TalkLine Privacy Policy
Date of issuance: September 18, 2023
Date of effectiveness: September 18, 2023
Abstract
Thank you for using TalkLine!TalkLine is an online conference product provided by Shenzhen ZEGO Technology Co., Ltd. (hereinafter referred to as "ZEGO Technology"). We attach great importance to the privacy and personal information security protection of users (hereinafter referred to as "you"). We will strictly comply with legal and regulatory requirements, take corresponding security measures, and do our best to protect your personal information and privacy security. In view of this, we have formulated this TalkLine Privacy Policy (hereinafter referred to as "this Policy/this Privacy Policy") and draw your attention to:
This policy applies to all functions and services of the TalkLine products we provide. Please carefully read and thoroughly understand this policy before using the various features or services we provide. Only after confirming your full understanding and agreement can you start using it.
In order to protect your relevant rights, the TalkLine Privacy Policy (hereinafter referred to as 'this Privacy Policy') will explain to you how TalkLine will collect, use and store your personal information and what rights you have. Please read, understand and agree to this policy and relevant supplementary documents before using TalkLine.
Before using various TalkLine services, you must carefully read and thoroughly understand this privacy policy, especially the terms marked in bold / bold underline. You should focus on reading and start using it after confirming your full understanding and consent. Please note that we will review and update our policies from time to time, so the relevant measures will change accordingly. We urge you to visit this page regularly to ensure that you are always aware of the latest version of our privacy policy.
By using or continuing to use the TalkLine service, you agree that we collect, use, store and share your information in accordance with this privacy policy.
This Privacy Policy covers the following topics:
1. What types of information we collect
2. How we use cookies and similar technologies
3. How we store this information
4. How we protect this information
5. How we use this information
6. Information sharing and external provision
7. Your rights
8. How we transfer your personal information globally
9. How we deal with the personal information of minors
10. Changes to this Policy
11. Contact us
Terms and definitions:
TalkLine: TalkLine is a cloud video conference software for global individuals and enterprises independently developed by Shenzhen ZEGO Technology Co., Ltd. (hereinafter referred to as 'ZEGO technology'). TalkLine products and services, including TalkLine Official website TalkLine Official website, TalkLine management background TalkLine management background, TalkLine Mini-Program , web page (https://meeting.talkline.cn/login) and TalkLine client (including Windows, Mac, iOS, Android versions).
Enterprise super administrator: refers to the individual assigned by instant technology and having the operation authority of talkline management background system. Enterprise super administrators can manage the background through talkline, add users or allow individual users to join the application, make individual users become their enterprise users,and authorize enterprise users to become their ordinary administrators.
Ordinary administrator: refers to the individual designated by the enterprise super administrator or ordinary administrator who has the operation authority of the enterprise talkline management background system; Refers to individuals who register, log in, use talkline products and services and obtain administrative rights. Ordinary administrators can add or allow individual users to join as their enterprise users through talkline management background.
Individual user: refers to the individual who uses personal mobile phone number, wechat and email to register and uses talkline.
Enterprise user: refers to the individual or organization who registers, logs in and uses TalkLine products and services and may obtain management authority; Refers to an individual user who voluntarily submits an application to join the enterprise and is approved by the enterprise super administrator or ordinary administrator; It refers to the individual users who are actively added to the enterprise organization by the enterprise super administrator or ordinary administrator. Including but not limited to legal persons, government agencies, other organizations, partnerships or individual businesses (hereinafter referred to as 'enterprise users').
1. What types of information we collect
In order to provide services to you and enterprise users, optimize our services and ensure account security, talkline will collect the information you actively provide, authorize or use the services in the following ways:
1) Registered personal account
- When you choose a mobile phone number to register, you need to enter your mobile phone number and name to create this service account for you according to your requirements;
- When you choose email registration, you need to enter your email address and bind your mobile phone number to create this service account for you according to your requirements;
- When you choose to register with wechat (wechat ID), you need to provide your wechat number, wechat ID, avatar and your mobile phone number to establish this service account for you according to your requirements.
2) Registered enterprise user account
When you need to register as an enterprise user, you need to provide the creator and enterprise related information so that we can create an enterprise user account for you. Or first register as an individual user and then apply to join the enterprise. When the enterprise administrator passes, he can become an enterprise user.
Before uploading, authorizing and managing personal information such as the name and mobile phone number. email address and WeChat accounts of individual users, enterprise users should ensure that they have obtained the explicit consent of individual users in advance, upload, authorize and manage only the personal user information necessary to achieve the purpose of operation and function, and have fully informed individual users of the purpose, scope and use mode of relevant data collection.
When you are an enterprise user, in order to provide talkline service, we will collect the information and data you submit or generate in the process of using talkline (hereinafter referred to as 'enterprise controlled data'). The enterprise controlled data may include:
- The name, mobile phone number, email address and WeChat account submitted or required by enterprise users to register enterprise individual users;
- The name of the enterprise and department to which the individual user belongs is related to the enterprise user or the information assigned to the individual user by the enterprise user; Organizational structure data submitted by other enterprise users.
