e-mobile 7 Privacy Policy
Company: Shanghai Weaver Network Technology Co., Ltd. (hereinafter referred to as “Weaver”)
Release Date: January 1st, 2020
Effective Date: January 1st, 2020
Update Date: August 4th, 2022
Welcome to use e-mobile 7!
In order to protect your relevant rights, e-mobile 7 Privacy Protection Policy (hereinafter referred to as “ This Privacy Policy ”) will explain to you how e-mobile 7 collects, uses, and stores your personal information and what rights you have. Please read, understand, and agree to This Privacy Policy before using e-mobile 7.
This Policy applies to the functions and services of e-mobile 7 products (including system login, instant messaging, address book, and built-in office applications), and does not apply to any other products or services provided by third parties that enterprise users access through the e-mobile 7 open platform (hereinafter collectively referred to as “Third-Party Services ”). You should fully understand the product functions and privacy protection policies of Third-Party Services before choosing to use Third-Party Services.
This Policy will help you understand the following:
1.What types of information do we collect
2.How do we store these information
3.How do we protect these information
4.How do we use these information?
5.Information sharing and external availability
6.Content and copyright
7.Changes to This Policy
8.Others
9.Contact us
Related Definitions:
e-mobile 7 :Emobile7e-mobile 7 is an office management communication tool provided by Weaver. e-mobile 7 products and services include e-mobile 7 server (deployed on the company’s own server) and e-mobile 7 clients (including Windows , Mac , iOS , Android and other application versions), etc.
Enterprise User : Refers to an individual or organization that has purchased and deployed e-mobile 7 products and has management permissions over this product, including but not limited to legal persons, government institutions, other organizations, partnerships, or individual businesses etc. (hereinafter referred to as “ Enterprise User ”); Enterprise User can create their work platform through e-mobile 7 , and open an account to invite relevant people to join their work platform to become their end users.
e-mobile 7 Server: Refers to the software and hardware system that provides services for e-mobile 7 products and is deployed on servers provided by Enterprise User themselves.
Enterprise User Administrator: Refers to an individual designated by Enterprise User who has the permission to operate the e-mobile 7 system back-end; Enterprise User Administrator can be one or more.
Individual User: An Individual User who is invited by the Enterprise User and logs in to e-mobile 7 through an account opened by Enterprise User in the back-end, hereinafter referred to as “You ”or“ End User”.
Personal Information: Refers to all kinds of information recorded electronically or in other ways that can identify a specific natural person or reflect the activities of a specific natural person either alone or in combination with other information.
Personal Sensitive Information: Refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, and is highly likely to cause damage to personal reputation, physical and mental health, or discriminatory treatment, including ID number, personal biometric information, communication records and contents, property information, whereabouts, health physiological information, transaction information, etc.
1.What types of information do we collect
In order to provide services to You and Enterprise User, ensure the normal operation of the services, improve and optimize our services, and ensure account security, e-mobile 7 will collect information that you actively provide, authorize to provide, or generate due to the use of the services in the following ways:
1.1 Account Information: When you log in to e-mobile 7 for the first time, the account and password information you use is pre-assigned by Enterprise User Administrator in the back-end. After logging in to the system, you can modify your account password, avatar, phone number, email, and other personal information through the account password and personal information modification function provided by e-mobile 7 and these information will be reported to e-mobile 7 Server for storage. These information belong to Enterprise User and are managed by Enterprise User Administrator.Weaver will not collect and process any of these information.
1.2 When you use e-mobile 7, in order to provide You and Enterprise User with e-mobile 7 products and services, maintain the normal operation of our services, improve and optimize our service experience, and ensure the security of your account, the system will collect the following information from You:
1.2.1 Device information: Based on the device model and permissions granted during the installation and use of e-mobile 7, we collect information about the devices using e-mobile 7 including device model, operating system, unique device identifier (DEVICEID), network SSID, Android ID,device location information (such as login IP address, GPS location and Wi-Fi access points that can provide relevant information), e-mobile 7 software version number anddevice sensors(such as gravity-sensing devices), etc.
1.2.2 Log information: When you use e-mobile 7, the system will collect log Information about your use of the service, including the way, type and status of access to the network, network quality data, operation logs, and service log information.
