Soundify Text to Speech Voice privacy policy
Published: May 2023, 5
Updated: June 2023, 6
This policy only applies to the Soundify Text to Speech Voice software (hereinafter referred to as the "Product") of Wuhan Gamma Technology Co., Ltd. This policy applies to your access to and use of Wuhan Gamma Technology Co., Ltd. products and services through any means, and this privacy policy aims to help you understand what data we collect, why we collect this data, what we will do with this data and how to protect this data. Please be sure to read this Privacy Policy carefully and use our services after confirming that you fully understand and agree. If you or your guardian do not agree with the content of this Privacy Policy, some features in the Software may not be available to you.
This Privacy Policy will help you understand the following:
1. What personal information we collect, call permissions and how we use them
2. How We Use Cookies and Similar Technologies
3. How We Share, Transfer and Publicly Disclose Your Personal Information
4. How we store and protect your personal information
5. How You Access and Manage Your Information
6. How your personal information is transferred globally
7. How this Policy is updated
8. How to contact us
We understand the importance of personal information to you and our responsibility to provide effective protection for your information. Thank you for trusting our products! We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. We solemnly promise that we will take corresponding security measures to protect your personal information in accordance with the industry's mature security standards.
1. What personal information we collect, call permissions and how we use them
Personal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person; Permission refers to the permission of the mobile device, and the user needs to choose to agree to enable or reject it according to his or her own situation.
(I) Collection of Personal Information
The purpose of collecting personal information is to provide you with products and services and to ensure that we comply with applicable laws, regulations and other normative documents. You have the right to choose whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with corresponding services, including these functions:
(1) In order to improve service security, ensure operational quality and efficiency, improve user experience and better provide services, we will collect your device information (including IMEI, MEID, AndroidID, IMSI, OAID, GUID, MAC address), your installed application information or running process information.
(2) In order to improve the overall usage and access speed of users, we will collect your IP address and allocate server resources nearby.
(3) In order to monitor the errors and exceptions generated by the use of the product and optimize and upgrade the platform system, we collect application software operation information.
(4) In order to achieve operation fault reporting and analyze and solve the problems you encounter in the use of this product, we will collect your equipment information (GUID, MAC address), browsing and operation records.
(5) In order to provide better member services, this product adopts the three-party WeChat authorization login as the user's account identification, collects your WeChat nickname and avatar address under the authorization of the user, and displays them on the personal page of this product.
(6) In order to provide better after-sales service and facilitate quick inquiry of orders, we will collect your mobile phone number (fill in and submit when purchasing an order).
(II) Call mobile phone permissions Our products will call some mobile phone device permissions in the process of providing services. The following are the business functions corresponding to the product call permission, the purpose of the call permission, and the situation asked to you before calling the permission.
Invocation permission: Device status permission
Purpose of call: In order to improve user experience and better service, improve service security, ensure operational quality and efficiency, need to identify your device, we will collect your device information (including IMEI, MEID, AndroidID, IMSI, OAID, GUID, MAC address), your installed application information or running process information.
Call method: After the user agrees to the privacy policy statement, apply for a pop-up prompt, and the user authorizes
Call permission: write permission of external storage of the device Call purpose: user work file management, temporary file cache
Call method: Triggered when using related functions, application pop-up prompts, user authorization, and denial of authorization will not be able to use related functions normally
Call permission: Read permission for external storage of the device
Call purpose: Used to select files that already exist on the user's mobile phone, including external storage, WeChat, and QQ
Call method: Triggered when using related functions, application pop-up prompts, user authorization, and denial of authorization will not be able to use related functions normally
Call permission: Phone camera permission
Purpose of call: Used to take and make photos in real time and obtain text content from photo recognition, only for text recognition
Call method: Triggered when using related functions, application pop-up prompts, user authorization, and denial of authorization will not be able to use related functions normally
Call permission: Read permission for mobile phone albums
Purpose of call: for image text recognition, select existing photos or pictures from the mobile phone album, only for text recognition
Call method: Triggered when using related functions, application pop-up prompts, user authorization, and denial of authorization will not be able to use related functions normally
Call permission: Read the software installation list
Purpose of call: Used to check whether the WeChat APP is installed on the mobile phone when WeChat authorized login of this product, the scope is only used for WeChat authorized login
Call method: The mobile phone system defaults
Call permissions: Access Wi-Fi, cellular
Purpose of call: Used for normal data synchronization and data exchange between this product and the server
Call method: The mobile phone system defaults
2. How We Use Cookies and Similar Technologies
(1) Cookies In order to ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device to store the unique cookie data sent to you by the web server, which can only be read by the web server in the domain where the cookie was issued. Cookies typically contain identifiers, site names, and some numbers and characters. Cookies allow us to store your preferences, help you optimize your choices, interact with us, determine your login status, and account or data security.
