Leefine APP Privacy Policy
Leefine Privacy Policy
Leefine ("we." "our, or "us") understand the importance of your personal information, we will protect it in accordance with laws and regulations. We have made this Privacy policy ("this Policy”)and specifically advise that read and understand this Policy carefully before you use Leefine and related services(uour services”)to make appropriate choices.
This policy will help you understand:
We collect and use your information in accordance with the policy, However, we will not collect it in a package as a way to force bundles even if you agree this Policy.
When you use the services or turn on features, we collect and use the necessary information for the functionality and services. You may refuse to provide and it do not affect other features or services unless necessary to achieve basic business functions or as required by law and regulation. We will itemize what is necessary in the Policy.
If your account is not signed in, We will guarantee the basic function of information push by using the device's corresponding identifier information.If you log in to your account, we will implement information push based on account information.
Contacts, precise geographic locations, cameras, microphones, photo album permissions are not turned on by default, only when you are authorized to use them for specific features or services, or you can withdraw authorization. In particular, we do not collect your information when the relevant features or services are not required, even if we have obtained these sensitive permissions with your authorization.
This Policy applies to your access to and use of our services through Leefine applications, Leefine soft ware development Kit (SDK) and application Programming Interface (API) for third-party websites and applications.
The following will help you learn more about how we collect, use. store, transfer, share, transfer (if applicable) and protect personal information.and understand how to query. access, delete, correct, and withdraw authorized personal information.Among them.the important content of the terms about your personal information interests we have been prompted in bold form, please pay particular attention to this part.
- How we collect and use personal information
- Additional information for permission to use
- Additional information on the use of Third-party (SDK / API ) access rights
- How we share, transfer, and publicly disclose personal information
- How we protect the security of personal information
- Terms of use for minors
- Changes and notifications of the Policy
- Permission use
- Contact us
1. How we collect and use personal information
We will collect your Primary Account information via leefine.ga when you use the services
- When you Sign up and log in to our services, to create an account, you must provide the relevant network identification information (avatar, nickname, password). You can choose to fill in your gender. birthday, region. and personal profile to complete your information.At the time,we also store your user account preferences and settings.
- You may also use a third-party account to log in and use Leefine and you will authorize us to obtain public information (avatars, nicknames and other information that you authorize) registered on the third-party platform for binding to Leefine account so that you can log in directly and use our services.
When you use a feature or service for authentication (Parent or Counselor), according to relevant laws and verification. You may need to provide your real identity information(Phone number) or relevant certificate (psychologist Qualification) to complete the verification. This information is sensitive to personal information that you may refuse to provide. but you may not be able to access the services without affecting the normal use of other features and services.
1.2 Information browsing
a.Actions you take when using the Services: click, follow,share
b.Information you provide on your initiative: feedback
c.Geographical information: Sensor information such as GPS information, WI-FI access points, Bluetooth and base stations
d . The above information we collect and use is De-identified, and data analysis corresponds only to specific, unrelated codes that do not directly relate to your identity and is not associated with your real identity.
1.3 Function and Interaction
1.3. 1 Function
When you use features related to uploading images, WeChat, and video chat, we will ask you to authorize your camera, photo, microphone. If you refuse, you will not be able to use this feature, but it will not affect the normal use of other features.
1.3. 2 Interactive Communication
When you add contacts by using the Phone Book, Receipt Address feature, we will request contacts permission and encrypt the information in the address book with an encryption algorithm. Contacts information is sensitive personal information, if you refuse to provide,it will only prevent you from using the Quick Add feature, use of other features on Leefine would not affect.
1.4 Safe Operation
1.4.1 Security Features
We are committed to providing you a safe, trusted product and environment,and providing quality and reliable service,and it is our core goal. Information collected to achieve security features is essential.
1.4.2 Device Information and Log Information
a. To keep your software and services running securely, we collect your hardware model, operating system version number, international mobile device identification number, unique device identifier, network device hardware address, IP address, WI-FI access point, base station, software version number, network access method, type, status, network quality data, operation, Use, service logs.
b. To prevent malicious programs and secure operations, we collect installed application information or process information that is running, the overall operation of the application, usage and frequency, application crashes, overall installation usage, performance data, application sources.
c. We may use your account information, device information, service log information, and information that our affiliates and partners may use to determine account security, authenticate, detect, and prevent security incidents when you are authorized or legally available to you.