3) Information collected while you are using our Services
To provide you with our Services, maintain the normal operation of our Services, improve and optimize our Services, and protect your account security, we shall collect the following information from you when you use our Services:
- Device information: according to the device model and authority granted during the installation and use of talkline service, we will collect the relevant information of devices using talkline service, including hardware device model, system type, system version, device screen size, hardware device serial number, MAC address, unique device identification code (IMEI, Android ID, IDFA, openudid, SIM card IMSI information), time zone, language TalkLine software version number
- Microphone or camera permission: when you use the audio and video conference function, you need to turn on the microphone or camera permission. If you do not turn on the corresponding permissions, you will not be able to use the camera or microphone related functions. When you use audio and video conferencing and screen sharing (including shared whiteboard), you need to provide audio or video data, including shared picture and sound. As a sharer, you can mark and save screenshots during screen sharing, or save shared whiteboard images. These information will only be saved in your local device.
- Code scanning function: when you use the code scanning function, you need to turn on the camera permission. At this time, we will collect your code scanning records to show you the code scanning results. If you refuse to open the above permission or provide the above information, we will not be able to provide you with code scanning function.
- Add meeting schedule: when you choose to add the meeting schedule (including meeting ID, meeting subject, start time, host, meeting link, reminder before start and reminder time) to your calendar, we need to obtain the read-write permission of your calendar, otherwise we can't add the above information to your calendar.
- Custom virtual background: when you choose to use the custom virtual background function, you need to upload a photo or a video from your device as your personal virtual background. At this time, we will ask you to open the photo album permission. If you do not provide the above information or refuse to open the photo album permission, you will not be able to use the custom virtual background function.
- Permission to access device storage: When you use TalkLine's file sharing, meeting recording, uploading, and downloading services, you will need to grant TalkLine read and write access to your device's storage; otherwise, you will not be able to use such services.
- Permission to read the phone state: When you use TalkLine's features such as meeting reminders and dial-in, TalkLine needs to get your phone's current state,for making/receiving calls
- Log information:
when you use TalkLine service, we may automatically collect log information through cookies (cookies refer to small data documents transmitted from the website to your computer hard disk), web beacon or other methods, including:
- Activities of your account during your use of our Services, such as the meetings or live broadcasts you attend and how you join them, and other login information.
- Information about the meetings you schedule or live streaming sessions you create using our Services, the user accounts used to hold the meetings or live streaming sessions, and the associated data and time duration.
- Information (metadata) contained in the content you share through our Services, the shared files and recordings that you upload.
- Data about your media traffic while you are using our Services, which we collect for traffic monitoring purposes.
- Get the software installation list: when you use wechat to log in to TalkLine, or share the created conference to WeChat, Enterprise WeChat, QQ and DingTalk platforms, we need to confirm the installation status of the above software for fast jump between software and normal use of conference functions.
- Bind WeChat / email: when you select bind WeChat / email in settings, we will get your wechat and email. It is convenient for you to receive the notice of TalkLine conference service number and know the relevant information of the conference in time.
- Beauty: when you use the beauty function, we will need to process some of your facial eigenvalue information locally to achieve the effect of facial beauty. You need to authorize us to use the camera. We will only process relevant facial eigenvalue information offline in your local device, and will not upload, store in the background or share such information with third parties.
4) Information Collected by Third-Party SDKs (see Appendix I for details)
Please understand that the functions and services we provide to you are constantly updated and developed. If a function or service is not in the above description and needs to collect your information, we will separately explain the content, scope and purpose of information collection to you through page tips, interactive processes, website announcements, etc., so as to obtain your consent.
5) Features for clearing cache and uploading logs
In the 'auxiliary functions' column of 'Settings', we provide the function of emptying the cache, which is used to clear the cache files generated by shared files and audio and video downloads during your use of TalkLine; The upload log function is used to upload the log information of app (using account behavior, meeting information, uploaded file content, media data) and SDK data information. These information will be used to troubleshoot problems and provide you with better services.
6) Application permission application and usage description (see Appendix II for details)
We may apply for or use the relevant permissions of the operating system to ensure the functions of TalkLine products and safe and stable operation; In order to protect your right to know, we display the relevant operating system permissions that may be applied for and used by the product through the list. You can manage the relevant permissions according to your actual needs; According to the product upgrade, the type and purpose of application and use permission may change. We will adjust the list in time according to these changes to ensure that you know the application and use of permission in time.
2. How we use cookies and similar technologies
We use cookies and other similar technologies to enhance your experience of using this service. When you use this service, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this service. We undertake not to use cookies for any purpose other than those stated in this privacy policy. We use cookies and similar technologies mainly to realize the following functions or services:
- Ensure the safe and efficient operation of products and services: we may set cookies or anonymous identifiers for authentication and security to enable us to confirm whether you log in to the service safely, or whether you encounter embezzlement, fraud and other illegal acts. These technologies will also help us improve service efficiency, login and response speed;
- Help you get an easier access experience: using this technology can help you avoid repeating the steps and processes of filling in your personal information and entering search content (example: historical meeting ID, etc.).
