Latest revision date: July 27, 2023

Effective Date: July 27, 2023

Privacy Policy

We attach great importance to user privacy. This Privacy Policy (hereinafter referred to as "this Policy") aims to explain how Shenzhen Mycloud Technology Co., Ltd. and its affiliated companies (hereinafter referred to as "Mycloud" or "our") will collect, use, save, disclose, transfer your personal information and what rights you have. This policy applies to all services we provide to you through the Yunyun Rubik's Cube application and the varioour functions included in the service, including [collection, transfer, processing, storage, disclosure] services (hereinafter collectively referred to as "our products and/or services"

This policy will help you understand the following:
1. How do we collect and use your personal information
2. How do we use cookies and similar technologies
3. How do we store your personal information
4. How do we protect your personal information
5. How do we share, transfer, and publicly disclose your personal information
6. How do you exercise your right to manage personal information
7. Third party links and their products and services
8. Protection of minors
9. Revision and update of this policy
10. Applicable Law and Dispute Resolution
11. Contact our

We fully understand the importance of personal information to you and will do our best to protect the security and reliability of your personal information. We are committed to maintaining your trourt in our and adhering to the following principles to protect your personal information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise to take corresponding security measures to protect your personal information in accordance with mature indourtry security standards.

This policy is the fundamental legal document for your use of our products and/or services. We hope that you carefully read and clarify that you have fully understood the content of this policy before s\using our products and/or services. We hope that you can make appropriate choices based on your own understanding. Once you download, copy, install, access or use our products and/or services in any way, you agree that we will process your relevant information in accordance with this policy. After we update this policy (we will promptly inform you of the updates), if you continue to use our products and/or services, it means that you agree to the content of this policy (including the updated version) and agree to our collection, use, storage, disclosure, and transfer of your relevant information in accordance with this policy.

1、 How do we collect and use your personal information

Personal information refers to varioour types of information recorded electronically or in combination with other information that can identify a specific natural person's identity or reflect their activities. The personal information covered by this policy includes: personal location information (such as mobile GPS positioning information); Network identity identification information (including system account, IP address, email address, and passwords and security related to the above); Personal commonly used device information (including hardware model, device MAC address, BSSID, operating system type, software list unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc.), and video content containing personal information);

Personal sensitive information refers to personal information that, once leaked or modified, will have a negative impact on the subject of personal information, including damage to reputation, physical and mental health, or discriminatory treatment. The personal sensitive information involved in this policy includes: personal identification information (including ID card, military officer's certificate, passport, driver's license, household registration book); Network identity recognition information (including device attribute information, device location information, device connection information, username, nickname, email address, and passwords related to the above); Other information (including personal phone number, mobile phone number, Web browsing history, precise positioning information); Relevant identification documents; Video content containing sensitive personal information.

1.1 Personal information we collect and use

Our products and/or services include some core functions, including [local storage, network access], etc. We may collect, save, and use some information related to you in order to achieve these functions. If you do not provide this information, you will not be able to enjoy the products and/or services we provide.

Our products and/or services also include some additional functions, including [QQ automatic backup, WeChat automatic backup, mobile phone album automatic backup, album classification, camera simultaneoour interpreting, camera simultaneoour interpreting, map album, face recognition, shared album, file de duplication, shared album, file de duplication, third-party services], etc. If you use these additional features, we will collect corresponding personal information based on the additional features you choose to use. If you do not provide this personal information, you can still use the basic features based on our products and/or services, but you will not be able to use the corresponding additional features.

In the process of using our products and/or services, we will collect information that you voluntarily provide or generate as a result of using our products and/or services in the following ways, in order to provide you with our products and/or services, optimize our products and/or services, and ensure the security of your account:

1.1.1 When you register an account to use our products and/or services, we will collect your username, password, email, phone number, avatar, nickname, gender, city, and other information. We collect mobile phone numbers to meet the network real name system requirements of relevant laws and regulations. If you log in to our products and/or services in any other way, we will request the following personal information from the associated third party: (1) When you log in using a WeChat account, we will obtain your WeChat profile, WeChat nickname, gender, and region information; (2) When you log in with your Apple ID, we will obtain the email address of your Apple ID. To ensure account security and implement the network real name system, you may still need to bind a valid phone number when you use other methods to log in and use certain features of our product. For personal information that we request but cannot be provided by third parties, we can still request that you provide it. If you refuse to provide this information, you may not be able to use our products and/or services properly.

