Warranty

IZI IRIS Privacy Policy

Privacy Policy

Updated date: November 28, 2022

Effective date: April 15, 2022

[Foreword] IZI IRIS (referring to the IZI IRIS client program, hereinafter collectively referred to as "IZI IRIS" or "we") has always solemnly promised to protect the personal information and privacy of users using IZI IRIS service (hereinafter collectively referred to as "users" or "you"). When you use IZI IRIS services, we may collect and use your personal information. Through the IZI IRIS Privacy Policy (hereinafter referred to as this Policy), we would like to inform you of the rules governing our collection and use of your personal information and the ways in which we provide you with access, correction, deletion and protection of such personal information, so as to better protect your rights and interests.

[Special tips] Please read carefully and understand this Policy before using IZI IRIS services (for minors, please read with a guardian). Once you start to use or continue to use our products or services after we update this Policy, it means that you agree to this Policy (including the updated version) and agree that we collect, use, store, share, transfer and disclose your relevant personal information in accordance with this Policy (including the updated version). If you do not agree with the content of this Policy, it is possible that IZI IRIS will not function properly or will not achieve the results we intend to achieve with the services, and you should immediately stop accessing/using the IZI IRIS services.

After reading this Policy, if you have any questions about this Policy or matters related to this Policy, you may contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and we will answer these questions as soon as possible.

I. How do we collect and use your personal information

We collect your personal information primarily for the purpose of making it easier and more satisfying for you and other users to use the IZI IRIS services. IZI IRIS's goal is to provide all Internet users with a safe, fun and instructive online experience, and this information helps us achieve this goal.

(I) We will collect and obtain your personal information through the following ways:

1. The information you provide. For example:

(1) Information that you share with third parties through the IZI IRIS services and information stored when you use the IZI IRIS services.

Note: If you disclose your information in the information you upload or publish in the public area visible to other users in IZI IRIS services, or in your response to the information uploaded or published by others, such information may be collected and used by others. If you become aware that someone else is improperly collecting or using your information, you may contact us through the feedback channels listed in the "How to Contact Us" section of this Policy.

2. Your information shared by third parties. That is, the information shared about you by third parties when using the IZI IRIS services.

3. Your information obtained by us. The information we collect, aggregate, and record when you use IZI IRIS services, such as log information, location information, and device information.

(II) We may collect and use the following types of personal information about you for the following purposes:

We hope that the products and services we provide to you are perfect, so we will continue to improve our products and services, which means that as products and services iterate, expand, upgrade, etc., we may frequently launch new services or business functions or reclassify business functions, and may need to collect new personal information or change the purpose or manner in which personal information is used. If we want to use your personal information for other purposes not specified in this Policy or to collect additional personal information not mentioned in this Policy, we will obtain your consent separately through page prompts, interactive processes, announcements on this website or other means as required by law. Once you agree, such additional uses will be considered as part of this Policy and this Policy will also apply to such additional personal information. During this process, you may contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and we will answer you as soon as possible.

1. Maintain the normal operation of basic functions

During your use of our services, in order to provide you with basic functions such as browsing and searching, to identify abnormal account status, to understand product suitability, to ensure the network and operation security of IZI IRIS services, and to maintain the normal operation of the aforementioned basic functions, we may directly or indirectly collect, store and correlate information about the services you use and how they are used, including.

(1) Log information: When you use our services, we may automatically collect details of your use of our services and save them as relevant web logs. For example, your login account, search and query content, IP address, browser type, telecom operator, network environment, language used, access date and time and the browsing history of the web page you visited, push open record, length of stay, refresh record, publishing record, follow, subscription, favorites and share.

(2) Device information: We may receive and record information about the device you use. For example, device model, operating system and version, client version, device resolution, package name, device settings, process and software list, device identifier (IMEI/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information), hardware and software feature information, information about the device location (such as IP address, GPS location, and WLAN access point, Bluetooth, and base station sensor information that can provide relevant information).In order to collect the above basic personal device information, we will apply for permission to access your device information. We collect this information to provide you with our basic services and basic functions. If you refuse to provide the above permissions, you may not be able to use the IZI IRIS services.

Note: Individual device information and log information are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, such non-personal information will be treated as personal information during the combined use. Unless authorized by you or unless otherwise provided by laws and regulations, we will anonymize and de-identify such personal information. During the combined use, such information will be treated and protected as your personal information in accordance with this Policy.

