Welcome to Feitianyun private cloud storage! Feitianyun Network Technology (Shenzhen) Co., Ltd. and its related parties (hereinafter referred to as "Feitianyun" or "we") thank you for the trust you place in us when providing us with your personal information. Protecting the security of your personal information is our obligation, and we will provide adequate protection for the security of your personal information in accordance with laws and regulations. To this end, we have formulated the Feitianyun Private Cloud Storage Privacy Policy (hereinafter referred to as the "Policy") to help you fully understand how we collect, use, share, store and protect your personal information and how you can manage your personal information so that you can better make appropriate choices.
Before you start using our products and services, please read and understand the content of this policy carefully (especially the content marked in bold form) to ensure that you fully understand and agree before starting to use it.
In addition to this policy, in specific scenarios, we will also explain to you the purpose, scope and use of the corresponding information collection through instant notifications (including pop-ups, page prompts, etc.), function update instructions, etc. These instant notifications and Function update instructions, etc. form part of this policy and have the same effect as this policy. We will try our best to explain the professional terms involved in this policy to you in a concise and popular manner so that you can understand them easily. If you have any questions, opinions or suggestions about the content of this policy, you can refer to paragraph 10 of this policy.10Contact us with the contact information at the end of the article.
You agree to this policy means that you have understood the functions provided by Feitian Cloud Private Cloud Storage and the necessary personal information needed to operate the functions. When you turn on or use Feitian Cloud private cloud storage, we will process relevant information in order to realize the functions and services you choose to use, or to comply with legal and regulatory requirements. In addition to the information needed to realize the basic functions and services of Feitian Cloud private cloud storage, and the information necessary in accordance with legal and regulatory requirements, you can refuse us to process other information, but this may prevent us from providing corresponding functions and services.
This policy will help you understand the following:
2How we collect and use your information
3、CookieUse of similar technologies
4How we store and protect your personal information
5How we share, transfer, and publicly disclose your personal information
6How do you exercise your rights to manage personal information
7How we handle personal information of minors
8How your personal information is transferred globally
"Feitian Cloud Private Cloud Storage" in this agreement refers to the legally owned and operated by Feitian Cloud and its affiliated companies and labeled as Feitian Cloud/FileTOP/Feitian Cloud private cloud operating system, private cloud disk client, Feitian Cloud official website, Feitian Cloud private cloud storage software development kit for third-party websites and applications (SDK) and application programming interface (API), Mini programs, etc. to access and use our products and services, as well as the products and services provided to you by new forms emerging with the development of technology (collectively referred to as "Feitianyun Private Cloud Storage")
The actual functions of Feitianyun private cloud storage and each version may differ slightly, but if each version does not have a separate privacy policy, we will collect and process your personal information in accordance with this policy. If the associated version of Feitian Cloud Private Cloud Storage has an independent privacy policy, the privacy policy of the associated version will also apply. If this policy and the related version of the policy are inconsistent, the privacy policy of the related version shall apply. Some query and operation paths in Feitian Cloud private cloud storage and associated versions may be inconsistent, and the actual situation shall prevail.
Except for the relevant information collection and use activities described in this policy, this policy does not apply to other services provided to you by third parties. Other services apply to the personal information collection and use rules that they separately explain to you.
2How we collect and use your information
We will follow the principles of legality, legitimacy and necessity and collect and use your personal information that you proactively provide during or arising from using Feitian Cloud Private Cloud Storage, as well as your authorization from third parties for the following purposes described in this policy, to satisfy your use of Feitian Cloud Private Cloud Storage, communicate with you, and improve or optimize our products or services. As our business develops, the products or services we provide may be adjusted and changed. If we want to use your information for other purposes not specified in this policy, or use the information collected for specific purposes for other purposes, unless we have other legal basis or legitimate reasons for processing your information, we will inform you in a reasonable manner and obtain your consent again before using it. You can quickly understand the details of the personal information we collect by visiting the "Feitian Cloud Private Cloud Storage Personal Information Collection List".
2.1Scenarios for collecting information
When you register and log in to Feitian Cloud Private Cloud Storage, you can create an account using your mobile phone number. We collect your mobile phone number to help you register and log in to Feitian Cloud Private Cloud Storage, protect and maintain the security of your account, and facilitate you to retrieve your account. We will also bind the Feitian Cloud Virtual Machine or client device through the basic information you provide, and may send important notices about the device through mobile phone text messages. If you do not provide such information, you will not be able to register or log in to Feitian Cloud's private cloud storage through Feitian Cloud's network connection service. You can choose to improve the relevant identification information (avatar, nickname) in the future. We collect this information to meet your personalized needs and enrich your account information.