Most browsers provide users with the function of clearing browser cache data. You can clear the corresponding data in the browser setting function. If you clear it, you may not be able to use the cookie dependent services or corresponding functions provided by us.
3. How we store this information
We use the information we collect for the following purposes in strict compliance with the laws and regulations and our agreements with our users. If we use your information for purposes other than the ones listed below, we will explain to you and ask for your consent.
1) Where the information is stored
In accordance with laws and regulations, we will store personal information collected and generated in China in Alibaba cloud's Shanghai computer room.
2) Duration of information storage
Generally speaking, we only retain your personal information for the time necessary to achieve the purpose. We will not view or use the user, file and other information you keep. For example, the storage period of the equipment information and log information we collected is 6 months, and the user's account registration information will be stored until the user voluntarily logs off the account. After the time limit is exceeded, the corresponding information will be deleted.
When the operation of our products or services stops, we will notify you in the form of push notice and announcement, delete your personal information or anonymize it within a reasonable period of time, immediately stop the collection of personal information, and close the third-party application service interface to avoid the collection and continuous use of personal information by third-party services.
4. How we protect this information
1) Information security
We strive to ensure the information security of users to prevent the loss, improper use, unauthorized access or disclosure of information.
2) Encryption technologies
We will use various security protections within a reasonable security level to keep information secure. For example, we use encryption technologies (e.g., SSL /TLS), anonymization processes, and other methods to protect your personal information.
3) Security certification
At present, we have passed the evaluation and filing of national information security level protection (level III), and have met the requirements of international authoritative certification of ISO 27001 (information security management system), ISO 27701 (Privacy Information Management System) and iso27018 (public cloud personal information protection management system) in terms of information security, and have obtained the corresponding certification.
4) Management system and process
We have established a dedicated management system, process, and organization to safeguard information security. For example, we strictly limit the scope of people who have access to information, require them to comply with confidentiality obligations, and conduct audits.
5) Remedial measures
In the event of personal information leakage and other information security incidents, we will start the emergency plan to prevent the incident from deteriorating, and inform you of the incident, the possible impact of the incident on you, and the remedial measures we will take by push notifications, announcements, and other means. We will also report our handling of such personal information security incidents in accordance with laws and regulations.
5. How we use this information
We collect information about you and your use of our Services in order to provide better services to our users. We may use the information we collect for the following purposes:
1) To safeguard information security
To protect the security of your information and that of all our users, we use relevant information to help us improve the security and reliability of our Services, including detecting, preventing, and responding to fraud, abuse of the system, illegal activities, security risks, and technical issues that could cause harm to TalkLine, our users or the public.
2) To communicate with you
We may use the information we collect from you (include the email address, cell phone number, WeChat account.) to communicate with you directly. For example, we may inform you about upcoming changes or upcoming improvements to TalkLine. We may use such information to gain more knowledge about how you access and use our Services so that we can manage and upgrade our Services to meet your needs in a more targeted way. We may also contact you to get your feedback on our Services.
3) To comply with laws and regulations
-
In accordance with relevant laws and regulations and national standards, we may collect and use your personal information without your authorization under the following circumstances:
- Directly related to national security, national defense, and other national interests; Directly related to public safety, public health, public's right to know, and other significant public interests;
- Directly related to criminal investigations, prosecutions, trial, and sentence enforcement;
- For the purpose of safeguarding your or another individual's life, property, or other significant legal rights and interests, but it is difficult to obtain your consent;
- The personal information collected is disclosed by you to the public at your own discretion;
- Personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, and other sources;
- Necessary for the signing and perform the contract according to your requirements;
- Necessary for maintaining the safe and stable operation of our Services, such as the detection and handling of faults in our Service;
- Other circumstances stipulated by laws and regulations.
6. Information sharing and external provision
1) With your consent
We do not share or transfer your personal information to third parties, except for the following:
- With your prior authorization and consent, or the personal information shared or transferred is the information after de identification, and the sharing third party cannot re identify the personal information subject of such information;
- For the purpose of external processing, we may share your personal information with affiliated companies or other third-party partners (third-party service providers, contractors, agents, application developers, etc.), and let them process the above information for us in accordance with our instructions, privacy policies and other relevant confidentiality and security measures, and use it to provide you with our services, Achieve the purpose described in the 'how we use information' section. If we share your information with the above-mentioned affiliated companies or third parties, we will strictly monitor the software tool development kit (SDK) and application program interface (API) of the partners to obtain the information, so as to protect the data security. At the same time, we will use encryption, anonymization and other means to ensure the security of your information. For more information about the purpose, method and scope of third-party personal information processing, please see Annex I;
- When required to provide your personal information in accordance with relevant laws, rules, regulations, other regulatory documents, mandatory administrative law enforcement, or judicial requirements, we may disclose your personal information to the administrative law enforcement agencies, or judicial agencies according to the requested type of personal information and manner of disclosure. When we receive a request for information disclosure, we require legal documentation to support the request, subject to compliance with laws and regulations. We only provide data that law enforcement agencies and judicial agencies have the legal authority to obtain for specific investigative purposes. To the extent permitted by laws and regulations, the documents we disclose are protected by encryption measures.