We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a feature to block cookies. You can usually modify your browser settings to reject cookies according to your needs, and you can also clear all cookies stored in the software. However, if you do so, you need to change the user settings yourself each time you visit our website, and the corresponding cookies you have previously recorded will also be deleted, which may affect the convenience and security of the services you use.
(ii) Web beacons and pixel tags In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our websites. For example, emails we send you may contain click-through URLs that link to content on our website. If you click on the link, we track the click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded in a website or email. With the help of pixel tags in emails, we know if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
Do Not Track Many web browsers have a Do Not Track feature, which posts Do Not Track requests to websites. Currently, the major Internet standards organizations do not have policies in place to dictate how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our websites will respect your choice.
3. How We Share, Transfer and Publicly Disclose Your Personal Information
(1) Third-party SDKs accessed by us When you use the functions provided by the third party in this product, we may access the software development kit (SDK) provided by the third party to achieve relevant functions. In this case, the third-party SDK service provider may collect your relevant personal information. The collection and processing of information by the aforementioned service providers shall comply with their own privacy terms and shall not apply to this Policy. In order to ensure the security of your information to the greatest extent, we recommend that you review the privacy terms of any third-party SDK services before using them. In order to protect your legitimate rights and interests, if you find that such SDKs or other similar applications are risky, it is recommended that you immediately terminate the relevant operations and contact us in time. We collect data based on your interactions with us and the choices you make, including your privacy settings and the products and features you use. We will strictly test the access to the third-party SDK, and publicly explain the latest situation of the access SDK to you and the public, please refer to the official privacy policy of the third-party SDK.
WeChat sharing and payment SDK Affiliated institution: Shenzhen Tencent Computer System Co., Ltd
Functional use: WeChat payment ability, WeChat authorized login, share content to WeChat APP
Information collection: device number, IP address, device software information, device identification code, device identifier, region, network usage habits, device-related application information, and other service-related log information
Use system: Android, IOS
Privacy Policy: https://weixin.qq.com/cgi-bin/readtemplate?spm=a1zaa.8153814.0.0.67abe7a3ddAz0R&lang=zh_CN&t=weixin_agreement&s=privacy
(2) How we share your personal information
We treat your information with a high degree of diligence. We will not share your personal information with other companies, organizations and individuals, except in the following cases:
1. Obtain your explicit consent or authorization in advance;
2. Sharing in accordance with applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;
3. Sharing with our other products or services, we will only share necessary personal information and be bound by the purposes stated in this Privacy Policy. If an affiliated company changes the purpose of use and processing of personal information, it will ask for your consent again.
4. Sharing with authorized partners: Only to achieve the purposes stated in this policy, some of our services will be jointly provided by us and authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Our partners are not authorized to use the shared personal information for any other purpose.
(3) How we transfer your personal information
We will not transfer your personal information to any other company, organization or individual, except in the following cases:
(1) Obtain your express authorization or consent in advance;
(2) Meet the requirements of laws, regulations, legal procedures or mandatory government requirements or judicial rulings;
(3) If our authorized partner is involved in merger, division, liquidation, acquisition or sale of assets or business, your personal information may be transferred as part of such transactions, we will ensure the confidentiality of such information at the time of transfer, and do our best to ensure that the new authorized partners and organizations holding your personal information continue to be bound by this Privacy Policy, otherwise we will require the authorized partner to seek authorization and consent from you again.
