Policy & Terms
Policy & Terms
The current location:Home > Policy & Terms > Privacy Policy
Privacy Policy

Welcome to use the "Kaadas" series of products and services provided by Shenzhen Kaadas Intelligent Technology Co., Ltd.. ("us" or "Kaadas").
 
This privacy policy sets out how we process, collect, use and disclose your personal information when you visit or use this platform.
 
This privacy policy constitutes a legally binding agreement between you and us. We hereby remind you to read carefully and fully understand the terms of this agreement, especially the exemption and mitigation clauses involved, and the restriction on your rights Terms, dispute resolution and law application, etc. Please read carefully and choose to accept or not accept this agreement. If you do not agree with this privacy policy, please stop accessing or using this platform.
 
If you are using this platform with a corporate account, you understand and confirm that in order to make it easier for you to use this platform, your employer has provided us with certain personal information related to you, including your account name, corporate email, and work Phone number (if available), work location information, and your supervisor. According to your employer's statement and guarantee, your employer has obtained your explicit authorization in advance and has fully informed you of the purpose, scope, and method of collecting your personal information before providing us with your personal information. If you are unable to confirm the above content, we recommend that you immediately stop accessing or using this platform, and confirm the foregoing with your employer. At the same time, you can also contact us through the contact information provided in this privacy policy, and we will cooperate with you in handling related matters within our capabilities.
 
The address book, geographic location, camera, microphone, and album permissions will not be turned on by default, and only after your express authorization can they be used for specific functions or services, and you can also withdraw authorization. In particular, we need to point out that even if we have obtained these sensitive permissions with your authorization, we will not collect this information when the relevant functions or services are not needed.
 
Before you read the following carefully to understand how we handle your personal information and our actual operating methods, we first briefly inform you of the basic structure of this privacy policy. You can click on the corresponding title to directly view the content you care about.

1. Basic definition
2. Personal information we collect on this platform
3. How we use your personal information
4. How we use cookies and similar technologies
5. How do we share, transfer and publicly disclose your personal information
6. Where do we store your personal information
7. How do we protect the security of your personal information
8. Your rights
9. Changes
10. Contact
11. Protection of children's personal information
12. Other

1. Basic definition

"Personal information" refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.
 
"Personal sensitive information" refers to personal information that, once leaked, illegally provided or misused, may endanger personal and property safety, and easily lead to personal reputation, physical and mental health damage, or discriminatory treatment, including ID number, personal biometric information, communication Records and contents, property information, whereabouts, health and physiological information, transaction information, etc.
 
"Employer" refers to an organization that has registered, logged in, and used the platform and obtained management authority, including but not limited to legal persons, government agencies, other organizations, partnerships or individual business owners, etc.; employers can register businesses for their members by obtaining personal authorization Account.
 
"Corporate account" refers to an account that is invited by an employer and obtained its authorization to use this platform as a member of the employer.
 
"Affiliated company" refers to an entity controlled by Kaadas, an entity that controls Kaadas, and an entity that is under common control of the same entity with Kaadas; here "control" means that an entity controls the main business activities of another entity Or activity power. The formation of this power can be based on equity, voting rights, and other relationships that are generally considered to be dominant or significant.
 
"Not recognized" refers to the process of technically processing personal information to make it impossible to identify the subject of personal information without resorting to additional information.
 
"Anonymize" refers to the process of technical processing of personal information so that the subject of personal information cannot be identified and the processed information cannot be restored.
 
2. Personal information we collect on this platform

When you use the services of this platform, we may collect the following types of personal information:
 
1. Basic personal information: name, profile picture, country, city, phone number, email address;
 
2. Personal work information: organization name or company, department, position;
 
3. Network identification information: account, IP address;
 
4. Personal communication information: messages uploaded, published, submitted or sent, chats, files, calendar information;
 
5. Contact information: mobile phone address book, friend list, group list.
 
Please note that some of the information types listed above may be used alone, such as operation log information that cannot identify specific natural persons. If we combine this type of non-personal information with other information to identify the identity of a specific natural person, or combine it with personal information, during the combined use period, this type of non-personal information may be treated as personal information. Unless otherwise provided by your authorization or laws and regulations, we will anonymize and not Unrecognized such personal information.
 
3. How we use your personal information

The basic business functions of the platform need to rely on some information to operate normally and safely, so you need to provide us or allow us to collect the following information.

