Mindhive Privacy Policy
Release Date: November 12, 2024
Effective Date: November 12, 2024
Welcome to use "Mindhive" (hereinafter referred to as "this software") and related services. This software and related services refer to the products and services provided to you by Guangzhou Shudi Technology Co., Ltd. (hereinafter referred to as "we" or "Dico Technology") through the client application marked with the name "Mindhive" and the website (
http://mindhive.effilaze.com/) legally owned and operated. This software is a tool for organizing text, pictures, and handwritten content into mind maps.
This privacy policy applies to our operation of this software and related services provided within the territory of the People's Republic of China. This privacy policy sets out the basis for our processing, collection, use and disclosure of any of your personal information when you visit or use this software.
This privacy policy applies to the functions and services of this software itself (including organizing content with structured hierarchical folded text, taking notes, managing tasks, making plans, generating mind maps with one click, supporting inserting pictures, multiple styles of text, and full-end cloud synchronization), and does not apply to other products or services provided by this software. You should fully understand the terms of service and privacy protection policy of the third party before choosing to use third-party services. Please properly protect your personal information and provide it to third parties only when necessary.
This software requires you to provide certain personal information to provide you with services. If you choose not to provide the data required by this software or a certain function, you cannot use this software or that function. Similarly, if we need to collect personal information in accordance with the law, but you do not provide the data, then we may have to suspend or cancel your right to use it. If this is the case, we will notify you. If you choose not to share personal data without mandatory data provision, then you will not be able to use the functions that require such data.
This policy will help you understand the following content, please read it carefully. Among them, we have highlighted the important contents of the terms regarding your personal information rights and interests in bold, please pay special attention.
1. Personal information we collect in this software
2. How we use your personal information
3. How we share, transfer, and publicly disclose your personal information
4. How we store your personal information
5. How we protect the security of your personal information
6. Your rights
7. Minors' terms
8. Third-party SDK services
9. Permissions requested in the app
10. Complaints and feedback
11. Amendments and notifications to the privacy policy
12. Others
1. Personal information we collect in this software
When you use this software and related services, we will collect and process your personal information during your use of this software after obtaining your authorization and consent.
1.1 "Personal information"
Refers to various information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. This privacy policy includes personal identity information (name), address, contact number, network identity information (including account name, email address), personal commonly used device information, location information, etc.
1.2 Personal information you provide when using this software.
When you use our products or services, you may need to provide us with your personal information: when you register for an account, we may need you to provide your mobile phone number, set your account, password, nickname, avatar and other information.
You can also use a third-party account to log in and use this software. You will authorize us to obtain the public information (avatar, nickname and other information you authorize) registered on the third-party platform for binding with this software account, so that you can directly log in and use this software and related services.
1.3 Information we collect during your use of this software.
When you use this software, in order to ensure the safe operation of this software and related services, we will automatically collect your hardware model, operating system version number, unique device identifier, network device hardware address, and software version number. In order to prevent malicious programs and necessary for security operations, we will collect information about installed applications or running processes, the overall operation, usage and frequency of applications, application crashes, overall installation and usage, performance data, and application sources.
1.4 Offline editing.
Depending on the product features, we may access the following content on your device: When you perform offline editing, you need to read the internal storage to save your documents. You can create documents through the online document collaboration function of this software, and convert them into mind maps according to the classification of the documents when writing. After the document is completed, you can generate a link to share it on platforms such as WeChat and QQ.
2. How we use your personal information
We will use the collected personal information in accordance with the provisions of this Privacy Policy and to implement the functions of this software and its related service functions.
Purpose of Use | Collecting Information | Is it related to permission application? | Can I use it after denying permission? |
Provide basic services for this software and ensure the normal operation of this software | Hardware model, network and phone status, operating system and application functions (such as MAC address), IP address, server logs, etc. | yes | no |
Clipboard Information | Text box paste function | no | no |
Take photos, store information and update this software | Photos, stored personal files | yes | yes |
We will take reasonable and feasible measures to try to avoid collecting personal information that is irrelevant to the purpose of use. If we use your personal information beyond the scope of the stated purpose and the scope that is directly or reasonably related to the use, we will inform you separately before using your personal information and obtain your explicit consent.
