

1、 Statement and commitment
(1) Please note that the terms of this agreement that have or may have a significant relationship with your rights and interests, as well as the terms that have or may have an exemption or limitation of liability to Shanghai Genyan Network Technology Co., Ltd. (hereinafter referred to as "the company"), are marked in bold italic and underlined words.
You confirm that you have fully read, understood and accepted all the contents of this agreement before you register as a user of the contract lock electronic contract cloud platform (hereinafter referred to as "contract lock" or "contract lock platform") to accept the services provided by our company, or you actually use this service in other ways allowed by our company. Once you use this service, you agree to abide by all the provisions of this agreement. In the process of reading this agreement, if you disagree with this agreement or any of its terms, you should immediately stop the registration process.
(2) You agree that our company has the right to formulate and modify this agreement or various rules from time to time as needed. In case of any change in this agreement and rules, all changes shall be subject to the latest published content of this website. If you continue to use this service after the announcement of changes in the content of this agreement, it means that you have fully read, recognized and agreed to abide by the new agreement or rules; If you do not agree with the revised agreement and rules, you should stop using the service.
(3) You agree that when you accept this agreement and register as a contract lock user, you are at least 16 years old and have full civil capacity, or you are a legal person or other organization legally established in Chinese Mainland and legally carrying out business activities or other businesses; The contents of this agreement are not excluded by the laws of your country or region. When you register as a contract lock user or do not meet the above conditions at any time thereafter, you should immediately terminate your registration or stop using this service.
(4) You agree that when you accept this agreement and register as a contract lock user, it means that you agree to use the contract lock platform as a contracting method (including but not limited to electronic contracts), that all your operations on the contract lock platform are your personal will, and that the electronic contract (or agreement) you sign on the contract lock platform and the paper contract (or agreement) have the same legal effect, It is recognized that your electronic signature on the contract lock platform and your handwritten signature have the same legal effect.
(5) You agree that if you use the contract lock service, you agree that the contract lock will transfer your personal identity information to the electronic certification service (CA) to apply for a digital certificate, and the hash value of the contract information will be transferred to the notary office, which will be used and saved by the CA for the purpose of issuing a digital certificate or for the purpose of issuing a notarial document by the notary office, The above information shall be saved at least 5 years after the expiration of the digital certificate or the expiration of the relevant electronic data (including but not limited to the electronic data of the contract), and such information will not be stopped because you terminate the contract lock service.
(6) You agree that if you use the contract lock service, you agree that the contract lock will further verify the correctness of the personal identity information you enter through the credit bureau and other data service providers with nationally recognized qualifications.
(7) You confirm and understand that according to the Electronic Signature Law, the following situations are not suitable for the use of electronic documents:
1. Involving personal relations such as marriage, adoption and inheritance;
2. Involving the suspension of public utility services such as water supply, heat supply, gas supply and power supply;
3. Other circumstances where electronic documents are not applicable as stipulated by laws and administrative regulations.
2、 Definition and interpretation
(1) Contract lock account (or "the account"): is the unique number provided to you by the platform. You can set the password for the contract lock account and use it to query or initiate the signing process on behalf of your individual or organization. You need to use your email address or mobile phone number, or other methods allowed by our company, as a login means to log in to the contract lock account.
(2) CA institution: refers to the third-party digital certificate issuing institution that has obtained the Electronic Certification Service License.
(3) Digital certificate: refers to the identity certificate data issued by a third party CA, including the name of the electronic certification service organization issuing the digital certificate, the name of the certificate holder, the certificate serial number, the certificate validity period, the electronic signature verification data of the certificate holder, the electronic signature of the electronic certification service organization, and other contents specified by the Ministry of Industry and Information Technology.
(4) Electronic signature: refers to the data contained in electronic form in the data message and attached to identify the identity of the signer and indicate that the signer approves the content.
(5) Identity information: refers to your name, contact information and the type, number and validity period of your valid ID card, which can identify you according to law.
3、 Qiyuesuo service
(1) Contract lock service (hereinafter referred to as the service): refers to the services listed in (2) of this article and other services provided by our company that you actually use.
(2) Contract lock services include (but are not limited to) the following services:
1. Electronic contracting service
Electronic signature, time stamp and other technologies are used to realize the security protection of data messages and the graphical display of signature information, clarify the identity information of all parties signing the electronic document, the process of signing behavior and the change of the document after signing, so that users can sign the document online.
2. Electronic data storage and notarization service
The company provides all electronic data certificate storage services and notarization services on the "contract lock" platform through the cooperative notary office. If users need to notarize the documents generated during the signing process, they can contact this platform to apply for issuing a notarial certificate.
4、 Qiyuesuo account
(1) Registration related
Unless otherwise specified in this agreement or related products have other rules, you must register and obtain the contract lock account provided to you by the company on this website and/or wireless client, and provide relevant information as required by the company to complete activation before using this service. You agree:
1. You should timely update your correct, up-to-date and complete identity information and relevant information (including but not limited to ID card, passport and other documents or other identity documents, contact information, email or mobile phone number as the login name of the contract lock, email and mobile phone number bound to the contract lock account, etc.) after obtaining the account. All consequences caused by your failure to update the information in time should be borne by you, The consequences include, but are not limited to, the inability to provide this service or any error in providing it, the theft of the account and the information in the account by others, or the loss to your business counterpart.
2. You should accurately provide and timely update the e-mail address, contact number and other contact information you provide so that the company can contact you in a timely and effective manner. Any loss incurred by you in the course of using this service due to the inability to contact you through the contact information provided by you shall be borne by you. You understand and agree that you have the obligation to maintain the validity of the contact information you provide. If there is any change that needs to be updated, you should operate according to the company's requirements.
3. You should update the information (including but not limited to ID card, passport and other documents or other identification documents, contact information, email or mobile phone number as the contract lock login name, email and mobile phone number bound to the contract lock account, etc.) in a timely manner. Otherwise, the contract lock has the right to open the contract lock login name, email and mobile phone number bound to the contract lock account to other users for registration or use. All the consequences caused by your failure to update the information in time shall be borne by you. The consequences include but are not limited to the failure to provide the service or any error occurred during the provision of the service, the account and the information in the account have been embezzled by others, and you shall not take this as the reason for refusing to implement the agreement.
4. You confirm that only you can use your contract to lock your account. When you decide not to use the account, you should apply to the company for cancellation of the account in accordance with the provisions of (3) of this article. You agree that if you lose all or part of your capacity for civil rights or civil conduct, the company has the right to dispose of the information in your contract lock account according to effective legal documents (including but not limited to effective court judgments, effective wills, etc.) or other relevant documents.
5. If you are an individual user, you confirm that the company has the right to request the verification of your valid ID card or other necessary documents when necessary, and you should actively cooperate, otherwise the company has the right to limit or stop providing you with part or all of the contract lock services:
A. You request to change your identity information or your identity information has expired;
B. Your signing behavior or signing situation is abnormal;
C. There are doubts about your identity information or our company believes that there are doubts about the identity information you have provided in the process of providing services to you;
(2) Account security
You will be fully responsible for all operations and statements made using this account or password. You agree that:
1. Unless there are other rules for the relevant products, our company will identify your identity through your contract lock login name and password or other operation methods. At the same time, our company will identify the instructions from various products or equipment you use through this service application. You should keep the password, identity information, various products or equipment properly The loss caused by the loss of the check code or the product or equipment shall be borne by you.
2. Based on the usage habits of users using computers, mobile phones and other electronic devices, we may set different account login modes and take different measures to identify your identity when you use specific products.
3. At the end of your login period, you should leave the website with the correct steps. If you fail to comply with the agreement, the company will not bear any responsibility for any direct or indirect losses and other adverse consequences.
4. You agree that if you find that your account has potential risks, you should apply to the company for suspension of relevant services in a timely and effective manner. When you apply for suspension of service, you irrevocably authorize our company to seal your account to avoid or reduce the loss caused to the account due to the above circumstances. You understand that our company needs a reasonable period of time to take action on your request. Before that, our company will not be responsible for your losses.
5. Unless you apply in writing, or have other legal provisions or judicial decisions, and obtain the consent of the Company, your contract lock login name and password, and contract lock account cannot be transferred, donated or inherited in any way (except for related property rights and interests).
6. You agree that based on the needs of operation and signing security, the company can temporarily stop providing or limiting some functions of the service, or provide new functions. In case of any function reduction, increase or change, as long as you still use the service, you still agree to this agreement or the changed agreement.
7. The company has the right to know the true background and purpose of your use of the company's products or services. You should truthfully provide the true, comprehensive and accurate information required by the company. If the company has reasonable reasons to suspect that you provide false information, commit fraud and other illegal acts, the company has the right to temporarily or permanently restrict some or all of the functions of the products or services you use, and notify you by email, in-site mail or client notification, and you should pay attention to it in a timely manner.