You can also use a third-party account to quickly and easily register and log in to Feitian Cloud Private Cloud Storage, but you need to authorize us to obtain your information on third-party platforms, including avatar, WeChat (nickname,openid)、QQ(Nickname,openid), and other information authorized by you, used to generate a Feitian Cloud system account bound to the third-party account, so that you can directly register, log in and use Feitian Cloud private cloud storage and related services. In some cases, we need to re-verify and bind your mobile phone number to confirm the authenticity and relevance of the third-party account.
If you forget the login method of your Feitian Cloud private cloud storage, you can use the password recovery function. In order to ensure the security of your account, we may need you to verify it based on any of the three methods: your Feitianyun system account information, device information, and device sharer account information.
You can also log in to use Feitian Cloud Private Cloud Storage through your local account. If you use Feitian Cloud Private Cloud Storage through your local account, we will not collect your personal information, but in other scenarios where you need to collect your personal information, we will follow this policy to collect and process your personal information.
2.1.2Discover devices in the local area network
When you need to use the "Discover Devices in the local area network" function, this service requires you to authorize the local network permissions so that we can discover the hardware devices installed with the Feitian Cloud private cloud storage system in the local area network and make it convenient for you to quickly connect. If you do not enable this permission, Or if you refuse to authorize this permission, you will not be able to use the relevant functions provided above based on local network permissions, but will not affect your use of other functions of this service.
2.1.3Equipment status monitoring
In order to enable you to better manage your Feitian Cloud Virtual Machine or Client Device, we need to collect the following information: Feitian Cloud Virtual Machine or Client Device Model, Device Serial NumberSNandMACaddress,IPAddress and your customized device name and device system status (online/offline/hibernation), device holding role (owner/sharer), warranty expiration time (visible only to administrators), binding time, service version, system version, and running time. The purpose of collecting this information is to help you bind your device, identify your device and associate it with your account, and ensure that your account can query and manage the device you are bound to, so that you can monitor the status of the device in real time and ensure that the management rights of the device are allocated reasonably. For equipment managers, we also collect the warranty expiration time of the equipment to provide reminders of the expiration of warranty services.
2.1.4Login history and trusted terminal management
(1When you log in to Feitianyun Private Cloud Storage, in order to ensure the security of your account and prevent unauthorized access, quickly identify and respond to any abnormal activities, protect your account from security threats, and improve security, we will collect the following information about your login history:
Login time: accurate to seconds, record the specific time of each login;
Operation record: Record your account login and account unbinding operations;
Location information: By collecting and identifyingIPAddress, we will be accurate to the city level to determine the geographical location where you were when you logged in;
IPAddress:4)Used to identify the location of the login network (accurate to the municipal level);
Terminal type:Windows,Mac,Android,iOS,HarmonyOS,Browser,Android Android TV,Apple Apple TV,Applet,AndroidTVWait to confirm the system platform you used when logging in;
Access method: Identify whether you access Feitian Cloud private cloud storage through a web page or through other clients.
(2We allow you to set up trusted devices as "trust terminals" so that you don't repeatedly require identity verification when logging in on these devices. This is designed to simplify the login process while providing a balanced security and convenience option.
Collection of login information: To ensure the security of your account, whenever you log in to Feitian Cloud private cloud storage, we will record the terminal type, terminal name and login location you used when logging in (viaIPAddress recognized and accurate to city level) and last login time. This information helps us identify login behaviors other than you in a timely manner and take necessary security protection measures.
Account and security: You can view your login history and trusted terminal list at any time. And have the right to remove any login terminal that you think is suspicious at your discretion. If any abnormalities are found, we recommend that you immediately update your account password and remove suspicious trust terminals to ensure account security.
The purpose of collecting information about trusted terminals is to:
Improve account security: By tracking login history, we can effectively monitor and prevent unauthorized account access to ensure the security of your account. When the system detects any abnormal logins or security threats, we can take quick action, including notifying you and assisting you in taking further protective measures.
Manage login terminals: Allows you to manage trust terminals, which reduces duplicate verifications on your commonly used devices, and provides a mechanism for you to easily remove any login devices that are no longer in use or suspicious.
