Privacy Policy

The Smart Tool Library is provided by the Outline Information Technology Operation Department of Wujiagang District, Yichang City (registered address: 2-02, No. 14, Area A, Chengyang Jingyuan, No. 8 Dongyan Road, Wujiagang District, Yichang City, and contact address: 2-02, No. 14, Area A, Chengyang Jingyuan, No. 8 Dongyan Road, Wujiagang District, Yichang City) (hereinafter referred to as "Smart Tool Library" Smart Tool Library "or"). We provide users (hereinafter referred to as "you") through the smart tool library website (https://www.zhihuilib.com) and other programs, software, clients or other similar products we now or in the future (hereinafter collectively referred to as "the platform") to provide online web community products and services (including content products and/or related services organized in the form of Q & A products or other forms), with the mission of "providing high-quality online gadgets", it aims to provide trustworthy content to users through community products in a sustainable, independent and healthy growth manner. In accordance with laws and regulations such as the the People's Republic of China Cyber Security Law, the the People's Republic of China Personal Information Protection Law, the the People's Republic of China Data Security Law, and the Provisions on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications, and with reference to national standards such as the Information Security Technology Personal Information Security Specification (GB/T 35273-2020), develop the "Personal Information Protection Guidelines" (hereinafter referred to as "Guidelines") and strive to protect your personal information security.
Please read and fully understand these guidelines before using this platform. We have marked the key content in bold, and hope you will pay special attention to it.
If you have any questions about these guidelines, you can contact us through the contact information provided in Section 9 "How to Contact Us" of these guidelines. We will revise the guidelines from time to time. When there is a substantial change in accordance with Section 8 of these guidelines, we will show you the changed content in the form of push notification, pop-up window, system notification, in-station private letter, etc. after the version is updated.

1. How we collect and use your personal information
We will follow the principles of legitimacy, legality, and necessity to collect and use personal information that you actively provide during the use of the service or that is generated by the use of the smart tool library for the following purposes described in this guide. If we want to use your personal information for other purposes not specified in these guidelines, or use the collected information for other purposes based on a specific purpose, we will inform you in a reasonable manner and obtain your consent again. If you have questions about the concepts in the following, please refer to the definitions and explanations in Article 11.

When you use the smart tool library, we need/may need to collect and use your personal information in the following two situations: in order to provide you with the basic business functions of the smart tool library (part of all business functions), you must authorize us to collect and use the necessary information. When you use the smart tool library, we need/may need to collect and use your personal information in the following two situations: in addition to providing relatively basic business functions, we have been striving to provide more abundant smart tool library products and/Services to expand, improve and enhance your use experience; such business functions need to collect and use the corresponding necessary personal information.

Note: Since the personal information required for different products or services is different, we will also seek your consent through page prompts, interactive processes, etc. before you use specific products and/or services. The scope of obtaining personal information is subject to the agreement or rules of the specific products and/or services you agree.

Since the products and/or services we provide to you are constantly updated, if a product or service is not described in the foregoing and your information is collected, we will separately explain the content of information collection to you through page prompts, interactive processes, website announcements, etc., in order to obtain your separate consent. This description forms part of these guidelines and the information is subject to the provisions of these guidelines.

We will collect and use your personal information in the following business scenarios:
account registration, login, account binding and security
. When you register and log in to the smart tool library account, we need you to provide a valid Chinese mainland mobile phone number in accordance with the relevant laws and regulations of the real-name system. Please note that you provide us with your mainland China mobile phone number as necessary for us to provide you with personal information for basic business functions.

When you use a third-party account (including WeChat, QQ, Weibo and Apple ID) to log in to the smart tool library, you need to authorize the smart tool library to read and share the public information (including one or more items of nickname, avatar, region, gender and contact mailbox) published and recorded on the third-party platform under the premise of complying with relevant laws and regulations, in order to bind your third-party account to the smart tool library account and remember your login identity as a smart tool library user.

When you need to change the account password, please enter a new password to complete the reset. When you need to modify the mobile phone number, please enter the new mobile phone number and SMS verification code. You can voluntarily bind your mailbox on the setting page. At this time, you need to provide your mailbox account number and the SMS verification code we sent to you for verification. If you need to set up a trusted device, you need to provide us with the name of the device you are using, the type of device, and the last time it was used. When you open the smart tool library organization number, you need to provide us with your email address and login password.

