Yackshow Privacy Policy

Update Date: April 12, 2023
Effective Date: April 12, 2023

Notice Clause

    Your trust is very important to us, and we are well aware of the importance of personal information to you. We will comply with the requirements of laws and regulations, take appropriate security protection measures, and do our best to protect the security and controllability of your personal information. In view of this, the service provider of Yack show (or referred to as “we”) has formulated this “Privacy Policy” (hereinafter referred to as “this policy or this privacy policy”) and reminds you:

    This policy applies to all products and services provided by Yack show, including but not limited to applications for computers and mobile smart terminals, web pages, software development kits (SDKs) and application programming interfaces (APIs) for use by third-party websites and applications, and services. It should be noted that this policy does not apply to services provided by other third parties to you. To ensure a smooth product experience, you may receive content or network links provided by third parties. Please carefully choose whether to access the links, content, products, and services provided by third parties. Before submitting personal information to third parties, please carefully read their privacy policies.

    Before using the Yack show, please make sure to read and thoroughly understand this policy and start using it only after confirming that you fully understand and agree. If you have any questions, comments, or suggestions about the content of this policy, you can contact us through various contact methods provided by Yack show.

Part I Definitions

Yack show: Refers to Yack show client.
Yack show service provider: Refers to the Internet information and software technology service provider of Yack show【Prudence Technology Co., Ltd】.
Children:Refers to minors under the age of fourteen.
Personal information: Refers to various information recorded electronically or in other ways that can identify a specific natural person’s identity or reflect a specific natural person’s activity status, either alone or in combination with other information.
Personal sensitive information: Refers to personal information including identity card numbers, personal biometric information, bank account numbers, property information, whereabouts, transaction information, children’s information, etc.
Personal information deletion: Refers to the act of removing personal information from the systems involved in the implementation of daily business functions, making it remain in a state where it cannot be retrieved or accessed.Part

Part II Privacy Policy

This Privacy Policy section will help you understand the following:

Collection, protection and use of your personal information

I. How do we manage your personal information

II. How do we protect your personal information

III. How do you manage your Personal information

IIII. How do we handle minors’ personal information

V. How is your personal information transferred globally

VI. The permissions we are requesting from your phone

VII. How is this Privacy Policy updated

VIII. How to contact us

Collection, protection and use of your personal information

You understand and agree that:

  1. We are committed to creating excellent product features and services to meet your needs. Because there are many kinds of functions and services in the products we provide to you, and the specific product functions and service scope selected by different users are different, correspondingly, the types and scopes of various functions and personal information collected and used will be different, please refer to the specific product functions and service functions.

  2. In order to provide you the better product features and service experience, we are constantly trying to improve our technology, and we may introduce new or optimized features from time to time, and may need to collect and use new personal information or change the purpose or method of using personal information. In this regard, we will separately explain to you the collection purpose, scope and use method of the corresponding information by updating this policy, pop-up Windows, page prompts and other ways, and provide you with the means to choose consent independently, and collect and use the information after obtaining your express consent.

  3. In order to realize various specific business functions, we may need to collect relevant personal information from end users, mainly including: log information (including: third-party developer custom logs, Logcat logs and APP crash stack information), device ID (including: androidid and idfv), networking information, system name, system version, and country code.

  4. User information authentication service: When you use functions or services that require identity authentication, you may be required to provide your name, ID number and phone number to confirm your real identity according to relevant laws and regulations. This information is sensitive personal information, you can refuse to provide, but you may not be able to access the relevant services.

  5. Network signal broadcast: the Yack show can broadcast the network signal of the mobile phone, including wifi signal strength and sim card signal strength and network type. To do this, the Accessibility Assistant needs to use information about the location of your device. Among them, the location permission involves personal sensitive information. If you refuse to provide it, the Yack show will not broadcast the sim card signal, and will not affect the normal use of other services that do not require location permission.

The above information we collect and use is de-identified, and the data analysis only corresponds to specific codes that cannot be directly associated with your identity, and will not be associated with your real identity.

