Text to voice privacy policy

Updated on: October 21, 2021
Effective date: October 21, 2021
Dear user
Text to voice application is an intelligent voice service product provided by ABRAHAM COHEN CONSULTING LLC (hereinafter referred to as "ABRAHAM COHEN CONSULTING LLC"). ABRAHAM COHEN CONSULTING LLC respects your personal information and data very much, and will do its best to protect the safety and reliability of your personal information and data. This policy is only applicable to the user information and data collected and stored by the text to voice application.
Special note: the text to voice privacy policy (hereinafter referred to as "this policy") is only applicable to the text to voice software service of ABRAHAM COHEN CONSULTING LLC (hereinafter referred to as "ABRAHAM COHEN CONSULTING LLC" or "we"), hereinafter referred to as "this software" or "this service"). Before using the software, please read this policy carefully to ensure that you have fully understood and accepted all terms. Otherwise, please do not register, log in or use. Please pay special attention to the important contents about your personal information rights and interests in bold. If you are under the age of 18, please carefully read and fully understand this policy accompanied by your guardian, and use text to voice software and related services with the consent of your guardian。
This policy will help you understand the following:
1、 Definition and interpretation
2、 How do we collect and use your personal information
3、 Use of cookies and similar technologies
4、 How do we share, transfer and publicly disclose your personal information
5、 How do we protect your personal information
6、 How do we store your personal information
7、 Your power
8、 Minor clause
9、 Revision and notification of privacy policy
10、 Scope of application
11、 Other
1、 Definition and interpretation
1. Text to voice service
It refers to various dubbing production and export services provided to users by ABRAHAM COHEN CONSULTING LLC, the operator of text to voice, including voice synthesis (text to voice), live dubbing, dubbing work export, etc., hereinafter referred to as "this service"
2. Account number
It refers to the user account you enjoy after you complete the real information registration, and the user account is kept by you; You should be legally responsible for all acts under your account
3. Personal information
Personal information refers to all kinds of information recorded electronically or in other ways that can identify the personal identity of natural persons alone or in combination with other information, including but not limited toName, date of birth, ID number, personal biometric information, address and telephone number of the natural person.For the avoidance of doubt, personal information includes but is not limited to personal sensitive information.
4. Personal sensitive information
Personal sensitive information refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety and easily lead to personal reputation, physical and mental health damage or discriminatory treatment. Personal sensitive information includes but is not limited toID number, personal biometric information, bank account number, communication content and health physiological information.
5. Personal information subject
Personal information subject refers to the natural person identified by personal information.
6. Anonymization
Anonymization refers to the process that the subject of personal information cannot be identified and the processed information cannot be restored through the technical processing of personal information
7. Equipment
A device is a device that can be used to access text to voice services, such as a desktop computer, laptop, tablet or smartphone
8. Unique device identifier
Unique device identifier (exclusive ID or UUID) refers to a string of characters programmed into the device by the device manufacturer, which can be used to uniquely identify the corresponding device (IMEI number of mobile device). The unique device identifier can be used for a variety of purposes, including providing advertisements when cookies cannot be used
9. IP address
Each device that accesses the Internet will be assigned a number called an Internet Protocol (IP) address. These numbers are usually assigned by geographical region. An IP address can usually be used to identify where a device is connected to the Internet
10. SSL
SSL (secure socket layer), also known as secure socket layer, is a security protocol implemented on the transmission communication protocol (TCP / IP). SSL supports various types of networks and provides three basic security services, all of which achieve the effect of information confidentiality by using public key and symmetric key technology
11. Information collection technology
The "automatic collection" described by ABRAHAM COHEN CONSULTING LLC in the text to voice privacy policy includes the following methods:
(1) Cookies (network cookies)
Cookie is a small text file placed on the client (in your computer, mobile phone or other intelligent terminal) by the website server when you browse the web page, which can be used to improve your use experience
(2) Log files
Log files stores a number of automatically collected data. Such data includes Internet Protocol (IP) address, browser type, Internet service provider (ISP), reference / exit page, operating system, date / timestamp and click stream data
(3) Et tag (entity tag)
Et tag is an HTTP protocol header transmitted behind the Internet browser and Internet server. It can replace cookies to track individual users, so that we can better understand and improve our services
(4) JavaScript (scripting language)
JavaScript is a programming language for making more interactive and dynamic web pages. JavaScript can set cookies, read cookies and delete cookies.
