Privacy Policy

Updated: April 18, 2023

Effective Date: May 03, 2023

Suzhou Zhixi Information Technology Co., Ltd. and its affiliates (hereinafter “We”), as the operator of Zhixi Mind Map Products, Zhixi Flowchart Products, and related services (hereinafter “Products and related services”), we are aware of the importance of your personal information and we will protect your personal information and privacy in accordance with laws and regulations. We have established this Privacy Policy and would like to remind you of it.

The following section will help you understand in detail how we collect, use, store, transmit, share, transfer, and protect personal information, as well as how to search for, access, delete, correct, and withdraw your consent to the use of personal information; Please be aware that we have bolded and underlined the important points of the terms and conditions regarding your rights and interests in relation to your personal information.

Contents

1. How We Collect and Use Personal Information
2. How We Use Cookies and Similar Technologies
3. How We Share, Transfer, and Publicly Disclose Personal Information
4. How We Store Personal Information
5. How We Protect the Security of Personal Information
6. Managing Your Personal Information
7. Minors’ Clause
8. Revisions and Notices of Privacy Policy
9. How to Contact us

1. How We Collect and Use Personal Information

We collect information that you voluntarily provide when you use the Services, as well as information generated in the course of using the features or receiving the Services through automated means, in the following ways:

1.1 Registration, Login, and Feature Implementation

1.1.1 When you register and log in to the Product and related services, you can create an account by using your mobile number, and you can improve the relevant network identification information (nickname, password), which is collected to help you complete the registration. You can also choose to fill in other information to complete your information according to your own needs.

1.1.2 You can also use a third-party account to log in and use the Products and related services. You will authorize us to obtain some of the information you registered on the third-party platform (avatar, nickname, and other information that will be provided to us when the third-party platform authorizes you to log in), which will be used to bind with the account of the Products and related services so that you can directly log in and use the Products and related services.

1.1.3 In order to realize the functions of the Products and/or related services and to help you save, use, and share the files you edited or uploaded, we will save such content in the cloud and provide it to specific objects based on your actual use operations (e.g., sharing, etc.), but we will not view, use, or share the files edited or uploaded by you without your consent.

1.1.4 When you use the mobile app products, we may apply for permission to collect corresponding personal information from you for the following purposes:

(1)In order to help you modify the avatar of your App account, we need you to authorize the camera permission of your mobile device to obtain the local images or take photos of your mobile device.
(2)In order to help you export files, we need you to authorize us to read the photos and files on your mobile device in order to save the files locally.
(3)A complete list of your permissions to use the mobile application:

Permissions and Purposes Permission Name Collection Method Usage Scenario
Camera Taking photos android.permission.CAMERA User authorization The app needs to allow avatars to be taken when the user changes avatar
Device Info( IMEI、IMSI、ANDROID ID、MAC、IDFA、OAID、UAID) 1. read the state and identity of the mobile device;
2. read the mobile device type
android.permission.READ_PHONE_STATE The App collects after user authorization 1. The App has cloud storage scenarios. It is necessary to determine the user’s current network status to decide whether the cloud is saved successfully or not;
2. Collect the information related to the number of connected devices used and the type of devices used to connect to the APP, as well as information about the operating systems of those devices to ensure that the service meets your needs;
Storage Reads the contents of your SD card android.permission.READ_EXTERNAL_STORAGE User authorization 1. Allowing the user to download files from the network to the phone;
2. Allow the user to download files from the network in image format to the phone;
3. Feedback scenarios, which need to allow users to open an album of photos and upload a picture of the problem;
4. Need to allow users to open albums to upload avatars when changing avatars;
Write, modify, or delete the contents of the SD card. android.permission.WRITE_EXTERNAL_STORAGE User authorization
Clipboard Get clipboard information / / 1.Allow users to read the contents of the clipboard and open the file details;
2. Allow users to copy and paste file contents using the clipboard;
Notifications, installed apps list  

1. read the state and identity of the mobile device;

2.Push system notifications

/ / APP-related message push; when a device has multiple APP push links active at the same time, we use the merge link technology to randomly merge them into one link for the purpose of saving power and traffic(Aurora SDK)

1.2 Postings and Interactions

You are aware and agree that we may send multiple types of notifications to one or more of the contact information (e.g., phone number) that you provide in the course of using the Products and/or Services for the purpose of user notification, identity verification, security verification, user experience research, etc.

