SKYWALK App
Personal Information Protection Policy
Welcome to use Skywalk software (hereinafter referred to as "this software") and
related services. This software is provided by Shenzhen GYENNO Technology CO.,
LTD. (Hereinafter referred to as "GYENNO Science" or "we"). We respect and
protect the personal information of all users who use this software. The purpose of
this policy is to help you fully understand what personal information we collect
about you, why we collect it and how we use it, and to let you know what rights
you have.
Please carefully read and confirm your full understanding of this policy before
registering and using this software. If you use this software, it means that you have
read all the terms of this policy and agree that we collect, use and protect your
personal information in accordance with this policy. If you disagree with some or all
of the contents of this policy, or have any questions about the contents of this policy,
you have the right to immediately stop using the software and contact us.
The policy has highlighted the clauses that have or may have a significant
relationship with your rights and interests, the personal sensitive information we
may collect, and the clauses that we have or may have exemption or limitation of
liability in bold / underline and other obvious ways. Please read and pay
attention to them.
We do not provide services to minors.
This policy is an integral part of the Skywalk App User Agreement. Matters not
covered in this policy are applicable to the Skywalk App User Agreement.
This policy will help you understand the following:
1. How we collect and process personal information
2. How we use caching and similar technologies
3. How we share, transfer and publicly disclose your personal information
4. How we protect your personal information
5. Your rights regarding your personal information
6. Storage and transfer of personal information
7. Personal information protection of minors
8. Changes and amendments to this policy
9. How to contact us
1. How we collect and process personal information
For the purpose of providing products and services related to the software, we
will collect your personal information. In this chapter, we will list the purpose,
method and scope of our collection of personal information.
1.1 Basic overview
You understand and agree that based on the function and service purpose of the
software, and in order to bring you a better product and service experience, we need
to collect some necessary personal information. In this chapter, we set out to you the
purpose, method and scope of our collection of personal information. When we want
to use the information for other purposes not specified in this policy, we will ask your
consent again. We will collect and use your personal information only for a specific
purpose, in the event of the purpose of collection and use your personal information
beyond the scope of purposes, we will notify you and ask for yourconsent.
1.2 Business functions and collection usage scenarios
1.2.1 Registration / login
When you register this software, you need to register with your mobile phone
number and verification code; After successful registration, you can log in through
one of the two ways: mobile phone number plus verification code, ormobile phone
number plus your personal password. We will collect your mobile phone number
and your password (if applicable). With the product iteration, we may provide you
with more registration and login methods.
If you do not register or log in, you cannot use any function of the software.
1.2.2 Personal data
After you register and log in to the software, you can edit your personal data so
that we can provide you with more accurate services. We will collect your active
uploaded avatar, your real name, gender, age, city, height, weight and course of
disease. In the process of uploading your avatar, we need to obtain your permission to
take photos, otherwise you will not be able to upload your avatar. You do not edit your
personal data, we will not collect the above information, nor will it affect your use of
the functions of this software.
1.2.3 Device binding
You can use this software to bind your terminal device and view the real-time
data uploaded by the device. We will collect your device type, device ID, mobile
phone number and device usage record. You can refuse to bind any device. If you
refuse to bind, you may not be able to view the device usage status and the
information collected by the device, but it will not affect the normal use of other
functions and services.
We need your consent to enable the permissions of mobile phone shooting,
reading albums, and authorized storage during the binding process.
1.2.4 Data display
After you bind the device, we will actively collect the gait data uploaded by the
device sensor and form a record.
1.2.5 Provide you with customer service
In order to help you and receive your feedback, complaints and reports, when you
contact us to apply for dispute resolution, when you contact us or apply for the
settlement of after-sales disputes and disputes during sale, to ensure the security of
your account and system, we need you to provide necessary personal information,
including the content and contact information you submit, and the service records,
communication and call records formed accordingly. We will send you our important
notices through the contact information you provide, such as information about
purchase and changes in terms, conditions and policies.
In order to give you a better experience and improve our services, on the premise
of complying with laws and regulations, we may invite you to participate in the
survey on our services through the contact information you provide. If you do not
want to receive our customer service survey, you can contact us at any time through
the contact information provided in this policy.
