联系我们

TalkLine Privacy Policy

Date of issuance: September 18, 2023

Date of effectiveness: September 18, 2023

Abstract

Thank you for using TalkLine!TalkLine is an online conference product provided by Shenzhen ZEGO Technology Co., Ltd. (hereinafter referred to as "ZEGO Technology"). We attach great importance to the privacy and personal information security protection of users (hereinafter referred to as "you"). We will strictly comply with legal and regulatory requirements, take corresponding security measures, and do our best to protect your personal information and privacy security. In view of this, we have formulated this TalkLine Privacy Policy (hereinafter referred to as "this Policy/this Privacy Policy") and draw your attention to:

This policy applies to all functions and services of the TalkLine products we provide. Please carefully read and thoroughly understand this policy before using the various features or services we provide. Only after confirming your full understanding and agreement can you start using it.

In order to protect your relevant rights, the TalkLine Privacy Policy (hereinafter referred to as 'this Privacy Policy') will explain to you how TalkLine will collect, use and store your personal information and what rights you have. Please read, understand and agree to this policy and relevant supplementary documents before using TalkLine.

Before using various TalkLine services, you must carefully read and thoroughly understand this privacy policy, especially the terms marked in bold / bold underline. You should focus on reading and start using it after confirming your full understanding and consent. Please note that we will review and update our policies from time to time, so the relevant measures will change accordingly. We urge you to visit this page regularly to ensure that you are always aware of the latest version of our privacy policy.

By using or continuing to use the TalkLine service, you agree that we collect, use, store and share your information in accordance with this privacy policy.

This Privacy Policy covers the following topics:

1. What types of information we collect

2. How we use cookies and similar technologies

3. How we store this information

4. How we protect this information

5. How we use this information

6. Information sharing and external provision

7. Your rights

8. How we transfer your personal information globally

9. How we deal with the personal information of minors

10. Changes to this Policy

11. Contact us

Terms and definitions:

TalkLine: TalkLine is a cloud video conference software for global individuals and enterprises independently developed by Shenzhen ZEGO Technology Co., Ltd. (hereinafter referred to as 'ZEGO technology'). TalkLine products and services, including TalkLine Official website TalkLine management background TalkLine Mini-Program , web page (https://meeting.talkline.cn/login) and TalkLine client (including Windows, Mac, iOS, Android versions).

Enterprise super administrator: refers to the individual assigned by instant technology and having the operation authority of talkline management background system. Enterprise super administrators can manage the background through talkline, add users or allow individual users to join the application, make individual users become their enterprise users,and authorize enterprise users to become their ordinary administrators.

Ordinary administrator: refers to the individual designated by the enterprise super administrator or ordinary administrator who has the operation authority of the enterprise talkline management background system; Refers to individuals who register, log in, use talkline products and services and obtain administrative rights. Ordinary administrators can add or allow individual users to join as their enterprise users through talkline management background.

Individual user: refers to the individual who uses personal mobile phone number, wechat and email to register and uses talkline.

Enterprise user: refers to the individual or organization who registers, logs in and uses TalkLine products and services and may obtain management authority; Refers to an individual user who voluntarily submits an application to join the enterprise and is approved by the enterprise super administrator or ordinary administrator; It refers to the individual users who are actively added to the enterprise organization by the enterprise super administrator or ordinary administrator. Including but not limited to legal persons, government agencies, other organizations, partnerships or individual businesses (hereinafter referred to as 'enterprise users').

1. What types of information we collect

In order to provide services to you and enterprise users, optimize our services and ensure account security, talkline will collect the information you actively provide, authorize or use the services in the following ways:

  1. 1) Registered personal account

    1. When you choose a mobile phone number to register, you need to enter your mobile phone number and name to create this service account for you according to your requirements;
    2. When you choose email registration, you need to enter your email address and bind your mobile phone number to create this service account for you according to your requirements;
    3. When you choose to register with wechat (wechat ID), you need to provide your wechat number, wechat ID, avatar and your mobile phone number to establish this service account for you according to your requirements.
  2. 2) Registered enterprise user account

    When you need to register as an enterprise user, you need to provide the creator and enterprise related information so that we can create an enterprise user account for you. Or first register as an individual user and then apply to join the enterprise. When the enterprise administrator passes, he can become an enterprise user.

    Before uploading, authorizing and managing personal information such as the name and mobile phone number. email address and WeChat accounts of individual users, enterprise users should ensure that they have obtained the explicit consent of individual users in advance, upload, authorize and manage only the personal user information necessary to achieve the purpose of operation and function, and have fully informed individual users of the purpose, scope and use mode of relevant data collection.