2) As decided and managed by enterprises
We do not disclose the personal information we collect to the public. If we must disclose it to the public, we will inform you of the purpose of the disclosure, the type of information to be disclosed, and the sensitivity of the information that may be involved, and obtain your explicit consent. For our enterprise customers, it is up to the enterprises to decide and manage how the personal information of their individual members is disclosed in TalkLine or shared with the public.
3) To comply with law enforcement requirements
We may disclose your personal information as required by laws or in response to law enforcement requests from relevant authorities.
7. Your Rights
In accordance with the relevant Chinese laws, regulations, and standards, as well as the common practices of other countries and regions, you have the following rights to your personal information:
1) Access your personal information
You have the right to access your personal information, except for exceptions stipulated by laws and regulations. If you wish to exercise your right to access your personal information, you can do so yourself in the following ways:
-
Account information: if you want to access or edit the profile information in your account.
Via TalkLine apps: name, account information: home page → click 'Avatar' in the upper left or right corner to expand the pop-up window → click 'nickname' in the upper left corner or click 'personal center' to enter the personal center → browse avatar, nickname, version, enterprise, Department, mobile phone number, email and wechat;Via TalkLine Administration Console:
Home page → user management → user list → specific user information (can be modified or deleted). -
Your meeting information: you can access your associated meeting information.
Via TalkLine apps: Home page → today's agenda / all agenda;Via TalkLine Administration Console:
① Home page → meeting management → upcoming meeting / historical meeting → associated meeting information;
② Home page → user management → user list → details on the right side of specific user name → associated meeting information
We will provide you with other personal information generated in the process of using our products or services as long as we don't need too much investment.
2) Update your personal information
If there is any incorrect personal information about you in our service, you have the right to request us to correct it.
You can update your personal information as described in the section 'Access your personal information' above. If you are unable to do so, you may contact us using the contact information provided in this Policy. We will respond to your requests within 15 business days.
3) Delete your personal information
You may request us to delete your personal information from our Services in the following cases:
- If our process of your personal information violates laws and regulations.
- If we collect and use your personal information without obtaining your consent.
- If our process of your personal information violates our agreement with you.
- If you no longer use our Services, or if you cancel your account.
- If we no longer provide our Services to you.
If we, upon your request, delete your personal information, we will also request the entities who get your personal information from us to delete your personal information in a timely manner, unless otherwise required by law or regulation, or such entities have your independent authorization to keep your personal information.
When your personal information is deleted from our Services, we may not immediately delete the corresponding information from our backup system, but we will delete it when the backup is updated.
4) Change the scope of your consent
Each business function requires some basic personal information to be completed (see 'What types of information we collect' in this policy). For the collection and use of additional collected personal information, you can give or withdraw your authorization and consent at any time. You can contact us according to the contact information listed in this privacy policy. We will reply and carry out relevant operations within 15 working days after verifying your identity. When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous personal information processing based on your authorization.
5)Revoke your privacy policy consent authorization
You can revoke your privacy policy consent authorization at any time, and you can do so yourself by:
Home page → Click on the avatar in the upper left corner → System settings → Pull to the bottom and click on withdraw consent to TalkLine privacy policy
After revoking the privacy policy consent authorization, we will stop providing you with products or services, and you will safely exit TalkLine. If you want to use various functions and services of TalkLine again, you need to re authorize and agree to the privacy policy.
6) Cancel your account
You can cancel your previously registered account at any time. You can do it by yourself in the following ways:
- Basic version users: home page → personal center → account cancellation;
- Enterprise users: you can contact us according to the contact information listed in this privacy policy. We will reply and carry out relevant operations within 15 working days after verifying your identity.
After canceling the account, we will stop providing you with products or services, and we will retain your relevant information in accordance with the provisions of the network security law of the people's Republic of China and other laws and regulations; After the necessary retention period is exceeded, we will delete or anonymously process your personal information.
7) Get a copy of your personal information
You have the right to obtain a copy of your personal information. If you need to obtain a copy of your personal information collected by us, you can contact us according to the contact information listed in this privacy policy. We will reply and carry out relevant operations within 15 working days after verifying your identity. We will submit a copy of your personal information to you by email. On the premise of compliance with relevant laws and regulations and technical feasibility, we will provide you with a copy of your personal information according to your requirements.
8) Automatic decision of constraint information system
In some business functions, we may only make decisions based on non manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate remedies.