2、 How do we collect and use your personal information
ABRAHAM COHEN CONSULTING LLC collects and uses your personal information for the purposes described below in accordance with the principles of legality, legitimacy and necessity.
1. Personal information you actively provide in the process of providing you with products and / or services
In order to realize our basic business functions, you need to provide us with your personal information. If you refuse to provide it, we will not be able to provide you with corresponding services. Note: if you provide personal information other than your own, please ensure that you have obtained the consent of the relevant subject
(1) If you choose to register a text to voice account, you need to provide us with your mobile phone number and verify your identity by entering the SMS verification code. By logging in to your account, you can view your historical works, draft works, gold coin balance, consumption records and member status. After you change your device, you can view your relevant information by logging in to your account, and there will be no data loss due to changing your mobile phone
(2) When you use live dubbing, add background music and other functions, after you agree to open the permission to access the photo album and read the SD card, we will collect the picture / video and audio information in your mobile phone as the material for dubbing production
(3) When you need to export the dubbing works to the computer / USB flash drive through your mobile phone, after you agree to turn on the camera / camera permission, we will call up the camera of your mobile phone for code scanning and downloading
(4) When you use the text to speech core synthesis function, in order to save resources and response time, we need to read the local cache of your mobile phone. If you choose local materials for production, we need to read the SD card of your mobile phone to get your local audio, video and picture list for you to choose. In the production process, we need to completely save the text content you input, the selected speaker, and the uploaded local audio, video and picture materials to ensure the synthesis of the works you need. After production, if you choose to export to local, we need to write your SD card to import your works to local
(5) When you communicate with customer service or participate in text to voice online / offline activities, we may need to collect your name, telephone, email, address, mobile phone contact, bank account and other sensitive information in order to send you gifts, notify or contact you in time, or refund you. You may refuse to provide, but this may cause us to be unable to provide services to you or you may not be able to participate in our activities
(6) In addition to synthetic dubbing, text to speech also provides live dubbing services, and recruits live anchors for the society. If you participate in the recruitment of live anchor, you need to provide your address, contact information (including but not limited to mobile phone number, wechat, email address), time engaged in dubbing industry, good dubbing style and other personal information, so that we can contact you later and evaluate whether we cooperate or not
(7) In order to ensure the security of your account and system, you need to provide us with your account at the time of registration / login, so that we can verify your user identity. If you do not provide the above information, we may not be able to feed back the consultation results to you in time, but it will not affect your normal use of text to voice products and / or services
You understand and agree that the above services may require you to open the access rights of your camera (camera), photo album (Picture Library), folder, calendar and / or phone status in your device to realize the collection and use of the information involved in these rights。You can check the status of the above permissions one by one in your device settings, and you can decide whether these permissions can be turned on or off at any time.Please note that if you open any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. If you close any permission, you cancel the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, nor can we provide you with the services corresponding to the permission. However, your decision to close the permission will not affect the previous information collection and use based on your authorization.
In order to facilitate you to further clarify the authority of the software and call your personal information, we summarize the call as follows:
Call permission
Business function
Call purpose
Request timing
Read write SD card
Read, modify / delete SD card
In order to cache the first startup flag, product initialization is performed; Resources required to load product functions; Read local materials, make works and export works
Pop up query when using the application for the first time
Read phone status and identity
Obtain IP address, Wi Fi MAC address, international mobile device identification code (IMEI), international mobile user identification code (IMSI), unique device identification code (androidid / IDFA / openudid / GUID) and SIM card information; Collect mobile phone model, system type, system version, network environment, gateway number acquisition error log, etc
Read the network log, verify the version and equipment, and ensure the service security; Verify the user's identity to prevent the user's account from being stolen
Pop up query when using the application for the first time
Telephone authority
One click login, SMS notification
Use the local number to log in with one click, or send SMS verification code when logging in / registering
Request when user agrees to log in or register
Album permissions
Make live dubbing
Read local video and audio for reference and background sound when live dubbing
Request when uploading resources by live dubbing
Get the mobile phone software installation list
Third party login and work export
When using a third party to log in or export works, it is necessary to identify whether the corresponding software is installed to invoke the software for login authorization or export
Request every time you log in or export
Note: the above third party interfaces include: WeChat login, Alipay login, Union statistics, Ali cloud service
2. Personal information we actively collect in the process of providing you with products and / or services
On the premise of compliance with laws and regulations, in order to ensure the security of your account and better provide you with high-quality services, we will collect and use the following information generated in the process of using text to voice products and / or services:
(1) Equipment information