    When you are an enterprise user, in order to provide talkline service, we will collect the information and data you submit or generate in the process of using talkline (hereinafter referred to as 'enterprise controlled data'). The enterprise controlled data may include:

    1. The name, mobile phone number, email address and WeChat account submitted or required by enterprise users to register enterprise individual users;
    2. The name of the enterprise and department to which the individual user belongs is related to the enterprise user or the information assigned to the individual user by the enterprise user; Organizational structure data submitted by other enterprise users.

3) Information collected while you are using our Services

To provide you with our Services, maintain the normal operation of our Services, improve and optimize our Services, and protect your account security, we shall collect the following information from you when you use our Services:

  1. Device information: according to the device model and authority granted during the installation and use of talkline service, we will collect the relevant information of devices using talkline service, including hardware device model, system type, system version, device screen size, hardware device serial number, MAC address, unique device identification code (IMEI, Android ID, IDFA, openudid, SIM card IMSI information), time zone, language TalkLine software version number
  2. Microphone or camera permission: when you use the audio and video conference function, you need to turn on the microphone or camera permission. If you do not turn on the corresponding permissions, you will not be able to use the camera or microphone related functions. When you use audio and video conferencing and screen sharing (including shared whiteboard), you need to provide audio or video data, including shared picture and sound. As a sharer, you can mark and save screenshots during screen sharing, or save shared whiteboard images. These information will only be saved in your local device.
  3. Code scanning function: when you use the code scanning function, you need to turn on the camera permission. At this time, we will collect your code scanning records to show you the code scanning results. If you refuse to open the above permission or provide the above information, we will not be able to provide you with code scanning function.
  4. Add meeting schedule: when you choose to add the meeting schedule (including meeting ID, meeting subject, start time, host, meeting link, reminder before start and reminder time) to your calendar, we need to obtain the read-write permission of your calendar, otherwise we can't add the above information to your calendar.
  5. Custom virtual background: when you choose to use the custom virtual background function, you need to upload a photo or a video from your device as your personal virtual background. At this time, we will ask you to open the photo album permission. If you do not provide the above information or refuse to open the photo album permission, you will not be able to use the custom virtual background function.
  6. Permission to access device storage: When you use TalkLine's file sharing, meeting recording, uploading, and downloading services, you will need to grant TalkLine read and write access to your device's storage; otherwise, you will not be able to use such services.
  7. Permission to read the phone state: When you use TalkLine's features such as meeting reminders and dial-in, TalkLine needs to get your phone's current state,for making/receiving calls
  8. Log information: when you use TalkLine service, we may automatically collect log information through cookies (cookies refer to small data documents transmitted from the website to your computer hard disk), web beacon or other methods, including:
    1. Activities of your account during your use of our Services, such as the meetings or live broadcasts you attend and how you join them, and other login information.
    2. Information about the meetings you schedule or live streaming sessions you create using our Services, the user accounts used to hold the meetings or live streaming sessions, and the associated data and time duration.
    3. Information (metadata) contained in the content you share through our Services, the shared files and recordings that you upload.
    4. Data about your media traffic while you are using our Services, which we collect for traffic monitoring purposes.
  9. Get the software installation list: when you use wechat to log in to TalkLine, or share the created conference to WeChat, Enterprise WeChat, QQ and DingTalk platforms, we need to confirm the installation status of the above software for fast jump between software and normal use of conference functions.
  10. Bind WeChat / email: when you select bind WeChat / email in settings, we will get your wechat and email. It is convenient for you to receive the notice of TalkLine conference service number and know the relevant information of the conference in time.
  11. Beauty: when you use the beauty function, we will need to process some of your facial eigenvalue information locally to achieve the effect of facial beauty. You need to authorize us to use the camera. We will only process relevant facial eigenvalue information offline in your local device, and will not upload, store in the background or share such information with third parties.

4) Information Collected by Third-Party SDKs (see Appendix I for details)

Please understand that the functions and services we provide to you are constantly updated and developed. If a function or service is not in the above description and needs to collect your information, we will separately explain the content, scope and purpose of information collection to you through page tips, interactive processes, website announcements, etc., so as to obtain your consent.

5) Features for clearing cache and uploading logs

In the 'auxiliary functions' column of 'Settings', we provide the function of emptying the cache, which is used to clear the cache files generated by shared files and audio and video downloads during your use of TalkLine; The upload log function is used to upload the log information of app (using account behavior, meeting information, uploaded file content, media data) and SDK data information. These information will be used to troubleshoot problems and provide you with better services.

6) Application permission application and usage description (see Appendix II for details)

We may apply for or use the relevant permissions of the operating system to ensure the functions of TalkLine products and safe and stable operation; In order to protect your right to know, we display the relevant operating system permissions that may be applied for and used by the product through the list. You can manage the relevant permissions according to your actual needs; According to the product upgrade, the type and purpose of application and use permission may change. We will adjust the list in time according to these changes to ensure that you know the application and use of permission in time.