2.1.5Third-party storage and network disk services
In order to realize file upload and download services between Feitian Cloud and third-party storage and network disk services, we will provide online mounting functions for third-party storage and network disk services (including but not limited to Baidu Network Disk,OneDrivesuchSAASOnline disk services, as well as Alibaba Cloud, Huawei Cloud, Tianyi Cloud, Tencent Cloud, Jingdong Cloud, Qiniu Cloud, Youpai Cloud, deeply convincedEDS、XSKY XSKY EOSand other object storage services) are integrated into the Feitian Cloud system. This function is turned off by default. Only the administrator has operation rights and can decide whether to mount it according to his actual needs. If you need to use this feature, third partiesSaaSWeb-like services require your explicit authorization and consent first. If you do not agree, you will not be able to use the third-party web-disk services integrated in the Feitian Cloud system for file upload and download services. In order to ensure that you can freely move and manage files between the Feitian Cloud system and third-party network disks, we will request to obtain read and write permissions for files. We emphasize that this permission is only limited to ensuring that you can successfully complete the task of uploading, downloading and synchronizing files, and does not involve obtaining the specific content of the file. We will not share any of your personal information with third-party online disk service providers. You can choose whether to connect third-party network disks to Feitian Cloud private cloud storage. If you choose not to access, you can still use other services and functions of Feitian Cloud's private cloud storage.
When you need to use the album backup function, you can choose to turn on device storage/Photo permissions to back up pictures, videos, etc. stored on your phone to your hardware device. If you do not enable this permission or refuse to authorize this permission, you will not be able to use the above-mentioned storage-based storage./Related functions provided by photo permissions, but do not affect your use of other functions of this service 。
When you need to use the download file function, this service requires you to authorize the right to write to external storage so that we can download your files stored on your hardware device to your device with Feitianyun private cloud storage. If you do not enable this permission or refuse to authorize this permission, you will not be able to use the above related functions provided based on write to external storage permissions , but will not affect your use of other functions of this service.
When you upload files, videos, and files, you can choose to turn on device storage/Photo permissions to back up files, videos, files, etc. stored on your phone to your hardware device. If you do not turn on this permission or refuse to authorize this permission, you will not be able to use the above device-based storage/Related functions provided by photo permissions, However, it will not affect your use of other functions of the service.
When you create a new folder, this service collects the name of the folder you want to create and transfers it to your hardware device to create a new folder. If you do not provide the name of the new folder, this service will not be able to provide you with the function of creating a new folder, but it will not affect your use of other functions of this service.
You can choose to use offline download services. During this process, we will not collect any personal information about you, but we need you to select a "download save location" to obtain disk read and write permissions so that you can download files to your network storage device disk through offline download.
When you choose to share files off-end, we collect the file name, verify the deviceID, controls the validity period and number of accesses of the access range, and is used to display shared links, avatars, and nicknames to the recipient for easy identification.
Please note that non-Feitian Cloud network storage device users can also serve as recipients. If the file contains your personal information or sensitive personal information, please carefully consider the risks of sharing it. At the same time, if the information shared involves other people's personal information, you need to obtain their explicit consent before sharing.
During the sharing process, we will also display the extraction code (anonymized) to the recipient. Feitian Cloud private cloud storage provides additional security verification to ensure that only recipients who enter the correct extraction code can access the shared file.
In order to effectively control the sharing scope, we will collect the number of times the sharing link is visited, sent, and downloaded.
When you use the community features in our software to post or reply, we may collect yourIP, forum nickname (IDGeneration), custom avatars, and post content. This kind of information is mainly used for us to conduct compliance review of your online post content to ensure that you have a green and healthy Internet environment. If you refuse to provide this information, you will not be able to use the post and reply functions, but it will not affect your normal use of other functions of Feitian Cloud's private cloud storage.
When you contact our technical support team for assistance, we may collect the following information:
①Equipment information: including equipmentSNNumber, system version, service version, network status (includingIPAddress and network connection and disconnection information), operation log (including system operation information and log records generated by user actions), and client information (including the type and version of your operating system, and software version information).
②Personal files on Feitian Cloud Virtual Machine or client devices: Our technical support team may come into contact with the personal files you upload to Feitian Cloud Virtual Machine or client devices only if you authorize and provide corresponding permissions.
③Feitian Cloud Virtual Machine or client device serial number, server or client device product model, server or client device system type, client type, WeChatIDInformation about how the client accesses the server or client device (whether it is accessed through a local area network or the Internet).
The purposes we collect this information are to:
①Ensure efficient technical support services: By collecting equipment information, we can quickly locate problems and provide you with more precise technical guidance.
②Clear definition of rights: In the initial stage, technical support personnel only require you to provide an account with ordinary user rights to obtain device information. This ensures that our access to your device is limited to the extent necessary.
③In-depth problem diagnosis: In the face of complex technical challenges, if higher authority is needed to locate system problems, we will ask for your consent to create and provide an administrator account to the technical support team. Only in this case can technicians have access to your personal files.
④Help us better understand the products you use so that we can provide targeted technical support and provide corresponding solutions. The main purpose of our collection of the above information is to help users locate technical support issues and provide effective solutions. We will ensure that this information is only used to resolve technical issues you encounter while using our products and services.
