Flash Writer Privacy Policy

Effective Date: February 10, 2023 Updated Date: February 10, 2023

Special Note

Welcome to Flash Writer! Flash Writer service provider Jinsbell CO., LTD. and its affiliated companies that jointly provide Flash Writer (hereinafter referred to as " we ") are well aware of the importance of personal information to you, and will do our best to protect your personal information security reliable. We are committed to maintaining your trust in us and processing your personal information in accordance with the principles of lawfulness, propriety, necessity and good faith. Therefore, this "Privacy Policy of Jinsbell Technology" (hereinafter referred to as " this Policy ") is formulated so that you can fully understand how we collect, use, store, share and transfer this information when you use Flash Writer, and how we provide for you How you provide access, update, delete and protect this information. The network platforms (including but not limited to databases, official websites, mobile apps, WeChat platforms, etc.) on which we provide products or services may contain links or directions to other websites. Please note that we do not control the websites you are redirected to and this Privacy Policy does not apply to them under any circumstances. We recommend that you carefully read the privacy policies of those websites when you visit them. Before you use Flash Writer, please be sure to read this policy carefully to fully understand the content of each clause, and you can make choices you think are appropriate in accordance with the guidelines of this privacy policy. We try to use concise and concise terms for the related terms involved in this privacy policy, and provide better understanding for you. If you have any questions, please contact us.

This policy will help you understand the following:

  1. How we collect and use your personal information
  1. HOW WE USE COOKIES OR SIMILAR TECHNOLOGIES
  1. How we share, transfer and publicly disclose your personal information
  1. How we protect your personal information
  1. How you manage your personal information
  1. How we handle personal information of minors
  1. How this Privacy Policy is updated
  1. how to contact us

1. How we collect and use your personal information

1.1. Personal information refers to various information related to identified or identifiable natural persons recorded electronically or in other ways, excluding anonymized information. Sensitive personal information refers to personal information that, once leaked or illegally used, may easily lead to the infringement of the personal dignity of natural persons or the harm of personal and property safety, including biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts, etc. and personal information of minors under the age of fourteen.

1.2. We will follow the principles of legitimacy, legality, and necessity to collect and use the personal information that you voluntarily provide in the process of using Flash Writer or generated by using Flash Writer for the following purposes described in this policy, and from Third parties obtain your relevant personal information. If we want to use your personal information for other purposes not specified in this policy, or use the information collected based on a specific purpose for other purposes, we will notify you in a reasonable way and ask you again before using it. with your consent. When you cancel your account, we will stop using and delete the above information.

1.3. You must authorize us to collect and use your personal information 1.3.1. Our Flash Writer article includes some core functions , and we may collect, save and use the following information about you to realize the above functions. If you do not provide relevant information, you will not be able to enjoy the products and services we provide. These functions include: 1.3.1.1. Account registration, login and verification When you register an Flash Writer account, you need to at least provide us with the name, password, your own mobile phone number, and SMS verification code you are going to use , and we will pass Verify that your identity information is valid by sending a SMS verification code or email. When you use a third-party account (such as WeChat) to log in to Flash Writer, you need to authorize to read and share the public information (including nicknames, avatars, etc.) that you publish and record on the third-party platform in compliance with relevant laws and regulations. , region, gender, contact email address) in order to bind your third-party account with your account and remember your login identity as our user. 1.3.1.2. Commodity purchase and payment functions If payment settlement occurs during your use of Flash Writer, you can choose our affiliates or third-party payment institutions that we cooperate with (including Alipay, WeChat, UnionPay and other payment channels, as follows referred to as "Payment Institutions") to provide payment services. The payment function itself does not collect your personal information, but we need to share your order number and transaction amount information with these payment institutions so that they can confirm your payment instructions and complete the payment. 1.3.1.3. Customer service function If you contact our customer service, we may require you to provide necessary personal information for identity verification to ensure the security of your account. In order to provide services according to your demands, after your authorization, the human customer service personnel need to inquire or check your relevant information within the scope of your authorization. We will take technical and management measures to ensure the security of your information as much as possible, and within the necessary scope to use. We may save your contact information (the mobile phone number, WeChat ID, or other contact information you use or actively provide), your communication records and content with us, and other information necessary to provide and record customer service to you. 1.3.1.4. Security function In order to improve the security of your use of our products and services, protect your or other users’ personal and property safety from infringement, and better prevent security risks such as phishing websites, fraud, network vulnerabilities, and computer viruses, To more accurately identify violations of laws and regulations, we may collect, use or integrate your account information, transaction information, and device information to comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents, and Take necessary recording, auditing, analysis, and disposal measures in accordance with the law. 1.3.1.5. Functions such as text creation, rewriting, continuation, translation, and image generation When you use specific products and/or services of Inspiration, in order to meet the purpose of providing you with products and services, in addition to the information provided during registration, When you use our products and/or services, the content and information that you actively provide, upload or publish may reveal your sensitive personal information, please be cautious. We will not ask you to provide sensitive personal information (such as ID card, bank card, home address, etc. ).