2. How we use cookies and similar technologies

We use cookies and other similar technologies to enhance your experience of using this service. When you use this service, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this service. We undertake not to use cookies for any purpose other than those stated in this privacy policy. We use cookies and similar technologies mainly to realize the following functions or services:

  1. Ensure the safe and efficient operation of products and services: we may set cookies or anonymous identifiers for authentication and security to enable us to confirm whether you log in to the service safely, or whether you encounter embezzlement, fraud and other illegal acts. These technologies will also help us improve service efficiency, login and response speed;
  2. Help you get an easier access experience: using this technology can help you avoid repeating the steps and processes of filling in your personal information and entering search content (example: historical meeting ID, etc.).

Most browsers provide users with the function of clearing browser cache data. You can clear the corresponding data in the browser setting function. If you clear it, you may not be able to use the cookie dependent services or corresponding functions provided by us.

3. How we store this information

We use the information we collect for the following purposes in strict compliance with the laws and regulations and our agreements with our users. If we use your information for purposes other than the ones listed below, we will explain to you and ask for your consent.

1) Where the information is stored

In accordance with laws and regulations, we will store personal information collected and generated in China in Alibaba cloud's Shanghai computer room.

2) Duration of information storage

Generally speaking, we only retain your personal information for the time necessary to achieve the purpose. We will not view or use the user, file and other information you keep. For example, the storage period of the equipment information and log information we collected is 6 months, and the user's account registration information will be stored until the user voluntarily logs off the account. After the time limit is exceeded, the corresponding information will be deleted.

When the operation of our products or services stops, we will notify you in the form of push notice and announcement, delete your personal information or anonymize it within a reasonable period of time, immediately stop the collection of personal information, and close the third-party application service interface to avoid the collection and continuous use of personal information by third-party services.

4. How we protect this information

1) Information security

We strive to ensure the information security of users to prevent the loss, improper use, unauthorized access or disclosure of information.

2) Encryption technologies

We will use various security protections within a reasonable security level to keep information secure. For example, we use encryption technologies (e.g., SSL /TLS), anonymization processes, and other methods to protect your personal information.

3) Security certification

At present, we have passed the evaluation and filing of national information security level protection (level III), and have met the requirements of international authoritative certification of ISO 27001 (information security management system), ISO 27701 (Privacy Information Management System) and iso27018 (public cloud personal information protection management system) in terms of information security, and have obtained the corresponding certification.

4) Management system and process

We have established a dedicated management system, process, and organization to safeguard information security. For example, we strictly limit the scope of people who have access to information, require them to comply with confidentiality obligations, and conduct audits.

5) Remedial measures

In the event of personal information leakage and other information security incidents, we will start the emergency plan to prevent the incident from deteriorating, and inform you of the incident, the possible impact of the incident on you, and the remedial measures we will take by push notifications, announcements, and other means. We will also report our handling of such personal information security incidents in accordance with laws and regulations.

5. How we use this information

We collect information about you and your use of our Services in order to provide better services to our users. We may use the information we collect for the following purposes:

1) To safeguard information security

To protect the security of your information and that of all our users, we use relevant information to help us improve the security and reliability of our Services, including detecting, preventing, and responding to fraud, abuse of the system, illegal activities, security risks, and technical issues that could cause harm to TalkLine, our users or the public.

2) To communicate with you

We may use the information we collect from you (include the email address, cell phone number, WeChat account.) to communicate with you directly. For example, we may inform you about upcoming changes or upcoming improvements to TalkLine. We may use such information to gain more knowledge about how you access and use our Services so that we can manage and upgrade our Services to meet your needs in a more targeted way. We may also contact you to get your feedback on our Services.

3) To comply with laws and regulations

  1. In accordance with relevant laws and regulations and national standards, we may collect and use your personal information without your authorization under the following circumstances:
    1. Directly related to national security, national defense, and other national interests; Directly related to public safety, public health, public's right to know, and other significant public interests;
    2. Directly related to criminal investigations, prosecutions, trial, and sentence enforcement;
    3. For the purpose of safeguarding your or another individual's life, property, or other significant legal rights and interests, but it is difficult to obtain your consent;
    4. The personal information collected is disclosed by you to the public at your own discretion;
    5. Personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, and other sources;
    6. Necessary for the signing and perform the contract according to your requirements;
    7. Necessary for maintaining the safe and stable operation of our Services, such as the detection and handling of faults in our Service;
    8. Other circumstances stipulated by laws and regulations.

