Privacy Policy

Product Privacy Policy

 

Last Updated:

 

Welcome to use this product!

 

This product is a software system that serves enterprise customers and is operated by enterprise customers and their personnel through their exclusive accounts.

 

In order to protect your relevant rights, this Product Privacy Policy (hereinafter referred to as the "Policy") will explain to you how we collect, use and store your information when you use the products provided by us and what rights you have. Please read, understand and agree to this policy carefully before using this product.

 

"User" or "you" in this policy refers to the legal person, unincorporated organization or natural person who registers, logs in, and uses the products and related services provided by us, and the authorized representative in this policy refers to the individual who is authorized by you to handle matters related to product registration, opening, and background system rights management on your behalf, or who is authorized by you to use the products.

 

Please be sure to carefully read and fully understand the entire contents of this policy. In order to enable you to fully understand this policy, the terms in this Policy that exist or may have a significant relationship with your rights and interests, especially the terms that reduce our obligations or limit your rights, will be highlighted in bold form.

 

This policy will help you understand the following:

 

I. What types of information do we collect from you

 

II. How do we store your information

 

III. How do we protect your information

 

IV. How do we use your information

 

V. How do we share your information

 

VI. How do you access and manage your information

 

VII. How do we handle minors' information

 

VIII. How do we use cookies and similar technologies

 

IX. Changes to this Policy

 

X. How to contact us

 

XI. Device permission usage list

 

I. What types of information do we collect from you

 

In order to provide you with services, ensure the normal operation of the services, improve and optimize our services, and protect the security of the account, we will collect the information that you proactively provide, authorize to provide, or generate due to the use of the services in the following ways:

 

1.1 Account Registration Information: When your authorized representative registers you as our user and logs in to our products for the first time, you need to provide your company name, company size, industry, and your authorized representative's mobile phone number, email address, second-level domain name, custom login password and other registration information.

 

1.2 Before you use our products, we need you to submit the name, mobile phone number and email address of your authorized representative. business license required for specific functions, identity certificate of legal representative, identity certificate of the handler, photo of the handler holding ID card, outbound call template, details of the source of your customer list, and new information required to adjust according to the regulations and policies of the specific functions you use, etc., The above information is necessary for you before use our services, If you do not provide such information, you will not be able to use our services normally.

 

1.3 Log information: When you use our services, we will collect log information about your use of the services, including the mode, type and status of access to the network, network quality data, and operation logs (such as the operation logs of the system permission granted to our products to access the microphone and camera when you use the voice call or video call function; When you use the schedule function, the operation logs of the system permission granted to our products to access the schedule), service log information (such as the website information you view in our products, service fault information, etc.,) etc.,

 

1.4 Information you submit through our customer service or when you participate in events organized by us. For example, the questionnaires you fill out when participating in our online activities may contain information such as your name and telephone number.

 

1.5 When you use the voice call or video call function, we will provide you with voice call or video call services after you agree to grant system rights to the microphone or/and camera. The above permissions are necessary to use the relevant function. Denying the permissions will prevent you from using the voice or video call function.

 

1.6 Information provided by third parties: We collect relevant data that you consent or authorize third parties to share or provide to our products, such as when you use third party products or services through our websites or terminals, third party service providers can tell us which third party products or services you use. In particular, third-party service providers can provide you with products or services through our pages or terminals, and you can choose whether to develop or use third-party services, which third-party services you can choose to use, and when to terminate or cancel the use of third-party services. In the course of use, third party service providers may collect, use and store your relevant data or information. Before you decide whether to use such services, you should fully understand the personal information and privacy protection policies of the third party service providers.

 

1.7 The data and information you generate, store, upload and download during our service belong to your business data. Including but not limited to call recordings, call records, voice transcriptions, chat records and other data; Your customer information: including but not limited to your customer's personal name, telephone number, email and other instant messaging information, sensitive personal information (ID number, bank account number, etc.,). You entrust us to store your business data in our cloud server, and ensure that you collect your customers' information and entrust us to store the behavior has been fully, legally and effectively authorized by your customers by legal and effective means, and have fully informed your customers about the purpose, scope and use of relevant data collection.

 

You are the controller and processor of your business data, and we will not access, use and process your business data except in the manner disclosed in this policy or in the manner agreed between us or as required by national authorities. You shall be responsible for the authenticity, legality and security of the data and information that you control and process. If your business data and information are leaked due to improper operation or improper management of employee rights by you or your authorized personnel, you shall assume full responsibility for the information leak.

 

In order to reduce and reduce illegal use of our products, you agree and authorize us to conduct quality inspection and random inspection of your data and your business data on a regular basis, and we will keep strictly confidential all your data and information that we contact during the quality inspection and random inspection.