8. You agree that our company has the right to query, freeze or otherwise operate your personal information, contract signing and account in the contract lock according to the requirements of judicial, administrative and military authorities including but not limited to public security organs, procuratorial organs, courts, customs and tax authorities.
(3) Logoff related
When you need to terminate the service, you can apply for cancellation of your contract lock account, and you agree to:
1. The contract lock account you applied for cancellation should be the account that you registered in accordance with the agreement and provided to you by the company. You should cancel the contract lock account according to the procedures specified by the company.
2. The cancellation of the contract lock account will cause the company to terminate the provision of this service for you, and the rights and obligations of both parties agreed in this agreement will be terminated (except for those that cannot be terminated according to other provisions of this agreement or according to its nature), and may also have the following consequences for this account:
A. Any of your signature information cannot be viewed;
B. Any attached documents generated during your signing process cannot be viewed, and you can save them before logging off;
C. After the cancellation is completed, the company cannot provide authentication, notarization and other services for any information you have previously retained;
3. You can apply to cancel the contract lock account manually.
4. The contract lock account you apply for cancellation should be in a normal state, that is, the account information and user information of your contract lock account are up-to-date, complete and correct, and the account can use all contract lock service functions. Account information or user information that is outdated, missing, incorrect, or suspended or terminated from providing services cannot be applied for cancellation.
5. The contract lock account you applied for cancellation should not have any outstanding contractual relationship caused by the cancellation of the account and other rights and obligations generated or maintained based on the existence of the account, and the company believes that the cancellation of the account will result in disputes arising from the outstanding rights and obligations.
6. If the contract lock account you applied for cancellation is successfully cancelled, it will not be restored.
7. You understand and agree that if you commit fraud, false information, infringement of the legitimate rights and interests of others or other serious violations of the rules of the contract lock website or the laws of the People's Republic of China on the contract lock website, the company has the right to cancel all or part of the contract lock account under your name, you will no longer be able to log in to the contract lock website, and the relevant services will be terminated at the same time.
5、 Qiyuesuo service usage rules
In order to effectively protect your legitimate rights and interests when using this service, you understand and agree to accept the following rules:
(1) Once you use this service, you irrevocably authorize our company to send a signing invitation to your partner and perform corresponding operations when you and/or your designated person meet the specified conditions or status.
(2) Our company accepts instructions from you in the following ways: A. The contract status or instructions that you log in to the contract lock account with your contract lock account name and password or digital certificate and other security products on this website or other websites or software that can use this service and are modified or confirmed according to the preset process of this service; B. You reply to the information (SMS or phone, etc.) sent to our company through the mobile phone or other communication tool (hereinafter collectively referred to as the mobile phone) number that you registered as the account name or bound to the account; C. Other hardware, terminal, software, code, code, code Other account names and other physical or intangible information sent to the company (if the physical or intangible information referred to in this method has the same or similar functions as the information received by the mobile phone, the following provisions related to the mobile phone in Article 5 (3) (4) and Article 6 (3) also apply to this method); D. By identifying your fingerprint, face and other biometrics; E. Other methods agreed by the company and you or approved by the company. No matter which way you send instructions to the Company, they cannot be withdrawn or revoked, and become the only instructions of the Company to pay or receive money or carry out other operations on your behalf, which are your own instructions. You should be responsible for any result of the Company's faithful implementation of the above instructions. The binding mentioned in this agreement refers to the corresponding association between your contract lock account and the physical or intangible entities mentioned above in this article. This association enables the realization of certain service functions of the contract lock service, and sometimes this association enables these physical or intangible entities to serve as the basis for the identification and recognition of your contract lock account by the company.
(3) In the process of using the contract lock service, the content of this agreement, the information prompt on the operation page or the content sent by the contract lock to your communication tool are also the relevant rules for your use of this service. By using this service, you agree to accept the relevant rules of this service.
(4) Our company will notify you of the progress of signing the contract and prompt you to proceed with the next step by means of in-station status notification (or SMS or phone or client notification sent to the mobile phone), but we do not guarantee that you can receive or receive such notification in time, so you should log in to the contract lock platform or other platform receiving the contract lock service in time to view the notification and carry out relevant operations. The company will not be responsible for any dispute or loss caused by your failure to check or confirm in time or to submit the relevant application.
(5) Our company will not and cannot view or audit all the documents you upload. When signing the document, both parties should carefully check the information of the signing party and the content of the signed document, and sign only after the information is confirmed to be correct. When all parties sign the agreement document, it shall be deemed as the effective date of the document. The company will not bear any responsibility for all disputes and losses caused by the user's failure to accurately verify and sign the other party's information or document content.
(6) Unless otherwise specified in this agreement/website, in case of any dispute between you and the other party, you authorize our company to handle it in accordance with this agreement and the rules set forth on this website. The communication fee, document copying fee, appraisal fee, etc. paid for your dispute settlement shall be borne by you.
(7) You should improve your identity information according to the requirements of the company to finally achieve real-name identity authentication, otherwise you may be limited by some functions.
(8) Our company will manage your contract signing process and generated data in strict accordance with laws and regulations or regulatory requirements of competent authorities; Unless otherwise specified in this agreement, it shall not be used for any other purpose other than your instruction.
(9) Our company is not a legal institution, and has limited ability to identify evidence and handle disputes. For disputes arising from the contents of the agreement, you can seek solutions from relevant units that comply with the laws of the People's Republic of China.
(10) Contractual risk
1. When using the service, if you or your counterparty fails to comply with the service terms or the instructions on the website, the operating tips and rules on the signature page), the company has the right to refuse to provide relevant services for you and the counterparty, and the company will not be liable for damages.
2. Any loss caused by your fault shall be borne by you. The fault includes but is not limited to: not following the prompt, not operating in time, forgetting or disclosing the password, check code, etc., password being cracked by others, computer or other hardware, terminal, etc. used by you being invaded or lost by others, or software used by you being invaded by others, or your biometrics being used by others.
(11) Service fee
1. When you use this service, our company has the right to charge you service fees according to the service agreement agreed in advance. The company has the right to formulate and adjust the service fee. The specific service fee is subject to the announcement of the charging method listed on the website or client or product page when you use the service or other written agreements between you and the company.
2. Unless otherwise stated or agreed, you agree that the company has the right to directly deduct the above service fees from the account balance or other assets you entrust the company to collect or pay on behalf of the company.
(12) You agree that the use records, signing status and other data of the contract lock account are subject to the data recorded in the company's system. If you have any objection to such data, you should raise an objection to the company within 30 days from the date of change in your account data and provide relevant evidence for the company's verification.
(13)Storage of contract data
1.If the electronic contract data drafted on this platform is not initiated for signing within 12 months from the date of creation, the system will automatically consider it as an invalid draft and delete it. Please ensure that the contract is initiated or saved to local storage within the required time to avoid data loss.
2.The platform only retains electronic contract data that has been withdrawn, rejected, or expired for 12 months. After the expiration date, the system will automatically delete the relevant electronic contract data. Please ensure that you back up or download the required contract within this period to avoid losing access after expiration.
3.For signed electronic contract data in completed, ended, and voided states, the platform will automatically archive the data within 60 months after signing. Archived contract data will no longer be displayed in the regular contract list, and only archiving administrators will be allowed to view and manage these data in the archive list.
4.After the deletion of electronic contract data, the platform will not be able to provide any form of recovery service and cannot be actively retrieved by users.
5.Users should fully understand and agree with the above-mentioned contract data processing regulations. During the use of this platform service, users should be responsible for any losses or liabilities caused by not backing up or processing contract data in a timely manner.
6、 Contract lock service usage restrictions
(1) When you use the service, you should abide by the relevant laws and regulations of the People's Republic of China, the laws and regulations of your country or region and relevant international practices, and do not use the service for any illegal purpose, nor use the service for any illegal purpose or in any illegal way, or use the service for other purposes not permitted by the contract.
(2) You shall not use this service to engage in acts that infringe upon the legitimate rights and interests of others, otherwise the company has the right to refuse to provide this service, and you shall bear all relevant legal liabilities. If the company or its employees or other parties are damaged as a result, you shall be liable for compensation. The above behaviors include but are not limited to:
1. Infringe the legitimate rights and interests of others such as reputation right, privacy right, trade secret, trademark right, copyright, patent right, etc.
2. Violation of confidentiality obligations prescribed or agreed by law.
3. Use this service in the name of others.
4. Engaging in illegal acts, such as money laundering, terrorist financing, trafficking in guns, drugs, drugs, pirated software, pornographic materials, and other contracts that our company believes are not allowed to use this service.
5. Provide gambling information or induce others to participate in gambling in any way.
6. Illegal use of accounts of others.
7. Sign a contract that is inconsistent with the content of the contract claimed by you or the other party, or is not true.
