PandaPlan-Privacy Policy

    Updated on: February 10, 2023

        PandaPlan (English name: PandaPlan) has always made a solemn commitment to protect the personal information and privacy of users (hereinafter referred to as "users" or "you") who use the products and services of Panda Plan (hereinafter referred to as "Panda Plan Services"). When you use the panda planning service, we may collect and use your relevant personal information. We hope to explain to you through the Panda Planning Privacy Policy (hereinafter referred to as the "Policy") the corresponding processing rules and other related matters when we collect and use your relevant personal information, so as to better protect your rights and interests.

        Before using the panda planning service, you must carefully read and thoroughly understand this policy, especially the terms marked in bold. You should focus on reading, and use it after confirming that you fully understand and agree. If you do not agree with the contents of this policy, it may cause the panda planning service to be unable to operate normally or to achieve the service effect we intend to achieve. You should immediately stop accessing/using the panda planning service.

        After reading this policy, if you have any questions about this policy or matters related to this policy, you can contact us through the feedback channels listed in the "How to contact us" section of this policy, and we will give you an answer as soon as possible.

        In order to facilitate your reading and understanding, we have defined special terms:

        Noun interpretation

        Personal identity information refers to all kinds of information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. Personal identity information includes name, date of birth, ID card number, personal biometric information, address, communication contact information, communication record and content, account password, property information, credit information, whereabouts, accommodation information, health physiology information, transaction information, etc.

        Non-personal identity information: refers to the personal information recorded and obtained, which can not directly or indirectly identify the identity of a specific natural person, including personal identity information provided through de-identification, anonymization or aliasing.

        Personal sensitive information: refers to personal information that may endanger personal and property safety and easily lead to personal reputation, physical and mental health damage or discriminatory treatment once leaked, illegally provided or abused. Personal sensitive information includes ID number, personal biometric information, bank account number, communication record and content, property information, credit information, track, accommodation information, health physiological information, transaction information, personal information of children under the age of 14 (including), etc.

        De-identification: After collecting personal information, we will take technical and management measures to store the de-identified data separately from the information that can be used to recover and identify individuals, and ensure that individuals are not re-identified in subsequent personal information processing.

        Anonymization refers to the process that the subject of personal information cannot be identified and the processed information cannot be recovered through technical processing of personal information.

        Cookie (cookie file): Cookie is a small text file placed by the website server in the client (your computer, mobile phone or other smart terminal) when you browse the web page. When you visit the corresponding website again, the website can identify your browser through the cookie. Cookies may store user preferences and other information. You can configure your browser to reject all cookies or to display a prompt when the website sends cookies. However, some website functions or services may not work properly without cookies.


    This policy will help you understand the following:

        1、 How do we collect and use personal information

        2、 How do we use COOKIES or similar technology

        3、 Personal information that we may share, transfer and disclose

        4、 How do we save your personal information

        5、 How do we protect your personal information

        6、 Self-protection of personal account information

        7、 Your rights

        8、 How do we deal with children's personal information

        9、 How to transfer your personal information globally

        10、 How to update this policy

        11、 How to contact us


    1、 How do we collect and use personal information

        We collect your personal information mainly to make it easier and more satisfactory for you and other users to use the panda planning service. The goal of Panda Plan is to provide all Internet users with safe, interesting and instructive online experience, and this information will help us achieve this goal. We may collect your personal information based on the following business functions, system functions and purposes:

        1. Main business functions

        (1) Register as user

        The business function we provide needs to rely on some information to run. If you choose to use this business function, you need to provide us or allow us to collect the necessary information, including: mobile phone number.

        (2) Schedule

        If you choose to use this business function, you only need to edit any title to start using it. In order to enable you to use this business function normally and completely, we may need you to provide or allow us to collect information, including: comments you use the recording function to edit, the time you edit this content, the importance and reminder time you set for this item, the time and duration you complete the recording, and the equipment information you edit this content. Of course, we will not verify the authenticity of the above information you edited.

        Main system functions

        You can provide us with or allow us to collect the following information at your own discretion by improving your personal data: avatar and nickname information. This information is not necessary for the use of various business or system functions, but it is of great significance for improving service quality, developing new products or services, etc. We will not force you to provide such information, and your refusal will not have an adverse impact on the use of this business function.

