StormProxies Privacy Policy
Updated: March 2, 2022
Effective Date: March 2, 2022
Introduction
[江苏康慧美网络科技有限公司] (hereinafter referred to as "we" or "StormProxies team" or "the Company") is well aware of the importance of information security for individuals and enterprises (hereinafter referred to as "you" or "individuals", and enterprises are also referred to as "individuals" here). We will protect your information and privacy in accordance with the provisions of the law. Therefore, we designate this "StormProxies User Privacy Policy" (hereinafter referred to as "this Privacy Policy") and remind you: StormProxies official website, StormProxies App (including but not limited to Apps and SDKs under Windows, Ios, Android, HarmonyOS and other systems) (hereinafter referred to as "StormProxies") and other products of the Company that link to this Privacy Policy. Before you use the "StormProxies Official Website", "StormProxies App", "StormProxies SDK" and related services we provide on platforms such as "WeChat Official Account", please be sure to read this privacy policy carefully and fully understand it. You can only use this platform and services after fully understanding and agreeing to it. Once you start this platform and related services, it will be deemed that you have accepted and recognized the contents of this policy.
This privacy policy will help you understand:
• We will collect and use your information in accordance with the privacy policy, but will not collect personal information in a mandatory bundling manner simply because you agree to this privacy policy.
• When you use or enable related functions or use services, we will collect and use relevant information as necessary to achieve the functions and services. Unless it is necessary information required to achieve basic business functions or in accordance with laws and regulations, you can refuse to provide it without affecting other functions or services. We will explain what is necessary information item by item in the privacy policy.
• This Privacy Policy applies to your access and use of our products and services through the StormProxies official website, StormProxies App, StormProxies Software Development Kit (SDK) and Application Programming Interface (API) for third-party websites and applications.
• The following will help you understand in detail how we collect, use, store, transmit, share, transfer (if applicable) and protect personal information; help you understand how to query, access, delete, correct and withdraw authorized personal information. Among them, we have highlighted the important contents of the terms related to your personal information rights and interests in bold, please pay special attention.
1. How we collect and use personal information
2. How we use cookies and other similar technologies
3. How we share, transfer, and publicly disclose personal information
4. How we store personal information
5. How we protect the security of personal information
6. Manage your personal information
7. Minors' clauses
8. Amendments and notifications of the Privacy Policy
9. Contact us
1. How we collect and use personal information
We will collect the information you actively provide when using this platform and its services, as well as the information generated by you in the process of using functions or receiving services through automated means as follows.
Phone, camera (camera), album (storage), calendar, and microphone permissions will not be enabled by default. They will only be used to implement specific functions or services with your explicit authorization, and you can also withdraw your authorization. It is particularly important to point out that even if we obtain these sensitive permissions with your authorization, we will not collect your information when the relevant functions or services are not used. Please see below for specific permissions or application and usage.
1.1 Registration and Login
1.1.1 When you register or log in to StormProxies and related services, you can create an account through your mobile phone number, email address, etc. We will verify whether your identity is valid by sending a text message verification code or an email verification code, and you can complete the relevant network identity identification information. This information is collected to help you complete the registration. You can also choose to fill in some information (such as: avatar, nickname, etc.) to complete your information according to your own needs.
1.1.2 Based on our cooperation with communication operators, when you use the "one-click login" function of StormProxies, with your explicit consent, the operator will send your mobile phone number to us in order to provide you with a quick login service and experience. Mobile phone numbers are personal sensitive information. If you refuse, you will not be able to register or log in to StormProxies using the "One-click Login" method, but it will not affect your registration and login through other methods, nor will it affect the normal use of other functions.
1.1.3 You can also use a third-party account to log in to StormProxies. At this time, you will authorize us to obtain the public information (avatar, nickname, and other information you authorize) registered on the third-party platform for binding with the StormProxies account, so that you can directly log in and use this product and related services through the third-party account.
1.1.4 The above information we collect and use is de-identified. Data analysis only corresponds to specific codes that cannot be directly associated with your identity and will not be associated with your real identity.
1.2 Set and change avatar
When you set or change your avatar, we will ask you to authorize camera and album permissions. If you refuse to authorize the provision of camera permissions, you will not be able to set or change your avatar by taking a photo; if you refuse to authorize the album permissions, you will not be able to set or change your avatar by uploading pictures from the album, but the above will not affect your normal use of other functions.
