Updated: January 9, 2025
Preface
Welcome to use the services provided by “Tingchi Annotations”! Tingchi Annotations (referring to the services corresponding to the Tingchi Annotations browser plug-in, hereinafter referred to as “Tingchi Annotations” or “we”) are well aware of the importance of personal information to you. We have always solemnly promised to protect the personal information and privacy security of users who use our products and services (hereinafter collectively referred to as “users” or “you”). When you use Tingchi Annotations, we may collect and use your relevant personal information. We hope to explain to you through the “Tingchi Annotations Basic Function Privacy Policy” (hereinafter referred to as “this Policy”) the corresponding processing rules and other related matters when we collect and use your relevant personal information, so as to better protect your rights and interests.
[Special Tips] Please read and understand this policy carefully (especially the terms in bold) before using Tingchi Annotation to make appropriate choices. This policy applies to Tingchi Annotations.
Please understand and be aware that the basic functional service of Tingchi Annotation is the annotation and marking of Internet pages. Tingchi Annotation does not require personal information to use the basic functional service. Your consent to this policy only means that you agree that Tingchi Annotation collects and processes your relevant necessary personal information when providing login, interactive publishing, and meeting the main functions of Tingchi Annotation security operation, and does not mean that you agree that we collect and process non-essential personal information.
After reading this Policy, if you have any questions about this Policy or matters related to this Policy, you can contact us through the feedback channels listed in the “How to Contact Us” section of this Policy , and we will respond to you as soon as possible.
1. How do we collect and use personal information?
We collect your personal information mainly to make it easier and more satisfying for you and other users to use Tingchi Annotation. Our goal is to provide all Internet users with an efficient, safe, interesting and educational online experience. This information helps us achieve this goal.
(I) We will collect and obtain your personal information through the following means:
1. Information you provide. For example:
(1) Information you provide to us when you log in to Tingchi Annotation using WeChat or PayPal;
(2) Information stored when you use the Service.
Please note that if you disclose your information in the public area of Tingchi comments that is visible to other users, or in your response to information uploaded or posted by others, such information may be collected and used by others. If you find that others are improperly collecting or using your information, you can contact us through the feedback channels listed in the “How to Contact Us” section of this policy .
2. Your information we obtain: When you use Tingchi Annotations, we collect, summarize, and record information, such as log information.
3. Your personal information that we collect indirectly. For example:
(1) Your information shared by a third party. This refers to the shared information about you provided by a third party when using Tingchi Annotations.
(2) We may obtain relevant information that you authorize to share from our affiliates and third-party partners. For example, when you use an account on a third-party platform to log in to Tingchi Annotations, we will obtain relevant information under such third-party account (including user name, avatar, nickname, subject to your authorization content) based on your authorization and bind your third-party account with your Tingchi Annotations account after you agree to this policy, so that you can log in directly through the third-party account and use Tingchi Annotations . We will collect and use your information in accordance with relevant laws and regulations, based on agreements with affiliates or third-party partners, and on the premise that we are sure that the source of the information they provide is legal.
(II) We will collect and use the following types of your personal information for the following purposes:
Our basic and main functional services include marking, annotating, searching, providing login services for Internet pages, and meeting the security requirements of the Tingchi annotation operation .
The basic functional scenarios we provide you with, the personal information we collect and use, and the permissions we call are as follows:
1. Help you complete the login process
(1) In order to provide you with continuous and stable services and ensure the security of your use of Tingchi Annotation, we need to collect the following necessary login information from you , including: third-party platform account and its registered public information (WeChat OpenID , PayPal OpenID ) and create your Tingchi Annotation account . If you use the “Login” function of Tingchi Annotation, we will collect your WeChat OpenID or PayPal OpenID and create your Tingchi account with your consent , so as to provide you with faster login and account services.
If you do not provide WeChat or PayPal authorization to log in to the information we collect above, we will not be able to provide you with interactive functions such as Internet page marking, annotation, and search in accordance with relevant laws and regulations.
(2) You can also fill in or supplement your non-essential personal information (e.g. your nickname, avatar) during login or subsequent use . This will help us provide you with personalized recommendations and a better service experience. However, if you do not provide this information, it will not affect your use of the basic functional services of Tingchi Annotation.
(3) We do not need to obtain your permission during your login process.
(4) During your login process, we will access the SDK provided by a third-party service provider to provide a better login experience.