3. How we share, transfer, and publicly disclose your personal information
3.1 Why your personal information is shared.
Please understand that our products and services are not only provided to you by us. In some cases, in order to give you a better product experience, ensure operational efficiency and quality, and ensure operational safety, we may cooperate with our affiliates and third parties with your consent in order to give you a better product experience, ensure operational efficiency and quality, and ensure operational safety. Therefore, we may share your personal information in the process of cooperating with our affiliates and third parties to jointly provide you with services.
3.2 Sharing Principles We will follow the following principles when sharing your personal information:
Authorization and consent principle: We will not share your personal information without your consent, unless the shared personal information is de-identified and the third party sharing it cannot re-identify the natural person subject of such information. If the purpose of the third party using the information exceeds the scope of the original authorization and consent, they need to obtain your consent again.
Legality and minimum necessary principle: The shared data must have a legal and legitimate purpose, and the shared data must be limited to what is necessary to achieve the purpose.
Security and prudence principle: We will carefully evaluate the purpose of third parties using shared information, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with the cooperation legal agreement. We will conduct strict security monitoring of the software development kit (SDK) and application programming interface (API) used by partners to obtain information to protect data security.
3.3 Use and Purpose of Sharing Personal Information
In order to provide you with more complete and high-quality products and services, with your consent, some of our functions or services may be provided by the following entities, and we may also share your personal information with them: third parties or affiliates such as product function and service providers, contractors, agents, etc.; software service providers, smart device providers, system service providers, advertising partners, and application developers who jointly provide services to you with us.
We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and the scope of sharing will be limited to personal information necessary to provide services. At the same time, we will agree with our partners on strict confidentiality obligations and require them to handle your personal information in accordance with our instructions, this agreement, and any other relevant confidentiality and security measures. Our partners have no right to use the shared personal information for any other purpose. If you refuse our partners to collect personal information necessary for providing services when providing services, you may be unable to use the third-party service.
We may share personal information with affiliates and third-party partners in the following circumstances:
To help you use the relevant functions or services of the product; the quality, efficiency and safety of the service operation of our related products; to protect your legal rights or safeguard the public interest; to comply with the relevant provisions of laws and regulations; to help you participate in promotional activities; to reach a legal agreement between you and the third party, you authorize us to provide information to the third party; other purposes listed in the privacy policy.
3.4 Transfer of personal information during mergers, acquisitions, and asset transfers
We will not transfer your personal information to any other third party unless you have obtained your explicit consent.
When mergers, acquisitions, asset transfers and other transactions occur that result in sharing your personal information with a third party, we will inform you of the relevant circumstances and clearly inform the new entity holding your personal information that continues to be bound by this policy. If the purpose of using personal information is changed, we will require the entity to obtain your explicit consent again.
3.5 Rules for public display of personal information
3.5.1 We will not disclose your information publicly unless you have obtained your consent.
However, in accordance with laws and regulations, mandatory administrative law enforcement or judicial requirements, if your personal information must be provided, we may disclose your personal information to administrative law enforcement or judicial agencies based on the required type of personal information and disclosure method. When we receive a disclosure request, we require the relevant legal documents to be produced, subject to compliance with laws and regulations. We only provide data that law enforcement agencies have the legal right to obtain for specific investigation purposes. Subject to the permission of laws and regulations, the documents we disclose are protected by encryption measures.
3.5.2 Please understand that in the following circumstances, in accordance with laws and regulations and national standards, we do not need to obtain your authorization and consent to share, transfer, and publicly disclose your personal information:
* (1) Directly related to national security and national defense security;
* (2) Directly related to public security, public health, and major public interests;
* (3) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
* (4) For the purpose of safeguarding your or other individuals’ major legal rights such as life and property, but it is difficult to obtain the consent of the person concerned;
* (5) Personal information that you have disclosed to the public on your own;
* (6) Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure, and other channels;
* (7) Other circumstances stipulated by laws and regulations. 3.5.3 Special reminder
If the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information or we will not be able to establish a connection with any specific personal information and use it in combination with other personal information, then during the period of combined use, this information will be treated and protected as your personal information in accordance with this Privacy Policy. According to legal provisions, sharing and transferring personal information that has been de-identified and ensuring that the data recipient cannot restore and re-identify the subject of the personal information does not constitute external sharing, transfer and public disclosure of personal information, and the processing of such data will not require separate notification to you and your consent.
