Publication Date: SEP 1st, 2023
You can read the corresponding chapters based on the following index to further understand the specific provisions of this policy:
How We Collect and Use Your Personal Information
Regarding the Storage and External Provision of Your Personal Information
How We Protect Your Personal Information
How We Protect the Personal Information of Minors
Your Rights to Control Personal Information
How This Policy Is Updated
How to Contact Us
I. How We Collect and Use Your Personal Information
As the processor of user information, we adhere to the principles of legality, legitimacy, necessity, and good faith to collect and use your personal information for the following purposes.
1.1. Information We Collect
1.1.1. Personal Information You Voluntarily Provide During the Provision of Products and/or Services
Litok is a "utility category" app that can be used for basic browsing services without the need for personal information. However, to provide you with additional features such as account registration/login, recording, voice-to-text, customer service, and feedback, you are required to provide us with the basic necessary personal information corresponding to each feature, except for specific requirements stated in relevant laws, regulations, and normative documents. If you refuse to provide such information, we will be unable to provide you with the corresponding feature services. Please note: If you provide personal information of others, please ensure that you have obtained their consent.
Details of Litok's complete features and the personal information we need to process are as follows:
(1) Account Registration/Login
To ensure the security of your personal space, you need to register and log in with a "Litok account" before you can use other services provided by Litok after registration and login, including voice-to-text, customer service, and feedback. When you register and log in with a Litok account, you must set a nickname, and we will collect your nickname, avatar, email address, and phone number. The aforementioned information is necessary for this feature, and if you do not provide it, you will be unable to complete registration/login.
In addition, you can choose to provide us with your voiceprint information. This information is sensitive and refusing to provide it will only prevent you from using voiceprint-related features but will not affect your normal use of other Litok functions.
(2) Recording, Voice-to-Text
When you use the recording and voice-to-text feature services, we require your permission to access and save your voice information and/or other recorded content you provide using the device's microphone and storage on our cloud server for voice transcription. This is a necessary system permission for this feature service, and if you refuse, you will be unable to use the recording and voice-to-text feature. If you choose to upload audio files from your device for transcription, we need to obtain your storage permission to access your local recording content. This is a necessary system permission for local file upload, and if you refuse, you will be unable to upload audio files locally and perform voice-to-text. At the same time, we will collect the transcribed text information and provide real-time processing feedback to you based on your needs, facilitating your understanding of the voice interactions and providing recording viewing and effect analysis services.
Please be informed that even if you have agreed to enable microphone permissions, we will only access your voice information when you actively enable the recording function. Furthermore, although the voice information you enter and the transcribed text information may contain personal information of you or others, we will not identify individuals based on the content of the personal information involved.
Please be aware that the audio files you voluntarily upload will be stored in an encrypted manner on our cloud server, and you can choose to delete this information at any time. Unless you have made a voluntary choice or are required to comply with relevant laws and regulations, we will not provide the aforementioned audio file information to third parties or use it for purposes other than the specified feature.
(3) Customer Service and Feedback
When you provide opinions and feedback to us through our customer service, file complaints, appeals, or inquiries about the Product and/or services, we will collect the text information you enter to understand the content and requirements of your feedback. Such information is necessary for user feedback and contacting customer service.
To ensure the security of your account and the system, you need to provide us with the account information used during registration/login for the purpose of verifying your user identity. This information is necessary for identity verification during user feedback.
You can also provide your phone number and email address to facilitate better communication with you, clarify your needs, handle relevant issues, or help you with other problems. Such information is not necessary for user feedback or contacting customer service. Our customer service staff may use your phone number or other contact information you provided to contact you by phone or email in order to better understand your needs, provide solutions for relevant issues, or assist you in resolving other problems. This is done to provide customer service and after-sales service related to your order requirements, ensure the smooth completion of orders, understand your experience with the Product, and other needs for improving our products and services or providing other services related to your rights.
During the feedback, complaint, or inquiry process, to explain solutions to problems or record relevant problem-solving measures and results, you can choose to provide us with corresponding supporting materials (pictures or videos). The system will record communication records between you and customer service to better help you solve the problems you inquired about and improve the quality of customer service. If you do not provide the aforementioned information, we will be unable to provide timely feedback on your inquiries, but it will not affect your normal use of other services provided by the Product.