2.1.13Individual services and third-party services
Feitianyun's private cloud storage contains information or links to information content that we obtain through various legal methods, as well as other individual services that we legally operate. Feitianyun private cloud storage may contain links to third-party content or directly integrate third-party information. Based on business development needs and user experience optimization, we reserve the right to add, reduce or adjust individual service content, form and special sections included therein at any time. We will try to notify users of these changes in advance, but in some cases such changes may need to be implemented immediately.
You can enable and use the above individual service functions in Feitianyun private cloud storage. Certain individual services may require you to also accept specific agreements for the service or other rules that bind you and the service provider. You can determine the service entity that performs with you based on the agreement you signed when using the corresponding individual service or the information posted on the corresponding service. If necessary, we will provide these agreements and rules for your review in a reasonable manner. Once you start using the above services, you will be deemed to understand and accept the relevant agreements and rules governing the individual services.
In Feitianyun private cloud storage, certain services or functions may be provided independently or in cooperation with us by third parties. Such services may have their own separate user agreements, privacy policies or other binding provisions. Before choosing to use a third-party service, you need to carefully understand and evaluate the risks associated with it, and ensure that you fully read, understand and agree to all relevant agreements and regulations (if any) of the third-party service. When you choose to interact with these third-party websites or apps, you need to independently judge and evaluate the risks involved. Any dispute, damage or loss arising from the use of third-party services will need to be resolved independently with the third party. We are not responsible for any direct or indirect damage caused by third-party services.
It is worth noting that certain third-party service providers may take advantage of the openness associated with your accountIDto collect and process data. The collection, storage, use and transfer of this data are the sole responsibility of the corresponding third-party service provider. Feitian Cloud does not participate in the processing of these data, nor can it access, control or modify such data. When you choose to use third-party services, the security of your personal information and data will be governed by the terms and policies of the third-party service provider. You must choose and use them carefully.
If you have any questions about the agreement or regulations of a third-party service, we recommend that you consult legal or other professional before activating the service. When the agreements or regulations of third-party services change, Feitian Cloud Private Cloud Storage may not directly notify you. Therefore, we recommend that you regularly check and understand the relevant agreements and regulations of the third-party services you use to ensure your own rights and interests.
In order to maintain the normal and stable operation of relevant products or services and protect the safety and legitimate interests of you or other users or the public, we may collect the following necessary information:
①In order to ensure the safe operation of software and services, the quality and efficiency of operations, we may collect your hardware model, operating system version number, device identifier (AndroidincludingIMEI/MEID、AndroidID、OAID、IMSI、SIMCard information (includingICCID)、GAID, hardware serial number (SN),iOSincludingIDFV、IDFA; Different identifiers will vary in terms of validity period, whether they can be reset by the user, and how to obtain them), network device hardware address (deviceMACaddress), hardware serial number,IPaddress,WLANAccess points (includingSSID,BSSID), Bluetooth (Bluetooth), base station, software version number, network access method, type, status, network quality data, operation, usage, service log data, plug-in or application functions.
②We may use your account information, device information, service log information, as well as information that our related parties and partners are authorized by you or can provide to us in accordance with the law, to determine account security, perform identity verification, identify violations and violations, detect and prevent security incidents, and take necessary recording, analysis, and disposal measures in accordance with the law.
③We may collect failure logs when abnormal failures occur in Feitian Cloud private cloud storage to analyze and assist you in troubleshooting and resolving these exceptions and failures.
④We will not collect data stored in photos, files and other functions in Feitian Cloud's private cloud storage system.
2.1.15Self-boot or associated boot instructions
①push relevant:In order to ensure that this application can normally receive broadcast information pushed by clients when it is closed or running in the background, this application must use the(self-starting)Ability, there will be a certain frequency of sending a broadcast to wake up the application's self-launch or associated launch behavior through the system, which is necessary to realize functions and services.;When you open a content-type push message, after obtaining your explicit consent, the relevant content will be redirected to open. Without your consent, there will be no connection activation.
②upload relevant:When you upload files within this application(Such as photo album synchronization and ordinary file uploading), processed according to upload statusHTTPConnect and monitor status changes during the connection and system restarts to ensure that each upload task is completed smoothly, especially when users switch between different applications, the upload needs to continue in the background(There may be background processes that start themselves), and when the upload task is successfully completed and there are relevant notices and interfaces displayed.
③download related:When you download files within this application(Such as in-app version update prompts, ordinary file downloads), processed according to download statusHTTPConnect and monitor status changes during the connection and system restarts to ensure that each download task is completed smoothly, especially when users switch between different applications, the download needs to continue in the background(There may be background processes that start themselves), and when the download task is successfully completed and there are relevant notices and interfaces displayed.
