PrivacyPolicy

PrivacyPolicy

Privacy Policy

Publication Date: 1 st August, 2023
Litok (hereinafter referred to as "the Product") is a product developed by Lita Digital Co., Ltd., a company based in the British Virgin Islands (hereinafter referred to as "we"). When you use our product and/or services, we may collect and use your relevant personal information. Through this Privacy Policy, we will explain to you how we collect, store, use, and, when necessary, provide your personal information to third parties, as well as the rights you have.
Before using our product and/or services, please carefully read this Privacy Policy and ensure that you fully understand and accept all the terms. If not, please refrain from registering, logging in, or using the services. By using or continuing to use our services, you agree to the processing of your personal information in accordance with this Privacy Policy. If you are a minor under the age of 18, please read and fully understand this policy with the accompaniment of your parents or guardians, and use the Product and/or services only with their consent.
This Privacy Policy is a general set of terms we use universally and applies to all our products and services. For specific products (or services), before collecting and using your information, we will clearly state the purpose, methods, and scope of the collection and use through corresponding product (or service) agreements, authorizations, etc., and obtain your consent or authorization. The aforementioned documents, together with this Privacy Policy, constitute the complete privacy policy between us and you. In case of any inconsistency, the provisions of the corresponding product (or service) agreement or authorization shall prevail.
You can read the corresponding chapters based on the following index to further understand the specific provisions of this policy:
1. How We Collect and Use Your Personal Information
2. How We Use Cookies and Similar Technologies
3. Regarding the Storage and External Provision of Your Personal
Information
4. How We Protect Your Personal Information
5. How We Protect the Personal Information of Minors
6. Your Rights to Control Personal Information
7. How This Policy Is Updated8. How to Contact Us
8. How to Contact Us

1. How We Collect and Use Your Personal Information

As the processor of user information, we adhere to the principles oflegality, legitimacy,necessity, and good faith to collect and use yourpersonal information for the following purposes.

1.1. Information We Collect1.1.1. Personal Information You Voluntarily Provide During the Provision of Products and/or Services

Litok is a "utility category" app that can be used for basic browsing services without the need for personal information. However, to provide you with additional features such as account registration/login,recording, voice-to-text, customer service, and feedback, you are required to provide us with the basic necessary personal information corresponding to each feature, except for specific requirements stated inrelevant laws, regulations,and normative documents. If you refuse toprovide such information,we will be unable to provide you with thecorresponding feature services. Please note:If you provide personalinformation of others, please ensure that you have obtained their consent. Details of Litok's complete features and the personal information we need to process are as follows:

(1) Account Registration/Login

To ensure the security of your personal space, you need to register andlog in with a "Litok account" before you can use other services providedby Litok after registration and login, including voice to-text, customer service, and feedback. When you register and log in with a Litok account, you must set a nickname, and we will collect your nickname, avatar, emailaddress,and phone number. The aforementioned information isnecessary for this feature, and if you do not provide it, you will be unableto complete registration/login. In addition, you can choose to provide us with your voiceprintinformation.This information is sensitive and refusing to provide it willonly prevent you from using voiceprint-related features but will not affect your normal use of other Litok functions.

(2) Recording, Voice-to-Text

When you use the recording and voice-to-text feature services, we require your permission to access and save your voice information and/or other recorded content you provide using the device's microphone and storage on our cloud server for voice transcription. This is a necessary system permission for this feature service, and if you refuse, you will be unable to use the recording and voice-to-text feature. If you choose to upload audio files from your device for transcription, we need to obtain your storage permission to access your local recording content. This is a necessary system permission for local file upload, and if you refuse, you will be unable to upload audio files locally and perform voice-to-text. At the same time, we will collect the transcribed text information and provide real-time processing feedback to you based on your needs, facilitating your understanding of the voice interactions and providing recording viewing and effect analysis services. Please be informed that even if you have agreed to enable microphone permissions, we will only access your voice information when you actively enable the recording function. Furthermore, although the voice information you enter and the transcribed text information may contain personal information of you or others, we will not identify individuals based on the content of the personal information involved. Please be aware that the audio files you voluntarily upload will be stored in an encrypted manner on our cloud server, and you can choose to delete this information at any time. Unless you have made a voluntary choice or are required to comply with relevant laws and regulations, we will not provide the aforementioned audio file information to third parties or use it for purposes other than the specified feature.

