Whisp Privacy Policy

Last Updated and Effective Date: July 11, 2024

Introduction

Beihai Park Information Technology Co., Ltd. and its global affiliates (referred to collectively as "the Company," "we," or "our") fully respect your privacy rights. We have prepared this "Whisp Privacy Policy" (referred to as "this Policy" hereinafter) to help you understand how we collect, use, disclose, protect, store, and transmit your personal information. Please read this Policy carefully. If you have any questions, please contact us.

This Policy applies to products that display or link to this Policy, including but not limited to the "Whisp" software, official website, and products and services provided by the Company to support the "Whisp" software (referred to as the "Whisp Platform" hereinafter).

As the operator of the Whisp Platform, we understand the importance of personal information to you, and we will protect your personal information and privacy security in accordance with the relevant laws and regulations. We have formulated this Privacy Policy and specifically remind you: we hope you carefully read and understand this Privacy Policy before using Whisp and related services to make appropriate choices.

We will use this Privacy Policy to introduce how we handle personal information in different scenarios. When you open or use the Whisp software to achieve the functions and services you choose to use or to comply with legal requirements, we will process relevant information. In addition to the information necessary to implement the basic functions and services of the Whisp software and the information required by laws and regulations, you can refuse us to process other information. However, this may result in our inability to provide corresponding functions and services. We will explain the relevant situations one by one in the Privacy Policy. Important terms concerning your personal information rights and interests are highlighted, so please pay special attention.

The following sections will help you understand in detail how we collect, use, store, transmit, disclose, and protect personal information, as well as how you can inquire about, correct, supplement, delete, copy, and transfer personal information. Important information about your personal information rights and interests is highlighted, so please pay special attention.

 

Contents for This Agreement

Article 1. About Us

Article 2. Meaning of Personal Information and Scope of Application of this Privacy Policy

Article 3. How We Collect Personal Information

Article 4. How We Use Cookies and Similar Technologies

Article 5. How We Protect Personal Information

Article 6. How We Use Third Party Services and Technologies

Article 7. How We Store Personal Information

Article 8. How We Share, Transfer, and Publicly Disclose Your Personal Information

Article 9. Transfer of Personal Information Globally

Article 10. Your Rights

Article 11. How We Protect Minors and Women

Article 12. Revision and Update of the Privacy Policy

Article 13. How to Contact Us

Article 14. Dispute Resolution Methods

Article 15. Miscellaneous

Appendix: Detailed Permission List

 

Article 1. About Us

1. Whisp Platform: Refers to the internet platform, including but not limited to the Whisp software, official website, and related services in social networking, instant messaging, online culture, and internet valueadded services, operated by Beihai Park Information Technology Co., Ltd. and its affiliated entities.

2. Key Information about the Operator

Company Name: Beihai Park Information Technology Co., Ltd.

Unified Social Credit Code: 91450500MA5PE0355C

3. Company Commitments

 We will collect, store, and use your information in accordance with this Privacy Policy but will not adopt a mandatory bundled collection of personal information solely based on your consent to this Privacy Policy.

 When you use or enable relevant functions or services, we will collect and use relevant information as necessary to provide the functions and services. You can refuse to provide personal information, but it may affect the functionality of the software.

 We respect your right to choose. If you do not wish to have personal information collected, you can revoke authorization at any time in your mobile device's system settings or within the software. If you encounter difficulties in revoking authorization, you can also contact our customer service for assistance.

 

Article 2. Meaning of Personal Information and Scope of Application of this Privacy Policy

1. Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person individually or in combination with other information, or reflect specific activities of a specific natural person. Personal information includes but is not limited to:

(1) Personal Profile (personal name, gender, ethnicity, nationality, address, date of birth, ID number, phone number, email address, etc.); Personal identification information (ID card, social security card, residence permit, etc.); Personal biometric information (fingerprint, palm print, facial features, etc.); Network identity information (system account, IP address, email address, and related passwords, passphrases, passphrase protection answers, user digital certificates, etc.);

(2) Personal financial information (bank account number and password, credit information, transaction and consumption records, transaction records, virtual currency, virtual transaction, gamerelated redemption codes, etc.);

(3) Personal communication information (communication contact information, communication records and content, emails, text messages, etc.); Contact information (address book, friend list, group list, email address list, etc.);

(4) Personal internet records (user operation records stored through logs, including website browsing records, software usage records, etc.); Personal common device information (including hardware serial numbers, device MAC addresses, software lists, unique device identifiers [such as IMEI/Android ID/IDFA/OPENUDID/GUID/SIM card IMSI information, etc.]);

(5)Personal location information (such as travel trajectories, precise location information, etc.);

(6) Other information related to personal identity.

2.Sensitive personal information refers to personal information that, once leaked, illegally provided, or misused, may endanger personal and property safety, may easily cause harm to personal reputation, physical and mental health, or result in discriminatory treatment, etc. Sensitive personal information includes: ID card and ID number, phone number, bank account number and password, system account and password, email address and password, consumption records, geographic location information, etc.

3. Special Note: According to the "Personal Information Protection Law," information that has been anonymized is not considered personal information.

4. Scope of Application of this Privacy Policy

With the exception of certain specific products and services, this Privacy Policy applies to all of our products and services, while specific products and services will be subject to their own privacy policies. Specific privacy policies for certain products and services will provide more specific details on how we collect and use your information within those products and services. In case of any inconsistency between the privacy policy of specific products and services and this Privacy Policy, the privacy policy of the specific products and services shall prevail.

5. Exceptions to the Application of this Privacy Policy

Our services may include or link to software or other services provided by third parties (including websites, H5 pages, etc.). For example:

(1) You may use the "Share" button to share content from our services, or you may use third-party login services to log in to our services. These features may collect relevant information about you (including your log information) and may install cookies on your computer or other mobile devices to enable the proper functioning of these features.

(2) We provide links through advertising or other means that allow you to access third-party services or websites, where such third parties collect and apply information about you. These third-party software, web pages, or other services may be operated by third parties. Your use of third-party software or other services (including any personal information you provide to them) is subject to the terms of service and privacy policy of those third parties (not this Privacy Policy), and you should carefully read their terms. This Privacy Policy applies only to information we collect and does not apply to any services provided by third parties or the information use practices of third parties. We do not assume any responsibility for the use of information you provide to third parties.

 

Article 3. How We Collect Personal Information

1.Personal Information We Collect Directly

We collect personal information in compliance with the principles of legality, legitimacy, necessity, and good faith. Below are the types and scenarios of personal information we collect. Please read them carefully.

(1)Registration (Creation) and Account Login

When you register, log in to Whisp, and use related services, you can create an account using your mobile phone number. You can also provide relevant online identity information (Whisp account, profile picture, nickname, password). We collect this information to assist you in completing the registration process. Collecting your mobile phone number is necessary to comply with national laws and regulations regarding internet real name authentication requirements. If you refuse to provide your mobile phone number for registration and login, we may not be able to provide you with information posting functions (including posting videos, comments, etc.).

Based on our cooperation with telecommunications operators, with your consent, when you use the "oneclick login" function, we will use the functionality provided by the operator to use your device's mobile phone number as your registration and login account, bypassing the need for a password or dynamic verification code, providing you with quick registration and login services. If you do not wish to use the "oneclick login" function, you can register and log in to Whisp through other means.

You can register and log in to Whisp using third-party accounts, but you need to authorize us to access your information on the third-party platform (profile picture, nickname, and other publicly available information, as well as other information you authorize). This is used to create a Whisp account linked to that third-party account, allowing you to register, log in, and use Whisp and related services directly. In some cases, we may need to reverify and link your mobile phone number to confirm the authenticity and relevance of that third-party account.

If you forget your Whisp login method, you can contact customer service to retrieve your password. To safeguard the security of your account, we may need you to provide relevant information for verification, and if necessary, we may verify your identity through real identity information.

After successful registration, the system will generate a Whisp number for your account, which is a public identifier for your account.

(2)Real Name Authentication

In accordance with the requirements of the "Cybersecurity Law" and other laws and regulations, when network operators provide users with information posting, instant messaging, and other services, they should require users to provide their real identity information when signing agreements or confirming service provision. If users do not provide real identity information, network operators shall not provide related services.

Mobile phone numbers, ID card numbers, ID card photos, photos holding ID cards, and facial recognition features (referred to as "real name identity information") are all sensitive personal information. We collect such information to comply with the aforementioned legal requirements for internet real name authentication.

The real name authentication function may prompt you when you use specific functions in the software. You can also complete real name authentication and choose the authentication method in the "Mine  Upper right>corner panel>Account Information>My Authentication" section of the software.

We will only collect your real name identity information with your consent or when you voluntarily provide it. Refusing to provide real name identity information may result in corresponding limitations during your use of the software.

When you use the account or password retrieval function, we may collect your identity information, including your mobile number, real name, ID card number or photo, and facial recognition information, to verify your identity and facilitate account or password retrieval. If you refuse to provide this information, you may not be able to successfully retrieve your account or password.