1.3 Payment Completion

Please note that the payment function is provided to you by third-party payment organizations with which we have partnered, and we will collect your payment status through the third-party payment organization in order to confirm the provision of paid services to you.The third-party payment organization may need to collectyour name, bank card type and number, expiration date, and mobile number. The card number, expiration date, and mobile number are sensitive personal information, which is necessary for the payment function. Refusal to provide such information will result in your inability to use the function, but will not affect the normal use of other functions.

1.4 Safe Operations

1.4.1 Security Guarantee Function

We are committed to providing you with safe and trustworthy products and use of the environment. Providing high-quality and reliable services and information is our core objective. The information collected to realize the safety and security function is necessary information.

1.4.2 Device Info and Log Info

In order to improve the security of your use of the services provided by us and our affiliates and partners, to protect your personal and property safety or that of other users or the public from infringement, and to better prevent phishing, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion, and other security risks, we collect information necessary to fulfill our safety and security functions. We may use or integrate your account information, transaction information, device information, service log information, and information shared by our affiliates and partners with your authorization or in accordance with the law, to comprehensively determine the risk of your account transactions, authentication, detection and prevention of security incidents, and to take the necessary measures for recording, auditing, analyzing, and disposal.

(1)In order to ensure the safe operation of the products and services, we will collect your device information (including device model, operating system version, the hardware address of network equipment), information on the region where the device is located (rough regional information based on IP address), the product version number, network access mode, type, status, network quality data, operation, use, service logs, the region where you are located, and your habits of network use.
(2) In order to understand the user’s use of the product, and to ensure the safety of product operation, we need to collect log information on your use of the product and related services.
The above log information includes:
– Your behavioral information on the operation and use of the product and related services: clicks, purchases, browsing, sharing, etc.
– Information you provide on your own initiative: feedback, posting, comments, etc.
(3)In order to prevent malicious programs necessary for safe operation, we may collect usage and frequency, application crashes, and browser sources.
(4)We may use your account information, device information, service log information,and information that our affiliates and partners are authorized to share with you or can share in accordance with the law, for the purpose of determining account security, authentication, and detecting and preventing security incidents.

1.5 Changes in the Purpose of Collecting and Using Personal Information

Please understand that as our business develops, there may be adjustments and changes to the functions and services provided by this product and related services. In principle, when the new functions or services are related to the functions or services we currently provide, the personal information collected and used will be directly or reasonably related to the original purpose of processing. In the case where there is no direct or reasonable relation to the original processing purpose, we will collect and use your personal information, inform you again, and obtain your consent.

However, please understand that the services we provide to you are constantly updated and developing. If you choose to use other services that are not covered in the above description, and we need to collect your information based on such services, we will separately explain the scope and purpose of information collection to you by means of page prompts, interactive processes, and agreements, and obtain your consent. We will use, store, provide, and protect your information in accordance with this policy and the corresponding user agreement; if you choose not to provide the aforementioned information, you may not be able to use a certain service or a certain part of the service, but it does not affect your use of other services provided by us. In addition, in the course of your use of this product and related services, if you are involved in the use of services provided by a third party, please note that the relevant services are provided to you by the third-party entity. If the third party collects personal information from you, we recommend that you carefully review the privacy policy or agreement of the third party.

