iWallpaper Privacy Policy
Update date: September 18, 2023
" iwallpaper" (hereinafter referred to as "iwallpaper") is well aware of the importance of personal information to you, attaches great importance to the protection of users' personal information and privacy, and will do its best to protect the safety and reliability of your information, and will never abuse or Disclosure of your private information.
Please read and understand the "iWallpaper Privacy Policy" completely before using all products and services of iWallpaper, clearly understand our rules for processing your personal information and other information, and make the choices you deem appropriate accordingly. If you do not agree with any content of this privacy policy, it means that you have chosen to give up using all products and services of iwallpaper, please immediately stop using all products and services of iwallpaper. When you use any of our products and services, it means that you agree and fully understand the entire contents of this privacy policy.
The permissions and user information obtained by iwallpaper follow the following principles: the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of openness and transparency, and the principle of consistency of rights and responsibilities. Please read and understand the following instructions carefully before using our products:
1. What information will we collect?
1.1 Equipment information
Equipment information refers to the information of the equipment you use when using our products or services. In order to make the necessary adaptation of products and services to devices and provide security services, when you use products or services, the device name, device model, device identification code, operating system and application program that you use to use iwallpaper products or services will be collected. Version, language settings, resolution, service provider network ID (PLMN) related information . This information is collected to help us conduct bug analysis, ensure your normal use of our products and services, improve and optimize our product experience, and protect your account security.
1.2 Location information
Location information refers to the information about your location collected when you turn on the device positioning function and use related services based on location (such as obtaining the weather conditions at your current location), which mainly includes:
1.2.1 When you turn on the device positioning function and use related products or services, we may use GPS, WiFi or other technical methods to collect and process information about your actual location. Whereabouts and precise positioning information are sensitive personal information. Our products or services will not collect such personal sensitive information except when required for specific product or service functions.
1.2.2 Real-time information provided by you or other users that includes your geographic location. This includes shared information uploaded by you or others showing your current or past geographical location, and geotagged information contained in photos shared by you or others. If you do not want to be accessed, you can choose to turn off related functions in your device or products and services, but this may affect our ability to provide you with related services.
1.3 Log information
For the purpose of service security, when you use products and services, the system may automatically collect certain information through cookies or other methods and store it in server logs. Such information may include:
Detailed use of our products and services. This information may include the web search terms you use, the page address you visit, and other information and content details you browse or request when using the service ; equipment or software information, In addition to the device information mentioned above, we may collect the version number of the software and browser type you are using . To ensure the security of your operating environment or as needed to provide services, we collect information about the mobile applications and other software you use. Device event information, including crashes, system activity information , and other related information.
2. How do we collect information?
2.1 We collect your information through your voluntary submission and by generating corresponding records during your use of our services.
2.2 We may collect and use your information through preference settings and other related technologies. Preferences help us remember and identify you as our user. We will use the collected user search, browsing, usage habits and other information for personalized preference analysis and analyze your use of our services in order to provide you with more thoughtful personalized service push (if you do not want to use our personalized service Preference service, which can be turned off in authorization settings).
2.3 In order to display various information of iwallpaper normally, we will collect your relevant device information. With your consent, the app will collect this information each time it is launched. This information may include:
2.3.1 Device attributes and device signals: mobile phone model, screen size, screen resolution, battery power, system version, available storage space, network type, application and file name and type, device location location, current application version number, you Use the device's network status, Bluetooth status, WIFI access point information, WIFI scan results, device sensors (gyroscope, acceleration, gravity, linear acceleration), and clipboard;
2.3.2 Device serial number and other device identifiers: including international mobile equipment identity code IMEI, advertising identifier IDFA, Android ID and other device serial numbers, network device hardware address MAC, unique identity identifier, network device hardware address, etc.;
2.3.3 In order to help software research and development, design new products and services, improve and enhance existing software products and services, and optimize user experience: we will use your software information and commonly used device information (such as your device model and operating system version). , device configuration, unique device identifier, device location location, storage space, international mobile equipment identity code IMEI, network device hardware address MAC, WIFI scan results, advertising identifier IDFA, etc.), device connection information (browser type, Telecom operators, network environment, language used) as well as device status information, document information, log information, and cloud service usage to conduct data analysis to understand the usage and adaptation of software products and services, and provide guidance for new products and services. Provide data support for research and development, improvement of existing functions and services.
