Dear user, welcome to use Tess CAM (hereinafter referred to as "Tess CAM" or "us"). This privacy policy will help you (hereinafter referred to as "the user") understand:
(1) In order to ensure the normal operation of the product and provide innovative and easy core functions such as photography, as well as other functions, we will collect some necessary information from you.
(2) When you register for authentication, use Tess CAM related functions, or choose to join user improvement programs or other related services, based on legal requirements or necessary to implement functions, we may collect personal sensitive information such as phone numbers, audio and video files, facial recognition features, geographical location, etc. You have the right to refuse to provide us with this information, or to withdraw your authorization and consent to this information. Please be aware that refusing or revoking authorization consent may result in you being unable to use specific features, but it does not affect your use of other features of the "Tess CAM" software and related services.
(3) We will store your personal information collected and generated during our domestic operations within the territory of the People's Republic of China and will not transmit the aforementioned information overseas. We will only retain your personal information for the period necessary for the purpose of providing Tess CAM software and related services.
(4) We will not share, provide, transfer, or obtain your personal information from third parties unless with your consent.
(5) We will strive to take reasonable security measures to protect your personal information. Specifically, we will use industry practices and make every commercial effort to protect the security of your sensitive personal information.
(6) The methods for accessing, correcting, deleting personal information, revoking consent and authorization, as well as the methods for account cancellation, complaints, and reporting.
We attach great importance to the protection of user personal information and will treat this information with diligence and prudence. When you download, install, enable, browse, register, log in, and use (hereinafter referred to as "using") the "Tess CAM" software and related services, we will collect, save, use, share, disclose, and protect (hereinafter referred to as "processing") your personal information in accordance with this privacy policy. We would like to introduce you to our handling of your personal information through this privacy policy, so we recommend that you carefully and completely read all the terms of this privacy policy. Please focus on reading the content related to your information and rights. This privacy policy mainly includes the following clauses:
1. How do we collect and use personal information
2. Our use of cookies and similar technologies
3. How do we store personal information
4. How do we share, transfer, and publicly disclose personal information
5. How do we protect the security of personal information
6. Your rights
7. Terms of Use for Minors
8. Revision and Notification of Privacy Policy
9. Application of Law and Dispute Resolution
10. Other
How do we collect and use personal information? In the process of using Tess CAM software and services, we will collect information based on legal, legitimate, and necessary principles.
1.1 Personal information we collect and use
1.1.1 Equipment Information
(1) In order to ensure the safe operation of our services, as well as to ensure your information security, troubleshoot product failures, record statistical data related to service usage, and optimize the statistical analysis required for services, we will collect your device model, IMEI, network device hardware address (MAC), software version number, Bluetooth (SDK only), WLAN connection, operation logs, and other information. These are the basic information that we must collect to provide services and ensure the normal operation of our products. We have conducted deidentification processing when collecting and using the above information. Data analysis only corresponds to specific codes that cannot be directly associated with your household information, and methods will never be associated with your true identity.
1.1.2 Location information
(1) We need to collect your location information, such as longitude and latitude information, network location, IP address, rough location, etc. We obtain this information to comply with relevant laws and regulations, as well as to prevent improper use by users, identify user violations, and troubleshoot safety issues. You can also enable location information permission in the system's 【 Settings 】 - 【 Tess CAM 】 - 【 Location 】 to authorize us with your precise location information. Accurate location information is personal sensitive information, and we have set it to the default off state. If you do not authorize us, we will not collect your accurate location information and will not affect your normal use of other functions and services.
1.1.3 Personal information based on normal usage functions and services
(1) Core Function: When you use business functions such as photography, photography, beauty, filters, etc., we will need to obtain your camera, album, microphone permissions. When you select and click [Agree/Enable] in the pop-up window, it is deemed that you authorize us to access and obtain your personal information. If you refuse to provide it, it will prevent you from using the function.