4. How we store your personal information
4.1 Storage location:
In accordance with the provisions of laws and regulations, we store your personal information collected in China within the territory of the People's Republic of China. At present, we will not transfer the above information abroad. If we transfer it abroad, we will comply with relevant national regulations or seek your consent.
4.2 Storage period:
During your use of this software, we will continue to store your personal information, and the storage period will not exceed the period required to provide you with this software and its services. After you terminate the use of this software, we will delete or anonymize your information, unless otherwise provided by laws and regulations for the retention period of specific information. If we stop operating this software, we will delete or anonymize your personal information held within a reasonable period of time in accordance with applicable laws.
5. How we protect the security of your personal information
5.1 We attach great importance to the security of your personal information.
We strive to take various reasonable physical, technical and management security measures to protect your personal information, prevent your personal information from unauthorized access and modification, and avoid data damage or loss. Our network services use encryption technologies such as the transport layer security protocol to protect the security of your data during network transmission.
5.2 We use strict data processing authority control to prevent data from being used illegally
We use a variety of data desensitization methods such as coding and shielding to enhance the security of personal information in use; we use encryption technology widely used in the industry to encrypt and store your personal information, and isolate it through data isolation technology. For example, we encrypt all messages stored on our servers and on your terminal devices. We always implement such technical measures and organizational management methods, and may revise and improve them from time to time to enhance the overall security of the system.
5.3 Unexpected Situations
Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. We will try our best to ensure the security of the personal information you provide to us.
Please be aware and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and other personal information to others.
5.4 In the event of an incident that endangers network security
We will take appropriate remedial measures in a timely manner in accordance with the network security incident emergency plan. If our physical facilities or technical protection measures are damaged, resulting in the disclosure, illegal provision or abuse of your personal information, causing damage to your legitimate rights and interests, we will strictly bear the corresponding responsibilities in accordance with the provisions of the law.
5.5 Handling of information leakage
After we learn that your personal information has been leaked, illegally provided or abused, we will promptly inform you within [10] days at the latest in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, your suggestions for self-prevention and risk reduction, and your remedial measures. We will inform you of the relevant circumstances of the incident by push notification, email, letter, SMS, etc. When it is difficult to inform the subject of personal information one by one, we will take reasonable and effective measures to issue an announcement. At the same time, we will also report the handling of the personal information security incident in accordance with the requirements of the regulatory authorities. If you find that your login name and/or other personal information may or has been leaked, please contact us immediately so that we can take appropriate measures in time to avoid or reduce related losses.
6. Your rights
6.1 How to access and correct your personal information
After you have completed the login of this software and performed reasonable and necessary identity authentication, you can query and access your user name and other basic information in the "My" of the "Mindhive" client. If you need to correct or delete your Personal information, please contact our back-end staff through the contact information provided in this privacy policy. Before you correct or modify your information, we may verify your identity to ensure the security of the information involved in the correction.
6.2 How to cancel your account
You can cancel your account in our software products. Your cancellation of your account is irreversible. Once you cancel your account, we will only retain your existing personal information for the shortest period required to achieve the purposes stipulated by laws and regulations or agreed upon by both parties. During this period, we will no longer use your personal information commercially. When your personal information exceeds the above retention period, we will delete or anonymize it.
6.3 Stop operation to inform you of your rights
If we stop operation, we will promptly stop the activities of collecting your personal information, notify you of the notice of suspension of operation by delivery or announcement one by one, and delete or anonymize your personal information in accordance with applicable laws.
7. Minor clause
If you are a minor under the age of 18, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using this software and related services.
We protect the personal information of minors in accordance with the relevant laws and regulations of the country. We will only collect, use, store, share, transfer or disclose the personal information of minors when permitted by law, with the explicit consent of parents or other guardians, or when necessary to protect minors; if we find that we have collected the personal information of minors without obtaining verifiable parental consent in advance, we will try to delete the relevant information as soon as possible.
