Privacy Policy litok 4

IV. How We Protect Your Personal Information

4.1. We have implemented industry-standard security measures to protect the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to safeguard your personal information. For example, we use encryption technology (e.g., SSL) and anonymization techniques to ensure data confidentiality. We employ trusted protective mechanisms to prevent data from malicious attacks. We deploy access control mechanisms to ensure that only authorized personnel can access personal information. Additionally, we conduct security and privacy protection training to enhance employees' awareness of the importance of safeguarding personal information.

4.2. Please understand that due to technical limitations and potential malicious attacks, unforeseen and uncontrollable incidents may occur. The internet is not an entirely secure environment, so please use complex passwords to assist us in ensuring the security of your account.

4.3. In the event of a personal information security incident, we will activate emergency response plans as required by laws and regulations to prevent the event from spreading. We will promptly notify you of the incident via email, letter, phone call, push notification, or other reasonable and effective means. Additionally, we will report the handlingof personal information security incidents in accordance with regulatory requirements.

4.4. Handling of personal information of minors.

4.5. We enhance the security capabilities of software installed on your devices through continuous technological advancements to prevent the leakage of your personal information. For example, for secure transmission, we perform local encryption of certain information on your device. To prevent viruses, trojans, or other malicious programs, websites may gather information about the applications installed on your device or the running processes. We establish specialized management systems, processes, and organizations to ensure information security. We strictly limit the scope of personnel with access to information, requiring them to abide by confidentiality obligations and subjecting them to audits.

IV. How We Protect Your Personal Information

4.1. We have implemented industry-standard security measures to protect the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to safeguard your personal information. For example, we use encryption technology (e.g., SSL) and anonymization techniques to ensure data confidentiality. We employ trusted protective mechanisms to prevent data from malicious attacks. We deploy access control mechanisms to ensure that only authorized personnel can access personal information. Additionally, we conduct security and privacy protection training to enhance employees' awareness of the importance of safeguarding personal information.

4.2. Please understand that due to technical limitations and potential malicious attacks, unforeseen and uncontrollable incidents may occur. The internet is not an entirely secure environment, so please use complex passwords to assist us in ensuring the security of your account.

4.3. In the event of a personal information security incident, we will activate emergency response plans as required by laws and regulations to prevent the event from spreading. We will promptly notify you of the incident via email, letter, phone call, push notification, or other reasonable and effective means. Additionally, we will report the handlingof personal information security incidents in accordance with regulatory requirements.

4.4. Handling of personal information of minors.

4.5. We enhance the security capabilities of software installed on your devices through continuous technological advancements to prevent the leakage of your personal information. For example, for secure transmission, we perform local encryption of certain information on your device. To prevent viruses, trojans, or other malicious programs, websites may gather information about the applications installed on your device or the running processes. We establish specialized management systems, processes, and organizations to ensure information security. We strictly limit the scope of personnel with access to information, requiring them to abide by confidentiality obligations and subjecting them to audits.

Permission Types

Correspondin g Functions

Purpose of Accessing Permissions

Timing of Requesting Permissions

Can it be disabled?

Camera

Take photos to upload 

user avatars

Take photos to upload avatars

Prompt for permission in a pop-up window when using camera to upload avatars for the first time

Yes

Permission Types

Correspondin g Functions

Purpose of Accessing Permissions

Timing of Requesting Permissions

Can it be disabled?

Photo Album

Upload User Avatar

Obtain Image Information

Prompt for permission in a pop-up window when using the photo album to upload avatars for the first time

Yes

Microphone

Recording

Use the microphone for recording

Prompt for permission in a pop-up window when using the microphone for recording for the first time

Yes

Storage

Recording saving, audio file import, conference report

download,app update package download

File storage

Prompt for permission in a pop-up window when uploading

audio files from the

device for

the first time

Yes

WIFI and Network

Audio file upload, dispatching transcriptio n results, audio file editing

Communicati on via

network and server

Prompt for permission when opening Litok for the first time.

Yes

Location

Obtain location information

Upload meeting location

Prompt for permission when saving audio file for the first time.

Yes

Device Status

Mobile device crash information

Obtain device information

Prompt for permission when opening Litok for the first time

Yes

Notification s

Push notification feature

Send notification messages

Prompt for permission when opening Litok for the first time

Yes

Bluetooth

Hardware device connection

Connecting external devices (e.g., microphone...)

When using the device connection feature for the first time, a

pop-up

window will prompt for permission

Yes

Sensors

Error information collection

Possible prerequisite actions for collecting error information

Prompting when opening Litok for the first time

Yes