Inspur Cloud Legal Statement and Privacy Policy
Updated: 2024-12-4
Reminder terms
Your trust is very important to us. We are well aware of the importance of user information security, and we will take security protection measures in accordance with the requirements of laws and regulations to ensure the security and control of your user information. In view of this, Inspur Cloud (or referred to as “we” or “us”) formulates this “Legal Statement and Privacy Policy” (hereinafter referred to as “Statement and Policy”) and reminds you that before using the services of Inspur Cloud website, please be sure to carefully read and thoroughly understand this “Legal Statement and Privacy Policy”, and you can use relevant products and services only after you confirm that you fully understand and agree that. Once you start to use Inspur Cloud services, it will be deemed to have accepted and recognized the content of this statement and policy. If you have any questions, comments or suggestions about the content of this statement and policy, you can contact us through the customer service phone number or other contact information published on the official website.
Definition
Inspur Cloud website: It refers to the official website of Inspur Cloud (domain name: cloud.inspur.com).
Inspur Cloud: Unless otherwise agreed, it refers to Inspur Cloud Information Technology Co., Ltd. and its affiliates.
User information: User information refers to the user-related information submitted by your account or collected by Inspur Cloud when you use Inspur Cloud services and in order to provide services to you, such as name, organization name, contact information, etc.
Legal Statement
I. Ownership of rights
1.1 The Logo, “Inspur Cloud”, “inspur Inspur Cloud” text, graphics and their combinations used for identifying Inspur Cloud in the website of Inspur Cloud are registered trademarks of Inspur Information Technology Co., Ltd. Without the written authorization of Inspur Cloud, no one shall display, use or otherwise process (including but not limited to copying, disseminating, displaying, mirroring, uploading, downloading) in any way, nor shall you indicate to others that you have the right to display, use or otherwise process.
1.2 The intellectual property rights of all products, services, technologies and all programs (hereinafter referred to as “technical services”) of Inspur Cloud website belong to Inspur Cloud or its right holders.
1.3 Unless otherwise stated by Inspur Cloud, Inspur Cloud has all rights (including but not limited to copyright, trademark right, patent right, trade secret and all other related rights) to publish documents and other information (including but not limited to text, graphics, pictures, photos, audio, video, icons, colors, layout design, and electronic documents) on the website. Without the permission of Inspur Cloud, no one shall use the above content (including but not limited to monitoring, copying, rebroadcasting, displaying, mirroring, uploading, and downloading any content in the Inspur Cloud website through programs or equipment).
II. Limitation of Liability
Inspur Cloud hereby reminds you that you shall abide by the laws of the People’s Republic of China during the use of Inspur Cloud services, shall not endanger network security, and shall not use Inspur Cloud services to engage in activities that infringe on the reputation, privacy, intellectual property rights and other legitimate rights and interests of others. Notwithstanding the foregoing tips, Inspur Cloud does not assume any responsibility for the use and purpose of your use of Inspur Cloud services.
III. Protection of intellectual property rights
We respect intellectual property rights and oppose and combat any infringement of intellectual property rights. If any organization or individual believes that the web content of the Inspur cloud service website may infringe its legitimate rights and interests, it can submit a written notice of rights to Inspur Cloud, and Inspur Cloud will lawfully deal with it as soon as possible after receiving the confirmation notice from the intellectual property right holder.
Privacy Policy
Inspur Cloud (hereinafter referred to as “we” or “us”) respects and protects user information, and will treat such information with a high degree of diligence and prudence. When you use the services provided by the Inspur Cloud service website, we will collect, process and disclose your information in accordance with this privacy policy. Please read and fully understand this privacy policy before registering and using Inspur cloud services. If you have any questions about this Privacy Policy, you can contact us through the contact details set out in this Privacy Policy.
This Privacy Policy will help you understand the following:
I. Scope of Application of this Privacy Policy
II. How We Collect and Use Your User Information
III. How We Use Cookies and Similar Technologies
IV. How We Store Your Information
V. Sharing, Transfer and Public Disclosure of User Information
VI. User Business Data
VII. User Information Management
VIII. How We Protect Your Information
IX. Special Agreements on the Information of Minors
X. Updates to this Privacy Policy
XI. How to Contact Us
I. Scope of application of this Privacy Policy
1.1 This Privacy Policy applies to all services of the Inspur Cloud service website. Services include providing you with page browsing and website login services, as well as technical services provided to you through the Inspur Cloud service website or through non-official website channels by Inspur Cloud technical personnel.
