Privacy Policy


Update time of this agreement: September 8, 2020

Mind+Mind Map Ltd. (hereinafter referred to as Mind+) attaches great importance to the privacy of users. Therefore, we have developed a privacy policy covering how to collect, use and store your information. Any time you contact Mind+, you may be asked to provide personal information, such as when you purchase our products and services, interact with our website and online forums, or communicate with our sales or customer service staff. Except as otherwise provided in this privacy policy, Mind+ will not disclose or provide this information to third parties without your prior permission (except for your own disclosure). When you agree to the Mind+ service use agreement, you are deemed to have agreed to the entire content of this privacy policy. This privacy policy is an integral part of the Mind+ service usage agreement.

This privacy policy will help you understand the following:
1. How do we collect and use your personal information
2. How do we use cookies and similar technologies
3. How do we share, transfer, and publicly disclose your personal information
4. How do we store and protect your personal information
5. Your rights
6. Third-party services
7. How do we protect the personal information of minors
8. How to update this policy
9. How to contact us

1. How do we collect and use your personal information


Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.

The subject of personal information refers to the natural person identified by the personal information, hereinafter referred to as "you".

Personal information controller refers to an organization or individual that has the right to determine the purpose and method of processing personal information. Mind+ Mind Map APP is developed and operated by Shanghai Yushu Technology Co., Ltd., hereinafter referred to as "we".

Collection refers to the act of controlling the acquisition of personal information, including automatic collection by you actively, through interaction with you or recording your behavior, and indirect acquisition through sharing, transfer, and collection of public information And so on. If the provider of the product or service provides tools for you to use, and the provider does not access personal information, it does not belong to the collection behavior described in the "Information Security Technology Personal Information Security Specification".

We will only collect and use your personal information for the purpose of realizing product and service functions and in accordance with the principles of lawfulness, fairness and necessity. If we want to use the information for other purposes not specified in this policy or use the information collected for a specific purpose for other purposes, we will notify you in a reasonable manner and will seek your consent in advance. For example, in the following cases, we will apply for authorization from you:

Read and write external storage. When you save a picture to your mobile device, we will ask you for permission to use the storage.

Camera. When you choose to add pictures from the album, we will apply to you for camera permission;

We collect your information to provide you with personalized products or services and a better experience. Some of our services may require you to provide specific personal information to achieve specific functions. If you choose not to provide this type of information, you may not be able to use certain functions in the service normally, but it will not affect your use of other functions in the service. If you take the initiative to provide your personal information, you agree that we will process your personal information in accordance with the purposes and methods described in this policy.

We promise to collect personal information in a minimal way. At the same time, we will not force your consent to collect personal information on the grounds of improving service quality, enhancing your user experience, developing new products, enhancing security, etc.

1. Account activity. When you create a Mind+ account, we will collect certain personal information, including your login device information, account password and other information. This account is used to use certain products and services provided by our products (including all content and technology provided through the mindyushu.com domain name), such as downloading Mind+ software and accessing Mind+ services. Your Mind+ account and password will be saved with specific encryption. Without your authorization, no one including Mind+ can access your Mind+ account. When you purchase our products or use our services, we will also collect the necessary personal information to complete the transaction, such as your contact information and payment information.

2. Use information. We may collect information about your usage, including when you use this website, your subscribed channels, groups and favorites, your communication contacts, the content you view, the frequency and size of data transmission, and Information that you display or click on the website (including UI elements, settings, and other information). If you are logged in, we will associate this information with your account. When you contact our customer service staff by phone, download software updates, participate in our online research or register product information, we may also ask you to provide personal information related to the use of our products and services.

3. Content uploaded to Mind+. In general, any personal information or content (discussion area, message and chat area, and your profile page, etc.) that you voluntarily disclose online will become public information, which can be collected and used by anyone (collectively referred to as "public content") . But you don’t have to worry about data security.