(2) Facial recognition function: We may use facial recognition technology to recognize facial information in your albums, videos, and cameras, including facial contours, eye and mouth feature points. We recognize facial information only to provide facial recognition and facial manipulation functions, especially by applying filters and makeup effects at appropriate facial positions. After identifying this information, we will process it immediately. After approximately 0.5 seconds, the temporarily stored facial data will be deleted immediately and will not be shared with third parties or used to identify any specific users.
(3) Push service: To better understand and use our products and services, we will push our products, services, and marketing information to your mobile phone. But if you don't want to receive such information we send you, you can refuse to receive it in Tess CAM's message notification.
(4) Customer Service: When you file a complaint, consult or appeal with us, in order to facilitate contact or help you solve the problem, we may require you to provide personal information such as name, phone number, email, and other valid contact information. If you refuse to provide the above information, we may not be able to provide you with timely feedback on the relevant handling results.
1.1.4 Use of third-party tools
(1) Our product integrates UMeng+SDK, which needs to collect your device's Mac address, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to provide statistical analysis services, and calibrate the accuracy of report data through geographical location to provide basic anti cheating capabilities.
(2) We will treat your information with a high degree of diligence and obligation, carefully evaluate the purpose of third-party collection and use of information, and strictly monitor the security of SDKs (software tool development kits) used by third parties to obtain information to ensure data security.
1.1.5 Information collection based on personalized recommendations and online advertising
(1) Subject to compliance with relevant laws and regulations, we may allow third-party advertisers of this service to collect user advertising identification information.
(2) Possible information and methods for collection: user advertising identification information (ADID/IDFA), international mobile device identification code (IMEI), automatic collection and transmission when using the service.
1.2 Handling of changes in the purpose of collecting and using personal information
1.2.1 Please be aware that with the development of our business, there may be adjustments and changes to the functions and services provided by Tess CAM. In principle, when new features or services are related to registration, authentication and login, taking photos/videos/emojis, following photos, personalized selection of stickers, and editing images with beautification tools, the collected and used personal information will have a direct or reasonable correlation with the original processing purpose. In scenarios where there is no direct or reasonable connection to the original purpose, we will collect and use your personal information, inform you again, and obtain your consent.
1.3 Personal information that is exempted from collection and use by law
1.3.1 In the following situations, according to laws and regulations and/or relevant national standards, we do not need to obtain your authorization and consent to collect and use your personal information.
(1) Directly related to national security and national defense security;
(2) Directly related to public safety, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;
(4) Necessary for signing and fulfilling the contract according to your requirements;
(5) For the purpose of protecting the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain my consent;
(6) The personal information collected by you is publicly disclosed to the public on your own;
(7) Collect your personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;
(8) Necessary for maintaining the safe and stable operation of "Tess CAM" software and related services, such as discovering and dealing with faults in "Tess CAM" software and related services;
(9) Other situations stipulated by laws and regulations.
1.4 Special reminder to you that if your personal identity cannot be identified solely or in combination with other information, it does not constitute your personal information in the legal sense; When your information can be individually or in combination with other information to identify your personal identity, or when we combine data that cannot be linked to any specific personal information with other personal information, during the combined use period, this information will be treated and protected as your personal information in accordance with this privacy policy.
2 pairs of cookies and the use of similar technologies
2.1 About Cookies and Similar Technologies
2.1.1 Cookies and similar technologies are commonly used in the Internet. When you use the "Tess CAM" software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information about your access and use of this product.
The purpose and purpose of using cookies and similar technologies
2.2.1 Ensuring the safe and efficient operation of products and services: We may set authentication and security cookies or anonymous identifiers to confirm whether you have securely logged into the service, or whether you have encountered illegal activities such as theft and fraud. These technologies will also help us improve service efficiency, enhance login and response speed.
How do we store personal information
3.1 Location of Information Storage: In accordance with laws and regulations, we will store your personal information collected and produced during domestic operations within the territory of the People's Republic of China.
3.2 Information Storage Period: We will only retain your personal information for the period necessary for the provision of the "Tess CAM" software and related services. For example, your account information will be retained during the period when you have not withdrawn, deleted, or cancelled your account. After the necessary deadline, we will delete or anonymize your personal information, except as otherwise provided by laws and regulations.