9) Our response to your requests mentioned above
For security reasons, you may need to provide supporting documentation (or by other means) to prove your identity before we can process your request.
We will respond to you within 15 business days. If you are not satisfied with our response, you can file a complaint or report to the regulatory authorities of the Internet, telecommunications, public security, and industry and commerce.
In principle, we do not charge a fee for your reasonable requests, but we will charge a fee at cost, as appropriate, for repeated requests that exceed reasonable limits. We may deny requests that are unnecessarily repetitive, require excessive technical measures (for example, requiring the development of new systems or fundamental changes to current practices), pose a risk to the legal rights of others, or are highly impractical (for example, involving the backup of information stored on tapes).
We may not process your request in the following cases:
- Related to the fulfillment of our legal and regulatory obligations;
- Directly related to national security and national defense;
- Directly related to public safety, public health, and other significant public interests;
- Directly related to criminal investigations, prosecutions, trial, and sentence enforcement;
- Where there is sufficient evidence that you have subjective malice or abuse of rights;
- For the purpose of protecting your or another individual's life, property, or other significant legal rights and interests, but it is difficult to obtain consent from you;
- When our processing of your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
- Involving commercial secrets.
10) Rights of close relatives of the deceased
If the user dies unfortunately, his close relatives can contact us through the description of '11. Contact us' to obtain relevant guidance to exercise the legal and legitimate rights and interests stipulated by the law.
8. How we transfer your personal information globally
In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.
Because we provide our Services through network resources and servers located around the world, this means that, with your consent, your personal information may be transferred to, or accessed from, jurisdictions outside the country in which you use our Services.
Such jurisdictions may have different data protection laws or even no such laws. In such cases, we will ensure that your personal information is adequately protected to the same extent as it is in the People's Republic of China. For example, we may request your consent for cross-border transfers of your personal information or implement security measures such as data de-identification prior to cross-border data transfers.
9. How we process personal information of minors
1) We expect that minors use our Services under the supervision and guidance of their parents or guardians
If you are a minor under the age of 18, you shall read and agree to this Policy under the supervision and guidance of your parents or other guardians before using our Services.
2) We take the protection of the personal information of minors very seriously
We protect the personal information of minors in accordance with the relevant national laws and regulations. For personal information collected from minors with parental consent, we will use, share or publicly disclose such information only as permitted by laws, with the explicit consent of their parents or guardians, or as necessary to protect the minors.
3) We conduct self-review and receive feedback
If we find ourselves collecting personal information about minors without the prior consent of verifiable parents, we will try to delete the relevant data as soon as possible. At the same time, we have established strict rules for the collection and use of minors' information to protect the safety of children's and teenagers' personal information. You can learn more about it by reading TalkLine children's privacy protection statement. If you are the guardian of a minor, if you have any questions about the personal information of the minor under your supervision, please contact us through the contact information publicized in this policy.
10. Changes to this Policy
We may revise this Policy from time to time and notify you via pop-up notice. By continuing to use our Services after any changes are made to this Policy, you agree to be bound by the revised version of this Policy. If you do not agree to the revised version of this Policy, you must stop accessing or using our Services.
11. Contact Us
If you have any questions, complaints or suggestions about this privacy policy or personal information protection, you can contact us through any of the following ways:
- Send your question to TalkLine@zego.im;
- send by post:
Attention: TalkLine
38th Floor, One Excellence Tower 3
5033 Menghai Road, Qianhai Shenzhen-Hong Kong Modern Service Industry Cooperation Zone
Shenzhen, Guangdong, China
Post Code: 518000
We will review the issues involved as soon as possible and reply within 15 working days after verifying your user identity.