1.6 Personal Information Collected and Used without Consent in Accordance with Laws and Regulations

Please understand that in the following cases, according to laws and regulations and relevant national standards, we do not need to obtain your authorized consent to collect and use your personal information:

(1)Those directly related to national security and national defense security;
(2)Directly related to public safety, public health, and significant public interests;
(3)Directly related to crime investigation, prosecution, trial and judgment execution, etc.;
(4)For the purpose of safeguarding the subject of personal information or other individuals’ life, property, and other significant legitimate rights and interests but it is difficult to obtain my consent;
(5)The personal information collected from you is disclosed to the public by yourself;
(6)Your personal information collected from legitimate publicly disclosed information, such as legitimate news reports, government information disclosure, and other channels;
(7)Necessary for the signing or fulfillment of a contract at your request;
(8)Necessary for maintaining the safe and stable operation of the products and related services, such as discovering and disposing of failures of the products and related services;
(9)Necessary for legitimate news reporting;
(10)Necessary for academic research institutions to carry out statistical or academic research in the public interest, and to de-identify the personal information contained in the results when providing the results of academic research or descriptions to the public;
(11)Other cases stipulated by laws and regulations.

Particularly, you are reminded that information that does not identify you individually or in combination with other information is not your personal information in the legal sense; when your information identifies you individually or in combination with other information or when we use data that cannot be linked to any particular personal information in combination with other personal information about you, such information will be treated and protected as your personal information in accordance with this Privacy Policy for the duration of the combined use.

1.7 Self-launch and Linked Launch
In order to allow you to experience the Offline Reminder function of APP messages, the normal use of the file import feature, as well as to provide a better service, after you agree to this Privacy Policy, you will enable the Self-launch or Linked Launch feature of the APP when necessary.

2. How We Use Cookies and Similar Technologies

Cookies and similar technologies such as device information identifiers are commonly used on the Internet. When you use the Products and related services, we may use such technologies to send one or more cookies or anonymous identifiers to your device in order to collect and identify information about your access to and use of the Products. We promise not to use cookies for any purpose other than those described in this Privacy Policy. We use cookies and similar technologies primarily to fulfill the following functions or services:

2.1 Secure and Efficient Operations of Products and Services

We may set authentication and security cookies or anonymous identifiers that allow us to verify that you have logged on to the Services safely or are not experiencing theft, fraud, or other wrongdoing. These technologies also help us to improve the efficiency of the Services and to increase the speed of access and response.

2.2 Helping Make Your Visit Easier

The use of such technologies can help you eliminate the need to repeat the steps and processes that you have to take to fill in your personal information and enter your searches.
2.3 Troubleshooting Anomalies

We may use cookies to record browsing activities on the sharing pages of our products and related services to detect anomalies related to crashes and delays and to explore better ways to provide services.
2.4 Removal of Cookies

Most browsers provide users with the function of clearing the cache data of the browser, and you can clear the data accordingly in the settings of your browser. If you do so, you may not be able to use the cookie-dependent services or features we provide.

3. How We Share, Transfer, and Publicly Disclose Personal Information

3.1 Sharing
We are obligated to keep your information confidential and will not sell or rent any of your information without your consent, but we will share your information under the following circumstances:
3.1.1 Information Sharing Situations:
(1) Sharing under legal circumstances: We may share your personal information in accordance with the provisions of laws and regulations, litigation, dispute resolution needs, or at the request of administrative or judicial authorities in accordance with the law.
(2) Sharing with explicit consent: We will share your personal information with other parties after obtaining your explicit consent.
(3) To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect the company, its users, or the public from damage to their interests, property, or safety.
(4) Sharing with Affiliates: In order to facilitate the provision of products or services to you based on your Platform account and to identify anomalies in our account, your personal information may be shared with our affiliates and/or their designated service providers. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy, and if we share your sensitive personal information or if our affiliates change the purposes for which the personal information is used and processed, we will ask for your authorization and consent again.
(5) Sharing with Authorized Partners: In order to provide you with better, high-quality products and services, we may engage authorized partners or use third-party SDK-related technologies to provide you with services or perform functions on our behalf. We will only share your information for purposes that are lawful, legitimate, necessary, specific, and explicit as stated in this Privacy Policy, and partners will only have access to the information they need to perform their duties and will not use this information for any other purpose.