2.3.4 We collect the installation list to determine whether we need to call up the component selection page of the app. We obtain the MAC address in order to restore the Crash scene more realistically, provide data analysis services such as sharing and reflow, so as to share messages to the target device and designated social accounts, provide anti-cheating services, and collect data such as gateway account retrieval error logs to provide statistics. Analytical service capabilities.
2.3.5 We will ask you to enable application auto-launch permission when necessary to use wallpapers for your mobile phone to ensure that the wallpapers are updated in the background in a timely manner and provide you with better services.
3. How do we use the information collected?
In order to provide you with more high-quality, convenient and secure services, we will use the collected information for the following purposes under the premise of strictly complying with laws and regulations and agreements with users:
3.1 Meet your needs: For example, ① location setting help service ; read mobile phone identification code to obtain device information as user-related identification; ② read storage space and camera to read, store, and take photos. Avatar, uploaded image or background image settings; ③ Read application installation list to configure application settings, quick start and other services.
( None of the above will be turned on by default. They will only be used to implement specific functions or services with your express authorization. You can also withdraw your authorization. It is particularly important to point out that we have obtained these sensitive permissions even with your authorization. , and will not collect your information when it is not needed for related functions or services. )
3.2 Provide you with services, product development and service optimization: For example, when our system fails, we will record and analyze the information generated when the system fails and optimize our services.
3.3 Security protection: For example, we will use your information for identity verification, security prevention, anti-fraud monitoring, archiving backup, customer security services , etc. For example, security software you download or install can detect malicious programs or viruses, or identify scams for you.
3.4 Management software: for example, software certification, software upgrades, etc.
3.5 Invite you to participate in surveys about our services.
3.6 In order to ensure the security of the service and help us better understand the operation of our application, we may record relevant information, such as the frequency with which you use the application, fault information, overall usage, performance data and the source of the application. . We do not store our information in analytics software.
3.7 Other uses with your consent: In order to give you a better experience, improve our services, or for other purposes with your consent, we may use the information collected through certain services in compliance with relevant laws and regulations. For use in our other services . For example, the information you use when using one of our services will be used to show you content or advertisements in another service, and used for user research analysis and statistics, etc.
3.8 In accordance with laws and regulations, we will collect and use your relevant information in the following situations. In this case, your authorization is not required.
Related to national security and national defense security;
Relevant to public safety, public health, and major public interests;
Relevant to criminal investigation, prosecution, trial and judgment execution, etc.;
To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the individual;
Necessary to maintain the safe and stable operation of the products and/or services provided, including discovering and handling product and/or service failures, etc.;
Necessary for legitimate news reporting;
When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results will be de-identified;
Other situations specified by laws and regulations.
3.9 Other related scenarios that may require the use of collected information. If the usage scenario is not reasonably related to the initial scenario, we will obtain your consent again before using the information .
Some third-party SDKs or similar applications we have access to may collect your personal information. If you use such services provided by third parties in our services, you agree that your information will be collected and processed directly by them . We will evaluate the legality, legitimacy, and necessity of such third-party services collecting personal information, require such third parties to take protective measures for your personal information, and strictly abide by relevant laws, regulations, and regulatory requirements. You can learn about the basic situation of the third-party SDKs that we mainly access through the third-party SDK directory below . The access of each individual service to the third-party SDK may be different. If you need to know the details of the access of a specific individual service to the third-party SDK , please go to the corresponding third-party service page . You can also choose to contact us through the feedback channels listed in the "How to Contact Us" section of this policy , and we will answer you as soon as possible.
The above third-party services are operated by relevant third parties. Your use of the services of such third parties (including any information you provide to such third parties) is subject to the third party's own terms of service and information protection statement (rather than this policy), and you need to read its terms carefully. This policy only applies to the personal information we collect and does not apply to the services provided by any third party or the third party's information use rules. If you find that there are risks in these third-party services, it is recommended that you terminate the relevant operations to protect your legitimate rights and interests and contact us in time.
4. Android system application permission directory:
4.1 Read the contents of the SD card (read storage space/photo permission) android.permission.READ_EXTERNAL_STORAGE
Permission description: Provides the function of reading the photo album image data in the mobile phone storage space.
Purpose: Allows the App to read images, files and other content in storage. It is mainly used to help you upload background images, avatars and other images, files, information and other functions.
