Privacy Policy

Update Date: March 31, 2022

Effective Date: March 31, 2022

 

1. Special reminder

Welcome to Voice Recorder!

Voice RecorderThe service provider (hereinafter referred to as "we") is well aware of the importance of personal information to you, and will make every effort to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and processing your personal information in accordance with the principles of lawfulness, fairness, necessity and good faith. Therefore, this "Privacy Policy" (hereinafter referred to as "this Policy") is formulated so that you can fully understand how we collect, use, save, share and transfer this information when you use Voice Recorder, and the access we provide you with , update, delete and protect this information.

Before you use Voice Recorder, please read this policy carefully and fully understand the terms and conditions, and you can make the choices you deem appropriate in accordance with the guidelines of this privacy policy. For the relevant terms involved in this Privacy Policy, we try to be concise and concise, and provide links to further explanations for your better understanding. If you have any questions, please contact us.

This policy will help you understand the following:

1.1. How we collect and use your personal information

1.2. How we use cookies or similar technologies

1.3. How we share, transfer and publicly disclose your personal information

1.4. How we protect your personal information

1.5. How you manage your personal information

1.6. How we process personal information of minors

1.7. How this Privacy Policy is updated

1.8. How to contact us

2. How we collect and use your personal information

2.1. Personal information refers to various information related to identified or identifiable natural persons recorded electronically or in other ways, excluding anonymized information. Sensitive personal information is personal information that, once leaked or used illegally, may easily lead to violation of the personal dignity of a natural person or endanger the personal and property safety, including biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts and other information, and personal information of minors under the age of fourteen.

2.2. We will follow the principles of legitimacy, lawfulness, and necessity, and for the following purposes described in this policy, collect and use the personal information you provide during the use of Voice Recorder or generated due to the use of Voice Recorder, as well as from Third parties obtain personal information about you. If we want to use your personal information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, we will inform you in a reasonable manner and ask again before use with your consent.

2.3. Circumstances in which you must authorize us to collect and use your personal information

2.3.1. Our Voice Recorder includes some core functions, and we may collect, save and use the following information about you to achieve the above functions. If you do not provide relevant information, you will not be able to enjoy the products and services we provide. These features include:

2.3.1.1. Service purchase and payment functions

In order to facilitate the delivery of the service or services to you, you will at least need to provide us with payment status information as prompted. If you refuse to provide such information, we will not be able to complete the delivery.

If payment and settlement occurs during your use of Voice Recorder, we will use the payment services provided by the platform. The payment function itself does not collect your personal information, but we need to share your order number and transaction amount information with the platform so that it can confirm your payment instruction and complete the payment.

2.3.1.2. Customer Service Function

In order to provide services according to your demands, with your authorization, human customer service personnel need to inquire or inspect your relevant information within the scope of your authorization. We will try our best to take technical and management measures to ensure the security of your information, and to the extent necessary. to use. We may save your contact information (the mobile phone number, WeChat account, QQ number or other contact information you use or actively provide), the record and content of your communication with us, and other necessary information in order to provide and record customers for you Serve.

2.3.1.3. Security function

In order to improve the security of your use of our products and services, protect the personal and property safety of you or other users, better prevent phishing websites, fraud, network vulnerabilities, computer viruses and other security risks, and more accurately identify violations of laws and regulations In other circumstances, we may collect, use or integrate your account information, transaction information, and device information to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary records and audits in accordance with the law. , analysis and treatment measures.

2.4. Circumstances where you can choose to provide personal information

2.4.1. In order for you to use Voice Recorder more convenient or more fun, and thus improve your experience when using it, our following extended functions may use your mobile phone and your personal information. If you do not provide this personal information, you can still use the core functions of Voice Recorder, but you may not be able to use the extended functions we provide you or you need to fill in some information repeatedly. These extensions include:

2.4.1.1. Access to third-party SDK

When you use the connected third-party SDK in Voice Recorder, we may obtain your necessary personal information from the developers of such third-party SDK and their technical service providers for the purpose of providing docking technical support, such as equipment Information, operation behavior log information. If your sensitive personal information is involved, we will obtain authorization from you separately. If you refuse us to collect relevant personal information, all or part of the functions of the third-party SDK may not be realized, but it will not affect your use of other functions of Voice Recorder.

