Multilingual foreign trade system version
Enhanced Function Matrix
Welcome to SilkRoad GMS service!
Wuhan Chuangzhi Yicheng Technology Co., Ltd. (hereinafter referred to as Chuangzhi Yicheng Company) is well aware of the importance of personal information to you and will do its best to protect your personal information from security and reliability. We are committed to maintaining your trust in us, abide by the following principles, and protecting your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum necessity, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc.
To protect your relevant rights, the "Chuangzhi Yicheng Personal Information Protection Policy" (hereinafter referred to as "this policy") will explain to you how Chuangzhi Yicheng will collect, use and store your personal information and what rights you have. Please use it.SilkRoad GMSRead and understand this policy carefully before serving.
This policy applies to the functions and services of Chuangzhi Yicheng products themselves, and does not apply to any products or services provided by other third parties (hereinafter referred to as "third-party services"). Before choosing to use third-party services, you should fully understand the product functions and privacy protection policies of third-party services.
This policy will help you understand the following content:
1. What types of information do we collect
2. How do we store this information
3. How do we protect this information
4. How we use this information
5. Information sharing and external provision
6. How do you access and manage personal information
7. Protection of minors
8. Changes to this policy
9. Contact Us
Enterprise users: refers to an individual or organization that registers, logs in, uses Chuangzhi Yicheng products and services and obtains management authority, including but not limited to legal persons, government agencies, other organizations, partnerships or individual business owners (hereinafter referred to as "enterprise users"); corporate users can create their work platform through Chuangzhi Yicheng products (referring to a virtual workspace created and managed by corporate users, and multiple people can join the virtual workspace that jointly uses Chuangzhi Yicheng products), and invite and authorize individuals or corporate or employee users to join their work platform to become their end users.
Enterprise User Administrator: refers to an individual who has the operation permissions of the enterprise user management backend system designated by the enterprise user; the enterprise user administrator can be one or more people.
End User: refers to registered users invited by corporate users who use Chuangzhi Yicheng products to join the corporate work platform, including employees, individual users, corporate users and their employees. Hereinafter, it is called "you" or "end user". When an enterprise user invites you to access their work platform as an end user, you will receive an invitation and have the option to join the enterprise user.
personal information: refers to various information related to an identified or identifiable natural person recorded electronically or otherwise, and does not include anonymous information.
Sensitive personal information: It is personal information that is leaked or illegally used, which can easily lead to the infringement of the personal dignity of a natural person or the personal and property safety of his/her personal information, including biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts, etc., as well as personal information of minors under the age of fourteen.
Enterprise controlled data: refers to the information and data submitted or generated by the enterprise user and the end user of the enterprise user during the use of our products, including information submitted or required by the enterprise user to provide, information assigned to the end user by the enterprise user, and information submitted to the enterprise user by the end user to complete the work needs and meet the daily management needs of the enterprise.
Anonymous processing: refers to the process in which the subject of personal information cannot be identified or associated through technical processing of personal information, and the processed information cannot be restored. The information obtained after personal information is anonymously processed does not belong to personal information.
1.1 In order to provide services to enterprise users and end users, ensure the normal operation of services, and ensure the security of your account, we will need to ask you for relevant permissions; sensitive permissions such as cameras, microphones, etc. will not be turned on by default, and will only be authorized to us after you expressly agree. The specific description is as follows:
1.1.1 When you use the voice call or video call function, we will provide you with voice call or video call services after you agree to grant system permissions to the microphone or/and camera. The above permissions are necessary permissions to use related functions. Refusing to grant permissions will only prevent you from using voice or video calling functions, but will not affect your normal use of other functions.
It should be noted that obtaining sensitive permissions is a necessary but not a sufficient condition for us to collect specific information. Our specific sensitive permission does not mean that we will inevitably collect relevant information about you; even if we have obtained sensitive permissions, we will only collect relevant information about you in accordance with this policy if necessary.