(3) Customer Service and Feedback

When you provide opinions and feedback to us through our customer service, file complaints, appeals, or inquiries about the Product and/or services, we will collect the text information you enter to understand the content and requirements of your feedback. Such information is necessary for user feedback and contacting customer service.To ensure the security of your account and the system, you need to provide us with the account information used during registration/login for the purpose of verifying your user identity. This information is necessary for identity verification during user feedback. You can also provide your phone number and email address to facilitate better communication with you, clarify your needs, handle relevant issues, or help you with other problems. Such information is not necessary for user feedback or contacting customer service. Our customer service staff may use your phone number or other contact information you provided to contact you by phone or email in order to better understand your needs, provide solutions for relevant issues, or assist you in resolving other problems. This is done to provide customer service and after-sales service related to your order requirements, ensure the smooth completion of orders, understand your experience with the Product, and other needs for improving our products and services or providing other services related to your rights. During the feedback, complaint, or inquiry process, to explain solutions to problems or record relevant problem-solving measures and results, you can choose to provide us with corresponding supporting materials (pictures or videos). The system will record communication records between you and customer service to better help you solve the problems you inquired about and improve the quality of customer service. If you do not provide the aforementioned information, we will be unable to provide timely feedback on your inquiries, but it will not affect your normal use of other services provided by the Product. To provide you with a clear understanding of the permissions related to your personal information that are invoked by this software, we summarize the situation in the following table. You can check the status of these permissions in your device settings or our client and decide to enable or disable these permissions at any time. Please note that when you enable any permission, it means that you authorize us to collect and use the relevant personal information to provide you with the corresponding service. Once you disable any permission, it means that you revoke the authorization, and we will no longer collect and use the relevant personal information based on the corresponding permission or provide the service associated with that permission. However, your decision to disable permissions will not affect the information collection and use conducted based on your previous authorization.



Permission Types

Correspondin g Functions

Purpose of Accessing Permissions

Timing of Requesting Permissions

Can it be disabled?

Camera

Take photos to upload 

user avatars

Take photos to upload avatars

Prompt for permission in a pop-up window when using camera to upload avatars for the first time

Yes

Permission Types

Correspondin g Functions

Purpose of Accessing Permissions

Timing of Requesting Permissions

Can it be disabled?

Photo Album

Upload User Avatar

Obtain Image Information

Prompt for permission in a pop-up window when using the photo album to upload avatars for the first time

Yes

Microphone

Recording

Use the microphone for recording

Prompt for permission in a pop-up window when using the microphone for recording for the first time

Yes

Storage

Recording saving, audio file import, conference report

download,app update package download

File storage

Prompt for permission in a pop-up window when uploading

audio files from the

device for

the first time

Yes

WIFI and Network

Audio file upload, dispatching transcriptio n results, audio file editing

Communicati on via

network and server

Prompt for permission when opening Litok for the first time.

Yes

Location

Obtain location information

Upload meeting location

Prompt for permission when saving audio file for the first time.

Yes

Device Status

Mobile device crash information

Obtain device information

Prompt for permission when opening Litok for the first time

Yes

Notification s

Push notification feature

Send notification messages

Prompt for permission when opening Litok for the first time

Yes

Bluetooth

Hardware device connection

Connecting external devices (e.g., microphone...)

When using the device connection feature for the first time, a

pop-up

window will prompt for permission

Yes

Sensors

Error information collection

Possible prerequisite actions for collecting error information

Prompting when opening Litok for the first time

Yes

1.1.2. Personal Information Actively Collected During the Provision of

Products and/or Services

In order to ensure your normal use of our services, maintain the normal operation of our services, improve and optimize our service experience, and safeguard the security of your account, we may collect the following information from you: device model, operating system, device identification (IMEI/Android ID/DEVICE_ID/IDFA, SIM card IMSI information, OAID), login IP address, Litok software version number, access network method, type, and status, network quality data, operation logs, service log information (such as information searched and viewed on Litok, service failure information, referral URLs, etc.). These log information are necessary for providing services.