  1. Search: When you use the Yack show voice service, we will collect your voice search keywords. In order to provide efficient voice services, some search keywords and service log information will be temporarily stored in your local storage device, and search results and search history may be displayed to you.

When you use the scanning QR code search and voice search function, we need to obtain the camera and album reading permission of the system, and the microphone recording permission to support the provision of the above functions. We will collect the above information if and only if you invoke the corresponding function by clicking on the QR code scanning/voice search entrance, or in other ways that can be provided by future mentally accessible assistants. If you refuse to allow us to collect the above information, please turn off the camera and album reading permission, microphone recording permission function of the device or do not invoke the corresponding function. But this will also result in you not being able to access the relevant services.

  1. Information exchange and interaction

(1) When communicating and interacting with other users and inviting friends, we may request your address book permission, obtain your friends’ contact information and assist you in sending and adding invitation messages. This function may also request your short message and call record permission. If you refuse to provide it, it will not affect your normal use of other functions. But you won’t be able to invite your friends by phone number.

(2) Participate in operation activities: The Yack show will launch operation activities for newly launched services and functions from time to time. If you participate in relevant operation activities, we will collect your identity information and contact information through the operation activity interface, including but not limited to, in order to get in touch with you, verify your eligibility for rewards, and issue operation rewards to you. If you do not participate in the relevant operation activities, you do not need to provide the above information. If you participate in the operation activities but refuse to provide, you will not be able to receive the relevant rewards

  1. Customer service and problem solving

Contact us through customer service consultation and other means: When you contact us, we will collect the consultation content provided by you and your contact information (name, address, email address or other contact information you leave) and other information in order to contact you or help you solve the problem, or record the solution and result of the relevant problem.

  1. Provide security for you

(1) Safe to use

The content or execution of some third party software may cause damage to your mobile phone, operating system, or Yack show. Therefore, when you use other third-party software, the mind accessibility assistant will read the content of the program file that attempts to execute, analyze whether the file will violate the user’s mobile phone, and upload it to the mind Accessibility Assistant cloud security data center for security testing of the third-party software information.

Some products and services include a unique application number, which is sent to the Yack show along with information related to the installation (such as operating system type and application version number) when you install, activate, update, uninstall the relevant products and services or access the relevant products and services through the Yack show. Yack show will analyze such information to prevent, detect, investigate fraud, compromise account security or other violations of the agreement with us, or for the purpose of your access.

(2) Safe operation

In order to improve the security of your use of the services provided by us and our affiliated companies and partners, protect the personal and property safety of you or other users or the public from infringement, better prevent phishing software, fraud, software vulnerabilities, computer viruses, malware invasion and other security risks, and more accurately identify violations of laws and regulations or our relevant agreement rules, We may use or integrate your membership information, device information, service log information, and information authorized by you or shared by our affiliates and partners in accordance with the law to comprehensively judge your account risk, perform identity verification, detect and prevent security incidents, and take necessary record, audit, analysis and disposal measures according to law.

  1. Others

(1) If the information you provide contains the personal information of other users, you should ensure that you have obtained legal authorization before providing such personal information to us. (2) If we use the information for other purposes not specified in this Policy, or use the information collected for a specific purpose for other purposes, or we actively obtain your personal information from a third party, we will obtain your consent in advance.

If we obtain your information indirectly from a third party, we will explicitly request the third party in writing to collect personal information after obtaining your consent in accordance with law, and inform you of the content of the shared information before providing sensitive information to us, and require the third party to make a commitment to the legality and compliance of the source of personal information. If a third party violates the law, we will explicitly require the other party to bear the corresponding legal responsibility; At the same time, our professional security team will strengthen the security of personal information (including sensitive information reporting, sensitive information encryption storage, access control, etc.). We will use the same protection means and measures as we do for the personal information of our own users to protect the personal information obtained indirectly.

