Privacy Policy
About 2416 wordsAbout 8 min
Risk Control Guard is a product provided by Shenyang Mingzhi Software Co., Ltd. (hereinafter collectively referred to as "we" or "us"). To explain how Risk Control Guard collects, uses, and stores your personal information and the rights you enjoy, we will elaborate on relevant matters through this Policy. Key points are as follows:
We will explain the types of personal information we collect and their corresponding purposes one by one, so that you can understand the specific categories of personal information we collect for a particular function, the reasons for use, and the collection methods.
When you use certain functions, we will collect some of your sensitive information after obtaining your consent. Unless required by relevant laws and regulations, refusing to provide this information will only prevent you from using the related specific function, but will not affect your normal use of other functions.
Currently, Risk Control Guard does not actively share or transfer your personal information to third parties. If there are other situations requiring us to share or transfer your personal information to a third party, we will directly solicit or ensure the third party solicits your explicit consent for such actions.
Currently, Risk Control Guard does not actively obtain your personal information from third parties. If, for business development needs in the future, we need to indirectly obtain your personal information from third parties, we will clearly inform you of the source, type, and scope of use of such information before collection. If the processing activities for business purposes exceed the scope of authorization you originally granted to the third party when providing your personal information, we will seek your explicit consent before processing such information. Additionally, we will strictly comply with the provisions of relevant laws and regulations and require the third party to ensure the legality of the information it provides.
In order to collect your information under this Policy, or to provide services to you, optimize our services, and ensure the security of your account, we will need to request relevant permissions from you. Sensitive permissions such as precise location, camera, photo album, etc., will not be enabled by default; they will only be granted to us after your explicit consent.
Our product development and application operation require the collection of your device's unique identifier (including but not limited to IMEI, IMSI, device MAC address, software list, device serial number, Android ID) to provide statistical analysis services. We also analyze application launch data and abnormal error logs to improve performance, user experience, and provide users with better services.
It is important to note that obtaining sensitive permissions is a necessary but not sufficient condition for us to collect specific information. Obtaining a specific sensitive permission does not mean we will necessarily collect your related information; even if we have obtained sensitive permissions, we only collect your related information when necessary and in accordance with this Policy.
For more detailed information, please read the corresponding sections based on the index below:
I. Information We Collect
During your use of Risk Control Guard services, Risk Control Guard collects information that you actively provide or generate through service usage in the following ways to provide services to you, optimize our services, and ensure the security of your account:
When you register for Risk Control Guard services, we collect your name, company, and mobile phone number. Collecting this information is to help you complete registration and protect the security of your account. Mobile phone numbers are sensitive information; collecting this type of information is to meet the network real-name requirements of relevant laws and regulations. If you do not provide this information, you may not be able to use our services normally.
When you use Risk Control Guard services, to ensure your normal use of our services, maintain the normal operation of our services, improve and optimize our service experience, and protect your account security, we collect your device model, operating system, unique device identifier (a string of characters programmed into the device by the manufacturer, used to uniquely identify the device), login IP address, Risk Control Guard software version number, access network method, type, and status, network quality data, operation logs, service log information (such as records of your operations in Risk Control Guard, service fault information, referrer URLs, etc.). This type of information is basic information necessary to provide the services.
When you use Risk Control Guard features, information such as submitted records and photos will be stored on our servers, as storage is essential to achieve this function. We will store this information encrypted, and you can delete this information at any time. Unless chosen by you or required by relevant laws and regulations, we will not disclose such information externally or use it for purposes other than this function.
When you use features in Risk Control Guard, we will record your geographic location information after obtaining your autonomous consent, to provide you with the service. This information is sensitive; refusing to provide it will only prevent you from using some features of Risk Control Guard, but will not affect your normal use of other features. Additionally, you can turn off related functions and clear your location information within the function at any time.
When you use Risk Control Guard features, we use a third-party SDK to send reminder messages related to inspection work. Risk Control Guard may initiate autostart or associative start behavior of the app via system broadcasts. We can only provide the service normally after you agree and confirm.
Please understand that the features and services we provide to you are constantly updated and developed. If a function or service is not mentioned above and collects your information, we will separately inform you of the content, scope, and purpose of the information collection through page prompts, interactive processes, website announcements, etc., to obtain your consent.
II. Information Storage
Location of Information Storage
We will store personal information of users collected within China in China, in accordance with legal provisions. If the storage location of your personal information is to be transferred from within China to overseas, we will strictly implement it according to the law.
Duration of Information Storage
Generally, we retain your personal information only for the time necessary to achieve the purpose, for example:
- Mobile Phone Number: If you need to use Risk Control Guard services, we need to keep your mobile phone number to ensure your normal use of the service. After you deregister your Risk Control Guard account in "My", we will delete the corresponding information. If you decide to deregister your account, you can delete the app account in the Application Management Center or call the customer service hotline 4000096678 to request deregistration. Once the account is deregistered, you will no longer be able to use our product services. Please proceed with caution. To protect the legitimate rights and interests of you or others, after you submit a deregistration request, we will freeze the corresponding account. After a 60-day freeze period expires, we will delete your personal information, unless otherwise required by laws and regulations. After deletion, your personal information cannot be recovered or retrieved. When our product or service ceases operation, we will notify you via push notifications, announcements, etc., and delete your personal information or perform de-identification within a reasonable period (de-identification refers to the technical processing of personal information so that the personal information subject cannot be identified, and the processed information cannot be restored. Information obtained after de-identification processing of personal information does not belong to personal information.).