4. Mind+ data storage and transmission. Any content uploaded to Mind+ will be protected by Mind+ Ltd. Industry standard encryption (SSL) is used to protect Mind+ data to prevent your Mind+ files (including text and photos in the file) from being accessed, tampered with, leaked or damaged during upload or download without your authorization. We require file storage service companies to strictly fulfill their data confidentiality obligations. If the business is not performed, we will pursue its legal responsibility and terminate the cooperation with it.

Two. How do we use cookies and similar technologies


(1) Cookie

To ensure the normal operation of the website, we will store small data files called Cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, the website can store your study time, study progress and other data. We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a function to block cookies. But if you do this, you need to personally change the user settings every time you visit our website. To learn more about how to change browser settings, please visit the relevant settings page of the browser you are using.

(2) Web beacons and pixel tags

In addition to cookies, we also use web beacon technology on our websites. A web beacon is usually a transparent image embedded in a website or email. It is used to count the number of visitors, record whether and when you view the website, or to use certain cookies.

Three. How do we share, transfer, and publicly disclose your personal information


(1) Sharing

We will not share your personal information with any third-party companies, organizations and individuals, except in the following cases:

1. After obtaining the explicit consent of you or your guardian, we will share your personal information with other parties.

2. We may share your information externally in accordance with laws and regulations, or compulsory requirements of government authorities.Personal information.

3. Share your information with partners and other third parties in order to provide, maintain and improve our products or services. For example, we will share relevant information about the third-party partner Youmeng, including the user's APP version, application platform, gender, region, whether it is a paying user, user type, etc. 6 items to help us better push to you and other users More precise information.

We promise that third-party partners have no right to use shared personal information for other purposes unrelated to products or services.

4. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary to provide services. For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures. The shared personal information is used for any other purpose.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

1. When transferring with the explicit consent of you or your guardian, we will transfer your personal information to other parties;

2. When it comes to mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy. Otherwise, we will ask the company or organization to ask you for authorization again.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. After obtaining the explicit consent of you or your guardian;

2. Disclosure based on law: We may publicly disclose your personal information when required by law, legal procedures, litigation or mandatory requirements of the competent government department.

(4) Exceptional circumstances

You know and agree that we can share, transfer, and publicly disclose personal information without your prior authorization under the following circumstances:

1. Directly related to national security and national defense security;

2. Directly related to public safety, public health, and major public interests;

3. Directly related to criminal investigation, prosecution, trial and execution of judgments;

4. In order to protect your or other individuals’ life, property and other major legal rights, but it is difficult to obtain your consent;

5. If we, as a non-professional general understanding, based on good faith and reasonable judgment, believe that you have violated laws and regulations or seriously violated the rules of product and service related agreements, it is out of the protection of other users or the public. The personal and property safety needs to be protected from infringement, but it is difficult to disclose personal information about you with the consent of the person;

6. Your personal information disclosed to the public by yourself;

7. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

(5) Acts not regarded as sharing, transfer and public disclosure

According to the law, sharing, transferring, and publicly disclosing personal information that has been de-identified, and ensuring that the data recipient cannot restore and re-identify the subject of personal information does not belong to the sharing or transfer of personal information And public disclosure, the storage and processing of such data does not require separate notification and consent to you.

Four. How do we store and protect your personal information


We only store your personal information for the period necessary for the purposes described in this policy and within the shortest time limit required by laws and regulations. If we terminate the service or operation, we will promptly stop the activities of continuing to collect your personal information, and at the same time, we will comply with relevant laws and regulations to notify you in advance, and delete or anonymize your personal information after terminating the service or operation. However, unless otherwise provided by laws, regulations or regulatory authorities.

Personal information collected and generated during our operations within the territory of the People’s Republic of China is stored in the territory of China, except in the following circumstances:

1. There are clear provisions in laws and regulations;

2. Obtain your authorization and consent;

In response to the above circumstances, we will ensure that your personal information is adequately protected in accordance with this policy and national laws and regulations.