(4) Public disclosure of personal information
We will only publicly disclose your personal information under the following circumstances:
(1) Obtain your explicit consent;
(2) Based on laws and regulations, legal procedures, litigation or mandatory requirements of government authorities;
(5) Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information
In the following circumstances, the sharing, transfer, or public disclosure of personal information does not require prior authorization and consent from the Personal Data Subject:
(1) Directly related to national security and national defense security;
(2) Directly related to public safety, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(4) For the purpose of safeguarding the life, property and other major lawful rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the consent of the individual; Personal information disclosed to the public by the subject of personal information; Collecting personal information from legally publicly disclosed information, such as lawful news reports, government information disclosure and other channels.
4. How we store and protect your personal information
(1) Retention period for personal information
In order for you to be able to use our diversified products and services and effectively handle possible disputes, in addition to meeting the mandatory requirements of the Cybersecurity Law on data retention, we will retain your personal information during your use of the service (before you cancel your account) and the expiration of the statute of limitations for related acts. After the above period, we will delete or anonymize your information (that is, we will process your personal information so that your identity cannot be identified by any third party).
(2) Our security measures.
(1) We will collect, use, store and transmit user information in the principle of "minimization", and inform you of the purpose and scope of use of relevant information through user agreement and privacy policy.
(2) We attach great importance to information security. We have set up a special team responsible for the development and application of a variety of security technologies and procedures, we will conduct security background checks on security management leaders and personnel in key security positions, and we have established a sound information security management system and internal security incident handling mechanism. We will take appropriate industry-standard security measures and technical means to store and protect your personal information to prevent the loss, unauthorized access, public disclosure, use, destruction, loss or leakage of your information. We will take all reasonable and feasible measures to protect your personal information. We use encryption technology to ensure the confidentiality of data; We use trusted protection mechanisms to prevent malicious attacks on your data.
(3) We will train and assess employees' awareness of data security and security capabilities to strengthen employees' awareness of the importance of protecting personal information. We will conduct identity authentication and authority control for employees who process personal information, and will sign confidentiality agreements with employees and partners who contact your personal information, clarify job responsibilities and codes of conduct, and ensure that only authorized personnel can access personal information. If there is a violation of the confidentiality agreement, the cooperative relationship with the Beijing Municipal Transportation Commission will be immediately terminated, and relevant legal responsibilities will be investigated, and confidentiality requirements will be put forward for personnel who have access to personal information when they leave their posts.
(4) We also ask you to understand that in the Internet industry, due to the limitations and rapid development of technology and the various malicious attack methods that may exist, even if we do our best to strengthen security measures, we cannot always guarantee <>% security of information. Please understand that the system and communication network used when you use our products and/or services may have security problems in other links outside our control.
According to our security management system, personal information leakage, damage or loss is listed as the most serious security incident, and once it occurs, the highest level of emergency plan will be activated and handled by the emergency response team.
(3) Notification of security incidents
(1) We will formulate an emergency response plan for network security incidents, promptly deal with security risks such as system vulnerabilities, computer viruses, network attacks, and network intrusions, and immediately notify (<>) security incidents in the event of incidents endangering network security.
(2) The leakage, damage or loss of personal information is a particularly serious security incident, and we will be responsible for regularly organizing members of the working group to conduct security plan drills to prevent such security incidents. In the event of misfortune, we will activate the emergency plan according to the highest priority, form an emergency response team, trace the cause in the shortest time and reduce the loss.