Text to speech has a unique application ID. after you install text to speech, this ID and a message containing whether the installation is successful will be returned to text to speech. When you use text to voice products and / or services, we may receive and record your relevant device information according to your specific permissions in software installation and use, so as to ensure your account and use security, including IP address, Wi Fi MAC address, international mobile device identification code (IMEI), international mobile user identification code (IMSI), and unique device identification code (Android ID / IDFA / openudid / GUID), SIM card information; mobile phone model, system type, system version, network environment, gateway number acquisition error log, APP installation information, device settings, resolution, device sensor parameters, service provider network ID, access network method, type and status, network quality data, etc
(2) Log information
When you use text to voice products or services, in order to ensure your normal use of the software and account security, maintain the normal operation of the service, and ensure service stability and network security, ABRAHAM COHEN CONSULTING LLC's server will automatically record the daily records related to the operation process and content. Such information packages provide you with the detailed use of text to voice, including text to voice Voice software version number, operating system information, login IP information, service failure information, network status, operator, access date and time, device crash, etc. user operation will trigger event statistics, including speaker, setting item information, use times of some keys and functions when using text to voice, etc. These data are anonymous and through data statistics To improve and optimize the service experience
(3) Location information
When you turn on the device location function, we will record the location information of your device after asking for your consent (most mobile devices will allow you to turn off the location service. For specific methods, we suggest you contact your mobile device service provider or manufacturer) , and provide us with geographic distribution information of business analysis. If you don't want to be accessed, you can choose to turn off relevant functions in devices or products / services
(4) Browse records
When you use text to voice products and / or services, in order to improve the relevant functions of text to voice products and / or services and provide you with a better service experience, we will collect your relevant browsing information, including viewing content, input text content, creative work records, download records and consumption records. Your works and contents, as well as all gold coins and services The member status and other data will be transmitted to the server of ABRAHAM COHEN CONSULTING LLC, and stored and associated with your account information, so as to provide you with consistent services under the same account of different devices
(5) Order information
After you recharge or trade, we will collect the order information from your text to voice (order number, order source, user ID, order price, actual payment price, payment method (Alipay, WeChat), create order time, order payment time) to show you and facilitate the management of your order.
In order to provide you with better products and services, our customer service personnel may use your account information / order information to pay a return visit to you by telephone, SMS or email. If you do not want to participate in the return visit, you can unsubscribe according to the introduction bank after receiving the return visit information. Not participating in the return visit will not affect your use of other functions of the software
3. Your personal information we obtained from a third party
Third party SDK. Some functions in text to voice are provided by our cooperative third-party organization (hereinafter referred to as "SDK technical service provider") in the form of SDK plug-ins. The SDK technical service provider will obtain corresponding permissions and information based on the functions or services provided to you. Please read our SDK list below in detail, Understand the SDK name, SDK technical service provider and SDK application scenario (i.e. SDK type) of our specific integration And the permissions and personal information types obtained by the SDK. We have conducted security monitoring on the SDK integrated in the software to ensure that these SDKs only use the basic permissions for realizing their functions or services. After you click to agree to this policy, you also authorize and agree that the SDK technical service provider obtains and processes your permissions and information according to the following table.
SDK name
type
company
Get permission
Personal information type
Device information acquisition list
Mobile phone system
Facebook
Sign in
www.facebook.com
Read phone status and identity
Access device status and identity
Networking, obtaining network status, obtaining Wi Fi status, obtaining mobile phone status permission
Android and IOS
Alibaba cloud services
alicloud services, login, OSS storage
Alibaba Group Holdings Co., Ltd.
read phone status and identity
access device status and identity
networking and obtaining network status
Android and IOS
wechat sharing
share
Shenzhen Tencent computer system Co., Ltd.
read phone status and identity
access device status and identity
networking, obtaining network status, obtaining Wi Fi status, obtaining mobile phone status permission
Android and IOS
alliance statistics
statistics
Youmeng Tongxin (Beijing) Technology Co., Ltd.
read phone status and identity
access device status and identity
network connection information, common device information, device MAC address, unique device ID (IMEI / Android ID / IDFA / openudid / guid, SIM card IMSI information)
Android and IOS
QQ share
share
Baidu online network technology (Beijing) Co., Ltd.
read phone status and identity
access device status and identity
networking, obtaining network status, obtaining Wi Fi status, obtaining mobile phone status permission
Android
wechat payment
payment
Shenzhen Tencent computer system Co., Ltd.
read phone status and identity
access device status and identity
networking, obtaining network status, obtaining Wi Fi status, obtaining mobile phone status permission, reading and writing data
Android
Alipay pays
payment
Alibaba Group Holdings Co., Ltd.
read phone status and identity
access device status and identity
networking, obtaining network status, obtaining Wi Fi status, obtaining mobile phone status permission, reading and writing data
Android
If you want to delete the data collected by the app, please use the in-app logout feature.