1.5 Changes in the Purpose of Collecting and Using Personal Information
Please be aware that as our business grows, changes may be made to the functionality and services provided by us. In principle, when new features or services are relevant to the features or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. We collect and use your personal information in a situation where there is no direct or reasonable association with the original processing purpose, and we will inform you again and re-obtain your consent.
1.6 Exemption From Obtaining Consent To Collect and Use Personal Information
Please understand that in accordance with laws and regulations and relevant national standards,we collect and use your personal information without your authorization in the following cases :
a. Those Directly related to national security, national defense security;
b.Those Directly related to public safety, public health, and major public interests;
c.Those Directly related to criminal investigation, prosecution, trial and enforcement of sentences;
d.Those For the purpose of safeguarding the personal information subject or other personal life, property and other important legal rights and interests which is difficult to obtain an individual's consent;
e. Those The personal information we collect is that you disclose to the public by yourself;
f. Those Personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, etc.;
g. Those Necessary to enter or perform a contract according to your request.;
h. Those Necessary to maintain the safe and stable operation of the software and related services, such as the detection, disposal of software and related service failures;
i. Those Necessary for legal news reporting;
j. Those Academic research institutions need to carry out statistical research or academic research based on the public interest, and De-identifying the personal information contained in the results when the results of academic research or description are provided to the outside world;
k. Those Other situations as required by laws and regulations.
Please remind that if the information cannot be personally identified individually or in conjunction with other information, it does not belong to your personal information in the legal; When it can or we will be able to use data that cannot be linked to any particular personal information in conjunction with other personal information,It will be processed and protected as your personal information in accordance with this Policy during we combined these information.
2. Additional information for permission to use
This is a summary description of the permissions that might be used by Leefine related features.
2.1 Address Book Permissions
Features that use this permission: phone book, shipping address contact import function.
2.2 Call Permissions
Features that use this permission: call function.
2.3 location Permissions
Features that use this permission: map function, personal center profile settings function.
2.4 Camera Permissions
Features that use this permission: Scan QR code function, audio and video call function, personal center profile settings function, device user information settings function.
2.5 Album Permissions
Features that use this permission: Remote photo function, WeChat (send photos) function, Screen saver settings function,personal center profile settings function, device user information settings function.
2.6 Microphone Permissions
Features that use this permission: voice reminder function, WeChat function, video call function.
3 . Additional information on the use of third-party (SDK / API) access rights
In order to provide you a better experience, we would access high-quality third parties. And we will carefully evaluate the purpose of the use of shared information by related parties and third parties, conduct a comprehensive assessment of the security from them, and require them to comply with the Cooperative Legal Agreement. We will conduct strict security monitoring on software tool that partners obtain information,like software development kits (SDK), application program interfaces (API) , to protect data security. And sharing your personal information with our affiliates and third parties through your authorization and consent, unless the shared personal information is de-identified information, and the natural person subject who shared the third party cannot re-identify such information. If related parties and third parties use it beyond the scope of the original authorized consent, they need to re-obtain your consent.
3.1 Umeng+ Page statistics(SDK)
In order to provide you with one-click sharing service, our APP has integrated Umeng+ U-Share SDK , which will collect your device identifiable information (such as IMEI/android ID/IDFA, etc.) and public information of social account in order to share information with social account. For your information security, we have made data security confidentiality agreements with Umeng+, who will strictly abide by our data privacy and security requirements. We will not share your personal identifiable information unless authorized by you. For more information, please log in https://www.umeng.com/policy to learn privacy policy of Umeng+.
