INCS Privacy Policy
Update date: August 17, 2023
Effective date: August 17, 2023
Welcome to use our products and services! We understand the importance of personal information to you. To help you understand how we collect, process, and protect your personal information and how you can manage your personal information, we have formulated this ‘INCS Privacy Policy’ (‘this policy’). Before using our products and services, please be sure to read this policy carefully, especially the terms marked in bold/bold underline, and ensure that you fully understand and agree before you start using it. If you have any questions, comments, or suggestions about this policy, you can contact us.
Your agreement to the privacy policy indicates that you have understood the basic functions provided by the application, as well as the necessary personal information required for the operation of the basic functions, and have given the corresponding collection and use authorization, but it does not mean that you have separately agreed to enable third-party applications and process unnecessary personal information. For enabling third-party applications, processing unnecessary personal information, and processing sensitive personal information, we will seek your consent separately based on your actual usage situation.
一、Scope of Application
This policy applies to all products and services provided to you through our INCS SaaS (Software as a Service) platform service and new forms that appear with technological development.
This policy does not apply to products or services provided to you by third parties. Such products or services apply the personal information processing rules separately explained to you by the service provider.
二、Information collection and use
When you use our products or services, your personal information that we need or may need to collect and process includes the following two types:
1.In order to provide you with the basic functions of our products or services, you must authorize us to collect and use the necessary information. If you refuse, you will not be able to use our products or services normally.
2.In order to provide you with third-party applications of our products or services, you can choose to individually agree or disagree with the information we collect and use. If you refuse, you will not be able to use the relevant third-party applications normally or achieve the functional effects we expect, but it will not affect your use of our basic functions.
We would like to remind you here: due to the wide variety of products and services we currently and will provide you in the future, and the specific range of products and services that different users choose to use, there are differences in the basic functions or third-party applications and their corresponding collection and use. The type and scope of personal information will vary, please refer to the specific product or service function.
The specific functional scenarios we provide you include:
1)Help you become our user and account management
Register as an INCS enterprise organization user.
(1) Basic enterprise organization services
In order to register as an INCS enterprise organization user, you need to provide your company or organization name to create an INCS enterprise organization account, otherwise you will not be able to use INCS services based on enterprise organization management behaviors.
(2) Additional enterprise organization services
Complete information: After registering as an INCS enterprise organization user, you can further provide information such as the location of the enterprise or organization and the type of industry.
Organization certification: If enterprise organization users want to obtain more rights or services, the administrator can submit specific information and materials (including business license, enterprise organization name, address, etc.) to apply for certification and become an INCS certified enterprise organization user.
2)Provide you with online customer service
1、 Instant messaging
When you use INCS for instant messaging, we need to record your chat information to enable information transmission and interaction, and synchronize it to all your logged-in devices.
If you need to send photos or files, you need to authorize INCS to obtain the photo album or file storage permissions of your device.
If you need to share your location, INCS needs to obtain your location information in order to send and display it to the other party. We will obtain the location sensor in your device to assist in determining your location.
2、Message notification
When you use INCS services, we may send you one or more types of messages, such as service notifications, verification codes, etc., through phone calls, text messages, push messages, pop-up windows, etc. When a message involves a third-party application, the relevant message notifications will change based on your settings for the third-party application involved.
3)Help enterprise organizations conduct online office work and entrust the processing of enterprise organization control data
Data control rights
All data generated when you log in and use the enterprise account assigned to you by the enterprise organization for office use is data controlled by the enterprise organization. You fully understand the commercial office attributes of the enterprise account and avoid autonomous operations and use of the enterprise account to upload, enter, publish, transmit or share personal information or privacy. Otherwise, you may not deny the enterprise organization's data on the enterprise account due to such autonomous operations. Control rights.
You understand and agree that enterprise organization users are the managers of enterprise-controlled data, and we only process enterprise organization-controlled data according to the instructions of the enterprise organization user administrator. Before enterprise users upload information including INCS enterprise organization information and require end users to submit intelligent personnel information and external business contact information, they should ensure that only the end user information necessary to achieve enterprise operation and management purposes is collected, and end users have been fully informed of the relevant data collection. The purpose, scope and use method and obtain the authorization and consent of the end user.