1.1.2 When you use our services, you need to bind your [already cloud] product, and by binding the product, you can use it normally. We will collect the product serial number and product verification code that you have bound. This type of information is unique product basic information that mourt be collected to bind the product and further provide you with basic services such as reading and storing files, as well as value-added services.

1.1.3 Equipment information. In order to provide better products and/or services and improve user experience, we will collect device attribute information (such as your hardware model, software installation list, operating system version, device configuration, device serial number, unique device identifier, international mobile device identification code IMEI, network device hardware address MAC, BSSID, advertising identifier IDFA, etc.), Device location information (such as location information obtained through GPS, Bluetooth, or WIFI signals), device connection information (browser type, telecom operator, language used), and device statour information (such as device sensor data, device application installation list). When available, our services may use GPS, your IP address, and other technologies to determine the approximate location of the device, so that we can improve our products and services.

1.1.4 Log information. When you use our products and/or services, our server will automatically record some information, such as your ourage of our products and/or services, IP address, URL of the accessed service, browser type and language used, information about downloading, installing or using mobile applications and software, communication with communication software, and date, time, and duration of accessing the service.

1.1.5 Unique application number. Some products and/or services contain unique application numbers. When you install, activate, update, uninstall related products and/or services or when these products and/or services regularly communicate with Clouded (such as software updates), the system will send this number and information related to installation (such as operating system type and application version number) to Clouded.

1.1.6 In order to ensure that you can load the H5 page, launch page video, and upgrade the new version of the website online when using our products and/or services, we need you to authorize our to receive multimedia content such as pictures, sounds, videos, etc. from your device terminal and obtain terminal storage functions.

In addition, we may launch third-party service features, and when you use these features, we will not disclose or disclose your personal information to third-party service providers without your permission.

1.1.8 If we need to obtain your personal information outside of the above scenario, we will obtain your explicit consent again and fully explain the application scenario and the content and scope of obtaining your relevant information to you before obtaining your explicit consent.

1.2 How We use Your Personal Information

1.2.1 In order to better provide services to you, as well as for our own risk prevention and control, and to protect the legitimate rights and interests of all parties, you agree and authorize our to use your personal information in accordance with the following rules:

1.2.1.1 We will use the collected personal information in accordance with the provisions of this policy and in order to achieve the functionality of our products and/or services;

1.2.1.2 In order to provide you with services suitable for you, and continue to maintain, improve and optimize these services, conduct analysis and processing after de identification of your personal information, or use your information for Data modeling;

1.2.1.3 used to prevent, detect, and investigate fraud, security hazards, illegal or violations of our agreements, policies, or rules, in order to protect your, our other users, or our legitimate rights and interests;

1.2.2 Please note that all personal information provided by you when using our products and/or services will continue to be authorized for use by our during your use of our products and/or services, unless you delete it or refuse to collect it through account or system settings. When you cancel your account, we will stop using and delete your personal information.

1.2.3 We will conduct statistics on the ourage of our products and/or services and may share this statistical information with the public or third parties to showcase the overall ourage trends of our products and/or services. But these statistics do not include any identification information for you.

1.2.4 When we display your personal information, we will use methods such as content replacement and anonymoour processing to desensitize your information to protect its security.

1.2.5 When we want to use your personal information for other purposes not specified in this policy, or when information collected for specific purposes is used for other purposes, we will seek your consent in advance by making a check mark on your own initiative.

