Ifun Privacy Policy
Release Date: October 11, 2023
Effective Date: October 11, 2023
Version: v20241101
This document was updated on November 1, 2024. Please take some time to read it carefully. If you have any questions, please contact us.
The "Ifun Privacy Policy" (hereinafter referred to as "this Policy") applies only to the Ifun products and/or services provided to you by Ninesence (Shenzhen) Technology Co., Ltd. (hereinafter referred to as "we" or "us"). Before using this software, please read this Policy carefully to understand how we handle your personal information. Important content related to personal sensitive information and your personal information rights has been highlighted in bold, please pay special attention. If you are a minor under 14 years old, please read and fully understand this Policy accompanied by your parents or other guardians, and use Ifun products and/or services after obtaining their consent.
Special Reminders:
- Your agreement to this Policy only means that you have understood the functions provided by Ifun and the necessary personal information required for these functions to operate.
- For personal sensitive information, we will separately obtain your consent through a pop-up window before collection.
- The corresponding device permissions will not be enabled by default. When important or sensitive device permissions are involved, we will enable them after obtaining your separate consent through a pop-up window when you use the corresponding business functions. After the permissions are enabled, you can disable them at any time on the "My - Settings - System Permission Settings" page or on the device system permission settings page. If you do not agree to enable the permissions corresponding to a certain business function, it will not affect the normal use of other unrelated business functions.
This Policy will help you understand the following contents:
- Definitions and Interpretations
- How We Collect and Use Your Personal Information
- How We Share, Transfer, and Disclose Your Personal Information
- How We Protect Your Personal Information
- How We Store Your Personal Information
- How You Can Exercise Your Personal Information Rights
- How We Protect Minors' Personal Information
- How Your Personal Information Is Transferred Globally
- How We Update This Policy
- Integration of Third-Party Application SDK
- How to Contact Us
- Others
I. Definitions and Interpretations
- Ifun Products and/or Services: Including Ifun App (hereinafter referred to as "this Software") and products and/or services provided by the Ifun website https://www.ninesence.com/.
- Ifun Service: Refers to the services provided by the operator of Ifun, Ninesence (Shenzhen) Technology Co., Ltd., hereinafter referred to as "this Service".
- Jiuwei Shengtong (Shenzhen) Technology Co., Ltd.: The operator of Xiaoxi Aiwan, specializing in the research of intelligent voice and language technology, software product development, and voice information services. Registered address/regular office address: Room 502, Block A, Tangshang Technology Building, No. 139 Yiyuan Road, Majialong Community, Nantou Street, Nanshan District, Shenzhen City. Contact number: 0755-26606617; If you would like to learn more about our company or platform in detail, you can contact us through the contact information provided in Chapter 11 of this policy.
- User: Refers to users who register, log in, and use this Software and enable, browse, or upload data to the Ifun service. In this Policy, more often referred to as "you".
- Affiliated Company: Refers to any party that directly or indirectly controls us, is controlled by us, or is under common control with us. Here, "control" and "controlled" refer to the right to direct a party's management policies through voting rights, contracts, or other means.
- Account: Refers to the user account you own after completing real information registration, which is kept by you; you should be legally responsible for all actions under your account.
- Personal Information: Personal information is various information recorded electronically or otherwise that can identify a natural person or reflect the activities of a specific natural person, excluding information that has been anonymized. For the avoidance of doubt, personal information includes but is not limited to sensitive personal information.
- Sensitive Personal Information: Sensitive personal information is personal information that, once leaked or illegally used, may easily lead to infringement of a natural person's personal dignity or endanger personal or property safety, including biometric identification, religious beliefs, specific identity, medical health, financial accounts, tracking information, and personal information of minors under the age of fourteen.
- Processing of Personal Information: Processing of personal information includes the collection, storage, use, processing, transmission, provision, disclosure, and deletion of personal information.
- Personal Information Processor: A personal information processor refers to an organization or individual that independently determines the purpose and method of processing in personal information processing activities.
- Personal Information Subject: The personal information subject refers to the natural person identified or associated with the personal information.
- Automated Decision-Making: Automated decision-making refers to activities that use computer programs to automatically analyze and evaluate a person's behavior habits, interests, hobbies, or economic, health, and credit status, and make decisions.
- De-identification: De-identification refers to the process of processing personal information so that it cannot identify a specific natural person without the aid of additional information.
- Anonymization: Anonymization refers to the process of processing personal information so that it cannot identify a specific natural person and cannot be restored.
- Device: Device refers to equipment that can be used to access the Ifun service, such as desktop computers, laptops, tablets, or smartphones.
- Unique Device Identifier: A unique device identifier (exclusive ID or UUID) is a string of characters embedded in the device by the device manufacturer and can be used to uniquely identify the corresponding device (IMEI number of mobile devices). Unique device identifiers have multiple uses, including providing advertisements when cookies cannot be used.
- IP Address: Each device connected to the internet is assigned a number called an Internet Protocol (IP) address. These numbers are usually assigned according to geographic areas. IP addresses can often be used to identify the location where a device connects to the internet.