If you are the guardian of a minor, when you have questions about the personal information of the minor you are guarding, please contact us through the contact information disclosed in this privacy policy.
8. Third-party SDK service
In order to ensure the implementation of Mindhive's related functions and the safe and stable operation of the application, we may access the software development kit (SDK), application program interface (API), application plug-in and other codes provided by partners or through other cooperation methods to achieve relevant purposes.
1. We will conduct strict security monitoring on the codes of partners who obtain information to protect data security.
2. We list the relevant partners in the directory. For the specific treatment of the partners, please refer to the privacy policy or service agreement of the partners.
3. Please note that the partner's code may cause certain changes in data processing types due to version upgrades, policy adjustments, etc. Please refer to their official instructions.
SDK Name | Purpose | Types of data collected | SDK Service Provider | Official website link |
U-APP Mobile Statistics SDK | Conduct APP operation statistics and analysis | Device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information | Umeng Tongxin (Beijing) Technology Co., Ltd. | |
Umeng+ Application Performance Monitoring SDK | Information sharing function: Collect device identification information to generate desensitized terminal user device identification and provide device application performance monitoring services | Device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information | Umeng Tongxin (Beijing) Technology Co., Ltd. | |
Crash SDK | Crash monitoring and performance monitoring | Device information ( UUID , device brand, device model, device ROM version), network information ( IP address, network type, network status), timestamp, application information (application package name, application version number), data actively uploaded by the developer (custom identification, log) | Guangzhou Dongjing Computer Technology Co., Ltd. | |
9. Permissions applied for in the application
In order to ensure the realization of Mindhive product functions and safe and stable operation, we may apply for or use relevant operating system permissions.
1. To protect your right to know, we display the relevant operating system permissions that the product may apply for and use in the following list. You can manage the relevant permissions according to actual needs;
2. According to product upgrades, the types and purposes of application and use of permissions may change. We will adjust the list in a timely manner according to these changes to ensure that you are informed of the application and use of permissions in a timely manner;
3. Please be aware that we may also use third-party SDKs for the functional and security needs of our business and products, and these third parties may also apply for or use relevant operating system permissions;
4. When using the product, you may use H5 pages or applets developed by third parties. These plug-ins or applets developed by third parties may also apply for or use relevant operating system permissions due to business functions.
Device permissions | Purpose of calling permissions | Do you ask | Can users turn off permissions? |
Allow taking photos or reading from the photo album | Help users take photos or add pictures when creating or editing content;
| yes | yes |
Floating window permissions | Used to capture images from anywhere on the system interface and insert them into notes | yes | yes |
Clipboard Information | Android Accessibility Services | no | no |
Allows to get network status | Automatically save and synchronize newly created or edited content based on network environment | yes | yes |
Allow reading of mobile phone identification code | Used to analyze and improve product functions without associating with the user's identity | yes | yes |
10. Complaints and Feedback
If you wish to raise objections or complaints about the way we handle your personal information, or if you have any questions, comments or requests related to this policy, please contact us as soon as possible at [
shudi0830@163.com], and we will process and respond to your request within [15] days.
11. Amendments and Notices to the Privacy Policy
In order to provide you with better services, this software and related services will be updated and changed from time to time. We will revise this Privacy Policy in a timely manner, and such revisions will constitute part of this Privacy Policy and have the same effect as this Privacy Policy.
Once any major changes to this Privacy Policy occur, we will make reasonable efforts to inform all users, such as by posting a notice on this software; however, you should check this Privacy Policy regularly to view the relevant changes.
Your continued access or use of this software after this Privacy Policy is updated shall be deemed as your acceptance of the updated Privacy Policy. If you do not agree to the updated Privacy Policy, you must stop accessing or using this software.
12. Others
The headings in this Privacy Policy are for convenience and reading purposes only and do not affect the meaning or interpretation of any provisions in this Privacy Policy.
The following terms are defined in this Privacy Policy:
* De-identification: refers to the process of technically processing personal information so that the subject of personal information cannot be identified without the help of additional information.
* Anonymization: refers to the process of technically processing personal information so that the subject of personal information cannot be identified and the processed information cannot be restored.
The copyright of this Privacy Policy is owned by us, and we have the right to interpret and modify it within the scope permitted by law.