Information Collection & Usage
For better user experiences, we may collect the following information.
I. Product Metrics
Product metrics could help us to know which functions you like and which functions we should improve. All those information can let us know how to make our products better to fulfil what you need. All of metrics data are transferred and stored in anonymous way and totally encrypted. Only few authorized persons can access the summerized data and the original data will be removed immediately.
II. Language Modelling Data
We provide multiple languages support in several products. For auto-correction and auto- suggestion, we need to store the frequent words of what you input encrypted and locally. That will help you type more faster. If the explicit agreement granted from the user, we will send parts of input separately to the server for the respective product improvement. As the treatment of product metrics, all of those data will NOT be used by anyone directly and will be removed from server as soon as possible after the programmatic processing for better language dictionaries.
III. Crash Data
We use Google Fabric to collect the crash data from some users. All user information is anonymous and what we can see is only the device information. It could help us to deliver the qualified products and services for all users.
IV. Feedback Data
We use Zendesk as the feedback platform. Only limited and well-trained support team members can interact with the users via the platform. We recognize that your trust and suggestions make us better.
V. The Names of Contacts
We use the first and last names of user contacts to help the user can input the name faster if the user enables auto-suggestion. The contact information is encrypted and stored locally in a secured zone which cannot be accessed by other apps generally. If our keyboard apps are removed by the user, the data will be destroyed by the system automatically.
We do NOT collect any personal information, including but not limited to the credit card numbers, the phone numbers, any input in the password or secure text field and so forth.
All confidential data stored in your device and transmitted to our cloud services is encrypted and has restricted access to the corresponding usage.
Change of Control