As an end user, you understand and agree that enterprise organizational users have the right to process your information based on the necessity to enter into and perform the contract to which you are a party, or to implement human resources management based on the rules and regulations formulated in accordance with the law and the collective contract signed in accordance with the law. Personal information includes entrusting INCS to process your personal information based on reasonable necessity within the purpose and scope of the administrator's activation, management and use of INCS services, and the realization of online office and communication.
4)Customer service and dispute resolution
When you contact our customer service for help, in order to protect the security of your account and system, you need to provide necessary information to verify your user identity.
In order to contact you, help you solve problems, or record the solutions and results of related problems, we will save your communication records and related content with us (including account information, work order information, and other information you provide to prove relevant facts, or the contact information you left).
In order to reasonably need to provide services and improve service quality, we may also use your other information, including the relevant information you provide when you contact customer service, and the questionnaire response information you send to us when you participate in the questionnaire.
5) Provide you with information public release function
Your company's brand, profile, website and other information will be displayed during the conversation. Some information is collected and displayed by INCS, and some information is collected and displayed at the request of third-party service providers. In the future, corresponding information may be displayed in accordance with relevant laws and regulations
6)Provide you with security
In the process of providing INCS services, we may involve the use of third-party protection software and services, as well as the collection of logs and device information. This information will be used by INCS for analysis, auditing, protection and disposal operations to ensure that the availability, integrity and data security of INCS services are not affected.
7)Third-party applications for you to access
1、Third-party applications
The use of INCS will involve third-party platforms, software, and services. You need to obtain corresponding authorization to enable INCS to use such applications to provide you with services. If you do not agree to the authorization, it will not affect your use of INCS's basic services, but you will not be able to use these additional services. When you enable any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. If you close any permission, you have canceled the authorization. We will no longer continue to collect and use relevant personal information based on this permission, and we will no longer be able to provide services corresponding to this permission. Closing permissions will not affect the collection and use of information based on your authorization before permissions were closed, but it may affect the subsequent performance of INCS services.
You can check the relevant authorization status through the INCS management background.
2、Cookies and similar technology services
Cookies and other similar technologies are commonly used on the Internet. When you use our services, we may use related technologies to send one or more cookies or anonymous identifiers (hereinafter referred to as "Cookies") to your device to collect, identify and store your information when you access and use this product. information. We promise not to use Cookies for any other purpose than those stated in this Privacy Policy. We use cookies mainly to ensure the safe and efficient operation of our products and services, so that we can confirm the security status of your account and transactions, troubleshoot abnormal situations related to crashes and delays, and help you avoid repeating the steps of filling out forms and entering search content. process.
At the same time, we may use cookies to show you information or features that may be of interest to you. Most browsers provide users with the function of clearing browser cache data. You can perform corresponding data clearing operations or reject our cookies. You may not be able to use services or corresponding functions that rely on cookies due to these modifications.
8)Additional rules for the collection and use of personal information
1、If the information you provide contains other people's personal information, you need to ensure that you have obtained legal authorization before providing such personal information to INCS.
2、Under the premise of being processed by security encryption technology, we will use the collected data for machine learning and algorithm model training to better provide you with services.
三、Partners involved in data use and transfer and disclosure of personal information
(一)Partners involved in data use
1、Basic principles
When we cooperate with our partners, we will adhere to the following principles:
(1) Principle of legality, legitimacy and minimum necessity: Data processing should have a legal basis, have a legitimate purpose, and be limited to the minimum scope to achieve the purpose of processing.
(2) The principle of maximizing the user’s right to know and decide: During the data processing process, the user’s right to know and decide on the processing of their personal information is fully respected.
(3) The principle of maximizing security assurance capabilities: We will take necessary measures to ensure the security of the personal information we process, carefully evaluate the purpose of the partner's use of data, conduct a comprehensive assessment of the partner's security assurance capabilities, and require them to comply with the terms of the cooperation agreement. relevant requirements.
2、 Scope of partners
If specific functions and scenarios involve services provided by our affiliates or third parties, the scope of partners includes our affiliates and third parties.