1.3 Browsing routes
When you browse routes, we may apply for permissions based on your current location and network operator to promote high-quality routes for you. If you refuse to authorize the provision of location information, you will not be able to recommend high-quality routes based on location information, but it will not affect your normal use.
1.4 Search
When you use the StormProxies search service, we will collect your search keyword information and log records. In order to provide efficient search services, some of the aforementioned content will be temporarily stored in your local storage device, and the search results and search history can be displayed to you.
1.5 Real-name Authentication
When you use the service, according to the Cybersecurity Law of the People's Republic of China (implemented on June 1, 2017) and relevant laws. You need to first conduct real-name authentication. We cooperate with Alipay (China) Network Technology Co., Ltd. (hereinafter referred to as Alipay), and Alipay provides technical support. You need to provide your real name and ID number to complete the real-name authentication. If you refuse to conduct real-name authentication, you will not be able to use the service, but the above will not affect your normal use of other functions.
1.6 Message Notification
You acknowledge and agree that we may send multiple types of notifications to one or more of your contact information (e.g., contact phone number) provided during the use of our products and/or services, for purposes such as user message notification, identity verification, security verification, and user experience research; in addition, we may also send text messages or phone calls to the mobile phone numbers collected during the aforementioned process to provide you with commercial information such as services, features, or marketing activities that may be of interest to you. However, please rest assured that if you do not wish to receive this information, you may unsubscribe through the unsubscribe method provided in the text message, or you may directly contact us to unsubscribe.
1.7 Device Information and Service Log Information
a. In order to ensure the safe operation of this platform and its related services, we will collect your hardware model, operating system version number, international mobile equipment identity code, unique device identifier (such as IMEI, Android, OAID, IMSI, ICCID, GAID, MEID, IDFV, IDFA and other specific fields vary due to different software and hardware versions), network device hardware address (MAC), IP+port, WLAN access point (SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, use, service log. We will apply to allow the program to obtain the current or recently running application permissions for security risk control and push SDK to ensure the safe operation of software and services and the reach of messages.
b. In order to prevent malicious programs and for security operations, we will collect information about installed applications or running processes, the overall operation, usage and frequency of applications, application crashes, overall installation and usage, performance data, and application sources.
c. We may use your account information, device information, service log information, and information that our affiliates and partners can share with your authorization or in accordance with the law to determine account security, conduct identity authentication, detect, and prevent security incidents.
1.8 Changes in the purpose of collecting and using personal information
a. Please understand that as our business develops, there may be adjustments and changes to the functions and services provided by this platform. In principle, when new functions or services are related to the functions or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios where there is no direct or reasonable connection with the original processing purpose, we will inform you again and obtain your consent when we collect and use your personal information.
b. When you use third-party services accessed by this product, you may need to submit your personal information (including your identity information, contact information, transaction information, payment information and other sensitive personal information in some cases). You authorize us to provide this information to third parties that provide services to you, and authorize us to obtain relevant information from third parties indirectly. If you refuse us to collect such information, we will not be able to provide you with relevant functions and services, but it will not affect your use of core product and service functions. If you refuse to provide the above information or refuse to authorize, you may not be able to use the corresponding products or services of our affiliated companies, or display relevant information, but it will not affect the use of StormProxies's core services.
c. Third-party SDK Directory
1.5 Personal information collected and used without consent in accordance with the law
Please understand that in the following circumstances, in accordance with laws, regulations and relevant national standards, we collect and use your personal information without your authorization and consent:
a. Directly related to national security and national defense security;
b. Directly related to public security, public health and major public interests;
c. Directly related to criminal investigation, prosecution, trial and execution of judgments;
d. For the purpose of safeguarding the major legitimate rights and interests of the subject of personal information or other individuals, such as life and property, but it is difficult to obtain the consent of the person concerned;
e. The personal information collected is disclosed by you to the public on your own initiative;
f. The personal information collected is from legally disclosed information, such as legal news reports, government information disclosure and other channels;
g. Necessary for signing or performing a contract according to your requirements;
h. Necessary for maintaining the safe and stable operation of the software and related services, such as discovering and handling faults in the software and related services;
i. Necessary for legal news reporting;
j. Necessary for academic research institutions When it is necessary to conduct statistical or academic research in the public interest and provide the results of academic research or description to the outside, the personal information contained in the results will be de-identified;
k. Other circumstances stipulated by laws and regulations.