1.4. Situations where you can choose to provide personal information independently 1.4.1. In order to make it more convenient or fun for you to use Flash Writer, so as to improve your experience when using it, our following extended functions may use your mobile phone and use your personal information. If you do not provide these personal information, you can still use the core functions of Inspiration, but you may not be able to use the extended functions we provide you or you need to fill in some information repeatedly.These extended functions include: 1.4.1.1. Supplementary account information After you complete the account registration, you can continue to fill in your information in the basic information column, including your birthday, gender, and unit name. If you do not provide this information, it will not affect your use of specific technical services. 1.4.1.2. Modify account password When you need to modify the account password, please enter the new password to complete the reset. When you need to modify your mobile phone number, please enter the new mobile phone number and SMS verification code. You can voluntarily bind your email on the settings page. At this time, you need to provide your email account and the SMS verification code we sent you for verification. If you need to set up a trusted device, you need to provide us with the name of the device you are using, the type of the device, and the last time it was used. 1.4.1.3. Access to third-party applications We may cooperate with third-party service providers to access third-party services in the service (such as placing advertisements, links or other forms of promotional content). We will not share your personal information (such as mobile phone number, nickname, avatar, friend list, etc.) that you provide to us or that we collect with third-party service providers, nor will we collect your personal information on behalf of third-party service providers information. Third-party service providers accessed through our services may have their own privacy policies, which are not bound by this Privacy Policy. Third-party service providers may collect personal information necessary to provide services to you in accordance with their own privacy policies. We will use commercially reasonable efforts to require third-party service providers to comply with relevant laws and regulations when processing your personal information, and try our best to require them to take relevant confidentiality and security measures. 1.4. You are fully aware that in the following situations, we do not need to obtain your authorization and consent for the collection and use of personal information 1.4.1. It is related to national security and national defense security. 1.4.2. Related to public security, public health, and major public interests. 1.4.3. Related to criminal investigation, prosecution, trial and execution of judgments, etc. 1.4.4. For the purpose of safeguarding the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the consent of the individual. 1.4.5. The collected personal information is disclosed to the public by the personal information subject or guardian. 1.4.6. Your personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels. 1.4.7. Necessary for signing a contract at your request. 1.4.8. It is necessary to maintain the safe and stable operation of the provided products and/or services, such as discovering and handling product and/or service failures. 1.4.9. Necessary for legitimate news reporting. 1.4.10. It is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing academic research or description results to the outside world, de-identify the personal information contained in the results. 1.4.11. Other circumstances stipulated by laws and regulations.

1.5. Situations where we obtain your personal information from a third party 1.5.1. We may obtain personal information that you authorize to share from a third party, and we will confirm the legality of the source of personal information in accordance with the agreement with the third party, Use your personal information under the premise of complying with relevant laws and regulations. HOW WE USE COOKIES OR SIMILAR TECHNOLOGIES

2.1. We may obtain and use your information by using COOKIES or similar technologies, and store this information as log information. 2.2. By using COOKIES, we provide users with a simple and personalized network experience. A COOKIES is a small amount of data that is sent from a web server to your browser and stored on your computer's hard drive. We use COOKIES to allow its users to benefit. For example, to make the login process of the NetEase virtual community faster, you can choose to save the username in a COOKIES. This will make it easier and faster to use Netease Services next time. COOKIES can help us to determine the webpages and content you are connected to, time you spend on certain NetEase Service and the NetEase service you have chosen. 2.3. COOKIES enable us to serve you better and faster, and make your experience on the Cookie service more personalized. You may reject or manage cookies or similar technologies through browser or user choice mechanisms. But please note that if you disable COOKIES or similar technologies, we may not be able to provide you with the best service experience, and some services may not be available normally. 2.4. We use our own COOKIES or similar technologies, which may be used for the following purposes: 2.4.1. Remember your identity. 2.4.2. Analyze your use of our services. 2.4.3. Ad optimization. 2.5. If you want to disable cookies, you can configure your browser: select "Reject Cookies" or "Notify you when a website sends Cookies". In view of the fact that our services are implemented by supporting COOKIES, after completing the operation of closing COOKIES, your visit may be affected or you may not be able to fully obtain our services. When you do not disable COOKIES, you may be prompted, for example, whether to retain user information the next time you enter this website to simplify login procedures (such as automatic login).

