Technical support

Update date: March 16, 2022

Effective date: March 16, 2022

Application profile

Welcome to use us! Life is mediocre, because there are too many can not reach the distance. The world is so big, all want to see. We take you to see the world through God's eyes. Swipe with two fingers and click the position to view 3D street view. Explore every corner of the world without leaving home. Savor the taste of home and enjoy the beauty of the world.

The body of the

We are street View map and global scenic spot explanation software developed and operated by our company (hereinafter referred to as "us"). We will help you understand our collection, use, storage and sharing of personal information and your relevant rights through our Privacy Protection Guidelines.

· In order to provide map, navigation and other services to you, we need to collect the information you voluntarily provide or generate by using the services, and we will explain to you the types and corresponding uses of the above information;

· You can access, correct, delete your personal information and manage your authorization on relevant pages;

· We will use industry-leading security technology to protect your personal information.

You can read the complete version of Privacy Protection to learn more detailed personal information processing rules, such as the relationship between the types and uses of personal information.

If you agree, please click "Agree" to accept our services.

1. The information we collect

During your use of our services, we will collect the information you voluntarily provide or generate due to your use of the Services in the following ways to provide services to you, optimize our services and protect the security of your account.

1.1 When you use our following functions, we require you to provide some information voluntarily:

1.1.1 When you use the voice explanation in the scenic spot, we need to obtain your location permission to confirm whether you are in the scenic spot, so as to provide follow-up voice explanation service.

1.1.2 When you find errors in our location information and help us correct them, you need to provide actual photos of relevant locations for us to verify the error correction information; In addition, you also need to provide your mobile phone number, so that we can contact you to learn the details of the error according to the actual needs of correction. Your mobile phone number is sensitive personal information. If you refuse to provide it, the correction will not be completed, but it will not affect your use of other services provided by us

1.1.3 When you give feedback or report an event, you need to provide relevant photos so that we can verify and process your comments or reported event as soon as possible.

1.2 When you use our services, we will collect your precise and rough geo-location information so that we can help you locate your position on the map and provide you with navigation services. The above geo-location information is sensitive personal information. If you refuse to provide it, you will not be able to use our services.

1.3 To ensure your normal use of our services, maintain the normal operation of our services, and improve and optimize your service experience, we will collect your device model, system version, network type, unique device IDENTIFIER, APP crash records, traffic statistics, and operation logs.

1.4 We access your microphone to provide you with voice services. We call "Dingdang Dingdang" to wake up the intelligent voice assistant for voice interaction; We will send your voice commands to the server for recording, parsing, command recognition, and feedback. You can enable or disable this permission through the phone system's permission Settings - microphone.

In addition, according to relevant laws and regulations and national standards, we may collect and use your personal information without asking for your authorization and consent in the following situations:

1. Those directly related to national interests such as national security and national defense security; Those directly related to major public interests such as public security, public health and public information;

(2) those directly related to criminal investigation, prosecution, trial and execution of judgment;

3. For the protection of your or other personal life, property, reputation and other important legal rights and interests, but it is difficult to obtain the consent of the oneself;

4. The collected personal information is disclosed to the public by you;

5. Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;

6. Necessary for signing and performing the contract as required by you;

7. Necessary to maintain the safe and stable operation of the provided products or services, such as finding and disposing of faults of the products or services;

8. Necessary for carrying out legitimate news reporting;

9. When it is necessary to carry out statistical or academic research for the public interest, and it provides the results of academic research or description to the outside world, it de-labels the personal information contained in the results;

10. Other circumstances stipulated by laws and regulations. Please understand, we provide you with the functions and services are constantly updated and development of the, if a certain function or service is not in the foregoing statement and collected your information, we will have a page hint, interactive process, website announcement to explain to you the content of the information collection, the scope and purpose, with the consent of you.

Please note that we do not actively obtain your personal information from third parties outside our company at this time. As for business development in the future from a third party of indirect access to your personal information, we will be told to you before to get personal information source, type and scope of use, such as we do business need to personal information processing activities beyond your original to provide personal information to a third party agreed scope of authorization, we will deal with you in the personal information such as your authorization consent before; In addition, we will strictly abide by the relevant laws and regulations and require third parties to safeguard the legality of the information they provide.