Please understand that we conduct rigorous testing of our partners or the product toolkits from which they access information to protect the security of the data.

Click here to view the Third-party SDK Catalog

3.1.2 Sharing of Information for Realization of Functions or Services
(1) When you use the product and related services in the functions provided by our affiliates or third parties, or when product service providers or system service providers jointly provide services to you, we will share the information necessary for the realization of the business with these affiliates or third parties for the realization of the specific functions mentioned above.
(2) Payment Functions: Payment functions are provided to you by third-party payment organizations that cooperate with us. The third-party payment institution may need to collect your name, bank card type and number, expiration date, and mobile number. The bank card number, expiration date, and mobile number are sensitive personal information, which is necessary for the payment function. Refusal to provide such information will result in your inability to use the function, but will not affect the normal use of other functions.

3.1.3 Realization of Advertising-related Sharing Information

Advertising Statistics: We may share with service providers, vendors, and other partners of our business to analyze de-identified device information or statistical information that is difficult or impossible to correlate with your true identity. This information will help us analyze and measure the effectiveness of advertising and related services.

3.1.4 Sharing Information to Achieve Security and Analyze Statistics

(1) Security of use: We attach great importance to account, service and content security. In order to safeguard the account and property security of you and other users, and to protect your and our legitimate legal rights and interests from unlawful infringement, we and our affiliates or service providers may share the necessary equipment, account and log information.
(2) Analyzing Product Usage: In order to analyze the usage of our services and improve the user experience, we may share statistical data on product usage (crashes, flashbacks) with our affiliates or third parties. These data are difficult to combine with other information to identify your personal identity.
(3) Academic Research and Scientific Research: In order to improve scientific research capabilities in related fields and promote the level of scientific and technological development, we may share de-identified or anonymized data with scientific research institutes, colleges and universities, etc., on the premise of ensuring data security and legitimate purposes.

3.1.5 Helping You Participate in Marketing and Promotional Activities

When you choose to participate in relevant marketing activities organized by us and our affiliates or third parties, you may be required to provide your name, mailing address, contact information, and bank account information. This information is sensitive and refusal to provide it may affect your ability to participate in the relevant activity, but will not affect other functions. Only with your consent, we will share this information with the related parties or third parties to ensure that you receive a consistent experience of the services in the joint activities, or to entrust the third party to timely fulfill the rewards to you.

3.2 Transfers
3.2.1 We will not transfer your personal information to any other third party unless we have your express consent.
3.2.3 As we continue to develop our business, we may engage in mergers, acquisitions, or transfers of assets, and your personal information may be transferred as a result. In the event of such a change, we will require the successor to protect your personal information in accordance with laws and regulations and security standards no less stringent than those set forth in this Privacy Policy, or we will require the successor to obtain your authorization.
3.3 Public Display
3.3.1 We will not publicly disclose your information except in accordance with national laws and regulations or with your consent. When we publicly disclose your personal information, we use security measures that meet industry standards.
3.3.2 We may disclose information about accounts in violation of laws and regulations or when we announce penalties for fraudulent behavior.
3.4 Delegated Processing
In order to enhance the efficiency of information processing, reduce the cost of information processing, or improve the accuracy of information processing, we may entrust our affiliates or other professional organizations with the ability to process information on our behalf. We will require the entrusted company to comply with strict confidentiality obligations and take effective confidentiality measures through written agreements, on-site supervision, etc., and prohibit it from using such information for purposes not authorized by you. Upon termination of the contractual relationship, the entrusted company will no longer keep the personal information. We undertake to be responsible for this.
3.5 Personal Information Exempted from Consent for Sharing, Transferring, and Public Disclosure in accordance with Laws and Regulations
Please understand that in the following cases, according to laws and regulations and national standards, we do not need to obtain your authorized consent to share, transfer or publicly disclose your personal information:
(1) Directly related to national security and national defense security;
(2) Directly related to public safety, public health, and significant public interests;
(3) Directly related to crime investigation, prosecution, trial, and judgment execution;
(4) For the purpose of safeguarding your or other individuals’ life, property, and other significant legitimate rights and interests but it is difficult to get my consent;
(5) Personal information that you disclose to the public on your own;
(6) Personal information collected from legitimate publicly disclosed information, such as legitimate news reports, government information disclosure, and other channels.