6. Information sharing and external provision

1) With your consent

We do not share or transfer your personal information to third parties, except for the following:

  1. With your prior authorization and consent, or the personal information shared or transferred is the information after de identification, and the sharing third party cannot re identify the personal information subject of such information;
  2. For the purpose of external processing, we may share your personal information with affiliated companies or other third-party partners (third-party service providers, contractors, agents, application developers, etc.), and let them process the above information for us in accordance with our instructions, privacy policies and other relevant confidentiality and security measures, and use it to provide you with our services, Achieve the purpose described in the 'how we use information' section. If we share your information with the above-mentioned affiliated companies or third parties, we will strictly monitor the software tool development kit (SDK) and application program interface (API) of the partners to obtain the information, so as to protect the data security. At the same time, we will use encryption, anonymization and other means to ensure the security of your information. For more information about the purpose, method and scope of third-party personal information processing, please see Annex I;
  3. When required to provide your personal information in accordance with relevant laws, rules, regulations, other regulatory documents, mandatory administrative law enforcement, or judicial requirements, we may disclose your personal information to the administrative law enforcement agencies, or judicial agencies according to the requested type of personal information and manner of disclosure. When we receive a request for information disclosure, we require legal documentation to support the request, subject to compliance with laws and regulations. We only provide data that law enforcement agencies and judicial agencies have the legal authority to obtain for specific investigative purposes. To the extent permitted by laws and regulations, the documents we disclose are protected by encryption measures.

2) As decided and managed by enterprises

We do not disclose the personal information we collect to the public. If we must disclose it to the public, we will inform you of the purpose of the disclosure, the type of information to be disclosed, and the sensitivity of the information that may be involved, and obtain your explicit consent. For our enterprise customers, it is up to the enterprises to decide and manage how the personal information of their individual members is disclosed in TalkLine or shared with the public.

3) To comply with law enforcement requirements

We may disclose your personal information as required by laws or in response to law enforcement requests from relevant authorities.

7. Your Rights

In accordance with the relevant Chinese laws, regulations, and standards, as well as the common practices of other countries and regions, you have the following rights to your personal information:

1) Access your personal information

You have the right to access your personal information, except for exceptions stipulated by laws and regulations. If you wish to exercise your right to access your personal information, you can do so yourself in the following ways:

  1. Account information: if you want to access or edit the profile information in your account.
    Via TalkLine apps: name, account information: home page → click 'Avatar' in the upper left or right corner to expand the pop-up window → click 'nickname' in the upper left corner or click 'personal center' to enter the personal center → browse avatar, nickname, version, enterprise, Department, mobile phone number, email and wechat;
    Via TalkLine Administration Console:
    Home page → user management → user list → specific user information (can be modified or deleted).
  2. Your meeting information: you can access your associated meeting information.
    Via TalkLine apps: Home page → today's agenda / all agenda;
    Via TalkLine Administration Console:
    ① Home page → meeting management → upcoming meeting / historical meeting → associated meeting information;
    ② Home page → user management → user list → details on the right side of specific user name → associated meeting information

We will provide you with other personal information generated in the process of using our products or services as long as we don't need too much investment.

2) Update your personal information

If there is any incorrect personal information about you in our service, you have the right to request us to correct it.

You can update your personal information as described in the section 'Access your personal information' above. If you are unable to do so, you may contact us using the contact information provided in this Policy. We will respond to your requests within 15 business days.

3) Delete your personal information

You may request us to delete your personal information from our Services in the following cases:

  1. If our process of your personal information violates laws and regulations.
  2. If we collect and use your personal information without obtaining your consent.
  3. If our process of your personal information violates our agreement with you.
  4. If you no longer use our Services, or if you cancel your account.
  5. If we no longer provide our Services to you.

If we, upon your request, delete your personal information, we will also request the entities who get your personal information from us to delete your personal information in a timely manner, unless otherwise required by law or regulation, or such entities have your independent authorization to keep your personal information.

When your personal information is deleted from our Services, we may not immediately delete the corresponding information from our backup system, but we will delete it when the backup is updated.

4) Change the scope of your consent

Each business function requires some basic personal information to be completed (see 'What types of information we collect' in this policy). For the collection and use of additional collected personal information, you can give or withdraw your authorization and consent at any time. You can contact us according to the contact information listed in this privacy policy. We will reply and carry out relevant operations within 15 working days after verifying your identity. When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous personal information processing based on your authorization.

5)Revoke your privacy policy consent authorization

You can revoke your privacy policy consent authorization at any time, and you can do so yourself by:

Home page → Click on the avatar in the upper left corner → System settings → Pull to the bottom and click on withdraw consent to TalkLine privacy policy

After revoking the privacy policy consent authorization, we will stop providing you with products or services, and you will safely exit TalkLine. If you want to use various functions and services of TalkLine again, you need to re authorize and agree to the privacy policy.

6) Cancel your account

You can cancel your previously registered account at any time. You can do it by yourself in the following ways:

  1. Basic version users: home page → personal center → account cancellation;
  2. Enterprise users: you can contact us according to the contact information listed in this privacy policy. We will reply and carry out relevant operations within 15 working days after verifying your identity.