(5) At the same time, we also provide a cancellation function for registered accounts. If you meet the conditions of the service agreement and the relevant national laws and regulations, you can submit an application for cancellation of your registered account in accordance with the corresponding requirements on the “Cancel Account” page (for example, you can go to the “My-Settings-Account Settings” in the Tingchi Annotation plug-in to enter the cancellation page).
After your Tingchi Annotation account is cancelled, we will delete your personal information or anonymize it, except as otherwise provided by laws and regulations.
3. Provide you with interactive or publishing services
(1) When you use Tingchi Annotations, upload and/or publish annotations, we will collect the information you upload, publish or generate, and use your nickname, avatar and published content for display.
4. Provide you with information display and push of content, products or services
(1) Based on the information you provide to us, the information we may collect, and your information we collect indirectly, including your browsing and search history, order information . We may conduct recommendation algorithm modeling, programmatic advertising recommendation algorithm modeling, user behavior analysis and user profiling based on a combination of one or more of the above information to extract the relevant characteristics of your browsing, search preferences, and behavioral habits, so as to provide you with page product or service displays that better meet your needs and recommend personalized content.
(2) We may also send you marketing information and user surveys via email, text message or other means based on feature tags to help us improve our Tingchi Annotation services and provide or promote the following products and services of ours or third parties.
5. Maintain the safe operation of the pool annotation and provide security for users
(1) During your use of our services, in order to understand product compatibility, identify abnormal account status, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, more accurately identify violations of laws and regulations or relevant agreements and rules of Tingchi Annotation, and ensure the network and operational security of Tingchi Annotation, we may directly or indirectly collect, store and associate information about the services you use and how you use them during your use of our services.
(2) We do not need to obtain your permission in the process of maintaining the security and operation of the Tingchi Annotation and providing security for users.
(3) If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information will be considered personal information during the period of combined use. We will anonymize and de-identify such personal information unless we obtain your authorization or otherwise provide for by laws and regulations. Such information will be treated and protected as your personal information in accordance with this policy during the period of combined use. We may use the above information to comprehensively determine the risks of your account and transactions, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.
In addition to basic functional services, we also provide you with additional functions , including but not limited to identity authentication, helping you complete orders, payment and delivery of goods or services to you, providing you with customer service or other user response functions, participating in activities and other rich and diverse services and clipboard-based functions. Personal information collected for providing additional functions will be separately sought with your consent when you use specific functions. If you refuse to provide it, you will not be able to use the relevant additional functions normally, but it will not affect your use of our basic functions.
You understand and agree that we hope to provide you with perfect products and services, so we will continue to improve our products and services, which means that with the iteration, expansion, and upgrade of products and services, we may frequently launch new services or business functions or re-divide business functions, and may need to collect new personal information or change the purpose or method of using personal information. If we want to use your personal information for other purposes not specified in this policy or collect other personal information not mentioned, we will obtain your consent separately through page prompts, interactive processes, website announcements or other methods in accordance with the law. In this process, you can contact us through the feedback channels listed in the “How to Contact Us” section of this policy , and we will answer you as soon as possible.
(III) Exceptions to obtaining authorization and consent
According to relevant laws and regulations, your information may be processed (including collection, storage, use, processing, transmission, provision, disclosure, deletion, etc.) in the following circumstances without your authorization or consent:
(1) Necessary for entering into or performing a contract to which you are a party;
(2) Necessary for the performance of statutory duties or obligations;
(3) It is necessary to respond to public health emergencies or to protect your life, health and property safety in an emergency;
(4) Processing personal information within a reasonable scope for news reporting, public opinion supervision, etc. for the public interest;
(5) Processing your personal information that you have disclosed on your own or that has been legally disclosed within a reasonable scope in accordance with the provisions of the Personal Information Protection Law;
(6) Other circumstances prescribed by laws and administrative regulations.
2. How do we use COOKIES or similar technologies?
We or our partners may obtain and use your information through COOKIES or similar technologies and store such information as log information.
By using COOKIES, we provide users with a simple, easy and personalized web experience. A COOKIES is a small amount of data that is sent from a web server to your browser and stored on your computer’s hard drive. We use COOKIES to allow its users to benefit. For example, to make the login process of our website faster, you can choose to save your username in a COOKIES. This will make it easier and faster to log into our services next time. COOKIES can help us determine the webpages and content you are connected to, time you spend on website and the website service you have chosen.
COOKIES allow us to serve you better and faster, and make your experience on the website more personalized. However, you should be able to control whether and how COOKIES are accepted by your browser. Please refer to the documentation included with your browser for more information in this regard.
