M5 Privacy Protection Agreement
Release Date: 2023/5/30
Effective Date: 2023/5/30
Welcome to use M5.
In order to protect your related rights, the " M5 Privacy Protection Agreement" (hereinafter referred to as the "Privacy Agreement") will explain to you how M5 will collect , use and store your personal information and what rights you have. Before using M5 , carefully read and understand the content of this privacy agreement, and make the choices you think are appropriate according to the guidelines of this privacy agreement. Once you start using M5 products or services, it means that you have fully understood and agreed to the entire content of this privacy agreement.
This privacy agreement applies to the functions and services of the M5 product itself (including: instant messaging, collaboration, address book, check-in, meeting, announcement, approval, document management functions and services), and does not apply to other functions and services provided through the M5 client You should fully understand the product features and privacy protection policies of third-party services before choosing to use third-party services.
Related definitions:
• M5 : M5 is a M5 management tool provided by Seeyon Internet. M5 products and services, specifically refer to M5 clients (including iOS and Android application versions) and the M5 application services they provide.
• Enterprise users: refer to individuals or organizations that purchase, register, log in, use M5 products and services and obtain management authority, including but not limited to legal persons, government agencies, other organizations, partnerships or individual industrial and commercial households (hereinafter referred to as "enterprise users" ); Enterprise users can create their work platform through M5 (referring to a virtual work space created and managed by enterprise users, where multiple people can join the common use of M5 services), and invite and authorize individual users to join their work platform to become their end users .
• Enterprise user administrator: refers to an individual who has the operating authority of the enterprise user management background system designated by the enterprise user; the enterprise user administrator can be one or more people.
• Individual users: refer to individual users who are invited by corporate users to join the corporate work platform and register to use M5 , hereinafter referred to as "you" or "end users".
• Personal information: refers to all kinds of information recorded electronically or in other ways that can identify the personal identity of a natural person alone or in combination with other information, including but not limited to the natural person’s name, date of birth, ID number, personal biometric information, address, phone number.
• Personal sensitive information: refers to personal information that, once leaked, illegally provided, or misused, may endanger personal and property safety, and easily lead to personal reputation, physical and mental health damage, or discriminatory treatment. Including: ID card number, mobile phone number, personal biometric information, bank account number, property information, whereabouts, transaction information, and personal information of children under the age of 14 (including).
• Personal information deletion: refers to the act of removing personal information from the system involved in the realization of daily business functions, so that it can be kept in a state where it cannot be retrieved or accessed.
• Unique Device Identifier: (Exclusive ID or UUID) refers to a string of characters compiled into the device by the device manufacturer, which can be used to uniquely identify the corresponding device (involving the IMEI number of the mobile phone).
• IP address: Every device connected to the Internet will be assigned a number, called an Internet Protocol (IP) address. These numbers are usually assigned based on geographic area. The IP address is usually used to identify the location of the device when it is connected to the Internet.
• GPS: Short for Global Positioning System. The GPS signal receiver on the device you use can receive signals from GPS satellites and use the information to calculate your location.
• WIFI: Wi-Fi is a technology that allows electronic devices to connect to a wireless local area network (WLAN), usually what we call a wireless network.
This privacy policy will help you understand the following:
In order to provide services to you and corporate users, optimize our services, and protect account security, the M5 will collect the information you actively provide, authorize or use when registering and using the service in the following ways:
1.1 Basic personal information : In order to facilitate your use of your mobile phone number to log in to the M5 to obtain services and realize the transmission and interaction of information, you can provide personal information such as name, phone number, email address, organization name, department, job title, etc. when you need it.
1.2 Instant communication of information: In order to facilitate you to view the message records anytime and anywhere, you need to provide chat information, files and other information.
1.3 Device and address information: In order to ensure that you can use our services normally, improve and optimize your service experience, you need to provide the device model, operating system type, operating system version, unique device identification code, task information, and WLAN access point , Bluetooth, base station and other sensor information.
1.4 Log information: When you use our products, in order to better prevent security risks such as phishing websites, network vulnerabilities, computer viruses, network attacks, network intrusions, etc., we will collect your detailed usage of our services as the relevant network To save logs and improve the security of products and services, we need you to provide operation log information including access date and time, software usage records, search records, click records, Cookies, etc.
1.5 System permissions: In order to provide you with more convenient and personalized services, when we provide you with corresponding business functions, we will apply for the permissions required by the App in the form of dynamic prompts , and without your consent, we will not The status of your permission settings will be changed ; if you do not agree to the grant of these permissions, you will not be able to obtain the corresponding services, but it will not affect your use of basic services such as communication and collaboration. These system authorizations see Appendix 2
Please understand that the functions and services we provide to you are constantly updated and developed. If a function or service is not in the foregoing description and needs to collect your information, we will use page prompts, interactive processes, and website announcements. Separately explain to you the content, scope and purpose of information collection in order to obtain your consent.
We strictly abide by laws and regulations and agreements with users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain to you again and obtain your consent.
2.1 The location of information storage The enterprise privatizes the deployment, and the information is stored on the enterprise user's own server. Part of the public cloud channel data is stored in Seeyon Internet and Seeyon related party servers. Seeyon and Seeyon related parties will store personal information collected and generated in China in mainland China in accordance with laws and regulations.
2.2 Duration of information storage Generally speaking, we only retain your personal information for the time necessary to achieve the purpose. For enterprise user control data on the private server of enterprise users, the retention period can be set independently; for public cloud data, Seeyon and Seeyon's affiliates will store the data for a period of 6 months, which is convenient for enterprise users and end users to check. When your personal information exceeds the above-mentioned retention period, we will delete or anonymize it.
When our products or services cease to operate, we will notify you in the form of push notifications and announcements, delete your personal information or anonymize them within a reasonable period of time, and immediately stop collecting personal information. And close the third-party application service interface to prevent third-party services from collecting and continuing to use your personal information.
3.1 We strive to provide protection for users' information security to prevent information loss, improper use, unauthorized access or disclosure.
3.2 We will use various security protection measures within a reasonable security level to ensure the security of information. Including that we will use encryption technology and anonymization methods to protect your personal information.
3.3 We have established a special management system, process and organization to ensure the security of information. Including the scope of people who we strictly restrict access to information, require them to comply with confidentiality obligations and conduct audits.
3.4 In the event of a security incident involving personal information leakage, we will initiate emergency plans in accordance with the law to prevent the expansion of the security incident, and inform you of the security incident, the possible impact of the incident on you, and the remedial measures we will take in the form of push notifications and announcements . We will also report the handling of personal information security incidents in accordance with the requirements of laws, regulations and regulatory authorities.
4.1 We collect relevant information during your use of M5 services in order to create and provide better services to M5 users. We will use the collected information for the following purposes:
4.1.1 Security assurance: In order to ensure the safety of you and all M5 users, we will use relevant information to help improve the security and reliability of M5 services, including detection, revention and response to possible harm to M5 , our users or the public Fraud, abuse, illegal behavior, security risks and technical issues;
4.1.2 Communicate with you: We will use the collected information (involving the e-mail address you provided, the contact e-mail address of the corporate user, and the phone number) to directly communicate with you.
4.1.3 If we use your personal information beyond the stated purpose at the time of collection and the scope of direct or reasonable connection, we will notify you again and obtain your express consent before using your personal information .
4.2 According to relevant laws, regulations and national standards, we may collect and use your personal information without asking for your authorization under the following circumstances:
1) It is directly related to the national interests of national security and national defense security; it is directly related to the major public interests of public safety, public health, and public knowledge;
2) Directly related to criminal investigation, prosecution, trial and execution of judgments;
3) In order to protect your or other individuals’ major legal rights and interests of life and property, but it is difficult to obtain your own consent;
4) When you collect personal information, you disclose it to the public yourself;
5) Personal information collected from legally publicly disclosed information, including legal news reports and channels for government information disclosure;
6) Necessary for signing and fulfilling the contract according to your requirements;
7) Necessary for maintaining the safe and stable operation of the products or services provided. Including the discovery and disposal of product or service failures;
8) Other circumstances stipulated by laws and regulations.
You have the right to access, modify, and delete your personal information, which will be implemented in the following ways:
5.1 Access to personal information. You can access personal information in the M5 in the following ways :
1) My, through your M5 -My, access the personal data and other information you provide.
5.2 Correct personal information. When you need to update your personal information, or find that the personal information stored in the M5 is wrong, you have the right to make corrections or updates. You correct or modify your personal information in the M5 in the following ways :
1) Mine, modify the mobile phone number, email address, home address, and zip code information through personal settings.
2) Contact the enterprise user administrator to modify the personal information you provided in the enterprise user management background
5.3 Delete personal information. If you want to delete personal information, you can delete your personal information in the management background by contacting the enterprise user administrator. After the enterprise user administrator deletes your personal information, we will delete or anonymize your personal information.
5.4 Log out of account. Based on the personal user information storage feature of products, your above-mentioned personal information is collected and managed by your company . You can apply to the company to delete your personal account . The company administrator will process and delete your personal information in the management background . Delete The processing takes effect immediately . If a new software version or function is changed later, so that we have the processing authority of your personal information , after you submit your personal account cancellation application, we will delete or anonymize your personal information within 3 working days .
Implementation of these rights if we do, we will pass page prompts, interactive process, site notice or updated user guide way prior notice.
6.1 We will not share or transfer your personal information to third parties, except in the following cases:
6.1.1 Obtain your explicit consent: With your prior consent, we may share your personal information with third parties;
6.1.2 In order to ensure the implementation of M5 APP related functions and the safe and stable operation of the application , we may access software development kits ( SDK ) provided by third parties and related parties to achieve related purposes . Third-party and related party SDKs may have some changes due to their version upgrades , policy adjustments, etc., please refer to their official descriptions.
List of third-party SDKs see Appendix 1
When you use our products, the above third parties can provide services to you. Before you decide whether to use the service, please fully understand their personal information and privacy protection policies from the third-party service provider.
6.2 We will not publicly disclose the personal information collected. If public disclosure is necessary, we will inform you of the purpose of the public disclosure, the type of information disclosed and the sensitive information that may be involved, and obtain your express consent. What needs special explanation is that how the end-user related information is disclosed or shared externally in the enterprise user work platform to which it joins is determined and managed by the enterprise user.
6.3 With the continuous development of our business, we may conduct mergers, acquisitions, and asset transfer transactions. We will inform you of the relevant circumstances and continue to protect or require new controllers in accordance with laws and regulations and standards not lower than those required by this guide. Continue to protect your personal information.
6.4 We may disclose your personal information based on legal requirements or law enforcement requirements of relevant departments.
We attach great importance to the protection of the personal information of minors. According to relevant laws and regulations, if you are a minor, you should obtain the written consent of your parent or legal guardian before using the M5 service. If you are the guardian of a minor, if you have any questions about the personal information of the minor you are guarding, please contact us through the contact information in Section 9.
8.1 We may revise this privacy agreement in due course. If the following changes occur in M5 , we will promptly revise this privacy agreement:
1) The M5 business functions have changed;
2) The storage area of the user's personal information of the public cloud channel is changed;
3) The rules for the use of user personal information are changed;
4) Our contact information and complaint channels have changed;
5) Other changes that may affect the user's personal information security or affect the user's privacy rights;
6) Other changes.
8.2 After the revision of this privacy agreement, we will show you the revised privacy agreement in the form of official website announcements (https://www.seeyon.com), push notifications or pop-up windows. In this case, if you continue to use our products or services, it means that you agree to be bound by the revised privacy agreement.
8.3 This privacy agreement will come into effect on the date of issuance. Unless the M5 makes adjustments to this privacy agreement and releases a new privacy agreement in accordance with relevant laws and regulations, this privacy agreement will remain effective.
M5 is provided by Beijing Seeyon Internet Software Co., Ltd.
If you have complaints, suggestions, or questions about personal information protection, please contact us at https://www.seeyon.com.
Phone: 400-700-3322
Fax: 010-82603511
Address: Block N and Block O, Jingxin Park, No. 25, Beiwucun Road, Haidian District, Beijing
We will review the issue as soon as possible and respond within 30 days after verifying your user identity.
Appendix 1 : List of third-party SDKs
1.In order to ensure the implementation of mobile office APP related functions and the safe and stable
operation of the application , we may access software development kits ( SDK ) provided by third parties
and
related parties to achieve related purposes .
2. We will strictly monitor the security of the software tool development kit (SDK) for obtaining
information to protect data security.
3. We list the related SDK accessed in the directory and explain the purpose of use. The SDK only
obtains
the corresponding information when using the function.
4.Third-party and related party SDKs may have some changes due to their version upgrades , policy
adjustments, etc., please refer to their official descriptions.
Purpose of use: statistical analysis service
Type of data collected: device information (IMEI / MAC / Android ID / IDFA / openudid / guid /
SIM
card IMSI / geographical location, etc.)
Privacy policy link:https://www.umeng.com/page/policy
Purpose of use: location service
Data collection type: device information, location information, WLAN status information
Privacy policy link:https://lbs.amap.com/pages/privacy
Purpose of use: instant messaging function
Types of collected data: device information , SDK log information , user information ( ID,
nickname
, avatar ) , and message content sent by the user
Privacy policy link:https://www.rongcloud.cn/privacy
Purpose of use: QQ sharing function
Data collection type: device identifier , wifi address
Privacy policy link : https://privacy.qq.com/
Purpose of use: WeChat sharing function
Data collection type: device identifier , wifi address
Privacy policy link : https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy
Purpose of use: Office document viewing and editing function
Collection data type: device information
Privacy policy link :https://www.wps.cn/privacy/privacyprotect/
Purpose of use: ofd document viewing and modifying function
Collection data type: device information
Privacy policy link :http://www.dianju.cn/
Purpose of use: to view and modify ofd documents
Type of data collected: device information
Privacy policy link : https://www.ofd.cn/privacy/#/appprivacy
Purpose of use: Collect crash logs
Data collection type: device information, log information , networking information , system name
,
system version
Privacy policy link : https://static.bugly.qq.com/bugly-sdk-privacy-statement.pdf
Purpose of use: voice reading
Collection data type: device information, log information
Privacy Policy Link : https://ai.baidu.com/ai-doc/REFERENCE/Qkdykq1r3
Purpose of use: Push message
Collection data type: device identifier , application list
Privacy policy link : https://consumer.huawei.com/cn/privacy/privacy-policy/
Purpose of use: Push message
Data collection type: operator information , device identifier , wifi address
Privacy policy link : https://dev.mi.com/console/doc/detail?pId=1822
Purpose of use: Push message
Data collection type: operator information , device identifier , wifi address
Privacy policy link : https://open.oppomobile.com/wiki/doc#id=10288
Purpose of use: Push message
Types of data collected: operator information , device identifiers
Privacy policy link :https://www.vivo.com.cn/about-vivo/privacy-policy
Purpose of use: cast screen
Collection data type: log information , location information
Privacy policy link : https://www.lebo.cn/privacy.jsp
Purpose of use: QR code scanning function
Data collection type: BI data ( API call result )
Privacy policy link : https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050043971
Purpose of use: social sharing
Collected data types: system operation information , network status information , device
information
, application list information
Privacy policy link :http://www.mob.com/about/policy
Purpose of use: video meeting
Types of data collected: system operation information, network status information, device information, user information (ID, nickname, avatar, email address, IP address)
Privacy policy link :https://meeting.huaweicloud.com/#/privacy
Appendix 2 : Application permission application and use permission description
1. In order to ensure the functions and safe and stable operation of mobile office products, we may
apply
for or use the relevant permissions of the operating system;
2. In order to protect your right to know, we show the relevant operating system permissions that may be
applied for and used by the product through the following list. You can manage the relevant permissions
according to your actual needs;
3. According to the product upgrade, the type and purpose of application and use permission may change.
We
will adjust the list in time according to these changes to ensure that you know the application and use
of
permission in time;
4. Please be aware that we may also use third-party and related party SDKs for the functional and
security
needs of our business and products, and these third parties may also apply for or use relevant operating
system permissions;
5. In the process of using the product, you may use H5 pages or applets developed by third parties, and
these plug-ins or applets developed by third parties may also apply for or use relevant operating system
permissions due to business functions;
Android operating system personal information fields list
| Personal information fields | Instructions for use | Protections |
|---|---|---|
| Android ID, device model, OS version, IP address | It is used for personal device login management, records login information, and protects account security | SSL protocol encryption and HTTPS encrypted transmission |
| Wifi SSID | The clock-in application is based on the wifi connection information prompt to punch in | No transmission, only comparison |
| Personal Location Information | The check-in app is used to punch in based on personal location information prompts to send location messages | SSL protocol encryption and HTTPS encrypted transmission |
Android operating system application permission list
| Permission name / permission key | Permission function description | Usage scenario or purpose |
|---|---|---|
|
Get phone state READ_PHONE_STATE |
Get phone state | Caller ID |
|
Get phone call records READ_CALL_LOG |
Get phone call records | Caller ID |
|
Send SMS SEND_SMS |
Send SMS | Send SMS |
|
create shortcut INSTALL_SHORTCUT |
Create desktop shortcut | Desktop add button |
|
Lock screen WAKE_LOCK |
The message channel under the lock screen remains active | Rongyun lib message channel keeps alive |
|
shock VIBRATE |
Message reminder | Message reminder |
|
fingerprint identification USE_FINGERPRINT |
Allow fingerprint | Account login security verification |
|
Install application REQUEST_INSTALL_PACKAGES |
Allow application installation | Install application |
|
Monitor start broadcast RECEIVE_BOOT_COMPLETED |
Monitor start broadcast | Push function |
|
network right INTERNET |
Allow network identification | Access server |
|
Network status permissions ACCESS_WIFI_STATE |
Allow listening for network status | Network status monitoring |
|
Bluetooth permissions BLUETOOTH_ADMIN |
Allow connection to paired bluetooth devices | Rongyun voice pairing Bluetooth devices and other functions |
|
Location permissions ACCESS_FINE_LOCATION ACCESS_COARSE_LOCATION |
Get GPS location information | Punch in and send location function |
|
Storage permissions WRITE_EXTERNAL_STORAGE READ_EXTERNAL_STORAGE |
Provides writing and reading external storage data | Save data to the mobile phone system, such as pictures, videos, files, etc; Browse system albums, files, etc |
|
Make a call CALL_PHONE |
Enter the mobile phone dialing interface from the program | Allow the program to enter the mobile phone dialing interface |
|
Shooting permission CAMERA |
Take photos or videos with | Take / upload photos and videos |
|
Read and edit calendar READ_CALENDAR WRITE_CALENDAR |
Read or edit calendar events in the system | Synchronization schedule function |
|
Read system log READ_LOGS |
Read system log | Upload app crash log |
|
Read phone status READ_PHONE_STATE |
Identify call status and mobile network information | Address book incoming call monitoring and wireless screen projection |
|
Recording authority RECORD_AUDIO |
Recording audio using a microphone | Rongyun voice, form recording and uploading, etc |
IOS operating system application permission list
| Permission name / permission plist | Permission function description | Usage scenario or purpose |
|---|---|---|
|
Biometrics NSFaceIDUsageDescription |
Fingerprints and facial features are allowed | Account login security verification |
|
Location permissions NSLocationAlwaysAndWhenInUseUsageDescription NSLocationWhenInUseUsageDescription |
Get GPS location information | Punch in and send location function |
|
Shooting and album permissions NSCameraUsageDescription NSPhotoLibraryAddUsageDescription NSPhotoLibraryUsageDescription |
Use camera | Take photos upload pictures function / select send photos / save photos to album |
|
Read and edit calendar NSCalendarsUsageDescription |
Read or edit calendar events in the system | Synchronization schedule function |
|
Read write contact NSContactsUsageDescription |
Read system address book | Save contacts to contacts |
|
Recording authority NSMicrophoneUsageDescription |
Recording audio using a microphone | Rongyun voice, form recording and uploading |