1.1.2.1 Security and Troubleshooting

Our product is developed based on DCloud uni-app (5+ App/Wap2App). When you use this product, we need to collect your device identification (IMEI/Android ID/DEVICE_ID/IDFA, SIM card IMSI information, OAID) during application runtime to provide statistical analysis services and analyze application startup data and abnormal error logs to improve performance and user experience, providing better services to users. To ensure that the service continues to work properly when the user movesto the background, we will continue to use your MAC information in silent and background states.

1.1.2.2 Operation Statistics and Product Optimization

In order to ensure your normal use of our services, maintain the normal operation of our services, improve and optimize our service experience, and safeguard the security of your account, we may collect the following information from you: device model, operating system, deviceidentification, login IP address, Litok software version number, access network method, type, and status, network quality data, operation logs, service log information (such as information searched and viewed on Litok, service failure information, referral URLs, etc.). These log information are necessary for providing this service. If you refuse to provide the above information, we will not be able to monitor the security of the account, which may affect the security of account usage.

1.1.3. Personal Information Obtained from Third Parties

Please note that currently Litok does not actively obtain your personal information from third parties. If in the future, for business development needs, we indirectly obtain your personal information from third parties, we will inform you of the source, type, and scope of your personal information before obtaining it. For example, if Litok needs to process personal information beyond the scope authorized by you when you originally provided personal information to the third party, we will obtain your express consent before processing such personal information. In addition, we will strictly comply with relevant laws and regulations and require third parties to ensure the legality of the information they provide. If you log in to Litok using third-party account, we will collect the authorized shared account information (nickname, avatar), Open ID from the third party, and bind your third-party account number with Litok account after you agree to this policy. If you need to unbind the above third-party account, you can close the authorization binding or contact us according to the method provided in the eighth section of this privacy policy.

1.2. How We Use Information

1.2.1. In order to ensure the security of the service and better understand

the operation of our application, we may record relevant information such as the frequency of your use of the application, program operation error data, overall usage, performance data, and the source of the application. We will not combine the information stored in the analysis software with any personal identity information you provide in the application. If we use your personal information beyond the stated purposes at the time of collection and beyond the scope directly or reasonably related toit, we will inform you again and obtain your express consent before using your personal information. To ensure that the service continues to work properly when the user moves to the background, we will continue to use your MAC information in silent and background states.

1.2.2. According to applicable laws and regulations, we may process your

personal information technically so that users cannot be accurately identified based on such information, and conduct anonymous or de-identified academic research or statistical analysis on the processed information (including using de-identified voice information for model algorithm training) to better improve product functionality and service capabilities.

1.3. Appendix: Third-Party SDK

Some functions in Litok are provided by cooperating third-party organizations through SDK plugins. The SDK technical service provider may obtain permission and information in response to the necessity of providing functions or services to you. For the names, contact information, processing purposes, sharing methods, and types of shared information/permissions of third-party SDKs, please refer to the "List of Shared Information with Third Parties."

List of Shared Information with Third Parties


CompanyName

Pro duct/Type

Con tact Inf or mation

Types of Shared Informa tion/Pr missions

Usage Scenarios

Processing's Objective

Sharing Methods

Rules for Processing Personal Information of Partner Companies

Google

Login

Local SDK datacollection

https://policies.googl e.com/privacy

Permission Types

Correspondin g Functions

Purpose of Accessing Permissions

Timing of Requesting Permissions

Can it be disabled?

Paypal

Payment

Local SDK datacollection

https://www.paypal.co m/myaccount/privacy/ privacyhub

AWS

Transcripti on/Translat ion/Storage

https://aws.amazon.c om/privacy/

1.4. Exceptions to Obtaining Authorization for the Collection and Use of

Your Personal Information

According to relevant laws and regulations, we do not need to obtain your consent in the following situations when collecting and using personal information:

(1) Necessary for the establishment and performance of a contract in which you are a party, or necessary for the implementation of human resource management in accordance with legally formulated labor regulations and collective contracts.