4. How We Store Personal Information

4.1 Storage Location
We store your personal information collected and generated in the course of our operations in the People’s Republic of China in accordance with laws and regulations. At present, we will not transfer the above information outside of China. If we do transfer the information outside of China, we will follow the relevant national regulations or ask for your consent.
4.2 Storage Period
We will retain your personal information only for the period necessary to provide the Products and related services and for the purposes of the Services: information, comments, and related information that you voluntarily post will be retained for as long as you have not deleted them or canceled your account. After the necessary period, we will delete or anonymize your personal information, unless otherwise provided by law or regulation. In the following cases, we may change the storage period of personal information to comply with legal requirements:
(1) To comply with applicable laws and regulations, for example, Article 21(3) of the Cybersecurity Law of the People’s Republic of China requires that the retention of network logs of technical measures for monitoring and recording network operation status and network security events shall not be less than six months;
(2) For the purpose of complying with the provisions of court judgments, rulings or other legal procedures;
(3) For the purpose of complying with the requirements of government agencies or legally authorized organizations;
(4) For purposes reasonably necessary for the execution of the Platform Agreement or this Policy, the maintenance of the public interest of society, and the protection of the personal safety or other legitimate rights and interests of the Company and the Company’s affiliates, other users, or employees.

5. How We Protect the Security of Personal Information

5.1 We take the security of your personal information very seriously and will endeavour to take reasonable security measures (both technical and managerial) to protect your personal information from improper use or unauthorized access, public disclosure, use, modification, damage, loss or leakage of the personal information you provide.

5.2 We will use encryption technology, anonymization, and related reasonably practicable means to protect your personal information and use security protection mechanisms to prevent malicious attacks on your personal information.

5.3 We will establish a specialized security department, security management system, and data security process to safeguard your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology at appropriate times.

5.4 However, please understand that, despite the above measures, due to technical limitations and the possible existence of a variety of malicious means, in the Internet industry, even if every effort is made to strengthen security measures, it is not always possible to ensure that 100% of the information is safe, and we will do our best to ensure the security of the personal information that you have provided to us.

5.5 You are aware and understand that the systems and communication networks used by you to access our services may experience problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account passwords and related personal information to others.

5.6 We will formulate an emergency response plan and immediately activate the emergency response plan in the event of a user information security incident, in an effort to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage or loss) occurs, we will inform you in a timely manner in accordance with the requirements of laws and regulations, and when it is difficult to inform you one by one, we will take reasonable and effective ways to publish announcements. At the same time, we will also report the disposition of user information security incidents in accordance with the requirements of the relevant regulatory authorities.

5.7 Once you leave the Products and related services and related services to browse or use other websites, services, and content resources, we will not have the ability and direct obligation to protect any personal information submitted by you in products and websites other than the Products and related services and related services, regardless of whether your login, browsing or use of the said products and websites is based on the links or guidance of the Products and related services.

6. Managing Your Personal Information

We attach great importance to the management of your personal information, to protect your rights related to the query, access, correction, deletion, withdrawal of consent authorization, cancellation of account, complaints, and reports, and the setting of privacy features of your personal information, in order to enable you to safeguard your privacy and information security.

6.1 Access, Deletion, and Correction of Your Personal Information

6.1.1 Access to Personal Account Information

Specific access methods, such as: Query and access your personal information such as avatar, user name, cell phone number, etc. in Personal Home – Account Center.

6.1.2 Query Access, Correction, Deletion of Information

Specific adjustment methods, such as:
(1)Correct your personal information like nickname, password, cell phone number, etc. in Home – Account Center.