2. Provide services to you

When you use IZI IRIS services, upload and/or publish information and perform related actions (for example, when you enter and/or upload voice, documents in the IZI IRIS services), we will collect the information you upload, publish or form, and use your nickname, avatar and published content for display. Note: The information you publicly publish may contain your personal information or personal sensitive information. Please consider it carefully before publishing. If the information you publish involves the personal information of others, you shall obtain the consent of others before publishing it.

3. Provide you with customer service or other user response functions

When you contact our customer service or use other user response functions (for example, to submit in-sale and after-sale applications, personal information protection complaints or suggestions, other customer complaints and needs), we may require you to provide the necessary personal information to match and verify your user identity, so as to protect your account and system security. We may also save your contact details (other contact information that you use to contact us or that you voluntarily provide to us), your communication/call records and content with us, and other necessary information associated with your requirements, so as to contact you or help you solve problems, or record the solutions and results of related problems.

4. Your personal information that we collect indirectly

Based on the IZI IRIS services you choose to use, we may obtain relevant information that you authorize to share from affiliates and third-party partners. For example, when you use a third-party platform account to log in to the IZI IRIS services, we will obtain information under that third-party account based on your authorization (including username, nickname, and avatar, which is subject to your authorization) and bind your third-party account to your IZI IRIS services account after you agree to this Policy, so that you can log in and use the IZI IRIS services directly through the third-party account. We will collect and use your information in compliance with relevant laws and regulations, in accordance with our agreements with our affiliates or third-party partners and in the belief that the information they provide is from legitimate sources.

5. Provide you with safety guarantee

In order to improve the security of your use of the services provided by us and our partners, protect the personal and property safety of you or other users or the public, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, and more accurately identify violations of laws and regulations or the rules of agreements related to IZI IRIS services, we may collect, use or integrate your account information, transaction information, device information, log information, and personal information shared by our affiliated companies and partners based on your authorization or in accordance with the law, to comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

You understand and agree that after collecting your personal information, we will de-identify the data through technical means, and the de-identified personal information will not be able to identify you, in which case we have the right to use the de-identified personal information to analyze and commercially use the user database.

6. You understand and agree that some individual services may require you to enable specific access permissions in your device to enable the collection and use of information covered by those permissions. For example:

(1) If we access your location information, you can associate the location information with Bluetooth and WiFi for scanning and connecting to nearby Bluetooth or WiFi devices;

(2) If we access your camera, you can take pictures and videos through the camera and store them on your mobile phone;

(3) If we access your album, you can access the pictures or videos on your mobile phone for display or sharing on the APP;

(4) If we access your microphone, you can record audio while shooting video;

(5) We can access your photos, media content, files and other information after you allow us to enable storage access permission, which is to make it easier for you to share and store your photos and videos taken with IZI IRIS at any time;

(6) If you allow us to enable the telephone access permission (Android system), we will obtain the unique identification information of the device, which is only used for statistics of user usage. You can also disable the access permissions in Settings.

When you need to disable any function permissions, most mobile devices will support this requirement. Please refer to or contact the service provider or manufacturer of your mobile device for specific methods. Note: By enabling any of the access permissions, you authorize us to collect and use the relevant personal information to provide you with the corresponding services. Once you disable any access permission, you have canceled the authorization. We will no longer collect and use the relevant personal information based on the corresponding permission, and cannot provide you with the services corresponding to that permission. However, your decision to disable access permission will not affect previous collection and use of personal information based on your authorization.

7. Exceptions for obtaining authorized consent

According to the relevant laws and regulations, your authorized consent is not required to collect your information in one of the following cases:

(1) Directly related to national security and national defense security;

(2) Directly related to public security, public health and major public interest;

(3)Directly related to criminal investigation, prosecution, trial and judgment execution;

(4) For the protection of your or other people's life, property and other significant legal rights and interests, but it is difficult to obtain your or other people's consent;

(5) The personal information collected is disclosed to the public by you;

(6) Necessary to sign and perform contracts according to your requirements;

(7) Necessary to maintain the safe and stable operation of IZI IRIS services, such as finding and handling the product or service failures;

(8)Other circumstances as prescribed by laws and regulations.

10. Tips on sensitive personal information

Sensitive personal information refers to personal information that may endanger the safety of persons and property if leaked, illegally provided or misused, and is highly likely to lead to damage to personal reputation, physical and mental health or discriminatory treatment, etc. The above information provided by you or collected by us may contain your sensitive personal information, including name, ID card number, purchase history, transaction information, browser history and location information. Please exercise caution and pay attention to your sensitive personal information, and you agree that we may handle your sensitive personal information for the purposes and in the manner described in this Policy.