(2) Necessary for the fulfillment of legal obligations or statutory duties.

(3) Necessary to respond to public health emergencies or protect the life, health, and property safety of individuals in emergencies.

(4) Necessary for the implementation of news reporting, public opinion supervision, and other behaviors for public interest, within a reasonable scope of processing personal information.

(5) Within a reasonable scope, process personal information that is self-disclosed publicly or already lawfully disclosed.

(6) Other situations as stipulated by laws and administrative regulations.Please understand that the functionalities and services we provide are constantly updated and developed. If a certain function or service is not mentioned in the above explanations and collects your information, we will inform you of the content, scope, and purpose of the information collection through page prompts, interactive processes, website announcements, etc., to obtain your consent. This policy explains the details of how we handle personal information, but it does not cover all scenarios where third-party products and services that use Litok products and services process personal information. Although third parties call our products and/or services, we do not understand or control their specific use behaviors, and therefore we are not responsible for their actions. If you are the end user who uses a product or service that calls Litok products and/or services, we recommend that you exercise caution and carefully read and agree to their privacy policies before accessing or using their products and services.

II. How We Use Cookies and Similar Technologies

2.1. Cookies

To ensure the normal operation of the website, we store small data files called cookies on your computer or mobile device. Cookies usually contain an identifier, website name, and some numbers and characters. With the help of cookies, the website can store data such as your preferences or usage habits. We will not use cookies for any purposes other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies stored on your computer, and most web browsers have the function to block cookies. However, if you do so, you need to change the user settings every time you visit our website.

2.1.1. Website Beacons and Pixel Tags

In addition to cookies, we also use other similar technologies such as website beacons and pixel tags on the website. For example, the emails we send to you may contain click URLs linking to content on our website. If you click on this link, we will track this click to understand your product or service preferences and improve customer service. Website beacons are usually transparent images embedded in websites or emails. Withpixel tags in emails, we can know if the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe at any time.

2.1.2. Do Not Track

Many web browsers have a Do Not Track feature, which can send Do Not Track requests to websites. Currently, major internet standard organizations have not established relevant policies to specify how websites should respond to such requests. However, if your browser enables Do Not Track, all our websites will respect your choice.

III. Storage and External Provision of Your Personal Information

3.1. Storage

3.1.1. Location of Information Storage

In principle, the personal information collected and generated by our service will be stored in third-party cloud storage and will not be transferred to other regions. Except in the following situations:

(1) As provided by laws and regulations;

(2) With your explicit consent;

(3) Your personal active behavior on the internet, such as cross-border

transactions.

3.1.2. Storage Period of Information

In general, we will retain your personal information for the shortest time necessary to achieve the processing purposes described in this policy during your use of this product and/or service, unless applicable laws, regulations, or national standards specify otherwise. After the above period, or after you actively request to delete your personal information or log out of your account, we will delete your personal information as soon as possible according to the requirements of applicable laws and regulations, unless applicable laws, regulations, or national standards require retention of this information for a longer period. However, in the following circumstances, we will change the storage time of personal information due to legal requirements:(1) To comply with applicable laws and regulations and other related provisions;

(2) To comply with the provisions of court judgments, rulings, or other legal procedures;

(3) To comply with the requirements of relevant government authorities or legally authorized organizations;

(4) When we have reason to believe that it is necessary to comply with applicable laws, regulations, and other related provisions;

(5) For the purpose of executing relevant service agreements or this policy, maintaining social public interests, protecting our or third parties' significant legal rights and interests, but it is difficult to obtain the consent of the subject of personal information.

After you stop using this product, we will stop collecting and using your information, except as otherwise required by laws and regulations or regulatory authorities. When the relevant services of this product stop operating, we will notify you in the form of sending notifications and announcements, and delete the personal information stored on the server within the time limit required by laws and regulations.