6.2 For security and identification reasons, you may not be able to independently modify some of the initial registration information submitted during registration. If it is necessary for you to modify such information, please contact us by e-mail (support@zhixi.com). We will review the issue as soon as possible and respond in a timely manner after your user identity is verified.
6.3 Account Cancellation
You may cancel your account by contacting us through the official contact information provided by us. We will cancel your account within fifteen (15) business days after receiving your request or consult with you to confirm the account cancellation.
You can also cancel your account by following the guidelines set out in this product and the related pages (click on your avatar to enter the Account Center – Account Security – Cancel Account).
You know and understand that the act of account cancellation is irreversible, and when you cancel your account, we will delete the relevant information about you or anonymize it, unless otherwise provided by laws and regulations.
6.4 Complaints
You may file a complaint or report in accordance with our published system. If you believe that your personal information rights may have been infringed upon, or if you discover a clue that your personal information rights have been infringed upon, you may initiate a complaint or report to us by contacting us through the official contact information provided by us. We will respond to your complaint or report within 30 days after verification.
6.5 Notwithstanding the above, in accordance with relevant laws and regulations and national standards, we may not be able to respond to your request under the following circumstances:
(1) Directly related to national security and national defense security;
(2) Directly related to public safety, public health, and significant public interests;
(3) Directly related to the investigation, prosecution, trial, and knowledge of the verdict of a crime;
(4) There is sufficient evidence to prove that you have subjective malice or abuse of rights;
(5) Respond to your request will lead to other individuals, and organizations receive serious damage to the legitimate rights and interests;
(6) Involving trade secrets.

7. Minors’ Clause

We are aware of the importance of protecting the personal information security and privacy of children (according to the provisions of the “Regulations on the Protection of Children’s Personal Information Network”, children hereinafter refer to minors under the age of fourteen). We have separately set up the “Children’s Privacy Policy”, and in the event of any inconsistency between this Agreement and the “Children’s Privacy Policy”, the “Children’s Privacy Policy” shall prevail.
(1) Our handling of minors’ personal information will follow the principles of legality, legitimacy, and necessity.
(2) If you are a minor, you should read and agree to this Privacy Policy together under the supervision and guidance of your parents or other guardians before using the Products and related services and related services.
(3) We protect the personal information of minors in accordance with relevant national laws and regulations, and will only collect, use, share, or disclose the personal information of minors as permitted by law, with the explicit consent of parents or other guardians, or as necessary for the protection of minors. If we find that we have collected the personal information of a minor without first obtaining verifiable parental or other guardian consent, we will try to delete the relevant information as soon as possible.
(4) If you are the guardian of a minor, please contact us through the contact information disclosed in this Privacy Policy when you have questions about the personal information of a minor under your guardianship.

8. Revisions and Notices of Privacy Policy

8.1 In order to provide you with a better service, the Products and related services and associated services will be updated and changed from time to time and we may revise this Privacy Policy from time to time. These revisions form part of this Privacy Policy and have the same effect as this Privacy Policy. We will not reduce your rights under this Privacy Policy as currently in effect without your express consent.

8.2 When this Privacy Policy is updated, we will issue an updated version of this Privacy Policy on the Products and related services and remind you of the updated content through the announcement on the official website (www.zhixi.com) or other appropriate means before the updated terms and conditions take effect, so that you can be informed of the latest version of this Privacy Policy.

9. How to Contact us

If you have complaints, suggestions, or queries regarding the protection of personal information, please send them to(support@zhixi.com)Or mail it to the following address:

Data Security and Privacy Office, Legal Department, Suzhou Zhixi Information Technology Co.
Unit 4-B703-002, Creative Industry Park, No. 328 Xinghu Street, Suzhou Industrial Park, China
We will review the issue as soon as possible and respond within fifteen (15) business days after verifying your user ID.

Suzhou Zhixi Information Technology Co.