④widget:This application supports desktop widget functions, which require monitoring and receiving system broadcasts(android.media.AUDIO_BECOMING_NOISY、android.intent.action.MEDIA_BUTTON,Mainly used in music players), this broadcast is a broadcast for the system refreshes desktop widget, and whether it is refreshed or not is executed by the system;If you use the desktop widget function of this application, this application must use the self-launch ability to wake up the desktop widget related services of this application by receiving system broadcasts(Including but not limited to updates to widget data)
2.2Handle personal information in accordance with the law
In accordance with relevant laws, regulations and national standards, we may process your personal information in accordance with the following circumstances:
(1)Get your consent;
(2)necessary to conclude and perform the contract at your request;
(3)necessary information necessary to perform legal obligations, such as anti-money laundering, anti-terrorist financing, anti-telecommunications network fraud, real-name management and other relevant laws and regulations;
(4)Directly related to national security and national defense security;
(5)It is necessary to respond to public health emergencies, or to protect the life, health and property safety of natural persons in emergencies;
(6)Directly related to criminal investigation, prosecution, trial and execution of judgments;
(7)The personal information collected is disclosed by you yourself;
(8)Personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels;
(9)It is necessary to maintain the safe and stable operation of the services provided, such as: discovering and disposing of product or service failures;
(10)Other circumstances stipulated by laws and regulations.
It should be noted that when the processing of your personal information falls under the aforementioned paragraph(2)to(10)In this case, we may comply with the requirements of applicable laws and regulations without requiring your consent.
In order to provide services to you, Feitian Cloud Private Cloud Storage may need to apply to you for the corresponding permissions within the necessary scope. Please rest assured that Feitian Cloud Private Cloud Storage will not enable these permissions by default. Only if you proactively confirm the activation will Feitian Cloud Private Cloud Storage be able to collect your information through these permissions, and only use it in necessary scenarios explained to you. It should be noted that the acquisition of a specific permission by Feitian Cloud Private Cloud Storage does not mean that Feitian Cloud Private Cloud Storage will inevitably collect your relevant information; even if you have confirmed to enable permission to Feitian Cloud Private Cloud Storage, Feitian Cloud Private Cloud Storage will only collect your relevant information within the legal, legitimate and necessary scope. If you choose not to enable permissions, this may prevent you from using specific functions related to this permissions, but it will not affect your use of other services provided by Feitian Cloud Private Cloud Storage. For details such as permission descriptions and usage scenarios, please refer to the "Feitian Cloud Private Cloud Storage Permission Application and Usage Instructions".
3、CookieUse of similar technologies
CookieSimilar technologies such as equipment information identification are commonly used technologies on the Internet. When you use Feitianyun private cloud storage and related services, we may use relevant technology to send one or more data to your device.Cookieor an anonymous identifier to collect and identify information when you access and use this product. We promise not toCookieFor any purpose other than the purposes set out in this policy. we useCookieand similar technologies are mainly used to facilitate your use of our products and services, ensure the safe and efficient operation of products and services, improve login and response speed, and help you obtain a more relaxed access experience. If you use the Feitian Cloud Private Cloud Storage web version, most browsers provide users with the ability to clear browser cached data. You can clear it in your browser settings.CookieData, but may not be able to use information provided by us that relies onCookiefunctions or services.
4How we store and protect your personal information
While you use this service, we will retain your personal information for the period necessary to achieve the purposes described in this policy (unless the retention period needs to be extended as required or permitted by law). If you need to delete personal information, you can use paragraph 1 of this policy12Contact us for the contact information of the article. In addition, unless clearly stipulated by laws and regulations, we will delete or anonymize your personal information after the above personal information retention period is exceeded.
The criteria used to determine our retention period are as follows:
(1)The period during which we continue to maintain a relationship with you and provide you with Feitian Cloud private cloud storage products and services (for example, the period during which you have a Feitian Cloud private cloud storage account or continue to use Feitian Cloud private cloud storage products);
(2)Whether the account owner modifies or whether its user deletes information through its account;
(3)whether we have a legal obligation to retain data (for example, some laws require us to retain your transaction records for a certain period of time before they can be deleted); or
(4)Whether reservations are recommended from our legal standpoint (e.g., in connection with the enforcement of our agreements, dispute resolution, applicable limitations, litigation, or regulatory investigations).
We attach great importance to your information security and are committed to not only adhering to current information security standards, but also working to ensure that our security measures are at the forefront of the industry. To ensure the security of your data, we have adopted a series of advanced security technologies, including but not limited to encrypted transmission, secure storage, firewall protection, and regular security vulnerability scanning. In addition to these technical means, we have also implemented a supporting management system to enhance information security, and all data processing and storage processes have been strictly reviewed and improved. We fully realize that no system can be completely invulnerable, so we are constantly committed to identifying and managing possible risks and taking preventive measures to reduce the risk of leakage, destruction, misuse, unauthorized access, unauthorized disclosure, and alteration of your information. If a security incident unfortunately occurs, we have clear processes and response mechanisms to deal with these issues, including promptly notifying affected users, fixing security vulnerabilities, and taking measures to prevent similar incidents in the future.