8. Engage in any behavior that may contain computer virus or may infringe the service system and data.
9. Other behaviors that the company has legitimate reasons to consider inappropriate.
(3) You understand and agree that the Company will not be liable for any damages caused by any of the following circumstances, including but not limited to the loss of profits, goodwill, use, data, etc. or other intangible losses (whether or not the Company has been informed of the possibility of such damages):
1. Our company has the right to suspend, interrupt or terminate the provision of this service or any part of it to you and remove your data based on unilateral judgment, including but not limited to our company's belief that you have violated the express provisions and spirit of this agreement.
2. In the event that we find that there is any doubt about the abnormal contract signing or reasonably suspect that the contract signing is in violation of the law or the agreement, we have the right to suspend or terminate the use of all or part of the contract locking accounts under your name without notice (including but not limited to taking restrictive measures such as canceling the contract signing on these accounts), and refuse you to use some or all of the functions of this service, We will notify you via email or website information or client notification, and you should pay attention in time.
3. You understand and agree that under the following circumstances, the company has the right to suspend or terminate the provision of all or part of the contract lock service for your contract lock account, and has the right to limit some or all of the functions of the products or services you use (including but not limited to taking restrictive measures such as canceling the contract for these accounts), and notify you through email, intra-station mail or client notification, which you should pay attention to in a timely manner:
1) According to the agreement:
2) According to the provisions of laws, regulations and legal documents:
3) According to the requirements of the competent authority:
4) Your use of contract lock service is suspected of violating national laws, regulations and administrative regulations:
5) When the Company believes that there is abnormality in account operation, capital inflow and outflow based on unilateral reasonable judgment:
6) The Company believes that risks may arise based on its own reasonable judgment:
7) When you participate in the market activities, you have registered accounts in batches, swiped credit and other frauds that violate the activity rules and the principle of good faith:
8) You have been complained by others and the other party has provided some evidence:
9) You may have mistakenly performed real-name authentication or real-name authentication on other people's accounts.
If you apply for the resumption of service or the lifting of the above payment suspension or restriction, you should provide relevant information and your identity certificate and other information or documents required by the company according to the requirements of the company, so that the company can verify, and the company has the right to decide whether to agree with your application at its own discretion. You should fully understand that your application is not necessarily allowed. If you refuse to provide relevant information and identity certificates truthfully, or fail to pass the audit of the company, you confirm that the company has the right to stop providing services to such accounts for a long time and to restrict some or all functions of such products or services for a long time.
4. If the Company believes that such abnormality has been supported by reasonable explanation or effective evidence or has not violated relevant national laws, regulations and departmental rules, the restriction will be lifted within 30 calendar days from the date of explanation at the latest. However, the Company has further reason to believe that such abnormality may still cause losses to you or other users or the Company, including but not limited to:
1) Received complaints against such exceptions:
2) You have materially violated this agreement or the agreement signed separately, and we must continue to terminate or suspend the execution of the order based on the need to protect the interests of all parties:
3) Although you have not violated the relevant national laws and regulations and departmental rules and regulations, such use involves the industry categories or commodities that our company restricts cooperation, including but not limited to engaging in the pyramid or matrix type of high-margin business model through our products or services.
5. When we think it is reasonable and necessary, we can terminate the provision of this service without prior notice, and suspend, close or delete all or part of your contract lock accounts and all relevant information and files in these accounts.
(4) If you need to cancel your contract lock account, you should apply for cancellation according to the company's procedures. The cancellation of this account by our company means that the agreement between our company and you has been terminated, but you should still be liable for possible breach of contract or damages for your behavior during the use of this service. After the account is cancelled, your personal information will remain in a state that cannot be retrieved and accessed. We will not use or provide personal information related to the account to the outside world. However, the information you provide or generate during the use of the contract lock service still needs to be stored for more than 5 years according to regulatory requirements, and within the storage time, we will cooperate with the competent authorities in accordance with the law.
7、 Random irresistible factor
Due to the instability of the Internet itself, the company cannot guarantee that the service will not be interrupted. When the system cannot operate normally due to relevant conditions, the user cannot use any contract lock service or the use of contract lock service is affected in any way, the company is not responsible for the user or the third party. The above conditions include but are not limited to:
(1) The system downtime maintenance period announced by our company on this website.
(2) Data transmission cannot be carried out due to the failure of telecommunication equipment.
(3) Due to force majeure factors such as typhoon, earthquake, tsunami, flood, power failure, war, terrorist attack, etc., the company is unable to perform business due to system obstacles.
(4) Service interruption or delay caused by hacker attack, technical adjustment or failure of telecommunication department, website upgrade, banking problems, etc.
8、 Scope and limitation of liability
(1) The company is only responsible for the scope of liability listed in this agreement.
(2) You agree that any risk arising from signing the contract shall be borne by you and the other party.
(3) The user information is provided by the user himself. Our company cannot guarantee the accuracy, timeliness and completeness of the information. You should take full responsibility for your judgment.
(4) The company will not provide any form of guarantee for the subject matter of the contract and the service, including but not limited to the following:
1. This service meets your needs.
2. This service is free from interference, timely provision or error.
3. Any products, services, information or other materials you purchase or obtain through this service meet your expectations.
(5) The quality and content of the service provided by the partner of this service shall be the responsibility of the partner.
(6) You shall take your own consideration and risk of downloading or obtaining any data through the use of this service. You shall be fully responsible for any damage or loss of data to your computer system caused by the downloading of data.
(7) The suggestions and information you obtain from the company and its staff or through the service, whether in written or oral form, do not constitute our guarantee for the service.
(8) To the extent permitted by law, the Company shall be responsible for any indirect, punitive, special and derivative losses (including business losses, income losses, profit losses, goodwill losses, loss of use of data or other economic benefits) related to or arising from this Agreement, no matter how they are caused, and whether they are caused by breach of this Agreement (including breach of warranty) or infringement, Shall not be liable, even if the possibility of such loss has been informed in advance. In addition, even if the exclusive remedy provided in this Agreement does not achieve its basic purpose, the Company's liability for the above losses shall be excluded.
(9) You fully understand and agree that our company may provide this service for you and your counterparties at the same time, and you agree to expressly exempt this company from such acts that may exist, and may not claim that our company has legal flaws in providing this service.
(10) Unless otherwise specified in this agreement or agreed by the company, your entrustment to the company and the instructions sent to the company are irrevocable.
9、 Protection of trademarks, intellectual property rights and patents
(1) All systems of the Company and its affiliated companies and all contents on the website, including but not limited to works, pictures, files, information, data, website structure, arrangement of website images, and website design, are legally owned by the Company or its affiliated companies, including but not limited to trademark rights, patent rights, copyrights, trade secrets, etc.
(2) Without the written consent of the Company or its affiliates, no one shall use, modify, copy, publicly disseminate, change, distribute, distribute or publicly publish the procedures or contents of this website without authorization.
(3) It is your obligation to respect intellectual property rights. In case of violation, you shall be liable for damages.
10、 Law application and jurisdiction
The validity, interpretation, change, implementation and dispute resolution of this agreement shall be governed by the laws of the People's Republic of China. In the absence of relevant laws, general international commercial practices and/or industrial practices shall be referred to. All disputes arising from this agreement shall be handled in accordance with the laws of the People's Republic of China and shall be under the jurisdiction of the people's court where the defendant resides.
11、 Others
(1) If any provision of this Agreement is invalid or unenforceable in whole or in part for any reason, the remaining provisions of this Agreement shall remain valid and binding.
(2) The company has the final right to interpret this service agreement.
Latest update date: 2024-11-04
Effective date: 2024-11-04
Welcome to the electronic signature platform of Shanghai Genyan Network Technology Co., Ltd. (hereinafter referred to as "Qiyuesuo" or "we"). This privacy policy applies to the services provided by our electronic signature platform.
Dear contract lock user (hereinafter referred to as "you"), we attach great importance to your privacy. When you use the contract lock service, we will collect, store, use and share your personal information according to the Privacy Policy (hereinafter referred to as "the Policy"). In order to ensure that your personal privacy information is collected and used legally, reasonably and appropriately, and transmitted and stored in a safe and controllable manner, we have formulated this policy. We hope that you will carefully read and confirm that you have fully understood and understood the contents stated in this policy before using our products and/or services. Once you start to use or continue to use our products and/or services after we update this privacy policy, it means that you have fully understood and agreed to the contents of this policy (including the updated version), and agree that we will collect, use, save and share your relevant information in accordance with this privacy policy. If you have any questions, comments or suggestions about the contents of this privacy policy, you can contact our customer service (service hotline: 400-888-9792) for consultation. For terms and personal sensitive information in this policy that we believe have a significant relationship with your rights and interests, we use bold words to mark them to remind you of special attention.