Please note that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information or when we use data that cannot be linked to any specific personal information in combination with other personal information of yours, this information will be treated and protected as your personal information in accordance with this Privacy Policy during the period of combined use. According to legal provisions, sharing and transferring personal information that has been de-identified and ensuring that the data recipient cannot restore and re-identify the subject of the personal information does not constitute external sharing, transfer or public disclosure of personal information, and the processing of such data will not require separate notification to you and your consent.
2. Application and use of application permissions
2.1 To ensure the implementation and safe operation of StormProxies product functions, we may apply for or use operating system-related permissions and functions;
2.2 To protect your right to know, we display the relevant operating system permissions that may be applied for and used by the product through the following list, and you can manage the relevant permissions according to actual conditions;
2.3 According to product upgrades, the permissions and purposes of application and use may change. We will adjust the list in a timely manner according to these changes to ensure that you are informed of the application and use of permissions in a timely manner;
2.4 Please be aware that we may use third-party SDKs for the functional and security needs of our business and products, and these third parties may also apply for or use relevant operating system permissions;
2.5 During use, you may use H5 pages or applets developed by third parties. These plug-ins or applets developed by third parties may also apply for or use relevant operating system permissions due to business functions.
3. How we use similar technologies such as cookies
Cookies and device information identification and other similar technologies are commonly used technologies on the Internet. When you use StormProxies and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information when you visit and use this product. We promise not to use cookies for any other purpose other than the purposes described in this privacy policy. We use cookies and similar technologies mainly to achieve the following functions or services:
3.1 Ensure the safe and efficient operation of products and services
We may set authentication and security cookies or anonymous identifiers to enable us to confirm whether you have logged into the service safely, or whether you have encountered theft, fraud and other illegal activities. These technologies will also help us improve service efficiency and login and response speed.
3.2 Help you get an easier access experience
Using such technologies can help you save the steps and processes of entering search content (for example: record search)
3.3 Recommend, display and push content that may interest you
a. We may use such technologies to understand your preferences and usage habits and conduct data analysis to improve product services and recommend information or functions that users are interested in.
b. In StormProxies's sharing page, we may use cookies to record browsing activities for the purpose of recommending information to you, troubleshooting crashes, delays and other abnormalities, and exploring better service methods.
4. How do we entrust, share, transfer and publicly disclose personal information
4.1 Principles we need to follow
4.1.1 Authorization and consent principle:
We will not share your personal information without your consent, unless the shared personal information is de-identified and the third party sharing it cannot re-identify the natural person subject of such information. If the purpose of the third party's use of the information exceeds the scope of the original authorization and consent, they need to obtain your consent again.
4.1.2 Legality and minimum necessary principle:
The shared data must have a legal and legitimate purpose, and the shared data must be limited to what is necessary to achieve the purpose.
4.1.3 Security Prudence Principle:
We will carefully evaluate the purpose of third parties using shared information, conduct a comprehensive assessment of the security assurance capabilities of these partners, and require them to comply with the cooperation legal agreement. We will conduct strict security monitoring of the software tool development kit (SDK) and application program interface (API) used by partners to obtain information to protect data security.
4.2 Information that needs to be shared and transferred to ensure security and analyze statistics in order to realize the functions and/or services of [StormProxies]
4.2.1 Shared information for realizing functions and services
a. Real-name authentication function: If you become a user of StormProxies, in order to complete the authentication process, we need to access the real-name authentication process of "Alipay". You can conduct the relevant authentication process in [Personal Center]. If you refuse to provide it, you will not be able to use related functions such as IP, but it will not affect the normal use of other functions.
4.2.2 Shared information for security and analysis
a. Ensure safe use: We attach great importance to the security of accounts, services and content. To protect the account and property security of you and other users and to protect your and our legitimate rights and interests from unlawful infringement, we and our affiliates or service providers may share necessary equipment, account and log information.
b. Analyze product usage: To analyze the usage of our services and improve the user experience, we may share de-identified data on product sources and usage (crashes, flashbacks, usage time, etc.) with affiliates or third parties. These data are difficult to identify your personal identity in combination with other information.
c. Academic research and scientific research: To enhance the scientific research capabilities in related fields and promote the level of scientific and technological development, we may share de-identified or anonymized data with research institutes, universities and other institutions on the premise of ensuring data security and legitimate purposes.