(3) Account Public Information

The system will generate a public display page for your account. You can autonomously fill in information such as your nickname, personal tags, my tags, authentication information (requires completion of authentication), your role, your preferred role, ethnicity, birthday, region, height, weight, relationship status, personal preferences, etc., through the "Mine Edit Profile" function to enhance your information. The personal information you have provided will be publicly displayed to other users so that they can better understand you, which also helps us recommend to you the results of your screening search, provide content that may interest you and provide user matching services. We respect your privacy and personal choices, and except for functions that require real name authentication based on legal requirements, not filling in the above personal information will not affect your use of Whisp accounts and services. We also remind you to beware of dating scams and not to provide sensitive personal information to strangers.

Your number of likes, followers, following lists, number of fans, fans' lists, publicly posted works, Whisp videos you like (thumbsup), and content you have collected will be publicly displayed on your account's profile page. You can choose not to allow visitors to view your following lists, followers' lists, and Whisp videos you like (thumbsup). You can do this in "Mine  Upper right corner panel  Settings  Privacy."

When we publish penalty notices for violations, we will disclose the nicknames and other information of the violators. This is done to create a clean online environment and protect the legitimate rights and interests of our users. We appreciate your support in helping us combat illegal and irregular activities.

(4) Content Browsing and Searching

While you browse Whisp content, we record your usage patterns. If you are not logged into your account, we use device identifiers to record your clicks, views, and shares. If you are logged into your account, we record your clicks, views, shares, follows, favorites, feedback, postings, likes, comments, and more using your Whisp account.

When providing "Nearby" content or location related content or services based on your device's location, with your authorization, we may use geolocation information related to this service, such as precise location information, WLAN access points, Bluetooth and base stations, sensor information, including information you provide in the service, such as address information you set in your account profile or geographic location links you add to uploaded content. This is done to ensure the quality of content or services and recommend content or services that you may find interesting. Precise location information is considered sensitive personal information, and refusing to authorize location permissions may affect the accuracy of location but will not affect the normal use of other functions and services. We will also only display content or services relevant to you based on network information (such as IP) and geolocation information corresponding to the authorized city, county, and street.

When you use the search function, we collect and analyze your search queries (which may be in the form of text, voice, or images) and search log records. Additionally, to display search results that are more relevant to you, we automatically rank search results based on factors such as content relevance and timeliness. Some search results and related search terms may be displayed based on your search/browse history, location information, log information, etc.

To provide efficient search services, some of the aforementioned information will be temporarily stored on your local storage device, and we will display search result content and search history records for you to view and delete after clicking the search icon.

Short video browsing and searching are basic functions of Whisp, and in these basic functions, we provide non personalized high-quality content and search results.

When you play videos or other content, we may use the device's sensors, such as gravity and acceleration sensors, to adapt to your device's orientation, such as portrait or landscape mode.

(5) Content Input, Upload, Publication, and Sharing

When you shoot or publish audio/video, images, text, or live broadcasts, we will request authorization for camera, photo album, microphone, and clipboard permissions based on the type of functionality you are using. If you refuse authorization, you will not be able to use the shoot, publish, or live broadcast functions, but it will not affect your use of other Whisp functions.

We value user experience, and to improve the upload speed of audio and video, enrich publishing functions, and optimize the experience, when you shoot and publish audio/video, we temporarily load the audio and video to the server after shooting is completed, but before you confirm the upload by clicking "publish." If you cancel or fail to upload for other reasons, we will immediately delete the relevant audio and video.

Your published content will display your profile picture, nickname, Whisp number, location or IP location, and other information.

When you publish audio/video, images, text, comments, dynamics, and other interactive content, we will use the geolocation information you authorized to determine the geographical location where you published the content. We will subsequently use this information to recommend your published content to other users.

In accordance with legal requirements and to maintain a genuine and orderly platform atmosphere, create a healthier and better online ecosystem, and reduce activities such as impersonation, rumors, and traffic hijacking, when you publish audio/video, images, text, comments, dynamics, and other content, the platform will display your location information at the time of content publication on your personal homepage, works, comments, etc. For domestic locations, we display to the province (city, district), and for international locations, we display to the country (region). The location information is based on data provided by network operators.

(6) Interaction and Communication

(a) Adding Friends

You can add friends through various methods, including entering a nickname or Whisp account, scanning QR codes, searching for "People Nearby," adding friends from WeChat or QQ, adding friends from your address book, using software matching and recommendation features, and more.

When you use the "Add Friends" feature, we will request access to your contact list, third-party software, camera permissions, photo album access (for QR code scanning), and personal information such as location.

(b) Friend Recommendations

We may provide friend recommendations based on the phone numbers, contact lists, followings, followers, or interaction behaviors of you and other users. Recommendations may also be made based on information you and other users choose to display on your personal profiles.

We request contact list permissions and, after subjecting the information in your contact list to strong encryption algorithms, use it to recommend friends from your contact list. Please note that if your contact list contains your contact information uploaded by other users, the system may use that information to recommend friends to you or recommend you to corresponding users.

We may also recommend nearby friends based on user authorized location information. If you authorize location permissions, you may receive friend recommendations from us, and you may be recommended as a nearby friend to other users. Precise location information is considered sensitive personal information, and refusing to authorize location permissions may affect the use of this matching feature but will not affect the use of other functions within Whisp.

(c) Chatting and Interaction

When you use chat features (private chat, group chat), we may access your clipboard for text input, access your photo album for sharing images, access your camera and microphone for capturing content, and access your keyboard for entering emoticons, among other permissions.

When you use the group chat feature, we also generate group information. You can autonomously set, edit, share, and dissolve groups in group settings.

Your chat records will be stored on our servers, but this storage is not permanent, and we may periodically delete records based on server operations. You also have the right to delete your chat records manually. Deleted chat records cannot be recovered, so please use caution.

When you mention or interact with other users by @mentioning them in your posts or comments, viewing, forwarding, or sharing other users' content, accessing other users' profiles, or creating collaborative videos with other users, we will record the interaction between you and those users. You can choose not to show the other party your visit to their profile or your content browsing activity.

(d) Community

When you use community features (such as "Gossip" and "Topics"), in order for your friends to view the content you share, we collect, use, and display content such as videos, images, text, location information (to enable location based features, we may collect and use nearby WiFi information and the Cell ID of the stations near your device), comments, likes, and other information according to the rules you set. You can delete the content you post at any time.

Based on your authorization in the User Agreement, we may take actions such as copying, promoting, sharing, and personalized recommendations for outstanding user generated content. If you do not agree to us using your content, please contact us through customer service channels to request cessation of use and deletion. However, we do not assume any economic compensation responsibility for content that you have previously authorized us to use.

(7) Live Streaming Function

(a).When you apply for the live streaming function, in accordance with legal requirements, we may collect your identity information, including your real name, ID card number or photo, and facial recognition information, to verify your personal identity. If you refuse to provide this information, you will not be able to continue using the live streaming function, but it will not affect the use of other functions.

(b)If you are a live streaming host, your nickname and avatar will be displayed in the live room. Additionally, information such as comments, gifts, likes received in the live room, the number of viewers, and the duration of the live stream will also be publicly displayed.

(c) If you are a viewer of a live stream, your nickname, avatar, and interactive information within the live room (including but not limited to comments, donations, gifts, online status, etc.) will be publicly displayed in the live room. We will also generate statistics based on your interaction activity within the live room (such as rankings, popularity, etc.) and display them publicly.

(8) Internet Value Added Services or Individual Services

(a) Information Reserved in Third-party Payment Channels

When you perform actions on Whisp, such as subscribing to membership services, purchasing diamonds, or giving gifts to broadcasters that require payments, you will use our payment feature. During the payment process, we may collect information that you have reserved in third-party payment channels (such as Alipay user ID, WeChat open ID, QQ Wallet open ID) with your authorization. Such information is considered sensitive personal information.

(b) Your Payment or Transaction Information on Whisp

To facilitate transactions on Whisp, assess your account and transaction risks, conduct identity verification, and detect and prevent security incidents, we may collect information related to your personal virtual property (such as recharge records), virtual currency (such as love beans, diamonds), virtual transactions (such as giving gifts), and other virtual property information while you make transactions.

You should be aware that your payment or transaction information on Whisp is necessary for us to provide you with the goods and services you purchase, but we cannot obtain your personal financial information solely based on this information, nor can we identify specific individuals. For example, when you recharge through the App Store, we can only obtain a transaction bill number without identifying your personal information. Therefore, when it comes to tasks like refund applications, we will separately request you to provide sensitive personal information such as recharge records, recharge details, and real name information to verify the authenticity of the user, recharge, and transaction.

(9) Customer Service Function

When you contact us (including but not limited to appeals, complaints, reports, inquiries), we may need you to provide your account and real identity information to verify your user identity.