1.2 In order to provide services to you and corporate users, ensure the normal operation of services, improve and optimize our services, and ensure account security, we will collect information generated by you actively providing, authorized provision or use of services when registering and using services in the following ways:
1.2.1 Account registration information: When you register and log in to our products for the first time, you need to provide your mobile phone number and company name or provide your corporate WeChat account (you will collect your WeChat account nickname and avatar). The above information is necessary for you to use our services. If you do not provide such information, you will not be able to use our services normally.
1.2.2 When you use our services, we will collect the following information for you and corporate users to provide our products and services, maintain the normal operation of our services, improve and optimize our service experience, and ensure the security of your account:
1.2.2.1 Log information: When you use our services, we will collect log information you use of the service, including the method, type and status of access to the network, network quality data, operation logs (such as the operation logs of access microphone and camera system permissions granted to our products when using voice or video call functions; the operation logs of access system permissions granted to our products when using the schedule function), service log information (such as the URL information, service failure information, etc. you viewed on our products on our products).
1.2.2.2 The information you submit through our customer service or when participating in activities held by us. For example, the questionnaire you fill out when you participate in our online activities may contain your name, phone number and other information.
1.3 In order to provide customer management and communication services, we will collect information and data submitted or generated by enterprise users and end users of the enterprise users during the use of our products (hereinafter referred to as "enterprise controlled data"). Enterprise controlled data may include:
1.3.1 Your name, gender, mobile phone number, ID card and other personal information submitted or requested by corporate users;
1.3.2 Information assigned to the enterprise, invoice header, work signature, landline number, email address, position, rank, position, affiliated department, fax number, office seat, etc. related to enterprise users or assigned to you by enterprise users;
1.3.3 Records generated during the use of voice calls and video calls, such as operation logs, call records and recordings;
1.3.4 Other data submitted by corporate users, such as approval process.
You understand that the personal information in the data controlled by the enterprise is the controller of the personal information. We only handle the corresponding processing based on the instructions of the enterprise users (including the operations performed by the enterprise users and the enterprise user administrator through the management background, etc.) and the agreement between us and the enterprise users. If you have any questions or comments on the purpose, scope and usage of the data controlled by the above enterprise, you understand and agree to contact your enterprise user or enterprise user administrator for processing.
1.5 When you use the real-name authentication function, we will collect real-name information and identity proof photos you actively provide. The above information is sensitive information. Refusing to provide this information will only prevent you from obtaining real-name authentication and associated functions, but will not affect your normal use of other functions.
1.6 When you need to register as a corporate user, you need to provide the creator information. If you do not provide such information, you will not be able to register as a corporate user and use related services.
Before uploading and managing personal information such as their end user's name, photos, mobile phone numbers, etc., enterprise users must ensure that they have obtained the end user's clear consent in advance, collect only the end user information necessary for the purpose of operation and functional purposes, and have fully informed the end user of the purpose, scope and usage methods of relevant data collection.
1.7 In order to ensure that this application is closed or can normally receive broadcast messages pushed by the client when the background is running, this application must use the self-start and associated self-start capabilities, and will send a certain frequency of broadcasts through the system to wake up the self-start behavior of this application, which is necessary to realize functions and services.
1.8 Information provided by third parties
We will collect relevant data that you agree or authorize third parties to share or provide to our products. If you or your business users use third-party products or services through our web pages or terminals, the third-party service provider may inform us of which third-party products or services you have used.
It should be noted that third-party service providers can provide products or services to you or corporate users through our pages or terminals. The corporate users you join can choose whether to develop or use third-party services, which third-party services can be used, and when to terminate or cancel the use of third-party services. During use, third-party service providers may collect, use and store your relevant data or information. Before you decide whether to use these services, please contact third-party service providers with their personal information and privacy protection policies, or contact your business users for more information.
Please understand that the functions and services we provide to you are constantly updated and developed. If a certain function or service is not included in the aforementioned description and you need to collect your information, we will explain to you separately the content, scope and purpose of the information collection through page prompts, interaction processes, website announcements, notifications, etc. to obtain your consent.