1.2.6 Safe operation
We are committed to providing you with safe and reliable products and user
environment, and ensuring the data security of users. Our technical means include:
1. Communication mechanism
1) The communication mechanism adopts two-way authentication HTTPS
protocol.
2) All APIs are authenticated.
3) For personal sensitive information such as passwords and ID cards,
password salting and irreversible algorithm encryption are adopted before
transmission.
2. Permission acquisition
The software adopts the real-time authorization mechanism. When users use
relevant functions, they will be prompted to authorize corresponding
permissions to prevent the abuse of permissions. In addition, we will also
explain the purpose of the currently applied permission to the user. The user
has the right to agree or refuse to authorize the permission. If you agree, the
user can use this function. If you disagree, the user can also use other
functions in the software except this function.
1.3 Personal information that is exempted from user consent of collection and
usage by the law
Please understand that we do not need your authorization and consent to collect
and use your personal information under the following circumstances:
1. Required by the administrative and judicial authorities of a country / region.
2. For protecting others or your life, property and other significant legal rights
and interests but it is difficult to get the consent from the person.
3. Your personal information collected is disclosed by you from other channels.
4. Necessary for signing or performing the contract at your request.
5. Necessary for maintaining the safe and stable operation of the software and
services, such as finding and disposing faults of the software and services.
6. Other circumstances stipulated by laws and regulations.
2. How we use caching and similar technologies
2.1 What is cache?
In-app cache refers to some necessary information related to the application that
is stored in the user's storage space.
2.2 What we cache
We will cache some user information necessary for users to use this app, including
user account, user code, user nickname, access token, etc. Caching user information is
to ensure that users can access the data provided by the server quickly and safely
through the network.
We will not use the cached information for any purpose other than the purpose
described in this policy. When you log out, the user information cached in the mobile
device will be cleared.
2.3 How to clear cache
This software has the function of clearing cache. You can clear cache records at
any time in ‘Mine - Clear Cache’.
3. How we share, transfer and publicly disclose your personal
information
We strictly limit the sharing, transfer and disclosure of your personal information
in accordance with laws and regulations.
3.1 Sharing
We will not share your personal information with any company, organization or
individual, except in the following cases:
1. Sharing with explicit consent: after obtaining your explicit consent or
authorization, we will share you and / or your personal information with other
parties.
2. We may share your personal information in accordance with laws and
regulations or the mandatory requirements of the competent government
departments.
3. Share with our related products and platforms, including PD Care, PD Care
Dr. and Ruiyun platform. However, this sharing only happens when you to
use the same account of this software to register and bind the corresponding
app, and agree to the user agreement and privacy policy / personal
information protection policy of the corresponding app; Otherwise, this
sharing will not happen.
4. We promise and ensure that the products and platforms sharing information
are actually controlled by GYENNO Science network and has legitimate
rights and interests.
5. Share with our affiliated companies: your personal information may be shared
with the affiliated companies of GYENNO Science. We will only share
necessary personal information and are bound by the purposes stated in this
policy. If the affiliated company wants to change the purpose of processing
personal information, it will ask for your authorization and consent again.
6. Share with authorized partners: to the extent permitted by laws and
regulations and only for the purpose stated in this policy, some of our services
will be provided by authorized partners.
a) We will conduct strict security inspection on the application program
interface (API) and software development kit (SDK) for authorized
partners to obtain relevant information, and apply strict data protection
agreements with authorized partners to ensure them to process personal
information in accordance with our entrustment purpose, service
description, this policy and any other relevant confidentiality and security
measures.
b) The purpose, method and scope of personal information collected and used
by the third-party SDK tools involved in this software are listed in the
following table:
Third
party SDK
name
Collection
subject
Purpose and method of
collecting information
Collection scope
Third party privacy policy link
Umeng
SDK
umeng
1. Provide statistical
analysis service based
on equipment and
application
performance detection
service.
2. Provide regional
data report based on IP.