1.3 You are fully aware that in the following situations, we do not need to obtain your authorization and consent to collect and use personal information:

1.3.1 Related to our obligations under laws and regulations;

1.3.2 Directly related to national security and national defense security; Directly related to public safety, public health, and major public interests;

1.3.3 Directly related to criminal investigation, prosecution, trial, and execution of judgments;

1.3.4 For the purpose of safeguarding the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain personal consent;

1.3.5 The personal information collected is publicly disclosed by the individual information subject to the public;

1.3.6 Collect your personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;

1.3.7 Necessary for signing the contract according to your requirements;

1.3.8 Necessary for maintaining the safe and stable operation of the provided products and/or services, such as detecting and handling faults in the products and/or services;

1.3.9 is necessary for legitimate news reporting;

1.3.10 It is necessary for academic research institutions to conduct statistical or academic research based on the public interest, and when providing academic research or descriptive results to the public, to de label the personal information contained in the results;

1.3.11 Other situations stipulated by laws and regulations.

2、 How do we use cookies and similar technologies

2.1 Cookies are a mechanism that supports server-side (or script) storage and retrieval of information on websites or clients. When you use our products or services, we will send one or more small data files called cookies on your computer or mobile device. The cookies assigned to you are unique and can only be read by web servers in your domain that publish cookies. Cookies typically contain identifiers, site names, and some numbers and characters. We will use cookie technology to simplify your repeated login steps, store your browsing preferences, help determine your login statour, and ensure account or data security.

2.2 We promise that the relevant information obtained through cookies and related technologies will be applicable to this policy and only used for the purpose of improving service/product quality and optimizing user experience. We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. For more information, please refer to AboutCookies.org. You can clear all cookies saved on your computer. Most web browsers will automatically accept cookies, but you can ourually modify the browser's settings according to your own needs to reject cookies; In addition, you can also clear all cookies saved in the software. But if you do so, you may need to personally change user settings every time you visit our website or software, and the corresponding information you previoourly recorded will also be deleted, which may have a certain impact on the security of the services you use.

3、 How do we store your personal information

In order to provide you with high-quality services while meeting regulatory requirements, we will keep necessary information submitted or generated during your use of the service. We will separate your general personal information from personal sensitive information and use necessary deidentification and encryption techniques to better protect the security of your personal information.

3.1 Storage Area

Your personal information collected and generated by our in the China will be stored in the China.

3.2 Shelf life

We will retain your personal information for the period necessary to achieve the purposes stated in this policy, unless legally required or permitted to retain this information for a longer period of time. When your personal information exceeds the period we save, we will delete or Data anonymization your personal information.

4、 How do we protect your personal information

4.1 Protection and Security Measures for Your Personal Information

We will make every reasonable effort to protect your personal information obtained and have it protected by a dedicated data security department.

We have used security measures that meet De facto standard to protect the personal information you provide and prevent the user's personal information from being illegally accessed, copied, modified, transmitted, lost, destroyed

We have taken and will continue to take the following measures to protect your personal information for processing or use:

4.1.1 Our network services adopt encryption technologies such as transmission security protocols and provide browsing services through HTTPS to ensure the security of user data during transmission;

4.1.2 Encrypt and save user personal information through encryption technology, and isolate it through isolation technology;

4.1.3 In the use of personal information, such as personal information display and personal information association calculation, we will use a variety of Data masking technologies, including content replacement, encryption and desensitization, to enhance the security of personal information in use;

4.1.4 Establish strict data usage and access systems, adopt strict data access permission control and multiple identity authentication technology to protect personal information and prevent data from being illegally used. We only allow authorized personnel to access personal information and require them to fulfill corresponding confidentiality obligations;

4.1.5 Adopt specialized data and technical security audits, establish multiple measures such as log audits and behavior audits.

4.2 Other security measures taken to protect personal information

4.2.1 Manage and standardize the storage and use of personal information by establishing a data classification and grading system, data security management standards, and data security development standards;

4.2.2 Establish a dedicated information protection department and data security emergency response organization to promote and ensure personal information security;

4.2.3 Strengthen safety awareness. We will also hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

4.3 Despite taking the reasonable and effective measures mentioned above and complying with the standards required by relevant laws and regulations, we still cannot guarantee the security of your personal information when communicated through unsafe channels. Therefore, you should take proactive measures to ensure the security of personal information, such as setting complex passwords, regularly changing account passwords, and not disclosing personal information such as your account password to others.

4.4 The Internet is not an absolutely secure environment, and there are always various risks of information leakage in the network environment. When unexpected events, force majeure, and other situations cause your information to leak, we will do our best to control the situation and promptly inform you of the cause of the incident, the security measures we have taken, and the security measures you can take proactively.