2.0 The situation of smart cloud customer service connecting to third-party SDK is as follows:
Product/Type: Xiaomi Push
- Purpose of use: for message push
- Usage scenario: Online chat offline message push
- Personal information collection type: device unique identification code, network status, network standard, device serial number
- Collection method: SDK natively collects, does not involve data sharing
- Third-party company name: Xiaomi Technology Co., Ltd.
- Privacy protection instructions:https://dev.mi.com/console/doc/detail?pId=1822
Product/Type: Huawei Push
- Purpose of use: for message push
- Usage scenario: Online chat offline message push
- Personal information collection type: device unique identification code, device serial number
- Collection method: SDK natively collects, does not involve data sharing
- Third-party company name: Huawei Technology Co., Ltd.
- Privacy protection instructions:https://developer.huawei.com/consumer/cn/devservice/term/
Product/Type: Vivo
- Purpose of use: for message push
- Usage scenario: Online chat offline message push
- Personal information collection type: Anonymous user ID (OAID)
- Collection method: SDK natively collects, does not involve data sharing
- Third-party company name: Weiwo Mobile Communications Co., Ltd.
- Privacy protection instructions:https://dev.vivo.com.cn/documentCenter/doc/366
Product/Type: ColorOS
- Purpose of use: for message push
- Usage scenario: Online chat offline message push
- Personal information collection type: Anonymous user ID (OAID)
- Collection method: SDK natively collects, does not involve data sharing
- Third-party company name: OPPO Guangdong Mobile Communications Co., Ltd.
- Privacy protection instructions:https://security.oppo.com/cn/privacy.html
Product/Type: Rongyun
- Purpose of use: for real-time message push
- Usage scenario: Online chat offline message push
- Personal information collection type: device unique identification code, network status, network standard, device serial number
- Collection method: SDK natively collects, does not involve data sharing
- Third-party company name: Beijing Yunzhong Rongxin Network Technology Co., Ltd.
- Privacy protection instructions:https://www.rongcloud.cn/protocol?_sasdk=fMTQ1NzIx
Product/Type: Bugly
- Purpose of use: fix application crashes and other problems and improve user experience
- Usage scenario: Collect application error information
- Personal information collection type: device unique identification code, network status, network standard, device serial number
- Collection method: SDK native collection
- Third-party company name: Shenzhen Tencent Computer Systems Co., Ltd.
- Privacy protection instructions:https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56
Please understand that the functions and services we provide to you are constantly updated and developed. If a certain function or service is not included in the aforementioned description and you need to collect your information, we will explain to you separately the content, scope and purpose of the information collection through page prompts, interaction processes, website announcements, notifications, etc. to obtain your consent.
2.1 Location of information storage
In accordance with laws and regulations, we will store the personal information collected and generated in China in China.
2.2 The deadline for information storage
Generally speaking, we only retain your personal information for the time and agreement necessary to achieve the purpose. For some enterprise-controlled data (such as chat records, file pictures, etc.) that can set the retention period independently, we will retain relevant information according to the settings of the enterprise users. We will not view or use chat records and file pictures retained by the enterprise users.
When our products or services cease operations, we will notify you in the form of push notifications, announcements, etc., delete your personal information or anonymize it within a reasonable period, and immediately stop collecting personal information, and close the third-party application service interface to avoid third-party services collecting and continuing to use personal information.
3.1 We strive to provide guarantees for the security of users’ information to prevent the loss, improper use, unauthorized access or disclosure of information.
3.2 We will use various security protection measures within a reasonable level of security to ensure the security of information. For example, we will use encryption technology and other means to protect your personal information.
3.3 We establish special management systems, processes and organizations to ensure the security of information. For example, we strictly limit the scope of people accessing information, require them to comply with their confidentiality obligations, and conduct audits.
