《Lacat ScannerPrivacy Policy》

Version update date: March 5, 2024

Version effective date: December 1, 2023

The ownership and operation rights of the Lacat Scanner App belong to the Shanghai Ruiang Information Technology Co., Ltd, and the right to change the information and services provided by the platform at any time is reserved.

Ⅰ、How do we collect and use your information

We will collect, store, and use the following personal information related to you for the purposes described in this policy. If you do not provide relevant information, you may not be able to enjoy certain products or services we provide, or may not be able to achieve the desired results of the relevant services.

(Ⅰ)Help you become our user in order to provide you with services.

To register as our user, you need to provide registration information such as phone number and email address. If you do not provide this information, it will affect your use of the services provided by this product.

(Ⅱ)Providing you with products or services, including:

1、The information you provide us is for your convenience in using our products or services. You need to choose to fill in or submit the necessary information for using our products or services based on their content. It should be noted that to ensure a smooth product experience, you may receive content or network links from third parties (hereinafter referred to as "third parties") outside of Lacat Scanner and its partners Lacat Scanner has no control over such third parties. You can choose whether to access links, content, products, and services provided by third parties Lacat Scanner cannot control the privacy and data protection policies of third parties, and such third parties are not bound by this policy. Before submitting personal information to third parties, please refer to their privacy protection policies.

2、The information we collect during your use of our products or services is to provide you with scanning services that better meet your needs, understand product compatibility, and report errors to you. We will collect information about how you use our products or services and link this information to you. These information include document scanning information, device information, log information, network environment, etc. Among them, device information and log information refer to:

Device Information: We will receive and record device related information (such as device model, operating system version, device settings, MAC address, unique device identification code, and other software and hardware feature information) and device location related information (such as IP address, GPS location, and sensor information such as Wi-Fi access points, Bluetooth, and base stations that can provide relevant information) based on the specific permissions you have granted during software installation and use.

Log information: When you use the products or services we provide, we will automatically collect detailed usage information about your use of our services as relevant network logs. For example, your search query content, scan records, IP address, telecom operator, language used, visit date and time, and the web page records you visited. Please note that individual device information, log information, etc. are information that cannot identify a specific natural person. In order to provide you with consistent services on your device, we will associate the information collected on your various devices (computer, mobile device). If we combine this type of non personal information with other information to identify a specific natural person's identity, or use it in combination with personal information, during the combined use period, this type of non personal information will be considered personal information. Unless authorized by you or otherwise required by laws and regulations, we will anonymize and de identify this type of personal information. When you contact us, we may save your account, phone number, address, email, IP address, communication/call records and content, or other contact information you leave, in order to contact you or help you solve problems, or record the solutions and results of related issues.

Permissions: When you use the scanning function, we will use your camera and album permissions based on the specific permissions you have granted in the software. We obtain your camera permissions for capturing the content to be scanned; We obtain your album permissions for uploading scanned content and storing scanned content.

3、We collected your personal information through indirect means.

(1)Information about your use or ordering of third-party products or services. In order to provide you with more convenient life services, this product provides you with rich third-party services. You can use related functions through product modules such as WeChat friends, QQ friends, and email.

(2) When you use the third-party services connected to this product, you may be required to submit your personal information (in some cases, including your identity information, contact information, account information, nickname, etc., and the individual's explicit authorization to share information).

You authorize us to provide this information to third parties who provide services to you, and authorize us to indirectly obtain relevant information from third parties. If you refuse us to collect such information, we will not be able to provide you with relevant functions and services.

(3) When you use WeChat, Weibo, or QQ accounts to use our products or services, we need to verify your identity or determine your account information, and with your authorization, associate the relevant account with our products or services.

(4) If you refuse to provide the above information or refuse authorization, you may not be able to use the corresponding products or services of our affiliated companies or third parties, or be unable to display relevant information, but it does not affect the basic functions of using this product or service.

(Ⅲ)Providing You with Security

In order to improve the security of your use of the products or services provided by us and our affiliates and partners, protect the personal and property safety of you or other users or the public from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network infringers and other security risks, and more accurately identify violations of laws and regulations or the agreement rules related to this product, We may use or integrate your user information, behavioral information, device information, relevant network logs and the information that our affiliates and partners obtain from you or share according to law to comprehensively judge your account status and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis and disposal measures according to law.

(Ⅳ)Other uses:

Participate in our surveys and activities: We will conduct surveys on our products and services from time to time, or organize activities related to operational needs. If you need to provide personal sensitive information beyond the scope of this policy when participating in such surveys or activities, we will seek your consent in advance.