3. How do we share, transfer or publicly disclose your personal information 3.1. Entrusted processing 3.1.1. If we entrust a third party to process your personal information, we will agree with the entrusted party on the purpose, time limit, and processing method of entrusted processing , types of personal information, protection measures, rights and obligations of both parties, etc., and supervise the trustee's personal information processing activities. 3.2. Sharing 3.2.1. We share your personal information under the premise of abiding by the principles of "legality, minimum necessity, and clear purpose". At the same time, we will conduct personal information protection impact assessments on personal information sharing activities in advance, and take effective technical protection measures for output forms, transfers, and uses. At the level of cooperation agreements, the information protection obligations and responsibilities of partners are strictly required, and a data security protection agreement is signed with business partners before cooperation. 3.2.2. We will not share your information with any third party other than our company, except in the following circumstances: (1) Obtain your explicit consent or authorization in advance. (2) Share your information externally in accordance with applicable laws and regulations, legal procedure requirements, mandatory administrative or judicial requirements. (3) Only by sharing your personal information can we realize the core functions of our products and services or provide the services you need. (4) We may share your personal information with our affiliates in order to provide you with relevant products or services, show you content you may be interested in, protect your account and transaction security, etc. based on our provision of relevant products or services. We will share your personal information with our affiliates in accordance with the terms of this Privacy Policy, but we will only share necessary personal information and be bound by the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will ask for your authorization again. (5) We may share your information with partners and other third parties to ensure the smooth completion of the services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose. (6) Provided based on academic research. (7) Provided in accordance with the individual service agreement signed with you or other legal documents. 3.3. Transfer 3.3.1. Transfer refers to the process of transferring the control of personal information to other companies, organizations or individuals. 3.3.2. We will not transfer your personal information to any third party other than our company, except in the following circumstances: (1) Obtain your explicit consent or authorization in advance. (2) It must be provided in accordance with applicable laws and regulations, requirements of legal procedures, mandatory administrative or judicial requirements. (3) With the continuous development of our business, in the event of a merger, acquisition or bankruptcy liquidation, your information may be transferred as part of such a transaction. If the transfer of personal information is involved, we will require the new company, organization, or individual holding your personal information to continue to be bound by this policy, otherwise we will require the company, organization, or individual to seek your authorization again. 3.4. Public disclosure 3.4.1. We will not publicly disclose your personal information with any third party other than the company, except in the following circumstances: (1) We may comply with laws and regulations, litigation, dispute resolution, or according to Public disclosure of your personal information is required by administrative and judicial authorities in accordance with the law. (2) According to your needs, disclose the information you specify in the disclosure method you expressly agree to.

4. How do we protect your personal information 4.1. We have always attached great importance to the protection of users' personal information security. For this reason, we have adopted protection measures such as security technology, organization and management that meet industry standards to minimize the leakage of your information , damage, misuse, unauthorized access, unauthorized disclosure and alteration. 4.1.1. Data security technical measures 4.1.1.1. We will adopt security protection measures in line with industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed, used and modified without authorization, and to avoid Corruption or Loss of Data. 4.1.1.2. We adopt encryption technology to encrypt and store users' personal information, and isolate them through isolation technology. 4.1.1.3. When personal information is used, such as personal information display and personal information correlation calculation, we will use a variety of data desensitization technologies to enhance the security of personal information during use. 4.1.2. Other security measures we take to protect personal information 4.1.2.1. We manage and regulate the storage and use of personal information by establishing data classification and grading systems, data security management specifications, and data security development specifications. 4.1.2.2. We implement comprehensive security control over data through information contact confidentiality agreements, monitoring and auditing mechanisms. 4.1.2.3. We have established a data security committee and set up a dedicated information protection department and a data security emergency response organization to promote and protect personal information security. 4.1.2.4. We will organize security and privacy protection training courses to enhance employees' security awareness and understanding of personal information protection policies and related procedures. 4.1.2.5. All of your personal information will be stored within the territory of the People's Republic of China. At present, there is no scenario where we provide personal information overseas. If the transfer of personal information abroad is involved in the future, we will clearly inform you of the purpose, receiver, security measures, etc. of the transfer of personal information abroad, and we will obtain your consent separately. 4.2. Please be aware that although we will try our best to ensure the security of any information you send us, the Internet environment is not 100% safe, and we will not be liable for any risks or losses arising therefrom or related thereto. 4.3.After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures that you can independently prevent and reduce risks. Suggestions, remedies for you, etc. We will promptly inform you of the event-related procedures by email, letter, phone call, push notification, etc. When it is difficult to inform the personal information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