At the same time, we may retain your communication records with us (in text, image, voice, or call record form) and save sensitive personal information such as the phone number, name, email, proof of guardianship or family relationship, recharge and consumption records, as well as other necessary information related to your requests.

We collect this information to investigate facts, help you solve problems, and record the handling plans and results of related issues. If you refuse to provide the above information, we may not be able to provide you with timely feedback on the corresponding matters.

(10) Product Optimization, Fault Repair, Targeted Push, and Personalized Recommendations

(a) During the process of product development and repair, such as fixing system failures and optimizing our services, we may need to record and analyze information generated during system failures.

(b) We may use your user information to improve the design and promotion of this website, conduct statistics on the use of our products and/or services, and may share this statistical information with the public or third-party technology providers to demonstrate the overall usage trends of our products and/or services. However, when we display your personal information, we will use anonymization and deidentification methods to desensitize your information to protect your information security.

(c) Based on the collected information, we analyze your preferences, usage habits, browsing history, and onsite identity information to provide you with more suitable customized services. For example, we may show or recommend search results that are more relevant to you (rather than general recommendations) and push onsite activities based on your preferences.

To ensure your autonomy in receiving information, if you are not interested in the targeted pushes or personalized ads we recommend, or if you no longer wish to receive such targeted pushes or personalized ads, you can use the relevant feature settings page in our products and/or services to enable/disable personalized pushes.

(11) Security Assurance

We are committed to providing you with a safe and trustworthy product and user environment, and providing high-quality and reliable services and information is our core goal. To maintain the normal and stable operation of relevant products or services, and to protect your or other users' or the public's safety and legal interests, we will collect the following necessary information:

(a) To ensure the safe operation of software and services, the quality and efficiency of operations, we collect data such as your hardware model, operating system version number, device identifiers (e.g., IMEI/MEID, Android ID, OAID, IMSI, SIM card information such as ICCID, GAID, hardware serial number (SN), iOS identifiers such as IDFV, IDFA; different identifiers have different validity periods, whether they can be reset by users, and how they are obtained), network device hardware addresses (device MAC addresses), hardware serial numbers, IP addresses, WLAN access points (e.g., SSID, BSSID), Bluetooth, base stations, software version numbers, network access methods, types, statuses, network quality data, operations, use, service logs, device sensor data (such as accelerometer, linear acceleration sensor, gravity sensor, gyroscope sensor), etc.

(b) To prevent malicious programs, safeguard the quality and efficiency of operations, we collect information about installed applications, lists of software or running processes, overall operation, use, and frequency of applications, application crash information, overall installation and use information, performance data, and application sources.

(c) We may use your account information, device information, service log information, and information obtained from our affiliates and partners with your authorization or as allowed by law to determine account security, transaction security, conduct identity verification, identify illegal or rule breaking situations, detect and prevent security incidents, and take necessary recording, analysis, and response measures as required by law.

(12) Notifications and Push

As Whisp has instant messaging features, it requires you to enable your device's notification feature to ensure that messages are delivered promptly. You can manage notifications in your device settings, but disabling them may lead to delayed message reception.

(13) Personal Information Collected by Third-party Apps and Suppliers

Our software integrates Mini programs and applications developed by third-party suppliers, such as tabletop game tests, Duiba, and other functionalities. Such functionalities may require the collection and transmission of your personal information, including your account, usage, and operation records, to third-party suppliers.

2. Indirectly Obtained Personal Information

If you enable services from third-party apps, we may obtain account information (e.g., profile picture, nickname) that you have authorized to share with third parties. After you agree to this privacy policy, we may link your third-party account with your software account, allowing you to directly log in and use our products and/or services through your third-party account. We use this personal information in compliance with this privacy policy.

3. Collection of Personal Information for Other Legitimate and Necessary Reasons

If we need to collect personal information from you for purposes not explained in this privacy policy, or if we go beyond the purposes stated when collecting your personal information, we will explain this to you separately and seek your consent before collecting and using your personal information.

4. Information Collection in the Background or Silent Mode of the Software

Our products currently collect your personal information when the software is running in the background or silent mode. We will provide clear and appropriate explanations to you and obtain your consent before collecting your personal information.

5. Explanation of Information Shared with Third Party Service Providers for Improving Product Technology and Services

In order to achieve product functionality and better provide you with services, our products integrate the products and technologies of the following third-party technical service providers. To better understand how we use third-party technology and share your personal information with third parties, please read sections "6. How We Use third-party Services and Technologies" and "8. How We Share, Transfer, and Publicly Disclose Your Personal Information" in this agreement.

 

Article 4.How We Use Cookies and Similar Technologies

1. Cookies

To ensure the proper operation of the website, we may store small data files called Cookies on your computer or mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. The primary function of Cookies is to facilitate your use of website products and services and to help the website collect data on independent visitors, among other functions. Through the use of Cookie technology, we can provide you with more personalized services, allow you to set specific service options, and simplify repetitive operations (such as registration and login).

When you use our services, we may use Cookies or similar technologies to collect some of your personal information, such as your browsing habits on the website and your login information. The collection of such information by Cookies and similar technologies is necessary for your use of our services. It simplifies repetitive steps, such as registration and login, allows you to view your usage history (such as browsing history), provides you with services and content that better meet your personal needs and interests, enhances the security of your information and account, and improves our products and services. We promise to use Cookies and similar technologies only for the purposes described in this privacy policy.

2. Do Not Track

Many web browsers are equipped with a Do Not Track feature that allows users to send Do Not Track requests to websites. Currently, major internet standard organizations have not established policies to regulate how websites should respond to such requests. However, if your browser has enabled Do Not Track, we will respect your choice. Please note that such actions may affect your experience when using our products and services.

 

Article 5.How We Protect Personal Information

1. We Take Reasonable and Feasible Measures to Protect Your Personal Information

We have a professional technical team responsible for handling data protection matters. In addition, we have established specific processes and security procedures for the collection and processing of user data to ensure that data storage and use comply with our expectations and legal requirements. Furthermore, we regularly conduct risk assessments of security strategies and data protection measures to ensure that our products are not threatened by risks such as data leakage or privacy infringement.

2.Other Security Measures We Take to Protect Information

We manage and standardize information storage and use through a data classification and grading system, data security management regulations, and data security development specifications.

We implement comprehensive security controls over data through confidentiality agreements with information access personnel and technical monitoring mechanisms.

3. Employee Access to Your Information

We only allow employees who need to know this information to access your information and require anyone who may have access to your information to fulfill the corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or suspension of cooperation or employment with us.

4. Storage Period for Your Information

We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for a necessary and reasonable period, unless an extension is required by law. After the expiration of the retention period, we will anonymize your personal information to ensure its security.

5. Protection of Information

The internet is not an absolutely secure environment, and email, instant messaging, and other communication methods with other users are not encrypted. We strongly recommend that you do not send personal information through these methods. Please use complex passwords to assist us in ensuring the security of your account, and be sure to properly safeguard sensitive information such as your identity, property information, and payment passwords.

While we will make every effort to ensure or guarantee the security of any information you send to us, if our physical, technical, or management protective facilities are compromised, resulting in unauthorized access, public disclosure, alteration, or destruction of information, leading to damage to your legitimate rights and interests, we will assume corresponding legal responsibilities.

We will provide appropriate security measures according to current technologies to protect your information and provide reasonable security assurance. We will do our best to ensure that your personal information is not disclosed, destroyed, or lost. In the event of a personal information security incident, we will promptly notify you of the basic situation of the security incident and its possible impact, the measures we have taken or will take, and suggestions for you to prevent and reduce risks, in accordance with legal requirements. We will notify you of such incidents through email, letters, phone calls, push notifications, and other means. When it is difficult to notify the data subjects one by one, we will take reasonable and effective ways to issue announcements. We will also proactively report the disposal of personal information security incidents to regulatory authorities in accordance with regulatory requirements.

6. Security Risk Reminder

Once you leave Whisp and browse or use other products or services provided by third parties, we will have no ability or direct obligation to protect any personal information you submit to third parties, whether your login, browsing, or use of the abovementioned products or services is based on links or guidance from Whisp. However, we will remind you to be aware that you are entering third-party products or services to better protect your personal information.

If you establish social contacts with others through third-party social software, we will have no ability or obligation to protect any activities that occur outside of Whisp's platform, nor will we be responsible for any harm that occurs outside of Whisp's platform. Please be cautious of fraud, avoid transferring money to strangers, avoid meeting strangers offline, and avoid providing sensitive personal information to strangers to protect your personal and property safety.

 

Article 6.How We Use Third-party Services and Technologies

1.We Use Third-party Technology and Services in the Following Scenarios

(1) In order to implement product features and provide you with better services, our products integrate the products and technologies of third-party technology service providers. These third-party service providers may request access to your personal information when you first download and install our products.

(2)To fulfill our network security obligations, our products integrate the products and technologies of third-party security software service providers. These third-party service providers may request access to your personal information and the content you post while using our products.