We and our third-party partners may collect and use your information through COOKIES or similar technologies and store such information.
We use our own COOKIES or similar technologies, which may be used for the following purposes:
1. Remember your identity. For example, COOKIES or similar technologies help us identify you as our registered user, or save your preferences or other information you provide to us;
2. Analyze your use of our services. We may use COOKIES or similar technologies to understand what activities you use our website for, or which services are most popular;
When we use COOKIES or similar technologies for the above purposes, we may provide advertisers and other partners with aggregated non-personal information collected through COOKIES or similar technologies for the purpose of analyzing how you and other users use our website and for advertising services.
There may be COOKIES or similar technologies placed by advertisers and other partners on the Tingchi Annotations. These COOKIES or similar technologies may collect non-personally identifiable information related to you for the purpose of analyzing how users use such services, sending you advertisements that may be of interest to you, or evaluating the effectiveness of advertising services. The collection and use of such information by these third-party COOKIES or similar technologies is not subject to this Policy, but to their own information protection statements. We are not responsible for the COOKIES or similar technologies of third parties.
You can refuse or manage COOKIES or similar technologies through browser or user selection mechanism . However, please note that if you disable COOKIES or similar technologies, we may not be able to provide you with the best service experience, and some services may not work properly. At the same time, you will still receive advertisements, but these advertisements will be less relevant to you .
III. Personal Information We May Share, Transfer or Disclose
1. Sharing
We attach great importance to protecting your personal information. Except in the following circumstances, we will not share your personal information with any third party outside of Tingchi without your separate consent:
1. Sharing necessary to realize our services / functions. In some cases, we need to share your information with third parties to realize the functions of our products and / or services and allow you to use the services you need normally, including:
( 1 ) Share the corresponding transaction order information and payment amount information with the third-party payment institution that provides payment services.
2. Necessary sharing with some of our partners. In order to smoothly carry out necessary / reasonable business, meet your requirements, fulfill our obligations in the relevant user agreements or this policy, exercise our rights or comply with legal provisions, we may need to share your information with some partners, including:
( 1 ) Share statistical data on your product usage (such as crashes and flash backs) with partners who provide product analysis services (including application crash analysis, network performance analysis, and domain name resolution optimization);
( 2 ) Other necessary sharing with some of our partners;
3. Necessary sharing with our affiliates . In order for us to provide you with consistent services based on a unified account system and to facilitate your unified management, personalized recommendations, and system and account security, your personal information may be shared between us and our affiliates as necessary, including:
( 1 ) In order to help you save time and simplify the operation process, you can log in to Tingchi Annotation after logging in to our Tingchi account without having to register again. Your account-related information will be shared within the products of us and our affiliates as necessary;
( 2 ) In order to provide you with a consistent and personalized browsing experience for our and our affiliates’ products and / or services, you acknowledge and agree that your account information, related browsing data, and other information reflecting your usage habits and preferences may be shared with our affiliates;
4. To achieve other purposes described in the first section of this Policy , “How we collect and use personal information” ;
5. Fulfill our obligations and exercise our rights in this Policy or other agreements we have reached with you;
6. In response to your legitimate needs or with your authorization and consent;
7. Provide your information upon legal request of your guardian;
8. Other circumstances prescribed by laws and administrative regulations.
We will only share your personal information for legitimate, legal, necessary, specific and clear purposes. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle the information in accordance with our instructions, this policy and any other relevant confidentiality and security measures .
(II) Transfer
1. As our business continues to develop, we may conduct mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization that holds your personal information to continue to be bound by this policy. Otherwise, we will require the company or organization to re-ask your authorization and consent.
2. We will transfer your personal information to a third party after obtaining your explicit consent.
(III) Disclosure
We will only disclose your personal information in the following circumstances and only after taking security measures that meet industry standards:
1. Disclose the information you specify in accordance with your needs and in the manner you explicitly agree to;
2. If we are required to provide your information in accordance with the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may disclose your information based on the type of information and disclosure method requested. Subject to laws and regulations, when we receive a request to disclose the above information, we will require the recipient to produce the corresponding legal documents, such as a subpoena or investigation letter. We firmly believe that the information we are asked to provide should be as transparent as possible within the scope permitted by law. We carefully review all requests to ensure that they have a legal basis and are limited to data that law enforcement agencies have the legal right to obtain for specific investigation purposes .