(Ⅴ)Exceptions to obtaining authorization and consent. According to relevant laws and regulations, collecting your personal information in the following situations does not require your authorization and consent:

(1)Related to national security and national defense security;

(2)Related to public safety, public health, and major public interests;

(3)Related to criminal investigation, prosecution, trial, and enforcement of judgments;

(4)For the purpose of safeguarding the significant legal rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain your personal consent;

(5)The personal information collected is publicly available to the public on your own;

(6)Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;

(7)Necessary for signing the contract according to your requirements;

(8)Necessary for maintaining the safe and stable operation of the provided products or services, such as discovering and dealing with faults in the products or services;

(9)Necessary for legitimate news reporting;

(10)When academic research institutions conduct statistical or academic research based on the public interest, and when providing academic research or descriptive results to the public, they de identify the personal information contained in the results;

(11)Other situations stipulated by laws and regulations. If we cease to operate the functions or services of this product, we will promptly cease the collection of your personal information, notify you of the cessation of operation information in the form of notices or announcements, and delete or anonymize the personal information held.

Ⅱ、How do we use cookie and similar technologies

In addition to cookie, we will also use other similar technologies such as website beacons and pixel labels on our mobile devices. For example, the email we send you may contain an address link to our website content, and if you click on that link, we will track that click to help us understand your product or service preferences and proactively improve our customer service experience. A website beacon is usually a transparent image embedded in a website or email. By using pixel labels in emails, we can determine whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

Ⅲ、How do we share, transfer, and publicly disclose your personal information

(Ⅰ)Share

We will not share your personal information with companies, organizations, or individuals other than the service providers of this product, except in the following circumstances:

1、Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2、Sharing under legal circumstances: We may share your personal information with the public in accordance with laws and regulations, litigation dispute resolution needs, or requirements made by administrative and judicial authorities in accordance with the law.

3、Sharing with authorized partners: For the purposes stated in this privacy policy only, certain of our services will be provided jointly by us and authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legitimate, legitimate, necessary, specific, and clear purposes, and only share personal information necessary for providing services. Our partners have no right to use the shared personal information for purposes unrelated to the product or service. Currently, our authorized partners include the following types:

(1)Software service providers, smart device providers, and system service providers. When this product is combined with third-party software and device systems to provide you with location-based services, it may collect your location and device information based on your authorization and settings for system positioning and provide it to the system. At the same time, personal information such as your registered account, nickname, etc. may also be included as needed. If you refuse to collect and use such information, you will need to set up or disable the software providing services in the device system. This product cannot automatically or manually set up or disable related services.

(2)Suppliers, service providers, and other partners. We may send information to suppliers, service providers, and other partners who support our business, including providing technical infrastructure services, providing functional services within or after product links, analyzing the usage of our services, measuring the effectiveness of advertising and services, providing customer service, and conducting surveys.

(3)Authorized partners for advertising and analysis services. Without your authorization, we will not share your personal information with partners who provide advertising and analysis services.

(4)Other partners in finance, credit reporting services, etc. According to the agreements or documents signed between You and relevant partners, or based on legal regulations, legal procedures, mandatory government requirements or judicial rulings, or the legitimate needs of financial and credit review institutions, your personal information will be comprehensively statistically analyzed or processed, and the data results will be shared with partners to determine your credit status, screen high-quality users, or reduce credit bad debts. We will sign strict data protection agreements with companies, organizations, and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.

(Ⅱ)Transfer

We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

1、After obtaining your explicit consent, we will transfer your personal information to other parties;

2、In the event of a merger, acquisition, or bankruptcy liquidation involving the service provider of this product, or any other merger, acquisition, or bankruptcy liquidation involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization, and individual to seek your authorization and consent again.

(Ⅲ)Public disclosure

We will only publicly disclose your personal information in the following circumstances:

1、With your explicit consent or based on your proactive choice, we may publicly disclose your personal information;

2、If we determine that you have violated laws and regulations or seriously violated the rules of this product-related agreement, or in order to protect the personal and property safety of this product and its affiliated users or the public from infringement, we may disclose your personal information in accordance with laws and regulations or this product-related agreement and rules with your consent. Including related violations and actions taken against you by the Product.

(Ⅳ)Exceptions

In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

1、Related to national security and national defense security;

2、Related to public safety, public health, and major public interests;

3、Related to criminal investigation, prosecution, trial, and enforcement of judgments;

4、In order to protect the life, property and other important legal rights and interests of you or other individuals, but it is difficult to get my consent;

5、Personal information that you disclose to the public on your own;

6、Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels. According to legal regulations, sharing or transferring personal information that has undergone de identification processing, and ensuring that the data recipient cannot recover and re identify the personal information subject, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require separate notice to you and your consent.