To provide you with a clear understanding of the permissions related to your personal information that are invoked by this software, we summarize the situation in the following table. You can check the status of these permissions in your device settings or our client and decide to enable or disable these permissions at any time. Please note that when you enable any permission, it means that you authorize us to collect and use the relevant personal information to provide you with the corresponding service. Once you disable any permission, it means that you revoke the authorization, and we will no longer collect and use the relevant personal information based on the corresponding permission or provide the service associated with that permission. However, your decision to disable permissions will not affect the information collection and use conducted based on your previous authorization.
1.1.2. Personal Information Actively Collected During the Provision of Products and/or Services
In order to ensure your normal use of our services, maintain the normal operation of our services, improve and optimize our service experience, and safeguard the security of your account, we may collect the following information from you: device model, operating system, device identification (IMEI/Android ID/DEVICE_ID/IDFA, SIM card IMSI information, OAID), login IP address, Litok software version number, access network method, type, and status, network quality data, operation logs, service log information (such as information searched and viewed on Litok, service failure information, referral URLs, etc.). These log information are necessary for providing services.
22.214.171.124 Security and Troubleshooting
Our product is developed based on DCloud uni-app (5+ App/Wap2App). When you use this product, we need to collect your device identification (IMEI/Android ID/DEVICE_ID/IDFA, SIM card IMSI information, OAID) during application runtime to provide statistical analysis services and analyze application startup data and abnormal error logs to improve performance and user experience, providing better services to users. To ensure that the service continues to work properly when the user moves to the background, we will continue to use your MAC information in silent and background states.
126.96.36.199 Operation Statistics and Product Optimization
In order to ensure your normal use of our services, maintain the normal operation of our services, improve and optimize our service experience, and safeguard the security of your account, we may collect the following information from you: device model, operating system, device identification, login IP address, Litok software version number, access network method, type, and status, network quality data, operation logs, service log information (such as information searched and viewed on Litok, service failure information, referral URLs, etc.). These log information are necessary for providing this service. If you refuse to provide the above information, we will not be able to monitor the security of the account, which may affect the security of account usage.
1.1.3. Personal Information Obtained from Third Parties
Please note that currently Litok does not actively obtain your personal information from third parties. If in the future, for business development needs, we indirectly obtain your personal information from third parties, we will inform you of the source, type, and scope of your personal information before obtaining it. For example, if Litok needs to process personal information beyond the scope authorized by you when you originally provided personal information to the third party, we will obtain your express consent before processing such personal information. In addition, we will strictly comply with relevant laws and regulations and require third parties to ensure the legality of the information they provide.
1.2. How We Use Information
1.2.1. In order to ensure the security of the service and better understand the operation of our application, we may record relevant information such as the frequency of your use of the application, program operation error data, overall usage, performance data, and the source of the application. We will not combine the information stored in the analysis software with any personal identity information you provide in the application.
If we use your personal information beyond the stated purposes at the time of collection and beyond the scope directly or reasonably related to it, we will inform you again and obtain your express consent before using your personal information.
To ensure that the service continues to work properly when the user moves to the background, we will continue to use your MAC information in silent and background states.
1.2.2. According to applicable laws and regulations, we may process your personal information technically so that users cannot be accurately identified based on such information, and conduct anonymous or de-identified academic research or statistical analysis on the processed information (including using de-identified voice information for model algorithm training) to better improve product functionality and service capabilities.
1.3. Appendix: Third-Party SDK
Some functions in Litok are provided by cooperating third-party organizations through SDK plugins. The SDK technical service provider may obtain permission and information in response to the necessity of providing functions or services to you. For the names, contact information, processing purposes, sharing methods, and types of shared information/permissions of third-party SDKs, please refer to the "List of Shared Information with Third Parties."
List of Shared Information with Third Parties
1.4. Exceptions to Obtaining Authorization for the Collection and Use of Your Personal Information
According to relevant laws and regulations, we do not need to obtain your consent in the following situations when collecting and using personal information:
Necessary for the establishment and performance of a contract in which you are a party, or necessary for the implementation of human resource management in accordance with legally formulated labor regulations and collective contracts.
Necessary for the fulfillment of legal obligations or statutory duties.
Necessary to respond to public health emergencies or protect the life, health, and property safety of individuals in emergencies.
Necessary for the implementation of news reporting, public opinion supervision, and other behaviors for public interest, within a reasonable scope of processing personal information.
Within a reasonable scope, process personal information that is self-disclosed publicly or already lawfully disclosed.
Other situations as stipulated by laws and administrative regulations.
Please understand that the functionalities and services we provide are constantly updated and developed. If a certain function or service is not mentioned in the above explanations and collects your information, we will inform you of the content, scope, and purpose of the information collection through page prompts, interactive processes, website announcements, etc., to obtain your consent.