This policy will help you understand the following:
1、 How do we collect and use your personal/business information
2、 How do we use cookies and similar technologies
3、 How do we share, transfer and publicly disclose your personal/corporate information
4、 How do we store and protect your personal/business information
5、 Your rights
6、 How do we deal with children's personal information
7、 Information collected and used by third parties
8、 How to update this policy
9、 How to contact us
1、 How do we collect and use your personal/business information
According to the principles of legality, legitimacy and necessity, we collect the information needed to realize the product functions and use the collected information reasonably.
(1) How do we collect your personal/business information
In the process of using the contract lock service, we will collect the information you actively input or generated from using the service:
1. When you register your account or use our service, you need to provide us with personal information that can be used to identify the user's personal identity, such as name, e-mail address, telephone number and other personal information to help you complete the contract lock user registration. If you refuse to provide this information, you may not be able to complete the registration or use our service normally.
2. When you use the contract lock function or service, you may need to provide or authorize us to collect the personal information required for the corresponding service under the following circumstances. If you refuse to provide personal information required for some functions or services, you may not be able to use some functions or services, but this does not affect your normal use of other functions or services of the contract lock:
(1) You need to use some of our services (such as signing service and certificate storage service), and you need to provide us with more information (such as name, certificate number, mobile phone number, bank card number, face data, certificate data, etc.) to complete the real-name authentication verification of basic identity information. You can also upgrade to an enterprise user to enjoy more advanced functions (such as managing enterprise members and creating business processes). To upgrade to an enterprise user, you need to complete the verification of enterprise identity real-name authentication. You need to provide us with the basic information of the enterprise, including: enterprise name, unified social credit code, name of legal representative, corporate ID card number, business license, opening bank and bank account number of enterprise corporate account, authentication authorization with the official seal of the organization and other information, so as to verify your enterprise identity. The specific information provided is subject to the information collected during your real-name authentication process. At the same time, in order to verify the accuracy and completeness of the information you provide, we will check with the state organs, financial institutions, enterprises and institutions that legally retain your information. If we need to collect your information from the aforementioned verification agency during the verification and verification process, we will explain the source of personal information to the verification agency according to relevant laws, regulations or regulatory requirements, and confirm the legitimacy of the source of personal information.
The above information is collected to meet the real-name system requirements of relevant laws and regulations. If you refuse to provide this information, it will only make you unable to use the above functions, but will not affect your normal use of other functions of the contract lock.
(2) In order to make you use the login service more safely and conveniently, if your device and the contract lock App version both support the fingerprint function, you can choose to enable the fingerprint login function. You need to enter your fingerprint information on your device. When you log in, you need to complete fingerprint verification on your device. We only receive the verification results and do not collect your fingerprint information. If you do not want to use fingerprint authentication, you can still log in through other methods.
(3) In order to make you use the login service more safely and conveniently, if your device and the contract lock App version support the face function, you can choose to enable the face login function. You need to enter your face information on your device. When you log in, you need to complete face verification on your device. We only receive the verification results and do not collect your face information. If you do not want to use face verification, you can still log in through other methods.
In addition, in order to ensure the availability and continuity of our services and the security of your account, we will collect your following information:
(1) Device information: device model, operating system version, unique device identifier, IP address information.
(2) Software information: software version number and browser type. In order to ensure the security of the operating environment or provide services (call other APP for authentication services), we will collect information about the mobile applications and other software you use.
(4) Some device permissions: We may obtain some device permissions based on your permission, including address book permissions, which are used to facilitate you to select the contact person of the address book as the signatory when signing, and send relevant signing notices. We will not save your address book information for other purposes; Camera/camera permissions, used for specific service scenarios such as face recognition; Access to photos is used to select the pictures saved in your album to upload under specific service scenarios.
(5) Service log information. The way, type and status of your access to the network when using our service, login time, operation log, service log and other log information related to the contract lock service.
(6) IP and location information. For example, we may obtain your geographic location information through IP address, GPS, WiFi or base station. You can choose to turn on or off the authorization of geographical location information. If you turn off the authorization, the functions related to geographical location may not be used and the relevant verification may not be completed.
(7) The contract locks the personal information collected by the APP and the access rights.
The personal information collected by APP and its purpose and necessity include:
Android | ||
Business segment | Type of personal information collected | Purpose and necessity of collecting personal information |
Sign in and register | Mobile phone number and e-mail address | Personal information that must be collected by users registered with mobile phone number/email address for registration/login, account creation and network identity improvement |
Message push | Device information after deidentification (IMEI/AndroidId) | The information that must be collected by the signing and approval functions is used for the signing/approval business process node push. The push object is the signer/approver |
Operation and security | Device information, including mobile phone model, system version, IMEI, AndroidId, OAID (application anonymous identification), software version number, operation, and service log | Ensure user account security (such as whether the device is abnormal login) and message push |
iOS | ||
Sign in and register | Mobile phone number and e-mail address | Personal information that must be collected by users registered with mobile phone number/email address for registration/login, account creation and network identity improvement |
Message push | Device information after deidentification (UUID) | The information that must be collected by the signing and approval functions is used for the signing/approval business process node push. The push object is the signer/approver |
Operation and security | Device information, including mobile phone model, system version, UUID (application anonymous identification), software version number, operation, and service log | Ensure user account security (such as whether the device is abnormal login) and message push |
HarmonyOS | ||
Business segment | Type of personal information collected | Purpose and necessity of collecting personal information |
Sign in and register | Mobile phone number and e-mail address | Personal information that must be collected by users registered with mobile phone number/email address for registration/login, account creation and network identity improvement |
Message push | Device information after deidentification (OAID/AAID) | The information that must be collected by the signing and approval functions is used for the signing/approval business process node push. The push object is the signer/approver |
Operation and security | Device information, including mobile phone model, system version, IMEI, OAID (application anonymous identification), software version number, operation, and service log | Ensure user account security (such as whether the device is abnormal login) and message push |
Based on the needs of basic function realization and account security, APP needs to obtain the following permissions of users:
Application authority | Permission function description | Use scenario and purpose | necessity |
Address Book Permissions | Allow app to read relevant data of phone and email contacts | Quickly add contacts when initiating contracts | The permissions required for basic functions cannot be added quickly without authorization |
Microphone permissions | Allow app to record audio | Recording and reading random number video during face recognition | The permissions required for basic functions cannot complete face recognition authentication without authorization |
Camera permissions | Allow apps to take photos and videos and scan QR codes | Take document photos, take signature/seal photos, record face recognition authentication video, scan code to open the contract | The authority required for basic functions cannot complete face recognition authentication without authorization; Unable to take photos and upload documents, signatures and seals; Unable to open the contract by scanning the code |
Photo album permissions | Allow app to read system album | Upload file image, signature/seal image | Permission required for basic functions, unable to upload file image, signature/seal image without authorization |
SD card permissions | Allow apps to read photos, media content and files on the memory card | Upload and download contract files | The permissions required for basic functions cannot be uploaded without authorization; Unable to save file locally |
Notification permission | Allow app push notifications | Receive message reminder to be signed | Permissions required for basic functions. Without authorization, APP cannot push signing and approval messages |
Bluetooth permissions | Allow the app to view the Bluetooth configuration on the phone and establish a connection with the paired device | When using the physical seal, unlock it by connecting with the seal treasure | The permission required for opening the physical seal function is not authorized to use the physical seal |
Location permissions | Allow applications to obtain location information based on GPS, base station, Wi-Fi and other network sources | When using the physical seal, monitor the actual use position of the seal | The permission required for opening the physical seal function cannot be obtained without authorization |
Read Clipboard | Allows the app to read clipboard data | Used for entering the private cloud address during initial setup | This is a basic function permission; without granting it, you cannot quickly input the private cloud address |
(2) How do we use your personal/business information
In order to comply with national laws, regulations and regulatory requirements, provide services to you, improve service quality, or ensure the security of your account, we will use your information in the following situations:
1. We will use your personal information collected in accordance with this policy and in order to realize our services or functions;
2. In order to let you know the status of using the contract lock service, we will send you a service reminder. You can turn off the service reminder through the notification settings in the mobile phone system settings, or turn on the service reminder again through the notification settings;
3. In order to ensure the stability and security of the service, we will use your information for authentication, security prevention, fraud monitoring, prevention or prohibition of illegal activities, risk reduction, archiving and backup purposes;
4. Report to relevant departments according to laws, regulations or regulatory requirements;
5. Invite you to participate in customer research related to our services, products or functions;
6. After collecting your personal information, after we de-identify your information data through technical means, such de-identified information will not be able to identify the information subject.
7. We will make statistics on the use of our services or functions, and may share these statistical information with the public or third parties to show the overall use trend of our services or functions. However, these statistics do not contain any identification information of you.
8. When we display your information, we will desensitize your information by means of content replacement and anonymization to protect your information security.