For your convenience, we list the address of the privacy policy (or privacy related instructions) of the third-party SDK with privacy policy as follows:
Series SDK of Shenzhen Tencent computer system Co., Ltd:https://privacy.qq.com/
Alibaba cloud service SDK:http://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud201902141711_54837.html?spm=a2c4g.11186623.2.6.117a123eVzRrTd
Alipay pays SDK:https://render.alipay.com/p/c/k2cx0tg8
Youmeng push SDK:https://www.umeng.com/policy
Our products are integrated with Youmeng + SDK. Youmeng + SDK needs to collect your device MAC address and unique device ID(IMEI/android ID/IDFA/OPENUDID/GUID、SIM Card (IMSI information) to provide statistical analysis services, calibrate the accuracy of report data through geographical location, and provide basic anti cheating ability.
3、 Use of cookies and similar technologies
Cookies and similar technologies are common technologies in the Internet. When you use the "text to voice" software and related services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We use cookies and similar technologies mainly to realize the following functions or services:
(1) Ensure the safe and efficient operation of products and services
We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you log in to the service safely, or whether you encounter illegal acts such as embezzlement and fraud. These technologies will also help us improve service efficiency, login and response speed
(2) Help you get an easier access experience
Using this technology can help you avoid repeating the steps and processes of filling in your personal information and entering search content.
4、 How do we share, transfer and publicly disclose your personal information
There is no entrusted third party to process your personal information in text to voice. We will share, transfer and publicly disclose your information in accordance with the following rules
(1) Sharing and transfer of personal information
We will not share or transfer your personal information to a third party unless it is authorized and agreed by you in advance, or the shared or transferred personal information is the information after de identification, and the sharing third party cannot re identify the natural person subject of such information
1. Personal information we may share under the following circumstances
(1) Shared with business partners for specific functions
When a software service provider, intelligent device provider or system service provider cooperates with us to provide services for you, such as when you need to use the geographic location function, we may collect your location information and related device information (such as hardware model, operating system version number, international mobile device identification code (IMEI) to realize this function . the network device hardware address (MAC)) is de identified and provided to the above providers. You can refuse to provide such information without affecting your use of other services
(2) Help you participate in marketing activities
When you choose to participate in the relevant marketing activities held by us, you can provide name, mailing address, contact information, bank account number and other information according to the needs of the activities, so that the third party can provide you with prizes in time. When you choose to participate in the relevant marketing activities held by us, you can provide name, mailing address, contact information, bank account number and other information according to the needs of the activities. With your express consent, we will share the above information with a third party so that we can entrust a third party to provide you with prizes in time
2. Prudent evaluation and responsibility constraints on the third party subject sharing personal information
(1) With your consent, we will only share with third parties the information necessary to achieve the purpose. If a third party really needs to use personal information beyond the scope of the above authorization due to business needs, the third party will need to ask for your consent again
(2) For the third parties with whom we share your personal information, these third parties will sign a confidentiality agreement with us. At the same time, we will evaluate its data security capability and environment, and require third parties to handle the information with confidentiality and security measures no less than those required by this privacy policy
(3) Transfer of personal information during acquisition, merger and reorganization
With the continuous development of our business, we may carry out merger, acquisition and asset transfer, and your personal information may be transferred. In case of the above changes, we will continue to protect your personal information in accordance with laws and regulations and security standards not lower than those required by this privacy policy, or require the successor of personal information to continue to protect your personal information, otherwise we will require the successor to obtain your authorization and consent again
(2) Public disclosure of personal information
Except that we will disclose the necessary information of relevant accounts when announcing the punishment for illegal accounts and fraud, we will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. We will adopt security measures that meet industry standards for the public disclosure of your personal information
(3) Exemption from personal information agreed to be shared, transferred or publicly disclosed according to law
Please understand that under the following circumstances, according to laws, regulations and national standards, we do not need your authorization to share, transfer and publicly disclose your personal information
1. Directly related to national security and national defense security
2. Directly related to public safety, public health and major public interests
3. Directly related to criminal investigation, prosecution, trial and judgment execution
4. For the purpose of safeguarding your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain your consent
5. Your personal information disclosed to the public by yourself
6. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
5、 How do we protect your personal information