- SSL: SSL (Secure Socket Layer) is a security protocol implemented on the Transmission Control Protocol/Internet Protocol (TCP/IP). SSL supports various types of networks and provides three basic security services, all of which use public key and symmetric key technology to achieve information confidentiality.
- Information Collection Technologies: The "automatic collection" described in this Policy includes the following methods:
- Cookie: A cookie is a small text file that a website server places on the client (your computer, mobile phone, or other smart terminal) when you browse a webpage, which can be used to improve your user experience.
- Log Files: Log files store several data collected automatically. These data include Internet Protocol (IP) addresses, browser types, Internet Service Providers (ISP), referring/exit pages, operating systems, date/time stamps, and clickstream data.
- ET Tag (Entity Tag): An ET Tag is an HTTP protocol header transmitted behind the scenes between the internet browser and the internet server, which can replace cookies to track individual users, allowing us to gain a deeper understanding and improve our services.
- JavaScript: JavaScript is a programming language used to create more interactive and dynamic webpages. JavaScript can set, read, and delete cookies.
II. How We Collect and Use Your Personal Information
As a personal information processor, we will adhere to the principles of legality, legitimacy, necessity, and integrity, and collect and use your personal information for the purposes described below.
1. Scope of Necessary Personal Information
According to the "Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications," Ifun belongs to the "Utility Tools" category of apps. The complete functional services of Ifun include account registration/login, connecting earphones, recording, voice-to-text conversion, and contacting customer service. You only need to provide us with the basic necessary personal information corresponding to each function, except as otherwise required by relevant laws, regulations, and normative documents. If you refuse to provide it, we will not be able to provide you with the corresponding functional services. Please note: If you provide personal information that is not your own, please ensure that you have obtained the consent of the relevant subject. The details of Ifun's complete functions and the personal information required are as follows:
1.1 Account Registration/Login:
- Information Range
To ensure the security of your personal space usage, you need to register and log in to a "Ifun account" before you can normally use other services after registration and login, including network synchronization and voice-to-text services. When registering and logging in, you need to provide us with your mobile phone number and enter a SMS verification code so that we can verify your user identity. This information is necessary for this function; if you do not provide it, you will not be able to complete registration/login. Your account and password will be encrypted and stored on our servers; only you can use them. We recommend that you keep your password information safe to prevent your account from being stolen by others.
- Permissions Called
When you manage cloud space after logging in, you need to scan the QR code on the web page to enter the cloud space. In this process, we need to call your camera permission, which is a necessary system permission for scanning and entering the cloud space. If you refuse, you will not be able to enter the cloud space.
1.2 Connecting Earphones:
- Necessary and Non-necessary Information Range
When you connect the earphones, we will collect your connection log data and earphone device information (device SN and MAC address) to pair and connect the software with the earphones. This information is necessary for the earphone connection function service. Please be aware that when you encounter problems during use that require our intervention to resolve, we need you to provide the aforementioned information.
After completing the earphone pairing connection, we will only perform real-time data transmission via Bluetooth when you use the software, including transmitting earphone device information obtained directly through the earphones and voice information recorded using the earphones, and store it in the cloud after you enable cloud space, so that you can quickly edit, play back audio, and download backup data from the cloud space. This information is necessary for the file transfer service. If you refuse to provide this information, you will not be able to use the file transfer service, but it will not affect your connection to the earphones.
- Permissions Called
When you connect the earphones for the first time, we need to call your Bluetooth permission, storage permission, and location permission (Android only). The Bluetooth permission is necessary for the earphones to connect and communicate with the phone; the storage permission is necessary to cache the earphone security verification binding code and store call records and upgrade package files to ensure the normal operation of related functions; the location permission is necessary to start the ultra-low-power Bluetooth protocol, used for the Bluetooth component to recognize devices in the area and establish connections during operation. The above permissions are necessary system permissions for the device to connect the earphones to the phone for normal use. If you refuse, you will not be able to use the corresponding functions.
1.3 Recording (After Connecting Earphones):
- Information Range
When you use the recording function services (including call recording, audio and video recording, on-site recording scenarios), we will collect your voice information and/or other recording content you provide. This information is necessary for recording; if you refuse to provide it, you will not be able to use the recording function. Please be aware that the recording information you input yourself will only be stored on the device side (earphones or local phone). After you enable cloud space, your recording information will be stored in the cloud, allowing you to quickly access, edit, playback audio, and download backup data from the cloud space.
You can also use the earphones alone for recording (flash recording function). After recording is completed, the audio data will be stored locally on the earphones. You can import the audio data from the earphones into the software after connecting the earphones to the software, and store it locally on the phone or upload it to the cloud storage after enabling cloud space.
- Permissions Called
When you use the recording function, we need to call your microphone permission to obtain your voice information, which is a necessary system permission for this function service. If you refuse, you will not be able to use the corresponding functions. When you use the recording storage function service, we need to call your storage permission/SD card permission to store your voice information, which is a necessary system permission for this function service. If you refuse, you will not be able to use the recording storage function.