3.4 We have continuously improved technical means to strengthen the security capabilities of the software installed on your device to prevent your personal information from being leaked. If there is a security incident such as personal information leakage, we will activate emergency plans in accordance with the law to prevent the expansion of security incidents, and inform you of the situation of the security incident, the impact of the incident on you and the remedial measures we will take in the form of push notifications and announcements. We will also report the handling of personal information security incidents in accordance with laws, regulations and regulatory authorities.
3.5 At present, Chuangzhi Yicheng has met the requirements of domestic authoritative certification standards such as ISO/IEC 20000, ISO/IEC 27001, and network security level protection (level 3) in terms of information security and network security, and has obtained corresponding certifications, such as trusted cloud certification.
We will try our best to protect your personal information. We also ask you to understand that no security measures can be impeccable.
We strictly abide by the provisions of laws and regulations and agreements with users, and use the collected information for the following purposes in accordance with the provisions of this Privacy Protection Policy.
4.1 We collect relevant information during your use of our services to create and provide better services to users (including corporate users and end users). We use the information we collect for the following purposes:
4.1.1 Providing, maintaining and developing our services: We will use the collected information to provide and optimize and improve our services, such as tracking service interruptions or troubleshooting problems reported to us by users; after obtaining your authorization and consent, we provide you or your enterprise users with various data statistical analysis functions and services, such as customer service data statistics, based on logs, service usage information, etc.
4.1.2 Security Assurance: In order to ensure the safety of you and all users, we will use relevant information to help improve the security and reliability of the services, including detecting, preventing and responding to fraud, abuse, illegal behavior, security risks and technical issues that may endanger our services, our users or the public;
4.1.3 Communication with you: We will use the collected information (such as the email address you provide, the email address of the enterprise user’s administrator contact email, phone number, etc.) to communicate directly with you. For example, we provide you with service visits;
4.1.4 In order to comply with relevant laws and regulations, departmental regulations, and government directives.
At present, we will not use your personal information for personalized recommendations or advertising purposes. If our use of your personal information exceeds the scope claimed to be in the collection and has a direct or reasonable relationship, we will inform you separately through page prompts, interaction processes, website announcements, etc. before using your personal information.
4.2 For the use of data controlled by the enterprise, we will handle it in accordance with the law based on the decisions of the enterprise users and our relevant agreements with the enterprise users. For example, enterprise users have the right to decide which information to display within our products and how to display the end user.
4.3 According to relevant laws, regulations and national standards, we may collect and use your personal information without asking for your authorization and consent in the following circumstances:
1) Related to the performance of the obligations stipulated by laws and regulations by the personal information controller;
2) Directly related to national security and national defense security;
3) Directly related to public safety, public health, and major public interests;
4) Directly related to criminal investigation, prosecution, trial and judgment execution;
5) It is difficult to obtain authorization and consent from the person who is responsible for protecting the lives, property and other major legitimate rights and interests of the subject of personal information or other individuals;
6) The personal information involved is disclosed to the public by the subject of the personal information on its own;
7) It is necessary to sign and perform contracts according to the requirements of the personal information subject;
8) Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;
9) What is necessary to maintain the safe and stable operation of the provided products or services, such as discovering or disposing of failures in products or services;
10) The personal information controller is a news unit and is necessary for him to conduct legal news reporting;
11) When the personal information controller is an academic research institution, it is necessary to conduct statistics or academic research in public interest, and when it provides the results of academic research or description, it de-identifies the personal information contained in the results.
We will not share or transfer your personal information to third parties, except for the following situations:
5.1 Obtain your express consent: With your prior consent, we may share your personal information with third parties;
5.2 For the purpose of external processing, we may share your personal information with affiliates or other third-party partners (third-party service providers, contractors, agents, application developers, etc.) to allow them to process the above information for us in accordance with our instructions, privacy policies and other relevant confidentiality and security measures, and use it to provide you with our services to achieve the purposes described in the "How We Use Information" section. If we share your information with the above-mentioned affiliated companies or third parties, we will use encryption, anonymization and other means to ensure the security of your information.
