Tingyun SDK Privacy Policy
Tingyun SDK, from a user experience perspective, addresses and optimizes the "degraded user experience" and "user churn" issues caused by performance bottlenecks. It comprehensively evaluates and quantifies the actual usage of applications through multiple levels, including network analysis, user experience analysis, and anomaly analysis. Since its launch, the product has always been committed to "driving business with data," focusing on innovative IT management services from a user perspective. It provides end-to-end performance management solutions for the entire application chain for different industries, helping enterprises continuously optimize system performance and end-user experience, and enhancing brand favorability, user retention, and business conversion rates.
We deeply understand the importance of your personal information and will do our best to protect its security and reliability. We are committed to maintaining your trust in us and adhere to the following principles to protect your personal information: consistency of rights and responsibilities, clear purpose, choice and consent, minimum necessary use, security, subject participation, and transparency. **Please carefully read and confirm that you fully understand the contents of this Privacy Policy and accept all terms of service before using our products or services. **
This Privacy Policy will help you understand the following:
-
How we collect and use your personal information
-
How we share, transfer, and publicly disclose your personal information
-
How we protect your personal information
-
How you manage your personal information
-
Protection of minors' personal information
-
How your information is transferred across borders (if applicable)
-
Revisions to this Privacy Policy
-
How to contact us
I. How we collect and use your personal information
Personal information refers to various information recorded electronically or otherwise that can, alone or in combination with other information, identify a specific natural person or reflect the activities of a specific natural person. We will only collect and use your personal information for the following purposes as described in this Privacy Policy:
(I) For Better Application Experience Analysis
To better assist operations and development personnel in analyzing issues affecting user experience, such as crashes, lag, and network anomalies encountered by real users during App usage, we may collect the following information from you during your use of the mobile App:
| Client SDK | Personal Information Type | Purpose of Collection |
| Android SDK | Device Information: Device Model, Device Manufacturer, Operating System Name, Operating System Version, Disk Usage, Memory Usage, CPU Information (Model, Architecture, Usage Rate), Battery Level, Battery Temperature, Root Access, Network Traffic, OAID (Optional), Screen Resolution Application Information: Application Name, Application Package Name, Application Version, Application UI Orientation, Application Channel ID System and Network Information: User ID, Network Type, Network Connection Type, Carrier Name, Server IP Address | Get application performance data on terminal devices and perform statistical analysis |
| iOS SDK | Device Information: Device Model, Device Manufacturer, Operating System Name, Operating System Version, Disk Usage, Memory Usage, CPU Information (Architecture, Usage), Jailbroken Status, Network Traffic, Screen Resolution, Battery Level Application Information: Application Name, Application Package Name, Application Version, Application UI Orientation, Application Channel ID System and Network Information: User ID, Network Type, Network Connection Type, Carrier Name, Server IP Address | |
| Harmony SDK | 【Required Information】 Device Information: Operating System Name, Network Traffic Application Information: Application Name, Application Package Name, Application Version, Application UI Orientation System and Network Information: User ID, Network Type, Network Connection Type, Server IP Address 【Optional Information】 Device Model, Device Manufacturer, Operating System Version, Screen Resolution, Carrier Name | |
| WEB SDK | Device Information: Browser, Operating System, Screen Resolution, User Agent, Network Traffic Application Information: Application Version, Application Package Name System and Network Information: User ID, IP Address, LocalStorage, Session Data, Carrier Information | |
| Mini Program SDK | Device Information: Device Brand, Device Model, Operating System, Screen Resolution Application Information: Application Version, Application Package Name, WeChat Version, WeChat SDK Version System and Network Information: User ID, IP Address, Storage, Session Data, Carrier Information |
To achieve the above functionality, the Tingyun SDK requires the end user to open the integrated SDK app and authorize the collection of their personal information before requesting the necessary permissions.
Please note that individual device information, location information, and log information cannot identify a specific natural person. If we combine this type of non-personal information with other information to identify a specific natural person, or combine it with personal information, then during the combination period, this non-personal information will be treated as personal information. Unless we obtain your authorization or otherwise stipulated by laws and regulations, we will anonymize and de-identify this type of personal information.