5. How do you manage your personal information 5.1. We attach great importance to the management of your personal information, and do our best to protect your access to personal information, correction, deletion, withdrawal of consent and other legal rights, so that you have sufficient ability to maintain Your privacy and personal information is safe. 5.2. Access and correct your personal information 5.2.1. Except as required by laws and regulations, you have the right to access and correct your personal information at any time, including: (1) account information; (2) browsing information. 5.2.2. If you need to access or correct other personal information generated during the use of our products and services, please feel free to contact us. We will respond to your request according to the method and time limit set out in this Privacy Policy. 5.3. Deletion of your personal information 5.3.1. In the following situations, you can request us to delete your personal information through the methods specified in this policy: (1) If our handling of personal information violates laws and regulations. (2) If you no longer use our products and services, or you cancel your account. (3) If we stop providing products and services, or the storage period has expired. (4) If you withdraw your consent. (5) If the purpose of our processing personal information has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose of processing. 5.4. Change or withdraw your consent 5.4.1. You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting information, turning off device functions, and setting privacy settings on the Flash Writer website or software. . You can also log off the account of the way, the withdrawal of all authorization for us to continue to collect all of your personal information. 5.4.2. Please understand that Flash Writer may need to collect necessary personal information to be realized. When you withdraw your consent, we will not be able to continue to provide you with the services corresponding to the withdrawal of consent, but it will not affect the previous personal information processing services based on your authorization. 5.5. Cancel your account 5.5.1. You can cancel your previously registered account at any time through the following methods: (1) Contact customer service You can apply for account cancellation by contacting online customer service (2) Email application You can send relevant information by email Application for cancellation of account (3) Telephone application You can apply for cancellation of account by contacting our official phone number 5.5.2.After you cancel your account, the content, information, data, records, etc. under the account will be deleted or anonymized (unless otherwise stipulated by laws and regulations or otherwise required by regulatory authorities). At the same time, once the account is canceled, it cannot be restored. 5.6. Response to your above request 5.6.1. If you are unable to exercise your rights in the above way, you can contact us using the contact information specified in this policy. To ensure the security of your account, when you make the above request to us, we may ask you to verify your identity before processing your request. 5.6.2. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means, pose risks to the legitimate rights and interests of others, or are very impractical. 5.6.3. Exceptions to response situations In the following situations, we will not be able to respond to your request: (1) It is related to our fulfillment of obligations stipulated by laws and regulations. (2) Directly related to national security and national defense security. (3) Directly related to public security, public health, or major public interests. (4) Directly related to criminal investigation, prosecution, trial and execution of judgments. (5) We have sufficient evidence that the subject of personal information has subjective malice or abuse of rights. (6) In order to protect the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the consent of the individual. (7) Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations. (8) Those involving commercial secrets.

6. How we handle personal information of minors 6.1. We attach great importance to the protection of personal information of minors. If you are a minor, you should obtain the consent of your guardian before using our products and services . We will protect the personal information of minors in accordance with relevant national laws and regulations. 6.2. We will not take the initiative to directly collect personal information from minors. For the collection of personal information of minors with the consent of the guardian, we will only use, share, transfer or disclose this information when permitted by law, consent of the guardian or necessary to protect the minor. 6.3. If it is proven that minors have used our products and services without the consent of their guardians, we will negotiate with the relevant guardians and try to delete the relevant personal information as soon as possible. 6.4. For minors under the age of 14, in addition to complying with the stipulations of this privacy policy on users' personal information, we will also uphold the principles of justification and necessity, informed consent, clear purpose, security and legal use, and strictly follow the "Children's Personal Information Network Protection Regulations and other laws and regulations require storage, use, and disclosure, and will not exceed the period necessary to achieve the purpose of collection and use. After expiration, we will delete or anonymize children's personal information. 6.5. If you are the parent or other guardian of a minor under the age of 14, we may need to collect the personal information of the child under guardianship from you for the purpose of performing relevant services to you. If it is necessary to collect children's personal information from you in a specific service, we will obtain your authorization in advance and inform you of the purpose and use of the collection. If you do not provide the aforementioned information, you will not be able to enjoy the relevant services we provide.

7. How to update this Privacy Policy 7.1. Due to changes in service content, contact methods, legal and regulatory policy requirements, etc., we may revise this Privacy Policy in due course. When the Privacy Policy changes, we will post it on our platform or send the updated version to the email address you provided. In order for you to receive notifications in a timely manner, it is recommended that you update your account information or notify us in time when your email address changes.

8. How to contact us 8.1. If you have any questions, comments or suggestions about this privacy policy, please contact us in the following ways: Contact number: 8613270860672 Email: developer@jinsbell.tw 8.2. Generally, we will contact you within ten days Reply within five working days. If you are dissatisfied with our reply, especially if our personal information processing behavior has damaged your legitimate rights and interests, you can also file a complaint or report to the regulatory authorities such as cyberspace, telecommunications, public security and industry and commerce, or submit a complaint to the defendant's domicile A court of competent jurisdiction seeks a solution by filing an action.