5.2.3 Help you participate in marketing promotion activities
When you choose to participate in relevant marketing activities held by us, our affiliates or third parties, you may be required to provide your name, mailing address, contact information, and bank account information. This information is personal sensitive information. Refusing to provide it may affect your participation in related activities, but will not affect other functions. Only with your consent will we share this information with affiliates or third parties to ensure that you get consistent service experience in joint activities, or entrust a third party to redeem rewards to you in a timely manner.
4.2.4 Push
In order to adapt the message push function to the terminal model you use, we may share the mobile phone model, version and related information with terminal equipment manufacturers (Huawei, Xiaomi, Apple, Meizu, Vivo, Oppo, etc.) through technologies such as SDK.
4.2.5 Payment
The payment function is provided to you by the third-party payment institutions we cooperate with. Third-party organizations may need to collect your name, bank card type and number, expiration date and mobile phone number, etc. Bank card type and number, expiration date and mobile phone number are personal sensitive information, which are necessary for payment functions. Refusal to provide them will result in your inability to use this function, but will not affect the normal use of other functions.
4.3 Transfer
a. We will not transfer your personal information to any other third party unless you have obtained your explicit consent.
b. As our business continues to develop, we may merge, acquire, or transfer assets, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will require the successor to protect your personal information in accordance with laws and regulations and security standards no less stringent than those set forth in this Privacy Policy, otherwise we will require the successor to obtain your authorization and consent again.
4.4 Disclosure
a. We will not disclose your information publicly unless it is in compliance with national laws and regulations or with your consent. We will adopt security protection measures that meet industry standards when disclosing your personal information publicly.
b. When announcing penalties for illegal accounts or fraudulent behavior, we will disclose the information of the relevant accounts.
4.5 Personal information that is exempted from obtaining consent for sharing, transfer, and public disclosure in accordance with the law
Please understand that in the following circumstances, in accordance with laws, regulations and national standards, we do not need to obtain your authorization and consent to share, transfer, and publicly disclose your personal information:
a. Directly related to national security and national defense security;
b. Directly related to public safety, public health, and major public interests;
c. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
d. For the purpose of safeguarding your or other individuals’ major legitimate rights and interests such as life and property, but it is difficult to obtain their consent;
e. Personal information that you have disclosed to the public on your own;
f. Personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.
5. How we store personal information
5.1 Storage location
In accordance with the provisions of laws and regulations, we will store your personal information collected and generated during domestic operations within the territory of the People's Republic of China. At present, we will not transfer the above information abroad. If we transfer it abroad, we will comply with relevant national regulations or seek your consent.
5.2 Storage period
We will only retain your personal information for the period necessary for the purpose of providing StormProxies and services. We will retain the relevant information as long as you have not withdrawn, deleted or cancelled your account. After the necessary period, we will delete or anonymize your personal information, except as otherwise provided by laws and regulations.
6. How do we protect the security of your personal information?
6.1 We attach great importance to the security of your personal information and will endeavor to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent you from The personal information provided is improperly used or accessed, disclosed, used, modified, damaged, lost or leaked without authorization.
6.2 We will use encryption technology, anonymization processing and related reasonable and feasible means that are not lower than industry standards to protect your personal information, and use security protection mechanisms to prevent your personal information from malicious attacks.
6.3 We will establish a special security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology in a timely manner.
6.4 Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. We will try our best to ensure the security of the personal information you provide to us.
6.5 You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.
5.6 We will formulate emergency response plans and immediately launch emergency response plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, your suggestions for self-prevention and risk reduction, and your remedial measures in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant situation of the incident by push notification, email, letter, SMS and related forms. When it is difficult to inform you one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also report the disposal of user information security incidents in accordance with the requirements of relevant regulatory authorities.
6.7 We hereby remind you that once you leave StormProxies and related services, browse or use other websites, services and content resources, we will have no ability and direct obligation to protect any personal information you submit to software or websites other than StormProxies and related services, regardless of whether you log in, browse or use the above software or websites based on links or guidance from StormProxies.
7. Manage your personal information
We attach great importance to your management of personal information, and do our best to protect your rights to query, access, modify, delete, withdraw consent, cancel your account, and file complaints about your personal information, so that you can protect your privacy and information security.