(1) We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management) to protect your personal information and prevent your personal information from being accessed, publicly disclosed, used, modified, damaged, lost or leaked without authorization
(2) We will protect your personal information by reasonable and feasible means such as encryption technology and anonymous processing no lower than those of our peers in the industry, and use security protection mechanism to prevent your personal information from malicious attacks
(3) We will establish a special security department, security management system and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audit on data and technology in a timely manner
(4) Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we try our best to strengthen security measures, it is impossible to always ensure the 100% security of information, We will try our best to ensure the security of the personal information you provide us. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take positive measures to protect the security of your personal information, including but not limited to not disclosing your account password and other personal information to others
(5) We will formulate an emergency response plan and immediately start the emergency plan in case of user information security events, so as to prevent the expansion of the impact and consequences of such security events. Once a user information security event (leakage or loss) occurs, we will timely inform you of the basic situation and possible impact of the security event, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant information of the event in the form of e-mail, letter and SMS. If it is difficult to inform you one by one, we will make an announcement in a reasonable and effective way. At the same time, we will also report the disposal of user information security events in accordance with the requirements of relevant regulatory authorities
(6) We would like to remind you that the personal information protection measures provided in this privacy policy are only applicable to "text to voice" software and related services. Once you leave the "text to voice" and related services, browse or use other websites, services and content resources, we have no ability and obligation to protect any personal information submitted by you in the software and websites other than the "text to voice" software and related services, whether you log in, browse or use the above software and websites based on "text to voice" Link or guide to.
6、 How do we store your personal information
This product and / or service are restricted to the whole world.
1. Where to store information
ABRAHAM COHEN CONSULTING LLC complies with the provisions of laws and regulations. Except for:
• there are clear provisions in laws and regulations
• obtain your explicit authorization
• you conduct cross-border transactions and other personal initiatives through the Internet
2. Duration of information storage
In general, ABRAHAM COHEN CONSULTING LLC retains your personal information for the shortest time necessary to achieve the purposes described in this policy. The personal information used to identify your personal identity and reflect relevant activities will be retained until the user logs off the account, unless required or allowed by law to retain this information for a longer period of time. However, under the following circumstances, ABRAHAM COHEN CONSULTING LLC changes the storage time of personal information to meet the legal requirements:
• to comply with applicable laws and regulations
• to comply with the provisions of court decisions, rulings or other legal proceedings
• to comply with the requirements of relevant government authorities or legally authorized organizations
• ABRAHAM COHEN CONSULTING LLC has reason to believe that it needs to comply with laws and regulations
• use reasonably necessary to implement relevant service agreements or this policy, safeguard social and public interests, and protect the personal and property safety or other legitimate rights and interests of ABRAHAM COHEN CONSULTING LLC's customers, ABRAHAM COHEN CONSULTING LLC, other users or employees. After you stop using text to voice, ABRAHAM COHEN CONSULTING LLC will stop collecting and using your information, unless otherwise stipulated by laws, regulations or regulatory authorities
When the operation of text to voice related services stops, ABRAHAM COHEN CONSULTING LLC will notify you in the form of announcement, and delete your personal information retained in the server or anonymize it within a reasonable period of time.
7、 Your rights
We attach great importance to your management of personal information and try our best to protect your rights to access, modify (update or correct), delete and withdraw your authorization and consent to your personal information, so that you can protect your privacy and security
(1) Access, correct and delete your personal information
You can manage your information in the following ways:
After you complete the "text to voice" account registration, login and carry out reasonable and necessary authentication, you can view, modify and delete the personal information you submitted to the "text to voice" software and related services (including deleting your saved works, modifying nicknames and avatars)
(2) Manage, revoke, and authorize your information
Please understand that specific business functions and services will require your information to be completed. After you withdraw your consent or authorization, the company cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, nor will it process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the company's previous personal information processing based on your authorization < / BR >. (3) Complaints and reports
You can complain or report according to our publicity system. If you think your personal information rights may be infringed, or find clues to infringe your personal information rights, you can contact us by clicking "my" to enter the opinion feedback interface. We will feed back your complaints and reports within 30 working days after verification
(4) Access privacy policy
You can register on the registration page or log in to your personal account[my] - [settings] - [about]View the entire contents of this privacy policy.