We attach great importance to information security, set up a dedicated security team, and take all reasonable and feasible measures to protect your personal information:

(1) Data Security Technical Measures

We will adopt safety protection measures that comply with industry standards, including the establishment of reasonable systems, specifications, and safety technologies to prevent unauthorized access, use, modification, and data damage to your personal information. Lost.

Our service adopts a variety of encryption technologies. For example, in some Mind+ services, we will use encryption technology (such as SSL) to protect your personal information, and use encryption technology to protect your personal information. Encrypted storage and isolation through isolation technology.

In the use of personal information, such as information display, information association calculation, we will use a variety of data desensitization technologies to enhance the security of information in use.

We will also adopt strict data access control and multi-identity authentication technology to protect personal information and prevent data from being used in violation of regulations.

(2) Other security measures we take to protect personal information

We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

We use information contact confidentiality agreements, monitoring and auditing mechanisms to fully control data security. We will also organize security and privacy protection training courses to strengthen employees' security awareness and awareness of the importance of protecting information.

(3)We only allow Mind+ employees and partners who need to know this information to access your personal information, and set up strict access control and monitoring mechanisms for this. We also require all personnel who may have access to your personal information to perform corresponding confidentiality obligations. If you fail to fulfill these obligations, you may be held accountable or the partnership with Mind+ may be suspended.

(4) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected.

(5) The Internet is not an absolutely secure environment, and the communication methods with other users such as e-mail, instant messaging, social software or other service software cannot be determined whether it is completely encrypted or not. We recommend that you use this type of Please use complex passwords when tools, and pay attention to protect your information security.

(6) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of the personal information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.

(7) Security Incident Handling

When communicating with third parties or purchasing goods and services through Mind+ services, you will inevitably disclose your information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your information properly and provide it to others only when necessary.

In order to deal with the possible risks of personal information leakage, damage and loss, we have formulated a number of systems to clarify the classification and classification standards of security incidents and security vulnerabilities and the corresponding processing procedures. We have also established a special emergency response team for security incidents. In accordance with the requirements of security incident handling regulations, we initiate security plans for different security incidents, stop losses, analyze, locate, formulate remedial measures, and work with relevant departments to trace and crack down.

In the unfortunate event of an information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you Can independently prevent and reduce risk suggestions, remedial measures for you, etc. At the same time, we will promptly inform you of the relevant situation of the incident by email, letter, telephone, push notification, etc. If it is difficult to inform the information subject one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also proactively report the handling of information security incidents in accordance with the requirements of the regulatory authorities.

Please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the system and communication network you use to access the Mind+ service may cause problems due to circumstances beyond our control.

Please keep your account, password and other identity elements in a safe place. When you use the Mind+ service, we will use your account number, password and other identity elements to identify you. Once you disclose the aforementioned information, you may suffer losses and may be disadvantageous to you. If you find that your account number, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take appropriate measures in time to avoid or reduce related losses.

5. Your rights


We will ensure that you exercise the following rights with respect to your personal information in accordance with this policy:

(1) Access your personal information

You have the right to access your personal information, except for special cases provided by laws and regulations. If you want to exercise the right of data access, you can access it yourself in the following ways: Account information: If you want to access or edit the personal information and payment information in your account, change your password Code, add security information or close your account, etc., you can access our products or services [Settings] The function module performs such operations.

If you cannot access this information through the above functional modules, you can contact us through the customer service mailbox [yushu_mind_support@yeah.net].

As long as we don’t need to invest too much, we will provide you with other personal information generated during your use of our products or services. We will respond to your correction request within 15 working days.

(2) Correct your personal information

When you find that the personal information we process about you is wrong, you have the right to ask us to make corrections. You can make relevant amendments or apply for corrections through the methods described in the aforementioned "Access to Your Personal Information".