(1)We will collect and use your information in accordance with industry mature security standards and regulations, and inform you of the purpose and scope of use of relevant information through user agreements and privacy policies.
(2)The personal information we collect from you is encrypted and stored by using encryption technology, and is isolated through isolation technology.
(3)When using personal information, such as personal information display and personal information correlation calculation, we will use a variety of data desensitization technologies including content replacement, encryption desensitization and other data desensitization to enhance the security of personal information in use.
(4)Establish strict data use and access systems, adopt strict data access rights control to protect personal information, and avoid data being used in violation of regulations. We will authenticate and control employees authorized to access personal information, and sign confidentiality agreements with them to ensure that only authorized personnel can access personal information.
The Internet is not an absolutely safe environment. Even if we do our best to strengthen security protection measures, it is impossible to always ensure the absolute security of information. Please understand that when you use our products and services, there may be malicious attacks and security issues beyond our control.
Although we have taken the above-mentioned reasonable and effective measures and have complied with the standards required by relevant laws and regulations, we still cannot guarantee the security of your personal information when communicated through unsafe channels. Therefore, you should take active measures to ensure the security of your personal information, such as setting complex passwords, regularly changing account passwords, not disclosing your account password information to others, and helping us ensure the security of your account and personal information.
4.4Information security incident handling
We will formulate an emergency plan for cybersecurity incidents. After an unfortunate personal information security incident occurs, we will immediately initiate the emergency plan, convene members of the emergency cybersecurity emergency team, trace the cause in the shortest possible time, reduce losses, and report to the corresponding authorities in accordance with regulations. Report. At the same time, in accordance with the requirements of laws and regulations, we will promptly inform you of the basic situation and possible impact of the security incident, and the handling measures we have taken or will take through the contact information you reserve such as platform notices, SMS notices, telephone or email., suggestions for you to prevent and reduce risks independently, remedial measures for you, etc. When it is difficult to inform one by one, we will issue an announcement in a reasonable and effective manner.
5How we share, transfer, and publicly disclose your personal information
5.1Application Program Interface (API) and software tool development kit (SDK)
In order to ensure the safe and stable operation of our products and services or achieve related functions, Feitian Cloud Private Cloud Storage includes a software tool development kit (SDK) and application programming interface (API), if you are using suchSDK/APIWhen supporting the implementation of products and services, the third partySDK/APIYour personal information may be collected and processed. We'll make sureSDK/APIConduct security testing and evaluation, and strictly abide by relevant laws, regulations and regulatory requirements to protect data security. In order to maximize the security of your information, we strongly recommend that you use any third partySDK/APICheck before providing services and fully understand third partiesSDK SDK /APIThe third party will independently assume relevant obligations and responsibilities for your personal information in accordance with its privacy terms and personal information protection policies. This policy does not apply to products or services used by third parties that you actively log in or trigger a jump to, and we are not responsible for how third-party products or services collect, use, and process your personal information. If you find theseSDK/APIWhen there is a risk, it is recommended that you immediately terminate the relevant operation and contact us in a timely manner. We list the relevant partners we access in the catalog as follows:
|
products/service |
Third Party Personal Information Processing Rules |
purpose of use |
involving personal information |
Third party company name |
usage scenarios |
sharing manner |
|
QQ |
After binding a third-party account, quick login can be achieved |
Operating system information,ssid/bssid, equipment model information, shearing board (iOS), photo album (Android), memory card permissions (Android), application list information (Android) |
Shenzhen Tencent Computer Systems Co., Ltd. |
login |
SDK |
|
|
WeChat |
https://open.weixin.qq.com/cgi-bin/frame?t=news/protocol_developer_tmpl |
After binding a third-party account, quick login can be achieved |
Equipment information (IMEI、IMSI、MACaddress,Android Android IDandIDFA), network information, WeChat account information |
Shenzhen Tencent Computer Systems Co., Ltd. |
login |
SDK |
|
umeng |
Application error information collection |
Android: Phone model, phone brand,AndroidSystem version,AndroidsystemAPILevel, vendor system version,cpuArchitecture type, whether equipmentroot, disk space occupation,sdcardSpace footprint, memory footprint, network type, process name the application is currently running, andPID |
Youmeng Tongxin(Beijing)Technology Co., Ltd. |
Error information collection |
SDK |
We will not share your personal information with any company, organization or individual other than Feitianyun or related parties, except in the following circumstances:
(1)Have obtained express authorization or consent from you or your guardian;
(2)Judicial or administrative authorities require us to disclose based on legal procedures;
(3)When filing a lawsuit or arbitration against a user in order to protect his or her legitimate rights and interests;
(4)In accordance with the relevant service agreements, usage rules, etc. between you and Feitianyun;
(5)Within the scope permitted by laws and regulations, in order to protect Feitianyun and its related parties, users of this service and public interests from harm;
(6)Comply with relevant agreements between you and other third parties;
(7)Used based on academic research.