Appendix I: Information Collected by Third-Party SDKs
IOS | Type of Information | Purpose of Collection | Processing | Official Website/Privacy Policy of the Third Party |
---|---|---|---|---|
DTShareKit | Device identification information, phone model, system type, system version | To share to DingTalk | Secure processing with de-identified, encrypted transmission and processing | https://ding-doc.dingtalk.com/doc#/native |
TencentOpenAPI | Device identification information, phone model, phone system, system version, battery, signal strength | For QQ login and sharing | Secure processing with de-identified, encrypted transmission and processing | https://privacy.qq.com/policy/tencent-privacypolicy |
SSZipArchive | None | To compress and decompress files | No data processing | https://github.com/ZipArchive/ZipArchive |
Bugly | Log information (including: third-party developer custom logs, APP crash stack information), device ID, networking information, system name, system version | To report exceptions | Secure processing with de-identified, encrypted transmission and processing | https://github.com/BuglyDevTeam/Bugly-iOS |
MLeaksFinder | None | To detect iOS memory leaks | No data processing | http://wereadteam.github.io/2016/02/22/MLeaksFinder/ |
Masonry | None | To make screen layout adaptive | No data processing | https://masonry.desandro.com |
YYKit | None | To use a collection of iOS components | No data processing | https://github.com/ibireme/yykit |
IQKeyboardManager | None | To prevent the issue the keyboard slides up and covers the text input field. | No data processing | https://github.com/hackiftekhar/IQKeyboardManager |
MJRefresh | None | To use to use pull-to-refresh features | No data processing | https://github.com/codermjlee/mjrefresh |
UICKeyChainStore | None | To save user name and password to the input box | Secure processing with de-identified, encrypted transmission and processing | https://github.com/kishikawakatsumi/UICKeyChainStore |
lottie-ios | None | To render animations | No data processing | https://github.com/airbnb/lottie-ios |
SensorsAnalyticsSDK | None | To use event tracking for user behavior analysis | No data processing | https://www.sensorsdata.cn/manual/ |
WechatOpenSDK | Device identification information, IP address, networking information, phone model, system type, system version, user identification information, network IP address, order amount | To log in to WeChat and use WeChat Pay | Secure processing with de-identified, encrypted transmission and processing | https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy |
LEEAlert | None | To use alert action sheet | No data processing | https://github.com/HectorLiuk/LEEAlert |
MBProgressHUD | None | To show progress in HUD style | No data processing | https://gitee.com/mirrors/MBProgressHUD |
ReactiveObjC | None | To combine and convert video streams | No data processing | https://github.com/ReactiveCocoa/ReactiveObjC |
Aurora JPush | Device identification information, network information and location information (IP address, WiFi information, base station information and other related information), phone model, system type, system version | To send push messages | Secure processing with de-identified, encrypted transmission and processing | https://www.jiguang.cn/license/privacy |
Aurora SDK | Obtain operator, mobile device identification code, ICCID, BSSID information, read files, obtain application list information, SSID information | Provide timely message push and notification functions, and collect relevant information frequently when the application is switched to the backend | Secure processing with de-identified, encrypted transmission and processing | https://www.jiguang.cn/license/privacy |
ZEGO Voice SDK | Obtain a list of running applications, record calls/audio, turn on cameras, monitor incoming and outgoing calls | For normal implementation of conference functions | Secure processing with de-identified, encrypted transmission and processing | https://www.zego.im/privacy |
Android | Type of Information | Purpose of Collection | Processing | Official Website/Privacy Policy of the Third Party |
---|---|---|---|---|
WeChat SDK | Device identification information (e.g. IMEI number, OAID), IP address, networking information, phone model, system type, system version, user identification information, network IP address, order amount | For WeChat login, WeChat payment, WeChat sharing | Secure processing with de-identified, encrypted transmission and processing | https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy |
QQ SDK | Device identification information (e.g. IMEI number, OAID), phone model, phone system, system version, IP address, battery, signal strength | For QQ login and sharing | Secure processing with de-identified, encrypted transmission and processing | https://privacy.qq.com/policy/tencent-privacypolicy |
Bugly | Log information (including: third-party developer custom logs, Logcat logs and app crash stack information), device ID (including: Android ID and IDFV), networking information, system name, system version and country code | For App exception log reporting | Secure processing with de-identified, encrypted transmission and processing | https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56 |
DingTalk SDK | Device identification information (e.g. IMEI number), phone model, system type, system version | For DingTalk sharing | Secure processing with de-identified, encrypted transmission and processing | https://developers.dingtalk.com/document/mobile-app-guide/android-platform-application-authorization-login-access |
Aurora JPush | Device identification information (IMEI/MAC/Android ID/IDFA/OAID/UAID/OpenUDID/GUID/SIM card IMSI information, etc.), network information and location information (IP address, WiFi information, base station information and other related information), phone model, system type, system version | For implementing message push | Secure processing with de-identified, encrypted transmission and processing | https://www.jiguang.cn/license/privacy |
Huawei HMS | Device related information (e.g. IMEI number, HMS Core openId, phone model, system type, system version), cached messages, message delivery records, Push Token, AAID (application anonymous identifier) | For implementing message push and update | Secure processing with de-identified, encrypted transmission and processing | https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050043971 |
