Bole Wuyou Privacy Policy

Effective Date: June   1 ,  2023  

Date of update: June   1, 2023  

Special Note

Welcome to use Bole Worry-free ! CHU CHIEN TECHNOLOGY LIMITED, the provider of Bole Worry-free services, and its affiliated companies (hereinafter referred to as " we ") who jointly provide services , are well aware of the importance of personal information to you, and will do their best to protect your personal information safe and reliable. We are committed to maintaining your trust in us and processing your personal information in accordance with the principles of lawfulness, propriety, necessity and good faith. Therefore, this " Bole Wuyou Privacy Policy" (hereinafter referred to as " this Policy ") is formulated so that you can fully understand how we collect, use, store, share and transfer this information when you use Bole Wuyou , and how we provide you with Provides ways to access, update, delete and protect this information.

The network platforms (including but not limited to databases, official websites, mobile apps, WeChat platforms, etc.) on which we provide products or services may contain links or directions to other websites. Please note that we do not control the websites you are redirected to and this Privacy Policy does not apply to them under any circumstances. We recommend that you carefully read the privacy policies of those websites when you visit them.

Before you use Bole Wuyou , please be sure to read this policy carefully to fully understand the content of each clause, and you can make choices you think are appropriate in accordance with the guidelines of this privacy policy. We try to use concise and concise terms for the related terms involved in this privacy policy, and provide better understanding for you. If you have any questions, please contact us.

This policy will help you understand the following:

1. How we collect and use your personal information

2. How do we use COOKIES or similar technologies

3. How we share, transfer and publicly disclose your personal information

4. How we protect your personal information

5. How you manage your personal information

6. How do we handle personal information of minors

7. How this Privacy Policy is updated

8. How to contact us

1. How we collect and use your personal information

1.1. Personal information refers to various information related to identified or identifiable natural persons recorded electronically or in other ways, excluding anonymized information. Sensitive personal information refers to personal information that, once leaked or illegally used, may easily lead to the infringement of the personal dignity of natural persons or the harm of personal and property safety, including biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts, etc. and personal information of minors under the age of fourteen.

1.2. We will follow the principles of legitimacy, legality, and necessity to collect and use personal information that you voluntarily provide during the use of Bole Wuyou or generated by using Bole Wuyou for the following purposes described in this policy, and from Third parties obtain your relevant personal information. If we want to use your personal information for other purposes not specified in this policy, or use the information collected based on a specific purpose for other purposes, we will notify you in a reasonable way and ask you again before using it. with your consent. When you cancel your account, we will stop using and delete the above information.

1.3. You must authorize us to collect and use your personal information

1.3.1. Our Bole Wuyou includes some core functions , and we may collect, save and use the following information about you to realize the above functions. If you do not provide relevant information, you will not be able to enjoy the products and services we provide. These functions include:

1.3.1.1. Account registration, login and verification

When you register for a Bole Wuyou account, you at least need to provide us with the name you plan to use , your own mobile phone number or email , SMS or email verification code , and we will verify your identity by sending a short verification code or email information is valid.

When you use a third-party account (such as WeChat) to log in to Bole Wuyou , you need to authorize to read and share the public information (including nicknames and avatars) that you publish and record on the third-party platform under the premise of complying with relevant laws and regulations. , region, gender, contact email address) in order to bind your third-party account with the Bole Wuyou account and remember your login identity as our user.

1.3.1.2. Commodity purchase and payment functions

If payment settlement occurs during your use of Bole Wuyou , you can choose the payment provided by our affiliates or third-party payment institutions that cooperate with us (including Alipay, WeChat, UnionPay and other payment channels, hereinafter referred to as "payment institutions") Pay for services. The payment function itself does not collect your personal information, but we need to share your order number and transaction amount information with these payment institutions so that they can confirm your payment instructions and complete the payment.

1.3.1.3. Customer service function

If you contact our customer service, we may require you to provide necessary personal information for identity verification to ensure the security of your account. In order to provide services according to your demands, after your authorization, the human customer service personnel need to inquire or check your relevant information within the scope of your authorization. We will take technical and management measures to ensure the security of your information as much as possible, and within the necessary scope to use. We may save your contact information ( the mobile phone number, WeChat ID, or other contact information you use or actively provide ), your communication records and content with us , and other necessary information in order to provide and record customer service for you.