4.2 Access data network status ACCESS_NETWORK_STATE, ACCESS_WIFI_STATE
Permission description: Obtain mobile phone data traffic, mobile phone WIFI network status function, and WIFI scan results.
Purpose: When entering the app, you need to determine the wifi switch, network link status and other information; used to analyze possible problems during the use of the app.
4.3 Access to the Internet network permission android.permission.internet
Permission description: Network access permission, this permission is used when the APP needs to access the network.
Purpose: Used when loading data when the APP is started.
4.4 Obtain mobile phone status (device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/geographic location, etc.)
Permission description: Provides access to information such as mobile phone device identification (please rest assured that this permission cannot monitor or obtain any of your call content and information).
Purpose: We may use your device information to ensure that the wallpaper can run normally on the mobile phone desktop after exiting the APP, as well as the information that our affiliates and partners have obtained your authorization or can provide to us in accordance with the law to determine the account Security, transaction security, identity verification, service log information, identifying violations, detecting and preventing security incidents, and taking necessary recording, analysis, disposal measures/security guarantees and other main functions in accordance with the law.
4.5 RECEIVE_BOOT_COMPLETED starts automatically at boot
Permission description: Start the application or service after booting.
Purpose: Allow the App to automatically start the wallpaper service after booting to provide relevant data; in order to allow you to experience the APP message offline reminder function, experience the APP functions more comprehensively, and provide better services, after you agree to this privacy policy, the APP will , the auto-start or associated startup function will be enabled.
4.6 Bluetooth permissions BLUETOOTH and BLUETOOTH_ADMIN.
Permission description: Get Bluetooth switch status, etc.
Purpose: Allow the App to obtain the on/off status of Bluetooth and display relevant information in the X panel widget.
4.7 Get the application list QUERY_ALL_PACKAGES
Permission description: Get the application installation list on the mobile phone.
Purpose: Obtain the application installation list, select to start the APP for the quick launch widget; used to provide personalized advertising.
4.8 Camera permission CAMERA
Permission description: Obtain the contents of the user's mobile phone album.
Purpose: When using the photo background function, replacing pictures or changing avatar functions in the app, you need to obtain user album photos to add or replace background images or avatars.
4.9 Get the network device hardware MAC address getMacAddress
Permission description: Obtain device serial number, network device hardware address MAC, etc.
Purpose: We obtain the MAC address in order to restore the Crash scene more realistically, provide data analysis services such as sharing and reflow, so as to share messages to the target device and designated social accounts, provide anti-cheating services, and collect data such as gateway account retrieval error logs to Provide statistical analysis service capabilities.
5. Third-party SDK directory:
We will strictly test the accessed third-party SDK and promptly publicly explain to you the latest status of accessing the SDK. For details, please refer to the official privacy policy of the third-party SDK.
5.1 SDK name: Umeng
Purpose: Data statistical analysis
Type of personal information obtained: device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/IP address/SIM card IMSI information, running processes, device serial number)
Device permissions called: Get network status, access Wi-Fi status, read phone status and identity
Privacy Policy Link: [Umeng+] Privacy Policy
5.2 SDK name: AndroidSupportLibraryCompat
Purpose: Used to choose to upload pictures, set backgrounds, and download wallpapers
Type of personal information obtained: Obtaining SD card data
Called device permissions: read external storage, write external storage
5.3 SDK name: WeChat Open Platform
Purpose: WeChat authorized login and sharing
Types of personal information obtained: device identification information, stored personal files
Called device permissions: read external storage, write external storage
Privacy Policy Link:
5.4 SDK name: QQ Internet
Purpose: QQ authorized login and sharing
Types of personal information obtained: stored personal files, reading phone status and identity, network information
Called device permissions: read external storage, write external storage
Privacy policy link: QQ Internet SDK Privacy Statement — QQ Internet WIKI
5.5 SDK name: Alibaba Cloud Number Authentication SDK
Purpose: One-click login and authentication with local number
Type of personal information obtained: network type, device information (including IP address, device manufacturer, device model, mobile operating system, application vendor identifier (IDFV), SIM card or International Mobile Subscriber Identity (IMSI) information)
Device permissions called: network access, check Wi-Fi status, check network status, switch network channel
Privacy policy link: Alibaba Cloud official website legal statement and privacy policy
6. AI Function Privacy Terms
When using the AI function, you will upload your photo, and the system will generate a new AI image within the function page through post-processing technology. During this process, the photos you upload will only be used for this function. We only provide image processing services and will not extract identification information and will not use it for identification purposes. You are responsible for the uploaded images and text content. We are responsible for the authenticity, validity, compliance and security. After the service is completed, the system will automatically delete the above information and will not retain it.