  1. Exceptions to authorized consent

You fully understand and agree that we do not need your authorization to collect and use your personal information in the following circumstances, and we may not respond to your request for correction, modification, deletion, cancellation, withdrawal of consent, or information request:

(1) those related to national security or national defense security;

(2) those related to public security, public health or major public interests;

(3) those related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and execution of judgment;

(4) In order to protect the life, property and other important legitimate rights and interests of you or other individuals, but it is difficult to get my consent;

(5) Personal information that you disclose to the public by yourself;

(6) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

(7) It is necessary to sign and perform relevant agreements or other written documents with you;

(8) necessary to maintain the safe and stable operation of the products and/or services provided, for example, to detect and deal with the failure of the products or services;

(9) necessary for lawful news reporting;

(10) When it is necessary for an academic research institution to carry out statistical or academic research in the public interest and provide the results of academic research or description to the outside world, the personal information contained in the results is de-identified;

(11) Other circumstances stipulated by laws and regulations.

Please be aware that, in accordance with applicable laws, if we take technical measures and other necessary measures to process personal information so that the recipient of the data cannot re-identify a particular individual and cannot be recovered, or we may conduct de-identified research, statistical analysis and prediction of the collected information to improve our content and layout and provide product or service support for business decisions, And to improve our products and services (including the use of anonymized data for machine learning or model algorithm training), the use of such processed data does not require further notice to you and your consent.

  1. If we stop operating our products or services, we will promptly stop the activities of continuing to collect your personal information, notify you of the notice of cessation of operation in the form of delivery or announcement one by one, and delete or anonymize the personal information we hold related to the discontinued business.

  2. Access to third-party SDK instructions

In order to provide more services to users, ensure service stability and quality, or upgrade related functions, we may need to adjust the third-party SDKS we access.We will timely explain to you on this page the latest situation of third-party SDKS that involve the collection of user information. Third-party SDKS use instructions:

IFlytek: User information collection purpose: Language information, text information, device information, log information is mainly used to provide voice to text after voice input, speech synthesis, voice evaluation service, voice synthesis service after text input, authorization accounting, user identification; More accurately locate and solve the problems encountered by developers and end users when using our products and/or services, avoid conflicts with other applications, count the usage of services, and ensure the stability of services and network security; Conduct data statistics and operational analysis, improve and optimize product interaction experience. https://www.xfyun.cn/doc/tts/offline_tts/offline_tts_sdkprivacy.html#

Firebase: User information collection purpose: IP addresses and firebase installation IDs are mainly used for excuting event-handling functions and HTTP functions based on end-user actions, and sending notifications. Where the IP addresses are only saved temporarily, and the installation IDs are retained but will be removed within 180 days if requested.

Links to third party privacy policy

https://global.xfyun.cn/doc/policy/privacy.html#i-definition-and-interpretation

https://firebase.google.com/support/privacy?hl=en&authuser=0 

  1. Provide security for users

In order to ensure the security of the account and system operation, and meet the relevant requirements of laws and regulations and our agreement rules, we will obtain the user’s device information, including the user’s device attributes, connection and status information, when the user uses our products with the authorization of the user. Such as device model, device identifier (such as IMEI/androidID/IDFA/OPENUDID/GUID/OAID, SIM card IMSI, ICCID information, etc.), the equipment list of MAC address, software, telecom operators such as hardware and software information.

Please be aware that we may attempt to read or write SDcard data (public storage area) to ensure the smooth operation of the APP.

In the process of using the software, in order to enable users to use the Yack show software for screen reading at any time, we need to ensure that the software can run normally in the background for a long time, so we need to enable the application self-start and associated start functions. The battery consumption may increase slightly after turning on the self-start function, this situation is normal, but it does not cause any adverse impact on the hardware device and system function. Please feel free to use. After the association launch function is enabled, the assistant may be awakened by other related applications in the background, which will not affect the normal use of the user. We don’t arbitrarily steal user privacy and collect data in the background. The purpose of enabling the above two features is just to ensure that our software can stay in the background, so as to continue to provide more stable services to users. There will be no other malicious behavior or influence.

I. How we manage your personal information
  1. Sharing

We will not share your personal information with companies, organizations, and individuals outside of our intellectual disability assistance service providers, except for the following situations:

    • Sharing under statutory circumstances: We may share your personal information externally according to laws and regulations, litigation, dispute resolution needs, or upon requests from administrative or judicial authorities.

    • Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

    • Sharing between affiliated companies: In order to provide you with products and services based on intellectual disability assistance, identify abnormal user information, and protect the personal and property safety of affiliated companies or other users or the public from infringement, your personal information may be shared with our affiliated companies or their designated service providers. We will only share necessary personal information and are subject to the purposes stated in this privacy policy. If we share your sensitive personal information or alter the use and processing purpose of personal information by affiliated companies, we will seek your authorization and consent again.

    • Sharing with authorized partners: We may entrust authorized partners to provide certain services for you or represent us in fulfilling functions, and we will only share your information for legitimate, proper, necessary, specific, and explicit purposes stated in this privacy policy. Authorized partners can only access the information needed to perform their duties and may not use this information for any other purpose. We will conduct strict security checks on the authorized partners’ application interfaces (APIs) and software development kits (SDKs) and agree on strict data protection measures to ensure that they process personal information in accordance with our entrusted purposes, service descriptions, this privacy policy, and any other relevant confidentiality and security measures.

  1. Transfer

We will not transfer your personal information to any company, organization, or individual, except for the following situations:

    • Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

    • In case of merger, acquisition, or bankruptcy liquidation of the product service provider, or other situations involving merger, acquisition, or bankruptcy liquidation, if personal information transfer is involved, we will require the new holder of your personal information to continue to be bound by this policy, otherwise, we will request the company, organization, and individual to seek authorization and consent from you again.

  1. Public disclosure

We will only publicly disclose your personal information in the following situations:

    • With your explicit consent or based on your active choice, we may publicly disclose your personal information;

    • If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of this product, or to protect the personal and property safety of the users of this product and its affiliated companies or the public from infringement, we may disclose your personal information, including relevant violations and measures taken against you, with your consent under the laws and regulations or relevant agreement rules of this product.

    • Exceptions to obtaining authorization and consent in advance for sharing, transferring, and publicly disclosing personal information

The sharing, transfer, and public disclosure of your personal information do not require your prior authorization and consent in the following situations:

    • Related to national security and national defense security;

    • Related to public safety, public health, and major public interests;

    • Related to criminal investigation, prosecution, trial, and judgment enforcement, etc.;

    • Difficult to obtain personal consent for the purpose of safeguarding the life, property, and other significant legal rights and interests of you or other individuals;

    • The personal information publicly disclosed by yourself to the public;

    • Collecting personal information from legally publicly disclosed information, such as legal news reports and government information disclosure channels. According to legal provisions, sharing and transferring de-identified personal information and ensuring that data recipients cannot recover and re-identify the subject of personal information do not belong to external sharing, transfer, and public disclosure of personal information. The storage and processing of such data do not require notifying you and obtaining your consent.

II. How We Protect Your Personal Information Security

(I) We have adopted industry-standard, reasonably practicable security measures to protect your information, to prevent unauthorized access, public disclosure, use, modification, damage, or loss of personal information. We will use encryption technology to enhance the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to strengthen employees’ awareness of the importance of protecting personal information.

(II) We have an industry-leading data-centric security management system that focuses on the data lifecycle, improving the security of the entire system from multiple dimensions, including organization building, system design, personnel management, and product technology.

(III) We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only keep your personal information for the period necessary to achieve the purposes described in this policy unless the law requires mandatory storage. The criteria we use to determine the aforementioned retention period include:

    • Ensuring the safety and quality of our services provided to you;

    • Whether you agree to a longer retention period;

    • Whether there are other special agreements on the retention period. After the retention period of your personal information, we will delete your personal information according to the requirements of the applicable law or make it anonymous.

(IV) The Internet is not an absolutely secure environment, when using the services provided by the Yack show, we strongly recommend that you do not use communication methods other than those recommended by the Prudence Screen  Reader to send your information. You can establish contacts and share with each other through our services. When you create communication, transaction, or sharing through our services, you can choose the objects you communicate with or share with. Third parties that can see your contact information, communication information, or shared content, etc. Please note that the information you voluntarily share or even publicly share when using our services may involve your or other people’s personal information or even personal sensitive information. Please carefully consider whether to share or even publicly share relevant information when using our services. We will do our best to ensure the security of any information you send to us. If our physical, technical, or management protection facilities are compromised, resulting in unauthorized access to, public disclosure, tampering or destruction of, information that compromises your legitimate rights and interests, we will bear the corresponding legal responsibility.