1.2 It should be noted that if you, as a user of Inspur Cloud services, use the cloud services of Inspur Cloud to provide services for your users, you should separately agree with your users on the privacy policy because your business data belongs to you.
1.3 This Privacy Policy does not apply to services provided to you by other third parties.
1.4 If the information you provide to the Inspur Cloud service website or other users in the Inspur Cloud service website contains the information of others, you should ensure that you have obtained legal and sufficient authorization before providing such information.
II. How We Collect and Use Your User Information
The sensitive personal information involved in this Privacy Policy is mainly used to meet the needs of cash withdrawal services, biometric login, and ICP filing functions. Such information may produce highly sensitive information after being combined, correlated and analyzed, and it may be subject to unauthorized viewing or unauthorized changes, which will cause serious harm to the security of your personal information and property. “Sensitive personal information” as used in this article includes:
(1) Network identity information: including system account, IP address, and email address.
(2) Personal commonly used device information: including hardware model, operating system type, IP address, and changeable device identification code (Android ID is collected for Android clients, and Device ID is collected for iOS clients)
(3) Biometric information: facial features, voice information, and voiceprints.
2.1 Collection of User Information
2.1.1 During your use of the services, we will receive and record information about the device you use (such as the device model, operating system version, device settings, unique device identifiers and other software and hardware characteristics) and the location of the device (such as IP address, GPS location, and sensor information such as Wi-Fi access points, Bluetooth, and base stations that can provide relevant information) according to the specific permissions you grant in the installation and use of the software. We may associate the first two types of information so that we can provide you with a consistent service across devices.
2.1.2 When you use the services provided by our website or client, we will automatically collect the details of your use of our services and keep them as relevant web logs. For example, the content of your search query, IP address, browser type, telecommunications operator, language used, date and time of access, and the history of the web pages you visit, etc.
2.1.3 Please note that device information, log information, etc. alone cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, such non-personal information will be treated as personal information during the combined use, and we will delete and anonymize such personal information unless we have obtained your authorization or are otherwise provided by laws and regulations.
2.1.4 Based on the user’s consultation records, fault reporting records and troubleshooting processes (such as communication or call records) for user faults generated by your use of Inspur Cloud services, Inspur Cloud will record and analyze such information in order to respond to your help requests in a more timely manner and improve services.
2.2 We use the user information you submit and we collect for the following purposes:
2.2.1 To provide you with services (such as real-name authentication information and mobile phone number used to receive verification codes are the prerequisites for continuing to receive services);
2.2.2 To maintain and improve the service (e.g., the mobile phone and email of the business contact person you submit are used to receive business notifications and conduct business communication);
2.2.3 To promote and introduce products to you as permitted by laws and regulations;
2.2.4 In order to improve the security of your use of the services provided by us and our affiliates and partners, protect the personal and property safety of you or other users or the public from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc., and more accurately identify violations of laws and regulations or relevant agreements and rules of Inspur Cloud services, we may use your member information, and integrate device information, relevant network logs and the information shared by our affiliates and partners to determine the risk of your account and transactions, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis and disposal measures in accordance with the law;
2.2.5 Other uses with your permission.
III. How We Use Cookies and Similar Technologies
3.1 We collect and use your information through cookies and similar technologies. Our policy on the use of cookies is as follows:
(1) In order to ensure the normal operation of the Inspur Cloud service website, we will store, set or access Cookies on your computer or mobile device. Cookies are small data files stored in your hard disk or device memory. With the help of cookies, we can store your preferences (such as computer or mobile device language, font size and other browsing preferences).
(2) You can refuse or manage cookies by modifying your browser settings. If you turn off the use of cookies or delete the stored cookies, you need to change the user settings every time you use the Inspur Cloud service website.
(3) When you access the third-party services through our client, view the web pages created by the third party or use the application developed by the third party, you will be reminded that these third parties may place their own cookies, which are not under our control, and their use is not subject to this Policy, and you should pay attention to them. We will fulfill our legal obligations when third-party service providers take measures to protect your personal information, but we cannot guarantee that these subjects will take protection measures in accordance with our required standards, and if you find that these third-party services are at risk, we recommend that you terminate the relevant operations to protect your legitimate rights and interests. The service provider shall have its own independent privacy protection policy, and your use of third-party services is subject to its privacy policy, so you are advised to read the content of its policy carefully.