 

II. Personal information we may share, transfer and disclose

(I) Sharing

We attach great importance to protecting your personal information. We will not share your personal information with any third party other than us and our affiliates without your consent, except in the following cases:

1. Provide you with our services. We may share your information with partners and other third parties to realize the functions of IZI IRIS services, so that you can normally use the services you need. For example, payment institutions providing payment services, partners providing data services (including online advertisement supervision, data statistics, data analysis), third-party logistics companies;

2. Maintain and improve our services. We may share your personal information with partners and other third parties to help us provide you with more targeted and improved services, such as communication service providers that send emails or push notifications on our behalf;

3. Share with third parties who entrust us with promotion, so that the entrusting party can understand the coverage and effectiveness of promotion. For example, we can inform the entrusting party how many people have viewed their promotion information or purchased the goods of the entrusting party after seeing the information, or provide them with non-personally identifiable statistical information to help them understand their audience or customers;

4. Necessary sharing with affiliates. Your personal information may be shared between us and our affiliates as necessary to enable us to provide you with consistent services based on a unified account system and to enable you to manage and secure your system and account.

5. Achieve other purposes described in the "How We Collect and Use Personal Information" section of Article 1 of this Policy;

6. Fulfill our obligations and exercise our rights in this Policy or other agreements we have entered into with you;

7. To the extent permitted by laws and regulations, we may exchange information with other companies and organizations in order to comply with the law, to protect us and our affiliates or partners, you or other IZI IRIS users or the public from harm to the interests, property or safety, for example, to prevent illegal activities such as fraud and to reduce credit risk. However, this does not include information sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this Policy;

8. Upon your legitimate request or with your authorized consent;

9. Provide your information at the legal request of your guardian;

10. Provide in accordance with the individual service agreement with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents;

11. Provide based on academic research;

12. Provide based on social and public interests in compliance with laws and regulations.

We will only share your personal information for lawful, justified, necessary, specific and explicit purposes. For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to handle personal information in accordance with our instructions, this Policy and any other relevant confidentiality and security measures.

(II) Transfer

1. With the development of our business, we may enter into mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will ask the new company or organization that holds your personal information to continue to be bound by this Policy, or we will ask that company or organization to ask for your authorized consent again.

2. After obtaining your explicit consent, we will transfer your personal information to other parties;

(III) Disclosure

We will only disclose your personal information under the following circumstances and on the premise of taking safety protection measures in line with industry standards:

1. Upon your request, disclose the information you specify in the manner of disclosure to which you have expressly consented;

2. When it is necessary to provide your information according to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may disclose your information according to the requested information type and disclosure manner. Subject to laws and regulations, when we receive the above request for disclosure of information, we will require the receiving party to produce corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that the information requested from us should be as transparent as possible to the extent permitted by law. All requests are carefully reviewed to ensure that they have a legitimate basis and are limited to data that law enforcement has a legitimate right to obtain for specific investigative purposes.

(IV) Exceptions to prior authorized consent for sharing, transferring, or disclosing information

Your prior authorized consent is not required for the sharing, transfer, or disclosure of your information in the following circumstances in the following cases:

1. Directly related to national security and national defense security;

2. Directly related to public security, public health and major public interest;

3. Directly related to administration of justice or administrative law enforcement such as criminal investigation, prosecution, trial and judgment execution;

4. For the protection of your or other people's life, property and other significant legal rights and interests, but it is difficult to obtain your or other people's consent;

5. Your personal information disclosed to the public by yourself;

6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

7. Related to our performance of obligations under laws and regulations.

According to the law, the act of sharing and transferring and disclosing personal information that has been de-identified and ensuring that the data receiver cannot recover and reidentify information subjects does not belong to the external sharing, transfer and public disclosure of personal information. Therefore, the storage and processing of data do not require further notice to you or your consent.

III. How do we store and protect personal information

(I) Storage of personal information

Unless otherwise stipulated by laws, regulations or regulatory authorities, we only store your personal information within the shortest time limit necessary for the purposes stated in this Policy. If we terminate the service or operation, we will promptly stop the collection of your personal information, and we will notify you in advance in accordance with relevant laws and regulations, and delete or anonymize your personal information after the termination of the service or operation, unless otherwise stipulated by laws, regulations or regulatory authorities.