(3) For the purpose of delivering advertisements, assessing and optimizing ad effectiveness, we may need to share some of your data with third-party partners such as advertisers and their agents. We require them to strictly comply with our measures and requirements regarding data privacy protection, including but not limited to processing data in accordance with data protection agreements, commitments, and relevant data processing policies, to avoid identifying individual identities and ensure privacy security.

(4) To ensure the security of your account and/or property and enhance the security of our services and those of our affiliated companies and partners, we may cooperate with third parties. In such cases, third-party service providers may request necessary device information, account information, and log information from you to comprehensively assess the risks associated with your account and transactions, prevent fraud, and take necessary recording, auditing, and disposition measures in accordance with the law.

(5) Product Analysis: To analyze the stability and compatibility of our products and/or services, we may engage third-party analytics service providers to participate in the analysis. In this case, the third-party service providers may need to use product service logs (including but not limited to product crash, error logs, etc.) and device information.

2.List of Third-party Service Provider SDKs

To ensure the implementation of certain independent functions and provide you with more services and features, we embed third-party SDKs in our applications. We will carefully evaluate the purpose of using such SDKs. For more information about the purposes, methods, and scope of personal information processing by these SDKs, please refer to the "List of Third-party SDKs for Information Collection and Sharing" in this policy.

 

Article 7. How We Store Personal Information

1. Storage Location

(1) For Users in Mainland China

Your personal information is stored within mainland China.

Currently, we do not store the personal information of users in mainland China outside of mainland China.

(2)For Users Outside of Mainland China

You agree that we may store your personal information within mainland China and transfer your personal information across borders to mainland China.

2.Storage Duration

We retain your personal information for the shortest period necessary to fulfill the purposes of providing you with our products and services. For example, when you use our registration function, we need to collect your mobile phone number, and we will continue to store your mobile phone number during the period of your use of this function to provide you with this function and ensure the security of your account and the system. In addition, we may retain your relevant information for the necessary period as stipulated by relevant laws (e.g., the Electronic Commerce Law stipulates that information about goods and services and transaction information should be retained for at least three years from the completion of the transaction). In normal account and software states, you can browse, modify, update, correct, or delete the information you have submitted at any time. When accessing, updating, correcting, or deleting your information, we have the right to request you to undergo identity verification to ensure the security of your account. After the expiration of the above storage period, we will delete or anonymize your personal information.

3.Information Deletion and Backup Reminder 

Based on the protection of personal information, saving network storage space, unpredictable system failures, and other reasons, we may delete or anonymize information that has been retained for more than one year. After processing, the information may not be recoverable or viewable. Please make backups or take local download measures for information that you consider important.

 

Article 8. How We Share, Transfer, and Publicly Disclose Your Personal Information

1. Sharing

You understand and agree that, while ensuring that the data recipient cannot reidentify the personal information subject, we may provide your personal information to third parties. We may share your personal information with companies, organizations, and individuals outside the operating entity in the following situations:

(1) Sharing with Explicit Consent: With your explicit consent, we will share your personal information with other parties.

(2) Sharing According to Laws and Regulations: We may share your personal information externally in accordance with laws and regulations or mandatory requirements of administrative authorities.

(3) Sharing with Affiliated Companies: Your personal information may be shared with our affiliated companies. We will only share the necessary personal information, subject to the purposes stated in this Privacy Policy. If affiliated companies change the purpose of personal information processing, they will seek your authorization again.

(4) Sharing with Affiliated Products: Your personal information may be shared with affiliated products developed by us. We will only share the necessary personal information, subject to the purposes stated in this Privacy Policy, and will obtain your authorization through the Account Interconnection Agreement in the User Agreement. If affiliated products change the purpose of personal information processing, they will seek your authorization again.

(5) Sharing with Authorized Partners: Some of our services are provided by authorized partners. We may share certain personal information with partners to provide better customer service and user experience. We will only share personal information for legitimate, legal, necessary, specific, and clear purposes and will only share personal information necessary for service provision. Our partners do not have the right to use shared personal information for any other purpose.

(6) Collection and Sharing by Third-party SDKs: Our products may include third-party SDKs or similar applications. When you use services provided by third parties on our platform, you agree that your information will be directly collected and processed by them.

To help you understand the collection and sharing of personal information by third-party SDKs, we provide some common scenarios below:

When you use the share to third-party platform function, the relevant SDKs may collect your device identifier and network related information.

When you use Huawei/Xiaomi/Meizu phones, the Huawei/Xiaomi/Meizu Push SDK may need to read your device identifier and network related information for push notification purposes.

When you use one click login services provided by telecommunications operators, the telecommunications operator may collect your personal information (network identity, including registered mobile phone number, registered email, security email, native phone number; user service usage data, including mobile device identifier, international mobile equipment identifier, international mobile subscriber identifier, media access control address (MAC), device model, device manufacturer, network type and WiFi signal strength, application data, mobile operating system, screen size, screen resolution, IP address) in accordance with the service agreement confirmed when you use the service, for providing login services.

When you use identity verification services, FACE++ may collect your facial information for identity verification services.

For personal information collected and shared by third-party SDKs, please refer to the "Third-party SDK Information Collection and Sharing List" for more details on the purposes, methods, and scope of personal information processing by the SDKs.

 

Third-party SDK Information Collection and Sharing List

 

SDK Name: Huawei Login

 Organization Name: Huawei Technologies Co., Ltd.

 SDK Usage and Functionality: Huawei login and usage.

 Types of Personal Information Collected:

 List of installed applications

 Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI)

 Network information, including network connection status, access method, and type.

 Official Website Link (for reference):

https://developer.huawei.com/consumer/cn/doc/development/HMSCoreGuides/introduction0000001050048870

 

 

 SDK Name: Bugly SDK

 Organization Name: Tencent Technology (Shenzhen) Company Limited

 SDK Purpose and Functionality: Collecting application crashes and pushing application updates.

 Types of Personal Information Collected:

 Crash environment data: crash information and thread stack, ROM/RAM/SD card capacity, network/language status.

 App information: package name, version, process name.

 Device information: list of installed applications, device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI) used for crash device statistics.

 Official Website Link (for reference):

https://bugly.qq.com/docs/userguide/instructionmanualandroid/?v=20200622202242

 

 

 SDK Name: Shumei SDK

 Organization Name: Beijing Shumei Times Technology Co., Ltd.

 SDK Purpose and Functionality: Antifraud user, filtering prohibited messages.

 Types of Personal Information Collected:

Device basic information: device brand, device manufacturer, device model, device name, device system type and version information, device basic configuration, device basic settings, device environment, sensor information (magnetic field, gyroscope, accelerometer), SD card information;

Device identification information: Android ID, IDFV (application developer identifier), IDFA (advertising identifier), OAID (anonymous device identifier);

Device network information: network access form, wireless router identifier (BSSID, SSID) and IP address, surrounding WIFI list, network operator information, network base station information, network connection status;

Device application information: SDK host application package name and version number, running process information (only obtain current process name).

 Official Website Link: https://www.ishumei.com/legal/cn/privacy.html

 

 SDK Name: Chuanglan ShanYan

 Organization Name: Shanghai Jingmeng Information Technology Co., Ltd.

 SDK Usage and Functionality: Used for one click app login and verifying whether the user's phone number matches the local traffic card number.

 Types of Personal Information Collected:

 List of installed applications

 Device information

 Location information

 Network information

 SDK authenticationrelated request results

 Phone number

 Device information: device identifiers (IMEI, IDFA, Android ID, MAC, OAID), application information (application crash information, notification switch status, software list), device parameters, and system information (device type, device model, operating system, and hardware information).

 Official Website Link (for reference):

https://tensdk.com/commitdetail/rcc5zd/fd21s8

 

 

SDK Name: Baidu Map SDK

Organization Name: Beijing Baidu Netcom Technology Co., Ltd.

SDK Usage and Functionality: Provides map display, search, pedestrian and bicycle navigation, and related services to end users.

Types of Personal Information Collected:

Device Information (including Android ID, IDFV, operating system version, device brand and model, device configuration, application information (application name), gyro angle),

Location Information (may include latitude and longitude, device signal strength information and sensor information (acceleration, gyro, direction, pressure, rotating vector, light, magnetometer)),

Location Information (may include GNSS information, Wi-Fi address and signal strength information, base station ID data information, sensor information, device signal strength information, IP address, and Bluetooth information),

Network Status (such as mobile network, Wi-Fi network, or no network status), READ_EXTERNAL_STORAGE/WRITE_EXTERNAL_STORAGE

Link to official website, for reference only: Baidu Map Privacy Policy (baidu.com)

 

SDK Name: Baidu Location SDK

Organization Name: Beijing Baidu Netcom Technology Co., Ltd.

SDK Functionality: Provides location services and related functions to end users.