1.3.1.4. Security function

In order to improve the safety of your use of our products and services, protect the personal and property safety of you or other users from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, and computer viruses, and more accurately identify violations of laws and regulations In other cases, we may collect, use or integrate your account information, transaction information, and device information to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary records and audits in accordance with the law. , analysis, and disposal measures.

1.3.1.5  Dialogue practice , photo translation and other functions

When you use specific products and /or services of Bole Wuyou , in order to meet the purpose of providing products and services to you, in addition to the information provided during registration, you actively provide, upload or upload information when you use our products and/or services. Published content , information and voice may reveal your personal sensitive information, please be cautious and do not enter any personal data. We will not ask you to provide sensitive personal information (such as ID card, bank card, home address, etc.).

Some question types require you to speak to Bole Wuyou software . In order to recognize your voice, your audio may be sent to third-party service providers, such as Alibaba , Apple, or Amazon. We may ask you to provide your voice data to help us improve our courses and products. If you do not allow us to use your voice messages or we have not asked you for permission, we will not use your audio messages in this way. Any audio that you agree to send to Bole Wuyou will be anonymized when it reaches our server to ensure that your personal information will not be associated with the audio.

1.4. Circumstances of personal information that you can choose to provide

1.4.1. In order to make it more convenient or fun for you to use Bole Wuyou , so as to improve your experience when using it, our following extended functions may collect and use your personal information. If you do not provide these personal information, you can still use the core functions of Bole Wuyou , but you may not be able to use the extended functions we provide you or you need to fill in some information repeatedly. These extensions include:

1.4.1.1. Supplementary account information

After you register and complete the account, you can continue to fill in your information in the basic information column, including your birthday , gender, etc. If you do not provide this information, it will not affect your use of specific technical services.

1.4.1.2. Modify account password

When you need to modify your mobile phone number, please enter the new mobile phone number and SMS verification code. You can voluntarily bind your email on the settings page. At this time, you need to provide your email account and the SMS verification code we sent you for verification. If you need to set up a trusted device, you need to provide us with the name of the device you are using, the type of the device, and the last time it was used.

1.4.1.3. Access to third-party applications

We may cooperate with third-party service providers to access third-party services in the service (such as placing advertisements, links or other forms of promotional content). We will not share your personal information (such as mobile phone number, nickname, avatar, friend list, etc.) that you provide to us or that we collect with third-party service providers, nor will we collect your personal information on behalf of third-party service providers information. Third-party service providers accessed through our services may have their own privacy policies, which are not bound by this Privacy Policy. Third-party service providers may collect personal information necessary to provide services to you in accordance with their own privacy policies. We will use commercially reasonable efforts to require third-party service providers to comply with relevant laws and regulations when processing your personal information, and try our best to require them to take relevant confidentiality and security measures.

1.4. You are fully aware that we do not need your authorization to collect and use personal information in the following situations:

1.4.1. Related to national security and national defense security.

1.4.2. Related to public security, public health, and major public interests.

1.4.3. Related to criminal investigation, prosecution, trial and execution of judgments, etc.

1.4.4. For the purpose of safeguarding the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the consent of the individual.

1.4.5. The collected personal information is disclosed to the public by the personal information subject or guardian.

1.4.6. Your personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.

1.4.7. Necessary for signing a contract at your request.

1.4.8. It is necessary to maintain the safe and stable operation of the provided products and/or services, such as discovering and handling product and/or service failures.

1.4.9. Necessary for legitimate news reporting.

1.4.10. It is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing academic research or description results to the outside world, de-identify the personal information contained in the results.

1.4.11. Other circumstances stipulated by laws and regulations.

1.5. Situations where we obtain your personal information from third parties

1.5.1. We may obtain the personal information that you authorize to share from a third party, and we will use it in compliance with relevant laws and regulations after confirming the legality of the source of personal information in accordance with the agreement with the third party. Your personal information.