Youunderstand and agree that all of the above information may be stored and recorded on e-mobile 7 Server, including device model, operating system, software version used, current Enterprise User ID, unique device identifier (DEVICEID), network SSID, the current network status and other information will be passed to Weaver APP version upgrade service as judgment data for upgrade detection.
1.3 In order to provide office management and communication services, the system will collect information and data submitted or generated by Enterprise User and End User of Enterprise User during the use of e-mobile 7 (hereinafter referred to as “Enterprise Control Data”). The Enterprise Control Data may include:
1.3.1 Your name, photo, gender, phone number, and other personal information requested by Enterprise User.
1.3.2 Your geographic location information and sign-in/out records when you use the sign-in/out function, approval records, and texts, pictures and videos and other information sent during chats.
1.3.3 Other data submitted by Enterprise User, such as organizational structure, approval workflows, etc.
Youunderstand and agree that these data are stored on e-mobile 7 Sever. Enterprise User are the controller of Enterprise Control Data, and the system only processes them according to the instructions of Enterprise User (including operations performed by Enterprise User and Enterprise User Administrator through the management back-end) and the protocols between us and Enterprise User. IfYouhave any questions or opinions about the purpose, scope, and usage of the above Enterprise Control Data collection, please contact Enterprise User Administrator for handling.
1.4 When Enterprise User need to enable e-mobile 7 face recognition service, it needs to upload your personal photo information to a third-party face recognition service platform as the basic data of the face recognition function.Before Enterprise User asks you to upload and let it manage your photo information, please ensure that Enterprise User has notified you in advance and obtained your explicit consent for the fact that is to only collect your information necessary to achieve operational and functional purposes, and it has fully informed you of the purpose, scope and use of relevant data collection, etc.
1.5 When you use some of the functions of e-mobile 7 (such as login system, approval workflow, attendance punching, etc.), Enterprise User may enable face recognition to verify your identity for security reasons, and this process may collect your facial image information you provided before.The above information is sensitive information, and refusing to provide this information will only make you unable to use the corresponding function, but it will not affect your use of other functions that do not rely on this function.
1.6 You understand and agree that some individual services may require you to enable specific access permissions in your device in order to enable the collection and use of information covered by those permissions. For example:For example:
1.6.1 After you enable the photo album and camera permissions, you can upload and take photos/pictures/videos, and realize functions such as scanning codes, posting information and commenting, and video chatting, among which you can control the flash when taking photos/pictures and scanning codes.
1.6.2 After you enable the address book permission, we can obtain the information of your address book friends, so that you can view the mobile phone address book friends in the system phone contacts in e-mobile 7.
1.6.3 After you enable the microphone and voice related permissions, you can use the voice function to interact with our products and other people, or contact customer service, as well as send recording files and use the voice-to-text function, etc.
1.6.4 After you enable the location permission, we can obtain your location information to display your current location in feedback comments, send location information in chat, etc.
1.6.5 After you enable the permission of letting us read/write your calendar, we can obtain your schedule time to provide you with functions such as recording and reminders.
1.6.6 After you enable the permission to read and write mobile phone storage, we can store some local setting data on your device to reduce your unnecessary network traffic and provide you with a smoother experience.
1.6.7 After you enable the permission to make calls and send text messages, we can call and send text messages to your colleagues and customers in the system.
1.6.8 After you enable the notification permission, your daily office messages can be displayed in the notification bar and you can jump to related pages.If you need to be reminded by vibration after receiving messages, you can enable the vibration permission in the notification management; if you need to receive message push even when you are offline, you can choose to enable the permission of e-mobile 7 startup upon boot.
1.6.9 After you enable the Bluetooth permission, you can use Bluetooth to connect your Qiyuesuo devices..
1.6.10 After you enable the display permission on top of other APPs (floating window permission), when you open the H5 interface in e-mobile 7, you can choose to float the interface for later viewing; secondly, you can choose to minimize the interface for audio/video calls.
1.6.11 Retrieve running applications: Used to detect whether the APP process has been recycled by the system; close the APP: automatically restart the APP when there are exceptions.
