“Hitrolink Cloud Meeting” Privacy Policy

Last Update Date: 2022-04-20

Effective Date: 2022-04-20

 

Terms of the Policy

        Thank you for trusting and using the "Hitrolink Cloud Meeting" service (hereinafter referred to as "this service")! Protecting users' personal information and privacy is a basic principle of the service provider (hereinafter referred to as "we"). Through this Privacy Policy (hereinafter referred to as "this policy"), we hope to explain to you how we collect, use, store, disclose and process this information, as well as the methods we provide for you to access, correct and delete your personal information in order to protect your relevant rights.

        This policy is only applicable to this service, that is, the products and/or services we provide to you through "Hitrolink Cloud Meeting" PC client, " Hitrolink Cloud Meeting " mobile client and Hitrolink official website (website: www.hitry.com, hereinafter also referred to as "management platform"). The service provider is ZHEJIANG HUACHUANG VISION TECHNOLOGY CO., LTD., which is located on the 16th floor of Building 1, No. 1168 Bin'an Road, Binjiang District, Hangzhou, Zhejiang Province.

        It should be noted that this policy does not apply to services provided by third-party companies or individuals (hereinafter referred to as "third-party services"). To facilitate your use of this service, our products and/or services may contain third-party services or their links; Since the third party will independently collect and process your personal information, which is beyond our control. Unless otherwise stipulated by law, we are not responsible for the third-party services. You need to read and understand the privacy policy of the third-party services and judge whether to use their services independently.

        Since this policy is closely related to the products and/or services you use, before you use our products and/or services, we hope you will carefully read and understand this policy, especially the terms marked in bold / underlined / italics, and make the appropriate choices according to the guidelines of this policy when necessary. By clicking the consent option or using this service, you agree that we collect, use, store, disclose and process your relevant information in accordance with this policy.

        If you have any questions, comments or suggestions, you can contact us in the way agreed in section six of the policy.

 

Part One: Definition

1.    Organization Users: refers to the enterprise legal persons, government agencies and other organizations that open, manage and use the service.

2.    Organization Administrator: refers to the individual user authorized or designated by the organization users, who has the operation authority of the service management platform and opens, manages and uses the service on behalf of the organization user.

3.    Individual User: refers to the person who uses the service through the service account created/assigned by the organization user, including the individual user with the administrator authority of the organization user and the individual user who is a member in the address book of the organization user but does not have the administrator authority, hereinafter referred to as "you".

4.    Personal Information: refers to all kinds of information recorded electronically or in other ways that can identify the identity of a specific person or reflect the activities of a specific person alone or in combination with other information.

5.    Personal Sensitive Information: once leaked, illegally provided or abused, personal information that may endanger personal and property safety and easily lead to personal reputation, physical and mental health damage or discriminatory treatment, including ID card number, personal biometric information, bank account, property information, whereabouts, transaction information and personal information of minors under the age of 14 (including) (we will mark specific personal sensitive information in bold in this policy).

6.    Anonymization: through the technical processing of personal information, the subject of personal information cannot be identified, and the processed information cannot be restored. The information obtained after the anonymization of personal information does not belong to personal information.

7.    De-identification: through the technical processing of personal information, it cannot identify or associate the subject of personal information without the help of additional information.

8.    SDK: Software Development Kit, which is a collection of development tools for establishing application software, such as specific software package, software framework, hardware platform, operating system, etc.

 

Part Two: Privacy Policy

This policy will help you understand the following:

1. How do we collect and use your personal information

2. How do we share, transfer and publicly disclose your personal information

3. How do we protect and store your personal information

4. Your rights

5. How do we handle the personal information of minors

6. Contact us

7. How to update this policy

 

1. How do we collect and use your personal information

        We will collect the information you provide or generated due to the use of the service in the following ways to provide you with services and ensure the security of your account and communication.

        1. Register the user account of this service

        Through the "Contact List" function of the management platform, the organization administrator creates/assigns an account and password for individual users in the organization to use the service. Individual users can use the service only if they have an account and password. In order to create/assign an account, the organization administrator needs to provide the username, mobile phone number, e-mail address and password of individual users in the organization. The mobile phone number or email address and the corresponding password are the account and password of a specific individual user in the organization to log in and use the service. The organization administrator can modify the username, mobile phone number or email address (providing only one of the phone number or email is acceptable) and password of individual users in the organization at any time.