2. How do we use COOKIES or similar technologies

2.1. We may obtain and use your information by using COOKIES or similar technologies, and store this information as log information.

2.2. By using COOKIES, we provide users with a simple and personalized network experience. A COOKIES is a small amount of data that is sent from a web server to your browser and stored on your computer's hard drive. We use COOKIES to allow its users to benefit. For example, to make the login process of the NetEase virtual community faster, you can choose to save the username in a COOKIES. In this way, it will be more convenient and quicker when you want to use service of Energy Technology next time. COOKIES can help us to determine the webpages and content you are connected to, time you spend on certain NetEase Service and the NetEase service you have chosen .

2.3. COOKIES enable us to serve you better and faster, and make your experience on the Bole Wuyou service more personalized. You may reject or manage cookies or similar technologies through browser or user choice mechanisms . But please note that if you disable COOKIES or similar technologies, we may not be able to provide you with the best service experience, and some services may not be available normally.

2.4. We use our own COOKIES or similar technologies, which may be used for the following purposes:

2.4.1. Remember your identity.

2.4.2. Analyze your use of our services.

2.4.3. Ad optimization.

2.5. If you want to disable cookies, you can configure your browser: select "Reject Cookies" or "Notify you when a website sends Cookies". In view of the fact that our services are implemented by supporting COOKIES, after completing the operation of closing COOKIES, your visit may be affected or you may not be able to fully obtain our services. When you do not disable COOKIES, you may be prompted, for example, whether to retain user information the next time you enter this website to simplify login procedures (such as automatic login).

2.6 Use of SDK  

In order to ensure the stable operation and function realization of our client, so that you can use and enjoy more services and functions, our application will embed the SDK of authorized partners or other similar applications. 

oaid-sdk and MSA Mobile Security Alliance SDK automatically obtain oaid, which is used by uniapp to judge the mobile phone brand and call the corresponding interface. 

Digital Paradise SDK obtains device information (OAID, IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI, ICCID), SD card data for statistical analysis and security verification, and obtains sensor information for connecting to a Bluetooth printer. 

weexSDK obtains sensor information, which is used for default integration of uni-app basic module and used to render uniapp's nvue page engine. We will conduct strict security inspections on the application programming interface (API) and software tool development kit (SDK) for authorized partners to obtain relevant information, obtain necessary user information in the application running and background status, and agree on strict rules with authorized partners. Data protection measures to process personal information in accordance with this Policy and any other relevant confidentiality and security measures.  

At present, the third-party service providers we access mainly include the following types:


 

Third-party SDK name 

Affiliated company 

Access to information 

purpose of usage 

Privacy agreement link or sdkurl

uni-app (5+, web2app) 

DCloud

Stored personal files, device information ( IMEI, ANDROID_ID, DEVICE_ID, IMSI), network information 

Basic module 

https://ask.dcloud.net.cn/article/36937

oaid-sdk

MSA Mobile Security Alliance 

Unique Device Identifier (OAID) 

It is used to generate the oaid of the device reported by the MSA Mobile Security Alliance 

https://tongji.dcloud.net.cn/policy

MSA Mobile Security Alliance SDK 

MSA Mobile Security Alliance 

Unique Device Identifier (OAID) 

Determine the terminal brand and call the interface 

http://www.msa-alliance.cn/col.jsp?id=122

Digital Paradise SDK 

Digital Paradise (Beijing) Network Technology Co., Ltd. 

Stored personal files, device information ( OAID, IMEI, MAC, ANDROID_ID, DEVICE_ID, IMSI, ICCID), network information device sensors  

Statistical analysis, safety verification, Bluetooth printer connection 

https://ask.dcloud.net.cn/protocol.html

weexSDK

Digital Paradise (Beijing) Network Technology Co., Ltd. 

stored personal files 

The uni-app basic module is integrated by default and is used to render the nvue page engine of uniapp. 

http://doc.weex.io/zh

com.alipay

Log in, share (please fill in according to the specific purpose of use)

Network: ( android.permission.ACCESS_NETWORK_STATE; android.permission.ACCESS_WIFI_STATE )  

The user invokes Alipay's payment capability to make payment.