4.5 In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will also promptly inform you of the relevant situation of the event through email, letter, phone call, push notifications, and other means. If it is difficult to inform the personal information subject one by one, we will take reasonable and effective measures to publish the announcement. At the same time, we will report to the relevant regulatory authorities in accordance with the requirements of laws and regulations.

4.6 You are aware and agree that in the process of using our products and/or services, based on the information collected and stored in a certain form by our products and/or services, you may not authorize third parties to collect, use, or save such information through account lending, self authorization, or authorized third parties to use technical methods, except with the express consent of Yun.

5、 How do we share, transfer, and publicly disclose your personal information

5.1 Sharing

5.1.1 We will not share your personal information with any company, organization, or individual outside of Youyun, except for the following situations: Youyun has obtained explicit authorization or consent from you or your guardian; Judicial or administrative authorities require us to disclose based on legal procedures; When the cloud files a lawsuit or arbitration against users to protect their legitimate rights and interests; According to the relevant service agreements, usage rules, and other agreements between you and Alibaba Cloud; Within the scope permitted by laws and regulations, in order to protect the interests of Alibaba Cloud and its affiliated parties, Alibaba Cloud users, and the public from harm; Conforming to the relevant agreements between you and other third parties; Used based on academic research.

5.1.2 In addition, we may share your account information and device information with third parties such as partners to ensure the smooth completion of the services provided to you. But we will only share your personal information for legitimate, legitimate, necessary, specific, and clear purposes, and only share personal information necessary for providing services. Our partners have no right to use the shared personal information for any other purpose. Currently, our partners are suppliers of technical services. We may share your personal information with third parties who support our functionality. These supports include providing us with supply or infrastructure technical services, data processing, etc.

5.1.3 You can share your information with specific objects or with unspecified individuals based on our products and/or services. When serious situations such as information leakage occur due to your sharing behavior, Alibaba Cloud will not bear relevant legal responsibilities.

5.2 Transfer

We will not transfer your personal information to any company, organization, or individual, except for the following situations:

5.2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

5.2.2 When it comes to mergers, acquisitions, or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again;

5.2.3 Transfer shall be made in accordance with applicable laws and regulations, legal procedures, mandatory requirements of government regulatory authorities, or necessary circumstances of judicial rulings.

5.3 Public Disclosure

We will only publicly disclose your personal information in the following circumstances: with your explicit consent; Disclosure based on law; We may publicly disclose your personal information in cases of law, legal proceedings, litigation, or mandatory requirements from government authorities.

5.4 Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information

According to relevant laws and regulations, we can share, transfer, and publicly disclose your personal information without your authorization and consent in the following situations:

5.4.1 Related to our obligations under laws and regulations;

5.4.2 Related to national security and national defense security;

5.4.3 Those related to public safety, public health, and major public interests;

5.4.4 Related to criminal investigation, prosecution, trial, and execution of judgments;

5.4.5 For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;

5.4.6 Personal information that you disclose to the public on your own;

5.4.7 Personal information collected from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;

5.4.8 According to the provisions of laws and regulations, as well as the requirements of competent authorities, industry associations, and other industry organizations.

6、 How do you exercise your right to manage personal information

In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you exercise the following rights with respect to your personal information:

6.1 Accessing and Correcting Your Personal Information

6.1.1 Unless otherwise specified by laws and regulations, we will do our best to enable you to quickly access your own information. When you need to update your personal information or discover errors in the personal information we process about you, you have the right to update or correct the information.

6.1.2 In order to protect your information security and our legitimate rights and interests, without our consent, you are not allowed to use other methods or authorize third parties to access or collect your personal information stored on this platform.

6.2 Changing the scope of your authorization or revoking your authorization

6.2.1 You can change the scope of your authorization for us to continue collecting personal information or revoke all or part of your authorization by deleting information, turning off device functions, or setting privacy settings in our software.

6.2.2 After you withdraw your consent or authorization, we cannot continue to provide you with the corresponding services for withdrawing your consent or authorization, and we will no longer process your corresponding personal information. But your decision to withdraw your consent or authorization will not affect the personal information processing previously carried out based on your authorization.