- Third-party SDK Used
The recording location tagging function is implemented through the Amap (Gaode Map) positioning SDK, which will directly collect and process your location information to achieve the function of tagging the recording location during recording. You can prevent it from collecting your location information by refusing system permissions.
1.4 Voice-to-Text Conversion (After Connecting Earphones):
- Information Range
When you use the voice-to-text conversion function service, we will collect your voice information and/or other recording content you provide for speech transcription on the cloud server. At the same time, we will collect the transcribed text information for you to view the voice-to-text results. This information is necessary for the voice-to-text function; if you cannot provide it, you will not be able to use the voice-to-text function.
- Permissions Called
The permissions called by this function service are the same as those of the recording function service.
1.5 Message Sending:
- Information Range
When you use the message sending function service, we will collect task running process information and send system messages directly related to the software's operation to your device desktop. This information is necessary for message sending; if you refuse to provide it, you will not be able to use the message sending function.
- Permissions Called
When you use the message push function service, the third-party SDK will call your system notification permission. This is a necessary system permission for message sending. If you refuse, you will not be able to receive sent messages.
- Third-party SDK Used
When you use the message sending function service, Huawei Message Push SDK/Xiaomi Message Push SDK/VIVO Message Push/OPPO Message Push/Meizu Message Sending need to collect your device information, network status, running process information to achieve the device's message push function.
1.6 Sharing:
- Information Range
When you use the sharing function service, you can choose to share your voice information and/or other recording content and/or voice-to-text text information to external applications. Sharing to QQ/WeChat friends relies on third-party SDKs, which will collect your device status information, network status, running process information, and identity information.
- Third-party SDK Used
Sharing to WeChat friends is implemented using the WeChat Sharing SDK.
1.7 Voice Dialing (After Connecting Earphones):
- Necessary and Non-necessary Information Range
When you use the voice dialing function, we will collect your voice information and/or other recording content you provide. This information is necessary for voice dialing; if you refuse to provide it, you will not be able to use the voice dialing function.
- Permissions Called
When you use the voice dialing function, we need to call your microphone permission to obtain your voice information, and need to call your contacts permission to accurately find the corresponding contact when dialing. These are necessary system permissions for this function service; if you refuse, you will not be able to use the corresponding functions.
1.8 Contacting Customer Service:
- Information Range
If you use the customer service function, we will collect the text information you input yourself to understand the content and needs of your feedback. This information is necessary for the customer service function. You can also voluntarily fill in your contact information so that we can contact you to better clarify your needs and related problem-solving plans, or help you solve other issues. To provide you with customer service and after-sales service related to your order needs to ensure the normal completion of the order, or to understand your experience using the product and other needs to improve our products and services, or to provide you with other services related to your rights and interests, our customer service personnel may use the phone number in your account information or other contact information you provide to contact you via phone, SMS, or email to better clarify your needs and related problem-solving plans, or help you solve other issues.
If you directly contact us through the methods described in Article 11 of this Policy, provide feedback, make complaints, appeals, or consult about issues related to Ifun products and/or services, to ensure the security of your account and system, you need to provide us with your account information (mobile phone number) registered/logged in so that we can verify your user identity. This information is necessary for identity verification in user feedback. During the feedback, complaint, or consultation process, to help you solve the problem or record the solution and result of related issues, you need to provide corresponding proof materials (pictures or videos). The system will record your communication with customer service to better help you solve the issues you are consulting and improve customer service quality. If you do not provide the above information, we may not be able to provide timely feedback on your consultation results, but it will not affect your normal use of Ifun products and/or services.
- Permissions Called
When you use the customer service function, if you choose to upload pictures, depending on the specific functional scenario you choose, we need to call your camera (iOS system only)/album permission to obtain the picture information after you take a photo/the picture information in the album, which is a necessary system permission for uploading pictures. If you refuse, you will not be able to use the picture upload function, but it will not affect your normal use of the customer service function.
1.9 Vibration:
- Information Range
To provide a better interactive experience, we have added vibration feedback after some of your important operations. Therefore, we need to obtain your sensor permissions to access sensor information (accelerometer, pressure sensor, rotation vector sensor).
- Permissions Called
After you agree to the privacy policy, we need to obtain your sensor permissions, which are necessary system permissions for this function service. If you refuse, you will not be able to use the corresponding functions.
1.10 Firmware Grayscale Upgrade:
- Information Range
To allow some users to experience new hardware functions, we will selectively send new firmware to some users. Therefore, we need to obtain your device serial number.
- Permissions Called
After you agree to the privacy policy, we need to obtain your device information permissions, which are necessary system permissions for this function service. If you refuse, you will not be able to use the corresponding functions.