After canceling the account, we will stop providing you with products or services, and we will retain your relevant information in accordance with the provisions of the network security law of the people's Republic of China and other laws and regulations; After the necessary retention period is exceeded, we will delete or anonymously process your personal information.

7) Get a copy of your personal information

You have the right to obtain a copy of your personal information. If you need to obtain a copy of your personal information collected by us, you can contact us according to the contact information listed in this privacy policy. We will reply and carry out relevant operations within 15 working days after verifying your identity. We will submit a copy of your personal information to you by email. On the premise of compliance with relevant laws and regulations and technical feasibility, we will provide you with a copy of your personal information according to your requirements.

8) Automatic decision of constraint information system

In some business functions, we may only make decisions based on non manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate remedies.

9) Our response to your requests mentioned above

For security reasons, you may need to provide supporting documentation (or by other means) to prove your identity before we can process your request.

We will respond to you within 15 business days. If you are not satisfied with our response, you can file a complaint or report to the regulatory authorities of the Internet, telecommunications, public security, and industry and commerce.

In principle, we do not charge a fee for your reasonable requests, but we will charge a fee at cost, as appropriate, for repeated requests that exceed reasonable limits. We may deny requests that are unnecessarily repetitive, require excessive technical measures (for example, requiring the development of new systems or fundamental changes to current practices), pose a risk to the legal rights of others, or are highly impractical (for example, involving the backup of information stored on tapes).

We may not process your request in the following cases:

  1. Related to the fulfillment of our legal and regulatory obligations;
  2. Directly related to national security and national defense;
  3. Directly related to public safety, public health, and other significant public interests;
  4. Directly related to criminal investigations, prosecutions, trial, and sentence enforcement;
  5. Where there is sufficient evidence that you have subjective malice or abuse of rights;
  6. For the purpose of protecting your or another individual's life, property, or other significant legal rights and interests, but it is difficult to obtain consent from you;
  7. When our processing of your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
  8. Involving commercial secrets.

10) Rights of close relatives of the deceased

If the user dies unfortunately, his close relatives can contact us through the description of '11. Contact us' to obtain relevant guidance to exercise the legal and legitimate rights and interests stipulated by the law.

8. How we transfer your personal information globally

In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.

Because we provide our Services through network resources and servers located around the world, this means that, with your consent, your personal information may be transferred to, or accessed from, jurisdictions outside the country in which you use our Services.

Such jurisdictions may have different data protection laws or even no such laws. In such cases, we will ensure that your personal information is adequately protected to the same extent as it is in the People's Republic of China. For example, we may request your consent for cross-border transfers of your personal information or implement security measures such as data de-identification prior to cross-border data transfers.

9. How we process personal information of minors

1) We expect that minors use our Services under the supervision and guidance of their parents or guardians

If you are a minor under the age of 18, you shall read and agree to this Policy under the supervision and guidance of your parents or other guardians before using our Services.

2) We take the protection of the personal information of minors very seriously

We protect the personal information of minors in accordance with the relevant national laws and regulations. For personal information collected from minors with parental consent, we will use, share or publicly disclose such information only as permitted by laws, with the explicit consent of their parents or guardians, or as necessary to protect the minors.

3) We conduct self-review and receive feedback

If we find ourselves collecting personal information about minors without the prior consent of verifiable parents, we will try to delete the relevant data as soon as possible. At the same time, we have established strict rules for the collection and use of minors' information to protect the safety of children's and teenagers' personal information. You can learn more about it by reading TalkLine children's privacy protection statement. If you are the guardian of a minor, if you have any questions about the personal information of the minor under your supervision, please contact us through the contact information publicized in this policy.

10. Changes to this Policy

We may revise this Policy from time to time and notify you via pop-up notice. By continuing to use our Services after any changes are made to this Policy, you agree to be bound by the revised version of this Policy. If you do not agree to the revised version of this Policy, you must stop accessing or using our Services.

11. Contact Us

If you have any questions, complaints or suggestions about this privacy policy or personal information protection, you can contact us through any of the following ways:

  1. Send your question to TalkLine@zego.im;
  2. send by post:
    Attention: TalkLine
    38th Floor, One Excellence Tower 3
    5033 Menghai Road, Qianhai Shenzhen-Hong Kong Modern Service Industry Cooperation Zone
    Shenzhen, Guangdong, China
    Post Code: 518000

We will review the issues involved as soon as possible and reply within 15 working days after verifying your user identity.

