VidKey privacy policy

Welcome to use Vidkey password box software (hereinafter referred to as"The software") . This privacy policy aims to clarify the software collection, storage, use, disclosure, protection and processing of user personal information and scope, to protect the information security and legitimate rights and interests of users. Please read and understand this policy carefully before using this software. Once you use this software, you agree to the policy in its entirety. If you have any questions about this policy, please contact ajsam556@gmail.com communicate with us.

1. Scope of application and definitions

1.1 scope

1.1.1 this policy applies to all users (hereinafter referred to as"Users") who download, install and use this software through official channels (including but not limited to official websites, app stores, etc.) .

1.1.2 this policy applies only to the processing of information by this software. If this software links to a third-party service, the processing rules for third-party services refer to its separate privacy policy. This software is not responsible for this.

1.2 core definitions

1.2.1 personal information: information recorded electronically or otherwise which, individually or in combination with other information, is capable of identifying a particular natural person or of providing information about the activities of a particular natural person, such as account information, password information, equipment information, etc. .

1.2.2 sensitive personal information: personal information whose disclosure, unlawful availability or misuse is likely to endanger the safety of persons and property and is highly likely to lead to damage to a person's reputation, physical or mental health or to discriminatory treatment, this software involves sensitive personal information, including the user stored all kinds of account passwords, bank card information and so on.

Scope and modalities of Information Collection

2.1 necessary information gathering

2.1.1 account registration information: when registering an account with the software, the user must provide an e-mail address or mobile phone number as the login account and set the software login password, this information is used for user authentication and account login management.

2.1.2 password management related information: when using the core functions of this software, users need to actively enter or create various account information (such as application account number, bank card number, etc.) , password information, label information and group information, this kind of information is the basis of password management function of this software, which is provided and controlled by users.

2.2 collection of supporting information

2.2.1 equipment information: to ensure the stability and security of the software and to provide adaptation services, the software will automatically collect basic information about the user's equipment, this information includes device model, operating system version, device unique identifier (e.g. , IMEI, UUID) , network type, etc. . This information is for technical optimization only and is not used to identify individuals.

2.2.2 usage log information: this software will record user behavior log, such as software login time, function usage record, search operation record, etc. , such information is used to analyze software usage, optimize functional experience and troubleshoot problems. Log information will be anonymized.

3. Information storage rules

3.1 storage methods and Technologies

3.1.1 local storage: the core sensitive information such as account number and password entered by the user in the software is preferentially stored locally on the user's device. The software uses the AES-256 encryption algorithm to encrypt the information stored locally, prevent information from being read illegally.

3.1.2. Cloud storage (optional) : if you enable cloud backup, your sensitive encrypted data will be synced to the software's own cloud server. Cloud storage uses"Double encryption" mechanism, in addition to local encryption, the transmission process using ssltls encryption, server storage using Bcrypt Hasche algorithm for secondary encryption, ensure data security during transmission and storage.

3.2 duration and location of storage

3.2.1 duration of storage: information stored locally by the user is under his/her own control and can be deleted at any time through software features; information stored in the cloud will be retained for the duration of the user's account, and if the user cancels the account, we will completely delete all user information stored in the cloud within 15 working days after the completion of account cancellation, unless otherwise stipulated by laws and regulations.

3.2.2 storage location: Cloud Servers are located in the United States and Hong Kong, China, where international data protection standards are met. All servers are fully secured, meet the requirements of GDPR and other international data protection regulations.

4. Rules for using information

4.1 core usage scenarios

4.1.1 implementation of core functions: provision of core services such as account management, classified storage, precise search, and password invocation, using user-provided account password information and classified label information.

4.1.2 security: the use of device information and log information to identify abnormal login behaviour, prevent malicious attacks and safeguard user accounts and information; the processing of sensitive information through encryption techniques; Prevent information leakage.

4.2 additional usage scenarios

4.2.1 feature optimization: Based on user log information, analyze user habits, optimize software interface layout, improve search response speed, improve password generation algorithm, etc. , to improve the user experience.