7.1 Change or withdraw the scope of authorization
7.1.1 Change or withdraw sensitive permission settings
You can change the scope of consent or withdraw your authorization by turning off the camera, photo album and location permissions in the device's own operating system. After withdrawing authorization, we will no longer collect information related to these permissions.
7.1.2 Change or withdraw authorized information processing
Specific business functions and services will require your information to be completed. When you withdraw your consent or authorization, we will no longer be able to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect our previous processing of personal information based on your authorization.
7.2 Access, delete, and correct your personal information
7.2.1 Access personal account information
You can query and access your avatar, nickname, and author introduction. You can query and access them in [Me]-[Edit Personal Information]. However, for security and identity identification (such as number appeal service), you may not be able to modify the initial registration information submitted when registering. If you really need to modify such registration information, you can go to https://www.stormproxies.cn to log in to [Personal Center] - click on the avatar in the upper right corner - [Account Settings] to make changes.
7.3 How to cancel your account
You can apply to cancel your account. If you apply, please send an email to support@stormproxies.cn and we will process it as soon as possible. Before you cancel your account, we will verify your personal identity, security status, device information, etc. You are aware and understand that canceling your account is irreversible. After you cancel your account, we will delete your relevant information or anonymize it, except as otherwise provided by laws and regulations.
7.4 Access to Privacy Policy
You can view the full content of this Privacy Policy on the registration page, or by logging into your personal account [My] - [About Us] - [Privacy Policy].
7.5 Complaints and Reports
You can file a complaint or report in accordance with our publicized system. If you believe that your personal information rights may be infringed, or if you find clues of infringement of your personal information rights, you can contact us through [support@stormproxies.cn]. After verification, we will respond to your complaint and report within [15] working days.
7.6 Notification of cessation of operation
If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operation by sending you a notification or announcing it, and delete or anonymize your personal information held.
7.7 Changes
Once there are any major changes to this Privacy Policy, we will make reasonable efforts to inform all users, such as by posting a notice on this Platform; but you should check this Privacy Policy regularly to view the changes. We will also update the "Updated Date" and "Effective Date" at the top of this Privacy Policy. Your continued access or use of this Platform after this Privacy Policy is updated will be deemed as your acceptance of the updated Privacy Policy. If you do not agree to the updated Privacy Policy, you must stop accessing or using this Platform.
8. Terms for Minors
Our services are mainly for adults. Minors should not use this service without the consent of their parents or guardians. We protect the personal information of minors in accordance with the relevant national laws and regulations, and will only collect, use, share or disclose the personal information of minors when permitted by law, with the explicit consent of parents or other guardians, or when necessary to protect minors; if we find that we have collected the personal information of minors without obtaining verifiable guardian consent in advance, we will try to delete the relevant information as soon as possible.
b. If you are the guardian of a minor, when you have any questions about the personal information of the minor you are guarding, please contact us through the contact information disclosed in this privacy policy.
9. Amendment and Notice of Privacy Policy
9.1 In order to provide you with better services, StormProxies and related services will be updated and changed from time to time. We will revise this Privacy Policy from time to time. These revisions will constitute part of this Privacy Policy and have the same effect as this Privacy Policy. Without your explicit consent, we will not reduce your rights under this Privacy Policy currently in effect.
9.2 After this Privacy Policy is updated, we will issue an updated version on StormProxies and remind you of the updated content through the official website (https://www.stormproxies.cn) announcement or other appropriate means before the updated terms take effect, so that you can keep abreast of the latest version of this Privacy Policy. We will also update the "Update Date" and "Effective Date" at the top of this Privacy Policy in a timely manner. If you continue to use this service, you will be deemed to have agreed to accept the entire content of this revised Privacy Policy. However, if the updated content requires obtaining your additional user information, we will still ask for your consent again in a prominent manner.
10. Contact Us
a. If you have complaints, suggestions, or questions about personal information protection, you can send your questions to support@stormproxies.cn. We will review the issues involved as soon as possible and reply as soon as possible after verifying your user identity.
b. If you have any questions, comments, or suggestions about this platform or the content of this privacy policy, you can send an email to support@stormproxies.cn. We will provide feedback in a timely manner after receiving your email.
Company Name: 江苏康慧美网络科技有限公司
Contact Address: Room 1123, Building 02, Haixiacheng Haixiayun Technology Park, No. 98 Shuangzha Road, Jianye District, Nanjing City, Jiangsu Province
Contact Email: support@stormproxies.cn