6.3 In the following situations, you can request us to delete personal information:

6.3.1 If our behavior in processing personal information violates laws and regulations;

6.3.2 If we collect and use your personal information without your consent;

6.3.3 If our handling of personal information violates our agreement with you;

6.3.4 If you no longer use our products or services, or if you cancel your account;

6.3.5 If we terminate operations and services.

6.4 Cancelling Your Account

If you wish to cancel your account, please submit an account cancellation request to us in a way that has been requested or allowed by the cloud. We will provide you with account cancellation services after verifying your identity and clearing the assets in your account (if any). After the account is successfully cancelled, we will stop providing you with products or services, and delete your personal information or conduct Data anonymization according to the requirements of applicable laws and regulations.

In the following situations, according to legal and regulatory requirements, we will not be able to respond to your request:

6.4.1 Directly related to national security and national defense security;

6.4.2 Directly related to public safety, public health, and major public interests;

6.4.3 Directly related to criminal investigation, prosecution, trial, and execution of judgments;

6.4.4 There is sufficient evidence to indicate that you have subjective malice or abused your rights;

6.4.5 Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

6.4.6 Matters involving trade secrets.

7、 Third party links and their products and services

Clouded applications, products, and services may contain links to third-party websites, products, and services. Clouded products and services may also use or provide products or services from third parties.

All links containing third-party websites, products, and services are provided for user convenience only. Alibaba Cloud has no control over such third parties and cannot provide any express or implied warranties regarding the content of the links. Such links are also not considered as Alibaba Cloud's recommendation or authorization of the linked content; The cloud also cannot control the privacy or data protection policies of third parties, and such third parties are not bound by this policy.

You need to independently judge your interaction behavior with such links. Before submitting personal information to a third party, please read and refer to these third party privacy policies. We assume no responsibility for this.

8、 Protection of minors

We attach great importance to the protection of personal information of minors. If you are a minor under the age of 14, before using this product, please be sure to read this policy with your guardian and ensure that you have obtained the explicit consent of your guardian before using this product and providing us with your personal information. For the collection of personal information of minors using our products or services with the consent of our guardians, we will only use or disclose this information when permitted by laws and regulations, explicitly agreed by our guardians, or necessary to protect minors.

Ji Yun will not seek to collect information on minors under the age of 14. Users under the age of 14 should not provide any information through this product. If we have learned from the cloud that minors under the age of 14 have submitted personal information through this product, we will take appropriate steps to delete the information as soon as possible and will not use it for any purpose.

Without the consent of the guardian, Qingyun will not use the personal information of a minor, nor will it disclose any identifiable personal information of the minor to any third party, except for reasons such as relevant laws and regulations, inquiry requirements of national authorities, or striving to maintain the privacy and security of users and the general public in emergency situations.

If you are the guardian of a minor, please contact us if you have any questions about the personal information of the minor you are monitoring.

9、 Revision and update of this policy

We reserve the right to modify or update this policy from time to time based on business adjustments, changes in laws, regulations, or policies. We will provide you with notifications of amendments to this privacy policy as appropriate, and update the "Last Modified" date at the top of this privacy policy. By continuing to use our products and services, you accept our revised privacy policy. If you do not agree to our policy (as revised), you must stop using our services. Please check our privacy policy from time to time.

10、 Applicable Law and Dispute Resolution

10.1 Applicable Law

The implementation, interpretation and dispute settlement of this policy are governed by the laws of the China.

10.2 Dispute Resolution

If there is any dispute between you and us regarding the content or implementation of this policy, both parties shall resolve it through friendly consultation; If negotiation fails, either party may submit the relevant dispute to the Shenzhen Arbitration Commission for arbitration in accordance with its then effective arbitration rules; The arbitration award is final and binding on all parties.

11、 Contact Us

If you have any questions or suggestions regarding this policy or other related matters, or if you have any opinions or suggestions regarding the collection, use, sharing, access, correction, deletion, revocation, and cancellation of your personal information while using the service, you can contact us through the following methods:

You can send the question to 914214732@qq.com .

We will process your questions, opinions, or suggestions within 15 working days after receiving them and verifying your user identity.