(3) Delete your personal information

In the following situations, you can request us to delete personal information:

1. If our handling of personal information violates laws and regulations;

2. If we collect and use your personal information without your consent;

3. If our handling of personal information violates our agreement with you;

4. If you no longer use our products or services, or you cancel your account;

5. If we no longer provide you with products or services.

When you delete information from our service, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated. If we accept your request to delete your personal information, we will also notify the third-party organization that has obtained your personal information from us and request it to delete it in a timely manner, unless otherwise stipulated by laws and regulations.

You can use the customer service mailbox@yeah.net ] Get in touch with us.

(4) Responding to your request

For security, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.

For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation. We may reject requests that are unreasonably repeated, require excessive technical means, bring risks to the legitimate rights and interests of others, or are very unrealistic.

In the following situations, we will not be able to respond to your request in accordance with the requirements of laws and regulations:

1. Directly related to national security and national defense security;

2. Directly related to public safety, public health, and major public interests;

3. Directly related to criminal investigation, prosecution, trial and execution of judgments;

4. There is sufficient evidence to show that you have subjective malice or abuse of rights;

5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

6. Involving trade secrets.

VI. Third-party services


Mind+ services may access or link to other services provided by third parties (including websites or other forms of services). include:

1. You can use the "Share" button to share some content to third-party services. These functions may collect your information (including your log information), and may install COOKIES on your computer to operate the above functions normally;

2. Other access to third-party services. For example, In order to achieve the purpose stated in this policy, we may access SDK or other similar applications provided by third-party service providers, and share some of your information we collect in accordance with this policy with those Third-party service providers in order to provide better customer service and user experience. Currently, the third-party service providers we access mainly include the following types:

(1) For payment-related services, including order payment, transaction verification, income settlement, payment information summary statistics, etc.;

(2) Used to obtain device location permissions, collect device information and log information, etc. with your consent;

(3) Used for third-party authorization services, including third-party account login, sharing relevant content to third-party products, etc.;.

(4) Used to optimize product performance, including improving hardware distribution network capabilities, reducing server costs, and hot repairing functions;

(5) Used for account security and product reinforcement related services, including network monitoring, domain name resolution (HTTPDNS), anti-hijacking, anti-spam and anti-cheating, encryption and decryption services, etc.;

We will only share your information for legitimate, necessary, and specific purposes. For third-party service providers with whom we share information, we will require them to fulfill relevant confidentiality obligations and take corresponding security measures.

Your use of such third party’s social media services or other services (including any information you provide to such third parties) is subject to the third party’s own terms of service and information protection statement (Not this policy), you need to read its terms carefully. This policy only applies to the personal information we collect, and does not apply to any third-party services or third-party information usage rules. If you find that these third-party social media or other services are at risk, it is recommended that you terminate the relevant operations to protect your legitimate rights and interests.

Seven. How do we protect the personal information of minors


If you are a minor under the age of 18, you should obtain the consent of your guardian in advance before using our products or services, and read this privacy policy under the supervision and supervision of the guardian.

If we find that we have collected the personal information of minors under the age of 14 without the prior consent of the guardian, we will try to delete the relevant data as soon as possible.

8. How to update this policy


We may revise this privacy policy at any time.

Without your explicit consent, we will not reduce your rights in accordance with this privacy policy. We will notify you in reasonable ways such as pop-up windows, message center notifications, etc., so that you can keep abreast of any changes made to this privacy policy.

We will also archive the old version of this policy for your review.

9. How to contact us


The registered address of Shanghai Yushu Technology Co., Ltd. is Room 61167, Building 3, No. 1800, Panyuan Road, Changxing Town, Chongming District, Shanghai (Shanghai Taihe Economic Development Zone), and its main office is 21, No. 1158, Zhongxin Road, Songjiang District, Shanghai Room 408, Building B, the contact information of the information protector is [yushu_mind_support@yeah.net].