Developers and technical service providers of such third-party SDK may directly collect and use your personal information in accordance with their privacy policies, but we will not obtain such personal information. It is recommended that you read and confirm your understanding of these privacy policies before accepting related services and providing personal information.

2.5. You are fully aware that in the following situations, we do not need your authorization and consent to collect and use personal information:

2.5.1. Related to national security and national defense security.

2.5.2. Related to public safety, public health, and major public interests.

2.5.3. Related to criminal investigation, prosecution, trial and execution of judgments.

2.5.4. In order to protect the life and property of the personal information subject or other individuals and other major legitimate rights and interests, but it is difficult to obtain the consent of the individual.

2.5.5. The collected personal information is disclosed to the public by the personal information subject or guardian.

2.5.6. Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

2.5.7. Necessary for the conclusion of a contract at your request.

2.5.8. Necessary for maintaining the safe and stable operation of the provided products and/or services, such as finding and disposing of malfunctions of the products and/or services.

2.5.9. Necessary for legitimate news reporting.

2.5.10. When it is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when they provide the results of academic research or description to the outside world, they will de-identify the personal information contained in the results.

2.5.11. Other situations stipulated by laws and regulations.

2.6. Circumstances in which we obtain your personal information from third parties

2.6.1. We may obtain the personal information that you authorize to share from a third party. We will use the personal information in accordance with the agreement with the third party and after confirming the legitimacy of the source of personal information and in compliance with relevant laws and regulations. your personal information.

3. HOW WE USE COOKIES OR SIMILAR TECHNOLOGIES

3.1. We may obtain and use your information by using COOKIES or similar technologies, and store this information as log information.

3.2. By using COOKIES, we provide users with a simple and personalized web experience. A COOKIES is a small amount of data that is sent to your browser from a web server and stored on your computer's hard drive. We use cookies for the benefit of their users. For example, in order to make the login process of Voice Recorder faster, you can choose to save the user name in a COOKIES. In this way, it will be more convenient and quicker next time you want to use the service of Voice Recorder. COOKIES can help us determine the pages and content you are connected to, the time you spend on the specific services of Voice Recorder and the Voice Recorder service you have selected.

3.3. COOKIES enables us to serve you better and faster, and make your experience on the Voice Recorder service more personalized. You may refuse or manage cookies or similar technologies through your browser or user choice mechanism. However, please note that if you disable cookies or similar technologies, we may not be able to provide you with the best service experience, and some services may not work properly.

3.4. We use our own cookies or similar technologies, which may be used for the following purposes:

3.4.1. Remember who you are.

3.4.2. Analyze your use of our services.

3.5. If you wish to disable COOKIES, you can configure your browser: select "Reject COOKIES" or "Notify you when a website sends COOKIES". Given that our services are implemented by supporting COOKIES, after completing the operation of closing COOKIES, your access may be affected or you may not be able to fully obtain our services.

4. How we share, transfer or publicly disclose your personal information

4.1. Delegated processing

4.1.1. If we entrust a third party to process your personal information, we will agree with the entrusted person on the purpose, time limit, processing method, type of personal information, protection measures, and the rights and obligations of both parties, etc. To supervise the personal information processing activities of the trustee.

4.2. Sharing

4.2.1. We share your personal information under the premise of abiding by the "legitimate, least necessary, and clear-purpose principles". At the same time, we will conduct a personal information protection impact assessment in advance for the sharing of personal information, and take effective technical protection measures for the output form, circulation, and use. At the level of cooperation agreements, the information protection obligations and responsibilities of partners are strictly required, and data security protection agreements are signed with business partners before cooperation.

We have formulated the "Third-Party SDK Sharing List" (see Annex II) to give you a clear and concise introduction to our main sharing of your personal information.

4.2.2. We will not share your information with any third party outside of our company, except in the following cases:

(1) Obtain your express consent or authorization in advance.

(2) Share your information externally in accordance with applicable laws and regulations, the requirements of legal procedures, and mandatory administrative or judicial requirements.

(3) Only by sharing your personal information can we realize the core functions of our products and services or provide the services you need.

(4) We may share your personal information with our affiliates in order to provide you with relevant products or services, show you content that may be of interest, and protect your account and transaction security. We will share your personal information with our affiliates in accordance with this Privacy Policy, but we will only share necessary personal information and are bound by the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will seek your authorization again.

