Privacy Policy

Last updated: August 3, 2023

Enterprise Security is an application developed by Shanghai Para Software Co., Ltd. (hereinafter referred to as "us" or "Para Software"), and our company attaches great importance to protecting the personal information and privacy of users or potential users (hereinafter referred to as "you"). When you use our services, we will collect, use, share, or disclose your personal information in accordance with the provisions of this privacy policy ("this policy"). This privacy policy applies to "Enterprise Security" mobile clients, hereinafter collectively referred to as "Enterprise Security".

Before uploading corporate/organizational communication information and submitting personal information such as personnel information and external business contact information required by the individual users of the company/organization, enterprise/organizational users should obtain the explicit consent of the individual users in advance, and only collect personal user information necessary for the operation and management purposes of the enterprise/organization users, and ensure that the individual users are fully informed of the purpose of data collection Scope and usage, etc. At this point, please understand that Enterprise Security is the entrusted processor, and enterprise/organizational users are the processors of the data controlled by the aforementioned enterprise. We only activate and manage the above application services to process enterprise/organizational control data or your personal information according to the instructions of the enterprise/organizational user administrator. If you contact us, we will forward your request to the enterprise/organization and assist them in responding to your request within a reasonable period of time when needed.

This privacy statement does not apply to services directly provided to you by third parties through this application (collectively referred to as "third-party services"). If you open and use third-party application services through the third-party application function portal provided by Enterprise Security, the information provided to the third-party service provider is also not applicable to this statement. Please fully understand the product features and privacy protection policies of third-party services before choosing to use them, Then choose whether to activate the function.

Corporate Security will not actively share or transfer your personal information to a third party outside of Para Software. If there are other situations where your personal information is shared or transferred, or if you require us to share or transfer your personal information to a third party outside of Para Software, we will directly obtain or confirm the express consent of the third party to the above actions, except for the need to protect user rights or protect the ecological security of corporate security. If Enterprise Security proactively obtains your personal information from a third party, we will clarify the source, type, and scope of use of your personal information to you before obtaining it. If the personal information processing activities required for Enterprise Security to conduct business exceed the scope of your original authorization and consent when providing personal information to a third party, we will obtain your explicit consent before processing such personal information; In addition, we will strictly comply with relevant laws and regulations, and require third parties to ensure the legality of the information they provide.

This policy helps you understand the following:

1. How do we collect your personal information

2. How do we use your personal information

3. How do we use cookies and similar technologies

4. How do we share, transfer, and publicly disclose your personal information

5. How do we protect and save your personal information

6. How do you manage personal information

7. Revision and Notice of this Policy

8. How to contact us

9. Account cancellation

1、 How do we collect your personal information

Personal information refers to various types of information recorded electronically or in combination with other information that can identify a specific natural person's identity or reflect their activities. The personal information involved in this privacy policy includes: network identity identification information (including system account, IP address, email address, and related passwords, passwords, device models, hardware serial numbers, device MAC addresses, unique device identification codes (such as IMEI/androidID/GUID/OAID and other device identifiers), biometric fingerprint information (facial information, fingerprint information).

We will only collect and use your personal information for the purpose stated in this policy: to achieve the core functions of our products and/or services in accordance with legal and regulatory requirements, which include the functions necessary to achieve enterprise security services, improve the functions necessary for our products and/or services, and ensure transaction security. By providing us with the following information or using our products and/or services, you agree that we will collect information in accordance with this policy. The types of information we collect are as follows:

(1) The information you provided

In accordance with legal and regulatory requirements, in order to achieve the core functions of our products and/or services and provide you with better user service, we may require you to provide us with your contact information, including your name, phone number, company name, job title, address, email address, or username.

When you use corporate security, we need to collect your phone number and/or email for identity authentication. If you do not intend to provide us with the above information, we will not be able to use this product.

When you use our products and/or services, you have authorized us to continue using the above information you provided during the service period.

(2) We have obtained your information

The personal information we collect during the service provision process

To achieve the basic service functions of enterprise security, we may need to collect personal information from users. The following will provide a detailed list of our basic service functions, the types of personal information that need to be collected to achieve this function, and the permissions related to collecting personal information. The collection of these personal information will only be carried out if the application has obtained the permission of the terminal device system:

1. Information about the mobile applications (APPs) and other software you have used, as well as information about your past use of such mobile applications and software;

Use your personal information

In order to make your use of enterprise security services more convenient, our following additional features may use your personal information. If you do not provide this information, you may still be able to use the services of this platform, but you may not be able to use these convenient additional functions or need to fill out some information repeatedly. These additional features include:

1. Additional feature based on camera: Log in through facial recognition authentication. If you use this feature, you need to enable access to the camera from your device.