We will not transfer your personal information to any company, organization or individual other than related parties, except in the following circumstances:
(1)Obtain your express authorization or consent in advance;
(2)Meet the requirements of laws, regulations, legal procedures, or mandatory government requirements or judicial rulings;
(3)If we or our related parties are involved in transactions such as mergers, divisions, liquidation, acquisition or sale of assets or businesses, your personal information may be transferred as part of such transactions. We will ensure the confidentiality of the information when transferred., and do our best to ensure that new companies or organizations that hold your personal information continue to be bound by this privacy policy, otherwise we will require the company or organization to seek authorization and consent from you again.
We will only publicly disclose your personal information under the following circumstances:
(1)Obtaining your express consent;
(2)Based on laws and regulations, legal procedures, litigation or mandatory requirements of government authorities.
5.5Exceptions to obtaining prior authorization and consent when sharing, transferring, and publicly disclosing personal information
In the following circumstances, the sharing, transfer, and public disclosure of personal information does not require prior authorization and consent from the personal information subject:
(1)Directly related to national security and national defense security;
(2)Directly related to public safety, public health, and major public interests;
(3)Directly related to criminal investigation, prosecution, trial, execution of judgments, etc.;
(4)To protect the life, property and other important legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;
(5)Personal information that the personal information subject discloses to the public on his own;
(6)Collecting personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels.
6How do you exercise your rights to manage personal information
In accordance with relevant laws, regulations, and standards, we guarantee that you exercise the following rights with regard to your personal information:
(1)Query your personal information
①Mobile client path: My-Click on nickname-Personal information (you can check avatar, nickname, desensitized mobile phone number, identity, and WeChat binding status)
②PCEnd path: Click on avatar (you can query avatar, nickname, desensitization mobile phone number)
③Path to Mini programs: Click User Center (you can query avatar, nickname, mobile phone number, and identity)
For information that cannot be queried through the above channels, you can use the following methods:12Contact us at any time, and we will verify your identity information15Respond to your inquiry request within working days.
(2)Correct your personal account information
①Mobile client path: My-Click on nickname-Personal information (editable avatar and nickname)
②Mobile client path: My-application settings-Account and security-Mobile phone number (replaceable mobile phone number)/Change password (password can be changed)/Mailbox (bindable/unbind/Change mailbox);
③PCEnd path: Click on avatar (you can edit avatar and nickname)
For information that cannot be corrected through the above-mentioned channels, you can use the following methods:12Contact us at any time, and we will verify your identity information15Reply to your correction request within working days.
(3)Change the scope of your authorization or withdraw your authorization
①Path to change the scope of relevant permission application and use authorization: my-about us-privacy management-System rights management.
②Mobile clients change their privacy policy authorization path: My-about us-privacy management-Privacy Policy.
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the previous processing of personal information based on your authorization. If you encounter operational problems during this process, you can refer to paragraph 1 of this policy.12Contact us at any time.
(4)delete your personal information
You can delete it yourself by:
Path to delete device information:
①Path 1: Mine-my device-Equipment information;
②Path 2: Mine-my device-Device settings.
If we process your personal information in violation of laws and regulations, or if we collect and use your personal information without your consent, or if you no longer use our products or services and log out of your account, you need to delete your personal information. You can pass this Policy Section12Contact us at any time to request us to delete your personal information. We will contact us at the15Respond to your deletion request within working days. When your information is deleted, we will no longer use the data, but we may not be able to delete it immediately in order to adapt to necessary relevant legal and policy requirements, or to ensure the integrity of the data necessary for the normal operation of the service. Store or backup the data within a period of time, but delete the data in a timely manner after that period.
You have the right to cancel your registered account with Feitianyun system (not applicable under the privatization deployment method). You can operate online through the following methods:
Application Email:filetop@fetiyun.com
(6)Personal information subject obtains a copy of personal information
You have the right to obtain a copy of your personal information, and you can apply for action through the following methods (not applicable under the privatization deployment method):
Application Email:filetop@fetiyun.com
(7)Automatic decision-making in constrained information systems
In some business functions, we may make decisions based solely on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation or correction, and we will also provide appropriate remedies. you canfiletop@fetiyun.comContact us.