Device
information and
rough location,
IMEI / MAC /
Android ID /
IDFA / openudid /
guid / SIM card
IMSI / IP
https://www.umeng.com/page/policy
3.2 Assignment
We will not transfer your personal information to any company, organization or
individual, except for the following circumstances:
1. Transfer with explicit consent: after obtaining your explicit consent or
authorization, we will transfer you and / or your personal information to other
parties.
2. In case of merger, acquisition or bankruptcy liquidation, if personal
information transfer is involved, we will require the new company and
organization holding your personal information to continue to be bound by
this policy, and at the same time, we will require the company and
organization to ask you for authorization and consent again.
3.3 Public disclosure
We will only publicly disclose your personal information under the following
circumstances:
1. After obtaining your explicit consent.
2. Disclosure based on Law: we may publicly disclose your personal
information when required by law, legal procedures, litigation or government
authorities.
4. How we protect your personal information
We have taken reasonable and feasible measures and technical measures to
protect the information collected related to the service. However, please note that
although we have taken reasonable measures to protect your information, no software,
website, Internet transmission, computer system or wireless connection is absolutely
safe.
We have used industry standard security measures to protect your personal
information from unauthorized access, public disclosure, use, modification, damage
or loss. We will take all reasonable and feasible measures to protect your personal
information.
5. Your right to personal information
We respect your right to personal information. The following are your legal
rights:
1. Right of access: you can view your personal information generated in using
our products or services in order to exercise data access.
2. Right of modification: when you find that there are errors in your personal
information processed by us, you have the right to make corrections by
yourself or ask us to make corrections.
3. Right of deletion: you can ask us to delete your personal information at any
time; After you cancel your account, we will also delete your personal
information; In respondence to your deletion request, we will also notify the
entity that obtained your personal information from us and ask it to delete it in
time. After deleting the information, we may not delete the corresponding
information in the backup system immediately, but we will delete the
information when the backup system is updated.
4. Right of withdrawal: You may withdraw your authorization or change the
scope of your authorization consent; Processing of your personal information
based on your previous authorization will not be affected.
5. Right of data portability: You have the right to ask us to provide you with
your personal information collected by the software and the data uploaded by
the bound device, and transmit it to anyone without our restrictions; If you
want to get a copy of your personal information data, please send an email to
dst@gyenno.com. Contact us and we will verify your identity and send you
the data after receiving your email.
6. Right of objection: you have the right to raise an objection to the illegality of
our behavior at any time. We will respond to your objection and revise the
certificate immediately after confirming the illegality.
To ensure security, when you exercise the above rights, we need to verify your
account before processing your request.
6. Storage and transfer of personal information
We will transmit and store the collected personal information on servers in the
People's Republic of China of China. We will not store and transmit your information
to other countries without your consent.
During information transfer and storage, we will take measures not lower than the
applicable laws of the People's Republic of China and GDPR requirements for your
information to ensure your information security, and strictly abide by the provisions
of this policy.
7. Personal information protection of minors
Please note that we do not provide services directly to minors and do not use
minor’s personal information for marketing purposes. If you are a minor, we ask you
to stop using the software immediately. If you really need to use it, please contact us
according to the contact information in the user agreement.
Any act of registering, logging in and using the software will default to the
operation of adults with full civil capacity.
8. Changes and amendments to this policy
We may revise or update this Privacy Policy from time to time. Without your
explicit consent, we will not limit your rights under this policy.
After the policy is updated, we will show you the changed policy in the form of
push notification and pop-up window when you log in and update the version, so that
you can know the latest version of this policy in time (you can also view the latest
version of the policy at any time through ‘Mine - About Us - Information Protection
Policy’). If you continue to use our services, you agree to accept the content of the
revised policy, but if the updated content needs to obtain personal sensitive
information beyond the collection scope and purpose of the policy, we still ask for
your consent in a significant way again.
The Chinese original of this Policy must prevail over any translation thereof.
9. How to contact us
If you have any questions or concerns about this policy or our practices, please
contact us through:
Address: 801-804 & 904, Building B2, Phase II, Creative City, Xian Dong Road,
Xili Street, Nanshan District, Shenzhen, 518055, Guangdong, P.R. China
Tel: [0086-4008033037]
Data Protection Officer: [dst@gyenno.com]
(End of full text)