Ⅳ、How do we protect the security of your personal information

1、This product will adopt appropriate security measures and technical means that comply with industry standards to store and protect your personal information, to prevent its loss, misuse, unauthorized access or leakage, tampering or destruction, such as encrypted transmission through network security layer technology SSL, encrypted information storage, strict restrictions on data center access, use of dedicated network channels and network proxies. Your personal information is stored on a password controlled server, and access is restricted.

2、We have established a personal information protection responsibility mechanism, established relevant internal control systems, and adopted the principle of minimum authorization for personnel who may come into contact with your information. We only allow employees of this product and its affiliated companies who need to know this information to access or modify this information after taking reasonable measures to verify their identity. At the same time, we will strictly require them to fulfill their confidentiality and security obligations. If they fail to fulfill these obligations, they will be held legally responsible or their cooperation with this product will be terminated.

3、In order to protect the security of your information, if the user's personal information is incorrect, the product will access, correct or delete the relevant information according to the user's request after strict verification and verification of the applicant's identity (unless the product has to retain such personal information for legitimate reasons).

4、We will take reasonable and feasible measures to avoid collecting irrelevant personal information as much as possible. We will only retain your personal information for the period necessary to achieve the objectives stated in this policy, unless an extension of the retention period is required or permitted by law.

5、The Internet is not an absolutely secure environment. It is uncertain whether the communication methods with other users, such as email, instant messaging, social software, trading platforms, etc., are fully encrypted. Please pay attention to protecting the security of your personal information during interactive use.

6、Please understand that due to the rapid development of computer and Internet technology and the limitation of synchronization speed, various malicious or non malicious attacks may exist or appear. Although this product is continuously committed to improving and strengthening security measures to protect your information from accidents or damage, it cannot always guarantee 100% security of your information.

7、The system, communication network, or hardware devices used by you when using the product or service cannot be controlled by this product. Please understand and pay attention to protecting your personal information security.

8、Please note that the information you voluntarily share or even publicly share when using our products and services may involve personal information or even sensitive information of yourself or others. For example, if you choose to upload images containing personal information when evaluating. Please be more cautious when considering whether to share or even publicly share relevant information when using our services.

9、Please assist us in ensuring the security of your account. We will do our best to ensure the security of any information you send us. If our physical, technical, or management protective facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, which damages your legitimate rights and interests, we will bear corresponding legal responsibilities.

10、In the event of an unfortunate personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can independently prevent and reduce risks, and the remedial measures for you. We will inform you by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will also report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.

Ⅴ、How to manage your personal information

You can access and manage your personal information through the following methods:

(Ⅰ)Access your personal information

1、You have the right to access your personal information, except for exceptions provided by laws and regulations.

2、If you are unable to access personal information, you can contact us at any time through Lacat Scanner customer service. We will reply to your visit request within 30 days.

3、For any other personal information generated by you during the use of our products or services, we will provide it to you in accordance with the relevant arrangements in Article (Ⅶ) in response to your above request.

(Ⅱ)Correction or Supplement of your Personal Information When you find that there is an error in the personal information we process about you, you have the right to ask us to make a correction or supplement. You may request a correction or supplement in the manner set out in "(Ⅰ) Access to your Personal Information".

(Ⅲ)Delete your personal information

1、You can delete some of your personal information through the methods listed in "(Ⅰ) Accessing Your Personal Information".

2、In the following situations, you can propose to us to delete personal information

Request:

(1)If our handling of personal information violates laws and regulations;

(2) If we collect and use your personal information without obtaining your explicit consent;

(3)If our handling of personal information seriously violates our agreement with you;

(4)If you no longer use our products or services, or if you voluntarily uninstall our products;

(5)If we permanently cease to provide you with products or services.

3、If we decide to respond to your deletion request, we will also notify the parties who have obtained your personal information from us as much as possible and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or if these parties have obtained your independent authorization.

4、When you remove information from our service, we may not immediately delete the corresponding information from the backup system, but we will delete this information during backup updates.

(Ⅳ)Change the scope of your authorized consent

Each business function requires some basic personal information to be completed (see Part 2 of this Privacy Policy). In addition, you can revoke partial authorization by unbinding, modifying personal settings, deleting relevant information, or by disabling the function. After you withdraw your consent, we will no longer process the corresponding personal information. But your decision to withdraw your consent will not affect the personal information processing previously carried out based on your authorization.