Personal information collected and generated during our operations in the People's Republic of China is stored in China, except in the following cases:

1. It is explicitly stipulated by laws and regulations;

2. Obtain your authorized consent;

3. The IZI IRIS services you use involve cross border, and IZI IRIS is required to provide your personal information to foreign countries.

In the above cases, we will ensure that it is implemented in accordance with national laws and regulations and the provisions of relevant regulatory authorities, and provide adequate protection for your personal information.

(II) Protection of personal information

We attach great importance to information security and have established a dedicated security team and are taking all reasonable and practicable measures to protect your personal information as follows:

1. Technical measures for data security

We will use security measures in accordance with industry standards, including the establishment of reasonable institutional norms, security technology to prevent unauthorized access, use, modification of your personal information to avoid damage or loss of data.

Our services use a variety of encryption technologies. For example, in some IZI IRIS services, we will use encryption technology (such as SSL) to encrypt and save your personal information, and isolate it through isolation technology to protect your personal information.

When using personal information, such as information display and information correlation calculation, we will use a variety of data desensitization technologies to enhance the security of information in use.

We will also use strict data access control and multiple authentication technologies to protect personal information and prevent unauthorized use of data.

2. Other security measures we take to protect personal information

We have an industry-advanced data security management system with data as the core and around the data life cycle, which improves the security of the overall system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We have established data classification and staging system, data security management norms, data security development norms to regulate the storage and use of personal information.

We conduct comprehensive security control over data through the information confidentiality agreement, monitoring and audit mechanism.

We will also organize security and privacy protection training courses to enhance employees' security awareness and understanding of personal information protection policies and relevant procedures.

3. We only allow NetEase employees and partners who need to know this information to access your personal information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to fulfill corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or suspension of the partnership with us.

4. The Internet environment is not absolutely safe, and it is impossible to determine whether the communication with other users by email, instant messaging, social software or other service software is fully encrypted. We recommend that you use complex passwords when using such tools, and pay attention to keeping your information safe. When communicating with a third party or purchasing goods and services through IZI IRIS services, you are inevitably required to disclose your own information, such as contact information or postal address, to the counterparty or potential counterparty. Please properly protect your information and provide it to others only when necessary.

5. The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of the personal information you send to us. If our physical, technical or management protection facilities are damaged so that the personal information is subjected to unauthorized access, public disclosure, tampering or destruction, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liabilities.

6. Security incident handling

In order to deal with possible risks such as leakage, damage and loss of personal information, we have developed a number of systems to clarify the classification and grading standards for security incidents and security vulnerabilities and the corresponding processing flow. We have also established an emergency response team for security incidents. In accordance with the requirements of security incident handling specifications, we have activated security preparedness for different security incidents to stop losses, analyze, locate, formulate remedial measures, and cooperate with relevant departments to trace and crack down. We also regularly organize internal training and emergency drills to enable our relevant staff to master the corresponding emergency disposal strategies and procedures. In the event of an unfortunate information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: basic information and possible impact of a security incident, disposal measures we have taken or will take, suggestions on risk prevention and reduction, remedial measures for you, etc. Meanwhile, we will promptly inform you of the relevant information of the event by email, letter, telephone, or push notification. If it is difficult to inform the information subjects one by one, we will make public announcements in a reasonable and effective manner. Meanwhile, we will also take the initiative to report the handling of information security incidents in accordance with the requirements of regulatory authorities.

Please understand that we cannot always guarantee 100% security of information due to technical limitations and risk prevention limitations, even if we have tried to strengthen security measures. You need to understand that the system and communication network you use to access the IZI IRIS service may occur problems due to circumstances beyond our control.

Please be sure to keep your account, password and other identity elements. When you use the IZI IRIS services, you will be identified by your account, password and other identity elements. Once you disclose the aforementioned information, you may suffer losses, and it may work against you. If you find that your account, password and/or other identity elements may be or have been leaked, please contact us immediately so that we can take corresponding measures in time to avoid or reduce the related losses.

IV. How to Manage Your Personal Information

We encourage you to update and modify your personal information to make it more accurate and effective. Please also understand that your decision to correct, delete, withdraw your authorization or stop using IZI IRIS services will not affect our previous personal information processing based on your authorization. Unless otherwise contained in laws and regulations, when you correct or delete your personal information or apply for account cancellation, we may not immediately correct or delete the corresponding personal information from the backup system, but will correct or delete the personal information when the backup is updated.