Alipay Privacy Agreement

 


 

3. How we share, transfer or publicly disclose your personal information

3.1. Delegated processing

3.1.1. If we entrust a third party to process your personal information, we will agree with the entrustee on the purpose, time limit, processing method, type of personal information, protection measures, rights and obligations of both parties, etc. The trustee's personal information processing activities are supervised.

3.2. Sharing

3.2.1. We share your personal information under the premise of abiding by the principles of "legality, minimum necessity, and clear purpose". At the same time, we will conduct personal information protection impact assessments on personal information sharing activities in advance, and take effective technical protection measures for output forms, transfers, and uses. At the level of cooperation agreements, the information protection obligations and responsibilities of partners are strictly required, and a data security protection agreement is signed with business partners before cooperation.

3.2.2. We will not share your information with any third party other than our company, except for the following circumstances:

( 1) Obtain your explicit consent or authorization in advance.

( 2) Share your information externally in accordance with applicable laws and regulations, legal procedure requirements, mandatory administrative or judicial requirements.

( 3) Only by sharing your personal information can we realize the core functions of our products and services or provide the services you need.

( 4) We may share your personal information with our affiliates in order to provide you with relevant products or services, show you content that you may be interested in, protect your account and transaction security, etc. based on our provision of relevant products or services. We will share your personal information with our affiliates in accordance with the terms of this Privacy Policy, but we will only share necessary personal information and be bound by the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will ask for your authorization again.

( 5) We may share your information with third parties such as partners to ensure the smooth completion of the services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose.

( 6) Provided based on academic research.

( 7) Provided in accordance with the individual service agreement signed with you or other legal documents.

3.3. Transfer

3.3.1. Transfer refers to the process of transferring the control of personal information to other companies, organizations or individuals.

3.3.2. We will not transfer your personal information to any third party other than our company, except in the following circumstances:

( 1) Obtain your explicit consent or authorization in advance.

( 2) It must be provided in accordance with applicable laws and regulations, requirements of legal procedures, mandatory administrative or judicial requirements.

( 3) With the continuous development of our business, in the event of a merger, acquisition or bankruptcy liquidation, your information may be transferred as part of such a transaction. If the transfer of personal information is involved, we will require the new company, organization, or individual holding your personal information to continue to be bound by this policy, otherwise we will require the company, organization, or individual to seek your authorization again.

3.4. Public Disclosure

3.4.1. We will not publicly disclose your personal information with any third party other than the company, except in the following circumstances:

( 1) We may publicly disclose your personal information in accordance with the needs of laws and regulations, litigation, dispute resolution, or as required by administrative and judicial authorities.

( 2) According to your needs, disclose the information you specify in the disclosure method you expressly agree to.

 

4. How we protect your personal information

4.1. We have always attached great importance to the protection of users' personal information security. For this reason, we have adopted protection measures such as security technology, organization and management that meet industry standards to minimize your information from being leaked, damaged, misused, and unauthorized access , the risk of unauthorized disclosure and alteration.

4.1.1. Data security technical measures

4.1.1.1. We will adopt security protection measures that meet industry standards, including establishing reasonable system norms and security technologies to prevent unauthorized access, use, and modification of your personal information, and to avoid data damage or loss.

4.1.1.2. We adopt encryption technology to encrypt and store users' personal information, and isolate them through isolation technology.

4.1.1.3. When personal information is used, such as personal information display and personal information correlation calculation, we will use a variety of data desensitization technologies to enhance the security of personal information during use.

4.1.2. Other security measures we take to protect personal information

4.1.2.1. We manage and standardize the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

4.1.2.2. We implement comprehensive security control over data through information contact confidentiality agreements, monitoring and auditing mechanisms.

4.1.2.3. We have established a data security committee and set up a dedicated information protection department and a data security emergency response organization to promote and protect personal information security.

4.1.2.4. We will organize security and privacy protection training courses to enhance employees' security awareness and understanding of personal information protection policies and related procedures.

4.1.2.5. All of your personal information will be stored within the territory of the People's Republic of China. At present, there is no scenario where we provide personal information overseas. If the transfer of personal information abroad is involved in the future, we will clearly inform you of the purpose, receiver, security measures, etc. of the transfer of personal information abroad, and we will obtain your consent separately.