Huawei Push | Device related information (e.g. IMEI number, HMS Core openId, phone model, system type, system version), cached messages, message delivery records, Push Token, AAID (application anonymous identifier) | For implementing message push and update | Secure processing with de-identified, encrypted transmission and processing | https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050043971 |
Huawei Update | Device related information (e.g. IMEI number, HMS Core openId, phone model, system type, system version), cached messages, message delivery records, Push Token, AAID (application anonymous identifier) | For implementing message push and update | Secure processing with de-identified, encrypted transmission and processing | https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050043971 |
OPPO Push | Device related information (such as IMEI number, Serial Number, IMSI, User ID, Android ID, Google Advertising ID, phone Region setting, device model, phone battery, phone OS version and language, etc.), application information using push service, push SDK version number, network related information, message delivery results | For implementing message push | Secure processing with de-identified, encrypted transmission and processing | https://open.oppomobile.com/wiki/doc#id=10288 |
VIVO Push | Device identification information (e.g. IMEI number), phone model, system type, system version | For implementing message push | Secure processing with de-identified, encrypted transmission and processing | https://www.vivo.com.cn/about-vivo/privacy-policy |
Xiaomi Push | Device related information (including IMEI, OAID (for Android Q or above), IMEI MD5, MEIDMD5, Android ID, VAID, AAID, and user MID (for MIUI system), device model, etc.) | For implementing message push | Secure processing with de-identified, encrypted transmission and processing | https://dev.mi.com/console/doc/detail?pId=1822 |
Zxing | None | QR code generation | No data processing | https://zxing.github.io/zxing/apidocs/com/google/zxing/package-summary.html |
Gson | None | json parsing | No data processing | https://github.com/google/gson/ |
Okhttp3 | None | Network cable request | No data processing | https://mvnrepository.com/artifact/com.squareup.okhttp3 |
Smartrefresh | None | Used to implement the drop-down refresh UI component | No data processing | https://github.com/scwang90/SmartRefreshLayout/ |
Calendarview | None | For calendar display | No data processing | https://gitee.com/nekoles/CalendarView |
Aurora SDK | Obtain operator, mobile device identification code, ICCID, BSSID information, read files, obtain application list information, SSID information | Provide timely message push and notification functions, and collect relevant information frequently when the application is switched to the backend | Secure processing with de-identified, encrypted transmission and processing | https://www.jiguang.cn/license/privacy |
ZEGO Voice SDK | Obtain a list of running applications, record calls/audio, turn on cameras, monitor incoming and outgoing calls | For normal implementation of conference functions | Secure processing with de-identified, encrypted transmission and processing | https://www.zego.im/privacy |
Chromium | Monitoring Clipboard | Used for copying and pasting content in user agreements and privacy policy pages | Secure processing with de-identified, encrypted transmission and processing | https://code.google.com/archive/p/chromedevtools/downloads |
360 Security Reinforcement SDK | Obtain Android ID | Used for App security reinforcement protection | Secure processing with de-identified, encrypted transmission and processing | https://jiagu.360.cn/#/global/help/322 |
PC | Type of Information | Purpose of Collection | Processing | Official Website/Privacy Policy of the Third Party |
---|---|---|---|---|
qt | Device identification information (system type, system version, device information, network information) | To use the graphic UI app development framework | Secure processing with de-identified, encrypted transmission and processing | https://www.qt.io |
libcurl | None | To use the client-side URL transfer library | No data processing | https://curl.se/libcurl/ |
ligdx | None | To use the Java game development framework | No data processing | https://libgdx.com |
libexif | None | To parse, edit, and save EXIF data | No data processing | https://github.com/libexif/libexif |
libqrencode | None | To generate QR codes | No data processing | https://fukuchi.org/works/qrencode/ |
libsass | None | To parse Sass | No data processing | https://sass.bootcss.com/libsass |
libyuv | None | To convert YUV to RGBA/BGRA | No data processing | https://github.com/bookzhan/bzyuvlib |
quazip | None | To compress and decompress files | No data processing | https://github.com/stachenov/quazip |
sqlitecipher | None | To encrypt sqlite databases | No data processing | https://www.zetetic.net/sqlcipher/ios-tutorial/ |
zlib | None | To compress data | No data processing | http://www.zlib.net |
libssl | None | https transmission encryption | No data processing | https://github.com/topics/libssl |
libbreakpad | None | Catching program crash exceptions | No data processing | https://chromium.googlesource.com/breakpad/breakpad/ |
Appendix II: Application permission application and usage description
IOS | Permission Description | Specific scenarios or purposes |
---|---|---|
NSCalendarsUsageDescription | Calendar Reading | Synchronize meeting schedules, manage the calendar information you create, schedule and remind you of relevant meetings |
NSCameraUsageDescription | Using the camera | For video conferencing, video beauty, virtual background and other scenarios |
NSMicrophoneUsageDescription | Phone Microphone Permissions | Scenarios for publishing audio messages in audio-video conferences |
NSPhotoLibraryUsageDescription | Read album contents | Used in meetings to send pictures, virtualized backgrounds and other scenarios |
NSPhotoLibraryAddUsageDescription | Adding content to an album | Convenient for users to save pictures, QR codes and other information during the meeting |