- The photos you upload for this function will only be used for this function; please pay special attention: after you close the function page, Cloud End will not save the photos you uploaded. If this causes "Cloud End" is not responsible for any inconvenience.
- In the process of using this AI function, you should abide by laws and regulations and shall not engage in any illegal or infringing behavior. You should ensure that you have the corresponding legal rights for the uploaded content or have obtained legal authorization from others and have the right to use it. This function. Otherwise, you will be responsible for all consequences, and you should fully compensate for any losses caused to "Yunzhiduan" or any third party.
- Yunzhiduan will do its best to use the content you have granted within the reasonable, necessary and express scope in accordance with these rules and statements, and your necessary authorization and consent will not change the ownership of the uploaded images.
- Except for the content you upload, all materials used in this function are fully copyrighted by Yunzhiduan. The AI images generated by you using the AI drawing function are limited to your personal entertainment, study, research or appreciation use and cannot be used for any commercial purposes. You must ensure that when you use this service to generate AI works, you shall not use the generated works for libelous, insulting, pornographic or any other illegal purposes, nor shall you infringe any copyright, trademark or other proprietary rights of any third party. , if any third-party rights and interests are damaged due to your improper use, you will bear the corresponding responsibilities according to law. "Yunzhiduan" will not be responsible or assume any legal liability.
- Personal information protection:
(1) We will use your personal information in accordance with applicable laws and regulations and any relevant confidentiality and security terms.
(2) We strictly abide by laws and regulations to protect your personal information, and use various security protection measures within a reasonable security level to ensure the security of your personal information to prevent the loss, improper use, unauthorized access or disclosure of information.
(3) If you have any questions or complaints about personal information protection, you can contact us. Please see the Privacy Policy for contact information.
- Face data policy:
- We analyze your photos and find the characteristic points of the face in the photo (such as eyes, nose, mouth points) for face processing. We do not collect face data. After the analysis process is completed, all data will be deleted and no data will be saved. Refusing to provide the above information may prevent you from using core functions, but it will not affect the normal use of other functions and services.
- The purpose and process of collecting facial data
In order to provide you with "face-changing" related effects, we need to find facial feature points (such as eyes, nose, mouth points)
The complete process is:
(1) You submit the selected photos to our server in an encrypted manner;
(2) The server analyzes the face data in your photos and applies it to the template you choose;
(3) After the synthesis is completed, the server will return the final rendering effect to you through the application;
(4) The final result of the synthesis (i.e. your work) will be temporarily stored in encrypted storage and will be permanently deleted after the production is completed.
After the synthesis process is completed, we will immediately delete the face image you submitted to the server.
- Face data sharing and storage
We will not share your facial data with any third party, nor will we store any facial information you submit. After the analysis process is completed, the photos you upload will be deleted.
7. Personal information we may share, transfer or disclose
6.1 Sharing
We take protecting your personal information very seriously. Except for the following circumstances, we will not share your personal information with any third party other than iwallpapers without your additional consent:
6.2 Necessary sharing with some of our partners . We may need to share your information with some partners for the purposes of necessary/reasonable business, meeting your requirements, fulfilling our obligations in the relevant user agreement or this policy, exercising our rights, or complying with legal regulations. , including: (1) sharing log information and device information with partners that provide data services (including online advertising monitoring, data statistics, data analysis, etc.) ; (2) providing product analysis services (including application crash analysis, network performance analysis, etc.) , domain name resolution optimization) share statistical data on your product usage (such as crashes, crashes) ; (3) share your relevant information with partners that provide marketing services (including advertising, marketing) ( Including: device information, mobile phone number) ; (4) Share with partners who entrust us with promotion how many people have viewed their promotional information or purchased products after seeing this information, or provide them with information that cannot identify individuals. Statistical information to help them understand their audiences or customers; (5) Other necessary sharing with some of our partners.