3.2. Sharing, Transfer, and Disclosure

(1) Except for other agreements, we will not share your personal information with any other company, organization, or individual without your explicit consent.

(2) We will not disclose or publicly disclose the collected personal information to third parties. If it is necessary to disclose, we will inform you of the purpose of this disclosure, the type of disclosed information, and the possible involvement of sensitive information, and obtain your explicit consent.

(3) With the continuous development of our business, we may need to transfer your personal information due to mergers, acquisitions, asset transfers, etc. We will inform you of relevant circumstances (including but not limited to the name or name and contact information of the recipient), and continue to protect or require the recipient to continue to protect your personal information in accordance with legal requirements and no lower than the requirements of this privacy policy.(4) According to relevant laws, regulations, and national standards, we may share, transfer, or publicly disclose your personal information without obtaining your prior authorization in the following situations:

i.Directly related to national security and national defense security;

ii.Directly related to public safety, public health, and significant public interests;

iii.Directly related to criminal investigation, prosecution, trial, and judgment execution;

iv. Necessary for protecting the life, property, and other significant legal rights and interests of personal information subjects or other individuals, but it is difficult to obtain their consent;

v. Personal information that is self-disclosed publicly;

vi. Personal information collected from legal public disclosures, such as legal news reports, government information disclosure,

and other channels;

vii. Other situations as stipulated by laws and regulations.

IV. How We Protect Your Personal Information

4.1. We have implemented industry-standard security measures to protect the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to safeguard your personal information. For example, we use encryption technology (e.g., SSL) and anonymization techniques to ensure data confidentiality. We employ trusted protective mechanisms to prevent data from malicious attacks. We deploy access control mechanisms to ensure that only authorized personnel can access personal information. Additionally, we conduct security and privacy protection training to enhance employees' awareness of the importance of safeguarding personal information.

4.2. Please understand that due to technical limitations and potential malicious attacks, unforeseen and uncontrollable incidents may occur. The internet is not an entirely secure environment, so please use complex passwords to assist us in ensuring the security of your account.

4.3. In the event of a personal information security incident, we will activate emergency response plans as required by laws and regulations to prevent the event from spreading. We will promptly notify you of the incident via email, letter, phone call, push notification, or other reasonable and effective means. Additionally, we will report the handlingof personal information security incidents in accordance with regulatory requirements.

4.4. Handling of personal information of minors.

4.5. We enhance the security capabilities of software installed on your devices through continuous technological advancements to prevent the leakage of your personal information. For example, for secure transmission, we perform local encryption of certain information on your device. To prevent viruses, trojans, or other malicious programs, websites may gather information about the applications installed on your device or the running processes. We establish specialized management systems, processes, and organizations to ensure information security. We strictly limit the scope of personnel with access to information, requiring them to abide by confidentiality obligations and subjecting them to audits.

V. How We Protect the Personal Information of Minors

5.1. We attach great importance to the protection of personal information of minors and will protect such information in accordance with relevant international/national laws and regulations.

5.2. Any individual under the age of 18 will be considered a minor. According to relevant laws and regulations, if you are a minor aged 12 or older, we will obtain your or your guardian's consent before collecting your personal information. If you, your parents, or other guardians request corrections or deletions of the personal information of minors, we will take timely measures to do so, except as otherwise provided by law and administrative regulations.

5.3. If you are a child (hereinafter referred to as "Child") under the age of 12 (excluding 12), we will obtain consent from your parents or other guardians before collecting your personal information. In processing the personal information of children, we will follow the principles of legality, necessity, informed consent, clear purpose, security, and lawful utilization, in addition to abiding by the relevant laws and regulations, and strictly adhere to the storage, use, and disclosure of collected children's personal information. We will not retain such information beyond the necessary period for achieving the collection and use purposes, and we will delete the children's personal information after expiration.If you are the guardian of a child, you should carefully read this policy, the specific privacy protection guidelines for the product (if any), and the "Child Privacy Protection Statement" before explaining the child's completion of product or service registration and usage. You should decide whether to agree to this policy, the specific privacy protection guidelines for the product (if any), and the "Child Privacy Protection Statement" and assist the child in registering and using our provided products or services. If you have any questions or requests regarding the protection of personal information of children you supervise, please contact us using the contact information disclosed in Part Seven of the "Child Privacy Protection Statement." We will process and respond to your request in a reasonable time.