Appendix I: Information Collected by Third-Party SDKs

IOS Type of Information Purpose of Collection Processing Official Website/Privacy Policy of the Third Party
DTShareKit Device identification information, phone model, system type, system version To share to DingTalk Secure processing with de-identified, encrypted transmission and processing https://ding-doc.dingtalk.com/doc#/native
TencentOpenAPI Device identification information, phone model, phone system, system version, battery, signal strength For QQ login and sharing Secure processing with de-identified, encrypted transmission and processing https://privacy.qq.com/policy/tencent-privacypolicy
SSZipArchive None To compress and decompress files No data processing https://github.com/ZipArchive/ZipArchive
Bugly Log information (including: third-party developer custom logs, APP crash stack information), device ID, networking information, system name, system version To report exceptions Secure processing with de-identified, encrypted transmission and processing https://github.com/BuglyDevTeam/Bugly-iOS
MLeaksFinder None To detect iOS memory leaks No data processing http://wereadteam.github.io/2016/02/22/MLeaksFinder/
Masonry None To make screen layout adaptive No data processing https://masonry.desandro.com
YYKit None To use a collection of iOS components No data processing https://github.com/ibireme/yykit
IQKeyboardManager None To prevent the issue the keyboard slides up and covers the text input field. No data processing https://github.com/hackiftekhar/IQKeyboardManager
MJRefresh None To use to use pull-to-refresh features No data processing https://github.com/codermjlee/mjrefresh
UICKeyChainStore None To save user name and password to the input box Secure processing with de-identified, encrypted transmission and processing https://github.com/kishikawakatsumi/UICKeyChainStore
lottie-ios None To render animations No data processing https://github.com/airbnb/lottie-ios
SensorsAnalyticsSDK None To use event tracking for user behavior analysis No data processing https://www.sensorsdata.cn/manual/
WechatOpenSDK Device identification information, IP address, networking information, phone model, system type, system version, user identification information, network IP address, order amount To log in to WeChat and use WeChat Pay Secure processing with de-identified, encrypted transmission and processing https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy
LEEAlert None To use alert action sheet No data processing https://github.com/HectorLiuk/LEEAlert
MBProgressHUD None To show progress in HUD style No data processing https://gitee.com/mirrors/MBProgressHUD
ReactiveObjC None To combine and convert video streams No data processing https://github.com/ReactiveCocoa/ReactiveObjC
Aurora JPush Device identification information, network information and location information (IP address, WiFi information, base station information and other related information), phone model, system type, system version To send push messages Secure processing with de-identified, encrypted transmission and processing https://www.jiguang.cn/license/privacy
Aurora SDK Obtain operator, mobile device identification code, ICCID, BSSID information, read files, obtain application list information, SSID information Provide timely message push and notification functions, and collect relevant information frequently when the application is switched to the backend Secure processing with de-identified, encrypted transmission and processing https://www.jiguang.cn/license/privacy
ZEGO Voice SDK Obtain a list of running applications, record calls/audio, turn on cameras, monitor incoming and outgoing calls For normal implementation of conference functions Secure processing with de-identified, encrypted transmission and processing https://www.zego.im/privacy
Android Type of Information Purpose of Collection Processing Official Website/Privacy Policy of the Third Party
WeChat SDK Device identification information (e.g. IMEI number, OAID), IP address, networking information, phone model, system type, system version, user identification information, network IP address, order amount For WeChat login, WeChat payment, WeChat sharing Secure processing with de-identified, encrypted transmission and processing https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy
QQ SDK Device identification information (e.g. IMEI number, OAID), phone model, phone system, system version, IP address, battery, signal strength For QQ login and sharing Secure processing with de-identified, encrypted transmission and processing https://privacy.qq.com/policy/tencent-privacypolicy
Bugly Log information (including: third-party developer custom logs, Logcat logs and app crash stack information), device ID (including: Android ID and IDFV), networking information, system name, system version and country code For App exception log reporting Secure processing with de-identified, encrypted transmission and processing https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56
DingTalk SDK Device identification information (e.g. IMEI number), phone model, system type, system version For DingTalk sharing Secure processing with de-identified, encrypted transmission and processing https://developers.dingtalk.com/document/mobile-app-guide/android-platform-application-authorization-login-access
Aurora JPush Device identification information (IMEI/MAC/Android ID/IDFA/OAID/UAID/OpenUDID/GUID/SIM card IMSI information, etc.), network information and location information (IP address, WiFi information, base station information and other related information), phone model, system type, system version For implementing message push Secure processing with de-identified, encrypted transmission and processing https://www.jiguang.cn/license/privacy