6.3 Necessary sharing with our related parties . In order for us to provide you with consistent services based on a unified account system and for you to conduct unified management, ensure system and account security, etc., your personal information may be shared between us and our affiliates as necessary, including: ( 1) In order to help you save time and simplify the operation process, you can log in without registering again after registering our iwallpaper mobile account. Your account-related information will be shared as necessary within the products of us and our affiliates; (2) In order to provide you with consistent content browsing, advertising and other service experiences on our and our affiliated party products and/or services.
6.4 To achieve other purposes described in the "How We Collect and Use Personal Information" section of Article 1 of this policy .
6.5 Fulfill our obligations and exercise our rights in this policy or other agreements we have reached with you .
6.6 To the extent permitted by laws and regulations, in order to comply with the law, protect us and our affiliates or partners, you or other iwallpaper users or the public's interests, property or safety from damage, such as to prevent fraud and other illegal activities activities and to reduce credit risk, we may exchange information with other companies and organizations. However, this does not include information that is sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this policy.
6.7 In response to your legitimate needs or with your authorization and consent.
6.8 Provide your information in response to the legal request of your guardian.
6.9 Provided according to the individual service agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents.
6.10 Provided based on academic research.
6.11 Provided based on social and public interests that comply with laws and regulations.
We will only share your personal information for legal, legitimate, necessary, specific and clear purposes. We will sign strict confidentiality agreements with the companies, organizations and individuals with whom we share personal information, requiring them to handle the information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.
6.13Transfer
- As our business continues to develop, we may engage in mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions . We will require new companies and organizations that hold your personal information to continue to be bound by this policy. Otherwise, we will require the company or organization to seek your authorization and consent again.
- After obtaining your explicit consent, we will transfer your personal information to third parties.
6.14Disclosure
- We will only disclose your personal information under the following circumstances and under the premise of taking security measures that comply with industry standards:
- Based on your needs, we will disclose the information you specify in the disclosure method you explicitly agree to.
- When it is necessary to provide your information in accordance with the requirements of laws, regulations, mandatory administrative enforcement or judicial requirements, we may disclose your information based on the required information type and disclosure method. Subject to complying with laws and regulations, when we receive the above request to disclose information, we will require the recipient to issue corresponding legal documents, such as a subpoena or a letter of investigation. We firmly believe that the information we are asked to provide should be as transparent as possible to the extent permitted by law. All requests are carefully reviewed to ensure they have a legitimate basis and are limited to data that law enforcement has a legal right to obtain for specific investigative purposes.
6.15 Exceptions to obtaining prior authorization and consent when sharing, transferring, and disclosing information
- In the following circumstances, sharing, transferring, and disclosing your information does not require your prior authorization and consent:
- Directly related to national security and national defense security;
- Directly related to public safety, public health, and major public interests;
- Directly related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and judgment execution;
- To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;
- Information that you disclose to the public on your own;
- Collect information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
- Relevant to our performance of obligations stipulated in laws and regulations.
- According to legal provisions, sharing, transferring, and disclosing de-identified personal information, and ensuring that the data recipient cannot recover and re-identify the information subject, does not constitute the external sharing, transfer, or public disclosure of personal information. The storage and processing will be without further notification to you and without your consent.
8. How we store and protect personal information
7.1 Storage of personal information
- Unless otherwise provided by laws, regulations or regulatory authorities, we will only store your personal information for the shortest period of time necessary for the purposes stated in this policy . If we terminate our services or operations, we will promptly stop collecting your personal information, comply with relevant laws and regulations and notify you in advance, and delete or anonymize your personal information after terminating our services or operations. Except as otherwise provided by laws, regulations or regulatory authorities.
- The personal information we collect and generate during our operations in the People's Republic of China is stored in China , except for the following circumstances:
- Laws and regulations have clear provisions;
- Obtain your authorization and consent;
- In response to the above situations, we will ensure that we comply with national laws, regulations and relevant regulatory authorities and provide adequate protection for your personal information.
7.2 Protection of personal information
We attach great importance to information security, have established a dedicated security team, and take all reasonable and feasible measures to protect your personal information:
- Data security technical measures
- We will adopt security protection measures that comply with industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from unauthorized access, use, modification, and avoid data damage or loss.
- Our services adopt a variety of encryption technologies. For example, in some iwallpaperservices, we will use encryption technology (such as SSL) to encrypt and save your personal information and isolate it through isolation technology to protect your personal information. information.
