DUWEI believes the greatest loyalty to our user brings real long-term benefits. The maximum protection and minimum intervention of the user's private data can reflect one of our core value of "user-oriented thinking". We do promise that all users' private data will only be used for providing services to that user only, or for the maintenance and experience optimization purpose, and will never be shared to any 3rd-party organization, company or person.
Should you have any queries, please contact us.
Based on the principle of lawfulness, fairness and necessity, we will only collect the following information that is necessary for the purpose of achieving the product's function.
For example, the account name, phone number, any feature or business attributes, geometry data of a layer, etc., which will only be stored and used for providing you with related functions and services, e.g. viewing data on the map.
1.2.1 Service Logs. We may automatically collect and store relevant information as the service log when you use our services.
1.2.2 Location data. We may collect location data of your device when you use the location-related services, in order to provide relevant service for you.
Subject to applicable laws and regulations or agreements with users, we may use the collected information in the following ways. If we use your information for purposes beyond the following purposes, we will explain to you again and ask for consent.
For example, customized functions or services released for business.
For example, when our systems have malfunctions, we will record and analyze the information generated when the system crashes, so as to further optimize our services.
For example, we will use your information for identity authentication, safety precautions, anti-fraud monitoring, storage and backup, customer safety service and other applications. For example, the safety software downloaded or installed by you will detect malicious programs or viruses, or identify fraudulent information.
For example, software certification and software updates, etc.
3.1 You may access, amend and delete information provided by you during using our services, or contact us via the notice guidelines. The scope and the way in which you access, amend or delete your personal information depend on the service you use. For example, when using geography related service, to stop sharing your geographical information, you can stop it by turning off cellphone positioning function, or according to methods provided by software and hardware service providers and communication service providers. Please read relevant guidance carefully.
3.3 For account security purposes, we may ask you to verify your identity before we allow you to access, amend and delete relevant information.
3.4 Please understand that due to technical limitations, legal or regulatory requirements, we may not be able to meet all your requests. We endeavor to respond to your requests within a reasonable period of time.
When you use our services, we may send emails, text messages, news or push notifications to you. You may follow the relevant notice to unsubscribe on the device.
We may send you announcements related to service if necessary (for example, the suspension of certain service due to system maintenance). You may not be able to cancel these non-promotional service-related announcements.
We will store users personal information collected within mainland China within the territory in accordance with applicable laws and regulations.
In general, we will retain your personal information in the shortest possible time to fulfill the purpose of collection of such information. However, for the following purposes, we may change the retention period for the purposes of compliance:5.2.1 To comply with the relevant laws and regulations;
Should the operation of our products or service terminate, we will inform you in the form of push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time.
We take security measures to protect your information against loss, improper use, unauthorized access or disclosure.
6.1 We will strictly protect users communication in accordance with the applicable laws and regulations.
6.2 We will work within the reasonable security standards and use a variety of security measures to protect the security of information. For example, we will use encryption technologies (such as TLS, SSL), anonymization and other means to protect your personal information.
6.3 We have established a specialized management, process and organization system to ensure information security. For example, we strictly restrict the scope of personnel who can access information, and require them to comply with their confidentiality obligations and conduct audits.
6.4 In the event of a breach of security incident of personal information, we will activate the emergency response plan to prevent the expansion of such security incident and inform you in the form of push notifications, public announcements and etc.
Last updated: Oct 16, 2018