(II) Explanation of Obtaining Usage Permissions
| Android Application Permission List | |||
|---|---|---|---|
| Permission | Optional | Purpose | When to Request |
| android.permission.INTERNET | Required | Used for SDK performance data reporting and data analysis | During SDK initialization |
| android.permission.ACCESS_NETWORK_STATE | Optional | Used to retrieve the current device's network and Wi-Fi status, such as 2G, 3G, 4G, Wi-Fi. Recommended to add | During SDK initialization |
| android.permission.READ_PHONE_STATE | Optional | Used to retrieve the network status of Android 10 devices with targentVersion 29 and above | During SDK initialization |
| android.permission.SYSTEM_ALERT_WINDOW | Optional | Used when using the "Visual Operation Naming Function" | When SDK visualization is enabled |
| android.permission.SYSTEM_OVERLAY_WINDOW | Optional | Used for using "Visual Operation Naming Function" | When SDK Visual Function is Enabled |
| android.permission.ACCESS_COARSE_LOCATION | Optional | Used to obtain base station information of the current mobile network connection | When SDK business function is enabled |
| iOS Application Permission List | |||
| Permission | Optional | Purpose | When to Request |
| Network Access Permission | Required | Used for SDK to report performance data and perform data analysis | SDK Initialization |
| Local Network Access Permissions | Optional | Used for SDK MTR Network Probe Tasks | When SDK MTR Functionality is Enabled |
| Harmony Client Application Permission List | |||
| Permissions | Optional | Purpose | When to Request |
| ohos.permission.INTERNET | Required | SDK Sending Data. Without SDK configuration, the application cannot start. | SDK initialization |
| ohos.permission.GET_NETWORK_INFO | Optional | Get network connection information. After configuration, it can obtain network type and connection method information. | When enabling SDK business functions |
| ohos.permission.STORE_PERSISTENT_DATA | Optional | Storage device ID. After configuration, the SDK can obtain the device ID more accurately. | When enabling SDK business functions |
(III) Storage Period
The information we collect is stored for 14 days to assist developers in analyzing application performance and troubleshooting. The collected information will be deleted after the expiration period.
(IV) Other Uses
We may conduct de-identified research, statistical analysis, and prediction on the collected information to improve the performance and user experience of our mobile app and provide service support for rapid application iteration.
(V) Exceptions
When we intend to use information for other purposes not specified in this Privacy Policy, or to use information collected for a specific purpose for other purposes, we will seek your consent in advance. However, to the extent permitted by law, we may collect or use your personal information without your authorization and consent in the following circumstances:
(1) As required by national laws and regulations;
(2) As required by the legal procedures of law enforcement agencies such as public security organs, procuratorates, and courts;
(3) As required by government departments or higher-level regulatory authorities;
(4) Other purposes reasonably necessary to safeguard the public interest and protect the legitimate rights and interests of our company, our users, or our employees.
II. How We Share, Transfer, and Publicly Disclose Your Personal Information
(I) Sharing
We may share your personal information with external parties in accordance with laws and regulations or mandatory requirements of government authorities. In addition, we will not unilaterally share your personal information with any company, organization, or individual other than our partners and affiliates.
(II) Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
-
Transfer with explicit consent: We will transfer your personal information to other parties after obtaining your explicit consent;
-
To meet the requirements of laws and regulations, legal procedures, or mandatory government requirements or judicial rulings;
-
In the event of a merger, division, sale, acquisition, or bankruptcy liquidation involving us or our affiliates, if your personal information is transferred as part of such a situation, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy; otherwise, we will require the company or organization to obtain your authorization and consent again.
(III) Public Disclosure
We will only publicly disclose your personal information in the following circumstances:
-
With your explicit consent;
-
Disclosure based on law: We may publicly disclose your personal information when required by law, legal process, litigation, or mandatory requirements of government authorities.
(IV) Exceptions
Sharing, transferring, or publicly disclosing your personal information does not require your prior authorization or consent in the following circumstances:
-
Directly related to national security or defense security;
-
Directly related to public safety, public health, or major public interests;
-
Directly related to criminal investigation, prosecution, trial, and execution of judgments;
-
For the purpose of protecting your or other individuals' life, property, or other major legitimate rights and interests, but obtaining the individual's consent is difficult;
-
Personal information that you have voluntarily disclosed to the public;
-
Personal information collected from legally publicly disclosed information, such as legitimate news reports or government information disclosure channels.
-
Necessary for signing and performing contracts at the request of the data subject;
-
Necessary for maintaining the safe and stable operation of the products or services provided, such as detecting and handling product or service malfunctions;
-
Other circumstances stipulated by laws and regulations.