Huawei HMS Device related information (e.g. IMEI number, HMS Core openId, phone model, system type, system version), cached messages, message delivery records, Push Token, AAID (application anonymous identifier) For implementing message push and update Secure processing with de-identified, encrypted transmission and processing https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050043971
Huawei Push Device related information (e.g. IMEI number, HMS Core openId, phone model, system type, system version), cached messages, message delivery records, Push Token, AAID (application anonymous identifier) For implementing message push and update Secure processing with de-identified, encrypted transmission and processing https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050043971
Huawei Update Device related information (e.g. IMEI number, HMS Core openId, phone model, system type, system version), cached messages, message delivery records, Push Token, AAID (application anonymous identifier) For implementing message push and update Secure processing with de-identified, encrypted transmission and processing https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050043971
OPPO Push Device related information (such as IMEI number, Serial Number, IMSI, User ID, Android ID, Google Advertising ID, phone Region setting, device model, phone battery, phone OS version and language, etc.), application information using push service, push SDK version number, network related information, message delivery results For implementing message push Secure processing with de-identified, encrypted transmission and processing https://open.oppomobile.com/wiki/doc#id=10288
VIVO Push Device identification information (e.g. IMEI number), phone model, system type, system version For implementing message push Secure processing with de-identified, encrypted transmission and processing https://www.vivo.com.cn/about-vivo/privacy-policy
Xiaomi Push Device related information (including IMEI, OAID (for Android Q or above), IMEI MD5, MEIDMD5, Android ID, VAID, AAID, and user MID (for MIUI system), device model, etc.) For implementing message push Secure processing with de-identified, encrypted transmission and processing https://dev.mi.com/console/doc/detail?pId=1822
Zxing None QR code generation No data processing https://zxing.github.io/zxing/apidocs/com/google/zxing/package-summary.html
Gson None json parsing No data processing https://github.com/google/gson/
Okhttp3 None Network cable request No data processing https://mvnrepository.com/artifact/com.squareup.okhttp3
Smartrefresh None Used to implement the drop-down refresh UI component No data processing https://github.com/scwang90/SmartRefreshLayout/
Calendarview None For calendar display No data processing https://gitee.com/nekoles/CalendarView
Aurora SDK Obtain operator, mobile device identification code, ICCID, BSSID information, read files, obtain application list information, SSID information Provide timely message push and notification functions, and collect relevant information frequently when the application is switched to the backend Secure processing with de-identified, encrypted transmission and processing https://www.jiguang.cn/license/privacy
ZEGO Voice SDK Obtain a list of running applications, record calls/audio, turn on cameras, monitor incoming and outgoing calls For normal implementation of conference functions Secure processing with de-identified, encrypted transmission and processing https://www.zego.im/privacy
Chromium Monitoring Clipboard Used for copying and pasting content in user agreements and privacy policy pages Secure processing with de-identified, encrypted transmission and processing https://code.google.com/archive/p/chromedevtools/downloads
360 Security Reinforcement SDK Obtain Android ID Used for App security reinforcement protection Secure processing with de-identified, encrypted transmission and processing https://jiagu.360.cn/#/global/help/322
PC Type of Information Purpose of Collection Processing Official Website/Privacy Policy of the Third Party
qt Device identification information (system type, system version, device information, network information) To use the graphic UI app development framework Secure processing with de-identified, encrypted transmission and processing https://www.qt.io
libcurl None To use the client-side URL transfer library No data processing https://curl.se/libcurl/
ligdx None To use the Java game development framework No data processing https://libgdx.com
libexif None To parse, edit, and save EXIF data No data processing https://github.com/libexif/libexif
libqrencode None To generate QR codes No data processing https://fukuchi.org/works/qrencode/
libsass None To parse Sass No data processing https://sass.bootcss.com/libsass
libyuv None To convert YUV to RGBA/BGRA No data processing https://github.com/bookzhan/bzyuvlib
quazip None To compress and decompress files No data processing https://github.com/stachenov/quazip
sqlitecipher None To encrypt sqlite databases No data processing https://www.zetetic.net/sqlcipher/ios-tutorial/
zlib None To compress data No data processing http://www.zlib.net
libssl None https transmission encryption No data processing https://github.com/topics/libssl
libbreakpad None Catching program crash exceptions No data processing https://chromium.googlesource.com/breakpad/breakpad/