        You understand and agree that the organization user is the controller of your personal information above, and we only open, manage and use your personal information according to the instructions of the organization administrator.

        If you are an organization administrator, you understand and agree that before you provide the personal information of individual users in the organization, you should ensure that the organization users have fully informed the individual users of the purpose, scope and use mode of relevant personal information collection and provision and have obtained the explicit consent of the individual users in advance.

        If you only need to use browsing and search services, you do not need to register this service account and provide the above information.

        2. When you use our service, in order to ensure your use of our service smoothly, maintain the operation of our service, improve and optimize our service experience and ensure the security of your account, we will collect your network quality data and operation logs such as your registration date, registration records, meeting time, meeting duration, meeting name and other meeting records and service log information such as service failure information, your consulting work order, etc., and other log information. This kind of information is the basic information that must be collected to provide services.

        3. When you use the "Meeting Recording" function, we only store the audio and video information of the recorded meeting in our cloud servers since storage is necessary to realize this function. We will store it in an encrypted way, and you can delete the above information at any time. Unless you choose or comply with relevant laws and regulations, we will not provide the above information or use it for other purposes than this function.

        4. Using Permission of Mobile Endpoint

        (1) To install and use the mobile client of this service and help you remember your login account and password, you need to authorize us to obtain the storage space permission of your mobile device. If not, you may not be able to use this service.

        (2) To support the display of video in the meeting, you need to authorize us to obtain the camera permission of your mobile device. If not, you cannot display the video in the meeting.

        (3) To support the conversation in the meeting, you need to authorize us to obtain the microphone permission of your mobile device. If not, you cannot talk to others through the microphone in the meeting.

        (4) To support Bluetooth audio device access, you need to authorize us to obtain permission to manage Bluetooth devices and access Bluetooth settings of your mobile device. If not, you cannot discover, pair or use Bluetooth audio devices.

        (5) To use the service online, you need to authorize us to view the network connection. If not, you may not be able to use this service.

        (6) To support the adjustment of audio status during the meeting, you need to authorize us to obtain permission to modify the audio settings of your mobile device. If you do not authorize us, you cannot adjust the audio input and status during the meeting.

        (7) To allow the service client to continue running after the mobile device screen is closed, you need to authorize us to obtain the sleep prevention permission of your mobile device. If not, the service will stop automatically after the mobile device screen is closed.

        (8) To support the upgrade and update of the service client, you need to authorize us to obtain permission to install applications on your mobile device. If not, the service client cannot upgrade and update.

        (9) To check the call status of your mobile device and avoid causing the voice call content to be synchronized to other participants by the conference application when answering the phone and the conference application are carried out at the same time, you need to authorize us to obtain the phone call status and mobile network information phone permission of your mobile device. If not, when you answer the phone or use this service for a meeting at the same time, your voice call content may be leaked to the participants of this service.

        (10) To display the service in the form of a floating window on the upper layer of other applications after switching to the background, you need to authorize us to obtain the floating window permission of your mobile device. If not, after the service is switched to the background, you will not see any meeting interface on the foreground interface of your mobile device.

        (11) To make the background of the meeting function work properly when you are sending the substream for screen sharing, and to switch back to the foreground after the sharing is stopped, you need to authorize us to obtain the permission of your mobile device to reorder the running applications. If not, the substream and the mainstream may not switch properly.

        (12) To receive the vibration prompt after updating or downloading the service client, you need to authorize us to obtain the vibration control permission of your mobile device. If not, there will be no vibration prompt after the update or download of the service client is completed.

        You can check the status of the above permissions one by one in your mobile device settings, and you can decide whether these permissions can be turned on or off at any time. In particular, even with your authorization, we will not collect your information when the relevant functions or services are not needed. Please note that by opening these permissions, you authorize the service to collect and use this information to realize the above services. If you cancel these authorizations, the service will not continue to collect and use your information, nor can it provide you with the functions corresponding to these authorizations. However, your decision to close the permission will not affect the previous processing of personal information based on your authorization.

        In addition, according to relevant laws, regulations, and national standards, we may collect and use your relevant personal information under the following circumstances without your authorization and consent.