3.2 Google Map(SDK)
Permissions are required as follows:
Get location permissions
Read phone map
Change network status (e.g.whether you can access the network); Access to network;
Write external storage; device;
Obtain network status;
Obtain WI-FI status;
3.3Google log in(SDK)
Get Google avatar, use Google account to login APP
3.4 FaceBook log in (SDK)
Get Google avatar, use Google account to login APP
3.5 Push System (SDK)
Permissions are required as follows:
1.Access to network;
2. Write external storage devices ;
3.Obtain network status ;
4. Obtain WI-FI status ;
5. Read your phone's current status ;
6. Installation ;
7. Obtaining task information;
3.6 Video Call (SDK)
Permissions are required as follows:
1. Open camera device;
2. Change network status (e.g. whether you can access the network );
3. Modify sound settings;
4. Recording;
5. Access to network ;
6. Write external storage device;
7. Obtain network status ;
8. Obtain WI-FI status ;
9. Read your phone's current status;
10. Read external storage devices ;
11. Wake lock .
4. How we share,transfer,and publicly disclose personal information
4.1 Sharing
4 .1.1 sharing principles
a. agreement: Sharing your personal information with our affiliates and third parties through your authorization and consent, unless the shared personal information is De-identified information, and the natural person subject who shared the third party cannot re-identify such information. If they use information beyond the scope of the original authorized consent, they need to receive your consent again.
b. Principles of Safety and Prudence: We will carefully evaluate the purpose of the use of shared information by related parties and third parties, conduct a comprehensive assessment of the security from them, and require them to comply with the Cooperative Legal Agreement. We will also conduct strict security monitoring on software tool that partners obtain information,like software development kits (SDK), application program interfaces (API) to protect data security.
4 .1.2 Shared Information for Function or Service Implemented
a . Location services: When you use location related services, we share GPS information with our location service provider (AutoNavi) so that we can return location results to you. GPS information is sensitive personal information, if you refuse to provide, it only affect the location service, other functions still work.
4 .1.3 Shared Information for Security and Analytics
a. Use Safety: We take account and service security seriously. And we may share the necessary equipment, account and log information with our affiliates or service providers to protect your and other users' accounts and property from unlawful infringement of your legitimate rights and interests.
b. Analyzing Product Usage: To analyze the usage of our services and enhance the user experience, we may share statistical data on product usage (crash, flashback) that are difficult to personally identify combined with other information with related parties or third parties.
4 .1.4 Marketing and Promoting
When you participate in relevant marketing activities organized by us and our affiliates or third parties, you may be required to provide information such as your name, address, contact details, etc. This information is sensitive to personal information and if you refuse,it may affect your participation in related activities, but other features still work. Only with your consent will we share this information with a related party or third party to ensure that you receive a consistent experience in activities or to entrust a third party to redeem your reward in time.
4 .2 Transfer
a. We will not transfer your personal information to any other third party without your expressly consent.
b. As our business grows, we will be able to conduct mergers, acquisitions, asset transfers, and your personal information may be transferred. In the event of the above changes, we will continue to protect your personal information in accordance with laws and regulations and security standards not lower than those set in this Policy, otherwise we will require the recipient to re-obtain your authorization and consent.
4 .3 Disclosure
a. We will not disclose your information publicly unless we comply with national laws and regulations or receive your consent. If we do,we will use security measures that comply with industry standards.
b. We will disclose relevant account information when we announce penalties for illegal account and fraud.
4 .4 Exemption From Obtaining Consent To Share,Transfer, Publicly Disclose of Personal Information
Please understand that in the following cases, we can share, transfer and publicly disclose your personal information without your authorization in accordance with laws, regulations and national standards:
a.Those Directly related to national security, national defense security;
b.Those Directly related to public safety, public health, and major public interests;
c.Those Directly related to criminal investigation, prosecution, trial and enforcement of sentences;
d.Those For the purpose of safeguarding you or other personal life, property and other important legal rights and interests which is difficult to obtain an individual's consent;
e.Those Personal information that you disclose to the public;
f.Those Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
5.How we protect the security of personal information
a. We take the security of your personal information seriously and will strive to take reasonable security measures( both technical and administrative) to protect your personal information from improper use or unauthorized access, public disclosure, use, modification, damage, loss or disclosure of the personal information provided by you.
b. We will use encryption, anonymization and other reasonable and feasible means to protect your personal information with encryption technology no less than our industry peers, and use security mechanisms to protect your personal information from malicious attacks.