This policy explains the details of how we handle personal information, but it does not cover all scenarios where third-party products and services that use Litok products and services process personal information. Although third parties call our products and/or services, we do not understand or control their specific use behaviors, and therefore we are not responsible for their actions. If you are the end user who uses a product or service that calls Litok products and/or services, we recommend that you exercise caution and carefully read and agree to their privacy policies before accessing or using their products and services.
2.1.1. Website Beacons and Pixel Tags
In addition to cookies, we also use other similar technologies such as website beacons and pixel tags on the website. For example, the emails we send to you may contain click URLs linking to content on our website. If you click on this link, we will track this click to understand your product or service preferences and improve customer service. Website beacons are usually transparent images embedded in websites or emails. With pixel tags in emails, we can know if the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe at any time.
2.1.2. Do Not Track
Many web browsers have a Do Not Track feature, which can send Do Not Track requests to websites. Currently, major internet standard organizations have not established relevant policies to specify how websites should respond to such requests. However, if your browser enables Do Not Track, all our websites will respect your choice.
III. Storage and External Provision of Your Personal Information
3.1.1. Location of Information Storage
In principle, the personal information collected and generated by our service will be stored in third-party cloud storage and will not be transferred to other regions.
Except in the following situations:
As provided by laws and regulations;
With your explicit consent;
Your personal active behavior on the internet, such as cross-border transactions.
3.1.2. Storage Period of Information
In general, we will retain your personal information for the shortest time necessary to achieve the processing purposes described in this policy during your use of this product and/or service, unless applicable laws, regulations, or national standards specify otherwise. After the above period, or after you actively request to delete your personal information or log out of your account, we will delete your personal information as soon as possible according to the requirements of applicable laws and regulations, unless applicable laws, regulations, or national standards require retention of this information for a longer period. However, in the following circumstances, we will change the storage time of personal information due to legal requirements:
To comply with applicable laws and regulations and other related provisions;
To comply with the provisions of court judgments, rulings, or other legal procedures;
To comply with the requirements of relevant government authorities or legally authorized organizations;
When we have reason to believe that it is necessary to comply with applicable laws, regulations, and other related provisions;
For the purpose of executing relevant service agreements or this policy, maintaining social public interests, protecting our or third parties' significant legal rights and interests, but it is difficult to obtain the consent of the subject of personal information.
After you stop using this product, we will stop collecting and using your information, except as otherwise required by laws and regulations or regulatory authorities.
When the relevant services of this product stop operating, we will notify you in the form of sending notifications and announcements, and delete the personal information stored on the server within the time limit required by laws and regulations.
3.2. Sharing, Transfer, and Disclosure
Except for other agreements, we will not share your personal information with any other company, organization, or individual without your explicit consent.
We will not disclose or publicly disclose the collected personal information to third parties. If it is necessary to disclose, we will inform you of the purpose of this disclosure, the type of disclosed information, and the possible involvement of sensitive information, and obtain your explicit consent.
According to relevant laws, regulations, and national standards, we may share, transfer, or publicly disclose your personal information without obtaining your prior authorization in the following situations:
Directly related to national security and national defense security;
Directly related to public safety, public health, and significant public interests;
Directly related to criminal investigation, prosecution, trial, and judgment execution;
Necessary for protecting the life, property, and other significant legal rights and interests of personal information subjects or other individuals, but it is difficult to obtain their consent;
Personal information that is self-disclosed publicly;
Personal information collected from legal public disclosures, such as legal news reports, government information disclosure, and other channels;
Other situations as stipulated by laws and regulations.
IV. How We Protect Your Personal Information
4.1. We have implemented industry-standard security measures to protect the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to safeguard your personal information. For example, we use encryption technology (e.g., SSL) and anonymization techniques to ensure data confidentiality. We employ trusted protective mechanisms to prevent data from malicious attacks. We deploy access control mechanisms to ensure that only authorized personnel can access personal information. Additionally, we conduct security and privacy protection training to enhance employees' awareness of the importance of safeguarding personal information.
4.2. Please understand that due to technical limitations and potential malicious attacks, unforeseen and uncontrollable incidents may occur. The internet is not an entirely secure environment, so please use complex passwords to assist us in ensuring the security of your account.
4.3. In the event of a personal information security incident, we will activate emergency response plans as required by laws and regulations to prevent the event from spreading. We will promptly notify you of the incident via email, letter, phone call, push notification, or other reasonable and effective means. Additionally, we will report the handling of personal information security incidents in accordance with regulatory requirements.