(3) After the unfortunate occurrence of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the handling measures we have taken or will take, suggestions for risks that you can independently prevent and mitigate, and remedial measures for you. We will promptly inform you of the relevant situation of the incident through the contact information you have reserved such as on-site notification, SMS notification, telephone, email, etc., and we will take reasonable and effective measures to issue announcements when it is difficult to inform you one by one. At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
(4) Account cancellation
In accordance with the conditions stipulated in this product service agreement and relevant national laws and regulations, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy to submit a cancellation application to us. After your account is cancelled, we will stop providing you with all or part of the services, and delete or anonymize your personal information within 5 working days according to your requirements, except as otherwise provided by laws and regulations. Account cancellation application path: APP > My > Settings > Account Cancellation.
5. How You Access and Manage Your Information
In accordance with relevant Chinese laws, regulations and standards, as well as common practices in other countries and regions, we guarantee that you can exercise the following rights over your personal information:
1. Access and view your personal information: Since Ben Software does not provide unified registration and login, if you need to query and correct your personal information, please operate according to the relevant operation guidelines provided by various business functions.
2. Delete your personal information:
You may request us to delete your personal information under the following circumstances:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect and use your personal information without your consent;
(3) If our processing of personal information violates the agreement with you;
(4) If we terminate the service and operation.
You can apply for deletion of your personal information by canceling your account, and if we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization. When you delete information from our Services, we may not immediately delete the corresponding information from our backup system, but we will delete the information when the backup is updated.
3. Respond to your request
If you are unable to access, correct or delete your personal information through the above methods, or if you believe that we will violate any laws and regulations or agreements with you on the collection or use of personal information, you can apply through the telephone number and contact person provided by our company. We will respond to your access request within 15 days. For other personal information generated during your use of our products or services, as long as we do not need to invest too much, we will provide you with it.
For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. We may reject requests that are unreasonably repetitive, require excessive technical means (for example, need to develop new systems or fundamentally change current practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes).
In the following circumstances, we will not be able to respond to your request to correct, delete or cancel information in accordance with laws and regulations:
(1) Directly related to national security and national defense security;
(2) Directly related to public safety, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial and enforcement of judgments;
(4) We have sufficient evidence to show that you have subjective malice or abuse of rights (such as your request will endanger public safety and the legitimate rights and interests of others, or your request is beyond the scope of general technical means and commercial costs);
(5) Responding to the request of the Personal Data Subject will cause serious damage to the lawful rights and interests of you or other individuals or organizations;
(6) Involving trade secrets.
6. How your personal information is transferred globally
The personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China. We are not involved in cross-border transfers of personal information.
7. How this Policy is updated
Our Privacy Policy is subject to change.
We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this Privacy Policy on this page.
If the changed terms reduce your rights or increase your obligations ("Material Changes"), we will notify you on the main exposure page of the product or service or by sending you an email or other appropriate means to reach you. We will allow you a reasonable period of time before the changes take effect, for you to consider whether to accept the changes. If you continue our services after the new version of the Privacy Policy and Terms of Service takes effect, it means that you have fully read and are willing to be bound by the updated Privacy Policy and Terms of Service, and if you do not agree with such changes, you can stop our products and services.
The material changes referred to in this Policy include, but are not limited to:
1. Our service model has undergone major changes. Such as the purpose of processing personal information, the types of personal information processed, the way personal information is used, etc.;
2. We have undergone major changes in ownership structure and organizational structure. Such as changes in owners caused by business adjustments, organizational reforms, etc.;
3. Changes in the main objects of personal information sharing, transfer or public disclosure;
4. Major changes in your rights to participate in the processing of personal information and the way in which you exercise them;
5. When our responsible department, contact information and complaint channels responsible for handling personal information security change;
6. When the personal information security impact assessment report indicates that there is a high risk.
8. How to contact us
If you have any questions, comments or suggestions about this Privacy Policy or matters related to your personal information, please contact us by phone.
Company name: Wuhan Gamma Technology Co., Ltd
Company address: Wuhan Optics Valley Avenue Optics Valley Dingchuang International 1105
Person in charge of information protection: Mr. Chen
Contact number: 15377036080
Contact email: palmmobgama@gmail.com