1.6. 12 Collect the installed application information, and judge whether the required application has been installed before waking up and using other APP functions (such as using Kinggrid endorsement, WPS endorsement, WeChat sharing, map navigation, etc.).
1.6. 13Clipboard permissions: When you copy text information, titles, etc., your clipboard function may be called. Clipboard information will only be processed on your device, and we will not store your clipboard information for any other means.
1.6. 14After the APP permissions are allowed, you can find e-mobile7 in the Mobile Phone Settings ->Application Management ->Permission Management -> (some mobile phones may have some differences in the specific opening path), you can view the specific permissions of the APP, and you also can perform permission recalling here.
1.7 Information provided by third parties
Enterprise User may publish applications independently developed by it or developed by other third parties to e-mobile 7 for your use.During the use process, the providers of these functions may collect, use, and store your relevant data or information.Before deciding whether to use these services, please consult with Enterprise User Administrator and fully understand their personal information and privacy protection policies.
In particular, if the mobile phone you use belongs to the following mobile phone manufacturers (such as Xiaomi, Huawei, VIVO, OPPO, etc.) when using e-mobile 7 , the above-mentioned mobile phone manufacturers we accessed need to collect the unique identification information of the mobile phone when pushing SDK such as device number IMEI,device identification code IMSI), and may collect parameters such as your mobile phone model, system type, system version, and device screen size to push our product information. For details, please refer to the privacy policy or related statement of the SDK operator.
The third-party software development kit (SDK) we access
In order to adapt to using [e-mobile 7] and third-party platform services on different mobile devices, to realize your audio and video calls, voice-to-text function, attendance and positioning, receive information push, log in to third-party platform accounts, share information on third-party platforms, and cloud invoice management, 【e-mobile 7】 has accessed to a third-party SDK. Some third-party SDKs 【e-mobile 7】】 accessed may call your device permissions and obtain your relevant information so that you can use the corresponding functions normally on different mobile devices or third-party platforms. We will list these information about these third-party SDKs with personal information collection functions, including their names, functions/services provided, official website links, privacy policy links, the applied permissions to call, and the types of personal information to collect. The types of device permissions and information obtained by different third-party SDKs may vary, including obtaining your location information, reading/writing to your external storage card, reading your phone status and identity, and viewing WLAN connections. We recommend that you refer to the relevant service agreements and privacy policies of third-party SDKs regarding the specific types of device permissions that third-party SDKs called, as well as how to collect and use your personal information. If you want to know more about the third-party SDKs we access, please read the third-party SDK descriptions.
Description of third-party SDK on Android
Description of third-party SDK on iPhone
1.8 According to relevant laws and regulations, the collection of your information in the following situations does not require your authorization and consent:
1.8.1 Related to national security and national defense security.
1.8.2 Related to public safety, public health, and major public interests.
1.8.3 Related to criminal investigation, prosecution, trial, and execution of judgments, etc.
1.8.4 To safeguard the significant legitimate rights and interests of the information subject or other individuals, such as life and property, but it is difficult to obtain your personal consent.
1.8.5 The information collected is publicly available to the public on your own.
1.8.6 Necessary to conclude a contract at your request.
1.8.7 Necessary for maintaining the safe and stable operation of e-mobile 7 services, such as detecting and disposing of product or service failures.
1.8.8 Necessary for legitimate journalism.
1.8.9 It is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing academic research or description results to the public, de-identify the information contained in the results.
1.8.10 Other circumstances stipulated by laws and regulations.
Please understand that the functions and services we provide to you are constantly updated and developed. If a function or service is not included in the above description and requires the collection of your information, we will separately explain the content, scope and purpose of information collection to you through page prompts, interactive workflows, website announcements, etc. in order to obtain your consent.
1.9 Self-boot and associated boot instructions
1.9. 1 In order to ensure that the application can normally receive the information pushed by the client when the application is closed or running in the background, the application must use (self-boot) capability, there will be a certain frequency to send broadcasts through the system to wake up the application’s self-boot or associated boot behavior, which is necessary to achieve functions and services.
1.9. 2 When you open a content-type push message, after obtaining your explicit consent, it will jump to open the relevant content. There will be no self-boot or associated boot without your consent.