(8)Respond to your above request
To ensure security, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. we will15Give a reply within within working days.
In principle, we will not charge any fees for your reasonable requests. We may refuse requests that are unreasonably repetitive, require excessive technical means (e.g., require the development of a new system or fundamentally change existing practices), pose a risk to the legitimate rights of others, or are highly impractical (e.g., involve information stored on backup tapes).
In the following circumstances, we will not be able to respond to your request as required by laws and regulations:
①Related to the personal information controller's performance of obligations stipulated in laws and regulations;
②Directly related to national security and national defense security;
③Directly related to public safety, public health, and major public interests;
④Directly related to criminal investigation, prosecution, trial and execution of judgments;
⑤The personal information controller has sufficient evidence that the personal information subject has subjective malice or abuse of rights;
⑥To protect the life, property and other important legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;
⑦Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;
⑧involving trade secrets.
This policy does not, and is not intended to, create, extend, or modify any rights of data subjects and consumers or obligations of Feitianyun, unless otherwise provided for in applicable data privacy laws.
7How we handle personal information of minors
We mainly provide products and services to adults. If you are a minor according to the laws of your country or region, we require you to ask your parents or other guardians to carefully read this policy and use our services or provide us with information with your parents or other guardians 'consent.
We attach great importance to the protection of personal information of minors. If you are the parent or other guardian of a child, please pay attention to whether the child is using our services after obtaining your authorization and consent. If you have questions about children's personal information, please contact our dedicated personal information protection department. If you are a minor according to your local laws and regulations, you are using this product./Before providing services, you must read this policy accompanied by your guardian, and ensure that you have obtained the explicit consent of your guardian before using this product and providing us with your personal information. For the collection of personal information from minors using our products or services with the consent of the guardian, we will only use or disclose this information if permitted by laws and regulations, the guardian has expressed the consent, or if necessary to protect the minor. If your guardian has reason to believe that we have collected personal information from minors without the guardian's consent, please contact us throughsupport@kodcloud.comContact us and we will delete relevant data as soon as possible at your request.
8How your personal information is stored and transferred globally
Feitianyun is a global enterprise headquartered in Shenzhen, China. Feitianyun and its related parties provide products or services through resources and servers around the world, which means that if the requirements of laws and regulations are met, your personal information may be transferred to the country where you use the products or services/Extraterritorial jurisdictions of the region, or receive visits from those jurisdictions.
In order to provide you with the global service of Feitianyun System accounts (i.e. global unified accounts), we will transfer your account from your account registration country (home country) to other countries based on the principle of minimum sufficiency./Feitianyun related parties in the region transmit your personal information.
After you register, we will send the hash value of your account and the country of origin/Regional transmission to nodes in the mainland of China, and when you transfer from any country in the world/When a region initiates a login request, determine your country through the the mainland of China node/Region, so that you can match the server where your account belongs. This is what we need to provide you with the global Feitian Cloud System account global service. This will allow you to obtain information from any country in the world./Regions can easily and efficiently access your Feitianyun system account to find your server or client device.
We may make changes to this policy as appropriate. We will not reduce your rights under this policy without your express consent. We will post any changes to this policy on this page. For major changes, we will notify you in one or more forms such as push notifications, pop-ups, and email, and obtain your consent again.
The major changes referred to in this policy include but are not limited to:
Our service model has undergone major changes. Such as the purpose of processing personal information, the types of personal information processed, the use of personal information, etc.;
We have undergone major changes in our ownership structure, organizational structure, etc. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;
Changes in the main objects of personal information sharing, transfer or public disclosure;
There have been significant changes in your rights and forms to participate in the processing of personal information;
When changes occur to our responsible department responsible for handling personal information security, contact methods and complaint channels;
When the personal information security impact assessment report indicates that there is a high risk.
After we update this policy, if you click Agree and continue to use this service, it means that you agree to the content of this policy (including the updated version) and agree that we collect, use, store, disclose and transfer your relevant information in accordance with this policy.
If you have any questions, comments or suggestions about this policy or our services, you can contact us through the following methods.
(1)"Contact us" through Feitianyun's official website;
(2)Email:filetop@fetiyun.com
(3)Mail sent:
Address: Niulanqian Building, Minye Avenue, Longhua District, Shenzhen City, Guangdong ProvinceA715
Telephone:0755-81470011
Postal code:518131
(4)Telephone number and service time:
(the mainland of China)0755-81470011
Monday to Saturday (09:00-22:00)
In order to ensure that we handle your questions efficiently and provide you with timely feedback, we may require you to submit identification, valid contact information, written request and relevant evidence. After verifying your identity, we will verify your identity.15Process your request within 5 working days.

0086075581470011