        3. Carry out internal data analysis and research, third-party SDK service providers statistical services, and improve our products or services

        When you use the functions provided by a third party in the Panda Planning APP, we may access the software development kit (SDK) provided by the third party to realize the relevant functions. At this time, the third-party SDK service provider may collect your relevant personal information. The aforesaid service providers' collection and processing of information shall comply with their own privacy provisions, and shall not apply to this policy. In order to maximize the security of your information, we recommend that you check the privacy terms before using any third-party SDK services. In order to protect your legitimate rights and interests, if you find that there are risks in such SDK or other similar applications, we recommend that you immediately terminate relevant operations and contact us in a timely manner. We collect data based on your interaction with us and your choices, including your privacy settings and the products and functions you use. The data we collect may include SDK/API/JS code version, browser, Internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, iOS advertisement identifier (IDFA), android advertisement identifier, network card (MAC) address, international mobile device identifier (IMEI), device model, terminal manufacturer, terminal device operating system version Session start/stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage. We will strictly detect access to third-party SDKs, and publicly explain the latest information about access to SDKs to you. Please refer to the official privacy policy of third-party SDKs for details.

        4. In order to provide better products and/or services and improve the user experience, we may collect information about your use of products and/or services (including the way of use), including:

        (1) Device information

        In order to provide better products and/or services and improve user experience, we will collect device attribute information (such as your hardware model, operating system version, device configuration, unique device identifier, international mobile device ID ME |, network device hardware address MAC, advertising identifier DFA, etc.), Device connection information (browser type, telecom operator, language used) and device status information (such as device sensor data, device application installation list), device sensor (gyroscope, acceleration, gravity, linear acceleration), shear board Information about the location of the device (such as IP address, GPS/Beidou location information, and sensor information such as Wi-Fi access point, Bluetooth, and base station that can provide relevant information). For the information collected from your various devices, we may associate them so that we can provide you with consistent services on these devices. We may associate your device information or phone number with your platform account.

        (2) Log information

        When you use the products and services of this platform, our server will automatically record some information, such as your use of our products and/or services, address, URL of the service accessed, type of browser and language used, information about downloading, installing or using mobile applications and software, information about communicating with communication software, and date, time and duration of accessing the service. Please note that separate equipment information, log information, etc. cannot identify the identity of a specific natural person. If we use this kind of non-personally identifiable information in combination with other information to identify a specific natural person, or use it in combination with personally identifiable information, this kind of non-personally identifiable information will be considered as personally identifiable information during the combined use. Unless otherwise authorized by you or stipulated by laws and regulations, we will anonymize and de-identify such user information.

        (3) We collected your personal information through indirect access

        When you use the partner services of this platform through this platform, you agree that we will receive, use, summarize and analyze your personal information provided to us by your authorized consent from our partners according to the actual business and cooperation needs.

        (4) Function permissions

        You can also use a third-party account to log in and use it. You will authorize us to obtain the public information (avatar, nickname and other information authorized by you) registered on the third-party platform for binding with the Panda Planning account, so that you can directly log in and use the product and related services.

        a) When you need to set the custom background of the widget, you need to call the permissions of the camera and the album when you choose to take photos or select photos in the album;

        b) When users need to turn on the reminder function, they need to call the notification authority

        5. Other uses

        When we want to use the information for other purposes not specified in this strategy, we will seek your consent in advance.

        When we want to use the information collected for a specific purpose for other purposes, we will ask your consent in advance.

        2、 How do we use cookies and similar technologies

        (1) Cookies

        To ensure the normal operation of the website, we will store a small data file named Cookies on your computer or mobile device to store the unique cookies data sent to you by the web server. It can only be read by the web server in your domain that publishes cookies. Cookies usually contain identifiers, site names, and numbers and characters. With cookies, we can store your preferences, help you optimize your choices, interact with us, judge your login status and account or data security.

        We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer. Most web browsers have the function of blocking cookies. You can usually modify the settings of your browser to reject cookies according to your needs. In addition, you can also clear all cookies saved in the software. However, if you do so, you need to change the user settings in person each time you visit our website, and the corresponding cookies information you recorded previously will also be deleted, which may have a certain impact on the convenience and security of the service you use.

        (2) Website beacon and pixel label

        In addition to cookies, we will also use website beacons, pixel labels and other similar technologies on the website. For example, the email we send to you may contain a click URL that links to the content of our website. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. Website beacon is usually a transparent image embedded in website or email. With the help of the pixel tag in the email, we can know whether the email is opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

        (3) Do Not Track

        Many web browsers have the Do Not Track function, which can publish Do Not Track requests to websites. At present, major Internet standards organizations have not established relevant policies to specify how websites should respond to such requests. But if your browser has Do Not Track enabled, all our websites will respect your choice.