NSLocalNetworkUsageDescription | Local Network Permissions | Used to complete communication services on the local network when initiating/joining a meeting and to optimize the network quality of the meeting |
NSUserTrackingUsageDescription | IDFA Tagging Permissions | Ensure product security and improve and optimize the service experience |
Android | Permission Description | Specific scenarios or purposes |
---|---|---|
WRITE_EXTERNAL_STORAGE | Provide write external storage function | Allow APP to write/download/save/modify/delete images, files, crash logs and other information |
READ_EXTERNAL_STORAGE | Provides the ability to read data from the phone's storage space | Allow the app to read pictures, files, etc. from storage, customize virtual backgrounds in meetings, record crash logs locally (if available), and other features |
READ_PHONE_STATE | Provides access to information such as the phone's device identifier, which cannot listen in and obtain any call content | Read device call status and identification code for completing audio and video conferencing, security and other functions |
RECORD_AUDIO | Use of microphone permissions | Used to help you complete audio and video conferencing, live streaming requires the use of this permission |
CAMERA | Using the camera | For video conferencing, video beauty, virtual background and other scenarios |
WRITE_CALENDAR | Add or modify calendar events in the system | Synchronize meeting schedules, manage the calendar information you create, schedule and remind you of relevant meetings |
READ_CALENDAR | Read calendar events from your system | Synchronize meeting schedules, manage the calendar information you create, schedule and remind you of relevant meetings |
SYSTEM_ALERT_WINDOW | Hover window permissions | Enable hover window permission to facilitate users to use the quick operation function outside the APP interface |
BLUETOOTH | Allow the program to connect to paired Bluetooth devices | Used to help users access audio and video conferencing via Bluetooth devices |
FOREGROUND_SERVICE | Allow the program to display foreground notifications | Inform the user that the program is currently consuming system resources |
ACCESS_NETWORK_STATE | Get network status | For optimizing network quality during TalkLine services |
ACCESS_WIFI_STATE | Allow programs to access Wi-Fi network status information | For optimizing network quality during TalkLine services |
INTERNET | Access to the network | For optimizing network quality during TalkLine services |
CHANGE_NETWORK_STATE | Change network status | For optimizing network quality during TalkLine services |
MODIFY_AUDIO_SETTINGS | Allow programs to modify global audio settings | Setting audio mode in a conference |
WAKE_LOCK | Allows the use of PowerManager's WakeLocks to keep processes from disappearing from the screen during hibernation | For ear mode, to avoid accidental touching of the screen that leads to audio mode switching |
REQUEST_INSTALL_PACKAGES | Get installation list | Used to update the application, check whether the user has the conditions to use the product features and optimize the experience |
android.hardware.camera.autofocus | Camera auto-focus | Scan QR code, auto-focus when taking photos |
VIBRATE | Allow access to vibrating devices | Vibrating device when ringing and other functions |
QUERY_ALL_PACKAGES | Check if other applications are already installed | Remind users to install corresponding apps (e.g. WeChat, Enterprise WeChat) |
GET_COMMON_DATA | Application Marketplace Acquisition Services | Get app marketplace services for app installation tips |
READ_PRIVILEGED_PHONE_STATE | Provides access to information such as the phone's device identifier, which cannot listen in and obtain any call content | Read device call status and identification code for completing audio and video conferencing, security and other functions |
RECIEVE_MCS_MESSAGE | Allow the use of OPPO push service | Used to receive notifications pushed by OPPO channels |
PUSH_PROVIDER | Allow push data storage | For storing push data |
MIPUSH_RECEIVE | Allow the use of Xiaomi Push Service | Used to receive notifications pushed by Xiaomi Channel |
JPUSH_MESSAGE | Allow use of Aurora push service | Used to receive notifications pushed by Aurora Channel |
CHANGE_BADGE | Mobile update application desktop corner marker | Mobile desktop corner alert to remind users of application updates |
PROCESS_PUSH_MSG | Allow the use of Huawei push service | Used to receive notifications pushed by Huawei Channel |
READ_PROFILE | Access to user profiles | Used to verify that users have synced their Google accounts on their mobile devices |
ACCESS | Allow access to device identification information | Obtain device identification information oaid required permissions on ASUS devices |
ACCESS_COARSE_LOCATION | Allow applications to access approximate locations | Used to get the approximate location of the user |
ACCESS_FINE_LOCATION | Allow applications to access precise locations | Used to get the exact location of the user |
GET_TASKS | Get task information, this constant is deprecated in API level 21 and is no longer enforced | Read information about the tasks the application is running |
WRITE_SETTINGS | Allow programs to read or write system settings | For saving file resources, such as log files |
ACCESS_LOCATION_EXTRA_COMMANDS | Allow applications to access additional location provider commands | Used to obtain device location information |
CHANGE_WIFI_STATE | Allow applications to change the Wi-Fi connection status | Used to get the wifi signal status and instantly adjust the user experience of audio and video conferencing |
READ_LOGS | Allow applications to read low-level system log files | Used to read the underlying system operation logs and troubleshoot problems |
RECEIVE_USER_PRESENT | When the user presses the power button to light up the screen, immediately after unlocking and starting to use the phone, the user's intention is received | Used to obtain device wake-up status and instantly adjust the user experience of audio and video conferencing |
MOUNT_UNMOUNT_FILESYSTEMS | Allows mounting and unmounting of file systems for removable storage | For SD card file saving |
SYSTEM_OVERLAY_WINDOW | Allow system hover windows to open | Enable hover window permission to facilitate users to use the quick operation function outside the APP interface |