According to legal provisions, sharing or transferring de-identified personal information, and ensuring that the data recipient cannot restore and re-identify the data subject, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require further notification to you or your consent.
III. How We Protect Your Personal Information
(I) We have used industry-standard security measures to protect the personal information you provide, preventing unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your personal information. For example, we ensure that vulnerabilities that could lead to information leaks are patched promptly; we take necessary measures to prevent computer viruses, network attacks, and network intrusions; data exchanged between your browser and the "Service" is protected by SSL encryption; we also provide HTTPS secure browsing on our website; we use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent malicious attacks on data; we deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(II) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes described in this Privacy Policy, unless a longer retention period is required or permitted by law.
(III) The Internet is not an absolutely secure environment, and email, instant messaging, and other forms of communication with other users are not encrypted. We strongly recommend that you do not send personal information through these methods. Please use a complex password to help us ensure the security of your account.
(IV) In the unfortunate event of a personal information security incident, we will, in accordance with legal requirements, promptly inform you of: the basic situation and potential impact of the security incident, the measures we have taken or will take, suggestions for you to independently prevent and mitigate risks, and remedial measures for you. We will promptly inform you of the relevant circumstances of the incident via email, letter, telephone, push notification, etc. When it is difficult to notify each individual data subject, we will take reasonable and effective measures to issue a public announcement. At the same time, we will also proactively report the handling of personal information security incidents to regulatory authorities as required.
IV. Your Management of Personal Information
-
According to the applicable laws and regulations of your country or region, you may request access to, correction of, or deletion of your personal information held by us.
-
You may change the scope of your authorization or withdraw your authorization. When the scope of authorization is changed or authorization is withdrawn, we will be unable to continue providing you with the services corresponding to the changed or withdrawn authorization, nor will we process your corresponding information. Generally, if you need to access, correct, delete, or terminate the authorization of some or all information, you should first contact the controller of the software (App) that uses and integrates the Tingyun SDK service, and request to exercise your data subject rights. Once the App controller verifies your identity and agrees to your request, the App controller will send us a request to access, correct, delete, or withdraw authorization. We will complete the corresponding operation and provide feedback within one week of receiving such a request.
V. Protection of Minors' Personal Information
-
We attach great importance to the protection of minors' personal information. If you are a minor under the age of 18, you should obtain your guardian's consent before using our products or services. We protect minors' personal information in accordance with relevant national laws and regulations.
-
We will not proactively collect personal information from minors directly. For situations where we collect minors' personal information with the consent of their guardians, we will only use, share, transfer, or disclose this information as permitted by law, with the guardian's consent, or when necessary to protect the minor.
VI. How Your Personal Information is Transferred Globally
In principle, personal information collected and generated within the People's Republic of China will be stored within the People's Republic of China.
VII. How This Privacy Policy is Updated
Our Privacy Policy may be updated or modified from time to time to adapt to legal, technological, or business developments. If such changes result in a material reduction of your rights under this Privacy Policy, we will post a notice on the page and publish any changes to this Privacy Policy before the changes take effect. For significant changes, we will also provide more prominent notification (including, for some services, sending a notification via email explaining the specific changes to the Privacy Policy). Significant changes referred to in this Privacy Policy include, but are not limited to:
-
Significant changes to our service model, such as the purpose of processing personal information or the types of personal information processed;
-
Significant changes to our ownership structure, organizational structure, etc. Such changes may occur due to:
-
Changes in ownership resulting from business adjustments, bankruptcy, mergers, or acquisitions;
-
Changes in the primary recipients of shared, transferred, or publicly disclosed personal information;
-
Significant changes in your rights regarding personal information processing and how to exercise them;
-
Changes in the department responsible for personal information security, contact information, and complaint channels;
-
Changes in the personal information security impact assessment report indicating a high risk.
If you do not agree to these changes, you may stop using our products and services; if you continue to use our products or services, it means you agree to be bound by this revised Privacy Policy.
VIII. How to Contact Us
If you have any questions, comments, suggestions, or complaints regarding this Privacy Policy, please contact our customer service hotline at 400-898-9580. Please read this Privacy Policy carefully to ensure you fully understand its contents and the corresponding legal consequences.
To ensure we efficiently handle your issues and provide timely feedback, you will need to submit proof of identity, valid contact information, a written request, and relevant evidence. We will process your request after verifying your identity and will maintain your personal information in accordance with relevant laws and regulations and this Privacy Policy.