Types of Personal Information Collected:

Device Information (including device identification information (Android ID, IDFA, IDFV), system information (operating system version, device brand and model, device configuration), and application information (application name)),

Location Information (may include latitude and longitude, GNSS information, Wi-Fi gateway address, Wi-Fi MAC address, Wi-Fi signal strength, Wi-Fi status, Wi-Fi parameters, Wi-Fi list, base station ID data information, carrier information, device signal strength information, IP address, Bluetooth information, and sensor information (acceleration, gyro, direction, pressure, rotating vector, light, magnetometer)), READ_EXTERNAL_STORAGE/WRITE_EXTERNAL_STORAGE

Network Type (such as mobile network or Wi-Fi network)

Permission Explanation: Telephone tracking, network access, location, always allow access to location information, storage

Data Collection Method: The SDK collects data directly without involving data transmission and sharing; when the software is allowed to run in the background, the SDK will collect user information in the background; the SDK will read user information every 30 seconds.

Link to official website, for reference only: https://lbs.Baidu.com/index.php?title=openprivacy

 

 SDK Name: Get Latitude and Longitude

 Organization Name: AMap (Gaode) Software Co., Ltd.

 SDK Usage and Functionality: Map location services.

 Types of Personal Information Collected:

 Location acquisition: To return the end user's location information to the developer without the need for the end user to manually input their geographical coordinates.

 Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI).

 Official Website Link (for reference):

https://lbs.amap.com/api/androidlocationsdk/locationsummary/

 

 SDK Name: Tencent Map

 Organization Name: Tencent Technology (Shenzhen) Company Limited

 SDK Usage and Functionality: Map location services.

 Types of Personal Information Collected:

 Obtain connected WiFi information, return to Tencent location server as auxiliary location reference, and then return more accurate location information to the developer.

 Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI).

 Official Website Link (for reference):

https://lbs.qq.com/

 

 

 SDK Name: Face Recognition

 Organization Name: Tencent Technology (Shenzhen) Company Limited

 SDK Usage and Functionality: Application installed list, facial information recognition, real name authentication.

 Types of Personal Information Collected:

 Application installed list, network information, device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI), camera permissions.

 Official Website Link (for reference):

https://cloud.tencent.com/document/product/1007/35869

 

 

 SDK Name: Ping++

 Organization Name: Shanghai JM Network Technology Co., Ltd.

 SDK Usage and Functionality: Payment functionality.

 Types of Personal Information Collected:

 Application installed list, device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI), network connection information. Request read/write memory permissions to ensure stable operation of payment functionality.

 Official Website Link (for reference):

https://www.pingxx.com/docs/client/android.html

 

 

 SDK Name: Getui push SDK

 Organization Name: Meirihudong Network Technology Co., Ltd.

 SDK Usage and Functionality: Provide message push technical services for App users

 Types of Personal Information Collected:

 (1) Device information and network information: Required information: device platform, equipment manufacturer, device brand, device model and system version, OAID, AndroidID, WIFI connection information, carrier information, DHCP, SSID, BSSID

Optional information: IMEI, MAC, Google Advertising ID (GAID), Serial Number, IMSI, ICCID, IP address, base station information. It is used to generate a unique push target ID (CID) and device ID (GID) to ensure the accurate delivery of message push and accurate identification of message devices.

(2) Location-related information: the mandatory information of the on-the-spot push, intelligent push, and emergency push extension functions, providing refined push for offline scenarios, which can recommend push content that better meets your needs and reduce the disturbance of useless push messages. At the request of relevant state departments, in order to improve the function of mobile Internet technology in serving social welfare, and give full play to the role of APP message push in disaster early warning, when major disasters such as earthquakes and meteorology occur, relevant disaster notification information will be issued to users in the affected areas in real time through the developer's APP push channel

(3) Application list information: the required information of intelligent push, emergency push and link governor extension functions, recommend push content that better meets your needs, and reduce the disturbance of useless push information. At the request of relevant state departments, in order to improve the function of mobile Internet technology in serving social welfare, and give full play to the role of APP message push in disaster early warning, when major disasters such as earthquakes and meteorology occur, relevant disaster notification information will be issued to users in the affected areas in real time through the developer's APP push channel. When a device has an offline push message to be delivered, you can send offline messages through the associated start function, you can choose to turn on or off this service, when you close this service, the associated start will also be closed at the same time, which will lead to an increase in power and traffic consumption and a decrease in message reach. Official Website Link (for reference):

http://docs.getui.com/getui/mobile/android/overview/

 

 

 SDK Name: Xiaomi Push

 Organization Name: Xiaomi Corporation

 SDK Usage and Functionality: Push notifications.

 Types of Personal Information Collected:

 Application installed list, login account, space ID, device information (IMEI number, MAC address, device model, mobile operating system), application information (APP version number), networkrelated information (IP or domain connection results, current network type), system language information, message sending result information.

 Official Website Link (for reference):

https://dev.mi.com/console/appservice/push.html

 

 

 SDK Name: Meizu Push

 Organization Name: Meizu Technology Co., Ltd.

 SDK Usage and Functionality: Push notifications.

 Types of Personal Information Collected:

 Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSIDEVICEID), list of installed applications, network information, application list information, network information and location related information, log information. external storage information of smart phones(including running in foreground and background)

 Official Website Link (for reference): http://open.flyme.cn/docs?id=202

 

 

 SDK Name: OPPO Push

 Organization Name: OPPO Guangdong Mobile Communications Co., Ltd.

 SDK Usage and Functionality: Push notifications.

 Types of Personal Information Collected:

 Application installed list, device information (IMEI, serial number, IMSI, UserID, Android ID, Google Advertising ID, phone area settings, device model, phone battery, mobile operating system version and language), application information (APP package name and version number, running status), Push SDK version number, networkrelated information (IP or domain connection results, current network type), message sending results, notification bar status, lock screen status.

 Official Website Link (for reference):

https://open.oppomobile.com/wiki/doc#id=10196

 

 

 SDK Name: vivo Push

 Organization Name: Guangdong BBK Electronics Corporation

 SDK Usage and Functionality: Push notifications.

 Types of Personal Information Collected:

 Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI), list of installed applications, network information, application list information, network information and locationrelated information, log information.

 Official Website Link (for reference):

https://push.vivo.com.cn#/

 

 

 SDK Name: Huawei HMS Push

 Organization Name: Huawei Technologies Co., Ltd.

 SDK Usage and Functionality: Push notifications.

 Types of Personal Information Collected:

 Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI), list of installed applications, network information, application list information, network information and locationrelated information, log information.

 Official Website Link (for reference):

https://developer.huawei.com/consumer/cn/hms/huaweipushkit

 

 

 SDK Name: Tencent Push

 Organization Name: Tencent Technology (Shenzhen) Company Limited

 SDK Usage and Functionality: Video streaming.

 Types of Personal Information Collected:

 List of installed applications, device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI), IP address, operating system type, CPU information, device power, network information, recording permissions.

 Official Website Link (for reference):

https://cloud.tencent.com/document/product/647

 

 

 SDK Name: Agora Push

 Organization Name: Agora

 SDK Purpose and Functionality: Video streaming and voice.

 Types of Personal Information Collected:

 List of installed applications, device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI), IP address, operating system type, CPU information, device power, network information, recording permissions.

 Official Website Link (for reference):

https://docs.agora.io/cn/Interactive%20Broadcast/API%20Reference/java/index.html

 

 SDK Name: GrowingIO

 Organization Name: Beijing Yishu Technology Co., Ltd.

 SDK Usage and Functionality: Video and voice streaming, community features.

 Types of Personal Information Collected:

 List of installed applications, device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI), IDFV information.

 Official Website Link (for reference):

https://docs.grossio.com/v3/developermanual/sdkintegrated/flow

 

 

 SDK Name: QQ

 Organization Name: Tencent Technology (Shenzhen) Co., Ltd.

 SDK Usage and Functionality: Third-party login.

 Types of Personal Information Collected:

 List of installed applications, Device ID, device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity).

 Official Website Link (for reference):

https://wiki.connect.qq.com/

 

 

 SDK Name: Sina Tong (Sina Weibo)

 Organization Name: Beijing Sina Internet Information Service Co., Ltd.

 SDK Usage and Functionality: Third-party login and sharing.

 Types of Personal Information Collected:

 List of installed applications, Device ID, device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity).

 Official Website Link (for reference):

https://passport.sinaimg.cn/html/sso/privacyclause.html

 

 

 SDK Name: Facebook

 Organization Name: Facebook

 SDK Usage and Functionality: Third-party login and sharing.

 Types of Personal Information Collected:

 List of installed applications, Device ID, device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity).

 Official Website Link (for reference):

https://www.facebook.com

 

 SDK Name: Qiniu Cloud

 Organization Name: Shanghai Qiniu Information Technology Co., Ltd.

 SDK Usage and Functionality: Data analysis, live streaming, cloud platform.

 Types of Personal Information Collected:

 Device ID, device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity).