1. Authentication function
 
When you use this platform, you need to provide your mobile phone number and/or email address. The above information is necessary to use the platform. If you do not provide such information, you will not be able to use the platform normally. After you log in to your account, you can also choose whether to upload an avatar to enhance your personalized display. But if you only need to browse and search for the introduction of Kaadas products, functions and services displayed on the official website of this platform, you do not need to register an account and provide the above information.
 
2. Safety monitoring
 
In order to improve the security of your use of this platform, protect the personal and property safety of you or other users or the public from infringement, and better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusion, Accurately identify violations of laws and regulations. When you use this platform, we will automatically collect your IP address, device unique identifier, hardware model and settings, operating system and application functions (such as MAC address), and your Detailed usage of our services, such as browsing history, time zone, region and language settings, server logs (including access date and time), application crash information to comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents , And take necessary recording, auditing, analysis, and disposal measures in accordance with the law.
 
4. How we use cookies and similar technologies

We use Cookies and other similar technologies (such as web beacons, Flash cookies, etc.) (referred to as "Cookies") to enhance your experience of using this platform. When you use the services of this platform, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information about your visit and use of this product.
 
Most web browsers automatically accept Cookies. You can decide whether to accept cookies or not through settings. You understand and agree that we may store absolutely necessary cookies that are required for the operation of this platform, including cookies that allow you to log in to the secure area of this platform. Cookies we store will expire after you terminate your website session or 15 days. The aforementioned behavior of storing absolutely necessary cookies is an absolutely necessary condition for Ben ping to provide basic service content. If you do not agree with the relevant authorization, you cannot use any service on this platform.

5. How do we share, transfer and publicly disclose your personal information

1. Sharing of personal information
 
(1) We will not share or transfer your personal information to third parties unless you have obtained your prior authorization or consent, or the personal information shared or transferred is information that has been Unrecognized, and the third party cannot re-identify such information The subject of personal information.
 
(2) To share your personal information, we will follow the following principles:
 
Authorization and consent principle: Without your consent, we will not share your personal information, unless the shared personal information is Unrecognized information, and the shared third party cannot re-identify the natural person subject of such information. If the third party uses the information for a purpose beyond the scope of the original authorization and consent, they need to obtain your consent again.
 
The principle of legality and minimum necessity: the shared data must have a legitimate and legitimate purpose, and the shared data is limited to the extent necessary to achieve the purpose.
 
Security and prudence principle: We will carefully evaluate the purpose of third parties using shared information, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with cooperative legal agreements. We will conduct strict security monitoring on the software tool development kit (SDK) and application program interface (API) used by the partners to obtain information to protect data security.
 
(3) Realize sharing information of functions or services
 
If you choose to use the services provided by third-party service providers on this platform (including applications in the Kaadas App Store), the third-party service providers may share some of your information with us. You can check the privacy policies of third-party services to understand the content of data that may be shared with us.
 
a. If you are an employee of an enterprise user, when the enterprise user administrator of your company chooses to open, manage and use third-party products or services through this platform, you will agree to our provision of you to the third-party application service provider Personal basic information (account, name, avatar, corporate phone number, corporate email, departmental organization structure) and basic permissions of the user, otherwise you cannot use third-party application services. Enterprise user administrators need to read and fully understand and abide by the product features and privacy protection policies of third-party services when they subscribe to use third-party application services. If you, as an individual user, choose to open, manage and use a third-party product or service through this platform, you agree that we will provide the third-party application service provider with your personal information (account, name, avatar, corporate phone number, corporate Email, departmental organization structure) and basic permissions, otherwise you cannot use third-party application services. When you subscribe to use third-party application services, you must read and fully understand and abide by the third-party service’s product features and privacy protection policies.
 
b. Log in and bind products on this platform: With your consent, when you use Kaadas account to log in to third-party products or services (including applications in the Kaadas App Store), or combine your account with other With three-party account binding, we will share your basic information (name, profile picture) and other information authorized by you with the aforementioned products or services.
 
c. Location service provider (AutoNavi Map): We will transfer your Unrecognized location information to the location service provider (AutoNavi Map) to provide you with more accurate positioning in the calendar function.

d. Associated companies: We promise not to share your personal information with any associated companies under any unnecessary circumstances. Exceptionally necessary situations include: only sharing your information to provide the services you need, but in order to better provide you with related services, we will use more complete tools provided by affiliated companies based on the use of this platform The purpose of your personal information is to process your personal information. Specific tools include [Byte Cloud provided by ByteDance] and related [function plug-ins] to store, transmit, and process your personal information.
 
e. Other auxiliary processing program supporters: You understand and agree that in order to ensure the realization of the platform's related functions and the safe and stable operation of the application, we may access the software development kit (SDK) provided by a third party for related purposes. We will conduct strict security monitoring on the software tool development kit (SDK) used by our partners to obtain information to protect data security. The relevant third-party SDKs we access are listed in the catalog.
 