9. When it is necessary to strengthen identity verification due to regulatory requirements, business rules, and risk control requirements, we will use the live detection face data and ID photo you keep when using the business involving identity verification for face recognition. If you do not agree with our application of the above information, you may not be able to complete the relevant business requiring the use of face recognition, but it will not affect your use of other services provided by us.
(3) Exceptions to authorization
According to the relevant laws and regulations, regulatory requirements and national standards, in the following cases, we will collect and use your relevant personal information without asking for your authorization and consent if we are required to provide it by the national competent authority or regulatory authority, or for the purpose of fully protecting your rights and interests, or in accordance with other reasonable circumstances agreed herein:
1. Directly related to national security and national defense security;
2. Directly related to public safety, public health and major public interests;
3. Directly related to criminal investigation, prosecution, trial and execution of judgments;
4. For the purpose of protecting your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain your consent;
5. The collected personal information is disclosed to the public by yourself;
6. Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;
7. Necessary for signing and performing the contract according to your requirements;
8. It is necessary to maintain the safe and stable operation of the products or services provided, such as finding and handling the faults of the products or services;
9. It is necessary to carry out statistical or academic research in the public interest, and when it provides the results of academic research or description to the public, it de-identifies the personal information contained in the results;
10. Other circumstances required by laws, regulations and regulatory provisions.
2、 How do we use cookies and similar technologies
In order to ensure the normal operation of the service and provide you with an easier access experience, we will store a small data file named Cookie on your computer or mobile device. Cookies usually contain identifiers, site names, and numbers and characters. We will not store information related to personal identity or privacy in cookies.
You can manage or delete cookies according to your preferences. For details, see AboutCookies.org. You can clear all cookies saved on your computer or mobile device. Most web browsers have the function of blocking cookies. But if you do this, you need to change user settings every time you visit our website or mobile device. For more information on how to change browser settings, please visit the relevant settings page of your browser.
3、 How do we share, transfer and publicly disclose your personal/corporate information
(1) Share
We will not share your personal information with companies, organizations and individuals other than contract lock service providers, except for the following:
1. Obtain your explicit consent or authorization in advance;
2. We may share your personal information according to the provisions of laws and regulations, the need to resolve litigation disputes, or the mandatory requirements of administrative and judicial authorities according to law.
3. In order to protect the legitimate rights and interests of users, we may provide interested parties with necessary information to resolve disputes or disputes when assisting in handling disputes or disputes related to you.
4. Sharing with cooperative institutions: In order to achieve the purpose of providing services by electronic signature or other contract locks, some of our services will be provided by us and cooperative institutions. We will share some of your personal information with partners according to laws, regulations and agreements.
(1) Your personal identity information and signature information need to be transmitted to the electronic authentication service agency (CA), notary office, judicial authentication center, blockchain, internet court, arbitration commission, and third-party identity authentication agency. The above authority will issue corresponding certification documents or use and save them for the purpose of handling cases. For access to third-party services, we will share some of your information collected in accordance with this policy with third-party service providers. We will only share your personal information for legitimate, legitimate and necessary purposes, and only share personal information necessary for the provision of services.
Third-party service providers are involved in sharing your personal information or related data, including the service name, purpose, method and scope:
Service name | Name of the third party | Purpose | necessity | Processing method | Type of personal information | Third party privacy policy link |
Alipay face recognition service | Alipay Network Technology Co., Ltd | Conduct personal real-name authentication and identity verification | Required to use electronic signature service | Secure handling of transmission and processing through encryption | Name, ID type, ID number, face data | https://render.alipay.com/p/f/fd-jn5u2nmf/index.html |
Baidu AI face recognition service | Beijing Baidu Netcom Science Technology Co., Ltd. | Conduct personal real-name authentication and identity verification | Required to use electronic signature service | Secure handling of transmission and processing through encryption | Name, ID type, ID number, face data | https://ai.baidu.com/ai-doc/REFERENCE/Vkdygjliz |
Tencent Cloud Face Recognition Service | Tencent Technology (Shenzhen) Co., Ltd | Conduct personal real-name authentication and identity verification | Required to use electronic signature service | Secure handling of transmission and processing through encryption | Name, ID type, ID number, face data | https://cloud.tencent.com/document/product/301/11470 |
Open vision face recognition service | Beijing Kuangsi Technology Co., Ltd | Conduct personal real-name authentication and identity verification | Required to use electronic signature service | Secure handling of transmission and processing through encryption | Name, ID type, ID number, face data | https://www.megvii.com/privacy_policy |
Mobile phone number three-factor authentication service | China United Network Communications Group Co., Ltd | Conduct personal real-name authentication and identity verification | Required to use electronic signature service | Secure handling of transmission and processing through encryption | Name, certificate type, certificate number, mobile phone number | http://www.10010.com/net5/front/include/index_a/privacypolicy.html |
Bank card four-factor authentication service | Shanghai Chuanglan Yunzhi Information Technology Co., Ltd | Conduct personal real-name authentication and identity verification | Required to use electronic signature service | Secure handling of transmission and processing through encryption | Name, certificate type, certificate number, bank card number, bank card reserved mobile phone number | https://www.chuanglan.com/document/6110e48109fd9600010209d3/61bfec2520eb52000187938e |
(2) The information shared by the contract lock APP through the SDK: some products and services may be provided by our authorized partners, and we will provide you with products or services through the SDK. During this process, our authorized partners may collect, use and store your relevant data or information. We have listed specific authorized partners and provided a link to the third party's privacy policy. We recommend that you read the third party's privacy policy.
Third-party SDKs integrated with APP that involve collecting personal information or related data and their purposes, methods and scope:
SDK name | Name of the third party | Purpose | necessity | Processing method | Type of personal information | Third party privacy policy link |
Bugly SDK | Shenzhen Tencent Computer System Co., Ltd | Troubleshoot crash problems and help APP improve stability | It is required for basic functions to troubleshoot crash problems and help APP improve stability | Secure processing through de-identification, encrypted transmission and processing | Device identification information (IMEI/Mac/androidID/IDFA/OPENUDID/GUID), WLAN access point (such as SSID, BSSID), log information (including: third-party developer customized log, Logcat log and APP crash stack information, networking information, system name, system version and country code, access to device serial number | https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56 |
Baidu Map Positioning SDK | Beijing Baidu Netcom Science Technology Co., Ltd. | Get location information during user sensitive operations | Enable the authority required for the physical seal function, and monitor the actual use position of the seal | Secure processing through de-identification, encrypted transmission and processing | Equipment identification information (IMEI/Mac/androidID/IDFA/OPENUDID/GUID, SIM card IMSI information), access to WI-FI status, access to location, sensor model, gyroscope information | |
Youmeng SDK | Youmeng Tongxin (Beijing) Technology Co., Ltd | Statistical analysis, message push, social sharing, performance monitoring | As required by the basic functions, the node information and results in the business process are pushed to the user in a timely manner in the signing and approval business scenario | Secure processing through de-identification, encrypted transmission and processing | Equipment identification information (IMEI/Mac/androidID/IDFA/OPENUDID/GUID, SIM card IMSI information), WLAN access point (such as SSID, BSSID), application installation list, and acquisition of equipment serial number | https://www.umeng.com/page/policy
|
Polar SDK | Wuhan Jiyi Network Technology Co., Ltd | Provide verification code behavior verification service | Necessary for basic functions to reduce the probability of APP being cracked by machines | Secure processing through de-identification, encrypted transmission and processing | Basic application information (such as name and version number), equipment identification information (IMEI/Mac/androidID/IDFA/OPENUDID/GUID, SIM card IMSI information), access to application installation list, sensor model, gyroscope information | |
WeChat sharing SDK | Shenzhen Tencent Computer System Co., Ltd | Enable corresponding WeChat users to sign, approve and view contracts through WeChat | Share the signed business, approved business or signed documents to the corresponding account in WeChat | Secure processing through de-identification, encrypted transmission and processing | Equipment identification information | https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy |
Alipay authentication SDK | Alipay (Hangzhou) Information Technology Co., Ltd | Help users use Alipay to complete authentication in the application | For basic functions, jump to Alipay APP in the face recognition authentication scenario | Secure processing through de-identification, encrypted transmission and processing | Device identification information (Android ID such as IMEI/IMSI, IOS such as SIM card serial number/MAC address), device basic information, WLAN access point (such as SSID, BSSID), network information | |
Huawei PUSH | Huawei Software Technology Co., Ltd | Message push | Enable Huawei mobile phone users to receive node information push in business scenarios, such as signing links | Secure processing through de-identification, encrypted transmission and processing | Device identification information (AAID [application anonymous identification], application token) | |
Xiaomi PUSH | Beijing Xiaomi Mobile Software Co., Ltd | Message push | Enable Xiaomi mobile phone users to receive node information push in business scenarios, such as signing links | Secure processing through de-identification, encrypted transmission and processing | Device identification information (OAID and encrypted Android ID), application information (application package name, version number and running status) | https://dev.mi.com/console/doc/detail?pId=1822