- When using personal information, such as information display and information correlation calculation, we will use a variety of data desensitization technologies to enhance the security of information in use.
- We will also use strict data access control and multi-identity authentication technology to protect personal information and avoid illegal use of data.
7.3 Other security measures we take to protect personal information
- We have an industry-leading data security management system that takes data as the core and revolves around the data life cycle to improve the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We manage and standardize the storage and use of personal information by establishing a data classification and classification system, data security management specifications, and data security development specifications.
- We implement comprehensive security controls on data through information contact confidentiality agreements, monitoring and auditing mechanisms.
- We will also hold security and privacy protection training courses to enhance employees’ security awareness and understanding of personal information protection policies and related procedures.
7.4 We only allow iwallpaper employees and partners who need to know this information to access your personal information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all persons who may have access to your personal information to fulfill corresponding confidentiality obligations. Failure to meet these obligations may result in legal liability or suspension of the partnership with iwallpapers.
7.5The Internet is not an absolutely secure environment, and it is impossible to determine whether the communication methods with other users such as email, instant messaging, social software or other service software are fully encrypted. We recommend that you use complex passwords when using such tools, and pay attention Keep your information safe. When communicating with a third party or purchasing goods and services through iwallpaper service, you will inevitably disclose your information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your information properly and provide it to others only when necessary.
7.6The Internet environment is not 100% safe. We will try our best to ensure or guarantee the security of the personal information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability.
7.7 Cancellation of account
You can log out of your account by entering "More" - "About Us" - click "Cancel Account", or "More" - click your avatar - click "Cancel Account" , or as specified in the privacy policy. Contact us or contact our online customer service staff to complete the cancellation process.
After we receive your request, all data in your account will be cleared within 24 hours, and this operation cannot be restored. Please note and know that you will back up all information related to your account before logging out, and please confirm that all services related to this account have been properly handled. After the logout is completed, we will delete your personal information or make it anonymous. Please know and understand that relevant log records will be retained for no less than 6 months in accordance with relevant laws and regulations.
7.8 Security incident handling
- In order to deal with possible risks such as leakage, damage and loss of personal information, we have formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding processing procedures. We have also established an emergency response team for security incidents. In accordance with the requirements of security incident handling specifications, we launch security plans for different security incidents, stop losses, analyze, locate, formulate remedial measures, and cooperate with relevant departments to trace the source and attack. We also regularly organize internal training and emergency drills to enable our relevant staff to master corresponding emergency response strategies and procedures.
- After an information security incident unfortunately occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the handling measures we have taken or will take, and suggestions for you to prevent and reduce risks on your own. , remedial measures for you, etc. We will also promptly notify you of the relevant information through emails, letters, phone calls, push notifications, etc. When it is difficult to inform the information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of information security incidents in accordance with the requirements of regulatory authorities.
- Please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the system and communication network you use to access iwallpaperservice may have problems due to circumstances beyond our control.
- Please be sure to keep your account number, password and other identity factors properly. When you use our wallpaper service, we will identify you through your account number, password and other identity factors. Once you disclose the aforementioned information, you may suffer losses and may be disadvantageous to you. If you find that your account number, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take appropriate measures in a timely manner to avoid or reduce related losses. 5. Provision of information
- Users of iwallpapers always have the choice whether or not to disclose information. Some information is required to register for our services, but most other information is provided at the user's discretion. iwallpapers will give top priority to user comfort and independent choice. iwallpapermay provide online interactive activities for users. In order to facilitate users to participate in interactive activities and obtain interactive prizes, iwallpaper usually requires applicants to provide contact information (mailing address and phone number). This information is used by iwallpapers to accumulate user data. If the User does not wish to provide the requested information and participate in such activities, this is entirely at the User's discretion.
- Minors’ information and use
- iwallpapersuggestion: Any minor participating in online activities should obtain the prior written consent of his or her parents or their legal guardian (hereinafter referred to as "Guardian"). iwallpaper will protect the relevant information of minors in accordance with relevant national laws and regulations.