You can manage your personal information in the following ways:

(I) Access, correct and delete your personal information

You can access your personal information through IZI IRIS services, and modify, supplement and delete your personal information by yourself or via us by the management method of corresponding personal information. We will take appropriate technical means or provide contact channels for submitting applications to ensure that you can access, update and correct your personal information or other personal information provided when using IZI IRIS services.

When accessing, correcting and deleting the aforementioned personal information, we may request you to verify your identity to assure the security of your personal information. If you have any doubts or difficulties during the operation, you can contact us through the contact information contained in "how to contact us" of this Policy. Under the following circumstances, you can request us to delete your personal information:

1. If our processing of personal information violates laws and regulations;

2. If we collect and use your personal information without your consent;

3. If our processing of personal information violates our agreement with you;

4. If we no longer provide IZI IRIS services to you.

If we decide to respond to your request for deletion, we will also notify the subjects who obtain your personal information from us as much as possible and ask them to delete it in time (unless otherwise contained in laws and regulations, or these subjects have obtained your authorization independently)

(II) Publicity and sharing of our services allow you to share your relevant information not only with your social network, but also with all users of the services, such as the information you upload or publish in the IZI IRIS services, your response to the information uploaded or published by others, your information uploaded or published by email or in the public area not visible to specific users in the IZI IRIS services, and the location data and log information related to these information. As long as you do not delete the information you disclose or share, the relevant information may remain in the public domain; even if you delete the shared information, the relevant information may still be cached, copied or stored independently by other users or third parties not under our control, or stored in the public domain by other users or such third parties. If you disclose or share your personal information through the above channels, we will not be liable for the disclosure of your personal information. Therefore, we remind and request you to carefully consider whether to disclose or share your personal information through the above channels.

(III) Change the scope of your authorization and consent

You can always choose whether to disclose personal information. The provision of some personal information is essential for IZI IRIS services, but that of most of the personal information depends on you. You can change the scope of your authorization for us to continue to collect personal information or withdraw your authorization by deleting personal information, turning off device functions, etc.

After the authorization is withdrawn, we cannot continue to provide you with the services corresponding to the withdrawal of authorization, nor will we process your corresponding information. However, your decision to withdraw the authorization will not affect the information processing based on your authorization.

1. Cancel the authorization of mobile phone permissions

You can cancel the authorized permissions in "Settings - Application Management - Application Information - Permissions" on your phone.

2. Cancel the consent to the Privacy Policy

You can clear the data in "Settings - Application Management - Application Information - Storage", or uninstall the APP to relax the authorization to cancel the privacy policy. If you need to cancel your account, you can follow the "Account Cancellation" instructions above.

(V) Respond to your above request

For security, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. For your reasonable request, we do not charge any fee in principle, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. We may refuse requests that are unreasonably repeated, require too many technical means (e.g., need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very unrealistic (e.g., involve information stored on backup tapes).

We will not be able to respond to your request under the following circumstances:

1. If it is related to our performance of our obligations under laws and regulations;

2. If it is directly related to national security and national defense security;

3. If it is directly related to public safety, public health and major public interests;

4. If it is directly related to criminal investigation, prosecution, trial and execution of judgment;

5. If we have sufficient evidence that you have subjective malice or abuse of rights;

6. If it is difficult to obtain your consent for the purpose of safeguarding your or other personal life, property and other major legal rights and interests;

7. If responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;

8. If it involves business secrets.

V. Description of the Permissions Applied for When Using:

1. Read phone status and identity

Get the unique identification information of the device, which is only used for statistics of usage.

2. Get storage permission of mobile phone

For storing photos, videos and other files.

3. Get location permission

For Bluetooth search or WiFi device search. It is determined by the mechanism of the Android system, and the device search must obtain the location permission.

4. Bluetooth search permission

The Bluetooth search permission is an essential permission for Android 12 or above to get the search results of Bluetooth devices. The application needs the Bluetooth search permission before completing the search of Bluetooth devices, and then a connection can be established for communication commissioning.

5. Bluetooth connection permission

Bluetooth connection permission is an essential permission for Android 12 or above to connect with Bluetooth devices. The application needs Bluetooth connection permission before a connection is established for communication commissioning.

6. Get camera permission

For camera work.

7. Get microphone permission

For audio making during recording.