1.11 Issue Troubleshooting and Security Maintenance:
- Information Range
When you use Ifun products and/or services, we will receive and record your relevant device information during software installation and use, including in silent state and/or background operation, based on the specific permissions, to detect installation conflicts, troubleshoot and locate issues, and ensure the security of your account and use. Relevant necessary information includes IP address, mobile hardware model, mobile system information, mobile screen information, operating system information, Ifun App installation information, MAC address, software installation list, IMEI, DFV (iOS), CCID (Android), IMSI (Android), sensor information, service provider network ID, access network method, type and status, unique device identifier (Android ID/IDFA/OPENUDID/GUID). This is necessary information for issue troubleshooting and security maintenance. If you refuse us to collect the above information, we will not be able to perform security monitoring for the software, which may affect the security of your account and timely troubleshooting of related issues.
1.12 Operation Statistics and Analysis
- Information Range
When you use Ifun products and/or services, we will automatically collect detailed information about your use of Ifun products and/or services and save it as network log information. Relevant necessary information includes Ifun App software version number, input box type, type of text entered, search query content, network status, operator, language used, access date and time, device crash, system activities, browsing history, download records, and click records, so that we can count the usage of Ifun products and/or services, troubleshoot issues, ensure service stability and network security, and perform operation analysis through data statistics to improve and optimize product interaction experience. This is necessary information for operation statistics and analysis. If you refuse us to collect the above information, we will not be able to troubleshoot and perform operation statistics for Ifun App, which may affect your use safety and experience.
2. We Obtain Your Personal Information from Third Parties
If you use WeChat to log in to your Ifun account, we will collect the account information (nickname, avatar, region, gender, mobile phone number) and Open ID that you authorize to share from the third party. After you agree to this Policy, we will bind your third-party account with the Ifun account. If you need to cancel the binding of the above third-party account, you can contact us according to the method provided in Chapter 11 of this Policy.
3. Personal Information Processing Instructions
- Permission List
To help you further clarify the details of the personal information involved in the permissions called by the above function services, you can check the list below for details. Please note that enabling any permission means you authorize us to collect and use relevant personal information to provide you with corresponding services. Once you disable any permission, it means you have canceled the authorization. We will no longer collect and use relevant personal information based on the corresponding permission, and cannot provide you with the services corresponding to that permission. However, your decision to disable permissions does not affect the information collection and use based on your previous authorization.
System Permission |
Corresponding Business Function |
Purpose of Calling Permission |
When Permission Is Requested |
Bluetooth |
Earphone Connection Function |
Used to connect earphones and communicate with them |
When connecting earphones |
Storage Permission |
Earphone Connection, Recording, Customer Service |
Cache earphone binding code, store call records, upgrade package files |
When connecting earphones, storing recordings |
SD Card Permission |
Recording |
Store call records, upgrade package files |
When storing recordings |
Location Permission |
Earphone Connection, Recording |
Start ultra-low-power Bluetooth protocol, record location tagging |
When connecting earphones, recording |
Microphone Permission |
Recording, Voice-to-Text, etc. |
Obtain voice information |
When using related functions |
Contacts Permission |
Voice Dialing Function |
Obtain contact information to accurately identify contacts |
When voice dialing |
Call Records Permission |
Voice Dialing Function |
Obtain call records to accurately find target contacts |
When voice dialing |
Message Notification Permission |
Recording/Message Push |
Receive push messages |
After completing a recording |
Camera Permission |
Scan to Log in to Cloud Space, Customer Service |
Scan QR code to log in to cloud space, take photos |
When scanning QR code, using customer service |
Floating Window Permission |
Subtitle Floating Window |
View transcription content outside the app |
When clicking subtitle floating window |
- Other Instructions
- To ensure that the app can normally receive push information when closed or running in the background, the app must use the (self-start) capability, which may have a certain frequency of self-start or associated start behavior, necessary for the function.
- When you open content push messages, after obtaining your explicit consent, related content will be opened. Without your consent, there will be no self-start or associated start.
- When you open files downloaded within the app, third-party apps will be associated and started.
III. How We Share, Transfer, and Disclose Your Personal Information
- Entrusted Processing
To provide you with more complete and higher-quality products and services, we will entrust third parties (including companies, organizations, and individuals) to process some of your personal information. For third parties we entrust to process your personal information, we will sign strict data processing agreements with them, clearly stipulating the purpose, duration, processing methods, types of personal information, protective measures, and rights and obligations of both parties regarding entrusted processing, and supervise the personal information processing activities of third parties. We require third parties to process your personal information only in accordance with our requirements, the provisions of this Policy, and any other relevant confidentiality and security measures, and not to process personal information beyond the agreed processing purpose and method. If you refuse our third parties to collect the necessary personal information for providing services when providing services, it will result in your inability to enjoy the services provided by the third party during your use of Ifun products and/or services.
- Sharing
We will not share your personal information with third parties (including companies, organizations, and individuals), except in the following cases:
- Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with third parties.
- Sharing under legal circumstances: We may share your personal information externally in accordance with laws and regulations, litigation dispute resolution needs, or as required by administrative and judicial authorities according to the law.