IV. How We Store Your Information
4.1 The information collected by the Inspur Cloud service website will be stored on the server of the Inspur Cloud service website in the territory of the People’s Republic of China (for the purpose of this Privacy Policy, excluding Hong Kong, Macau and Taiwan). If personal information is transferred overseas due to business needs in compliance with applicable laws, we will obtain your consent in advance, inform you of the purpose of the outbound information, the recipient, and perform the procedures stipulated by relevant laws and regulations.
4.2 We will keep the information we collect for as long as necessary to provide the product or service. However, due to complying with the requirements of laws and regulations on information retention (for example, the E-Commerce Law stipulates that the retention time of goods and services information and transaction information shall not be less than three years from the date of completion of the transaction), Inspur Cloud may extend the relevant storage period.
When your information is no longer required to achieve the purposes and uses set out in this Privacy Policy, and is no longer required to be retained in accordance with relevant laws and regulations, we will take reasonable steps to destroy or anonymize your personal information in a secure manner to make it unidentifiable and unable to be edited, modified, or used again.
V. Sharing, Transfer and Public Disclosure of User Information
5.1 Sharing
We will not share your user information with other organizations and individuals, except in the following circumstances, and you acknowledge and agree to our following practices:
5.1.1 After obtaining your explicit consent, we will share your user information with other parties;
5.1.2 We may share your user information externally in accordance with the provisions of laws and regulations, the needs of litigation and arbitration settlement, or the requirements of administrative and judicial authorities in accordance with the law;
5.1.3 We may entrust trusted partners to provide services, so we may share some of your user information with partners to provide better customer service and optimize user experience. We will only share your user information for legal, legitimate, necessary, specific and explicit purposes, and will only share the user information necessary to provide services. Our partners are not authorized to use the shared user information for any other purpose. Currently, our authorized partners include the following types: suppliers, service providers, and other partners. We send information to suppliers, service providers, and other partners who support our business, including the provision of basic technical services, the provision of consulting, analytics, and other professional services. “Control” refers to the ability to directly or indirectly influence the management of the aforesaid company, whether through ownership, voting shares, contracts or other methods recognized by the people’s courts.
5.1.4 We may access SDKs or other similar applications provided by third-party service providers, and share user information collected by us in accordance with this Policy with such third-party service providers to provide better customer service and user experience.
5.2 Transfer
We will not transfer your user information to any company, organization or individual, except in the following circumstances, and you acknowledge and agree to our following practices:
5.2.1 After obtaining your explicit consent, we will transfer your user information to other parties;
5.2.2 In the event of merger, acquisition or bankruptcy liquidation between Inspur Cloud and other legal entities, or other situations involving merger, acquisition or bankruptcy liquidation, if the transfer of user information is involved, we will require the new company or organization that holds your user information to continue to be bound by this Policy, otherwise we will require the company or organization to seek your authorization and consent again.
5.3 Public disclosure
We will only publicly disclose your user information in the following circumstances:
5.3.1 With your explicit consent or based on your active choice, we may publicly disclose your user information;
5.3.2 In order to ensure the personal and property safety of users of Inspur Cloud Platform and its affiliates or the public from infringement, we may disclose your user information in accordance with applicable laws or relevant agreements and rules of Inspur Cloud Platform.
5.3.3 We may publicly disclose your personal information under the mandatory requirements of laws, legal procedures, litigation or government authorities.
5.4 Exceptions to the prior authorization and consent of user information when sharing, transferring, or publicly disclosing user information
In the following circumstances, your prior authorization and consent are not required for sharing, transferring, or publicly disclosing your user information:
5.4.1 Related to national security and national defense security;
5.4.2 Related to public safety, public health, or major public interests;
5.4.3 Related to criminal investigation, prosecution, trial and execution of judgments;
5.4.4 For the purpose of protecting the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the individual;
5.4.5 Personal information that you disclose to the public on your own;
5.4.6 Personal information is collected from legally and publicly disclosed information, such as lawful news reports, government information disclosure, and other channels.
V. User Business Data
6.1 The data processed, stored, uploaded, downloaded, distributed, and processed by other means through the services provided by Inspur Cloud are your user business data, and you fully own your user business data. As a cloud service provider, Inspur Cloud will only strictly implement your instructions to process your business data, and will not make any unauthorized use, deletion or disclosure of your business data except for the agreement with you (including resource expiration or overdue payments, etc.) or the implementation of clear laws and regulations.