4.2.2 service notifications: sending notifications related to software services, such as account security alerts and function updates, through the user's registered e-mail address or mobile phone number, no spamming or unrelated marketing content.

5. Restrictions on information disclosure

5.1 prohibition of voluntary disclosure

5.1.1 we will not disclose any personal or sensitive information of our users to any third party, including but not limited to commercial partners, advertisers, etc. , without the explicit written consent of our users.

5.1.2 we will not sell, lease or transfer user information to any third party, nor will we use user information for purposes other than those agreed in this policy.

5.2 statutory disclosure

5.2.1 we may disclose necessary user information to comply with mandatory requirements under laws, regulations, executive branch or judiciary upon receipt of lawful and valid legal instruments, but it will do its utmost to protect the security of its users' information to the extent permitted by law.

5.2.2 in order to protect the legitimate rights and interests of users, the public interest or our legitimate rights and interests, information may be disclosed where necessary, such as in response to fraud, to protect the personal and property safety of users, etc. .

6. Information Security Safeguards

6.1 technical security

6.1.1 encryption: in addition to the previously mentioned encryption measures, the software uses end-to-end encryption for the transmission of all sensitive information to ensure that data is not intercepted or tampered with during transmission; The password generation function adopts high-strength random algorithm to ensure the security of the generated password.

6.1.2 security: the cloud server deploys multiple security protections such as firewalls, intrusion detection systems (IDS) , data desensitization systems, and regularly conducts security vulnerability scanning and penetration testing, potential risks of timely repair.

6.2 managing safety and Security

6.2.1. Access Control: a strict hierarchy of access is maintained for internal staff, access to limited user information is granted only to those in essential positions, and all operations are logged and regularly audited.

6.2.2 emergency response: establish a sound emergency response mechanism for information security incidents. In the event of a security incident such as an information leak, an emergency response plan will be immediately activated and remedial measures taken, and in accordance with the requirements of laws and regulations to inform the user and the relevant regulatory authorities.

7. User Rights

7.1 rights of access and modification

7.1.1 users can access, view and modify all the information they enter at any time through the"My information", "Password management" and other functional modules of this software, including account passwords, labels, grouping and notes, etc. .

7.1.2 if a user discovers an error in the information, it can be modified directly in the software and the modified data will be updated in real time and re-encrypted for storage.

7.2 information deletion and account cancellation rights

7.2.1 users can delete unwanted account and password information at their own discretion. The deletion operation is irreversible and the deleted data will be completely wiped from the local and cloud (if backup is enabled) .

7.2.2 users can apply for account cancellation through the"Account setup" function in the software. Please back up important information before cancellation. After cancellation, all associated personal information will be deleted in accordance with this policy, can not be restored after logoff.

7.3 right to challenge and complaint

7.3.1 if a user disagrees with the software's handling of information or believes that his or her personal information has been compromised, he or she may contact ajsam556@gmail.com. We will reply and deal with the complaints within 7 working days after receiving them.

8. Protection of information on minors

8.1 this software is not intended for minors under the age of 16. Minors who wish to use this software must do so under the supervision of their guardians, who must consent to this privacy policy.

8.2 if we discover that we have miscollected minors' information, we will immediately stop processing the information, delete the relevant information with the cooperation of the Guardian, and communicate with the Guardian to explain the situation.

9. Policy updates and notifications

9.1 this policy may be revised to accommodate changes in laws and regulations, technological developments or service upgrades. The revised policy will be published prominently in the software (e.g. login page, settings page) , the publicity period shall not be less than 7 natural days.

9.2 if there are changes to our users' core rights and interests, we will notify them of the changes through their registered e-mail address or mobile phone number. After the expiration of the public notice, the revised policy will take effect automatically. If you continue to use the software, you will agree to the revised policy.

10. Other articles

10.1 international law -LRB-excluding conflict of laws rules) shall apply to the establishment, entry into force, implementation, interpretation and dispute resolution of this policy.

10.2 any dispute with us over this policy shall first be settled through friendly negotiations. If such negotiations fail, either party shall have the right to institute legal proceedings in the Jurisdictional People's Court of the location where the software operator is located.

10.3 this policy shall be effective from the date of application release.