VI. Third-party Services

IZI IRIS services may access or link to social media or other services (including websites or other service forms) provided by third parties. Including:

(I) You can use the "Share" button to share certain content to third-party platforms, or use third-party services to log in to IZI IRIS services. These functions may collect your personal information (including your log information), and may install COOKIES in your device to operate the above functions normally;

(II) We provide you with links through other means of services, so that you can link to third-party services or websites;

(III) Other situations of accessing third-party services. For instance, in order to achieve the purposes mentioned in this Policy, we may access SDKs or other similar applications (e.g. embedded codes, plug-ins, etc.) provided by third-party service providers to provide you with better customer service and user experience. At present, the third-party service providers we access mainly include the following types:

1. For message push function, including information push by mobile phone manufacturer, specific event reminder, etc.;

2. For payment related services, including order payment, transaction behavior verification, income settlement, payment information summary and statistics, etc.;

3. To get device location permission, and collect device information and log information with your consent;

4. For third-party authorization services, including third-party account login, sharing relevant content to third-party products, etc.;

5. To support product function modules, including voice recognition, image recognition, translation, online customer service, connecting intelligent hardware, etc.;

6. To optimize the product performance, including improving the hardware distribution network capacity, reducing the server cost, functional hot repair, etc.;

7. For account security and product reinforcement related services, including network monitoring, domain name resolution, anti-hijacking, anti-spam and anti-cheating, encryption and decryption services.

(IV) Some third-party SDKs or similar applications we access may collect your personal information (including but not limited to IMEI, IMSI, device MAC address, software list, device serial number, and Android ID). If you use such services provided by a third party in our services, you agree that it will directly collect and process your information. We will assess the legality, legitimacy and necessity of personal information collected by such third-party services, request such third parties to take protective measures for your personal information, and strictly comply with relevant laws, regulations and regulatory requirements. The names and collection purposes of the third-party SDK we currently use are mentioned below. If you have any questions about third parties collecting your personal information through the SDK, please refer to the Privacy Policy of these third parties.

1. Umeng SDK

Type of information collected: list of installed applications, device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information, etc.)

Collection purpose: to provide statistical analysis services, calibrate the accuracy of report data through geographical location, and provide basic anti-cheating ability.

Collection method: SDK automatic collection

Privacy Policy Link:https://www.umeng.com/page/policy

2. Bugly SDK

Type of information collected: list of installed applications, device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information, etc.), Phone model, phone brand, Android system version, Android system API level, manufacturer system version, CPU architecture type, process name and PID of the application currently running, network type

Collection purpose: Troubleshooting crash issues to help improve app stability.

Collection method: SDK automatic collection

Privacy Policy Link:https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56

3. Mob SDK

Type of information collected: device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information, etc.), network status information, iOS Identifier for Advertising (IDFA), International Mobile Equipment Identity (IMEI), Open Anonymous Device Identifier (OAID), International Mobile Subscriber Identity (IMSI)

Collection purpose: to push relevant SMS / provide authentication services and assure the accuracy of billing

Collection method: SDK automatic collection

Privacy Policy:https://www.mob.com/about/policy

4、Meishe SDK

Type of information collected: device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information, etc.), Location Information (GPS location, WLAN access point, bluetooth and base station information)

Collection purpose: to authorize the app to edit videos and share videos

Collection method: SDK automatic collection

Privacy Policy:https://www.meishesdk.com/privacy.html

VII. Notices and Amendments

To provide you with better services, the terms of this Policy may be amended in due time according to the update of IZI IRIS's services and the relevant requirements of laws and regulations. Such amendments form a part of this Policy. We will publish any changes to this Policy on this page. For major changes, we will also provide more significant notices (including website announcements, push notifications, pop-up prompts or other methods). The major changes referred to in this Policy include but are not limited to:

1. Major changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, and the use mode of personal information;

2. Major changes in our ownership structure. Such as changes in owners caused by business adjustment, bankruptcy and merger;

3. Major changes in the main objects of personal information sharing, transfer or public disclosure;

4. Major changes in your rights to participate in the processing of personal information and the way in which you exercise them;

5. Changes in the responsible department responsible for handling personal information security, as well as its contact information and complaint channels;

6. Other important changes that may seriously affect your personal rights and interests.

If you do not agree with such changes, you can choose to stop using IZI IRIS services; if you continue to use IZI IRIS services, it means that you have fully read, understood and agreed to be bound by the revised policy.

Any changes we make will put your satisfaction first. We encourage you to check our privacy policy whenever you use IZI IRIS services.

VIII. How to Contact Us

Company: IZI Ventures Private Limited. Company Incorporated

If you have any questions or concerns about our privacy policy or data processing, please contact us via email: customer@izicart.com.