 

Please understand that the functions and services we provide to you are constantly updated and developed, if a function or service is not mentioned in the above and needs to collect your information, we will separately explain the content, scope and purpose of information collection to you through the page s, interactive processes, website announcements, notification notices or updates to this policy, etc., in order to obtain your consent.

 

II. How do we store your information

 

2.1 We will store your information collected in Singapore in accordance with laws and regulations in Singapore. If your information storage location is transferred from Singapore to overseas, we will strictly comply with the provisions of laws and regulations.

 

2.2 We retain your information only as necessary to achieve the purpose of the service, as required by laws and regulations, and as agreed in this policy or our agreement with you. When you stop or terminate the use of our services in whole or in part, we will process your information in accordance with your agreement with us or your instructions, but if there are special requirements of laws, we will handle it in accordance with the special requirements of laws.

 

III. How do we protect your information

 

3.1 We strive to provide information security for all users to prevent loss, improper use, unauthorized access or disclosure of information.

 

3.2 We will use various security protection measures within a reasonable level of security to ensure the security of users' information. For example, we may use encryption techniques (e.g., SSL /TLS), de-identification or anonymization to protect your information.

 

3.3 We will train and assess employees' awareness of data security and their security capabilities to enhance their awareness of the importance of protecting customer information. We deploy access control mechanisms to control the rights of employees who process your business data, clarify job responsibilities and codes of conduct, and ensure that only authorized personnel have access to relevant information.

 

3.4 We strengthen the security capabilities of the software installed on your device through constantly improving technical means to prevent the leakage of your information. In the event of a security incident such as customer information disclosure, we will launch an emergency plan according to law to prevent the expansion of the security incident, and inform you of the security incident, its possible impact on you and the remedial measures we will take in the form of push notifications, announcements, etc., and report to the relevant competent authorities in accordance with regulations.

 

3.5 We will do our best to protect your information. We also ask you to understand that no security measure can be airtight. In the event of an information security incident, we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you. We will timely inform you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the information subject one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will also proactively report the disposal of information security incidents in accordance with the requirements of the regulatory authorities.

 

IV. How do we use your information

 

4.1 Provision, maintenance and development of our Services: We may use the information we collect to provide and optimize our services, for example, to track service outages or troubleshoot problems reported to us by users. After obtaining your authorization and consent, we will provide you with various statistical analysis functions and services based on logs and service usage information.

 

4.2 Security: In order to protect the security of you and all users, we will use relevant information to help improve the security and reliability of our services, including detecting, preventing and responding to fraud, abuse, illegal behavior, security risks and technical problems that may harm our Services, our users or the public.

 

4.3 Communicating with You: We may use the information we collect about you to communicate with you. For example, we return your service visits.

 

4.4 According to relevant laws and regulations and national standards, we may collect and use your information without seeking your authorization under the following circumstances:

 

4.4.1 When it is necessary to carry out statistical or academic research in the public interest, and the results of academic research or description are provided to the public, the information contained in the results will be de-identified;

4.4.2 Directly related to national security and national defense security;

4.4.3 Directly related to public safety, public health and major public interests;

4.4.4 Directly related to criminal investigation, prosecution, trial and execution of judgments;

4.4.5 The collected information is disclosed to the public by you;

4.4.6 Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and handling faults of the products or services;

4.4.7 Other acts to fulfill the provisions of laws and regulations or regulatory requirements.

 

V. How do we share your information

 

5.1 We may share your information with our affiliates or third parties unless it is necessary to obtain your express consent or to implement the functions related to your purchase of our products, as follows:

5.1.1 Share data with third parties legally authorized by the Customer to complete the technical services required by the Customer;

5.1.2 In accordance with the provisions of the law, in special circumstances involving national security, national defense security, public safety, public health, major public interests, combating crime, etc., provide data to relevant regulatory bodies, judicial organs, news media or the public.

 

5.2 When we share your information with the third parties, we will ask them to process the above information for us in accordance with our instructions, privacy policy and other relevant confidentiality and security measures, and to provide our services to you for the purposes described in the "How we Use Your Information" section. If we share your information with affiliates or third parties, we will use encryption, anonymization and other means to ensure the security of your information.

 

5.3 According to the law, the sharing of de-identified information and the guarantee that the data recipient cannot recover and re-identify or associate the information subject is not an act of information sharing and public disclosure, and the storage and processing of such data will not need to notify you separately and obtain your consent.

 

5.4 In particular, it should be noted that you decide and manage how to disclose or share your business data stored in our products. You also need to obtain the authorization required for disclosure or sharing of business data. You shall bear the liability for damages caused by unauthorized disclosure or sharing to the right holder.

 

5.5 As our business continues to develop, we may conduct mergers, acquisitions, asset transfers and other transactions, and we will inform you of the relevant circumstances, in accordance with laws and regulations and no less than the standards required by this privacy policy to continue to protect your information or require a new controller to continue to protect your information.