5.3 We will not disclose the personal information collected to the public. If disclosure is necessary, we will inform you of the purpose of this disclosure, the type of information disclosed and the sensitive information that may be involved, and the disclosure will be carried out in accordance with the requirements of relevant laws and regulations. It should be noted that the information related to the end user is disclosed or shared in the enterprise user work platform where they join will be decided and managed by the enterprise users. If you have any questions or comments on this, you understand and agree to contact your enterprise user or enterprise user administrator to handle it.
5.4 As our business continues to develop, we may engage in mergers, acquisitions, asset transfers and other transactions. We will inform you of the relevant circumstances and continue to protect or require new controllers to continue to protect your personal information in accordance with laws and regulations and standards not less than required by this Privacy Policy.
5.5 We may disclose your personal information based on legal requirements or law enforcement requirements of relevant departments.
During your use of our services, in order to enable you to access, correct and delete your personal information more conveniently, and at the same time, you are guaranteed your right to withdraw your consent and exit your company (revoked your account).
6.1 Access, correction, modification
We encourage you to update and modify your personal information to make it more accurate and effective. We will take appropriate technical means or provide contact channels for submitting an application to ensure that you can access, update and correct your personal information or other information provided when using our Services.
If you want to query, modify or delete part of your information, please log in to our products and relevant function pages of each individual service. We have provided you with relevant operation settings, and you can operate it yourself. If you have any questions or difficulties during the operation, you can choose to contact us through the feedback channel listed in the "How to Contact Us" section of this policy, and we will give you an answer as soon as possible.
Unless otherwise provided by laws and regulations, when you correct, delete your personal information or apply for cancellation of your account, we may not immediately correct or delete the corresponding information from the backup system, but will correct or delete this information when the backup is updated.
6.2 Account cancellation
We provide you with a way to cancel your account. If you comply with the conditions stipulated in our terms of service and relevant national laws and regulations, you can choose to contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will give you an answer as soon as possible.
After your account is cancelled, we will stop providing you with all or part of the services, and delete your personal information or anonymize it according to your request, unless otherwise provided by laws and regulations.
6.3 Change the scope of your authorization and consent
You can always choose whether to disclose personal information to us. Some personal information is necessary for the use of the Services, but most other information is provided by you. You can change the scope of your authorization to continue collecting information or withdraw your authorization by deleting information, closing the device function, canceling your account, etc.
After withdrawing the authorization, we cannot continue to provide you with the services corresponding to the authorization with withdrawal, and we will no longer process your corresponding information. However, your decision to withdraw your authorization will not affect the information processing carried out previously based on your authorization.
We attach great importance to the protection of the personal information of minors. According to relevant laws and regulations, if you are a minor under the age of 14, before you use our products/services, in addition to carefully reading and understanding this privacy protection policy, you should also obtain written consent from your parents or legal guardian for this privacy protection policy. If you are the guardian of a minor, if you have questions about the personal information of the minor you are guarding, please contact us through the contact information in Section 10.
We may revise this policy in a timely manner. When the terms of the policy change, we will show you the changed policy through official website announcements (https://www.31ku.com), push notifications, etc.
When there is a significant change in the terms of this policy, we will inform you through official website announcements (https://www.31ku.com), push notifications or more prominent pop-ups.
Major changes referred to in this article include but are not limited to:
1) Our service model has undergone major changes, such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
2) We have undergone major changes in ownership structure, organizational structure, etc., such as changes in owners caused by business adjustments, bankruptcy and mergers and acquisitions;
3) The main objects of personal information sharing, transfer or public disclosure have changed;
4) Your rights in participating in the processing of personal information and their exercises have undergone significant changes;
5) When the responsible departments, contact information and complaint channels for handling personal information security change;
6) When the personal information security impact assessment report shows that there is a high risk.
When you have other complaints, suggestions, or issues related to minors’ personal information, please contact us at https://www.31ku.com/.
We will review the issues involved as soon as possible and reply after verifying your user identity.
Exclusive 1v1 customer service
Provide you with the most comprehensive consulting services
Scan the QR code to consult now