4.4. Handling of personal information of minors.
4.5. We enhance the security capabilities of software installed on your devices through continuous technological advancements to prevent the leakage of your personal information. For example, for secure transmission, we perform local encryption of certain information on your device. To prevent viruses, trojans, or other malicious programs, websites may gather information about the applications installed on your device or the running processes. We establish specialized management systems, processes, and organizations to ensure information security. We strictly limit the scope of personnel with access to information, requiring them to abide by confidentiality obligations and subjecting them to audits.
V. How We Protect the Personal Information of Minors
5.1. We attach great importance to the protection of personal information of minors and will protect such information in accordance with relevant international/national laws and regulations.
5.2. Any individual under the age of 18 will be considered a minor. According to relevant laws and regulations, if you are a minor aged 12 or older, we will obtain your or your guardian's consent before collecting your personal information. If you, your parents, or other guardians request corrections or deletions of the personal information of minors, we will take timely measures to do so, except as otherwise provided by law and administrative regulations.
5.3. If you are a child (hereinafter referred to as "Child") under the age of 12 (excluding 12), we will obtain consent from your parents or other guardians before collecting your personal information. In processing the personal information of children, we will follow the principles of legality, necessity, informed consent, clear purpose, security, and lawful utilization, in addition to abiding by the relevant laws and regulations, and strictly adhere to the storage, use, and disclosure of collected children's personal information. We will not retain such information beyond the necessary period for achieving the collection and use purposes, and we will delete the children's personal information after expiration.
If you are the guardian of a child, you should carefully read this policy, the specific privacy protection guidelines for the product (if any), and the "Child Privacy Protection Statement" before explaining the child's completion of product or service registration and usage. You should decide whether to agree to this policy, the specific privacy protection guidelines for the product (if any), and the "Child Privacy Protection Statement" and assist the child in registering and using our provided products or services.
If you have any questions or requests regarding the protection of personal information of children you supervise, please contact us using the contact information disclosed in Part Seven of the "Child Privacy Protection Statement." We will process and respond to your request in a reasonable time.
VI. Your Control Rights over Personal Information
In accordance with relevant laws, regulations, and supervisory requirements, we ensure that you have the following rights concerning your personal information:
6.1. Access, correction, and updating of your personal information
You have the right to access and correct or update your personal information through our official website, mobile app, or other channels, except as otherwise provided by law and regulations. You are responsible for updating your personal information promptly.
6.2. Deletion of your personal information
You can request the deletion of your personal information in the following circumstances:
If our processing of personal information violates laws and regulations;
If we collect and use your personal information without obtaining your consent;
If our processing of personal information violates agreements with you;
Other circumstances as stipulated by laws and administrative regulations.
6.3. Controlling personal information through account logout
Account cancellation: Contact customer service directly to cancel your account. After canceling the account, we will delete or anonymize the user's personal information.
6.5. Responding to your requests
For security reasons, you may be required to provide a written request or other means to prove your identity. We may ask you to verify your identity before processing your request. Please understand that we may refuse certain requests that are groundless, require excessive technical means, pose risks to the legitimate rights and interests of others, or are impractical.
Despite the above provisions, in accordance with legal requirements, we may not be able to respond to your request in the following circumstances:
Involving national security or national defense;
Relating to public security, public health, or significant public interests;
Relating to criminal investigations, prosecution, trial, and judgment enforcement, etc.;
There is sufficient evidence to prove that you have subjective malice or abuse of rights;
Your request would cause serious harm to your or other individuals' or organizations' legitimate rights and interests;
Involving our business secrets.
VII. How this Policy is Updated
In accordance with changes in relevant laws, regulations, and service operations, we will periodically revise this policy and related rules. The updated content will be announced through our official website, mobile app, and other channels, replacing the previous relevant content. Please regularly check for updates in announcements, prompts, agreements, rules, and other related content. You understand and acknowledge that if you disagree with the updated content, you should immediately cease using the corresponding services and log out of your account. We will stop collecting your relevant personal information. If you continue to use the services, it will be deemed that you accept the modified content.
VIII. How to Contact Us
Email address: email@example.com
To efficiently address your inquiries and provide timely feedback, we may require you to submit proof of identity, valid contact information, written requests, and relevant evidence. We will process your requests after verifying your identity. Generally, we will respond within fifteen working days.
If you are dissatisfied with our response, especially if you believe that our handling of personal information has caused harm and we cannot provide a satisfactory response or refuse to make improvements after your feedback, you may file a complaint with the relevant regulatory authorities.