(5) We may share your information with partners and other third parties to ensure the smooth completion of the services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific and explicit purposes, and only share personal information necessary to provide services. Our partners are not authorized to use the shared personal information for any other purpose.

(6) Provided based on academic research.

(7) Provided according to the single service agreement signed with you or other legal documents.

4.3. Assignment

4.3.1. Transfer is the process of transferring control of personal information to another company, organization or individual.

4.3.2. We will not transfer your personal information to any third party other than our company, except in the following cases:

(1) Obtain your express consent or authorization in advance.

(2) With the continuous development of our business, in the event of our merger, acquisition or bankruptcy liquidation, your information may be transferred as part of such transactions. If it involves the transfer of personal information, we will require the new company, organization, or individual that holds your personal information to continue to be bound by this policy, otherwise we will require the company, organization, or individual to seek your authorization and consent again.

4.4. Public Disclosure

4.4.1. We will not publicly disclose your personal information to any third party other than our company, except in the following cases:

(1) We may publicly disclose your personal information in accordance with the needs of laws and regulations, litigation and dispute resolution, or as required by administrative and judicial authorities.

(2) According to your needs, disclose the information you designate under the disclosure method that you expressly agree to.

5. How we protect your personal information

5.1. We have always attached great importance to the protection of users' personal information security. For this reason, we have adopted industry-standard security technologies and organizational and management protection measures to minimize the leakage, damage, misuse and unauthorized access of your information. , risk of unauthorized disclosure and alteration.

5.1.1. Data security technical measures

5.1.1.1. We will adopt security protection measures in line with industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed, used and modified without authorization, and to avoid data damage or loss.

5.1.1.2. Our network services adopt encryption technologies such as transport layer security protocols, and provide browsing services through https and other methods to ensure the security of user data during transmission.

5.1.1.3. We adopt encryption technology to encrypt and store users' personal information, and isolate them through isolation technology.

5.1.1.4. When using personal information, such as personal information display, personal information association calculation, we will use a variety of data desensitization technologies including content replacement and SHA256 to enhance the security of personal information in use.

5.1.1.5. We use strict data access control and multi-factor authentication technology to protect personal information and prevent data from being used illegally.

5.1.1.6. We use code security automatic inspection and data access log analysis technology to conduct personal information security audit.

5.1.2. Other security measures we take to protect personal information

5.1.2.1. We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

5.1.2.2. We exercise comprehensive security control over data through information contact confidentiality agreements, monitoring and auditing mechanisms.

5.1.2.3. We have established a data security committee and set up a dedicated information protection department and a data security emergency response organization to promote and ensure the security of personal information.

5.1.2.4. We will hold security and privacy protection training courses to enhance employees' security awareness and awareness of personal information protection policies and related procedures.

5.2. Please be aware that although we will try our best to ensure the security of any information you send to us, the Internet environment is not 100% secure, and we are not responsible for any risks or losses arising from or related to it.

5.3. In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can prevent and reduce the risk on your own. Advice on risks, remedies for you, etc. We will promptly notify you of the event-related procedures by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subjects one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

6. How you manage your personal information

6.1. We attach great importance to the management of your personal information, and do our best to protect your access, correction, deletion, consent withdrawal and other legal rights, so that you have sufficient ability to maintain your privacy and personal information security.

6.2. Accessing and Correcting Your Personal Information

6.2.1. Except as provided by laws and regulations, you have the right to access and correct your personal information at any time, including:

(1) Account information:

(2) Browsing information:

(3) Comment information:

6.2.2. For other personal information you need to access or correct during the use of our products and services, please feel free to contact us. We will respond to your request in the manner and period set out in this Privacy Policy.

6.3. Deletion of your personal information

6.3.1. In the following circumstances, you may request us to delete personal information through the methods set out in this policy:

(1) If our handling of personal information violates laws and regulations.

(2) If you no longer use our products and services, or you cancel your account.

(3) If we stop providing products and services, or the shelf life has expired.

(4) If you withdraw your consent.

(5) If the purpose for which we process personal information has been achieved, cannot be achieved or is no longer necessary to achieve the purpose of processing.

6.4. Changing or withdrawing your consent

6.4.1. You can change the scope of your authorization for us to continue to collect personal information or withdraw your authorization by deleting information, turning off device functions, setting privacy settings on the Voice Recorder website or software, etc.