        1) Directly related to national security, national defense security, and other national interests; Directly related to major public interests such as public safety, public health, and public knowledge

        2) Directly related to the criminal investigation, prosecution, trial, and judgment execution

        3) For the purpose of safeguarding your or other personal life, property, reputation, and other major legitimate rights and interests, but it is difficult to obtain your consent

        4) The personal information collected is disclosed to the public by yourself

        5) Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure, and other channels

        6) Necessary for signing and performing the contract according to your requirements

        7) For maintaining the safe and stable operation of the provided products or services, such as finding and handling the faults of products or services.

        8) Necessary for legal news reporting

        9) When it is necessary to carry out statistical or academic research in the public interest and it provides the results of academic research or description to the outside world, it de-identifies the personal information contained in the results

        10) Other circumstances stipulated by laws and regulations.

        The third-party services in our services are provided by an external third-party subject, and we cannot obtain the information generated when you use such third-party services. Please note that at present, we will not take the initiative to obtain your personal information from a third party. If it is necessary to obtain your personal information indirectly from a third party for business development in the future, we will express to you the source, type, and scope of use of your personal information before obtaining it. If the personal information processing activities we need to carry out business exceed the scope of your authorization and consent when providing personal information to a third party, we will obtain your express consent before processing your personal information; In addition, we will strictly abide by relevant laws and regulations and require third parties to ensure the legitimacy of the information provided.

 

2. How do we share, transfer and publicly disclose your personal information

        1. Share

        We will not share your personal information with any company, organization or individual, except in the following cases:

1.    After obtaining your explicit consent, we will share your personal information with other parties.

2.    We may share your personal information in accordance with laws and regulations or the mandatory requirements of the competent government departments.

3.    Sharing with affiliated companies: To provide products and/or services to you, your personal information may be shared with our affiliated companies. We will only share necessary personal information and are bound by the purposes stated in this policy. We will protect the security of your personal information through legal documents between affiliated companies, internal systems and isolated employee permission.

4.    Share with partners: We may entrust trusted partners to provide some services, so we may share some of your personal information with partners. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and only share the personal information necessary to provide services. At present, our partners include the following types: suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business. These supports include providing basic technical services, consulting, analysis and other professional services.

When you use some functions of this service, we may access the software development kit (SDK) provided by a third party to implement relevant functions. The details are as follows:

1)    WeChat SDK

Third-Party Service Provider: WhChat Open Platform

Goals: Provide WeChat sharing function

Permissions and Personal Info: networking

URL of Third-Party Privacy Policy: https://open.weixin.qq.com/cgi-bin/frame?t=news/protocol_developer_tmpl

2)    Bugly SDK

Third-Party Service Provider: Shenzhen Tencent Computer Systems Company

Goals: Provide abnormal reporting and operation statistics, and follow up user feedback in time

Permissions and Personal Info: networking, network status change, WiFi status change, reading mobile phone status, reading log

URL of Third-Party Privacy Policy: https://bugly.qq.com/v2/contract

 

        2. Transfer

        We will not transfer your personal information to any company, organization or individual, except for the following circumstances:

1.    Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.

2.    In case of merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company or organization to ask you for authorization and consent again.

        3. Publicly Disclose

        We will not publicly disclose your personal information, except in the following cases:

1.    After obtaining your explicit consent.

2.    Disclosure Based on Law: we may publicly disclose your personal information under the mandatory requirements of laws, legal procedures, litigation or government authorities. In addition, according to relevant laws, regulations and national standards, we may share, transfer and publicly disclose personal information in the following cases without obtaining the authorization and consent of the personal information subject in advance:

1)    Directly related to national security and national defense security.

2)    Directly related to public health and public safety.

3)    Directly related to the criminal investigation, prosecution, trial and judgment execution.

4)    For the purpose of safeguarding the life, property and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the person’s consent.

5)    The personal information that the subject of personal information discloses to the public on his own.

6)    Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.

 

3. How do we protect and store your personal information

      1. Measures to Protect Personal Information

1.    We attach great importance to your information security. We strive to take all reasonable physical, electronic and administrative security measures to protect your personal information and prevent your personal information from unauthorized access, public disclosure, use, modification, damage or loss. For example, we will use encryption technology to improve the security of personal information; We will use trusted protection mechanisms to prevent malicious attacks on personal information; We will deploy access control mechanisms and try our best to ensure that only authorized personnel can access personal information.

2.    We strongly recommend that you use a complex password to help us ensure the security of your account. We will try our best to ensure the security of any information you send us.