(IV) Exceptions to prior authorization and consent when sharing, transferring, or disclosing information
In accordance with relevant laws and regulations, in the circumstances described in Item (3) of Article 1 of this Policy “How we collect and use personal information” , the sharing, transfer, and disclosure of your information do not require your prior authorization or consent.
According to legal provisions, sharing, transferring, and disclosing de-identified personal information, while ensuring that the data recipient cannot restore and re-identify the information subject, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require additional notification to you or your consent .
IV. How do we store and protect personal information
1. Storage of Personal Information
Unless otherwise provided by laws, regulations or regulatory authorities, we will only store your personal information for the shortest period of time necessary for the purposes described in this Policy. If we terminate our services or operations, we will promptly stop collecting your personal information and notify you in advance in accordance with relevant laws and regulations. We will delete or anonymize your personal information after the termination of services or operations, unless otherwise provided by laws, regulations or regulatory authorities.
The personal information we collect and generate during our operations within the territory of the People’s Republic of China is stored in China , except in the following circumstances:
1. There are clear provisions in laws and regulations;
2. Obtain your authorization and consent.
In response to the above situations, we will ensure that we comply with national laws and regulations and the provisions of relevant regulatory authorities and provide adequate protection for your personal information.
(II) Protection of Personal Information
We attach great importance to information security and take all reasonable and feasible measures to protect your personal information.
1. Data security technical measures
We will adopt security measures that meet industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed, used, or modified without authorization, and to avoid data damage or loss. Our services use a variety of encryption technologies. For example, in some services, we will use encryption technologies (such as SSL) to encrypt and save your personal information, and isolate it through isolation technology to protect your personal information. When using personal information, such as information display and information association calculation, we will use a variety of data desensitization technologies to enhance the security of information in use. We will also use strict data access permission control and multiple identity authentication technologies to protect personal information and prevent data from being used in violation of regulations.
2. Other security measures we take to protect personal information
We have an industry-leading data security management system that focuses on data and revolves around the data life cycle, which improves the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications. We
conduct comprehensive security control of data through confidentiality agreements for information contacts, monitoring and auditing mechanisms. We will also hold security and privacy protection training courses to enhance employees’ security awareness and their understanding of personal information protection policies and related processes.
3. We only allow Tingchi employees and partners who need to know this information to access your personal information, and we have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to fulfill the corresponding confidentiality obligations. If you fail to fulfill these obligations, you may be held legally responsible or your cooperation with Tingchi may be terminated.
4. The Internet is not an absolutely safe environment, and it is impossible to determine whether email, instant messaging, social software or other service software and other communication methods with other users are completely encrypted. We recommend that you use complex passwords when using such tools and pay attention to protecting your information security. Please properly protect your information and only provide it to others when necessary.
5. The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of the personal information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of personal information, which in turn damages your legitimate rights and interests, we will bear the corresponding legal liability.
6. Security incident handling
In order to deal with the possible risks of personal information leakage, damage and loss, we have formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding handling procedures. We have also established an emergency response team for security incidents. In accordance with the requirements of the security incident handling specifications, we launch security plans for different security incidents, conduct loss prevention, analysis, location, formulate remedial measures, and cooperate with relevant departments to trace and combat. We also regularly organize internal training and emergency drills so that our relevant staff can master the corresponding emergency response strategies and procedures.
In the unfortunate event of an information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you, etc. We will also promptly inform you of the relevant situation of the incident by email, letter, phone, push notification, etc. When it is difficult to inform the information subject one by one, we will take reasonable and effective means to issue an announcement. At the same time, we will also proactively report the disposal of the information security incident in accordance with the requirements of the regulatory authorities.
Please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the system and communication network you use to access Tingchi may have problems due to circumstances beyond our control.
Please keep your account, password and other identity elements safe. When you use Tingchi Annotation, we will identify you through your account, password and other identity elements. Once you leak the above information, you may suffer losses and it may be disadvantageous to you. If you find that your account, password and / or other identity elements may be or have been leaked, please contact us immediately so that we can take appropriate measures in time to avoid or reduce related losses.
V. How to manage your personal information
1. Access, update and delete
We encourage you to update and modify your personal information to make it more accurate and useful.
For your information collected through COOKIES or similar technologies, we also explain the choice mechanism provided to you in Section 2 of this Policy, ” How do we use COOKIES or similar technologies ?”
You can also contact us through the feedback channels listed in the “How to Contact Us” section of this Policy to handle it for you. We will use appropriate technical means or contact channels to enable you to access, update and delete your personal information or other information provided when using Tingchi Annotations, unless otherwise provided by laws and regulations.