6.4.2. Please understand that Voice Recorder may need to collect necessary personal information in order to achieve this. When you withdraw your consent, we will not be able to continue to provide you with the services corresponding to the withdrawal of consent, but will not affect the personal information processing services previously carried out based on your authorization.

6.5. In response to your above request

6.5.1. If you are unable to exercise your rights as described above, you can contact us using the contact information set out in this policy. To protect the security of your account, when you make the above request to us, we may ask you to verify your identity before processing your request.

6.5.2. Exceptions to Response Scenarios

We will not be able to respond to your request in the following circumstances:

(1) Related to our performance of obligations under laws and regulations.

(2) Those directly related to national security and national defense security.

(3) Directly related to public safety, public health, and major public interests.

(4) Directly related to criminal investigation, prosecution, trial and enforcement of judgments.

(5) We have sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights.

(6) It is difficult to obtain the consent of the person in order to protect the life and property of the personal information subject or other individuals and other major legitimate rights and interests.

(7) Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations.

(8) Involving commercial secrets.

7. How we handle personal information of minors

7.1. We attach great importance to the protection of minors' personal information. If you are a minor under the age of 18, you should obtain the consent of your guardian in advance before using our products and services. We will protect the personal information of minors in accordance with relevant national laws and regulations.

7.2. We will not actively collect personal information from minors directly. For the collection of personal information of minors with the consent of the guardian, we will only use, share, transfer or disclose this information when permitted by law, consent of the guardian or necessary for the protection of minors.

7.3. If it is proved that minors have used our products and services without the consent of their guardians, we will consult with the relevant guardians and try to delete the relevant personal information as soon as possible.

7.4. For minors under the age of 14, in addition to complying with the stipulations of this Privacy Policy regarding users' personal information, we will also adhere to the principles of justifiable necessity, informed consent, clear purpose, safety and legal use, and strictly abide by the "Children's Personal Information". Personal Information Network Protection Regulations and other laws and regulations require storage, use, and disclosure, and will not exceed the period necessary to achieve the purpose of collection and use. After expiration, we will delete or anonymize children's personal information.

7.5. If you are the parent or other guardian of a minor under the age of 14, we may need to collect the personal information of the child under guardianship from you to perform the necessary services for you. If it is necessary to collect children's personal information from you in specific services, we will obtain your authorization and consent in advance and inform you of the purpose and use of the collection. If you do not provide the aforementioned information, you will not be able to enjoy the relevant services provided by us.

8. How this Privacy Policy is updated

8.1. Our Privacy Policy may change from time to time. We will post any changes to this Privacy Policy within the app. For material changes, we will provide a more prominent notice explaining the specific changes to the Privacy Policy. We will not reduce your rights under this Privacy Policy without your express consent.

8.2. Material changes referred to in this Privacy Policy include, but are not limited to:

8.2.1. Significant changes to our service model.

8.2.2. The main object of personal information sharing, transfer or public disclosure has changed.

8.2.3. Significant changes in your rights to participate in the processing of personal information and the manner in which they are exercised.

8.2.4. Changes to our contact details and complaint channels.

8.2.5. When the personal information security impact assessment report indicates that there is a high risk.

8.3. We will archive older versions of this Privacy Policy for your review.

9. How to contact us

9.1. If you have any questions, comments or suggestions regarding this Privacy Policy, please contact us by:

Email: voicerecorder.service@gmail.com

9.2. In general, we will reply within fifteen working days. If you are dissatisfied with our response, especially if our personal information processing has damaged your legitimate rights and interests, you can also file a complaint or report to the regulatory authorities such as Internet, telecommunications, public security, and industry and commerce, or file a complaint with the defendant's domicile. A court of competent jurisdiction files a lawsuit to find a solution.

 

Annex I: Definitions

1. Personal Information

Personal information refers to all kinds of information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information, including name, date of birth, ID number, personal biometric information, address, Communication contact information, communication records and content, account password, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, etc.

2. Sensitive Personal Information

Once leaked or illegally used, personal information that is likely to cause damage to the personal dignity of a natural person or endanger personal and property safety, including biometrics, religious beliefs, specific identities, medical and health, financial accounts, whereabouts and other information, as well as information on dissatisfaction 14 Personal information of one-year-old minors, for example, sensitive personal information includes ID number, personal biometric information, bank account number, communication content, health and physiological information, etc.