- Cookies
- By using Cookies, iwallpaperprovides users with a simple and easy online experience . A cookie is a small amount of data that is sent to your browser from a web server and stored on your computer's hard drive. iwallpaper uses Cookies to benefit its users. Cookies can be used to help us improve our service by storing user preferences, improving user experience, and tracking user trends (such as how users use iwallpapers). Cookies can help us determine the pages and content you are connected to, the time you spend on specific iwallpaper pages and the iwallpaper services you have chosen. Cookies are ID cards placed on iwallpaper's computer or server. It can only be read by the server that set them up, and cannot execute any code or viruses. Cookies enable iwallpaper to serve you better and faster, and help you set some display settings for iwallpaper. However, you should be able to control whether and how Cookies are accepted by your browser. Please consult the documentation provided with your browser for more information on this.
- In short, our Wallpaper uses Cookies as a convenient experience so that users do not have to prove their identity when they switch from one Our Wallpaper service to another. You can refuse Cookies by modifying your browser settings. If you choose to refuse Cookies, you may not be able to log in or use iwallpaperservices or features that rely on Cookies.
9. We use our own COOKIES or similar technologies, which may be used for the following purposes:
8.1 Remember your identity. For example: COOKIES or similar technologies help us identify you as our registered user, or save other information you provide us about yourself;
8.2 Analyze your use of our services. We can use COOKIES or similar technologies to understand what activities you use our wallpaper services for, or which services are the most popular;
8.3 Advertising optimization. COOKIES or similar technologies help us provide you with advertisements that are relevant to you based on your information instead of general advertising. You can turn off advertising optimization through More – Authorization Settings – Turn off personalized preferences .
8.4 While we use COOKIES or similar technologies for the above purposes, we may provide aggregate non-personally identifiable information collected through COOKIES or similar technologies to advertisers and other partners for the purpose of analyzing how you and other users use iwallpaper services and for advertising.
8.5 There may be COOKIES or similar technologies placed by advertisers and other partners on iwallpaper service. The collection and use of such information by these third-party COOKIES or similar technologies is not subject to this policy, but is subject to its own information protection statement. Please read the relevant policies carefully.
8.6 Data security
- iwallpaperpromises to take reasonable and necessary precautions to protect user data security within the scope permitted by existing technology . However, all Internet service providers cannot guarantee 100% data security, so iwallpaper cannot make an absolute guarantee. On the basis of reasonable commercial operations, we will take as complete measures as possible to protect the data you store in iwallpaper Your personal information and data are subject to multiple levels of protection, including physical, electronic and procedural.
- If iwallpapers becomes aware of a security system breach, we may contact the email address you have provided us or post a notice on our website in an attempt to inform you and provide information about protective measures, if applicable.
8.7 Update and Disclosure of Information
- iwallpaperencourages users to update and modify their personal information to make it effective . Users can easily access and modify their personal information at any time. Users can modify or delete their relevant information at their own discretion. Please remember that whenever you voluntarily disclose personal information (such as publishing it online), such information may be collected and used by others, thus causing the disclosure of your personal information. iwallpaper is not responsible if you disclose your personal information. By publishing it on the above channels, you may cause personal information to be leaked. Therefore, we remind you and ask you to carefully consider whether it is necessary to disclose your personal information through the above channels .
- Ultimately, you are the only person responsible for maintaining the confidentiality of your account and password information . In any case, please keep it in a safe place.
8.8 Modifications and updates
- As this Privacy Policy may be updated from time to time, you should review it regularly to understand our plans and procedures for protecting the personal information we collect. Your continued use of the iwallpaperservice constitutes your agreement to this Privacy Policy and any updated versions thereof. Please contact us with questions about this statement or the privacy practices of iwallpaper
8.9 We have established a dedicated department for personal information protection and will protect your personal information in accordance with this policy. If you have complaints or reports about network information security, or if you have any questions, comments or suggestions about this policy, iwallpaper’s privacy measures, or your information-related matters, please contact the person in charge of personal information protection of iwallpaper , you can send an email to 2506588504@qq.com or customer service phone number 18059258938. Under normal circumstances, we will handle it within fifteen working days after receiving your questions, comments or suggestions and verifying your user identity. If you are not satisfied with our handling, you can also complain or report to the department that performs personal information protection responsibilities.
Company Name: Xiamen Yunzhiduan Technology Co., Ltd.
Company address: Unit 902, Building A, Sinotrans Building, No. 1032 Xiahe Road, Siming District, Xiamen City
This privacy policy will be updated and released on September 18, 2023 and will be effective at the same time.