4.2. Please be aware that although we will try our best to ensure the security of any information you send us, the Internet environment is not 100% safe, and we will not be liable for any risks or losses arising therefrom or related thereto.

4.3 . In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the precautions you can take on your own and recommendations for risk reduction, remedies for you, etc. We will promptly inform you of the event-related procedures by email, letter, phone call, push notification, etc. When it is difficult to inform the personal information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

5. How you manage your personal information

5.1. We attach great importance to the management of your personal information, and do our best to protect your access to personal information, correction, deletion, withdrawal of consent and other legal rights, so that you have sufficient ability to maintain your privacy and personal information security.

5.2. Access and correction of your personal information

5.2.1. Except as required by laws and regulations, you have the right to access and correct your personal information at any time, including:

( 1) Account information; (2) Browsing information.

5.2.2. If you need to access or correct other personal information generated during the use of our products and services, please feel free to contact us. We will respond to your request according to the method and time limit set out in this Privacy Policy.

5.3. Deletion of your personal information

5.3.1. In the following circumstances, you can request us to delete personal information through the methods specified in this policy:

( 1) If our handling of personal information violates laws and regulations.

( 2) If you no longer use our products and services, or you cancel your account.

( 3) If we stop providing products and services, or the retention period has expired.

( 4) If you withdraw your consent.

( 5) If the purpose of our processing personal information has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose of processing.

5.4. Change or withdrawal of your consent

5.4.1. You can change the scope of your authorization to continue collecting personal information or withdraw your authorization by deleting information, turning off device functions, and setting privacy settings on the Bole Wuyou website or software. You can also log off the account of the way, the withdrawal of all authorization for us to continue to collect all of your personal information.

5.4.2. Please understand that Bole Wuyou may need to collect necessary personal information to achieve this. When you withdraw your consent, we will not be able to continue to provide you with the services corresponding to the withdrawal of consent, but it will not affect the previous personal information processing services based on your authorization.

5.5. Cancellation of your account

5.5.1. You can cancel your previously registered account at any time through the following methods:

( 1) Contact customer service

You can apply for canceling your account by contacting online customer service

( 2) Email application

You can send the application for canceling the account by email

( 3) Telephone application

You can apply to cancel your account by contacting our official phone number

5.5.2. After you cancel your account, the content, information, data, records, etc. under the account will be deleted or anonymized (unless otherwise stipulated by laws and regulations or otherwise required by regulatory authorities). At the same time, once the account is canceled, it cannot be restored.

5.6. Responding to your above request

5.6.1. If you are unable to exercise your rights in the above manner, you can contact us using the contact information specified in this policy. To ensure the security of your account, when you make the above request to us, we may ask you to verify your identity before processing your request.

5.6.2. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means, pose risks to the legitimate rights and interests of others, or are very impractical.

5.6.3. Exceptions to Response Situations

We will not be able to respond to your request in the following circumstances:

(1) Related to our fulfillment of obligations stipulated by laws and regulations.

(2) Directly related to national security and national defense security.

(3) Directly related to public security, public health, or major public interests.

(4) Directly related to criminal investigation, prosecution, trial and execution of judgments.

(5) We have sufficient evidence that the subject of personal information has subjective malice or abuse of rights.

(6) In order to protect the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the consent of the individual.

(7) Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations.

(8) Those involving commercial secrets.

6. How do we handle personal information of minors

6.1. We attach great importance to the protection of personal information of minors. If you are a minor, you should obtain the consent of your guardian before using our products and services . We will protect the personal information of minors in accordance with relevant national laws and regulations.

6.2. We will not take the initiative to directly collect personal information from minors. For the collection of personal information of minors with the consent of the guardian, we will only use, share, transfer or disclose this information when permitted by law, consent of the guardian or necessary to protect the minor.

6.3. If it is proven that minors have used our products and services without the consent of their guardians, we will negotiate with the relevant guardians and try to delete the relevant personal information as soon as possible.