2. Device information based function: By collecting your device information, we can determine whether your account is at risk, identify potential problems, and accurately troubleshoot software anomalies;

3. Additional features based on recording: In order to log in through voiceprint recognition, if you use this feature, you need to enable recording access to us on your device.

4. Additional features based on albums: In order to recognize and bind OTP codes by selecting the QR code images in the album, your album permissions are required.

5. Indirect acquisition and use of personal information: We may obtain account information (avatars, nicknames) authorized for sharing from third parties (WeChat, QQ), and bind your third-party account with your corporate security account after you agree to this policy, allowing you to directly log in and use corporate security services through the third-party account.

6. MAC address: Device binding is required to ensure application data security, and MAC address needs to be obtained.

7. SSID information of WIFI: used for location services, to determine the location of devices.

(3) Self start and associated start instructions

1.When you open a content push message, with your explicit consent, the relevant content will be redirected to open. Without your consent, there will be no self start or associated start.

2.When you open the files downloaded internally from this app, it will be associated with launching a third-party app.

2、 How do we use your personal information

In order to achieve the core functions of our products and/or services and provide you with a better user experience, we will use your personal information in accordance with legal regulations or authorized by you, and mainly for the following purposes:

1. Provide you with our products and/or services and ensure the safety of the products and/or services we provide to you;

2. Assist us in maintaining, improving, designing, producing products and/or services. We may combine personal and transaction information from a particular service with information obtained from other services for comprehensive statistical, analytical, or processing purposes in order to provide you with services;

3. Software certification or management software upgrade;

4. Let you participate in a survey about our products and services.

5. Other uses approved or authorized by you

In order to achieve the core functions of our products and/or services, provide you with a better user experience, improve and improve our services, and comply with relevant laws and regulations, we may use the information collected through a certain service to gather information for our other services. If we provide corresponding options in the relevant services, you can also authorize us to use the information provided and stored by the service for our other services

3、 How do we use cookies and similar technologies

(1) Use of Cookies

n order to ensure the normal and efficient operation of the software product, facilitate your faster login and easier access to resources, Para Software will encrypt and store small data files SharePreferences related to user login information on your device terminal/system. SharePreferences it will help you recall your information when logging in, simplifying the process of filling out personal information (such as secondary authentication). Para Software will not use SharePreferences for any purpose other than those stated in this privacy policy.

4、 How do we share, transfer, and publicly disclose your personal information

(1)Share

Your personal information is an important part of our services to you, and we will comply with legal regulations to assume confidentiality obligations for your information. We will not disclose your personal information to third parties except in the following circumstances:

1. Obtain your consent or authorization;

2. Provide necessary information in accordance with applicable laws and regulations, administrative, judicial and other competent authorities' requirements;

3. Achieve the purpose described in the section on "How do we use your personal information"; Fulfill our obligations and exercise our rights under this Privacy Policy;

4. Only by sharing your information can we achieve the core functions of our products and/or services or provide the services you need;

5. Handle disputes or controversies between you and others according to your needs;

6. Necessary sharing with business partners: You understand and understand that in order to provide you with more comprehensive and high-quality products and services, we will authorize business partners to provide you with some services. In this case, we may share some of your personal information with our partners to provide better customer service and user experience. Please note that we will only share your personal information for legitimate, legitimate, necessary, specific, and clear purposes, and only share personal information necessary for providing services. We will conduct security assessments and processing on the output form, circulation, and use of information data to protect data security. Currently, our partners include the following types:

When you use functions provided by third parties in the Enterprise Security APP, we may access software development kits (SDKs) provided by third parties to implement relevant functions. At this point, third-party SDK service providers may collect personal information related to you. But we promise that without your consent, we will not share personal information that can identify you with them.

a. Aurora Push: Our product integrates Aurora Push and needs to collect your device Mac address and unique device identification code for binding users to ensure device security; Used to identify unique users and ensure accurate delivery of message push; Provide developers with smart tags and display business statistical information services; Optimize network connection requests between SDK and Aurora servers to ensure service stability and continuity. Aurora or its affiliated companies may collect your device information, network related information, and operator information. You can log in to: https://www.jiguang.cn/license/privacy Understand the privacy policy of Aurora.