Appendix II: Application permission application and usage description

IOS Permission Description Specific scenarios or purposes
NSCalendarsUsageDescription Calendar Reading Synchronize meeting schedules, manage the calendar information you create, schedule and remind you of relevant meetings
NSCameraUsageDescription Using the camera For video conferencing, video beauty, virtual background and other scenarios
NSMicrophoneUsageDescription Phone Microphone Permissions Scenarios for publishing audio messages in audio-video conferences
NSPhotoLibraryUsageDescription Read album contents Used in meetings to send pictures, virtualized backgrounds and other scenarios
NSPhotoLibraryAddUsageDescription Adding content to an album Convenient for users to save pictures, QR codes and other information during the meeting
NSLocalNetworkUsageDescription Local Network Permissions Used to complete communication services on the local network when initiating/joining a meeting and to optimize the network quality of the meeting
NSUserTrackingUsageDescription IDFA Tagging Permissions Ensure product security and improve and optimize the service experience
Android Permission Description Specific scenarios or purposes
WRITE_EXTERNAL_STORAGE Provide write external storage function Allow APP to write/download/save/modify/delete images, files, crash logs and other information
READ_EXTERNAL_STORAGE Provides the ability to read data from the phone's storage space Allow the app to read pictures, files, etc. from storage, customize virtual backgrounds in meetings, record crash logs locally (if available), and other features
READ_PHONE_STATE Provides access to information such as the phone's device identifier, which cannot listen in and obtain any call content Read device call status and identification code for completing audio and video conferencing, security and other functions
RECORD_AUDIO Use of microphone permissions Used to help you complete audio and video conferencing, live streaming requires the use of this permission
CAMERA Using the camera For video conferencing, video beauty, virtual background and other scenarios
WRITE_CALENDAR Add or modify calendar events in the system Synchronize meeting schedules, manage the calendar information you create, schedule and remind you of relevant meetings
READ_CALENDAR Read calendar events from your system Synchronize meeting schedules, manage the calendar information you create, schedule and remind you of relevant meetings
SYSTEM_ALERT_WINDOW Hover window permissions Enable hover window permission to facilitate users to use the quick operation function outside the APP interface
BLUETOOTH Allow the program to connect to paired Bluetooth devices Used to help users access audio and video conferencing via Bluetooth devices
FOREGROUND_SERVICE Allow the program to display foreground notifications Inform the user that the program is currently consuming system resources
ACCESS_NETWORK_STATE Get network status For optimizing network quality during TalkLine services
ACCESS_WIFI_STATE Allow programs to access Wi-Fi network status information For optimizing network quality during TalkLine services
INTERNET Access to the network For optimizing network quality during TalkLine services
CHANGE_NETWORK_STATE Change network status For optimizing network quality during TalkLine services
MODIFY_AUDIO_SETTINGS Allow programs to modify global audio settings Setting audio mode in a conference
WAKE_LOCK Allows the use of PowerManager's WakeLocks to keep processes from disappearing from the screen during hibernation For ear mode, to avoid accidental touching of the screen that leads to audio mode switching
REQUEST_INSTALL_PACKAGES Get installation list Used to update the application, check whether the user has the conditions to use the product features and optimize the experience
android.hardware.camera.autofocus Camera auto-focus Scan QR code, auto-focus when taking photos
VIBRATE Allow access to vibrating devices Vibrating device when ringing and other functions
QUERY_ALL_PACKAGES Check if other applications are already installed Remind users to install corresponding apps (e.g. WeChat, Enterprise WeChat)
GET_COMMON_DATA Application Marketplace Acquisition Services Get app marketplace services for app installation tips
READ_PRIVILEGED_PHONE_STATE Provides access to information such as the phone's device identifier, which cannot listen in and obtain any call content Read device call status and identification code for completing audio and video conferencing, security and other functions
RECIEVE_MCS_MESSAGE Allow the use of OPPO push service Used to receive notifications pushed by OPPO channels
PUSH_PROVIDER Allow push data storage For storing push data
MIPUSH_RECEIVE Allow the use of Xiaomi Push Service Used to receive notifications pushed by Xiaomi Channel
JPUSH_MESSAGE Allow use of Aurora push service Used to receive notifications pushed by Aurora Channel
CHANGE_BADGE Mobile update application desktop corner marker Mobile desktop corner alert to remind users of application updates
PROCESS_PUSH_MSG Allow the use of Huawei push service Used to receive notifications pushed by Huawei Channel
READ_PROFILE Access to user profiles Used to verify that users have synced their Google accounts on their mobile devices
ACCESS Allow access to device identification information Obtain device identification information oaid required permissions on ASUS devices
ACCESS_COARSE_LOCATION Allow applications to access approximate locations Used to get the approximate location of the user
ACCESS_FINE_LOCATION Allow applications to access precise locations Used to get the exact location of the user
GET_TASKS Get task information, this constant is deprecated in API level 21 and is no longer enforced Read information about the tasks the application is running
WRITE_SETTINGS Allow programs to read or write system settings For saving file resources, such as log files
ACCESS_LOCATION_EXTRA_COMMANDS Allow applications to access additional location provider commands Used to obtain device location information
CHANGE_WIFI_STATE Allow applications to change the Wi-Fi connection status Used to get the wifi signal status and instantly adjust the user experience of audio and video conferencing
READ_LOGS Allow applications to read low-level system log files Used to read the underlying system operation logs and troubleshoot problems
RECEIVE_USER_PRESENT When the user presses the power button to light up the screen, immediately after unlocking and starting to use the phone, the user's intention is received Used to obtain device wake-up status and instantly adjust the user experience of audio and video conferencing
MOUNT_UNMOUNT_FILESYSTEMS Allows mounting and unmounting of file systems for removable storage For SD card file saving
SYSTEM_OVERLAY_WINDOW Allow system hover windows to open Enable hover window permission to facilitate users to use the quick operation function outside the APP interface