6.2 You shall be responsible for the source and content of your user business data, and Inspur Cloud reminds you to carefully judge the legitimacy of the data source and content. You shall be solely responsible for all the consequences and obligations caused by the violation of laws, regulations, departmental rules or national policies by the content of your user business data.
6.3 According to the agreement between you and Inspur Cloud, Inspur Cloud stores user business data in the data center you choose. Inspur Cloud protects the data stored in the data center of Inspur Cloud in accordance with applicable laws, except for data loss caused by your failure to comply with relevant laws and regulations or the occurrence of resource arrears or the provision of false registration information or the deletion of expired resources.
VII. User Information Management
7.1 You may request us to delete your user information under the following circumstances:
7.1.1 If our processing of user information violates laws and regulations;
7.1.2 If we collect and use your user information without your explicit consent;
7.1.3 If our processing of personal information seriously violates the agreement with you.
7.2 For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. Once you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect our previous processing of personal information based on your authorization.
VIII. How We Protect Your Information
8.1 Inspur Cloud attaches great importance to your information security. We strive to take reasonable physical, electronic, and managerial security measures to protect your user information. We will protect user information from unauthorized access, public disclosure, use, modification, damage, or loss. We will use encryption technology to improve the security of user information; We will use trusted protection mechanisms to prevent malicious attacks on user information; We will put in place access controls to ensure that only authorized personnel have access to user information.
8.2 We will take reasonable and practicable measures to avoid collecting irrelevant user information. We will only retain your user information for as long as necessary to achieve the purposes described in this policy, unless it is necessary to extend the retention period or permitted by law. After the above retention period of user information is exceeded, we will delete or anonymize your personal information.
8.3 Please understand that due to technical limitations and possible malicious means, it is impossible to ensure 100% security of information at all times in the Internet environment, even if we do our best to strengthen security measures. You need to understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. In the unfortunate event of a user information security incident (leakage, loss, etc.), we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, the suggestions you can take to prevent and reduce the risk independently, and the remedial measures for you. We will promptly inform you of the relevant circumstances of the incident by email, letter, telephone, push notification, etc., and if it is difficult to inform the user information subject one by one, we will take reasonable and effective measures to make an announcement.
8.4 At the same time, we will also report the handling of user information security incidents in accordance with the requirements of the regulatory authorities.
8.5 If we store the collected user information within the territory of the People’s Republic of China, and if we transfer personal information overseas due to business needs in compliance with applicable laws, we will obtain your consent in advance and inform you of the purpose, recipient, security measures, security risks, etc. of the user information exported abroad.
8.6 In the event that Inspur Cloud products and services cease to operate, we will take reasonable measures to ensure the security of your user information, including stopping the activities of continuing to collect user information in a timely manner; The notice of cessation of operation will be notified to the user in the form of a one-by-one delivery or announcement; and the personal information we hold will be deleted or anonymized.
8.7. Notwithstanding the foregoing security measures, please use a complex password to assist us in keeping your account secure; And keep your account, password and other information properly to avoid the disclosure of your personal information. If you find that your account, password or other information has been illegally used by others or has been used abnormally, you should notify us in a timely manner, and we will take corresponding security measures.
IX. Special Agreements on the Information of Minors
9.1 We primarily provide products and services to adults. If you are a minor, we will ask your parents or guardians to read this Privacy Policy carefully and you can use our services or provide information to us with the consent of your parents or guardians.
9.2 For minors’ personal information collected by using our products or services with the consent of their parents or guardians, we will only use, share, transfer or disclose such information as permitted by laws and regulations, with the explicit consent of parents or guardians, or as necessary to protect minors.
X. Updates to this Privacy Policy
For the purpose of providing you with better services, and in accordance with the development of our business or the requirements of changes in laws and regulations and supervision policies, we may revise this Privacy Policy from time to time. If our privacy policy changes, we will publish the latest version of the privacy policy on the Inspur Cloud website, and it will take effect immediately when it is published. You should take the initiative to review the content of this Policy. If we make material changes to the Privacy Policy, we may also send you a notice of the change through internal messages or other appropriate means, and you should pay attention to it.
XI. How to contact us
If you have any questions and comments about the content of this statement and policy, or if you have any questions and comments about the practice and operation of Inspur Cloud on this privacy policy, you can contact us in the following ways, and we will reply to your request within 10 days:
Customer service email: cloudkf@inspur.com