When you use our App, we will collect, store, use and disclose your personal information in accordance with the Shhhh Privacy Policy. At the same time, we will explain to you through this Agreement how we provide you with services to access, update, manage and protect your personal information. Shhhh recommends that you carefully read and agree to all the contents of this Agreement. We are fully aware of the importance of personal information to you and will do our best to protect your personal information.
Collection and use of personal information
1. Shhhh provides a one-click login function. After passing the verification and the user reads and agrees to this agreement and the user agreement, the user's device ID and other information will be directly bound to complete the account login process. After logging in to this application account, you can decide whether to view and complete your account information such as your avatar, nickname, personal profile and personal preferences.
2. When you log in to your account, all usage information will be automatically associated with your Shhhh account. When providing location-sensitive content or services, we will use geographic location information with your explicit authorization to optimize content quality and accurately push content and services that you may be interested in.
3. When you want to shoot or share audio, video or pictures to Shhhh, we will politely request authorization for camera, album, microphone and other permissions according to your functional requirements. If you choose to refuse, although you cannot enjoy sharing and other functions, Shhhh's other exciting functions will still be fully open to you.
4. Shhhhh is committed to presenting you with more personalized and more demand-oriented information and services. To this end, we carefully collect and analyze your personal information, use advanced computer algorithm models to automatically calculate and predict your interest preferences, and accurately match and recommend information and services that may interest you. All these efforts are to create a more intimate and exclusive Shhhh experience.
Sharing, transfer and public disclosure of personal information
1. How to share personal information
Except in the following circumstances, we will not share your personal information with any third party, such as any company, organization or individual:
(1) Sharing with explicit consent: We will share your personal information with third parties after obtaining your explicit consent.
(2) We may share your personal information with third parties in accordance with laws and regulations or mandatory requirements of government authorities.
(3) Sharing with authorized partners: Some of our services will be provided by authorized partners only for the purposes stated in this Agreement. We will only share your personal information for legitimate, proper, necessary, specific and clear purposes, and will only share personal information necessary to provide the service. Our partners have no right to use the shared personal information for any other purpose.
2. How to transfer personal information
We will not transfer your personal information to any third party such as companies, organizations and individuals, except in the following circumstances:
(1) Transfer with explicit consent: We will transfer your personal information to other parties after obtaining your explicit consent;
(2) In the event of mergers, acquisitions, asset transfers or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this Agreement and to continue to protect or require the successor of personal information to continue to protect your personal information in accordance with laws and regulations and security standards not less than those required by this Agreement, otherwise we will require the company or organization to re-ask for your authorization and consent.
3. How to disclose personal information
We will only publicly disclose your personal information and adopt security protection measures that meet industry standards in the following circumstances:
(1) After obtaining your explicit consent;
(2) Disclosure based on law: We may publicly disclose your personal information when required by law, legal procedures, litigation or government authorities;
(3) Announcement of penalties for illegal accounts and fraudulent behavior.
4. Personal information that is shared, transferred, or disclosed without consent
According to laws, regulations, and national standards, we do not need to obtain your authorization or consent to share, transfer, or disclose your personal information in the following circumstances:
(1) Directly related to national security and national defense security;
(2) Directly related to public security, public health, or major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(4) For the purpose of protecting your or other individuals’ major legitimate rights and interests such as life and property, but it is difficult to obtain your consent;
(5) Personal information that you disclose to the public on your own;
(6) Personal information collected from legally disclosed information, such as legal news reports, government information disclosure, and other channels.
Cookies and similar technologies
Cookies and similar technologies are commonly used technologies on the Internet. When you use our products or services, we may use Cookies and similar technologies to automatically identify your information and store it as log information. You can clear the cookies saved on your computer or enable the Do Not Track function, which is available on most web browsers. We use Cookies and similar technologies mainly to achieve the following functions or services:
1. Ensure the safe and efficient operation of products and services
We may set authentication and security Cookies or anonymous identifiers to enable us to identify whether you have safely logged into the product or help determine the security of your account. These technologies will also help us improve service efficiency and enhance our service speed, performance and efficiency.
2. Help you get a more convenient access experience
Using such technologies can help you save the steps and processes of repeatedly filling in personal information and entering search content. Recording your personalized layout format, appearance design and other personalized settings will help us provide services that meet your personalized needs.
3. Recommend, display and push content that you may be interested in
We may use cookies and similar technologies to understand your preferences and usage habits, conduct data analysis, improve product services, recommend information or features that users are interested in, and optimize your advertising choices.
Your rights
In accordance with relevant national laws, regulations, national standards, and industry practices, we guarantee that you can exercise the following rights to your personal information. The scope and method of your access, modification and deletion of personal information will depend on the specific services you use:
1. Access your personal information
You have the right to access your personal information, except for exceptions stipulated by laws and regulations. If you want to exercise your right to access data, you can access it yourself in the following ways: Account information-if you want to access or edit the personal information in your account, change your password, add security information, etc., you can click "Me" in the lower right corner of the application client and perform the corresponding operation by clicking on the avatar.