Second, information storage

2.1 Method and duration of information storage

We will store your information in a secure way, including local storage (e.g. data caching with APP), database and server logs.

In general, we will only store your personal information as long as it is necessary for the purpose of our services or under the conditions prescribed by laws and regulations. You can choose to delete home address, company location, collection location, taxi order, driving track, cycling track, walking track, traffic statistics and other information generated by using the service. If you choose to delete the above information, we will also delete the corresponding personal information.

Note: We do not have an independent account, you can use the associated account wechat or QQ to log in to us. If you need to cancel your wechat or QQ account, please do so on wechat or QQ according to their guidelines. You can also access, modify and delete other personal information you provide by contacting us at guest_befunz@163.com while using our services. The extent and manner in which you access, modify and delete personal information will depend on the specific service you use.

2.2 Information Storage Area

We will store users' personal information collected in China in accordance with laws and regulations.

We do not currently transfer or store your personal information across borders. If cross-border transmission or storage is required in the future, we will inform you of the purpose, receiver, security guarantee measures and security risks of the information leaving the country, and obtain your consent.

2.3 Notice of cessation of operation of products or Services

When our products or services cease operation, we will notify you in the form of push notification, announcement and other forms, and delete or anonymize your personal information within a reasonable period of time, except as otherwise stipulated by laws and regulations.

Third, information security

3.1 Safety protection measures

We strive to ensure the security of users' information to prevent information disclosure, loss, improper use, unauthorized access and disclosure.

We use multi-dimensional security protection measures to ensure that users' personal information protection is at a reasonable level of security, including technical protection means, management system control, security system guarantee and many other aspects.

We use industry leading technology protection measures. The technologies we use include but are not limited to firewalls, encryption (such as SSL), de-identification or anonymization, access control measures, etc. In addition, we will continuously enhance the security capabilities of the software installed on your device. For example, we will encrypt some information locally on your device to consolidate secure transmission. We will learn about the installed applications and running processes on your device to prevent viruses, Trojans and other malicious programs.

We have established special management systems, processes and organizations to ensure the security of personal information. For example, we strictly limit who can access information and require them to abide by confidentiality obligations and conduct audits, and those who violate these obligations will be punished according to regulations. We will also review the management systems, processes and organizations to prevent unauthorized access, use or disclosure of user information.

We suggest that you pay full attention to the protection of personal information when using products and services. We will also provide a variety of security features to help you protect your personal information.

3.2 Security incident handling measures In the event of personal information leakage, damage, loss and other security incidents, we will initiate emergency plans to prevent further security incidents. After a security incident occurs, we will inform you of the basic situation of the security incident, the disposal and remedial measures we will take or have taken, as well as our suggestions to you in the form of push notification or email. If it is difficult to inform one by one, we will issue warnings through announcements and other means.

How do we use information

We strictly abide by the provisions of laws and regulations and our agreements with users, and use the information collected in accordance with the privacy Protection guidelines to provide you with better services.

4.1 Information Usage Rules

We will provide you with real-time car navigation and travel service information on the map home page according to different time and your current geographical location.

We will provide you with estimated commuting time, route planning and road condition information based on the different geographical information you input voluntarily. If you do not set a specific geographical location, we will not provide the service to you voluntarily.

We will record the travel services you have used on the map, and provide you with the shortcut entrance of the recently used services on the toolbar page of the map home page, so that you can quickly find and use them. We will strictly protect your personal information and will not provide the travel service records you have used to the third party. If the third party needs to use it, we will ask for your consent by means of active reminder. If you do not agree, we will not provide it. Data sharing and disclosure In order to provide you with one-click sharing service, our product integrates AppsFlyer and will collect your device identification information (such as IMEI/ Android ID/IDFA, etc.) and the public information of your social accounts that you need to share, so as to complete one-click sharing service. In order to protect your information, we have made data security confidentiality agreements with third-party SDK service providers, and these companies will strictly abide by our data privacy and security requirements. We will not share your personally identifiable information with us unless we have your consent.

We will use the information we collect for the purposes covered by these Privacy Guidelines. If we use your Personal Information in ways that are directly or reasonably related to the purpose claimed at the time of collection, we will again notify you and obtain your express consent before using your personal Information.