(5) Stop operation and inform you of your rights
If we stop operation, we will stop collecting your personal information in time, notify you of the notice of stopping operation in the form of service or announcement one by one, and delete or anonymize your personal information
(6) Cancel account
You have the right to cancel your account. You can contact our customer service to help you cancel your account. In order to ensure security, we may need you to provide corresponding ways to prove your identity and the legitimacy of your request (mobile phone + SMS verification code, or account + password). After successful verification, we will complete the cancellation for you within 7 working days. After you log off successfully, we will delete your personal information or anonymize it as soon as possible according to the requirements of laws and regulations. You can also log off yourself by following the steps below:
• log in to the account that needs to be logged out
• click on the bottom navigation "my"
• click on the "Settings" entry
• click on the "security center" entry
• click the "account cancellation" entry
• click "confirm logout"
Please note that in order to ensure the safety and responsibility traceability of customer service and online / offline activities, according to the time requirements specified in the activities you participate in (including but not limited to novice gift bags and other activities) (for example, the same user cannot participate in an activity repeatedly within half a year), We will continue to retain the personal information you provide in the customer service and participation activities within half a year or within the time limit otherwise specified in the relevant activities you participate in. After reaching the above time limit, we will delete or anonymize these information.
8、 Minor clause
If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using the "text to voice" software and related services
We protect the personal information of minors in accordance with relevant national laws and regulations, and will only collect, use, share or disclose the personal information of minors when permitted by law, explicitly agreed by parents or other guardians or necessary for the protection of minors; If we find that we have collected the personal information of minors without the prior consent of verifiable parents, we will try to delete the relevant information as soon as possible
If you are the guardian of a minor, if you have any questions about the personal information of the minor under your supervision, please contact us through the contact information publicized in this privacy policy.
9、 Revision and notification of privacy policy
(1) In order to provide you with better services, "text to voice" software and related services will be updated and changed from time to time. We will revise this privacy policy from time to time. Such revisions constitute a part of this Privacy Policy and have the same effect as this privacy policy. However, without your express consent, we will not reduce your rights under this privacy policy currently in force
(2) After the privacy policy is updated, we will send the updated version to the "text to voice" application client and the official website, and remind you of the updated content in an appropriate way before the updated terms take effect, so that you can know the latest version of the privacy policy in time. If you continue to use our services, you agree to accept the content of the revised policy, but if the updated content needs to collect audio and video, obtain your mobile phone number and personal sensitive information of geographical location, you will still ask for your consent in a significant way again
(3) For major changes, we will also provide more significant notices (we will explain the specific changes in the privacy policy by including but not limited to email, SMS, private letter or special tips on the browsing page)
Major changes referred to in this privacy policy include but are not limited to:
1. Significant changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, and the use of personal information
2. Significant changes have taken place in our ownership structure and organizational structure. Such as all changes caused by business adjustment, bankruptcy and M & A
3. The main objects of personal information sharing, transfer or public disclosure have changed
4. Significant changes have taken place in your right to participate in personal information processing and the way in which you exercise it
5. When the responsible department, contact information and complaint channels responsible for handling personal information security change. < H5 > X. scope of application < / H5 > This privacy policy applies to all services provided by ABRAHAM COHEN CONSULTING LLC, including text to voice client and website
This privacy policy does not apply to:
1. Other third-party products or services, which may include products or websites and advertising content displayed to you in personalized recommendations or other products or websites linked in text to voice services
2. Other third parties that advertise text to voice services
Your use of these third party services (including any personal information you provide to these third parties) will be subject to the service terms and privacy policies of these third parties (rather than this Privacy Policy). Please read the terms of the third party carefully for specific provisions. Please protect your personal information properly and provide it to third parties only when necessary. The "text to voice" and related services described in this privacy policy may vary according to the mobile phone model, system version and software application version you use. The final products and services are subject to the "text to voice" software and related services you use
If you have any questions, comments or suggestions on the content of this privacy policy, you can contact us by logging in to the "feedback" page in the "text to voice" client or through customer service. < H5 > Xi. Others < / H5 > Any dispute related to this policy shall be settled by both parties through friendly negotiation; If no settlement can be reached through negotiation, you hereby agree to file a lawsuit with the people's court where the company is located
If any provision of this policy is ruled or ruled invalid by any court of competent jurisdiction, such provision will be removed from this policy, but the invalidity of such provision will not affect the effectiveness of the remaining provisions of this policy. The remaining provisions of this policy will continue to be implemented.