III. Information Security
We strive to provide security guarantees for users' information to prevent loss, improper use, unauthorized access, or disclosure.
We use various security protection measures to ensure information security within a reasonable safety level. For example, we use encryption technologies (e.g., SSL) and de-identification measures to protect your personal information.
We strengthen the security capabilities of the software installed on your device through continuously improved technical means to prevent leakage of your personal information. For instance, we perform partial information encryption locally on your device for secure transmission; to prevent viruses, Trojan programs, or other malicious programs or websites, we may understand information about applications installed on your device, running processes, or data stored in the device's memory; to prevent fraud, account theft, impersonation of others, and for security checks, we may analyze and utilize data such as unique device identifiers, login IP addresses, operation logs, and geographic location information to take security measures or provide security reminders, etc.
We have established dedicated management systems, processes, and organizations to ensure information security. For example, we strictly limit the scope of personnel accessing information, require them to comply with confidentiality obligations, and conduct audits.
In the event of a personal information breach or other security incident, we will activate emergency plans to prevent the security incident from expanding and inform you via push notifications, announcements, etc.
We will do our best to protect your personal information. However, please understand that no security measure is absolutely impenetrable.
IV. How We Use Information
We may use information collected through certain functions for our other services. For example, we may use information we collect when you use one function or service in another function or service to provide specific content, etc.
Our product development and application operation require the collection of your device's unique identifier (including but not limited to IMEI, IMSI, device MAC address, software list, device serial number, Android ID) to provide statistical analysis services. We analyze application launch data and abnormal error logs to improve performance, user experience, and provide users with better services.
To ensure service security and help us better understand the operation of our application, we may record relevant information such as your application usage frequency, crash data, overall usage, performance data, and the application source. We do not combine information stored in our analytics software with any personally identifiable information you provide in the application.
If our use of your personal information goes beyond the stated purpose at the time of collection and its direct or reasonably related scope, we will inform you again and seek your explicit consent before using your personal information.
V. External Provision
To enhance your user experience, for example, to push notifications, we need to share information that has been anonymized or de-identified with third-party partners, requiring them to strictly comply with our measures and requirements regarding data privacy protection. This includes processing according to data protection agreements, commitment letters, and related data processing policies, avoiding identification of individuals, and ensuring privacy and security.
We will not share information that can be used to identify your personal identity (such as your name or email address) with partners unless you explicitly authorize it.
As our business continues to develop, we may engage in mergers, acquisitions, asset transfers, and other transactions. We will inform you of relevant situations and ensure your personal information continues to be protected according to laws and regulations and standards not lower than those required by this Policy, or require new controllers to continue such protection.
Furthermore, according to relevant laws, regulations, and national standards, in the following situations, we may share, transfer, or publicly disclose personal information without prior authorization from the personal information subject:
(1) Related to national security or national defense security; (2) Related to public security, public health, or significant public interests; (3) Related to crime investigation, prosecution, trial, and judgment execution, etc.; (4) Where necessary to protect the life, property, and other significant legitimate rights and interests of the personal information subject or others, but it is difficult to obtain the consent of the individual; (5) Where the personal information is voluntarily disclosed to the public by the personal information subject; (6) Where personal information is collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels; (7) Necessary for entering into or performing a contract at your request; (8) Necessary for maintaining the safe and stable operation of the provided products and/or services, such as discovering and handling faults in the products and/or services; (9) Necessary for legitimate news reporting; (10) Where academic research institutions conduct statistical or academic research based on public interest, and when providing academic research or described results externally, the personal information contained in the results is de-identified.
VI. Integrated Third-Party SDK Descriptions
To ensure the implementation of Risk Control Guard's related functions and the safe and stable operation of the application, we have integrated some Software Development Kits (SDKs) provided by third-party service providers to achieve related purposes. Detailed information about third-party SDK service providers is as follows:
EMAS Mobile Push
SDK Package Name: com.alibaba.sdk.android.push SDK Provider: Hangzhou Aliyun Intelligent Technology Co., Ltd. SDK Purpose: To provide users with timely message services Required Permissions: Access network state, access Wi-Fi state, read phone state and identity Information Collected: Device information, network information, location information, obtaining the user's mobile phone number, software installation list, MAC address Privacy Policy Link: https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud202112071754_83380.html?spm=a2c4g.434803.0.0.18d04b65e5fzvv
VII. Changes
We may revise this Policy from time to time. When changes are made to the terms of the Policy, we will present you with the updated Policy in the form of push notifications, pop-ups, or other appropriate means when you log in or update the version.
VIII. Contact Us
If you have any comments or questions about this Privacy Policy, or if you have any questions about the collection, use, or disclosure of your personal information by Risk Control Guard, please contact us at the address below and mention "Privacy Policy". When we receive requests regarding your rights related to personal information, consultation questions, etc., we have a professional team to solve your problem. If your question involves significant matters, we may require you to provide more information. If you are dissatisfied with the response received, you may transfer your complaint to the relevant regulatory authority in your jurisdiction. If you consult us, we will provide information on possible applicable complaint channels based on your actual situation.
Shenyang Mingzhi Software Co., Ltd. Room 1508, Block A, Jialong Center, No. 6 Tiancheng Street, Hunnan District, Shenyang City Email: zlz@meanssoft.com Phone: 024-81847509
Update Date: June 01, 2025
Effective Date: June 01, 2025