(V) We will update and publicize security risks, personal information security impact assessment reports, and other relevant content from time to time. You can obtain them through our announcement method. (VI) In the unfortunate event of a personal information security incident, we will inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take, the advice you can independently prevent and reduce risks, and the remedies available to you in accordance with the requirements of laws and regulations. We will inform you of the situation related to the incident by email, letter, phone, push notification, etc. If it is difficult to inform the personal information subject one by one, we will take reasonable and effective means to issue a public announcement. At the same time, we will also report the handling status of personal information security incidents according to the requirements of regulatory authorities.

III. How do you manage your personal information

You can access and manage your personal information in the following ways:

1. To correct or supplement your personal information

When you find that there is an error in your personal information processed by us, you have the right to ask us to make corrections or supplements. You may request corrections or additions to us.

2. Delete your personal information

(1) You may request us to delete your personal information in the following circumstances:

    • If our processing of personal information violates laws and regulations;

    • If we collect and use your personal information without your explicit consent;

    • If our processing of personal information seriously violates our agreement with you;

    • If you no longer use our products or services, or you take the initiative to cancel the product;

    • If we permanently no longer provide you with products or services.

(2) If we decide to respond to your request for deletion, we will also notify the subjects who have obtained your personal information from us as far as possible to delete them in time, unless otherwise provided by laws and regulations, or these subjects have obtained your independent authorization.

(3) When you delete information from our Services, we may not delete the corresponding information from the backup system immediately, but will delete such information when the backup is updated.

3. Change the scope of your authorization and consent

Each business function requires some basic personal information to be completed (see Section 2 of this Privacy Policy). In addition, you can revoke part of the authorization by unbinding, modifying personal Settings, deleting relevant information, etc., and you can also revoke part of the authorization by closing the function.

When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the processing of personal information previously carried out based on your authorization.

4. The personal information subject canceling the account

(1) After you cancel your account, we will stop providing products or services to you, delete your personal information or anonymize it as required by applicable laws.

(2) Logout process: Add the account logout option in the user center, click the account logout, and enter the logout process; After clicking on the account logout option, the relevant prompt for logout will pop up first, which will be displayed in the form of a pop-up window. The specific prompt content is “After account logout, we will directly clear all the data of the account, including but not limited to points, angel rank, unused CAPTCHA identification times, unused OCR identification times, and all assistant setting data that have been backup to the server”. The popup gives me two option buttons: I think again and I want to log out; When the user clicks I think again, it is regarded as giving up logout. When the user clicks I want to logout, it enters the next logout process. Click I want to log out, enter the cancellation reason selection interface, here gives “the phone number stopped using, can not receive SMS verification code, the software has too few functions, there is no function I want, the software is too card, difficult to use, the gesture operation is complex, I have to pay to read the screen, and the membership expires in the use of other reasons” 6 options, each option in the form of check box display. Multiple options available. If the user chooses another reason, they can enter a reason for logout up to 200 words. Give the next option button at the bottom of the logout reason interface, click Next to enter the next logout process; After entering the next step, the second part of the logout result prompt window will pop up, and the specific prompt content is “After the account is cancelled, we will retain the account data for 7 days. If you log in the account again within 7 days, it will be regarded as giving up the logout. If you do not log in the account within 7 days, you will be logged out successfully. Are you sure you want to log out?” Two option buttons are given to continue using and cruel logout. Users click to continue to use, then give up logout, click cruel logout, enter the next step process; Click cruel logout, enter the interface to obtain SMS verification code, successfully enter the SMS verification code, click the Finish button, the whole logout process is over. The logout results popup window then pops up. “This account has applied for cancellation. Within 7 days, you can login the account again and continue to use it. If you do not log in again, the account will be closed within the specified time.” Click the I Know option button to close the popup.You then go straight back to the assistant user center interface, where the user center is not logged in.