5.4. If you are a parent or guardian of a minor and have any questions, opinions, suggestions, complaints, or reporting needs regarding the matters described in this privacy policy, please provide feedback through the contact information stated in Article Eight of this privacy policy.

VI. Your Control Rights over Personal Information

In accordance with relevant laws, regulations, and supervisory requirements, we ensure that you have the following rights concerning your personal information:

6.1. Access, correction, and updating of your personal information

You have the right to access and correct or update your personal information through our official website, mobile app, or other channels, except as otherwise provided by law and regulations. You are responsible for updating your personal information promptly.

6.2. Deletion of your personal information

You can request the deletion of your personal information in the following circumstances:

(1) If our processing of personal information violates laws and regulations;

(2) If we collect and use your personal information without obtaining your consent;

(3) If our processing of personal information violates agreements with you;

(4) Other circumstances as stipulated by laws and administrative regulations.

6.3. Controlling personal information through account logout

Account cancellation: Contact customer service directly to cancel your account. After canceling the account, we will delete or anonymize the user's personal information.

6.4. You have the right to request an explanation of our personal information processing rules through the contact information stated in Article Seven of this privacy policy.

6.5. Responding to your requests

For security reasons, you may be required to provide a written request or other means to prove your identity. We may ask you to verify your identity before processing your request. Please understand that we may refuse certain requests that are groundless, require excessive technical means, pose risks to the legitimate rights and interests of others, or are impractical.Despite the above provisions, in accordance with legal requirements, we may not be able to respond to your request in the following circumstances:

(1) Involving national security or national defense;

(2) Relating to public security, public health, or significant public interests;

(3) Relating to criminal investigations, prosecution, trial, and judgment enforcement, etc.;

(4) There is sufficient evidence to prove that you have subjective malice or abuse of rights;

(5) Your request would cause serious harm to your or other individuals' or organizations' legitimate rights and interests;

(6) Involving our business secrets.

VII. How this Policy is Updated

In accordance with changes in relevant laws, regulations, and service operations, we will periodically revise this policy and related rules. Theupdated content will be announced through our official website, mobile app, and other channels, replacing the previous relevant content. Please regularly check for updates in announcements, prompts, agreements, rules, and other related content. You understand and acknowledge that if you disagree with the updated content, you should immediately cease using the corresponding services and log out of your account. We will stop collecting your relevant personal information. If you continue to use the services, it will be deemed that you accept the modified content.

Please read this privacy policy carefully before clicking "Agree" to ensure that you fully understand and comprehend the meaning and corresponding legal consequences, especially the content highlighted in bold. By clicking "Agree" and completing the registration process, you are deemed to accept this privacy policy. We will legally use and protect your personal information in accordance with relevant laws, regulations, and this policy

VIII. How to Contact Us

The security department is responsible for the protection of personal information. If you have any questions or suggestions regarding this privacy policy while using Litok, please contact us through the following

contact information: Email address: cs@litok.ai

To efficiently address your inquiries and provide timely feedback, we may require you to submit proof of identity, valid contact information, written requests, and relevant evidence. We will process your requests after verifying your identity. Generally, we will respond within fifteen working days.

If you are dissatisfied with our response, especially if you believe that our handling of personal information has caused harm and we cannot provide a satisfactory response or refuse to make improvements after your feedback, you may file a complaint with the relevant regulatory authorities.


Lita Digital Co., Ltd.

Contact Us

Contact Us

Customer Service|

service@litok.ai

Customer Service|

service@litok.ai

Litok

Litok

About Us

Features & Plans

FAQs

Start

About Us

Features & Plans

FAQs

Start

© 2023 Litok. All rights reserved.

© 2023 Litok. All rights reserved.

© 2023 Litok. All rights reserved.