|
VIVO PUSH | Guangdong Tianchen Network Technology Co., Ltd. and the company that will be transferred to operate the Vivo open platform in the future | Message push | Make Vivo mobile phone users receive node information push in business scenarios, such as signing links | Secure processing through de-identification, encrypted transmission and processing | Equipment identification information | |
OPPO PUSH | Guangdong Huantai Technology Co., Ltd | Message push | Enable OPPO mobile users to receive node information push in business scenarios, such as signing links | Secure processing through de-identification, encrypted transmission and processing | Device identification information (such as IMEI number, SIM card serial number, IMSI), application information (such as application package name, version number and operation status), network information (such as IP or domain name connection result, current network type) | https://open.oppomobile.com/wiki/doc#id=10288
|
Meizu PUSH | Zhuhai Meizu Communication Equipment Co., Ltd | Message push | Make Meizu mobile phone users receive the node information push in the business scenario, such as signing the link | Secure processing through de-identification, encrypted transmission and processing | Equipment identification information | |
QQ Share SDK | Shenzhen Tencent Computer System Co., Ltd | Social sharing | Share the signed business, approved business, or signed documents with the corresponding account | Secure processing through de-identification, encrypted transmission and processing | Device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/ICCID/geographical location, etc.) | https://wiki.connect.qq.com/qq%e4%ba%92%e8%81%94sdk%e9%9a%90%e7%a7%81%e4%bf%9d%e6%8a%a4%e5%a3%b0%e6%98%8e |
DingDing Share SDK | DingDing Technology Co., Ltd | Social sharing | Share the signed business, approved business, or signed documents with the corresponding account | Secure processing through de-identification, encrypted transmission and processing | Device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/ICCID/geographical location, etc.) | https://open.dingtalk.com/document/orgapp/android-share-sdk-compliance-guide |
Youmeng Share SDK | Youmeng Tongxin (Beijing) Technology Co., Ltd | Social sharing | Share the signed business, approved business, or signed documents with the corresponding account | Secure processing through de-identification, encrypted transmission and processing | Device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/ICC ID/geographic location, etc.), application list | https://www.umeng.com/page/policy |
Baidu AI facial recognition SDK | Beijing Baidu Netcom Technology Co., Ltd. | Personal real name authentication and identity verification required for using electronic signature services | Required for using electronic signature services | Security processing through de identification, encrypted transmission and processing | Device information (including IMEI, Android ID, carrier information, WiFi status, WiFi parameters, WiFi list, system settings, system properties, device model, operating system, device application installation list, running program list)Location information (rough location information obtained through IP address resolution) Log information (including device information and IP address) | https://ai.baidu.com/ai-doc/REFERENCE/Vkdygjliz |
Sangfor VPN SDK | Sangfor Technologies Co., Ltd. | To access the intranet environment of enterprises or organizations | To enable users to access private cloud services deployed within the intranet environment of enterprises or organizations directly within the APP | Secure processing methods including de-identification, encrypted transmission, and handling | Device identification information, network information, VPN access logs |
About the behavior of self-starting or associated starting
The app integrates Friendly Push to ensure the timeliness, reliability and effectiveness of the delivery of push messages.
Youmeng push uses self-start and associated start. After you agree to the privacy agreement, Youmeng push sdk will use self-start and associated start to keep alive as much as possible, otherwise you may not receive the push information in time. If you do not agree to this, we will not be able to provide you with services.
If other software installed on your device is integrated with Youmeng push sdk, then self-start and associated start may occur frequently. Youmeng push can ensure its own activity and avoid the situation that it cannot be pushed immediately. Please be informed.
Please be aware that we will only share your personal information for legitimate, legitimate and necessary purposes, and only share personal information necessary for the provision of services. We will carry out personal information security impact assessment on authorized cooperative institutions, analyze the rationality of the personal information they collect or the authority they need to be authorized to obtain, regularly evaluate and monitor their service and security capabilities, and sign relevant agreements with them to clearly stipulate strict data protection measures, requiring them to comply with the provisions of relevant laws and regulations, and strictly comply with our standards This privacy policy and any other relevant confidentiality and security measures to handle your personal information. All of the above SDK partners handle your personal information through the past security methods of identification, encrypted transmission and processing.
If you find that our authorized cooperation agency has illegal behaviors in the process of use, you can contact us through the contact information provided in this privacy policy, and we will verify and timely terminate the cooperation with the third party, so as to protect your personal data and privacy information from infringement as much as possible.
(2) Transfer
We will not transfer your personal/business information to any company, organization or individual, except for the following:
1. Obtain your explicit consent in advance;
2. According to laws and regulations or mandatory administrative or judicial requirements;
3. In the case of merger, acquisition or bankruptcy liquidation of the contract lock service provider, or other cases involving merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this policy, otherwise we will require the company, organization and individual to ask for authorization from you again.
(3) Public disclosure
We will only publicly disclose your personal/corporate information under the following circumstances:
1. We will not publicly disclose your personal information. If it is necessary, we will obtain your consent and inform you of the purpose and type of disclosure of personal information;
2. Please understand that under the circumstances of laws, legal proceedings, litigation or mandatory requirements of the competent government departments, we may publicly disclose your personal/corporate information. We will notify you in a timely manner when the law enforcement authority puts forward disclosure requirements, unless the law enforcement authority has other requirements prohibiting disclosure.
(4) Exceptions to obtaining authorization in advance when sharing, transferring and publicly disclosing personal/corporate information
According to relevant laws, regulations and regulatory provisions, in the following cases, we may share, transfer and publicly disclose user information without obtaining your authorization and consent in advance if we meet the mandatory requirements of national competent authorities or regulatory authorities, or for the purpose of fully protecting your rights and interests, or in accordance with other reasonable circumstances agreed herein:
1. Related to the performance of the obligations of national laws and regulations and the relevant provisions of the industry competent department;
2. Directly related to national security and national defense security;
3. Directly related to public safety, public health and major public interests;
4. Directly related to criminal investigation, prosecution, trial and execution of judgments;
5. For the purpose of protecting your or other personal life, property, reputation and other important legal rights and interests, but it is difficult to obtain my consent;
6. Personal information that you disclose to the public;
7. Necessary for signing and performing the contract according to your requirements;
8. User information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
4、 How do we store and protect your personal/business information
(1) Storage
1. Location of information storage
The personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China. If it is really necessary to transmit relevant personal information collected in China to overseas institutions in order to handle cross-border business, we will implement it in accordance with laws, administrative regulations and relevant regulatory authorities. We will ensure that your personal information is adequately protected, such as anonymization, secure storage, etc.
2. Duration of information storage
We promise to always store your personal information within a reasonable and necessary period in accordance with the provisions of the law. After the above period, we will delete your personal information.
When our products or services stop operating, we will notify you in the form of push notice, announcement, and delete your personal information within a reasonable period of time.
(2) Protection
1. We have taken security protection measures in line with industry standards to protect the personal/enterprise information you provide from unauthorized access, public disclosure, use, modification, damage or loss.; We also provide HTTPS (HyperText Transfer Protocol over Secure SocketLayer) protocol security browsing mode for contract lock websites; We will use encryption technology to improve the security of personal/enterprise information; We will use trusted protection mechanism to prevent personal/enterprise information from malicious attacks; We will deploy access control mechanism to ensure that only authorized personnel can access personal/enterprise information; We will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal/corporate information.
2. We have obtained the following certifications: three-level certification of information system security protection, ISO/IEC27001 information security management system certification, ISO/IEC 27017 cloud service information security management system certification, ISO/IEC 27018 personally identifiable information protection management system certification in public cloud, ISO/IEC 27701 privacy information management system certification, CSA STAR cloud security assessment, ISO22301 business continuity management system, ISO20000 technical service management system.
3. We will take reasonable and feasible measures to avoid collecting irrelevant personal/enterprise information. We will only retain your personal/corporate information for the period required to achieve the purpose stated in this policy, unless the retention period needs to be extended or permitted by law.
4. The Internet is not an absolutely secure environment. We strongly recommend that you do not use the communication method recommended by non-contractual locks to send personal/enterprise information. Please properly protect your personal/business information and only provide it to others when necessary. If you find that your personal/business information, especially your account or password, has been leaked, please contact the contract lock customer service immediately so that we can take corresponding measures according to your application.
Please use complex passwords to help us ensure the security of your account. We will try our best to ensure the security of any information you send us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.