We will only share information necessary to achieve the purpose with third parties, and you understand and authorize our information sharing behavior in this case. If a third party really needs to use personal information beyond the aforementioned purposes for business needs, the third party will need to seek your consent again.
 
Before cooperating with a third party, the company will make commercially reasonable efforts to test the security capabilities of the third party, evaluate the legitimate and legal necessity of sharing relevant information with the third party, and sign a confidentiality agreement with the third party to conduct its inquiry. Technical monitoring, and use commercially reasonable efforts to urge third parties to comply with the confidentiality and security measures stipulated in laws, regulations and agreements when using user information.
 
2. Transfer of personal information
 
With the continuous development of our business, we may carry out mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will continue to protect or require the successor of personal information to continue to protect your personal information in accordance with laws and regulations and security standards not lower than this privacy policy, otherwise we will require the successor to re-acquire Your authorization agrees.
 
3. Public disclosure of personal information
 
We will not publicly disclose your information unless we obtain your consent. However, in accordance with laws, regulations, rules, other normative documents, mandatory administrative law enforcement or judicial requirements, when you must provide your personal information, we may report to administrative law enforcement or judicial authorities based on the required personal information type and disclosure method Disclose your personal information. When we receive a disclosure request, under the premise of complying with laws and regulations, we require it to produce corresponding legal documents. We only provide data obtained by law enforcement and judicial departments for specific investigation purposes and have legal powers. As permitted by laws and regulations, the documents we disclose are protected by encryption measures.

Please understand that in the following circumstances, in accordance with laws, regulations and national standards, we do not need your authorization to share, transfer, and publicly disclose your personal information:
 
(1) Directly related to national security and national defense security;
 
(2) It is directly related to public safety, public health, and major public interests;
 
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
 
(4) In order to protect your or other individuals’ major legal rights and interests, such as life and property, but it is difficult to obtain the consent of the person, except in situations expressly prohibited by laws and regulations;
 
(5) Your personal information disclosed to the public by yourself;
 
(6) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
 
According to laws and regulations, sharing and transferring personal information that has been Unrecognized, and ensuring that the data recipient cannot recover and re-identify the subject of personal information does not belong to the external sharing, transfer, and public disclosure of personal information. The processing will not be required to notify you and obtain your consent.
 
6. Where do we store your personal information

(1) Storage location:
 
In accordance with the provisions of laws and regulations, we store your personal information collected and generated in the course of domestic operations in the People's Republic of China. At present, we will not transfer the above-mentioned information overseas. If we transfer it overseas, we will follow relevant national regulations or seek your consent.
 
(2) Storage period:
 
During your use of this platform, we will continue to save your personal information, and the retention period will not exceed the period necessary to provide you with services. After you terminate the use of this platform or close the corresponding authorization, unless laws and regulations provide otherwise for the retention period of specific information, we will delete or anonymize your information. If we stop operating the services of this platform, we will delete or anonymize the personal information we hold in accordance with applicable laws within a reasonable period of time.
 
7. How do we protect the security of your personal information

(1) We attach great importance to the security of your personal information. At present, "Kaadas" has passed the national information security level protection (level three) evaluation and filing, and passed the internationally authoritative ISO 27001 information security management system certification. Established data security system specifications and implemented security technical measures to prevent unauthorized access and modification of your personal information, and to avoid data damage or loss. Our network service adopts encryption Robotics such as transport layer security protocol to ensure the safety of your data during network transmission.
 
(2) We adopt strict data processing authority control to prevent data from being used in violation of regulations; we adopt multiple data desensitization methods such as Unrecognized technologies such as coding and shielding to enhance the security of personal information in use; we adopt extensive industry applications The encryption Robotics encrypts and saves your personal information, and isolates it through data isolation Robotics. For example, we encrypt all messages stored on our servers and on your terminal device. We always implement these technical measures and organizational management methods, and may revise and improve them from time to time to improve the overall security of the system.
 
(3) Although the above reasonable and effective measures have been taken, and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious methods that may exist, in the Internet industry, even if you do your best to strengthen Security measures, it is impossible to always guarantee the security of information 100%, we will try our best to ensure the security of the personal information you provide to us. Please be aware and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing personal information such as your account password to others.