5. Automatic decision-making of the constraint information system

In some product features, we may only make decisions based on non-human automatic decision mechanisms such as information systems, algorithms, and so on.If these decisions significantly affect your legal rights and interests, you have the right to ask us to give an explanation, we will also not infringe the product trade secrets or other user rights, social public interests under the premise of providing a way to appeal.

6. To respond to your above request

(1) For security purposes, you may be required to provide a written request or otherwise prove your identity. We may first ask you to verify your identity before processing your request.

(2) We will give you a reply within 15 days.

(3) For your reasonable request, we will not charge fees in principle, but for repeated, beyond the reasonable limit of the request, we will charge a certain cost. We may reject requests that are unreasonably repetitive, require excessive technical effort (e.g., require the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate interests of others, or are highly impractical.

(4) In the following circumstances, in accordance with laws and regulations, we will not be able to respond to your request:

    • Those related to national security and national defense security;

    • those related to public security, public health and major public interests;

    • Those related to criminal investigation, prosecution, trial and execution of judgment;

    • There is sufficient evidence that the personal information subject has subjective malice or abuse of rights;

    • Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

    • Involving trade secrets.

IV. How do we handle children’s personal information

Children are not allowed to create their own users without the consent of their guardian. If you are a child, we ask you to ask your guardian to read this Privacy Policy carefully and to use our services or provide information to us with your guardian’s consent.

In the case of collecting children’s personal information through the use of our products or services with the consent of the guardian, we will only use, share, transfer or disclose such information as permitted by laws and regulations, with the explicit consent of the guardian or necessary to protect the child.

V. How will your personal information be transferred globally

Personal information collected and generated by us during our operations in the People’s Republic of China is stored in the People’s Republic of China, except in the following circumstances:

There are clear provisions in laws and regulations:

  • Obtain your explicit authorization;

  • Your personal initiative such as cross-border transactions through the Internet.

  • In the above circumstances, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

VI. The permisisons we are requesting from your phone

Some of the functions of Yack show may require the permissions of your phone to work. You can choose to grant the permission or not. If not, the specific function will not be able to work but the others remains executable

android.permission.READ_PHONE_STATE

Yack show uses the permission to check if your phone has an incoming call, so that it can read the number of the phone call receiving.

android.permission.ANSWER_PHONE_CALLS

The reader uses the permission to help users answer the phone with a more convenient, shortcut guesture.

android.permission.use_exact_alarm

For the reader’s telling-time feature, so that the reader could offer the function telling the time regularly to help blind people, such as on time alarm.

android.permission.wake_lock

For keeping the phone screen to be continuously on when the TTS is reading long sentence, where the time reading exceeds the auto-lock time configured.

VII. How is this Privacy Policy updated

Our Privacy Policy may change.

(1) We will not limit your rights under this Privacy Policy without your explicit consent.We will post any changes to our Privacy Policy on a dedicated page (Settings – About Us – Terms of Use – Privacy Policy).

(2) For major changes, we will also provide more significant notification (including notification through the Yack show and even provide you with a pop-up alert).

Material changes referred to in this Policy include but are not limited to:

  1. Significant changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, and the way of using personal information;

  2. We have a significant change in control and so on. Such as the change of owners caused by mergers and acquisitions;

  3. The main object of personal information sharing, transfer or public disclosure changes;

  4. Significant changes in your rights to participate in the processing of personal information and the way in which you exercise them;

  5. When our responsible department for handling personal information security, contact information and complaint channels change;

  6. When the personal information security impact assessment report indicates that there is a high risk.

VIII. How to contact us

You can contact us through the following ways and we will reply to your request within 15 days:

(1) If you have any questions, comments or suggestions about the contents of this policy, you may contact us by email at prudenceinteractive@gmail.com

(2) If you are not satisfied with our reply, especially if you believe that our personal information processing behavior has harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit in the court with jurisdiction where the defendant is located.

Copyright © PRUDENCE INTERACTIVE. All Rights Reserved.