When your account cannot be used, you can retrieve it through account appeal. At this time, you can choose to provide any one of the mobile phone number, email address, used password, registration time, commonly visited cities, commonly used devices on the mobile phone side, commonly used browsers on the PC side, consumption record of smart tool library, former name, introduction in one sentence or personal profile bound to your account so that we can verify your identity. Please be aware that you can choose to fill in one or more of the above information, but the information you provide must be sufficient to determine that you have the right to use the account.

2. How do we entrust the processing, sharing, transfer and public disclosure of your personal information
entrust the processing of your personal information
In order to provide you with better and high-quality products and/or services, some functions may be provided by our service partners (such as our third-party service providers, contractors, agents, etc.), we will entrust the service partners to process some of your personal information on our behalf, for example, third-party suppliers send e-mail or push notifications on our behalf, send research invitations on our behalf, mail you goods you have purchased or confirmed to receive on our behalf, and perform statistical analysis of de-identified information.

For companies, organizations and individuals entrusted by us to process your personal information, we will sign strict confidentiality agreements or data processing agreements with them, specifying the entrusted matters, the purpose, time limit, processing methods, the types of personal information processed, protective measures and the rights and obligations of both parties, and requiring them to process personal information only in accordance with our requirements, these guidelines and relevant confidentiality and security measures. If such third parties change the purpose of processing personal information, such third parties shall seek your consent again.

3. How we protect your personal information
The security of your personal information is very important to us. We will strictly comply with relevant laws and regulations, and take reasonable and feasible measures recognized by the industry to protect your personal information. Prevent information from unauthorized access, disclosure, use, modification, and damage or loss.

Technical measures and data security measures
We strive to implement a variety of industry-standard physical, electronic and administrative security measures to protect your personal information. We actively establish a data classification and grading system, data security management practices, and data security development practices to manage and regulate the storage and use of personal information to ensure that no personal information unrelated to the services we provide is collected.

We have comprehensive security controls over data through confidentiality agreements with contacts, monitoring and auditing mechanisms. Protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss.

We have used industry-standard security measures to protect the personal information you provide to prevent unauthorized access, public disclosure, use, and modification to prevent data damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, the exchange of data (such as credit card information) between your browser and the smart tool library is protected by SSL encryption; we also provide https secure browsing for websites that appear in the "Introduction" of this guide; we use encryption technology to ensure the confidentiality of data; we use trusted protection mechanisms to prevent malicious attacks on data; we deploy access control mechanisms, ensure that only authorized personnel can access personal information; and We will conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information. When we display your personal information, we will use methods including content replacement and anonymous processing to desensitize your information to protect your information security.

Security certification
We have passed the Ministry of Public Security information security level protection level three certification, and with regulatory agencies, third-party evaluation agencies to establish a good coordination and communication mechanism, timely resist and deal with all kinds of information security threats, for your information security to provide a full range of protection.

Security incident handling
We will try our best to ensure the security of any information you send to us, but please understand that due to technical limitations and various malicious means in the Internet industry, we cannot guarantee 100% security of information. You need to understand that your access to the system and communication network used by our service may cause problems due to factors outside our control. In order to prevent the occurrence of safety accidents, we have formulated a proper early warning mechanism and emergency plan. In the event of an unfortunate personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and impact of the security incident, the measures we have taken or will take, suggestions and remedial measures that you can independently prevent and reduce risks, and immediately initiate emergency plans to minimize losses. We will promptly inform you of the relevant information of the incident by telephone, push notification, etc. When it is difficult to inform users one by one, we will issue an announcement in a reasonable and effective way.

4. How we store your personal information
We will store the personal information of users obtained from the People's Republic of China in the People's Republic of China and retain your personal information for the shortest period required for the purposes described in these Guidelines. After the retention period is exceeded, we will delete or anonymize your personal information, unless otherwise required by national laws and regulations, rules, regulatory documents or government policies and orders, or the need to retain your personal information in order to fulfill our compliance obligations. For example, the the People's Republic of China e-commerce law requires that the storage time of commodity and service information and transaction information shall not be less than three years from the date of completion of the transaction; the the People's Republic of China network security law requires technical measures to monitor and record the network operation status and network security events, and keep relevant network logs for no less than six months in accordance with the regulations.