3. Authorization Consent

It means that you expressly authorize the specific processing of your personal information, including authorization through positive actions (that is, express consent), and authorization through negative omissions.

4. Anonymization

Refers to the process in which the subject of personal information cannot be identified or associated with the technical processing of personal information, and the processed information cannot be recovered.

5. De-identification

The process by which personal information is processed so that it cannot identify a specific natural person without the aid of additional information.

6. Log information

The content you publish and browse when you use our platform, the operation time, type, original network address, destination address, port, date and time of access, and login IP information when you publish the content.

7. Device Information

Including device identifiers (IMEI, IDFA, AndroidID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters and system information ( Device type, device model, operating system and hardware-related information), device network environment information (IP address, WiFi information, base station information and other network-related information). The actual collection of the product shall prevail.

8. Voice Recorder

Refers to the Voice Recorder website and its client programs, mobile application products, and small programs.

9. Voice Recorder Provider

means liean cao.

10. Children

Refers to minors under the age of fourteen.

 

Annex II: Third-Party SDK Sharing List

1. Embedded SDK manifest

SDK name: Umeng SDK

Third-party company name: Youmeng Tongxin (Beijing) Technology Co., Ltd.

Shared Information Name: Device Information (IMEI/Mac/Android ID/IDFA/OPENUDID/GUID/SIM Card IMSI)

Purpose of use: data statistics, crash statistics

Usage scenarios: data statistics, crash statistics

Third Party Privacy Link: https://www.umeng.com/page/policy/

 

SDK Name: Firebase Statistics

Third Party Company Name: Google LLC

Shared information name: device Mac address, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information)

Purpose of use: Firebase analysis, crash-related dependencies (foreign statistical data buried points)

Usage scenarios: Firebase analysis, crash-related dependencies (foreign statistical data buried points)

Third-party privacy link: https://policies.google.cn/privacy

 

Annex 3: Rules for the Protection of Children's Personal Information

Updated: March 31, 2022

Effective date: March 31, 2022

1. Special reminder

Welcome to Voice Recorder! We are well aware of the importance of children's personal information and privacy security, and solemnly promise to protect the personal information and privacy security of children's users. We hope to use the "Children's Personal Information Protection Rules" (hereinafter also referred to as "the Rules") to explain how we collect, use, store and process children's personal information, and we provide guardians and children with access, correction, deletion, and protection of this information The way. Before using our products or services, children, their parents or other guardians (hereinafter referred to as guardians) must carefully read and thoroughly understand this policy, especially the terms marked in bold should be read with emphasis. All terms and conditions before starting to use.

Special instructions for guardians:

The protection of children's personal information requires the joint efforts of you and us. We hope that you will assist us in protecting your children's personal information. Please ensure that your children use our products or services and submit personal information to us under your consent and guidance. information (if required). If you click to agree to use or continue to use the products or services we provide, you agree that we will collect, use and process the personal information of you and the children under your guardianship in accordance with the Privacy Policy and these rules. If you do not agree with the content of these rules, please ask your child to immediately stop accessing or using our products or services.

Special instructions for children:

If you are a child, please notify your guardian to read these rules, and please use our products or services after your guardian's authorization and consent. If your guardian does not agree with these rules or does not agree with your use of our products or services, please stop using our products or services.

This policy will help you understand the following:

(1) How we collect and use children's personal information

(2) How do we share, transfer and publicly disclose children's personal information

(3) Control of children's personal information by you and/or children

(4) How we store and protect children's personal information

(5) How to contact us

2. How we collect and use children's personal information

2.1. We will strictly perform the obligations and responsibilities of children’s personal information protection stipulated by law, and collect and use children’s personal information in accordance with the principles of justifiable necessity, informed consent, clear purpose, safety and legal use, and will not collect and use children’s personal information. Children's personal information unrelated to the service will not be collected or used in violation of the law and our agreement with you.

2.2. Circumstances where you voluntarily provide information

2.2.1. You actively provide us with your child's personal information when using our products or services, which means that you have agreed to us to collect and process your child's personal information in accordance with the content of these rules.