Unless otherwise provided by laws and regulations, when you correct or delete your personal information, we may not immediately correct or delete the corresponding information from the backup system, but we will correct or delete the information when the backup is updated.
2. Publicity and Sharing
Many of our services allow you to publicly share your information not only with your social network, but also with all users of the service. As long as you do not delete the information you have made public or shared, the relevant information may remain in the public domain; even if you delete the shared information, the relevant information may still be cached, copied or stored independently by other users or third parties not controlled by us, or saved in the public domain by other users or such third parties. If you make your information public or share it through the above channels, we are not responsible for the leakage of your information. Therefore, we remind you and ask you to carefully consider whether to make your information public or share it through the above channels.
(III) Obtaining a copy of personal information
If you need a copy of your personal information, you can contact us through the feedback channels listed in the “How to Contact Us” section of this Policy or obtain it by going to My-Privacy Settings-Personal Information Download. After verifying your identity, we will provide you with a copy of your personal information in our services (including basic information, device information, if any), except as otherwise provided by laws and regulations or otherwise agreed upon in this Policy.
(V) Responding to your above requests
We will respond to your above requests in accordance with the relevant requirements of laws and regulations. For security reasons, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. In principle, we do not charge any fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee depending on the circumstances. We may reject requests that are repeated without reason, require too many technical means (for example, the development of new systems or fundamental changes to current practices), and pose risks to the legitimate rights and interests of others.
VI. Third-party services
Tingchi Annotations may access or link to social media or other services (including websites or other service forms) provided by third parties. Including:
1. You can use third-party services to log in to the Tingchi Annotation. These functions may collect your information (including your log information) and may install COOKIES in your device to enable the above functions to operate normally;
2. Other situations involving access to third-party services.
For example, to achieve the purposes of this policy statement, we may access SDKs or other similar applications (such as in the form of embedded codes, plug-ins, etc.) provided by third-party service providers in order to provide better customer service and user experience.
At present, the third-party service providers we access mainly include the following types:
(1) Used to help users complete payments within the app
(2) To facilitate your login using a third-party account
Some third-party SDKs or similar applications we access may collect your personal information. If you use such services provided by third parties in our services, you agree that they will collect (some third-party services are collected directly by third parties) and process your information. We will evaluate the legality, legitimacy and necessity of such third-party services to collect personal information, and require such third parties to take protective measures for your personal information and strictly comply with relevant laws, regulations and regulatory requirements. You can also choose to contact us through the feedback channels listed in the “How to Contact Us” section of this policy , and we will respond to you as soon as possible.
The above third-party social media or other services are operated by the relevant third parties. Your use of such third-party social media services or other services (including any information you provide to such third parties) is subject to the third party’s own terms of service and information protection statement (not this policy), and you need to read its terms carefully. This policy only applies to personal information collected by us and does not apply to any services provided by any third party or the third party’s information use rules. If you find that these third-party social media or other services have risks, it is recommended that you terminate the relevant operations to protect your legal rights and interests and contact us in a timely manner.
VII. Revision and Notification
In order to provide you with better services, we may modify the terms of this Policy from time to time according to the updates of products or services and the relevant requirements of laws and regulations. Such modifications shall constitute part of this Policy. We will announce any changes made to this Policy on this page. For major changes, we will also provide more prominent notices (including website announcements, push notifications or other methods). Major changes referred to in this Policy include but are not limited to:
1. Our service model undergoes major changes, such as the purpose of processing personal information, the type of personal information processed, and the way personal information is used;
2. We have major changes in our ownership structure, such as changes in ownership due to business adjustments, bankruptcy, mergers and acquisitions, etc.;
3. Major changes occur to the main objects of sharing, transfer or public disclosure of personal information;
4. There are major changes in your rights to participate in the processing of personal information and the way in which they are exercised;
5. Other situations that are important or may seriously affect your personal rights and interests occur.
Any changes we make will be made with your satisfaction in mind. We encourage you to review our Privacy Policy every time you use our website.
8. How to contact us
If you have any complaints or reports regarding network information security, or if you have any questions, comments or suggestions about this policy, our privacy measures, or your personal information, please contact us by sending an email to Customer Service .
Generally, we will respond to your questions, comments or suggestions within 72 hours after receiving them, and will handle them within 15 working days after receiving your application and verifying your user identity. If you are not satisfied with our handling, you can also file a complaint or report to the department responsible for personal information protection.