1.9. 3 When you open the file downloaded in this APP, the third-party APP will be booted in association.
2.How do we store these information
2.1 Location of information storage
Except for the third-party information specifically described above, other information is stored on Enterprise User’s own server. If you need to know the specific geographical location of Enterprise User’s server, please consult Enterprise User Administrator.
2.2 Duration of information storage
Generally, we retain your personal information only for as long as is necessary to achieve the purpose. For some Enterprise Control Data (such as chat records, file pictures, etc.) that Enterprise User can independently set the retention period for it, the system will retain relevant information according to the settings of Enterprise User. For specific storage rules, please consult Enterprise User Administrator.
3. How do we protect these information
3.1 We will strive to provide protection for users’ information security at the system level to prevent information loss, improper use, unauthorized access or disclosure.
3.2 We will recommend that Enterprise User use various security protection measures within a reasonable security level to ensure information security.For example, we will use encryption technology (for example, SSL /TLS) anonymization processing and other means to protect your personal information.
3.3 Every time users log in, they must enter a unique username and password. e-mobile 7 only sends “cookie” session, which are used to record encrypted identity authentication information during a particular session. The session “cookie” does not contain the user’s username and password. Instead of using “cookie” to store other confidential user and session information, e-mobile 7 implements more advanced security methods based on dynamic data and encoded session IDs.
3.4 Because e-mobile 7 system is deployed in Enterprise User’s own server and network environment, the security of the basic operating environment and the deployment and operation of the e-mobile 7 system is guaranteed by Enterprise User, and we will give Enterprise User reasonable security suggestions for the basic operating environment. Different Enterprise User may adopt different security policies according to their own security requirements. For the protection measures of the basic operating environment of Enterprise User, please consult Enterprise User Administrator.
4. How do we use these information
4.1 The device information and log information obtained by the authorization system during the use of e-mobile 7 are mainly used to ensure the normal operation of the system functions, and will not be used for any other commercial purposes.
4.2 For the use of Enterprise Control Data, please consult the corresponding Enterprise User Administrator.
5. Information sharing and external availability
In addition to the above description in order to ensure the use of system functions, e-mobile 7 needs to interact with third-party systems and will transfer necessary data to third-party systems, but the system itself will not automatically share or transfer your personal information to third parties.
Whether Enterprise User need to share and provide externally the data you submit, please consult the corresponding Enterprise User Administrator.
6. Content and copyright
Weaver does not own the content you submit on the service. You retain ownership of such content.
You understand that Weaver is not responsible or liable in any way for any content provided by users, and that Weaver has no obligation to review such content in advance. However, Weaver reserves the right to determine at any time whether the content is appropriate and consistent with the Terms of Use. If such content is found to violate the Terms of Use or is otherwise objectionable, Weaver may, at any time and in its absolute discretion, screen, transfer, reject, modify and /or delete content at any time and in its absolute discretion without prior notice. Weaver owns the design and patent of the service. You may not reproduce, copy, or reuse any part of the code or design without the written consent of Weaver.
7. Changes to This Policy
We may revise This Policy in due course. When the terms of This Policy change, we will notify you through the official website announcement (https://www.weaver.com.cn)
8. Others
Because e-mobile 7 products are deployed on servers controlled by Enterprise User and managed and maintained by Enterprise User or their authorized management personnel, Enterprise User needs to consult their management personnel on how to ultimately use these functions to collect, store, and use information. This protocol can only explain the ability to collect privacy information contained in the product, as well as the scope and storage method of general collection and use.
The user information of e-mobile 7 products is stored on the server independently controlled by Enterprise User. The creation, management, and logout of the account are under the unified control and management of enterprise system administrator. The status change of the account (such as logout) takes effect immediately after the operation of the system administrator.
9. Contact us
When you have other complaints and suggestions, please through https://www.weaver.com.cn/ to contact us.You can also send your questions to emobile@weaver.com.cnor to the following address:
Customer Service Department of Weaver Software Park, No. 3419 Sanlu Highway, Minhang District, Shanghai
Zip Code:201112
We will review the questions involved as soon as possible and respond within fifteen days after verifying your user identity.