5. After the unfortunate personal/enterprise information security incident, we will timely inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can take to prevent and reduce risks independently, and the remedial measures for you according to the requirements of laws and regulations. We will inform you about the event by mail, letter, telephone or push notification. When it is difficult to inform the individual/enterprise information subject one by one, we will take reasonable and effective ways to release the announcement. At the same time, we will also report the handling of personal/corporate information security incidents according to the requirements of the regulatory authorities.
6. You submit personal/enterprise information through the contract lock platform, and on behalf of you agree to and authorize the contract lock to collect, use, share and protect your personal/enterprise information. If you apply for revocation of authorization for special reasons, please contact us in time so that we can handle it accordingly.
5、 Your rights
You can access and manage your personal information in the following ways:
(1) Access your personal information
You have the right to access your personal information, except for the exceptions specified by laws and regulations. You can access your personal information in the following ways:
Account information - If you want to access or edit the basic personal information in your account, change your password, and add security information, you can perform such operations through the "Personal Center" through the login account.
If you cannot access the personal information through the above path, you can contact us at any time through the contract lock customer service. We will reply to your visit request within 3 working days.
For other personal information generated by you in the process of using our products or services, we will provide it to you according to the relevant arrangements in "(VI) Responding to your above request" of this article.
(2) Correct or supplement your personal information
When you find that there are errors in the personal information we handle about you, you have the right to ask us to make corrections or supplements. You can apply for correction or supplement through the methods listed in "(I) Access to your personal information".
(3) Delete your personal information
You can delete some of your personal information in the way listed in "(I) Access your personal information".
In the following cases, you can request us to delete personal information:
1. If we handle personal information in violation of laws and regulations;
2. If we collect and use your personal information without your explicit consent;
3. If our behavior of handling personal information violates the agreement with you;
4. If you no longer use our products or services, or you voluntarily apply for cancellation of your account;
5. If we no longer provide you with products or services.
If we decide to respond to your request for deletion, we will also notify the subjects who have obtained your personal information from us and ask them to delete it in a timely manner, unless otherwise specified by laws and regulations, or these subjects have obtained your independent authorization.
When you delete information from our service, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.
(4) Account cancellation
When you need to terminate the use of contract lock products or services, you can apply for the cancellation of your contract lock account. You can apply for the cancellation of the contract lock account through the system. If the cancellation conditions are met (that is, it needs to be an individual account and there are no to-do items), the account will be cancelled in real time.
You can cancel the contract lock account through the following path:
Operation path of contract lock official website: open www.qiyuesuo.com, log in to the contract lock account, click the avatar in the upper right corner of the system, enter the personal center ->click the security center ->click to cancel the account.
Operation path of contract lock APP: open the contract lock APP, log in to the contract lock account, click the sidebar in the upper left corner of the APP ->click the avatar to enter the personal center ->click the account cancellation button below.
After you actively cancel your account, we will stop providing you with products or services, delete your personal information according to the applicable provisions of the Contract Law of the People's Republic of China or the Electronic Signature Law of the People's Republic of China, or make it anonymous.
(5) Withdrawal of agreed authorization
When you need to revoke the authorization of the contract lock, you can enter the mobile phone system settings to cancel the system authorization of the contract lock.
(6) Automatic decision of constraint information system
In some business functions, we may only make decisions based on the non-manual automatic decision-making mechanism including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us to make an explanation, and we will also provide an appeal method on the premise of not infringing the contractual lock trade secrets or other user rights and interests, and social public interests.
(7) Respond to your above request
To ensure security, you may need to provide a written request, or prove your identity in other ways. We may ask you to verify your identity before processing your request.
In the following cases, according to the requirements of laws and regulations, we will not be able to respond to your request:
1. Relating to national security and national defense security;
2. Those related to public safety, public health and major public interests;
3. Relating to criminal investigation, prosecution, trial and execution of judgments;
4. There is sufficient evidence to show that you have subjective malice or abuse of rights;
5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;
6. Involving trade secrets.
6、 How do we deal with children's personal information
Our products, websites and services are mainly for adults. Children (under the age of 16) cannot create their own user accounts without the consent of their parents or guardians.
For the collection of children's personal information with the consent of parents, we will only use or publicly disclose this information if it is permitted by law, explicitly agreed by parents or guardians or necessary to protect children.
If we find that we have collected the personal information of children without the prior consent of verifiable parents, we will try to delete the relevant data as soon as possible.
7、 Information collected and used by third parties
When you use the service provided by a third party in the contract lock, the third party may obtain your name, certificate type, certificate number, certificate validity, mobile phone number information and other information necessary for providing the third party service; With your express consent, a third party can obtain your above information; For the relevant information that you actively provide to the third party when using the services provided by the third party, we will consider that you allow the third party to obtain the above information; For the information generated when you use the third party service, you and the third party should agree on the collection and use of the above information according to law. Before providing the information to a third party, our company will make commercially reasonable efforts to evaluate the legality, legitimacy and necessity of the information collected by the third party. Our company will sign relevant legal documents with the third party and require the third party to comply with laws and regulations and signed legal documents when processing your personal information, and require the third party to take protective measures for your information. If you refuse to collect, use or transmit the above information when a third party provides services, it may cause you to be unable to use the corresponding services of the third party in the contract lock, but this will not affect your other functions of using the contract lock.
8、 How to update this policy
Our privacy policy may change.
Without your explicit consent, we will not limit your rights under this privacy policy.
For major changes, we will also provide more significant notice (including the notice we will make through the contract lock website).
The major changes referred to in this policy include but are not limited to:
1. Significant changes have taken place in our service model. For example, the purpose of processing personal information, the type of personal information processed, and the use of personal information;
2. Significant changes have taken place in our control. For example, changes in owners caused by mergers and acquisitions;
3. The main objects of personal/enterprise information sharing, transfer or public disclosure have changed;
4. Your right to participate in personal/corporate information processing and the way you exercise it have changed significantly;
5. When the department responsible for handling personal/enterprise information security, contact information and complaint channel change;
6. When the personal/enterprise information security impact assessment report indicates that there are high risks.
If you continue to use the contract lock service after the revision of this policy, it means that you have fully read, understood and accepted the revised policy and are willing to be bound by the revised policy.
9、 How to contact us
If you have any questions, comments or suggestions about this privacy policy, please contact us through the following ways:
Developer name: Shanghai Genyan Network Technology Co., Ltd
APP name: Qiyuesuo Electronic Signing
E-mail: supports@qiyuesuo.com
Tel: 400-888-9792
Generally, we will reply within 15 working days.
Latest update date: 2023-02-09
Effective date: 2023-02-09
This Digital Certificate Use Agreement (hereinafter referred to as "the Agreement") is applicable to the official website of Shanghai Genyan Network Technology Co., Ltd. (hereinafter referred to as "Qiyuesuo" or "us") and the contract lock products or services used.
This agreement will help you understand the following:
1、 Introduction to Digital Certificate Service
2、 Noun interpretation
3、 User's rights and obligations
4、 Application, use, update and revocation of certificates
5、 Right of contract lock
6、 Services, rights, obligations, limitation of liability and exemption of third-party electronic certification service institutions
7、 Disclaimer
8、 Termination of Agreement
9、 Dispute resolution clause
1、 Introduction to Digital Certificate Service
1. You agree and recognize that we will cooperate with the electronic certification service agency approved by the Ministry of Industry and Information Technology to apply for digital certificates for individuals or enterprises who have passed real-name authentication.
2. You agree and accept that the real-name authentication and the use of digital certificates to obtain electronic signature services through our contract lock platform become an integral part of the contract lock electronic signature system.
3. "Certificate" in this agreement refers to personal digital certificate or enterprise digital certificate.
2、 Noun interpretation
1. User:
Refers to the individual, legal person or other organization that entrusts the contract lock to obtain the certificate from the third-party electronic certification service institution.
2. Digital certificate:
It refers to the electronic document containing the identity information and public key of the digital certificate user issued by the electronic certification service organization, which can be used to prove the true identity of the digital certificate holder.
3. CA organization:
It refers to the electronic authentication service agency approved by the Ministry of Industry and Information Technology and the electronic authentication service agency approved by the State Password Administration, which provides users with electronic authentication services related to digital certificates in accordance with the Electronic Signature Law of the People's Republic of China.
3、 User's rights and obligations
1. You should provide relevant information to the contract lock platform according to the certificate application process specified in the contract lock, and ensure the authenticity, accuracy and completeness of the registration information filled in and the information provided, otherwise the contract lock platform or contract lock has the right to refuse your application request. You should notify us in time when these information and materials change. If the information provided by you is untrue, incomplete, inaccurate or has not been notified in time after the change, the user shall bear the losses caused.
2. If your certificate information changes within the validity period of the certificate, you should inform us in writing in a timely manner and terminate the use of the certificate (note: the original certificate needs to be revoked and the digital certificate needs to be reapplied for the change of the enterprise name, the unified social credit code of the enterprise, the expiration of the business term, the change of name, the change of ID number number, etc.).