- Sharing among affiliated companies: To associate with our other products or services, provide you with better services, or protect the personal and property safety of our affiliated companies or other users or the public from infringement, your information may be shared within our affiliated companies. We will only share your personal information within our affiliated companies for specific, explicit, and legitimate purposes stated in this Policy, and will only share necessary information to provide services. For information shared with affiliated companies, we will require them to take protective measures no less than those stated in this Policy and strictly comply with relevant laws, regulations, and regulatory requirements. If affiliated companies want to change the processing purpose of personal information, they will need to obtain your authorization and consent again.
- Sharing with authorized partners: Only for the purposes stated in this Policy, some of our services will be provided jointly by us and authorized partners. We will share your personal information with partners to provide better customer service and user experience. We will only share your personal information for legitimate, proper, necessary, specific, and explicit purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose.
Specifically, you can click to read the "Ifun Third-Party Information Sharing List" to understand the details of how we share your personal information.
For companies, organizations, and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our instructions, this Policy, and any other relevant confidentiality and security measures, not to process personal information beyond the agreed processing purpose and method, and require them not to violate the laws, regulations, national standards, and other normative documents related to personal information protection and data security in the People's Republic of China. In principle, companies, organizations, and individuals with whom we share personal information have no right to use the personal information we share for any other purpose beyond this Policy.
- Transfer
We will not transfer your personal information to any third party (including companies, organizations, and individuals), except in the following cases:
- Transfer with explicit consent;
- Transfer as required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;
- In the event of a merger, acquisition, or bankruptcy liquidation involving the transfer of personal information, we will inform you of the name or contact information of the receiving party, and require the new company or organization holding your personal information to continue to be bound by this Policy. If the receiving party changes the original processing purpose and method, we will require the receiving party to obtain your authorization and consent again.
- Public Disclosure
We will only publicly disclose your personal information in the following circumstances:
- After obtaining your separate consent or based on your active choice, we may publicly disclose your personal information;
- If we determine that you have violated laws and regulations or seriously violated relevant agreements and rules of our products, or to protect the personal and property safety of our products and their affiliated company users or the public from infringement, we may disclose your personal information, including relevant violations and measures we have taken against you, in accordance with laws and regulations or relevant agreements and rules of our products.
- Exceptions to Prior Authorization and Consent for Entrusted Processing, Sharing, Transfer, and Public Disclosure of Personal Information
In the following situations, we may entrust processing, share, transfer, or publicly disclose your personal information without your prior authorization and consent:
- Related to our performance of obligations under laws and regulations;
- Directly related to national security and national defense security;
- Directly related to public safety, public health, and major public interests;
- Directly related to criminal investigations, prosecutions, trials, and enforcement of judgments;
- For the purpose of protecting your or other individuals' life, property, and other major legitimate rights and interests, but it is difficult to obtain your consent;
- Personal information you disclose to the public on your own;
- Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, etc.
Please be aware: According to laws and regulations, sharing, transferring, and publicly disclosing personal information that has been de-identified and cannot be restored to identify the personal information subject does not belong to the external sharing, transfer, and public disclosure of personal information, and the storage and processing of such data do not require further notice to you and your consent.
IV. How We Protect Your Personal Information
- We highly value the privacy and personal information protection of our users and will take reasonable measures to protect your personal information. Except as required by laws and regulations or otherwise stipulated in this Policy, we will use various security technologies and procedures to establish a sound management system to protect your personal information from unauthorized access, use, or disclosure. Without user permission, we will not publicly disclose or reveal user personal information to third parties. We will use professional encryption storage and transmission methods to ensure the security of user personal information.
- You understand and agree that, without disclosing individual user privacy data, we have the right to conduct technical analysis of the entire user database, and only after analyzing and organizing the anonymized user data can we make commercial use of it.
- Data Security Measures
- Technical Measures
We have adopted security protection measures that comply with industry standards, including establishing reasonable systems and norms, and using security technologies to prevent your personal information from unauthorized access, use, or modification, and to avoid data damage or loss. For example, our network services adopt encryption technologies such as Transport Layer Security Protocol (TLS), providing browsing services through HTTPS to ensure the security of user data during transmission; we use encryption technologies (TLS, SSL), anonymization or de-identification, and protection mechanisms to encrypt and store user personal information, and isolate it through isolation technology; we manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.
- Management Measures
We only allow employees, partners of ours and our affiliates who need to know this information to access personal information through confidentiality agreements and other means, and have set up strict access rights control and monitoring mechanisms for this purpose. We also require all personnel who come into contact with your personal information to fulfill corresponding confidentiality obligations. If they fail to fulfill these obligations, they will be held legally responsible or terminated from the cooperative relationship with us; we have held security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information; we have formulated and implemented personal information security incident emergency plans, etc.
- Security Incident Handling
We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes described in this Policy, unless an extension of the retention period is required or permitted by law.
The internet is not an absolutely secure environment, and email, instant messaging, and other communication methods with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use complex passwords to help us keep your account secure.
The internet environment is not 100% secure. We will do our best to ensure or guarantee the security of any information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, alteration, or destruction of information, leading to damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.