3.    In case of security incidents such as personal information disclosure, we will timely inform you of the current situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you in accordance with the requirements of laws and regulations. We will timely inform you of the relevant information of the event by email, letter, telephone, push notification, etc. when it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to make an announcement. At the same time, we will also actively report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.

2. Storage of Personal Information

1. Location of Information Storage

According to laws and regulations, personal information collected and generated during operation in the people's Republic of China will be stored in the people's Republic of China.

2. Duration of Information Storage

Generally, we only retain your personal information for the time necessary to achieve the purpose, unless there is a mandatory retention requirement by law. Our criteria for judging the above-mentioned period include:

1)    Complete the transaction purpose related to you, maintain the corresponding transaction and business records, and deal with your possible inquiries or complaints.

2)    Ensure the safety and quality of our services for you.

3)    Whether you agree to a longer retention period.

4)    Whether there is any other special agreement on the retention period.

        After your personal information exceeds the retention period, we will delete your personal information or anonymize it according to the requirements of applicable laws.

        If we terminate the service or operation, we will notify you at least 30 days in advance, and delete or anonymize your personal information after terminating the service or operation.

 

4. Your rights

        We will try our best to ensure that you can smoothly access your personal information. If the registration information is incorrect, we will try to provide various ways for you to quickly update the information in your account (unless we must keep this information for legitimate business or legal reasons). When accessing, updating, correcting and deleting your personal information, we may require you to authenticate to ensure the security of your personal information.

1.    Access and update your personal information

You can access and update your personal information (i.e. user name, mobile phone number or email (only one of the phone number or email) and password in the address book maintained by the organization administrator through the "my" function of the management platform.

2.    Delete your personal information

In the case of your personal request to delete information, you can ask us:

1. If our handling of personal information violates laws and regulations

2. If we collect and use your personal information without your consent

3. If our handling of personal information violates the agreement with you

4. If the organization's users no longer use our products or services

5. If we no longer provide products or services for you

You know and agree that if you request us to delete your personal information, you should first contact the organization user. After the organization user agrees that you exit the organization, we will complete the verification and processing within 3-5 working days.

3.    Withdrawal of consent

        Each business function needs some basic personal information to be completed. For the collection and use of additional collected personal information, you can give or withdraw your authorization and consent at any time.

        When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous personal information processing based on your authorization.

        You can withdraw the permission authorization of the agreed mobile device. In the application management and settings of the mobile device, select "Hitrolink Cloud Meeting " in the application permission management interface to withdraw the relevant permission authorization.

4.    Cancel account

        You know and agree that your account is created/assigned by the organization user for you. If you want to cancel your account, you should first contact the organization user and obtain the organization user's consent. After organizing users to carry out relevant operations through the management platform, we will cancel your account.

        After you cancel your account, we will stop providing you with products or services, and delete or anonymize your personal information.

5.    Respond to your above request

If you contact us to request the processing of your personal information, we may ask you to verify your identity before processing your request. We will reply within fifteen days.

 

5. How do we handle the personal information of minors

        Our products, websites and services are mainly for adults. According to relevant laws and regulations, if you are a minor under the age of 18, please be sure to carefully read this Privacy Policy under the supervision and guidance of your parents or other guardians before using this service and use this service or providing personal information with the consent of your guardians. If parents or other guardians have reason to believe that minors have submitted personal information to us without their prior consent, please contact us through the contact information in Section 6 of this policy.

        If we find that we have collected the child's personal information without the prior consent of verifiable parents or legal guardians, we will delete the relevant data as soon as possible.

 

6. Contact us

If you have any questions, comments or suggestions on this policy, you can contact us in the following ways:

1.    Telephone: 0571-87235761 or Email:

2.    Mail to this location: 16F, building 1, No. 1168, Bin'an Road, Binjiang District, Hangzhou, Zhejiang

Zhejiang Huachuang Video Technology Co., Ltd. (received)

Postcode: 310053

Generally, we will review the issues involved as soon as possible and reply within 30 days after verifying your user identity.

 

7. How to update this policy
        We may revise or change this policy from time to time.

        Without your express consent, we will not reduce your rights under this policy.

        When the terms of the policy are changed, we will show you the changed policy in the form of a push notification and a pop-up window when you log in and update the version. Please note that only after you click the Agree button in the pop-up window will we collect, use, store and process your personal information according to the updated policy.