2.3. Child/Adolescent Mode

2.3.1. You can enable Teen Mode in our products or services. In Teen Mode, we only collect device information (including device MAC address, unique device ID, login IP address, device model, device name, device identification, language settings, operating system and application version, network information, product version No.), we collect this information for anti-cheating purposes, to disclose to you the daily usage of children under your supervision, to provide children with content they need and services they may be more interested in, and to improve our products and services. We hereby advise you in good faith that if it is not necessary, please do not provide children's real names, portraits, contact information and other information, and do not easily share children's personal information with others or publish it publicly.

3. How we share, transfer, and publicly disclose children’s personal information

3.1. Sharing

3.1.1. We will not share children's personal information with third parties, except in the following cases:

(1) Sharing with guardians.

(2) Your express authorization and consent have been obtained in advance.

(3) In order to carry out the necessary and reasonable business smoothly, meet the requirements of you and children, perform our obligations in the relevant user agreement or these rules, and exercise our rights or comply with legal regulations, etc., and for our products or other purposes. Necessary sharing of service providers who provide functional support, but we promise that we will only share necessary personal information of children. If we need to change the purpose of processing children's personal information, we will ask for your authorization and consent again. Please rest assured that we will conduct security assessments on service providers and their service behaviors, sign an agreement, clarify responsibilities, handling matters, handling period, handling nature and purpose, etc., and require their handling behaviors to not exceed our authorized scope; and please you Rest assured, we will not share the personal information of children under your guardianship with third parties for marketing activities unless we have your authorization and consent.

3.2. Transfer and Public Disclosure

3.2.1. We will strictly perform the obligations and responsibilities of children's personal information protection stipulated by law, and transfer and publicly disclose children's personal information in accordance with the principles of justifiable necessity, informed consent, clear purpose, security, and legal use.

3.3. If you want to know more, please refer to the fourth chapter of the main body of the "Privacy Policy".

4. Control of Children's Personal Information by You and/or Children

4.1. Access rights

4.1.1. You and/or the children under your supervision can inquire and access relevant personal information of children in our products or services, such as personal data information, video viewing records.

4.2. Right to Amend

4.2.1. You and/or the children under your supervision can modify the personal information of children in our products or services, such as personal data information. You can contact us to solve it, and we will make changes after verifying your identity without affecting the objectivity and accuracy of the information. However, for security and identification reasons, you may not be able to modify some of the initial registration information submitted during registration.

4.2.2. At the same time, if you and/or the children under your supervision find that the personal information of children we collect, store, use, and disclose is wrong, you can contact us to correct them, and we will take timely measures after completing identity verification and verifying the problem be corrected.

4.3. Right to erasure

4.3.1. Under the following circumstances, you and/or the child under your guardianship can directly request us to delete the child's personal information, and we will take timely measures to delete it after completing the identity verification and verification, including:

(1) We collect, store, use, transfer or disclose children's personal information in violation of laws and regulations or our agreement with you.

(2) We collect, store, use, transfer, and disclose children's personal information beyond the scope of the purpose or within the necessary period.

(3) You withdraw your consent.

(4) You and/or the children under your guardianship terminate the use of our products and/or services by logging out or other means.

(5) Other circumstances stipulated by laws and regulations.

5. How we store and protect children's personal information

5.1. We store children's personal information in the territory of the People's Republic of China in accordance with laws and regulations. Unless otherwise required by laws, regulations or regulatory authorities, we only retain children's personal information for the shortest period necessary for the purpose of providing our products and services. After the above storage period is exceeded, we will delete or anonymize children's personal information.

5.2. We have adopted multi-layered protection measures such as safety technical measures in line with industry standards and supporting organizational structures and management systems to protect children's personal information; at the same time, we follow the principle of least authorization and set strict information access rights for staff , to control the scope of knowledge of children's personal information; we have also taken necessary technical measures to avoid illegal copying and downloading of children's personal information.

5.3. If you want to know more, please refer to Chapter 5 of the main body of the "Privacy Policy".

6. How to contact us

6.1. If you have any questions, comments or suggestions regarding this Privacy Policy, please contact us by:

Email: voicerecorder.service@gmail.com

6.2. In general, we will reply within fifteen working days. If you are not satisfied with our reply, especially if our personal information processing behavior has damaged your legitimate rights and interests, you can also file a complaint or report to the regulatory authorities such as Internet, telecommunications, public security, and industry and commerce, or file a complaint with the defendant's domicile. A court of competent jurisdiction files a lawsuit to find a solution.