In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the cause of the security incident, possible harm, the types of personal information involved, the measures we have taken or will take, suggestions for you to prevent and reduce risks independently, and remedial measures. We will promptly inform you of the incident-related situation by email, letter, phone, or push notification. If it is difficult to inform the personal information subjects individually, we will take reasonable and effective ways to release announcements. At the same time, we will proactively report the handling of personal information security incidents in accordance with regulatory requirements. Please be aware that, according to applicable laws and regulations, if measures are taken that can effectively avoid harm caused by information leakage, tampering, or loss, we may not notify you individually.
V. How We Store Your Personal Information
This product and/or service is only provided to the mainland China region (for the purpose of this Policy, excluding Hong Kong Special Administrative Region, Macao Special Administrative Region, and Taiwan). In principle, personal information we collect and generate within the territory of the People's Republic of China is stored within the territory of the People's Republic of China and will not be transmitted across borders.
1. Location of Stored Information
We comply with laws and regulations, and the information and data collected about you will be stored on our servers in mainland China of the People's Republic of China. Exceptions include:
- As explicitly stipulated by laws and regulations;
- With your explicit authorization;
- Your personal actions such as cross-border transactions conducted through the internet.
2. Duration of Stored Information
Generally, we will retain your personal information for the shortest period necessary to achieve the purposes described in this Policy during your use of Ifun products and/or services, unless otherwise stipulated by applicable laws, regulations, or national normative documents. Specific reference regulations include:
- Article 21 of Chapter III of the "Cybersecurity Law" stipulates: Technical measures shall be taken to monitor and record network operation status and network security incidents, and relevant network logs shall be kept for no less than six months as per regulations.
- Article 31 of Chapter II of the "E-commerce Law" stipulates: The retention period of commodity and service information and transaction information shall not be less than three years from the date of completion of the transaction; if laws and administrative regulations have other provisions, those provisions shall prevail.
After exceeding the above period, or when you actively request the deletion of your personal information or cancel your account, we will delete your personal information as soon as possible in accordance with applicable laws and regulations, unless applicable laws, regulations, or national normative documents require retaining these information for a longer period. However, in the following cases, we may change the storage time of personal information due to the need to comply with legal requirements:
- To comply with applicable laws and regulations;
- To comply with court judgments, rulings, or other legal procedures;
- To comply with the requirements of relevant government agencies or legally authorized organizations;
- We have reason to believe that we need to comply with laws and regulations;
- For purposes reasonably necessary to execute relevant service agreements or this Policy, maintain social public interests, and protect the personal and property safety or other legitimate rights and interests of our customers, us, other users, or employees.
After you terminate the use of Ifun, we will stop collecting and using your information, except as otherwise required by laws and regulations or regulatory authorities.
When Ifun's related services cease operation, we will notify you through notifications and announcements, and delete your personal information stored on the server within the time limit required by laws and regulations.
VI. How You Can Exercise Your Personal Information Rights
1. Your Rights
According to relevant Chinese laws, regulations, and standards, you have several rights in personal information processing activities, including:
- You have the right to know and decide on personal information processing, and have the right to restrict or refuse others from processing your personal information, except as otherwise provided by laws and administrative regulations;
- You have the right to request the transfer of your personal information to a personal information processor you designate;
- If you find that your personal information is inaccurate or incomplete, you have the right to request correction or supplementation;
- You have the right to request the deletion of your personal information;
- You have the right to request the personal information processor to explain its personal information processing rules.
2. How to Exercise
We guarantee that you can exercise the above rights over your personal information and provide you with relevant operation paths. Specifically, you can refer to the following steps to perform related operations:
- View, Correct, and Supplement Your Personal Information:
- Click on "Settings" in the bottom navigation;
- Click on the account name;
- Click on the data you need to edit.
- Obtain a Copy of Your Personal Information
You have the right to obtain a copy of your personal information. You can contact our customer service according to the method described in Chapter XI of this Policy. We will process your request within 15 working days.
- Transfer Your Personal Information
You have the right to request the transfer of your personal information to a personal information processor you designate. If it meets the conditions stipulated by the national cyberspace administration, we will provide you with a way to transfer. You can contact our customer service according to the method described in Chapter XI of this Policy. We will process your request within 15 working days.
- Change the Scope of Your Authorization or Withdraw Authorization
You can withdraw your authorization by changing the privacy settings in this software. Specifically, you can operate in the following ways:
- For Android Users:
- Go to "Settings" - "Application Management" on your phone;
- Find Ifun and click to enter;
- Click on "Permissions" to enter the permissions page of Ifun, where you can set all the called permissions.
- For iOS Users:
- Go to "Settings" on your phone;
- Find Ifun and click to enter, where you can set all the called permissions.
Please note that the specific method of closing may vary depending on your device model and system version.
Please understand that when you perform the above operations, we will no longer be able to continue providing you with services corresponding to the withdrawn consent or authorization, but it will not affect the personal information processing previously carried out based on your authorization.
- Cancel Account
You have the right to cancel your Ifun account. You can contact our customer service according to the method described in Chapter XI of this Policy to assist you in canceling your account. After receiving your request, we need you to provide your account (mobile phone number) and SMS verification code to verify your identity. After successful verification, we will complete the cancellation for you within 15 working days. To ensure security, we need you to provide corresponding methods to prove your identity and the legitimacy of the request. After you successfully cancel, we will delete your personal information as soon as possible in accordance with laws and regulations.