 Official Website Link (for reference):

https://developer.qiniu.com/

 

 

 SDK Name: Twitter

 Organization Name: Twitter

 SDK Usage and Functionality: Sharing.

 Types of Personal Information Collected:

 List of installed applications, Device ID, device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity).

 Official Website Link (for reference):

https://twitter.com/

 

SDK Name: Alipay

Organization Name: Alipay (China) Network Technology Co., Ltd.

SDK Purpose and Function: Payment

Types of Personal Information Collected:

List of installed applications, Device ID, Device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity)

Official Website Link, for reference only:

https://www.alipay.com/

 

 

SDK Name: WeChat

Organization Name: Tencent Computer Systems (Shenzhen) Co., Ltd.

SDK Use and Functions: Third-party login, payment, sharing

Types of Personal Information Collected:

List of installed applications, device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI)

Official Website Link, for reference only:

https://weixin.qq.com/

 

 

SDK Name: Meituan

Organization Name: Beijing Sankuai Technology Co., Ltd.

SDK Use and Functions: Sharing

Types of Personal Information Collected:

List of installed applications, Device ID, Device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity)

Official Website Link, for reference only:

https://www.meituan.com/

 

 

SDK Name: CC Live

Organization Name: Guangzhou NetEase Computer System Co., Ltd.

SDK Use and Function: Video playback

Types of Personal Information Collected:

Device ID, Device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity)

Official Website Link, for reference only:

https://cc.163.com/

 

 

SDK Name: Pay Now

Organization Name: Hello Now (Beijing) Technology Co., Ltd.

SDK Purpose and Function: Payment

Types of Personal Information Collected:

List of installed applications, Device ID, Device MAC address, phone number, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity), geographical location

Official Website Link, for reference only:

https://www.ipaynow.cn/

 

 

SDK Name: Tianyi Account Login

Organization Name: China Telecom

SDK Purpose and Function: Oneclick login

Types of Personal Information Collected:

List of installed applications, Device ID, Device MAC address, phone number, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity), geographical location

Official Website Link, for reference only:

https://login.189.cn/login

 

SDK Name: Shushu SDK

Organization Name: Shushu Technology

SDK Purpose and Function: Video livestreaming, community

Types of Personal Information Collected:

List of installed applications, Device ID, Device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity)

Official Website Link, for reference only:

https://thinkingdata.cn

 

 

SDK Name: Reyun Data SDK

Organization Name: Beijing Reyun Technology Co., Ltd.

SDK Use and Function: Effect monitoring, user behavior analysis

Types of Personal Information Collected:

List of installed applications, Read phone permissions; Access network permissions; Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI); Read external storage permissions; Write external storage permissions; Network configuration permissions

Official Website Link, for reference only:

https://new.trackingio.com/#/policy

 

 

SDK Name: Adhoc

Organization Name: Beijing YoHe Technology Co., Ltd.

SDK Use and Function: New feature and new functionality experience

Types of Personal Information Collected:

List of installed applications, Read phone permissions; Access network permissions; Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI); Read external storage permissions; Write external storage permissions; Network configuration permissions

Official Website Link, for reference only:

http://www.appadhoc.com/privacy.html

 

 

SDK Name: AdMob

Organization Name: Google Information Technology (China) Co., Ltd.

SDK Use and Function: Obtain and display advertisements

Types of Personal Information Collected:

List of installed applications, Read phone permissions; Access network permissions; Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI); Read external storage permissions; Write external storage permissions; Network configuration permissions; IDFA advertising identifier

Official Website Link, for reference only:

https://policies.google.com/privacy?hl=en&gl=US

 

 

SDK Name: China Unicom Number Authentication

Organization Name: China United Network Communications Group Co., Ltd.

SDK Purpose and Function: Oneclick login

Types of Personal Information Collected:

List of installed applications, Device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI), WiFi address, carrier information

Privacy Policy Link:

https://opencloud.wostore.cn/authz/resource/html/disclaimer.html?fromsdk=true

 

 

SDK Name: Tencent Beacon

Organization Name: Tencent Computer Systems (Shenzhen) Co., Ltd.

SDK Purpose and Function: Video and voice livestreaming, community

Types of Personal Information Collected:

List of installed applications, Device ID, Device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity)

Privacy Policy Link:

https://privacy.qq.com/document/preview/a19a8cf4f2354306b137a7db39d32024

 

SDK Name: TuTu

Organization Name: Hangzhou Yuanfan Visual Intelligent Technology Co., Ltd.

SDK Purpose and Function: Beautification

Types of Personal Information Collected:

List of installed applications, camera permissions, storage files, Device ID, Device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity)

Privacy Policy Link:

https://tutucloud.com/docs/help/privacypolicy

 

 

SDK Name: AppsFlyerSDK

Organization Name: AppsFlyer Inc.

SDK Purpose and Function: App data analysis

Types of Personal Information Collected:

List of installed applications, network permissions, device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI), access to gyroscope and accelerometer sensorsbody sensors

Third-party Privacy Policy Link: AppsFlyer Services Privacy Policy | AppsFlyer

 

SDK Name: Firebase

Organization Name: Google

SDK Purpose and Function: Collect error logs for app optimization

Types of Personal Information Collected:

List of installed applications, device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI)

Third-party Privacy Policy Link:

https://firebase.google.com/terms/crashlytics

 

 

SDK Name: Instagram

Organization Name: Instagram

SDK Use and Function: Sharing, third-party login

Types of Personal Information Collected:

List of installed applications, Device ID, Device MAC address, Android ID, ICCID (SIM card identification code), IMSI

Official Website Link:

http://instagram.com/

 

 

SDK Name: com.aliyun.svideosdk Aliyun SDK)

Organization Name: Alibaba Cloud Computing Co., Ltd./Bainian Yiqi (Shanghai) Network Technology Co., Ltd.

SDK Use and Function: Edit and process video files

Types of Personal Information Collected:

List of installed applications, read phone permissions; access network permissions; device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI); SD card data read and write; read external storage permissions; write external storage permissions; network access permissionsREAD_EXTERNAL_STORAGE/WRITE_EXTERNAL_STORAGE

Official Website Link:

https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud202112151438_20307.html?spm=a2c4g.11186623.0.0.5015291ffgxnFI

 

SDK Name: Zhichi Customer Service SDK

Name of institution: Beijing Zhichi Technology Co., Ltd

SDK usage and functions: Provide online customer service and related services

Types of Personal Information Collected:

Apply the installed list, read the phone permissions; access to the network; device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI); Read external storage permissions; Write to external storage permissions; Network access, body sensors

Link to official website, for reference only:

https://www.sobot.com/

 

 

SDK Name: Zxing QR Code Scanner

Organization Name: Zxing

SDK Use and Function: To provide better QR code scanning services

Types of Personal Information Collected:

Camera access, device identifiers (IMEI, IDFA, MAC, etc.), device parameters and system information (device type, model, operating system, and hardwarerelated information)

Official Website Link:

https://github.com/zxing/zxing

 

 

SDK Name: Weibo

Organization Name: Beijing Weimeng Chuangke Network Technology Co., Ltd.

SDK Use and Function: Sharing, third-party login

Types of Personal Information Collected:

Retrieve device serial number, list of installed applications, Device ID, Device MAC address, Android ID, ICCID (SIM card identification code), IMSI (International Mobile Subscriber Identity), storage files

Official Website Link:

https://open.weibo.com

 

 

SDK Name: NetEase Youdao

Organization Name: NetEase (Hangzhou) Network Co., Ltd.

SDK Use and Function: Collecting error logs for app optimization

Types of Personal Information Collected:

List of installed applications, read phone permissions; access network permissions; device information (IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI); read external storage permissions; write external storage permissions; network configuration permissions

Official Website Link:

https://corp.163.com/gb/legal.html

 

 

SDK Name: MSA (Mobile Security Alliance) SDK

Organization Name: Mobile Security Work Committee

SDK Use and Function: Obtain a unified supplementary device identifier from mobile alliance manufacturers at startup.

Types of Personal Information Collected:

Device information (UDID, OAID, VAID, AAID)

Official Website Link (for reference only):

http://www.msaalliance.cn/col.jsp?id=122

 

2. Transfer

We will not transfer your personal information to any company, organization, or individual without your explicit consent, except as required by the laws and regulations of the People's Republic of China. We will continue to protect your personal information according to the standards required by laws and regulations or require the new manager to continue to protect your personal information according to this policy.

However, the following exceptions apply:

(1) We obtain your explicit authorization or consent in advance.

(2) To comply with legal requirements, procedures, mandatory government requests, or judicial decisions.

(3) If we or our affiliated companies are involved in mergers, divisions, liquidations, acquisitions, or sales of assets or businesses, your personal information may be transferred as part of such transactions. We will ensure the confidentiality of such information during the transfer process and make every effort to ensure that the new holder of your personal information is bound by this privacy policy. Otherwise, we will request the company or organization to seek your authorization and consent again.