        3、 How do we share, transfer and publicly disclose your personal information

        (1) Share

        We will treat your information with high diligence and obligation. Except for the following circumstances, we will not share your personal information with any other company, organization or individual without your consent:

        1. After obtaining your explicit consent or authorization, we will share your personal information with other parties.

        2. According to the provisions of laws and regulations, the need to resolve litigation disputes, or the mandatory requirements of the competent government departments or judicial decisions, you must share your personal information externally;

        3. To the extent permitted by laws and regulations, it is necessary to provide it to protect the interests, property or safety of us, our affiliates or partners, you or other users of the platform or the public from damage;

        4. Only by sharing your information can we realize the core functions of our products or services or provide the services you need;

        5. Handle your disputes or disputes with others according to your needs;

        6. It is provided in accordance with relevant agreements signed with you (including online electronic agreements and corresponding platform rules) or other legal documents;

        7. Use based on academic research;

        8. It is used based on the social and public interests in compliance with laws and regulations.

        (2) Transfer

        We will not transfer your personal information to any company, organization or individual, except for the following:

        1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

        2. When it comes to mergers, acquisitions or bankruptcy liquidation, if it comes to the transfer of personal information, we will ask the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will ask the company or organization to ask you for authorization again.

        (3) Public disclosure

        We will only publicly disclose your personal information under the following circumstances:

        1. After obtaining your explicit consent;

        2. Disclosure based on law: We may publicly disclose your personal information under the circumstances of laws, legal proceedings, litigation or mandatory requirements of the competent government departments.

        Please understand that under the following circumstances, according to laws and regulations and relevant national standards, we do not need your authorization to collect and use your personal information:

        1. Directly related to national security and national defense security;

        2. Directly related to public safety, public health and major public interests;

        3. Directly related to criminal investigation, prosecution, trial and execution of judgments;

        4. For the purpose of safeguarding the life, property and other important legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain my consent;

        5. Your personal information collected is disclosed to the public by yourself;

        6. Collect your personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;

        7. It is necessary to sign or perform the contract according to your requirements;

        8. Necessary for maintaining the safe and stable operation of software and related services, such as finding and handling software and related service failures;

        9. Necessary for legal news reporting;

        10. It is necessary for academic research institutions to carry out statistical or academic research based on the public interest, and to de-identify the personal information contained in the results when providing the results of academic research or description;

        Other circumstances stipulated by laws and regulations.

        According to the law, sharing, transferring and disclosing personal information that has been de-identified, and ensuring that the data receiver cannot recover and re-identify the information subject, does not belong to the external sharing, transfer and public disclosure of personal information. The storage and processing of such data will not need to notify you and obtain your consent.

    4、 How do we save your personal information

        (1) Shelf life

        During the use of this product and service, we will continue to save your personal information for you. If you cancel your account or actively delete the above information, we will save your information in accordance with laws and regulations such as the Network Security Law: for the log information related to you recorded by us, we will save it for 6 months; If you cancel the account of this platform, the retention time of the above information shall not exceed 90 days; The processed and desensitized data can be permanently stored on the server. When your personal information exceeds the storage period, we have the right to delete or anonymize your personal information.

        (2) Save Region

        Your personal information is stored in the People's Republic of China. If some products or services involve cross-border, we need to transmit your personal information to overseas, we will strictly comply with the provisions of laws and regulations, and ensure the security of your personal information.

        5、 How do we protect your personal information

        (1) We have used industry-standard security protection measures to protect the personal information you provide from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, the exchange of data (such as credit card information) between your browser and the Service is protected by SSL encryption; At the same time, we provide https safe browsing mode for our website; We will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanisms to prevent malicious attacks on data; We will deploy access control mechanism to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.

        (2) We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purpose stated in this policy, unless the retention period needs to be extended or permitted by law.

        (3) The Internet is not an absolutely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such means. Please use complex passwords to help us ensure the security of your account.

        (4) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.

        (5) In the event of an unfortunate personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can take to prevent and reduce risks independently, and the remedial measures for you in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant information of the event by mail, letter, telephone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take reasonable and effective ways to release the announcement.

        At the same time, we will also actively report the disposal of personal information security incidents according to the requirements of regulatory authorities.

        6、 Self-protection of personal account information

        Your account has security protection function. Please keep your account and password information properly, and do not tell others about your password. If you find that your personal information is leaked, especially your account and password, please change your password immediately or contact us through the way specified in Article 10, so that we can take corresponding measures:

        Once a personal information security incident occurs, we will immediately inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can take to prevent and reduce risks independently, and the remedial measures for you according to the requirements of laws and regulations. At the same time, we will timely inform you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take reasonable and effective ways to release the announcement. At the same time, we will also actively report the disposal of personal information security incidents according to the requirements of regulatory authorities.

        Please save or back up your text, pictures and other information in time. You need to understand and accept that the system and communication network you use to access our services may have problems due to factors beyond our control.


    7、 Your rights

        In accordance with the relevant laws, regulations and standards of China and the general practices of other countries and regions, we guarantee that you exercise the following rights with respect to your personal information:

        (1) Access your personal information

        You have the right to access your personal information, except for the exceptions specified by laws and regulations. If you want to exercise the data access right, you can access it by yourself in the following ways:

        1. Personal data -- If you want to access or edit the personal data information in your account, change your password, add security information or close your account, you can perform such operations through [Settings] -- [Click avatar] -- [Personal data] in our product [Panda Planning].