2. Correct your personal information
In general, you can directly delete the content you posted, and browse, modify, and delete the information you submitted at any time. However, for security and identity recognition reasons, you may not be able to modify certain initial login information submitted when logging in.
3. Delete your personal information
You may request us to delete your personal information in the following circumstances:
(1) If our handling of personal information violates laws and regulations;
(2) If we collect and use your personal information without your consent;
(3) If our handling of personal information violates our agreement with you;
(4) If you no longer use our App or service;
(5) If we no longer provide you with this App or service.
4. You may cancel your previously logged-in account at any time. You may apply to us to cancel your account by email. Before canceling your account, we will verify your personal identity, security status, device information, etc. The act of canceling an account is irreversible. After canceling your account, we will delete all information about your App account or anonymize the relevant information.
5. How we respond to your request
For security reasons, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. We will respond within thirty working days. In the following circumstances, we will not be able to respond to your request in accordance with laws and regulations:
(1) Directly related to national security and national defense security;
(2) Directly related to public security, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(4) There is sufficient evidence that you have subjective malice or abuse of rights;
(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(6) Involving commercial secrets.
How we store personal information
Personal information collected and generated by this application within the country will be stored within the country. We will not transfer the above information abroad. If some functions of this application involve cross-border business, and we need to transfer relevant personal information collected in the country to overseas institutions, we will follow the relevant national regulations, seek your consent, and implement it in accordance with the laws, regulations and regulations of relevant regulatory authorities, and require overseas institutions to keep confidential your personal information obtained through effective measures such as signing agreements and on-site inspections.
Protecting personal information
This application will ensure that all personal information processing activities strictly comply with national laws, regulations, administrative regulations and all applicable standards and specifications, and resolutely prevent any unauthorized access attempts, as well as risks such as personal information leakage, tampering and loss.
1. Personal information protection
This application clearly informs all users: You have the option to refuse to provide us with some of your personal data. We respect your privacy preferences and provide a convenient mechanism for this. You can easily adjust your data usage preferences through our platform setting options and clearly express your willingness not to use your personal data for sale. At the same time, if you encounter any problems during use or need to further understand the data protection policy, please feel free to contact our customer service team. We will wholeheartedly answer your questions and ensure that your data rights are fully protected.
2. Security technology reinforcement
We adopt and implement encryption technology that is not lower than industry standards, combined with advanced means such as de-identification and anonymization, to deeply protect your personal information. At the same time, we have deployed multiple security defense mechanisms to effectively resist various malicious attacks and ensure the absolute security of your information during transmission and storage.
3. Management system construction
In order to further improve the level of personal information security protection, we have set up a professional security management department and established a complete security management system and data protection process. We implement a strict authority management system to ensure that only authorized personnel can access your personal information. In addition, we regularly conduct information security education and training for all employees to enhance the safety awareness of all employees, and regularly conduct security audits of data processing systems and technical environments to promptly discover and eliminate potential risks.
4. Emergency response mechanism
We have formulated a detailed emergency plan for personal information security incidents and regularly organize drills to ensure that we can respond quickly in emergencies, effectively control the development of the situation, and reduce or avoid adverse consequences. Once a security incident such as personal information leakage, tampering, or loss is confirmed or suspected, we will immediately activate the emergency plan and inform you of the details of the incident as soon as possible in accordance with the requirements of laws and regulations, including the type of personal information affected, the cause of the incident, the possible harm caused, the remedial measures taken, the self-protection measures you can take, and contact information.
Updates to the Agreement
Shhhh reserves the right to modify the terms of this Agreement from time to time. Any modifications or updates will be clearly marked on this page for your convenience. If you have any objections to the newly revised Agreement after reviewing the revised Agreement, we recommend that you immediately stop using the Shhhh platform and related services. If you choose to continue to access or use our products or services, we will deem that you have fully understood and voluntarily accepted all the revised terms. The specific definition of major changes in this application includes but is not limited to the following situations:
1. Our core business model has undergone fundamental changes, which may affect the way and experience you use Shhhh.
2. Major changes in ownership structure or organizational structure, such as changes in company ownership or management caused by business strategy adjustments, financial restructuring, bankruptcy liquidation, corporate mergers and acquisitions, etc.
3. Major changes in personal information processing policies, especially when changes in the main recipients of information sharing, transfer or public disclosure, we will ensure that you understand the possible impact of these changes.
4. Major changes in your rights and how they are exercised during the processing of personal information, such as changes in the procedures or conditions for accessing, correcting, and deleting personal information.
Contact us
We attach great importance to protecting the rights of users' personal information subjects, and have set up a dedicated personal information protection and a dedicated personal information feedback channel. If you have any complaints, suggestions or questions about our privacy policy or our handling of personal information, you can contact our data security officer Ignacio: bluceglaesser@gmail.com. You can also go to Shhhh's email "support@shhhh.com" to provide feedback.