3. Public Disclosure

(1) Public disclosure refers to the act of releasing information to the public or unspecified groups of people. Except for necessary disclosures made for essential matters, such as the need to announce the processing of accounts for rule violations, penalties for fraudulent user behavior, or the display of relevant information in a deidentified manner when announcing the list of winners of platform activities, we will not publicly disclose your personal information. If there are reasonable grounds for public disclosure, we will inform you of the purpose and type of information to be publicly disclosed (if it involves your sensitive personal information, we will also inform you of the content of the sensitive information) before obtaining your authorization and consent for public disclosure, unless otherwise provided by laws and regulations or stipulated in this policy.

(2) For the personal information that is publicly disclosed, we will carefully review its legitimacy, reasonableness, and legality, take strict personal information security protection measures and methods during and after public disclosure, and protect it.

4. Exemptions from Sharing, Transfer, and Public Disclosure of Personal Information

(1) We do not need your authorization and consent to share, transfer, or publicly disclose your personal information in the following situations:

(a) Directly related to national security and national defense security.

(b) Directly related to public safety, public health, major public interests.

(c) Directly related to criminal investigation, prosecution, trial, and execution of judgments.

(d) Necessary to protect your or other individuals' life, property, etc., but it is difficult to obtain your consent.

(e) The collected personal information has already been publicly disclosed by yourself.

(f) The collected personal information is collected from legally publicized information channels, such as legal news reports and government information disclosure.

(g) Required by the relevant agreements or other written documents signed with you.

(h) The collected personal information has been anonymized or deidentified.

(i) Necessary for the secure and stable operation of the product or service provided by us, such as discovering and handling product or service failures.

(j) Required by administrative agencies or judicial authorities.

(k) Necessary for lawful news reporting.

(l) Required for academic research institutions to carry out statistics or academic research in the public interest, and deidentification measures have been applied to the information before providing the research results to the outside world.

(m) Other circumstances stipulated by laws, regulations, and other standards.

(2) You voluntarily disclose personal information.

It should be noted that when you use certain TouchPal services or applications or post on forums, chat rooms, or social network services, personal information and content that you voluntarily share will be visible to other users. They may read, collect, or use your personal information. You are responsible for the personal information and content that you choose to share or submit in these situations. Such situations involve your voluntary disclosure of personal information, and we are not responsible for your voluntary actions and their consequences. For example, if you voluntarily post your TouchPal ID and email address in a forum or during a chat, this information will be public or provided to strangers. Please be cautious and guard against online scams and other cybercrimes in such situations.

 

Article 9. Transfer of Personal Information Globally

1.Users in the People's Republic of China Mainland

Currently, we do not store the personal information of users in the People's Republic of China Mainland outside the territory of the People's Republic of China Mainland, nor do we transfer the personal information of users in the People's Republic of China Mainland to locations outside the territory of the People's Republic of China Mainland.

2. Users Outside the People's Republic of China Mainland

When you are a user located outside the territory of the People's Republic of China Mainland, you agree that we may store your personal information within the territory of the People's Republic of China Mainland and transfer your personal information across borders to the territory of the People's Republic of China Mainland. We ensure compliance with the collection purposes, usage restrictions, and security obligations as stipulated in this privacy policy.

3. In addition to the above circumstances, if it is necessary to carry out crossborder storage or transfer of data, we will inform you separately (including the purpose of data export, the recipient, the method and scope of use, the content of use, security measures, security risks, etc.) and obtain your explicit authorization and consent. We will ensure that the data recipient has sufficient data protection capabilities to protect your personal information.

 

Article 10. Your Rights

During your use of the Whisp software, in order to make it more convenient for you to access, copy, correct, and delete your personal information, as well as to ensure your right to withdraw consent for personal information processing and to deactivate your account, we have provided corresponding operation settings for you in the product design. You can refer to the following guidelines for operations.

Furthermore, we have established channels for complaints and requests for explanations, and your opinions and requests will be handled promptly.

Please note that the operation settings may vary between different operating systems and versions of software. Additionally, to optimize your user experience, we may adjust the operation settings. Therefore, the following guidelines are for reference only. If you have any doubts about how to exercise your rights or the methods and channels for doing so, you can contact our customer service for assistance or operation guidance.

1. Access to Your Personal Information

You have the right to access your personal information. You can access your personal information that you have provided to us in accordance with the relevant instructions (or settings) of the products and services we provide. For example:

(1) Account Information: You can log in to your personal center through the relevant product page at any time to access your account information, including your avatar, nickname, ID number, and more.

(2) Usage Information: You can check your usage information, such as content posting records, video information, dynamic updates, and likes received, through relevant product pages.

The above examples may not fully cover the functionality for accessing personal information within the software. You can directly contact our customer service for assistance or operation guidance.

2. Modification of Some Personal Information

(1) You can access and modify your mobile phone number by going to "My" > Side Drawer > "Account Information" > "Account Binding."

(2) You can change your account password by going to "My" > Side Drawer > "Account Information" > "Change Password."

 

(3) You can access and modify your real name authentication/identity verification information by going to "My" > Side Drawer > "Account Information" > "My Verification."

(4)You can access and modify your third-party login account.

The above examples may not fully cover the functionality for modifying personal information within the software. You can directly contact our customer service for assistance or operation guidance.

3. Deletion of Some Personal Information

(1) Delete Album Information: Go to "My" > "Album" to access and delete photos you have uploaded.

(2) Delete Dynamic Information: Go to "My" > "Dynamic" to access and delete text, image, and video updates you have posted.

(3) Delete Like Information: Go to "My" > Side Drawer > "Likes" to access and unlike posts.

(4) Delete Topic Information: Go to "Home" > "Followed Topics" to access and unfollow topics.

(5) Delete More Personal Information: Go to "My" > "View or Edit Profile" > "Edit" to access, modify, and delete your tags and personal signature.

(6) Delete Chat Records: Go to "Chat" > "Chat" and select the relevant conversation to clear the message list or delete chat records.

The above examples may not fully cover the functionality for deleting personal information within the software. You can directly contact our customer service for assistance or operation guidance.

4. You Have the Right to Set or Withdraw Your Privacy Authorization

(1) As mentioned earlier, some functions provided by our products and services require us to obtain relevant permissions from your device (including location, camera, microphone, etc.). After authorization, you can independently choose the types and scope of personal information you want to display to other users within the software through the privacy settings.

Privacy Settings Function: "Home" > "My" > "Upper Right Corner Drawer" > "Settings" > "Privacy"

You can freely manage your blacklist and also set your location, nearby list, likes, fans, and follow records, among others.

Please note that some privacy setting functions require a VIP account to be activated. Not enabling VIP will not affect your use of free setting functions.

(2) You can also permanently withdraw all authorizations for us to continue collecting your personal information by deleting your account.

(3) You should understand that after withdrawing your authorization, we will be unable to provide you with the specific functions and/or services corresponding to the withdrawn authorization. However, your decision to withdraw authorization will not affect the processing of personal information conducted based on your prior authorization.

5. Account Deactivation Guide

(1) You can use the account deactivation function to deactivate your account. After deactivating your account, no one can see any information about your account (including your friends). You can safely leave without worrying about your privacy. During the account deactivation period, we will save all your personal information and friend relationships. If you want to use your account again, you can log in to the software with your original account password, and the system will automatically unlock.

(2)Account Deactivation Function: Go to "Home" > "My" > Side Drawer > "Account Information" > "Deactivate Account."

6.Account Deletion (Permanent Deletion) Guide

(1) When you need to permanently terminate the use of your Whisp account services, you can apply to delete your Whisp account if you meet the following conditions:

(a) You can only apply to delete your own account and follow the deletion process and function within the software.

(b) You are still responsible for any illegal or rule violating behavior you engaged in before deleting your account or while using Whisp services.

(c) After successful deletion, account records, features, friend relationships, etc., cannot be restored or provided.

(2) Account Deletion Function: Go to "Home" > "My" > Side Drawer > "Account Information" > "Delete Account."

7.Limitations on Your Exercise of Personal Information Control

(1) For security purposes, you may need to provide a written request or other proof of your identity. We may ask you to verify your identity before processing your request. We will respond within a reasonable time frame. If you are dissatisfied, you can contact customer service for assistance.

(2) We generally do not charge fees for your reasonable requests. However, for repeated requests beyond a reasonable limit, we may charge certain cost fees as appropriate. We may refuse requests that are groundless repetitions, require excessive technical means (e.g., development of new systems or fundamental changes to existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (e.g., requests for us to provide someone else's personal information or requests for us to dispose of virtual information or virtual property of others).