3. If you are an enterprise user, if your enterprise splits, merges, dissolves, cancels, declares bankruptcy or goes bankrupt, or your business license is revoked and other subject qualifications are terminated, you should notify the contract lock in writing to apply for revocation of the digital certificate and terminate the use of the certificate within 30 days of the occurrence of the above situation, otherwise, if you fail to fulfill the notification obligation and cause losses to the contract lock, you should fully compensate.
4. You agree and authorize the contract lock to transmit user information to its third-party cooperation organization for verification of user identity. The contract lock platform will legally collect, process, transmit and apply your data, and keep it confidential in accordance with the relevant national regulations and the agreement of this agreement.
5. You have the independent right to use the certificate. You should legally use the digital certificate to sign the electronic document and be responsible for the use of the digital certificate. You have the right to use the certificate; The obligations and responsibilities arising from your use of the certificate shall be borne by you.
6. You should properly keep the digital certificate and contract lock account that you own and control. When you receive the signature verification code in the notification method (mobile phone and email) set in the contract lock account, you should ensure that the signature request is initiated by yourself and the verification code is confidential. If the private key and password of the digital certificate you use are leaked or lost, or you do not want to continue using the digital certificate, or your principal does not exist, you should immediately apply to the contract lock to revoke the digital certificate. If the certificate private key is leaked, damaged or lost due to your reason, you shall bear the loss.
7. If you damage the interests of an authoritative third-party electronic certification service organization, you must compensate the electronic certification service organization for all losses. These situations include but are not limited to:
① You did not provide true, complete and accurate information when applying for digital certificate, or did not timely notify the contract lock when these information changed;
② You know that your private key has been lost or may have been lost, but you have not informed relevant parties in time and terminated the use;
③ You have other faults or failed to perform the relevant provisions of this agreement.
8. The authoritative third-party electronic certification service organization has the right to require the contract lock to replace your digital certificate due to security risk factors.
9. After you apply for a code signing certificate, you should immediately apply to the contract lock for revocation of this certificate once you find one of the following conditions:
① Evidence shows that this code signing certificate is used to sign suspicious code, including but not limited to viruses, trojans, or other inappropriate programs.
② The content in the certificate is no longer correct or accurate.
③ The private key information of this certificate has been disclosed, lost, or other relevant parts have been misused.
10. Once the certificate is revoked, the user can no longer use the certificate.
11. If the authoritative third-party electronic certification service agency finds that the certificate is improperly used, or the certificate is used for illegal or even criminal acts, the electronic certification service agency has the right to directly revoke your certificate.
12. If you find or suspect that the authentication service provided by an authoritative third-party electronic authentication service institution has caused the leakage and/or tampering of the user's online transaction information, you should submit a dispute resolution request to the electronic authentication service institution and notify the relevant parties within 3 months.
4、 Application, use, update and revocation of certificates
1. You can select a real-name authentication method suitable for you to apply for digital certificates on the contract lock platform. The obtained certificates and certificate private keys will be managed by the contract lock. The certificate is only used for the signing of electronic documents in the contract lock platform. The contract lock ensures that the electronic signature creation data that you make using the certificate and certificate key belongs to you and is under your control.
2. Each time you sign an electronic document on the contract lock platform, you will use your digital certificate. The contract lock will only use the digital certificate to sign the electronic document according to your wishes after verifying your signing intention. If the fingerprint signature or face scanning signature or automatic seal function is enabled, it is deemed that you know and agree to use your digital certificate every time you sign an electronic document.
3. The term of validity of this agreement is the term of validity of the certificate. The certificate can only be used within the term of validity of the digital certificate. If you need to continue to use the certificate after the expiry of the term of validity, you should go through the certificate renewal procedures in time, and the term of validity of this agreement will be extended to the expiry date of the certificate renewal period. The contract lock will not automatically update the certificate for you until you have the authorization to extend the certificate.
4. If the private key of the certificate is damaged, lost or leaked within the validity period of the certificate, you should apply for cancellation procedures in a timely manner. The cancellation will take effect when the procedures are completed, and the losses incurred before the cancellation takes effect will be borne by you.
5. When you know that the private key of the certificate has been lost or may have been lost, you should promptly notify the contract lock platform to assist in completing the revocation of the certificate and terminate the use of the certificate.
5、 Right of contract lock
Under any of the following circumstances, the contract lock has the right to apply to a third party for revocation of the certificate without any responsibility. If any loss is caused to the contract lock, you shall be liable for compensation to the contract lock:
1. The data or information you provided to the contract lock platform is untrue, incomplete or inaccurate.
2. The information of your certificate has changed, and you have not terminated using the certificate and notified the contract locking platform.
3. When you know that the private key of the certificate has been lost or may have been lost, you did not terminate the use of the certificate and notify the contract locking platform.
4. You use the certificate beyond the validity period and application scope of the certificate.
5. Your business is divided, merged, dissolved, cancelled, declared bankrupt or closed down, and your business license is revoked.
6. You use the certificate for illegal or criminal activities.
6、 Services, rights, obligations, limitation of liability and exemption of third-party electronic certification service institutions
1. The third party electronic certification service institution formulates the Electronic Certification Business Rules (hereinafter referred to as CPS) according to law and publishes it on the website of the third party electronic certification service institution to clarify the functions of the digital certificate of the third party electronic certification service institution, the rights and obligations of the parties using the certificate and the scope of responsibility of the third party electronic certification service institution. The relevant provisions of this agreement are derived from CPS.
2. Under the condition that users use digital certificates to encrypt and sign the transaction information through security tools, the third-party electronic authentication service organization will ensure the confidentiality, integrity and non-repudiation of the transaction information. In case of any dispute, the third-party electronic certification service agency will undertake the following obligations according to different situations:
① Provide CA certificate for issuing user digital certificate;
② Provide the certificate that the user's digital certificate is in or out of the digital certificate revocation list issued by the third-party electronic certification service agency when the transaction occurs;
③ The authenticity and validity of digital certificates, digital signatures and time stamps shall be confirmed technically.
3. In any of the following circumstances, the third-party electronic certification service institution has the right to cancel the digital certificate issued:
① When users apply for digital certificates, the information provided is not true;
② The user fails to perform the obligations agreed in this agreement;
③ The user applies in writing for revocation of the digital certificate;
④ The security of the certificate cannot be guaranteed;
⑤ Other circumstances stipulated by laws and administrative regulations.
4. The third-party electronic certification service organization will review the information submitted by users when applying for digital certificates, provide relevant services within the certificate life cycle, and provide inquiry services to relevant parties. Third-party electronic authentication service institutions and their registration institutions are obliged to protect the security of user privacy information.
5. According to the provisions of the Law on Electronic Signatures, if the user suffers losses from using the authentication services provided by the third party electronic authentication service institution for civil activities according to law, the third party electronic authentication service institution will pay corresponding compensation, Unless the third-party electronic certification service institution can prove that the services it provides are implemented in accordance with the relevant laws and regulations such as the Electronic Signature Law and the CPS filed by the third-party electronic certification service institution with the competent authority. The following losses are not included in the compensation:
① Any direct or indirect loss of profit or income, damage to reputation or goodwill, loss of any business opportunities or opportunities, loss of projects, loss or inability to use any data, inability to use any equipment, inability to use any software;
② Loss or damage caused by or incidental to the above losses.
6. The third-party electronic certification service organization will not be liable for the following losses:
① Losses not caused by the behavior of the third party electronic certification service organization;
② Losses caused by force majeure, such as strikes, wars, disasters, malicious code viruses, etc.
7. The upper limit of compensation for digital certificates applied by third-party electronic certification service institutions to enterprise users shall be subject to the official instructions of each electronic certification service institution.
7、 Disclaimer
1. The contract lock will not bear any responsibility for your losses caused by equipment failure, power failure, communication failure, computer virus, natural disaster and other factors.
2. If the private key of the certificate is cracked or stolen due to the reason of the third party electronic certification service institution, and you suffer losses, the third party electronic certification service institution shall be liable for compensation to you.
8、 Termination of Agreement
This agreement shall be terminated under any of the following circumstances:
1. Your certificate expires.
2. Your certificate has been revoked.
3. You apply to the contract lock to terminate this agreement, and the contract lock agrees.
4. Both parties negotiate to terminate this agreement.
5. This agreement shall be terminated according to laws and regulations.
9、 Dispute resolution clause
All disputes arising from or in connection with the performance of this Agreement shall be settled by both parties through friendly negotiation. If the negotiation fails within 30 days from the date of the dispute, either party has the right to submit the dispute to Shanghai for arbitration. The arbitration award is final and legally binding on both parties. During the arbitration or dispute period of this agreement, both parties shall continue to perform other clauses of this agreement that have not been arbitrated or disputed.