        (2) Correct your personal information

        When you find that there is an error in the personal information we handle about you, you have the right to ask us to make corrections. You can apply for correction through the methods listed in "(I) Access your personal information".

        If you cannot correct these personal information in the above way, you can contact us at any time, and we will reply to your request for correction within 15 days.

        (3) Delete your personal information

        In the following cases, you can request us to delete personal information:

        1. If we handle personal information in violation of laws and regulations;

        2. If we collect and use your personal information without your consent;

        3. If our behavior of handling personal information violates the agreement with you;

        4. If you no longer use our products or services, or you cancel your account;

        5. If we no longer provide you with products or services.

        If we decide to respond to your request for deletion, we will also notify the entities that have obtained your personal information from us and require them to delete it in a timely manner, unless otherwise specified by laws and regulations, or these entities have obtained your independent authorization.

        When you delete information from our service, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.

        (4) Change the scope of your authorization

        Each function needs some basic personal information to complete. For the collection and use of additional collected personal information, you can give or withdraw your authorization at any time.

        After you withdraw your consent, we will not process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous personal information processing based on your authorization.

        [Panda Planning] will not send any commercial advertisements to you at present.

        (5) Individual information subject cancels account

        If you need to cancel your Panda Planning account, you can contact us and propose to us. We will cancel your account after verifying your true identity.

        After canceling the account, we will stop providing you with products or services and delete your personal information according to your requirements, unless otherwise specified by laws and regulations.

        (6) Automatic decision of constraint information system

        In some business functions, we may only make decisions based on the non-manual automatic decision-making mechanism including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate remedies.

        (7) Respond to your above request

        To ensure security, you may need to provide a written request, or prove your identity in other ways. We may ask you to verify your identity before processing your request.

        We will reply within 15 days. In principle, we will not charge for your reasonable request, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. We may refuse requests that are repeated without reason, require too many technical means (for example, need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involve information stored on backup tapes).

        In the following cases, according to the requirements of laws and regulations, we will not be able to respond to your request:

        1. Related to our performance of obligations under laws and regulations;

        2. Relating to national security and national defense security;

        3. Those related to public safety, public health and major public interests;

        4. Relating to criminal investigation, prosecution and trial;

        5. We have sufficient evidence to show that you have subjective malice or abuse of rights;

        6. For the purpose of safeguarding the life, property and other important legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain my consent;

        7. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;

        8. Involving trade secrets.


    8、 How do we deal with children's personal information

        Our products, websites and services are mainly for adults. Children cannot create their own user accounts without the consent of their parents or guardians.

        For the collection of children's personal information with the consent of parents, we will only use or publicly disclose this information if it is permitted by law, explicitly agreed by parents or guardians or necessary to protect children.

        Although local laws and customs have different definitions of children, we regard anyone under the age of 14 as a child.

        If we find that we have collected the personal information of children without the prior consent of verifiable parents, we will try to delete the relevant data as soon as possible.



    9、 How to transfer your personal information globally

        In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.

        Since we provide products or services through resources and servers all over the world, this means that after obtaining your authorization and consent, your personal information may be transferred to or accessed from overseas jurisdictions in the countries/regions where you use products or services.

        Such jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will ensure that your personal information is adequately and equally protected in the People's Republic of China. For example, we will ask you to agree on the cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.


    10、 How to update this policy

        Our privacy policy may change, and you will be reminded to read and confirm it through the pop-up window.

        Without your explicit consent, we will not reduce your rights under this privacy policy. We will publish any changes to this policy on this page.

        For major changes, we will also provide more prominent notices (including for some services, such as providing us with an email address, or opening WeChat reminder or QQ reminder, we will send you a notice via email or WeChat or QQ to explain the specific changes in the privacy policy).

        The major changes referred to in this policy include but are not limited to:

        1. Significant changes have taken place in our service model. For example, the purpose of processing personal information, the type of personal information processed, and the use of personal information;

        2. Significant changes have taken place in our ownership structure and organizational structure. Such as changes in owners caused by business adjustment, bankruptcy and merger, etc;

        3. The main objects of personal information sharing, transfer or public disclosure have changed;

        4. Your right to participate in personal information processing and the way you exercise it have changed significantly;

        5. When the department responsible for handling personal information security, contact information and complaint channel change;

        6. When the personal information security impact assessment report indicates that there is a high risk.

        We will also archive the old version of this policy for your reference.

        If you continue to use any of our services or visit our relevant websites after the adjustment or change of this policy, we believe that this means that you have fully read, understood and accepted the revised policy and are bound by it.
        

    11、 How to contact us

        Contact Email: 52292959@qq.com