(3) In the following situations, we will be unable to respond to your requests in accordance with legal and regulatory requirements:

(a) Directly related to national security and national defense security;

(b) Directly related to public safety, public health, or major public interests;

(c) Directly related to criminal investigation, prosecution, trial, and execution of judgments;

(e) There is sufficient evidence that you have subjective malice or abuse of rights;

(f) Responding to your requests will cause serious harm to your or other individuals' legitimate rights and interests;

(g) Involving trade secrets;

(h) Other circumstances in which we have reasonable grounds to refuse.

8. Rights of Deceased Account Holders

In the unfortunate event of the death of a Whisp user, an account that has not been deleted can be designated as a memorial account. We will continue to protect the security of the personal information of the deceased user within the memorial account. Close relatives of the deceased can contact us through the "How to Contact Us" section of this Privacy Policy. In compliance with the deceased user's arrangements made during their lifetime and without infringing upon the legitimate interests of others and the public, they may, after completing identity verification procedures, access, copy, correct, and delete the personal information of the deceased user in order to exercise their legal and legitimate rights as stipulated by laws and regulations.

 

Article 11. How We Protect Minors and Women

1. Whisp Platform is designed exclusively for female users and currently does not support access by male users. If you are male, please refrain from registering, using Whisp software and its related features, and proactively delete your account. If the platform determines that you are a male user, it has the right to take permanent account bans, and any resulting losses and legal responsibilities will be borne by you.

2. Whisp Platform places a strong emphasis on protecting the rights and interests of minors and takes strict measures against all types of actions that harm the rights and interests of minors. If you are a minor, please stop registering and using Whisp software and its related functions, and proactively delete your account. If the platform determines that you are a minor user, it has the right to take permanent account bans.

3. If you are the guardian of a minor, please contact our customer service to have the minor's account banned. Whisp Platform will not assume responsibility for the behavior of minors who register and use Whisp software and its related functions due to inadequate parental supervision.

4.Teen Mode

If you are the guardian of a minor and permit your ward to use our products, you can enable the Teen Mode for your ward.

We will remind users whether to enable the Child/Teen Mode each time they enter Whisp for the first time each day.

Users or guardians can also proactively enable the Child/Teen Mode in the "My" page in the upper right corner, or "My" > "≡" > "Settings" > "Teen Mode."

Once Child/Teen Mode is enabled, the account can only be used during specific time periods and for a specific duration. Beyond the specified duration or outside of specific time periods, the correct password must be entered to continue using the account.

If you are a minor who has been authenticated through real name verification, we will also proactively set your account to be used in the corresponding mode for minors.

 

Article12. Revision and Update of Privacy Policy

In order to provide you with a better user experience, our products and services will be continuously updated and changed, and we will revise the "Privacy Policy" as necessary. However, we will not reduce the rights you are entitled to under this privacy policy without your explicit consent.

For significant changes, we will provide more prominent notices (including but not limited to announcements, private messages, or special prompts on browsing pages). If you do not agree with the revised content, you can choose to stop using our services. If you continue to use our services, it will be deemed that you agree to be bound by the revised "Privacy Policy."

 

Article 13.How to Contact Us

1.Our Contact Information and Response Time

(1)Developer Name: Beihai Park Information Technology Co., Ltd.

Official Website: www.lestory.cn

Customer Service Phone: 07633664162

Report Illegal and Harmful Information Phone: 07633664162

Report Illegal and Harmful Information Email: cs@Whisp.us

(2)If you have any questions, comments, or suggestions regarding this privacy policy or your personal information, please contact Beihai Park Information Technology Co., Ltd. at phone: 07633664162.

(3)In general, we will respond within 3 working days. If you are not satisfied with our response, especially if our handling of personal information has harmed your legitimate rights and interests, you can also complain or report to regulatory authorities such as the internet, telecommunications, public security, and industry and commerce.

2. How to Access This Privacy Policy

We will prompt you to review this privacy policy and make a voluntary decision on whether to agree when you first register for an account. In addition, after logging in, you can view the full content of this privacy policy at any time by going to APP>My>Upper left corner drawer>"Settings">"About Whisp."

To facilitate your access to and copying of this privacy policy, you can also visit the Whisp official website.

 

Article14. Dispute Resolution

1. Matters related to the establishment, effectiveness, performance, interpretation, termination, and dispute resolution of this Agreement shall be governed by the laws of the mainland of the People's Republic of China.

2. The place of conclusion of this Agreement is Yinhai District, Beihai City.

3. If you and Whisp platform and platform service providers have any disputes or controversies, you should first seek a friendly resolution. If no agreement can be reached through negotiation, you agree:

(1) If you are a user in mainland China, you shall submit the dispute or controversy to the People's Court of Yinhai District, Beihai City for litigation.

(2) If you are a user outside mainland China, you shall submit the dispute or controversy to the Hong Kong International Arbitration Center for arbitration. The applicable law for arbitration is the law of the mainland of the People's Republic of China, the arbitration language is Chinese, and the place of arbitration is Hong Kong.

 

Article15. Miscellaneous

This privacy policy applies to all products and software operated by Beihai Park Information Technology Co., Ltd.

The headings of this privacy policy are for convenience and reading purposes only and do not affect the meaning or interpretation of any provision in the text.

In the event of any inconsistency or conflict between different language versions of this privacy policy, the Simplified Chinese text shall prevail.

Beihai Park Information Technology Co., Ltd. reserves the right to interpret the terms of this privacy policy.

 


 

Appendix: Detailed Permission List

Permission Name

Description

ACCESS_FINE_LOCATION

Access fine location

ACCESS_COARSE_LOCATION

Access coarse location

READ_PHONE_STATE

Read phone state

WRITE_EXTERNAL_STORAGE

Write external storage

READ_EXTERNAL_STORAGE

Read external storage

相机

Camera

录制音频

Record audio

READ_CONTACTS

Read contacts

BOOT_COMPLETED

Boot completed

SYSTEM_ALERT_WINDOW

System alert window

READ_CALENDAR

Read calendar

WRITE_CALENDAR

Write calendar

互联网

Internet

GET_TASKS

Get tasks

ACCESS_WIFI_STATE

Access WiFi state

CHANGE_WIFI_STATE

Change WiFi state

ACCESS_NETWORK_STATE

Access network state

颤动

Vibrate

WAKE_LOCK

Wake lock

MODIFY_AUDIO_SETTINGS

Modify audio settings

蓝牙

Bluetooth

CHANGE_NETWORK_STATE

Change network state

WRITE_SETTINGS

Write settings

FOREGROUND_SERVICE

Foreground service

BAIDU_LOCATION_SERVICE

Baidu location service

ACCESS_GPS

Access GPS

地图接收

Map receive

READ_GSERVICES

Read GServices

计费

Billing

CHECK_LICENSE

Check license

INSTALL_SHORTCUT

Install shortcut

UNINSTALL_SHORTCUT

Uninstall shortcut

RESTART_PACKAGES

Restart packages

BROADCAST_STICKY

Broadcast sticky

RECEIVE_USER_PRESENT

Receive user present

KILL_BACKGROUND_PROCESSES

Kill background processes

MOUNT_UNMOUNT_FILESYSTEMS

Mount unmount filesystems

手电筒

Flashlight

BLUETOOTH_ADMIN

Bluetooth admin

com.coloros.mcs.permission.RECEIVE_MCS_MESSAGE

Receive SMS (ColorOS)

com.heytap.mcs.permission.RECEIVE_MCS_MESSAGE

Receive SMS (HeyTap)

OBSERVE_GRANT_REVOKE_PERMISSIONS

Observe grant revoke permissions

BROADCAST_PACKAGE_ADDED

Broadcast package added

BROADCAST_PACKAGE_CHANGED

Broadcast package changed

BROADCAST_PACKAGE_INSTALL

Broadcast package install

BROADCAST_PACKAGE_REPLACED

Broadcast package replaced

MIPUSH_RECEIVE

MIPUSH receive

GET_COMMON_DATA

Get common data

REQUEST_INSTALL_PACKAGES

Request install packages

com.meizu.flyme.push.permission.RECEIVE

Receive Meizu push

com.meizu.c2dm.permission.RECEIVE

Receive Meizu push (C2DM)

USE_FULL_SCREEN_INTENT

Use fullscreen intent

GOOGLE_PHOTOS

Google Photos

WRITE_INTERNAL_STORAGE

Write internal storage

huawei.hwid.permission.gameservice.archive.access.provider

Huawei game service archive access

com.meizu.flyme.permission.PUSH

Meizu push

BIND_GET_INSTALL_REFERRER_SERVICE

Bind get install referrer service

getui.permission.GetuiService.com.redwolfama.peonyWhisp

Personalized push (Getui)

com.redwolfama.peonyWhisp.push.permission.MESSAGE

Meizu push

com.redwolfama.peonyWhisp.permission.C2D_MESSAGE

Meizu push (C2D)

READ_EXTERNAL_STORAGE/WRITE_EXTERNAL_STORAGE

Meizu Push SDK,Baidu Map SDK,AliyunSDK

Body sensors

AppsFlyerSDK,Zhichi customer service SDK