6.4. For minors under the age of 14, in addition to complying with the stipulations of this privacy policy on users' personal information, we will also uphold the principles of justification and necessity, informed consent, clear purpose, security and legal use, and strictly follow the "Children's Personal Information Network Protection Regulations and other laws and regulations require storage, use, and disclosure, and will not exceed the period necessary to achieve the purpose of collection and use. After expiration, we will delete or anonymize children's personal information.

6.5. If you are the parent or other guardian of a minor under the age of 14, we may need to collect the personal information of the child under guardianship from you for the purpose of performing relevant services to you. If it is necessary to collect children's personal information from you in a specific service, we will obtain your authorization in advance and inform you of the purpose and use of the collection. If you do not provide the aforementioned information, you will not be able to enjoy the relevant services we provide.

7. How this Privacy Policy is updated

7.1. Due to changes in service content, contact methods, legal and regulatory policy requirements, etc., we may revise this Privacy Policy in due course. When the Privacy Policy changes, we will post it on our platform or send the updated version to the email address you provided. In order for you to receive notifications in a timely manner, it is recommended that you update your account information or notify us in time when your email address changes.

8. How to contact us

8.1. If you have any questions, comments or suggestions about this Privacy Policy, please contact us in the following ways:

Contact number: 13 916942261

Email : leichen2@emotibot.com

 

8.2. Under normal circumstances, we will reply within fifteen working days. If you are dissatisfied with our response, especially if our personal information processing has damaged your legitimate rights and interests, you can also seek a solution by filing a lawsuit with a competent court in Xuhui District, Shanghai.

Attachment: Permissions List

1. Read mobile phone status permission

Permission name: READ_PHONE_STATE

Function description: Access the status information of the mobile phone, such as phone number, device ID, SIM card status, etc.

Call purpose: used in the uniapp framework to obtain the unique identifier of the device.

Specific usage scenarios: uniapp framework usage, basic modules and other usage scenarios

 

2. Read and write system setting permissions

Permission name: WRITE_SETTINGS

Function description: Permission to allow applications to read and write system settings.

Call purpose: used in the uniapp framework, which can control system settings, such as system sound, screen rotation settings, etc.

Specific usage scenarios: uniapp framework usage, basic modules and other usage scenarios.

 

3. Network permissions

Authority name: INTERNET

Function description: Allow the application to access the Internet.

Call purpose: used to support applications to access network data.

Specific usage scenarios: It can be used for users to access network data, such as network files, pictures, videos, etc.

 

4. Read network status permission

Authority name: ACCESS_NETWORK_STATE

Function description: Allows applications to access information about network connections, such as the current network status.

Call purpose: used to detect the network connection status and provide the application with information about the network connection.

Specific usage scenarios: It can be used to detect network connection status, detect network quality, and detect whether there is a network connection, etc.

 

5. Read mobile phone storage permissions

Permission name: READ_EXTERNAL_STORAGE

Function description: Allows the application to read files on external storage devices (such as SD cards).

Call purpose: used to read files on external storage devices.

Specific usage scenarios: It can be used for OCR recognition, using the photo album to select pictures, etc.

 

6. Read wifi status permission

Permission name: ACCESS_WIFI_STATE

Function description: Allows the application to access information about the WiFi status, such as the current WiFi connection status.

Call purpose: used for Alipay open platform, which can detect WiFi status, obtain WiFi name, and detect WiFi connection status, etc.

Specific usage scenarios: It can be used on the Alipay open platform to detect WiFi status, obtain WiFi name, and detect WiFi connection status, etc.

 

7. Write permission to external storage space

Permission name: WRITE_EXTERNAL_STORAGE

Function description: Allow applications to write files on external storage devices (such as SD cards).

Purpose of calling: used for Alipay open platform, which can write Alipay payment information and Alipay payment results into external storage devices.

Specific usage scenarios: It can be used on the Alipay open platform to write Alipay payment information and Alipay payment results into external storage devices.

 

8. Microphone

Permission Name: Access Microphone

Function description : Allow users to use the microphone to record .

Call purpose: used to support user voice input .

Specific usage scenarios: Answering oral questions and other related functions that require this permission.