c. We will establish a professional security management system, data security processes to ensure the security of your personal information. We have a strict data usage and access system to ensure that only authorized personnel have access to your personal information and the data and technology are audited securely at the right time.
d. Despite the reasonable and effective measures described above and the standards required by the relevant legal requirements, please understand that it is impossible to ensure 100-percent-security of information at all times in the Internet industry, even if we do anything possible to strengthen security measures due to technical limitations and possible malicious means. Anyway,we will do our best to ensure the security of the personal information you provide to us.
e. You understand that the systems and communication networks you use to access our services may cause problems due to factors beyond our control. Therefore, we strongly recommend that you take positive measures to protect the security of your personal information, including but not limited to, using complex passwords, changing passwords periodically,not disclosing your account password and related personal information to others.
f. We develop contingency plans and will initiate it in the event of user information security incidents in an effort to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, We will promptly inform you of the basic circumstances and possible impact of the security incident, the actions we have taken or will take, the proposals that you can take precautions and reduce risk, and the remedies you may remedy. We will inform you about the incident in push notifications, text messages, and related forms in time. When it is difficult to notify one by one, we will take a reasonable and effective way to make announcements. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
g. Once you jump from our services to three parties for browsing or using other websites, services and content resources,we do not have the capacity or direct obligation to protect any personal information you submit on them,whether you log in, browse or use the software described above, or whether the website is based on links or guidance from Leefine.
h. The user information function in the APP only saves the user information you submit in the database of our server (domain name leefine), and is not used for any commercial operation
6.Terms of use for minors
a.If you are a minor under the age of 18, you should read and agree this Policy under the supervision and guidance of your parent or other guardian before using our services.
b. We protect the personal information of minors according to the relevant laws and regulations of the State and will collect, use, store, share, transfer or disclose the personal information of minors only permitted by law, as expressly consented by parents or other guardians or if necessary to protect them. If we find that personal information of a minor has been collected without prior confirmation of Parental consent, we will try to delete it as soon as possible.
c.If you are the guardian of a minor, and you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information
7. Changes and notifications of this Policy
a. To provide you better services, our services will be updated and changed from time to time, We will make timely amendments to this Policy, which are form part of this Policy and are equivalent to this Policy, and we will reserve your rights under this Policy in effect as currently in force without your express consent.
b. If we have updated, we will issue an updated version in Leefine before the updated terms take effect,provide you with additional notice (such as adding a statement to announcements, the front page of the Services or sending you a notification). We encourage you to review the Policy whenever you access or use our services or otherwise interact with us to stay informed about our information practices and the ways you can help protect your privacy.
8. Permission Use
Permission Name |
Permission description |
Use |
android.permission.INTERNET |
Link NetWork |
Network must have permission |
android.permission.VIBRATE |
vibrate |
video call.chat incoming hint |
android.permission.WRITE_EXTERNAL_STORAGE |
File read and save |
choose avatar picture and save APP crash file |
android.permission.ACCESS_NETWORK_STATE |
Network status monitoring and WiFi status and search |
Optimize network usage to avoid traffic overuse. |
android.permission.ACCESS_COARSE_LOCATION |
Location |
Google Maps display.When the watch is not bound, the watch is not uploaded, the historical position, and the security fence is set,The map moves to the user's location. |
android.permission.CAMERA |
Camera |
Used for camera scanning QR code, profile picture, photo, video call function acquisition |
android.permission.RECORD_AUDIO |
Record |
Used for recording and collection of micro chat and video call |
android.permission.WAKE_LOCK |
Screen Wake up |
Used to light up the screen video to electrolyze the lock |
android.permission.CALL_PHONE |
Call |
A telephony function for communicating with a device |
android.permission.MODIFY_AUDIO_SETTINGS |
volume control |
Used to control the volume of video calls |
android.permission.BLUETOOTH |
Bluetooth |
Bluetooth headset switching for video calling |
9. Contact Us
If you have complaints, suggestions, questions about personal information protection issues, you can follow Leefine Account (Log in APP—Setting--Feedback) and send the issue to customer service, we will promptly feedback your complaint and report after verifying your identity.