(4) In the event of an incident that endangers network security, we will take corresponding remedial measures in a timely manner in accordance with the network security incident emergency plan. If our physical facilities or technical protection measures are damaged, causing your personal information to be leaked, illegally provided or abused, causing damage to your legitimate rights and interests, we will assume corresponding responsibilities in strict accordance with the provisions of the law.
 
(5) After we learn that your personal information has unfortunately been leaked, illegally provided or misused, we will notify you in time in accordance with the requirements of laws and regulations within [10] days at the latest: Security The basic situation and possible impact of the incident, the disposal measures we have taken or will take, suggestions that you can independently prevent and reduce risks, and remedial measures for you. We will inform you of the incident-related situation by means of push notifications on the platform. When it is difficult to inform the personal information subjects one by one, we will adopt a reasonable and effective way to publish an announcement. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
 
8. Your rights

(1) How to access and correct your personal information
 
1. Access to personal information: access to avatar, name, work status, department, direct superior, email, mobile phone number. Enter [Personal Profile Picture in the upper left corner of "Kaadas"] to access personal information.
 
2. If you are an employee of an enterprise user, you can submit an application for correction of information to your employer and the enterprise user administrator will process it.
 
(2) Delete your information
 
You can delete some of your information by the methods listed in "(1) Access and Correction of Your Information" above.
 
In the following situations, you can request us to delete personal information:
 
1. If our handling of personal information violates laws and regulations;
 
2. If we collect and use your personal information without obtaining your explicit consent;
 
3. If our handling of personal information seriously violates our agreement with you;
 
4. If you no longer use our products or services, or you actively cancel your account;
 
5. If we no longer provide you with products or services forever.
 
If we decide to respond to your deletion request, we will also notify the subjects who obtained your personal information from us as much as possible at the same time and require them to delete them in time (unless laws and regulations provide otherwise, or these subjects have independently obtained your authorization) .
 
When you or we assist you in deleting relevant information, we may not be able to delete the corresponding information from the backup system immediately due to applicable laws and security technologies. We will safely store your personal information and isolate it from any further processing. Until the backup can be cleared or made anonymous.
 
9. Changes

In the event of any major changes to this privacy policy, we will make reasonable efforts to advertise it to all users, such as by posting notices on this platform; however, you should check this privacy policy regularly to review the changes. We will also update the "Update Date" and "Effective Date" at the top of this Privacy Policy. If you continue to access or use this platform after the update of this privacy policy, it shall be deemed that you accept the updated privacy policy. If you do not agree to the updated privacy policy, please stop accessing or using this platform.

10. Contact

Please send any questions, comments or requests related to this policy to export@kaadas.com. Under normal circumstances, we will reply within [15] days after receiving your relevant contact information and verifying your identity.
 
For your reasonable request, we do not charge a fee in principle, but for repeated requests that exceed a reasonable limit, we will charge a fee as appropriate. For information that is not directly related to your identity, unreasonable duplication of information, or excessive technical means (for example, the need to develop a new system or fundamentally change current practices), bring risks to the legitimate rights and interests of others, or unrealistic requests , We may refuse.
 
11. Protection of children's personal information

If you are a child under the age of 14, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using the services of this platform.
 
We protect children's personal information in accordance with relevant national laws and regulations, and will only collect, use, store, share, transfer or disclose children's personal information when permitted by law, parents or other guardians explicitly consent, or necessary to protect children; If we discover that children’s personal information has been collected without prior verifiable parental consent, we will try to delete the relevant information as soon as possible.
 
If you are the guardian of a child, when you have any questions about the personal information of the child you guard, please contact us through the contact information disclosed in this privacy policy.
 
12. Other

(1) This privacy policy only applies to situations where you use the platform services in mainland China (for the purpose of this clause only, excluding Hong Kong, Macau, and Taiwan). This privacy policy may exist in multiple languages. If the terms of each language version are inconsistent or conflicted, the Chinese version shall prevail.
 
(2) The headings in this privacy policy are provided for convenience and reading only, and do not affect the meaning or interpretation of any provisions in this privacy policy.

Address

11F-14F, Building B2, Phase 2, Creative City, Chuangke
Road Xili Street, Nanshan District, Shenzhen, Guangdong, 518055, China
Copyright © 2023 Shenzhen Kaadas Intelligent Technology Co., Ltd. All Rights Reserved. 粤ICP备13061693号 Powered by vancheer