You can also cancel it yourself by following these steps:
- Click on "Settings" in the bottom navigation;
- Click on the account name;
- Click on the "More" button in the upper right corner;
- Click the "Cancel Account" button in the "More" menu.
Please note in particular that to ensure the security and traceability of customer service and online/offline activities, according to the time requirements stipulated by the activities you participate in (including but not limited to themed activities, points redemption activities) (e.g., the same user cannot participate repeatedly within half a year for a certain activity), we will continue to retain the personal information you provided during customer service and participation in activities within half a year or within the time range separately stipulated by the relevant activities you participate in. After reaching the above time limit, we will delete this information.
- Turn Off Message Notifications
You have the right to turn off message notifications in this product. Specifically, you can refer to the following steps to perform related operations:
- Go to "Settings" - "Notifications" on your phone;
- Find Ifun and click to enter, where you can choose to turn off or on.
- Responding to Your Above Requests
We will take appropriate technical means to ensure that you can inquire, supplement, correct, delete your personal data, or apply for us to supplement, correct, delete, copy, or transfer related information through the feedback or complaint channels published by Ifun products and/or services. After we receive your application, we will process it according to the procedure. To ensure security, according to the procedure, we will first ask you to verify your identity. We need you to provide your account (mobile phone number) and SMS verification code. After successful verification, we will process your request. We will reply within 15 working days. For your reasonable requests, we generally do not charge fees, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee as appropriate. For those requests that are unreasonably repetitive, require excessive technical means (for example, need to develop new systems or fundamentally change current practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes), we will refuse them.
If you cannot inquire, supplement, correct, delete, copy, transfer your personal information, or change the scope of your authorization or withdraw authorization, cancel your account, turn off message notifications, or if you need to inquire, supplement, correct, delete, copy, transfer other personal information generated when you use Ifun, or if you believe that we have any violation of laws and regulations or agreements with you regarding the collection or use of personal information, you can contact us through the official feedback channels of relevant products or services we publish externally.
Please be aware that in the following situations, we will not be able to respond to your request:
- Related to our performance of obligations stipulated by laws and regulations;
- Directly related to national security and national defense security;
- Directly related to public safety, public health, and major public interests;
- Directly related to criminal investigations, prosecutions, trials, and enforcement of judgments;
- We have sufficient evidence to show that you have subjective malice or abuse of rights;
- For the purpose of safeguarding your or other individuals' life, property, and other major legitimate rights and interests, but it is difficult to obtain your consent;
- Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
- Involving trade secrets.
VII. How We Protect Minors' Personal Information
- We highly value the protection of minors' personal information and will protect minors' personal information in accordance with relevant national laws and regulations.
- We regard anyone under the age of 18 as a minor. According to relevant laws and regulations, if you are a minor over the age of 14, we will obtain your or your guardian's consent before collecting your personal information, and when you, your parents, or other guardians request us to correct or delete minors' personal information, we will take timely measures to correct or delete it, except as otherwise provided by laws and administrative regulations.
- If you are a minor under the age of 14 (hereinafter referred to as a child), we will obtain the consent of your parents or other guardians before collecting your personal information.
- When we process children's personal information, we will take the following measures to protect it: In addition to complying with the provisions on user personal information in this Policy, we will also adhere to the principles of legitimacy, necessity, informed consent, clear purpose, security assurance, and legal use for the collected children's personal information, strictly follow the requirements of laws and regulations such as the "Provisions on the Cyber Protection of Children's Personal Information" for storage, use, and disclosure, and will not exceed the period necessary to achieve the purpose of collection and use. After the expiration, we will delete the children's personal information. Specifically, please read the "Ifun Children's Privacy Protection Policy" to understand the details.
- If you are the parent or guardian of a minor, if you have any questions, opinions, suggestions, complaints, or reports about the matters described in this Policy and the "Ifun Children's Privacy Protection Policy", please provide feedback to us in the way described in Chapter XI.
VIII. How Your Personal Information Is Transferred Globally
In principle, personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China and will not be transmitted across borders. If, due to business needs, it is necessary to provide your personal information to overseas recipients, we will inform you of the name or contact information of the overseas recipient, processing purpose, processing method, types of personal information, and ways and procedures for you to exercise your rights as stipulated by law to the overseas recipient, and will only transfer your personal information after obtaining your separate consent and meeting the conditions for cross-border provision as stipulated by laws and regulations, to the overseas jurisdiction where you use the products and/or services, or make your personal information accessible from these jurisdictions.
Please be aware that such jurisdictions may have different laws and regulations on personal information protection. We will comply with the requirements of relevant laws and regulations within the jurisdiction to ensure that your personal information is fully protected. If such jurisdictions do not have personal information protection-related laws and regulations, we will strive to ensure that your personal information receives sufficient equivalent protection within the territory of the People's Republic of China.