b. Youmeng+SDK Services: Our product integrates Youmeng+SDK. The types of Youmeng+SDK services include (mobile statistics U-App, message push U-Push, app performance monitoring, and social sharing U-Share). Youmeng+SDK needs to collect your device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI, etc.). We use merge link technology for technical push. When a device has multiple APP push links active at the same time, We will randomly merge into one link to achieve the goal of saving electricity and traffic for you, so we need to obtain application list information; At the same time, we provide an intelligent push function to recommend push content that better meets your needs through this information, reducing the disturbance of useless push information to your users. The product integrates Youmeng+SDK and push channel SDK (such as Xiaomi, Huawei, Oppo, vivo, Meizu, etc.). The push channel SDK needs to collect device identifiers (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information, etc.) to uniquely identify the device and push messages to user devices. Collect geographic locations to identify push channels and improve the regional coverage of message push. You can log in to: Privacy Policy Link: https://www.umeng.com/page/policy Understand the privacy policy of Youmeng.

c. Baidu facial recognition SDK: In order to achieve facial recognition login function, we have integrated the Baidu facial recognition SKD, which requires collecting and using your unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information). Please carefully read the "Baidu Face Recognition SDK Privacy Policy" for details【 https://ai.baidu.com/ai-doc/REFERENCE/Akdyizf5t 】Get to know.

d. Use based on social and public interests that comply with laws and regulations.

(2) Transfer

We will not transfer your personal information to any company, organization, or individual, except for the following circumstances:

1.Obtain your consent or authorization;

2. Provide necessary information in accordance with applicable laws and regulations, administrative, judicial and other competent authorities' requirements;

3. Provided in accordance with the relevant agreements signed with you (including online electronic agreements and corresponding platform rules) or other legal documents;

4. When involving mergers, acquisitions, asset transfers, or similar transactions, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.

(3) Public disclosure

We will publicly disclose your personal information only under the following circumstances and on the premise of taking security measures that comply with De facto standard:

1. Disclose your agreed information in a specific manner based on your explicit authorization or consent;

2. Disclosure shall be made in accordance with applicable laws and regulations, as well as the requirements of competent authorities such as administrative and judicial authorities. On the premise of compliance with laws and regulations, when we receive the request for disclosure of information mentioned above, we will require the issuance of corresponding legal documents and conduct careful review.

5、 How do we protect and save your personal information

We will only retain your personal information for the period necessary for the purposes stated in this Privacy Policy and for the period required by laws and regulations. We use various security technologies and procedures to prevent information loss, improper use, unauthorized reading or disclosure. For example, in certain services, we will use encryption technology (such as SSL) to protect the personal information you provide. But please understand that due to technological limitations and various malicious means that may exist, even if every effort is made to strengthen security measures, it is impossible to always ensure 100% security of information. You need to understand that the system and communication network you use to access our services may encounter problems due to factors beyond our control.

6、 How do you manage personal information

(1) You can access, update, and manage the information you provide us, and we will do our best to use technical means to ensure the realization of your rights. You can exercise your access rights through the following methods: Account Information - If you wish to access or edit personal information in your account, change your password, add security information, change your password, add security information, etc., you can perform such operations in the product you are using.

(2) Correct your personal information;

(3) Delete your personal information;

(4) Change the scope of your authorization and consent. You can modify or revoke some authorization by unbinding, modifying personal settings, deleting relevant information, etc., or you can revoke authorization by turning off the function.

If you find that our collection and use of your personal information violates laws, administrative regulations, or agreements with you, you can contact our customer service to request the deletion of your personal information collected under the violation. Despite the above agreement, in accordance with legal and regulatory requirements, we may not be able to respond to your request in the following situations: related to national security and national defense security; Related to public safety, public health, and major public interests; Related to criminal investigation, prosecution, and trial; There is sufficient evidence to indicate that you have subjective malice or abused your rights; Responding to your request will cause serious damage to the legitimate rights and interests of other individuals and organizations.

7、 Revision and Notice of this Policy

The application and revision of this policy applies to all services related to enterprise security. We may make timely revisions to this policy based on business functions, usage rules, contact information, changes in storage areas, or legal and regulatory requirements. Due to the large number of users of enterprise security, if this policy changes, we will notify you by pushing notifications, sending emails, letters, or phone calls, or publishing announcements on the official website of enterprise security. In order for you to receive notifications in a timely manner, we suggest that you notify us promptly when your email address is updated. If you continue to use Enterprise Security Services after the revision of this policy, it means that you have fully read, understood, and accepted the revised policy and are willing to be bound by it. You can view this policy on the homepage of the official enterprise security website. We encourage you to review our privacy policy every time you visit corporate security.

8、 How to contact us

If you have any questions, opinions or suggestions regarding this privacy policy or your personal information, please contact us at [400-6655-581].

9、 Account cancellation

There is no account cancellation function in the app. Users can log out by contacting the enterprise administrator.