Business Centre, Yuhang District, Hangzhou, Zhejiang Province, China Legal Department Data and Privacy Protection Centre (Attention).
Postcode:311121
We will review the issue as soon as possible and respond within fifteen days of verifying your user identity. Hangzhou EagleCloud Security Technology Inc.