IX. How We Update This Policy
- To provide you with better services, Ifun products and/or services will be updated and changed from time to time. We will revise this Policy in due course, and these revisions constitute a part of this Policy. However, without your explicit consent, we will not reduce your rights under this Policy.
- After this Policy is updated, we will release the updated version on Ifun and remind you to read the updated Privacy Policy again through application market new version feature announcements or pop-ups, so that you can understand the latest version of this Policy in time. If you do not agree with this Policy, or if you have any objections to the content of this Policy's modifications or updates, you can choose to stop using Ifun products and/or services or cancel your Ifun account. But please be aware that your actions and activities before your account is canceled or before you stop using this service are still bound by this Policy.
- For significant changes, we will also provide more prominent notices (we will explain the specific changes to this Policy through methods including but not limited to emails, text messages, or special prompts on browsing pages).
The major changes referred to in this Policy include but are not limited to:
- Our service model has undergone significant changes, such as changes in the purpose of processing personal information, the type of personal information processed, and the way personal information is used;
- Significant changes have occurred in our ownership structure and organizational structure, such as business adjustments, bankruptcy mergers and acquisitions, etc.;
- The main objects of personal information sharing, transfer, or public disclosure have changed;
- Your rights to participate in personal information processing and how you exercise them have undergone significant changes;
- When the department responsible for handling personal information security, contact information, and complaint channels change;
- When the personal information security impact assessment report indicates a high risk;
- Changes made to respond to national policies or legal norms accompanying the release and implementation of policies or laws.
X. Integration of Third-Party Application SDK
- iFlytek
We utilize the third-party iFlytek service to provide features such as large model interactions, text-to-image generation, real-time interpretation, and call recording. To enable these features, you need to authorize the iFlytek SDK to provide the respective services. Upon your authorization, iFlytek will collect certain personal information. Details on how each SDK collects and uses personal information can be found in the terms of the Privacy Policy. Specific details are as follows:
SDK Name: iFlytek SDK
Third-Party Name: iFlytek Co., Ltd.
Purpose of Use: To enable large model interactions, text-to-image generation, real-time interpretation, and call recording
Collected Personal Information:
- Device Information: Hardware model, operating system information, screen details, application installation details, IMEI, DFV (iOS), CCID (Android), IMSI (Android), OAID, unique device identifiers (Android ID/IDFA/OPENUDID/GUID), etc.
- Service Log Information: When you use our products and/or services, our servers automatically record logs related to operational processes and content to ensure service stability, network security, and proper functionality. These logs may include app launch and exit records, download records, transaction records, custom ringtone and video ringtone settings, user-created content records, user comments, system information, login IP addresses, and more. This helps us analyze product/service usage and optimize the user experience.
- Location Information: If you enable device location services and provide consent, we may collect location data to offer services such as time synchronization and positioning. Most mobile devices allow you to disable location services. Please consult your device provider or manufacturer for details. If you prefer not to share location data, you can turn off related features in the device or product/service settings.
- Other Information: In specific scenarios, we may collect additional personal information not listed above. These details will be specified in the privacy policy corresponding to the product/service you use. Please review the respective privacy policy for detailed information.
Privacy Policy Link: https://www.iflytek.com/privacy-web/#/privacy
- MobTech SDK
We use the third-party MobTech SDK service provided by Shanghai Youkun Information Technology Co., Ltd. (hereinafter referred to as "MobTech") to enable the social sharing feature. To activate this feature, you need to authorize the MobTech SDK to provide the respective services. Upon your authorization, MobTech will collect certain personal information. For details on the types of information collected, purposes of use, personal information protection rules, and opt-out mechanisms, please refer to the privacy policy available on the MobTech official website (www.mob.com) and its privacy policy section (www.mob.com/about/policy).
XI. How to Contact Us
To better protect your personal information, we have set up a dedicated network security and personal information protection department. If you have any questions or suggestions about this Policy or your personal information during the use of Ifun, please contact us through the following methods:
- Contact Number: 0755-26606617
- Contact Email (Personal Information Protection Officer): Louis_zhou@gnt-technology.com
- Contact Address: Room 502, Block A, Tangshang Technology Building, No. 139 Yiyuan Road, Majialong Community, Nantou Street, Nanshan District, Shenzhen City
If you are not satisfied with our reply, especially if you believe that our personal information processing behavior has damaged your legitimate rights and interests, and we cannot provide you with a satisfactory reply after you feedback to us and refuse to improve, you can file a complaint and report to the relevant regulatory authorities.
XII. Others
Any disputes related to this Policy shall be settled through friendly negotiation between both parties; if negotiation fails, you agree to file a lawsuit in the People's Court of Nanshan District, Shenzhen City.
If any clause of this Policy is ruled or judged invalid by any court with jurisdiction, that clause will be removed from this Policy, but the invalidity of that clause does not affect the validity of the remaining clauses of this Policy. The remaining clauses of this Policy will continue to be executed.
Please read carefully and confirm that you have fully understood the content of this Policy. If you have any questions, please feel free to contact us at any time.