(Ⅴ)Personal Information Subject Cancellation

1、You can uninstall the mobile client yourself.

2、After you voluntarily uninstall the mobile client, we will stop providing you with products or services, delete your personal information in accordance with applicable laws, or anonymize it.

(Ⅵ)Constrained Information System Automatic Decision Making

In certain business functions, we may only make decisions based on non manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will also provide an appeal method on the premise of not infringing on the trade secrets or other user rights and social public interests of this product.

(Ⅶ)In response to your above request

1、To ensure security, you may need to provide a written request or other means of proving your identity. We may first request you to verify your identity before processing your request.

2、We will provide a response as soon as possible. If you are not satisfied, you can also file a complaint through the customer service contact information specified in this privacy policy.

3、For your reasonable requests, we do not charge any fees in principle, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may refuse requests that are unfounded, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical.

4、In the following situations, according to legal and regulatory requirements, we will not be able to respond to your request:

(1)Related to national security and national defense security;

(2)Related to public safety, public health, and major public interests;

(3)Related to criminal investigation, prosecution, trial, and enforcement of judgments, etc;

(4)There is sufficient evidence to indicate that the personal information subject has subjective malice or abuse of rights;

(5)Responding to your request will result in serious damage to your or other individuals or organizations' legitimate rights and interests;

(6)Involving trade secrets.

Ⅵ、How do we handle personal information of minors

1、Without the consent of parents or guardians, wooden adults are not allowed to use our products or services without authorization. If you are a minor, we suggest that you ask your parents or guardians to carefully read this privacy policy and use our services or provide information to us with the consent of your parents or guardians.

2、For cases where we collect personal information of minors using our products or services with the consent of our parents or guardians, we will only use, share, transfer, or disclose this information when permitted by laws and regulations, explicitly agreed upon by our parents or guardians, or necessary to protect minors.

Ⅶ、How to transfer your personal information globally

The personal information collected and generated during our operations within the territory of the People's Republic of China is stored within the territory of China, except for the following situations:

1、There are clear provisions in laws and regulations;

2、Obtain your explicit authorization;

3、You conduct cross-border transactions and other personal initiatives through the Internet. In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this privacy policy.

Ⅷ、How to update this privacy policy

Our privacy policy may change, and we will notify users as much as possible when changes occur.

1、Without your explicit consent, we will not limit your rights under this privacy policy. We will post any changes made to the privacy policy on a dedicated page (Settings About Privacy Policy).

2、For significant changes, we will also provide more prominent notifications (including notifications through Lacat Scanner mobile client publicity and even pop-up notifications to you). The significant changes referred to in this policy include but are not limited to

(1)Our service model has undergone significant changes. Such as the purpose of processing personal information, the type of personal information being processed, and the way personal information is used, etc;

(2)We have undergone significant changes in control and other aspects. Changes in owners caused by mergers and acquisitions, restructuring, etc;

(3)Changes in the main recipients of personal information sharing, transfer, or public disclosure;

(4)Your right to participate in personal information processing and the way you exercise it have undergone significant changes;

(5)When there are changes in the department responsible for handling personal information security, contact information, and complaint channels;

(6)When the personal information security impact assessment report indicates a high risk.

Ⅸ、How to contact us

If you have any questions, opinions or suggestions regarding the content of this privacy policy, you can contact us by sending an email. Once we receive your email, we will respond to your request as soon as possible. If you are not satisfied with our response, especially if you believe that our personal information processing behavior has damaged your legitimate rights and interests, you can seek a solution by filing a lawsuit with the court with jurisdiction in the defendant's domicile. Contact email:shxhglxj@163.com

Ⅹ、Third party SDK used

Youmeng Statistical Analysis SDK

Purpose of use:Conduct APP operation statistics and analysis

Operator:Youmeng Tongxin (Beijing) Technology Co., LTD

Type of personal information collection:

Device information(IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM卡IMSI/ICCID/SN)、Location information, network information

Privacy Policy:https://www.umeng.com/page/policy

Pangolin (Guangdian Tong) advertisement SDK

Package Name:com.bykv、com.bytedance.sdk

Type and purpose of collecting personal information: obtaining Android ID, obtaining device serial number, obtaining running process information, obtaining software installation list, IMEI

Privacy Policy Link:https://www.csjplatform.com/privacy

Youlianghui (Tencent) Advertising SDK

Package Name:com.qq.e

Type and purpose of collecting personal information: obtaining running process information, obtaining software installation list, IMEI

Privacy Policy Link:https://e.qq.com/dev/help_detail.html?cid=2005&pid=5983