3、 Entrusted processing
We may entrust our partners to process your personal information so that they can provide you with certain services or perform functions on our behalf. We will only entrust them to process your information for the legal, legitimate, necessary, specific and clear purposes stated in this policy. Authorized partners can only have access to the information they need to perform their duties, and we will require them through agreements not to Use this information for any purpose beyond the scope of the commission. If our authorized partners use your information for purposes not entrusted by us, they will obtain your consent separately.
4. Joint processing
For scenarios where we jointly process personal information, we will sign relevant agreements with our partners in accordance with legal provisions and stipulate their respective rights and obligations to ensure that we comply with relevant legal provisions and protect data security in the process of using relevant personal information.
5、Cooperation scene
1) To realize business functions
Provide contextual information in the customer service workbench to facilitate the work of your business's customers.
2)Security and statistical analysis
A. Ensure safe use: In order to protect the legitimate rights and interests of INCS users from illegal infringement, our partners may use necessary equipment, accounts and log information.
B. Analyze product situation: In order to analyze the stability of INCS products or services, partners providing analysis services may need information such as service status, device identification information, and overall application installation and usage.
C. Academic research: In order to improve scientific research capabilities in related fields and promote technological development, we may use de-identified or anonymized data on the premise of ensuring data security and legitimate purposes.
3) Other cooperation scenarios
In addition to the above cooperation scenarios, we may also entrust information to other partners that support our business, such as entrusting us to provide technical infrastructure services.
2)Transfer
If we need to transfer personal information due to merger, division, dissolution, or declaration of bankruptcy, we will inform you of the name and contact information of the recipient. The receiving party will continue to comply with this Policy and other legal obligations. If the receiving party changes the original purpose and method of processing, the receiving party shall obtain your consent again.
3)Public disclosure
We will only publicly disclose your personal information under the following circumstances:
1. We may publicly disclose your personal information if you actively choose or obtain your separate consent in other ways.
2. If we determine that you have violated laws and regulations or relevant INCS agreements and rules, or to protect the personal and property safety of others from infringement, we may disclose your personal information, including related violations and the measures that INCS has taken against you.
4)Cease operations
If we stop operating a product or service, we will promptly stop collecting your personal information, send you a notice of cessation of operation in the form of a one-by-one notice or announcement, and monitor the information we hold related to the closed product or service. The personal information is deleted or anonymized.
5)Situations exempt from obtaining your authorization and consent according to law
According to laws and regulations, in the following circumstances, partners do not need to obtain your authorization and consent when using or us transferring or disclosing your personal information:
1. Necessary to conclude or perform a contract according to your requirements.
2. Necessary to perform legal duties or obligations (for example, we may share your personal information in accordance with laws and regulations, as necessary for litigation and other dispute resolution, or as required by administrative and judicial authorities in accordance with the law).
3. Necessary to protect the life, health and property safety of others in response to public health emergencies or emergencies.
4. Implement news reporting, public opinion supervision and other activities for the public interest, and process personal information within a reasonable scope.
5. Process the personal information you disclose yourself or other personal information that has been legally disclosed within a reasonable scope (such as personal information legally disclosed through legal news reports, government information disclosure and other channels).
6. Other situations stipulated by laws and regulations.
四、Your rights
1)Review, correction and addition
You can query and correct enterprise organization control information through the INCS management background, including organizational structure information, modify login passwords, change the main administrator, and other operations. You can also choose to enable or disable INCS basic application services.
2)Copy
You can copy or export your personal information through the INCS management system.
3)Delete
You can contact us to delete some of your information or apply to cancel your account to delete all of your information.
In the following situations, you can contact customer service to request us to delete personal information:
1. If our processing of personal information violates laws and regulations;
2. If we collect and use your personal information without your explicit consent;
3. If our handling of personal information seriously violates the agreement with you;
4. If our processing purpose has been achieved, cannot be achieved, or is no longer necessary to achieve the processing purpose;
5. If we stop providing products or services, or the storage period has expired.
If we decide to respond to your deletion request, we will also try our best to notify the subjects who obtained your personal information from us and require them to delete it in a timely manner (unless otherwise provided by laws and regulations or these subjects have independently obtained your authorization).
After you delete your personal information, we may not be able to immediately delete the information from the backup system due to legal regulations or security technical restrictions. We will securely store your personal information and restrict its further processing until the backup can be cleared, or anonymized.
4)Change authorization scope
You can withdraw your authorization or change the scope of your authorization for us to collect and process your personal information in the following ways:
You can log in to the INCS management system and choose to activate or deactivate INCS services or third-party applications.
For authorizations that you cannot set directly through the above methods, you can get an explanation by contacting customer service. However, we may not be able to respond to some types of personal information, such as information necessary to realize the basic functions of INCS or information necessary for us to perform our legal obligations. When you withdraw your authorization, we will no longer process the corresponding personal information, but the withdrawal of authorization will not affect our previous processing of personal information based on your authorization.
5)Cancel account
You can apply to cancel your account through the following methods:
You can contact our staff directly, and our staff will help you cancel your account in the background. Once the account is canceled, no information will be retained.
6)Respond to your request
For the above requests you make to us, you can contact us through customer service or file a complaint with our dedicated personal information protection department, and we will respond within 15 days.
To ensure the security of your account and personal information, when you make the above request to us, we will first verify your identity (such as adding account verification, requiring you to provide a written request, or other reasonable methods) before processing your request.
In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge fees at our discretion. For information that is not directly related to you, information that is applied repeatedly without reasonable reasons, or that requires excessive technical means (such as the need to develop a new system or fundamentally change current practices), poses risks to the legitimate rights and interests of others, or is impractical We may deny your request.
五、Storage of information
1)Storage period
We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless there are mandatory retention requirements by law.
We determine the storage period of personal information mainly based on the following standards:
1. Complete the transaction purposes related to you, maintain corresponding transaction and business records, and respond to your possible inquiries or complaints;
2. Ensure the safety and quality of the services we provide you;
3. Do you agree to a longer retention period;
4. According to the relevant needs of the statute of limitations;
5. Whether there are other special agreements or legal and regulatory provisions regarding the retention period.
After the retention period has expired, we will delete or anonymize your personal information as required by applicable law.
2)Storage security
1、 Data protection technical measures
We have adopted reasonable and feasible security measures that comply with industry standards to protect your information and prevent personal information from unauthorized access, public disclosure, use, modification, damage or loss. For example: we will use encryption technology to improve the security of personal information, and the data exchanged between your browser and the server will be protected by SSL protocol encryption. We provide secure browsing via HTTPS protocol. We use trusted protection mechanisms to protect personal information from malicious attacks. We will deploy access control mechanisms to try our best to ensure that only authorized personnel can access personal information.
2. Organizational measures for data protection management
We have established a reliable data security management system to improve the security of personal information from organizational and technical dimensions. We have set up a dedicated department for personal information protection to continuously enhance employees' awareness of the importance of protecting personal information.
3、Response to personal information security incidents
If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will promptly activate an emergency plan to minimize the impact on you. personal impact. If a personal information security incident occurs, we will also, in accordance with the requirements of laws and regulations, inform you of the basic situation and possible impact of the security incident, the handling measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and suggestions for you. remedies. We will inform you through text messages, phone calls and other reasonable channels. If it is difficult to inform you one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
4、Prevention of account security risks
When using INCS to communicate and collaborate, please protect your personal information properly and only provide it to others when necessary to avoid information theft or even telecommunications network fraud.
If you are worried that your personal information, especially your account or password, has been leaked, please contact our customer service immediately so that we can provide guidance and take appropriate measures based on your situation.
六、Policy updates
In order to bring you a better product and service experience, we continue to work hard to improve our products, services and technology. When services and business processes change, we may update our privacy policy to inform you of the specific changes. However, we will not limit your rights under this policy without your explicit consent.
For major changes, we will also provide more prominent notifications (including text messages, phone calls, emails, pop-up reminders, etc.).
Significant changes referred to in this policy include:
1. The product’s business model has undergone major changes. Such as the purpose of processing personal information, types of personal information processed, and how personal information is used;
2. Changes in the subject of the privacy policy caused by business adjustments, transactions and mergers, and the new subject changes the original processing purpose and method;
3. The main objects of personal information sharing or public disclosure change;
4. Significant changes in users’ personal information rights and their exercise methods;
5. When the contact information and complaint channels of the person responsible for handling personal information protection change;
6. When the personal information protection impact assessment report shows that the existence of the product has a significant impact on personal rights and interests.