How we use cookies and other technologies
When you use our Services, we store small data files called cookies on your computer or mobile device. Cookies usually contain an identifier, the name of the site, and some numbers and characters. We use this information to determine whether a registered user has logged in, to improve service and/or product quality and to optimize user experience. If you do not want your personal information to be stored in cookies, you can configure your browser to choose to disable cookies.
You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have the ability to block cookies.
the following links provide instructions on how to control cookies in all major browsers:
Google Chrome:https://support.google.com/chrome/answer/95647?hl=en;
IE:https://support.microsoft.com/en-us/help/260971/description-of-cookies;
Safari (desktop):https://support.apple.com/kb/PH5042?locale=en_US;
Safari (mobile):https://support.apple.com/en-us/HT201265;
Firefox: https://support.mozilla.org/en-US/kb/cookies-information-websites-store-on-your-computer?redirectlocale=en-US&redirectslug=Cookies;
Opera:https://www.opera.com/zh-cn/help 。
If you use a different browser, see the documentation provided by the browser manufacturer.
, please be aware that if you refuse to use or remove the existing tracking technology, you will need to change the user settings in person during each visit, and we may not be able to provide you with a better user experience, and some services may not work properly.

6. HOW WE UPDATE AND MODIFY THIS GUIDELINE
Although this guide describes the standards we follow in protecting personal information, these standards may change as we revise them from time to time, which form part of this guide. This guidance is an important part of the Smart Tool Library Protocol (Draft). The Smart Tool Library reserves the right to update or modify these guidelines from time to time. When this guide changes, we will update it in the privacy policy column of the smart tool library.
Please note that we will only collect, use, process and store your personal information in accordance with the updated statement after obtaining your consent. Without your express consent, we will not reduce your rights under these guidelines.
For material changes, we will also provide more prominent notices explaining the specific changes to these guidelines, as the case may be. Significant changes include, but are not limited to:
(1) Significant changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;
. Such as business adjustments, bankruptcy mergers and acquisitions caused by owner changes, etc.;
(3) changes in the main objects of personal information sharing, transfer or public disclosure;
(4) major changes in your rights to participate in personal information processing and the way you exercise them;
(5) changes in our responsible departments, contact methods and complaint channels responsible for handling personal information security;
(6) When the personal information security impact assessment report indicates that there is a high risk.
If you do not agree with the revised personal information protection guidelines, you have the right and should immediately stop using the smart tool library services.

7. How do you contact us
? If you have any questions about this guide, you can contact us through the official public number of the smart tool library or send an email to 448307204@qq.com for consultation.
Please understand and know that in order to ensure safe and efficient handling of your problems and timely feedback to you, we will process your request after verifying your identity. When we verify your identity, we may ask you to provide relevant evidence.

8. Dispute Resolution
Any dispute arising from these Guidelines and our handling of your personal information may be filed with the People's Court of Yichang City, Hubei Province. If you believe that our personal information processing has harmed your legitimate rights and interests, you can also report to the relevant government departments.

9. Concepts and Definitions
The nouns used in these guidelines have the following definitions in the common sense:
(1) Personal information: various information related to identified or identifiable natural persons recorded electronically or otherwise, including but not limited to the natural person's name, date of birth, ID number, personal biometric information, address, telephone number, etc, the anonymized information is not included.
(2) Sensitive personal information: once leaked or illegally used, it is easy to cause the personal dignity of natural persons to be violated or the personal and property safety to be endangered, including biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts and other information, as well as personal information of minors under the age of 14, for example, sensitive personal information includes ID number, personal biometric information, bank account number, communication content, health physiological information, etc.
(3) Log information: including the content you publish and browse when using the smart tool library, the operation time, type, original network address, target address, port, date and time of access, and login IP information when you publish the content.
(4) Address Book Information: Your stored contact information, including mobile phone number and name. In order to collect the above information, we may need to apply for your phone permission and storage permission to authorize us to use the device.
(5) precise positioning information: refers to GPS or base station information. In order to collect the above information, we need to apply for your authorization to use the location of the device.
(6) Transaction record: refers to the transaction time of purchase of goods or services, the purchase of products, and the price paid.
(7) Deidentification: The process by which personal information is processed so that it cannot identify a specific natural person without the help of additional information.
(8) Anonymization: The process by which personal information is processed without identifying a specific natural person and cannot be recovered.
(9) Mainland China or within Mainland China: refers to the the People's Republic of China mainland area, which is only for the purpose of these guidelines and does not include the Hong Kong Special Administrative Region, Macao Special Administrative Region and Taiwan.

Suggestions and Feedback Contact us