 

VI. How do you access and manage your information

 

6.1 If you would like to query, modify or delete some of your information, contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and we will respond to you as soon as possible. If we decide to respond to your request for deletion, we will also notify the entities that have obtained your information from us to delete it in a timely manner, unless otherwise required by law or regulation, or if these entities have been independently authorized by you. When you delete your information from our services, we may not immediately update the system to delete the corresponding information, but we will delete this information when the backup is updated.

 

6.2 We provide you with a way to cancel your account.In accordance with this policy, our agreement with you and the relevant laws and regulations of the country, you can choose to contact us through the feedback channels listed in the "How to contact Us" section of this policy, we will answer you as soon as possible. After the cancellation of your account, we will stop providing you with all or part of the services, and according to your request, delete your information or anonymize, except as otherwise provided by laws and regulations.

 

6.3 You can choose whether or not to disclose your information to us. You can change the scope of your authorization for us to continue to collect information or withdraw your authorization by deleting information, disabling device functions, canceling your account, etc.

After the authorization is withdrawn, we may not be able to continue to provide you with the services corresponding to the withdrawal of the authorization, and you may continue to use other related services provided by us.

 

VII. How do we handle minors' information

 

We attach great importance to the protection of minors' information. Our products are mainly aimed at enterprises. If you are a minor under the age of 14, please be sure to read this Privacy Policy carefully under the supervision and guidance of your parents or other guardians before using our products, and use our products or provide information with the consent of your guardians. In cases where minors' information is collected through the use of our products with the consent of the guardian, we will only use, share, transfer, or disclose this information as permitted by law and regulations, with the express consent of the guardian, or as necessary to protect the minor. When you agree to process your information and the minor's information for the purposes and in the manner described in this Policy, we will recognize and consider that you are the legal guardian of the minor and have carefully read the terms of this policy. We will protect minors' information in accordance with relevant national laws and regulations and the provisions of this policy.

 

VIII. How do we use cookies and similar technologies

 

8.1 In order to ensure the normal operation of the Website, to provide you with an easier access experience and to recommend you content that may be of interest to you, we store small data files called cookies on your computer or mobile device. Cookies typically contain an identifier, a site name, and some numbers and characters.

 

8.2 With the help of cookies, you can store your preferences and other data. The next time you visit, we will display the information you need; Or use cookies to identify your source website so that we can track the effectiveness of our advertising.

 

8.3 You can manage cookies according to your preferences, and you can also clear all cookies saved on your computer. However, if you do this, you will need to change the user Settings each time you visit our website. For more information on how to change your browser settings, visit the settings page for the browser you are using.

 

8.4 In addition to cookies, we also use other similar technologies such as website beacons and pixel tags on our website. For example, an email we send you may contain an address link to the content of our website, and if you click on the link, we will track the click to help us understand your product or service preferences so that we can proactively improve the customer service experience.

 

IX. Changes to this Policy

 

9.1 We may revise this policy. When the terms of the policy are changed, we will show you the changed policy through the official website announcement and push notification.

 

9.2 For major changes, we will inform you through announcements and push notifications on our official website. If you do not agree to such changes, you may stop using our products and services, and if you continue to use our products or services, you agree to be bound by this revised policy.

Material changes referred to in this section include, but are not limited to:

 

9.2.1 There are major changes in our service model, such as the purpose of processing information, the type of information processed, and the way in which information is used;

9.2.2 There are major changes in our ownership structure and organizational structure, such as changes in owners caused by business adjustments, bankruptcy and mergers and acquisitions;

9.2.3 The main object of information sharing, transfer or public disclosure has changed;

9.2.4 Significant changes in your rights to participate in information processing and the way in which they are exercised;

9.2.5 When the department responsible for handling information security, the contact method and the complaint channel change;

9.2.6 When the information security impact assessment report indicates a high risk.

 

X. How to contact us

If you have any questions, complaints or suggestions about this policy, you can call the customer service hotline 400-023-8882 or send an email to [support@instadesk.com] to feedback your suggestions on our products and services and problems encountered in the use of the process, we will reply within 15 working days.

 

XI. Equipment permission use list

For the purpose of the functional implementation and safe and stable operation of our MoPower H5 product, we may collect or use the following information, the specific permission is described as follows:

 

Permission Name

Permission Function Description

Application Scenario and Purpose

Applicable Platform

(Android/iOS)

Write_external_storage

Writing to external storage Provides the function to write to external storage.

This permission is requested when files such as images and attachments are stored.

Android/iOS/web

Camera

Use your phone camera

This permission is applied to you when you use the mobile camera to make video calls or take pictures.

Android/iOS/web

Media Library

Multimedia Using videos in albums.

This permission is requested from you when you use videos.

 

Android/iOS/web