5. External supply

At present, we will not take the initiative to share or transfer your personal Information to a third party. If there is any other sharing or transfer of your personal information or you need us to share or transfer your personal information to a third party, we will directly or confirm that the third party obtains your express consent to the above behavior.

We will not publicly disclose the personal information we have collected. If necessary, we will inform you of the purpose of public disclosure, the type of information disclosed and the sensitive information that may be involved, and obtain your express consent.

With the continuous development of our business, we may conduct mergers, acquisitions, asset transfers and other transactions. We will inform you of the relevant circumstances and continue to protect or require new controllers to continue to protect your personal information in accordance with laws and regulations and standards no less than those required by these Privacy Guidelines.

In addition, in accordance with relevant laws and regulations and national standards, we may share, transfer or publicly disclose personal information without obtaining your prior authorization in the following situations:

1. Those directly related to national security and national defense security;

2. those directly related to public security, public health or major public interests;

3. those directly related to criminal investigation, prosecution, trial and execution of judgment;

4. For the purpose of safeguarding the life, property and other important legal rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the consent of the subject;

5. The subject of personal information discloses personal information to the public by himself;

6. Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.

Your rights

During your use of us, in order to make it more convenient for you to query, access, delete and correct your personal information, and protect your right to withdraw your consent to use personal information and cancel your account, we provide you with corresponding operation Settings in the product design. You can refer to the following guidelines for operation. In addition, we also set up a complaint reporting channel, your comments will be timely handled.

6.1 Accessing Personal Information

· Access basic information such as mobile phone number, address book and internal storage of mobile phone:

1) After entering us, click "Personal Center" on the bottom right;

2) Information query and access.

· Access basic information such as mobile phone number, address book and internal storage of mobile phone:

1) After entering us, click "Personal Center" on the left of the search box;

2) Information query and access.

· Search history

1) After entering us, click the search box or route button;

2) Display the user's search history in the search page.

3) Information query and access.

· My position

1) After entering us, click "My Location" in the 3D map to jump to the street view and display the street view of the user's current position.

6.2 Deleting Personal Information

· Delete search history

1) After entering us, click the search box to search for scenic spots or destinations;

2) Display the user's search history on the search page;

3) Click Delete history record to delete the record.

6.3 Withdrawal of Consent

· Withdrawal of phone information, location information, file storage and access, microphone authorization consent:

6.4 Logging Out

· Log out of the associated account

1) After entering us, click "Personal Center";

2) Click "Settings";

3) Click "Log Out".

6.5 Feedback and event reporting

· Feedback

1) After entering us, click "Personal Center";

2) Click "Feedback";

3) Input the content to be fed back and the contact phone number;

4) Click "Submit" for feedback after confirmation.

· Event reporting

1) After entering us, click "Report button";

2) Select the reporting type;

3) Add the report content and click "Submit" to report.

Seven, change

We may amend these Privacy Guidelines in due course. When the terms of the Privacy Guidelines are changed, we will inform you of the changed privacy Guidelines in an appropriate manner during the version update and explain the effective date. Please read the updated Privacy Protection Guidelines carefully. If you continue to use us, you agree that we will process your personal information in accordance with the updated privacy Protection Guidelines.

8. Protection of minors

We take the protection of minors' personal information very seriously. We will require minors under the age of 14 to obtain authorization from their guardians (such as their parents) before using our services or providing personal information to us according to relevant laws and regulations. Minors who have reached the age of 14 but not the age of 18 May obtain prior authorized consent from their guardians or self-authorized consent.

We use, provide or publicly disclose such information only as permitted by laws and regulations and expressly agreed by the guardian of the minor or when it is necessary to protect the minor.

If you are the guardian of a minor, please pay attention to whether the minor under your guardianship uses our services after obtaining your authorized consent. If you have questions about the personal information of a minor in your custody, please contact us through the contact information in Section 10.

Nine, other

Our Privacy Policy is a general privacy policy that we uniformly apply, and the user rights and information security measures stipulated in it are applicable to our users. In the event of any inconsistency or contradiction between our Privacy Policy and these Privacy Guidelines, these Privacy Guidelines shall prevail.

10. Contact us

When you have additional complaints, suggestions, questions related to minors' personal information, or need to delete all access records, please contact us at guest_befunz@163.com.

We will review the issue as soon as possible and reply to you within 15 days of verifying your user identity.