How do we share, transfer, and publicly disclose personal information
4.1 Sharing Information: Except for Article 1.1.4 of this Privacy Policy, we will not share your personal information with any third party. But if it is necessary to provide your personal information with your explicit consent or in accordance with national laws and regulations, we will strictly provide your personal information in accordance with the laws and regulations.
4.2 Transfer Information: We will not transfer your personal information to any third party. As our business continues to develop, we may engage in mergers, acquisitions, asset transfers, and your personal information may be transferred as a result. When the aforementioned changes occur, we will continue to protect or require the recipient of personal information to continue protecting your personal information in accordance with laws and regulations and security standards not lower than those required by this privacy policy. Otherwise, we will require the recipient to obtain your authorization and consent again.
4.3 Public Disclosure of Personal Information: Except for the announcement of punishment for illegal accounts and fraudulent behavior, we will disclose necessary information about the relevant accounts. We will not publicly disclose your information unless we comply with national laws and regulations or obtain your voluntary consent. We will adopt security measures that comply with industry standards when publicly disclosing your personal information.
How do we protect personal information security
5.1 We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information, prevent the personal information you provide from being improperly used or accessed, publicly disclosed, used, modified, damaged, lost or leaked without authorization.
5.2 We will use reasonable and feasible means such as encryption technology and anonymization processing that are not inferior to the industry to protect your personal information, and use security protection mechanisms to prevent malicious attacks on your personal information.
5.3 We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt strict data usage and access policies to ensure that only authorized personnel can access your personal information, and conduct timely security audits of data and technology.
5.4 Although the above reasonable and effective measures have been taken and the standards required by the relevant laws and regulations have been complied with, please understand that in the Internet industry, even if we try our best to strengthen the security measures, we cannot always guarantee the security of information 100% due to technical restrictions and possible malicious means. We will try our best to ensure the security of the personal information you provide us. You are aware and understand that the system and communication network you use to access our services may encounter problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing personal information such as your account password to others.
6 Your Rights
6.1 You have the right to request to view, query, correct, modify, delete your personal information, cancel your account, and revoke the authorization you have agreed to. If you have the aforementioned requirements, you can contact us at any time.
6.2 When you request correction of personal information errors, we will not use or provide that personal information until the correction is completed. If incorrect personal information has been lawfully provided to a third party, we will immediately notify the third party of the information that needs to be corrected to ensure that the information can be corrected.
7 Minors Clause
7.1 If you are a minor under the age of 18, before using the "Tess CAM" software and related services, you should jointly read and agree to this privacy policy under the supervision and guidance of your parents or other guardians.
7.2 We protect the personal information of minors in accordance with relevant national laws and regulations. We will only collect, use, share or disclose the personal information of minors when permitted by law, with the explicit consent of parents or other guardians, or when necessary to protect minors; If we find that personal information of minors has been collected without the prior consent of verifiable parents (or other guardians), we will try to delete the relevant information as soon as possible.
7.3 Considering that we are unable to distinguish the age of online visitors, if a minor under the age of 18 provides personal information to us without the consent of their parents or guardians, please contact us through the contact information disclosed in this privacy policy.
Revision and Notification of Privacy Policy
8.1 We may periodically modify or update this privacy policy based on business adjustments, changes in laws, regulations, or policies. Please refer to the prompts regularly. We will remind you of the updated content in an appropriate manner before the change takes effect, so that you can stay informed of the latest version of this privacy policy in a timely manner. If you continue to use our services, you agree to accept the revised content of this privacy policy. However, if the updated content requires the collection of personal sensitive information such as audio and video, contact information, geographic location, etc., we will still seek your consent again in a prominent manner.
8.2 For significant changes, we will also provide more significant notifications (including but not limited to emails, text messages, private messages, or special reminders on browsing pages to explain the specific changes in privacy policies).
9 Others
9.1 The headings in this Privacy Policy are for convenience and reading only, and do not affect the meaning or interpretation of any provisions in this Privacy Policy.
This privacy policy was updated on August 1, 2024