Privacy Policy

When you use our services, we may collect and use your relevant information. This Privacy Policy aims to explain how we collect, use, store, and share this information when you use our services. It also outlines how you can access, update, control, and protect your information. This Privacy Policy is closely related to the services you use, so we encourage you to read it carefully and make appropriate choices according to its guidance when necessary. We strive to use concise language and provide further explanations through links for better understanding of the technical terms used in this Privacy Policy. By using or continuing to use our services, you agree that we may collect, use, store, and share your relevant information in accordance with this Privacy Policy. If you have any questions about this Privacy Policy or related matters, please contact us at [email protected].

Definitions and Interpretations

  1. Personal Information: Personal information refers to various information recorded electronically or by other means that is related to identified or identifiable natural persons, excluding information that has been anonymized.
  2. Sensitive Personal Information: Sensitive personal information refers to personal information that, once disclosed or unlawfully used, could easily lead to harm to the dignity, personality, or physical and property safety of natural persons. The specific handling of personal information or sensitive personal information by our products or services is subject to this Privacy Policy and related documents.
  3. Data Subject: Data subject refers to the natural person identified by personal information.
  4. Device: A device refers to a device that can run our app, such as a desktop computer, laptop, tablet, or smartphone.
  5. Unique Device Identifier: A unique device identifier (UDID or UUID) is a string of characters embedded by the device manufacturer in the device. It can uniquely identify the corresponding device (mobile device ID, including IMEI number and MAC address). Unique device identifiers serve various purposes, including providing advertising when cookies cannot be used.
  6. Camera Permissions: Camera permissions involve obtaining access to your phone's camera to capture personal photo images for creating identification photos.
  7. IP Address: Each internet-connected device is assigned a number called an Internet Protocol (IP) address. These numbers are usually assigned based on geographical regions and can be used to identify the location of a device when connected to the internet.
  8. GPS: Global Positioning System (GPS) is a technology where the GPS signal receiver on your device receives signals from GPS satellites to calculate your location.
  9. WiFi: Wi-Fi is a technology that allows electronic devices to connect to a wireless local area network (WLAN), often referred to as wireless networks.
  10. Base Station: A base station, also known as a public mobile communication base station, is a form of radio station that facilitates information exchange between mobile terminals within a certain radio coverage area through a mobile communication exchange center.
  11. SSL: SSL (Secure Socket Layer) is a security protocol implemented on the Transport Layer (TCP/IP). SSL supports various types of networks and provides three basic security services that use public key and symmetric key technologies to achieve information confidentiality.
  12. De-identification: De-identification refers to the process of processing personal information in a way that it cannot identify a specific natural person without additional information.
  13. Anonymization: Anonymization refers to the process of processing personal information in a way that it cannot identify a specific natural person and cannot be reversed.
  14. HTTPS: HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer) is a secure version of HTTP (Hypertext Transfer Protocol) that aims to secure the communication channel. In simple terms, it is the secure version of HTTP.
  15. Personal Information Collection Technologies: The "collection" mentioned in this Privacy Policy includes the following technological methods used by the Identification Photo Assistant: