Feihan Privacy Policy

Last Updated: February 10, 2025

Effective Date: February 10, 2025

Shanghai Feihan Security Technology Co., Ltd. and its affiliates (hereinafter referred to as "we" or "Feihan"), as the developers of the Feihan products and services, fully understand the importance of personal information to you. We will protect your personal information and privacy in accordance with the provisions of laws and regulations. We have established this Privacy Policy and hope to draw your attention to the following content so that you can make appropriate choices.

This Privacy Policy outlines how this software handles your personal information in different scenarios, helping you to more intuitively and concisely understand how this software collects, uses, and protects your personal information.

When you enable related functions, use related services, or to meet customer management needs, this software will collect and use relevant information on the server provided by the customer to realize the functions and services. Unless it is necessary for the realization of product functions or required by laws and regulations, or necessary to meet customer management requirements, you can refuse to provide the information without affecting other functions or services. Feihan Personal Information Collection Checklist

Address book, precise geographical location, camera, microphone, photo album, calendar permissions, and others will not be enabled by default. They will only be used to implement specific functions or services after your explicit authorization, and you can also revoke the authorization. It should be particularly noted that even after your authorization, this software will not collect this information when it is not needed for the relevant functions or services. Feihan Application Permissions Application and Usage Explanation

This Privacy Policy applies to Feihan products and services, including Feihan client applications of all versions, mini-programs, official websites, Feihan Software Development Kits (SDKs) and Application Programming Interfaces (APIs) for third-party websites and applications, and all other products and services provided by us that use this Privacy Policy (collectively referred to as "this software" or "Feihan" in this Privacy Policy). This Privacy Policy does not apply to services provided to you by other third parties. Before you choose to use third-party services, you should fully understand the product functions and privacy protection policies of the third-party services, and then decide whether to use the corresponding functions or services.

In addition to this Privacy Policy, in specific scenarios, this software will also inform you of the purposes, scope, and methods of information collection through instant notifications (including pop-ups, page prompts, etc.) and function update explanations. These instant notifications and function update explanations are part of this Privacy Policy and have the same effect as this Privacy Policy.

When using this software, you may have three different roles, including customer, authorized user, and individual user. You can use this software normally through the account registered in the control console (hereinafter collectively referred to as "account"). The relevant definitions are as follows:

a. Customer: An enterprise or organization that purchases Feihan products.

b. Authorized User: A natural person who is authorized by the customer to build organizational structure, manage members, maintain deployment, exercise management authority, and use this software in the control console, including super administrators and administrators (hereinafter collectively referred to as "administrators"); the person who initially represents the customer to initialize the Feihan software is called the super administrator.

c. Individual User: A natural person who is designated by the customer to register and use this software in a personal capacity, relative to the authorized user.

d. Account: An account manually designated by the authorized user in the control console, which can be used to log in and use this software. Individual users cannot register for Feihan accounts through any other means except those designated by the administrator. The number of accounts that can be registered and used normally by the customer within this software is subject to the License limit.

The following sections will help you understand in detail how this software collects, uses, stores, transfers (if applicable), and protects your personal information. They will also help you understand how to query, copy, delete, correct, and revoke authorization for personal information. This policy is closely related to your use of this software, and we recommend that you read and understand the entire content of this policy carefully and make the choices you consider appropriate. We have highlighted important content related to your personal information rights in bold, please pay special attention.

Table of Contents:

  1. How this software collects and uses personal information

  2. How we use Cookies and similar technologies

  3. Partners involved in data processing and the transfer and public disclosure of personal information

  4. How we store personal information

  5. How we protect the security of personal information

  6. Managing your personal information

  7. Terms for minors

  8. Revision and notification of the Privacy Policy

  9. Contact us

  10. Others

1. How this software collects and uses personal information

To provide you and the customer with this software, meet the customer's office collaboration and management needs, maintain the normal and secure operation of this software, and optimize the functional experience of this software, Feihan will collect the personal information you actively provide or authorize during registration and use of this software, as well as the personal information generated during your use of this software, for the following purposes and in the following ways:

1.1 Account Services

1.1.1 Registration, Login

a. To use this software, you need to create a Feihan account. You can create a personal identity account or an organizational identity account (both referred to as "accounts") by creating a personal identity, creating an enterprise, organization, or joining an organization, and bind the same or different login credentials for these Feihan accounts. Your account can also be registered and allocated by a customer representative or authorized user on your behalf. Joining different organizations will generate different Feihan accounts.

b. If you only browse the Feihan official website, you do not need to register a Feihan account and provide the aforementioned information.

c. If you are an authorized user, you can join the organization through an invitation code, invitation link, or QR code sent by the customer. However, the account under your organization will only be activated when and only when you confirm the acceptance of the invitation and log in to the account under your organization. If you apply to join an organization on your own, your account under the organization will be created when your application is approved, and the account will be activated when you log in.

d. When you register this software on behalf of the customer, you will also need to provide relevant information such as the enterprise/organization name, industry type, and personnel size. To help you fill in the enterprise information more conveniently, Feihan will locate the organization's region based on your IP information. You can also manually select the region. If you wish to obtain more functions and rights, you will need to provide basic information such as the main body certificate, legal representative or other types of manager information, and authorization documents on behalf of the customer, so that we can help the customer complete the certification. You confirm that you have obtained the full authorization of such customers to sign and agree to all the contents of this Privacy Policy.

e. Based on our cooperation with telecommunications operators, when you use the "one-click login" feature, after your explicit consent, the operator will send your phone number to us to provide you with a convenient login service. The phone number is a type of personal sensitive information. If you refuse to provide it, you will not be able to use the "one-click login" method to register and log in to this software, but it will not affect your registration and login through other methods.

f. If you forget your login password and cannot reset it on your own, you can use the password reset appeal function. To ensure the security of your account, you may need to fill in relevant information for verification, and if necessary, verify your identity through real identity information verification and other means.

1.1.2 Account Public Information

a. You can fill in or set your avatar, alias, personal signature, background image, and personal status according to your own needs. These personal profiles that you actively fill in or set will be displayed to other users. Not filling in or setting this information does not affect your use of the Feihan account and services.

b. If you are an authorized user, the specific information displayed on your personal business card page in your organization may be set by the customer administrator according to the customer's management needs. Feihan supports the synchronization of system status such as leave requests to be displayed as your personal status, so that people collaborating with you can make reasonable work arrangements in scenarios such as instant communication and scheduling meetings. If allowed by the customer administrator, you can turn off the automatic display of personal status following the system approval status.

1.2 Instant Messaging

1.2.1 To enable the transmission and display of information, ensure that new members can view all historical messages at any time when joining a group, quickly integrate into the team and project, and improve office efficiency, Feihan will record your messages and voice call status information (not call content) within Feihan and synchronize them to all your logged-in devices.

1.2.2 When a user actively initiates an urgent message prompt, to facilitate the quick delivery of the message, Feihan will send an urgent SMS or call to you through the phone number you provided during registration to remind you to check the message on behalf of other users.

1.2.3 When you want to send your location information to a contact in the instant messaging interface, Feihan will obtain your location information to display your location to both you and your contact.

1.2.4 You can add or remove contacts in Feihan, and we will create contact lists and group lists for you. If you are an authorized user, we will also display the organizational structure information of your department.

1.2.5 When you send a voice message, use the voice or video call function, Feihan will request your microphone permission/camera permission; if you send a photo or file, Feihan will request photo album permission. The above permissions are necessary for the relevant functions. Refusing Feihan to use these permissions will affect your use of the related functions, but it will not affect your use of other functions of Feihan. When you take a photo in landscape mode on your phone, to adapt to your device status, we may call the accelerometer to identify whether the device is in landscape mode. Feihan highly values user experience. If you have authorized the photo album permission and the last media file is a video format, to help you reduce the video sending time, when switching to the chat sending scenario, Feihan may help you compress the last video in the photo album. However, in this scenario, only client-side compression and caching will be performed, and the cached file will be deleted after restarting the Feihan application.

1.2.6 If you choose to send a message in the form of voice-to-text or voice-plus-text, Feihan will convert your voice content into text according to the language you select to help you send the message.

1.2.7 When you play a voice message, to help you determine whether to turn on the earpiece mode, Feihan may need to call the proximity sensor.

1.2.8 During instant communication, if you and the other party are not in the same time zone, and your local time is between 22:00 and 08:00 the next day, to help the other party understand your local time and arrange work communication reasonably to avoid unnecessary disturbances, Feihan needs to use your device's time zone to display your local time to the other party.

1.3 Calendar Scheduling

1.3.1 You can add work status, event reminders, and other calendar schedule information through Feihan's calendar function, subscribe to public or colleagues' schedule status, and send or receive meeting invitations. If you are the controller of a calendar schedule, you can set your calendar schedule privacy to private, public, or public within a specific scope.

1.3.2 When participants are not in the same time zone, the time zone information of the device you are using is required to display your local time, which helps the meeting coordinator to arrange an appropriate meeting time.

1.3.3 When you schedule a meeting and add a conference room in the calendar function, Feihan will sort the available conference rooms based on your historical reservation situation to help you improve the efficiency of conference room selection.

1.3.4 If you wish to synchronize the calendar schedule from your device to Feihan, you need to authorize Feihan calendar permission. Otherwise, Feihan will not be able to help you complete the information synchronization, but it will not affect your use of other calendar functions in Feihan.

1.4 File Cloud Disk

1.4.1 You can choose to create or upload files in Feihan's file cloud disk at your discretion. These files will be stored on the Feihan service end.

1.4.2 The operations you perform on the files, such as sharing, creating copies, downloading, browsing, and changing permission settings, will be recorded and displayed to the file creator. If the customer administrator has turned off the access record function, you will not be able to view the access records in the file information.

1.5 Audio and Video Conferencing

1.5.1 After the audio and video conference recording function is enabled, Feihan will store the corresponding recording files for you. The meeting host will be the owner of the files and can choose to share the recording files with participants or other relevant personnel. If you are the meeting host, you should be aware of your legal responsibilities, including whether you need to obtain the consent of the participants in advance. We are not responsible for your use of the recording function and its content. If you are a participant and do not wish to be recorded, we suggest that you inform the host of your decision and refuse to be recorded.

1.5.2 When you use the earpiece of your phone for a video conference, Feihan may need to call the phone's proximity sensor to control the screen off, helping you avoid accidental screen touches.

1.6 Email Services

1.6.1 You can use the Feihan email client function to send and receive emails from third-party email services. In this scenario, your email-related data will only be processed within the Feihan client and will not be transmitted back to the Feihan service end.

1.7.1 When you use the search function, we will collect your search keyword information and log records to display search result content and search history. The search keyword information will be stored on both your device and the Feihan service end. You can click on the search box to view and delete the corresponding search history keywords stored on this device and the service end.

1.7.2 We will use algorithmic processing to feature the text in Feihan group chat images to help you quickly search for the desired images in the historical images of Feihan chat groups. Such feature processing is only used to improve search efficiency and will not be associated with your identity. We will not use the analysis results for any other purposes or provide them to third parties.

1.8 Check-in

1.8.1 If the customer administrator enables GPS or WI-FI check-in mode, when you check in, Feihan needs to use your GPS location information and WI-FI access points to help you complete the attendance check-in.

1.8.2 If the enterprise enables the check-in attendance anti-cheating function, Feihan will compare and confirm on the device end whether there is any cheating software. Feihan will only obtain the result of whether there is cheating software and will not obtain your software installation list information, nor will it upload your software installation list to the Feihan service end.

1.10 Secure Operation

1.10.1 Operation and Security Assurance

We are committed to providing you with a safe and trustworthy product and usage environment, and providing high-quality and reliable software and information is our core goal. To maintain the normal operation of our software and protect the legitimate interests of you or other users or the public from harm, this software will collect necessary information for maintaining the secure and stable operation of the product or service and store it on the customer's server.

1.10.2 Device Information and Log Information

a. To ensure the secure operation of the software and services, and the quality and efficiency of operations, this software will collect your: hardware model, operating system version number, device identifier (Android such as IMEI, Android ID, OAID, IMSI, ICCID, GAID, MEID, iOS such as IDFV; different identifiers may vary in terms of validity period, whether they can be reset by the user, and the way to obtain them), network device hardware address (device MAC address), hardware serial number (SN), IP address, WLAN access point (such as SSID, BSSID), Bluetooth (Bluetooth), base station, software version number, network access method, type, status, network quality data, operation, use, service logs, device time zone, device name.

b. To prevent malicious programs and ensure the quality and efficiency of operations, this software will collect the Feihan application information installed on your device (such as version, language, source, etc.), process information, overall operation, usage situation and frequency, application crash situation, performance data.

c. This software may use your account information, device information, service log information, as well as information that our affiliates and partners can provide with your authorization or in accordance with the law, to determine account and transaction security, conduct identity verification, identify illegal and regulatory violations, detect and prevent security incidents, and take necessary recording, analysis, and disposal measures in accordance with the law.

1.11 Copy and Share

1.11.1 When you share or copy information, this software needs to access your clipboard to read the passwords, share codes, links, and other content information contained therein, in order to achieve functions or services such as jumping, copying, and sharing.

1.11.2 If the organization you are in enables the paste protection function, according to the security policy set by the organization, you may not be able to copy the content in Feihan to other applications. Feihan will write the prompt that cannot be copied into the clipboard so that you can understand the reason in time when you cannot paste. However, this is only a prompt for the reason to you, and Feihan will not obtain your private information.

1.12 User Feedback

During the use of this software, you can provide feedback on the problems encountered during use and service experience, which helps us better understand your experience and needs when using our products or services. While helping you solve problems, it also helps us improve our products and services. For this purpose, we will record your contact information, the problems or suggestions you feedback, your communication/call records with us and related content (including account information, ticket information, other information you provide to prove relevant facts, or other contact information you leave), so that we can further contact you and inform you of our processing progress.

1.13 Changes in the Purpose of Collecting and Using Personal Information

Please understand that as our business develops, there may be adjustments and changes to the functions of Feihan and the services we provide. In principle, when the new functions or services are related to the functions or services we currently provide, the personal information collected and used will have a direct or reasonable connection with the original processing purpose. In scenarios that have no direct or reasonable connection with the original processing purpose, this software will collect and use your personal information again in accordance with the requirements of laws and regulations and national standards, and inform you in a reasonable manner such as page prompts, interactive processes, and agreement confirmations, and obtain your consent.

Please understand that in the following circumstances, in accordance with laws and regulations and relevant national standards, we do not need to obtain your consent to collect and use your personal information:

a. Related to our fulfillment of obligations stipulated by laws and regulations;

b. Directly related to national security and defense security;

c. Directly related to public safety, public health, and major public interests;

d. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

e. Necessary to maintain the significant legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain consent from the individual;

f. The personal information collected is information that you have publicly disclosed to the public by yourself;

g. Collected from legally disclosed information, such as legal news reports, government information disclosure, and other channels;

h. Necessary for the conclusion or performance of a contract at your request;

i. Necessary for maintaining the secure and stable operation of software and related services, such as discovering and handling faults of software and related services;

j. Necessary for legal news reporting;

k. Academic research institutions conduct statistical or academic research for the public interest, and when providing academic research or descriptive results to the outside world, the personal information contained in the results is de-identified;

l. Other circumstances stipulated by laws and regulations.

1.15 Situations Where the Customer is the Personal Information Processor

1.15.1 If you are an authorized user, in addition to the information collected by the system and the information you actively submit, to make it more convenient for you to use this software, the customer will provide us with personal information necessary for the functions and services of this software, including but not limited to your account name, name, corporate email, work phone, work location, position, rank, organizational relationship, and other information, and the customer will update this information from time to time according to the actual situation. According to the customer's representation and warranty, before the customer provides the above personal information to us, it has already obtained your explicit consent and has fully informed you of the purpose, scope, and manner of collecting and using your personal information. If you cannot confirm the above content, we suggest that you immediately stop accessing or using this software and confirm the above matters with the customer. You can also contact us through the contact information provided in this Privacy Policy, and we will cooperate with you within our capabilities to handle related matters.

1.15.2 If you use this software as an authorized user, the customer will process your personal information based on employment management needs and other scenarios. You understand that the following personal information will be collected, used, and the processing purpose and method will be determined by the customer. We will only process this information in accordance with the customer's instructions and the agreement between us and the customer for the purpose of providing you with relevant services and functions (referred to as "customer-used data"):

a. Your name, avatar, personal signature, background image, alias, position, contact information (email, phone number, etc.), work location, position, rank, organizational relationship, and other information within your organization;

b. The audio and video files of members within your organization, email content, and other content-based information generated during your use of this software;

c. If the customer opens business management (including but not limited to approval, contract and project management, visitor registration) or human resources management (including but not limited to check-in, access control, sign-in, health management, recruitment, human resources, performance, payroll, reporting, travel) products or functions to meet the needs of daily business management and office security, to realize the relevant functions, you may need to provide your basic personal information (such as contact information, gender, social account), identity information (such as relevant certificate information), employment information (department, position, rank, etc.), work and education information, salary and bank card information for payment, facial information, geographical location, schedule information, access control and check-in records, approval records, health status information, and other personal information entered, allocated, or required by the customer;

d. If the school where the student is located chooses to use this software, to facilitate communication between the school and parents and the school's relevant management, the school may upload or require you to provide your parent's contact information (name, phone number, contact address), children's identity, class (grade, class, stage, campus), and other information needed for school management;

e. Transaction information when you use this software or select third-party services on the Feihan Open Platform, so as to display it to you and facilitate your management of related transactions;

f. To achieve employee management and network and data security, the customer will also collect your operating system version number, IP address, network access method, type, status, device information, network device hardware address (MAC address), service log;

g. To enable more efficient and convenient office communication and collaboration among members of different organizations, the customer may enable the associated organization function. To realize the associated organization collaboration capability, your organization will provide your necessary personal information and data generated during office collaboration to the external collaborating organization, and the relevant information may be stored and accessed across borders depending on the collaborating entity. If you have any questions about the relevant content or wish to assert related rights, you understand and acknowledge that you can contact the customer or the customer administrator to handle it;

h. Other information submitted by the customer for organizational management and operation, to achieve collaborative office or specific team management purposes, as well as information that you need to submit.

1.15.3 For customer-used data, the customer is responsible for informing authorized users of the purpose, manner, and scope of personal information collection and use. If you have any questions about the relevant content or wish to assert related personal information rights, you understand and acknowledge that you can contact the customer or the customer administrator to handle it.

Please pay special attention that if the information cannot identify your personal identity alone or in combination with other information, it is not your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or when we combine data that cannot be linked to any specific personal information with your other personal information for use, these pieces of information will be treated and protected as your personal information in accordance with this Privacy Policy during the period of combined use.

2. How We Use Cookies and Similar Technologies

2.1 We use Cookies and other similar technologies to enhance your experience with this software. When you use this software, we may use these technologies to send one or more Cookies or anonymous identifiers to your device to collect and store information about your access and use of this software. We promise that Cookies will not be used for any other purposes beyond those described in this Privacy Policy. We use Cookies and similar technologies primarily to achieve the following functions or services:

a. Ensuring the security and efficient operation of products and services: We may set authentication and security Cookies or anonymous identifiers to confirm whether you have safely logged into the service or whether you have encountered any theft, fraud, or other illegal activities. These technologies will also help us improve service efficiency and enhance login and response speed.

b. Providing you with a more convenient access experience: Using these technologies can help you avoid the hassle of repeatedly filling in personal information and entering search content (example: remembering searches, form filling).

2.2 Most browsers provide users with the functionality to clear browser cache data. You can perform the corresponding data clearing operations in the browser settings. If you clear the data, you may not be able to use the services or corresponding functions that we provide that rely on Cookies.

3. Partners Involved in Data Processing and the Transfer and Public Disclosure of Personal Information

3.1 Partners Involved in Data Processing

3.1.1 Principles

a. Legality Principle: Data usage activities involving cooperation with partners must have a legitimate purpose and comply with the statutory basis of legality. If the partner's use of information no longer complies with the legality principle, it should no longer use your personal information or use it again after obtaining the corresponding basis of legality.

b. Legitimacy and Minimization Principle: Data usage must have a legitimate purpose and should be limited to what is necessary to achieve that purpose.

c. Security and Prudence Principle: We will carefully evaluate the purpose of the partner's use of data, comprehensively assess the partner's data security capabilities, and require them to follow the cooperation legal agreement. We will conduct strict security monitoring of the software development kits (SDKs) and application programming interfaces (APIs) used by partners to obtain information to protect data security.

3.1.2 Entrusted Processing

For scenarios where personal information is processed on behalf of others, we will sign relevant processing agreements with the entrusted partners in accordance with the law and supervise their personal information usage activities.

3.1.3 Joint Processing

For scenarios where personal information is jointly processed, we will sign relevant agreements with partners in accordance with the law and define the rights and obligations of each party to ensure compliance with legal regulations and data security during the use of relevant personal information.

3.1.4 Scope of Partners

If specific functions and scenarios involve services provided by our affiliates or third parties, the scope of partners includes our affiliates and third parties.

3.1.5 Data Usage for Functions or Services

a. When you use products and services on the Feihan Open Platform or other third-party products and services, these products and services may use the relevant system permissions you have authorized, or they may require you to submit personal information according to the functions of these products and services. We will provide the necessary information for the service to the product serving you based on your authorization. You can refer to the relevant agreements or privacy policies of these products and services, and you can also revoke authorization within these products and services. If you are an authorized user, the customer administrator may provide some customer-used data to these service providers in order to let you use these products or services.

b. Login and Binding to Other Products: When you use your Feihan account to log in to products or services of affiliates or third parties, or bind your Feihan account with accounts of affiliates or third parties, the above applications or services will use your name, avatar, product installation status, device information, orders for purchasing third-party products, and other information you have authorized.

c. Geolocation Services: When you use geolocation-related services, the location service provider may use your GPS information and device information through SDK or related technologies to return location results to you. Location information is a type of personal sensitive information. Refusal to provide it will only affect the geolocation service function but will not affect the normal use of other functions.

d. Push Function: To match the message push function with the terminal model you are using, terminal device manufacturers (Huawei, Xiaomi, OPPO, VIVO, etc.) may use your phone model, version, and related device information through SDK and other technologies.

e. Customer Service: To promptly handle your complaints, suggestions, and other requests, the customer service provider needs to use your account and relevant information about the involved events to timely understand, handle, and respond to related issues.

3.1.6 Helping You Participate in Marketing and Promotional Activities

When you choose to participate in marketing activities hosted by us, our affiliates, or third parties, to ensure that you receive consistent service in joint activities or to entrust our partners to timely provide you with rewards, we and our partners may need you to provide information such as your name, mailing address, and contact information. Some of this information is personal sensitive information. Refusal to provide it may affect your participation in the relevant activities but will not affect other functions.

3.2 Transfer

As our business continues to develop, we may undergo mergers, acquisitions, or asset transfers, and your personal information may be transferred as a result. In the event of such changes, we will continue to protect your personal information in accordance with laws and regulations and at no lower security standards than those required by this Privacy Policy, or we will require the successor to obtain your authorization and consent again.

3.3 Public Disclosure

We will not publicly disclose your information unless required by national laws and regulations or with your consent. When we publicly disclose your personal information, we will adopt security protection measures that meet industry standards.

Please understand that in the following circumstances, in accordance with laws and regulations and national standards, we do not need to obtain your authorization and consent to provide and publicly disclose your personal information to partners or third parties:

a. Necessary for the conclusion or performance of a contract in which you are a party, or necessary for the implementation of human resource management in accordance with labor regulations and collective contracts established in accordance with the law;

b. Necessary for the fulfillment of statutory duties or obligations;

c. Directly related to national security and defense security;

d. Necessary to respond to sudden public health emergencies, or to protect the life, health, and property safety of natural persons in emergency situations;

e. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

f. Necessary for the implementation of news reporting and public opinion supervision for the public interest, within a reasonable scope of processing personal information;

g. Personal information that you have publicly disclosed to the public;

h. Collected from legally disclosed information, such as legal news reports and government information disclosure channels;

i. Other circumstances stipulated by laws and administrative regulations.

4. How We Store Personal Information

4.1 Storage Location

For the service end deployed privately by the customer, the personal information collected and generated by the Feihan client will only be stored on the customer's server, and the customer will store and manage it in accordance with relevant laws and regulations.

For the personal information collected and generated by the Feihan official website operated by us, in accordance with the provisions of laws and regulations, we will store the personal information collected and generated during the operation within the territory of the People's Republic of China. We will not transmit your personal information to overseas locations.

4.2 Storage Duration

4.2.1 During your use of this software, we will continuously save your personal information, and the storage period will be based on the principle of not exceeding the period necessary for providing services. If we cease operations of this software, you deactivate your account, delete your personal information on your own, or exceed the necessary period, we will delete or anonymize the personal information we hold about you within a reasonable period in accordance with the applicable law. However, the following exceptions apply:

a. Compliance with legal requirements for information retention (for example: The Cybersecurity Law stipulates: technical measures for monitoring and recording the operation status of the network and cybersecurity incidents, and retaining relevant network logs for no less than six months as required).

b. It is necessary to reasonably extend the period for financial, auditing, dispute resolution, and other purposes.

c. The customer, as the personal information processor, has other processing requirements for the relevant information.

4.2.2 If you are an authorized user, you understand and acknowledge that if you have any questions or wish to assert related personal information rights regarding our processing of personal information on behalf of the customer as a entrusted party, you should contact the customer or the customer administrator to handle it.

5. How We Protect the Security of Personal Information

5.1 We place great emphasis on the security of your personal information. Based on the requirements and standards of applicable laws and regulations, we have established a high-standard personal information protection management system and implemented security technical measures to ensure the security and compliance of personal information processing throughout its entire lifecycle, fully safeguarding user privacy. Our network services have adopted encryption technologies such as transport layer and application layer security protocols to ensure the security of your data during network transmission. You can visit the Feihan official website to learn more about security and compliance-related content.

5.2 We adopt strict data processing permission controls to prevent unauthorized use of data. We use a variety of data desensitization methods, such as masking and anonymization techniques, to enhance the security of personal information during its use. At the same time, we use widely used encryption technologies in the industry to encrypt and store your personal information and isolate it through data isolation technologies. We continuously implement these technical measures and organizational management methods and may revise and improve them from time to time to enhance the overall security of the system.

5.3 Despite the reasonable and effective measures taken and the compliance with the standards required by relevant laws and regulations, please understand that due to technological limitations and the existence of various malicious means, in the Internet industry, even if we do our utmost to strengthen security measures, it is not possible to ensure the absolute security of information at all times. We will do our best to ensure the security of the personal information you provide to us. Please be aware and understand that the system and communication network you use to access our services may encounter problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing your account passwords and other personal information to others.

5.4 In the event of a cybersecurity incident, we will take corresponding remedial measures in accordance with the cybersecurity incident emergency response plan in a timely manner. If our physical facilities or technical protection measures are compromised, leading to the leakage, illegal provision, or misuse of your personal information, and causing damage to your legitimate rights and interests, we will strictly assume the corresponding responsibilities in accordance with the law. If this software is deployed privately by the customer, the customer will assume the corresponding responsibilities.

5.5 After we become aware of a personal information security incident where your personal information has unfortunately been leaked, illegally provided, or misused, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the remedial measures we have taken or will take, suggestions for you to independently guard against and reduce risks, remedial measures for you, etc. We will inform you of the relevant situation of the incident through push notifications. When it is difficult to inform each personal information subject individually, we will take reasonable and effective measures to issue announcements. At the same time, we will also report the handling of the personal information security incident to the regulatory authorities in accordance with their requirements.

5.6 Once you browse or use other websites, services, and content resources, we will not have the ability or direct obligation to protect any personal information you submit during the use of third-party products, regardless of whether you log in, browse, or use the above software and websites based on links or guidance from this software.

6. Managing Your Personal Information

We place great importance on your management of personal information and strive to protect your rights to view, copy, correct, supplement, delete, revoke authorization, deactivate your account, make complaints and reports, and set privacy functions for your personal information, enabling you to safeguard your privacy and information security.

However, please understand that specific business functions and services require your information to be completed. When you revoke consent or authorization, we will no longer be able to provide you with the corresponding functions and services, nor will we process your relevant personal information. However, your decision to revoke consent or authorization will not affect the personal information processing we have conducted based on your previous authorization.

The management methods and paths we provide in different versions or operating systems may vary, so please refer to the actual ones.

6.1 Settings Management

6.1.1 System Permission Settings

a. You can directly access the device operating system settings, or within the Feihan mobile app, go to "Settings" - "Privacy" - "System Permissions" to jump to the device system settings page. You can independently enable or disable relevant system permissions, change the scope of consent, or revoke your authorization. After revoking authorization, Feihan will no longer collect information related to that permission.

b. After using products and services on the Feihan Open Platform, you can revoke permission authorization within those products and services.

c. You can choose in your device settings whether to receive system notifications sent by Feihan, or set the format of the system notifications you wish to receive. At the same time, you can also go to "Settings" - "Notifications" to choose the scope and format of notifications within the app.

6.1.2 Account Management

c. You can go to "Settings" - "Account & Security" to query and modify your login phone number and email address, and set or change your login password. To help you manage your account security, you can also go to the account security center to query and manage your login devices.

6.2 Your Personal Information Rights

6.2.1 Query, Correct, Delete

a. If you are an individual user, you can query and modify your avatar, name, alias, and signature within your personal homepage;

b. If you are an authorized user, you can query your avatar, name, alias, department, direct supervisor, personnel type, email, work city, and other information within your personal homepage. The relevant information is configured for you by the customer. If you wish to modify certain information, you can submit a correction request to them, which will be handled by the customer administrator;

c. You can add, edit personal status, or cancel the automatic synchronization of leave, schedule, and meeting status within your personal homepage or by going to "Me" - "Personal Status";

d. Go to "Favorites" to query and delete the content you have saved;

e. You can operate and adjust within the corresponding functional interface according to your needs and the specific products and functions we provide during your use of this software;

f. Go to "Settings" - "Calendar" to view and change the way to modify the calendar time zone.

Please pay special attention that for security and identity recognition (such as account recovery services) reasons, you may not be able to independently modify certain initial registration information submitted during registration. If you indeed need to modify such registration information, please contact the customer administrator.

6.2.2 Copy, Export

a. You can directly copy and download your relevant information within the related product functional interface, or download part of the personal information collected by Feihan through "Settings" - "About Feihan" - "Personal Information Inquiry and Export."

b. If you are an authorized user, if you wish to copy or export information processed by your organization as an information processor, or assert related personal information rights for this information, you understand and agree that you should contact your organization or the administrator of your organization to handle it.

6.2.3 Control Visibility Scope

a. Go to "Avatar" - "Settings" - "Privacy" - "Who Can Chat with Me" to control what types of users can communicate with you;

b. Go to "Avatar" - "Settings" - "Privacy" - "Block List" to query and edit your blacklist. Users on the block list will not be able to chat with you or collaborate.

For personal information processed by the customer, if you cannot exercise your rights through the functional interface, you can submit a rights claim to the administrator.

6.3 Deactivation of Account

6.3.1 If you are an individual user, you can log in to the Feihan client, click on "Avatar" - "Settings" - "Account & Security" - "Deactivate Account" to submit a deactivation request. This request will be sent to the customer and handled by the customer administrator.

6.3.2 If you are an authorized user, you can deactivate your organizational identity account by exiting your organization, being operated as a resignation by the customer administrator, or if your organization dissolves the team.

6.3.3 If you voluntarily apply to deactivate your Feihan account, before your account is deactivated, this software will verify your personal identity, security status, device information, and other information to help you complete the deactivation. You understand and acknowledge that deactivating your account is an irreversible action. After your account is deactivated, this software will delete relevant information about you or anonymize the data, except as otherwise provided by laws and regulations or as required by the customer for the data they use.

6.4 Feedback and Complaint Reporting

If you have any opinions or believe that your personal information rights may have been infringed upon, or if you discover clues of personal information rights infringement, you can contact us through the contact information published in this Privacy Policy.

6.5 Access to Privacy Policy

6.5.1 You can view the full content of this Privacy Policy on the registration page, or after logging in to your account, click on "Avatar" - "Settings" - "About Feihan."

6.5.2 Please understand that the functions of this software described in this Privacy Policy may vary depending on the device model you use, system version, software application version, different Feihan versions purchased by the customer, and settings made by the customer based on enterprise employment management. The final products and services are subject to the software and related services you use.

7. Terms for Minors

7.1 Feihan is primarily aimed at adults. If you are a minor under the age of 18, you should read and agree to this Privacy Policy together with your parents or other guardians under their supervision and guidance before using this software.

7.2 If you are the guardian of a minor and have any questions about the personal information of the minor under your guardianship, please contact us through the contact information published in this Privacy Policy.

8. Revision and Notification of the Privacy Policy

8.1 To provide you with better services, this software will be updated and changed from time to time. We will revise this Privacy Policy as appropriate. These revisions form part of this Privacy Policy and have the same effect as this Privacy Policy. Without your explicit consent, we will not reduce the rights you are entitled to under the current effective version of this Privacy Policy.

8.2 After this Privacy Policy is updated, we will release the updated version and remind you of the updated content in an appropriate manner before the updated terms take effect, so that you can promptly understand the latest version of this Privacy Policy. If you continue to use this software after the update of this Privacy Policy, it will be deemed that you accept the updated Privacy Policy.

9. Contact Us

9.1 For any questions, opinions, or requests related to this Privacy Policy, you can enter the "Help & Customer Service" page within the Feihan client or contact us through the customer service entry on the homepage of the official website (https://feihanim.cn/). You can also send related questions to contact@feihan.im or mail to the following address: Room 2104, Tian'an Center, 338 Nanjing West Road, Huangpu District, Shanghai. Generally, we will reply within fifteen working days after receiving your contact information and verifying your identity.

9.2 For your reasonable requests, we will not charge fees in principle. However, for repeated or unreasonable requests, we will charge a certain fee at our discretion. For information that is not directly related to your identity, baseless repeated information, or requests that require excessive technical means (such as developing a new system or fundamentally changing existing practices), pose risks to the legitimate rights and interests of others, or are unrealistic, we may refuse to process them.

10. Others

10.1 This Privacy Policy may exist in multiple language versions. In the event of any inconsistency or conflict between the terms of different language versions, the Simplified Chinese version of this Privacy Policy shall prevail.

10.2 The headings in this Privacy Policy are included for convenience and ease of reading and do not affect the meaning or interpretation of any provisions in this Privacy Policy.