WPS DOCS Privacy Policy

Update Date: May 19, 2022
Effective date: May 24, 2022

Thank you for choosing to use the WPS DOCS software service developed and operated by Zhuhai Kingsoft Office Software Co., Ltd. and/or its affiliates (hereinafter referred to as "we, us, our, WPS DOCS") (including WPS DOCS client running on Windows, Mac, Android, and iOS systems, WPS DOCS Quick App, WPS DOCS WeChat/QQ/DingTalk applet, WPS DOCS web terminal ( ) and WPS DOCS plug-in in WPS Office for Windows/Mac client, thereinto the WPS DOCS running on Android and iOS is abbreviated as "WPS DOCS PC Client").

Special Note:

Before you use the service, please read this policy carefully, and we will show you one by one the personal information we collect in the process of processing, managing and protecting any part or all of your use of the service. Important clauses in this policy that are (possibly) closely related to your rights and interests have been specially reminded in bold fonts, please pay attention to them.

1 Contact us

In order to effectively manage and protect your personal information, we have set up a dedicated personal information protection team and person in charge. If you have any questions, comments or suggestions about this policy or personal information protection, you can contact us in the following ways, and your request will be processed within 15 working days after we received:

2 Definition

3 How we collect and use your personal information

We collect and use your personal information for the following purposes described in this policy, which we also through the "Personal Information Collection List" to describe.

In order to provide you with services, we may need to apply to you for the following permissions within the necessary scope. We will describe the relevant operating system permissions that may be applied for and used through the "Application Permission List" , and you can manage the relevant permissions according to your actual needs. Please rest assured that we will not enable these permissions by default, and will only be accessed to achieve specific services/functions with your separate consent; even if you have authorized access to your corresponding permissions, we will only access your corresponding permissions access within the scope of authorization, and obtain corresponding information (if applicable); and you can withdraw the authorization at any time. After you withdraw the authorization, we will stop accessing the corresponding authority and will no longer be able to provide you with certain services corresponding to it. But it will not affect your enjoyment of other services provided by us.

3.1 Helping you become our user and account management

3.1.1 Register as our user

In order to help you become our user, to complete the creation of a WPS account, log in with the WPS account, and use this service, so that we can provide you with services for registering our users, we provide you with a variety of registration channels for you to choose.

When you choose to register with your mobile phone number or email address, you need to provide us with your mobile phone number, email address and password. We use these information to send verification code information for you to submit to verify whether your identity is valid.

When you choose to use a third-party account (such as WeChat, QQ, DingTalk, Weibo, Xiaomi, etc.) to register and log in to the service more conveniently, we will access and collect your expressly authorized personal information (including but not limited to: nickname, avatar, gender, region, subject to your authorization)and bind your third-party account to your account. If you refuse to provide the information under the third-party account, you cannot choose to use the third-party account to register and log in.

Please know and understand that we collect mobile phone numbers and e-mail addresses in order to obey the online real-name system requirements of relevant laws and regulations. If you do not provide such information, you may not be able to use our services that require registration.

3.1.2 Help you get back your account

When you cannot log in to your account or forget your password, and cannot receive SMS verification codes, you can retrieve your account through an account appeal. To ensure that the account you are applying to retrieve belongs to you, you need to provide your real name and ID card number, mobile phone number and photo of holding ID card by yourself, we will verify your identity information through a third- party identity verification agency, and also check the photo of holding ID card through our customer service staffs.

3.2 To provide you with online services

The functional services that we have launched and will be launched in the future that require interaction on the server are all based on your online status and after you log in to your account to upload relevant documents, pictures, photos, voices, invoices, and filled/recorded content (including manual uploading and automatic roaming) to the server, we collect the file information you upload to the server (including file type, size, number of pages, modification time, document authority, storage location, the same below) is necessary to provide you with corresponding online services.

3.2.1 Online document collaboration

In order to help you achieve online preview, editing, multi-person online collaborative editing, document sharing, real-time saving of documents to the cloud, and uploading relevant document materials (including manual upload and automatic roaming) to the cloud after logging in to your account, we will collect your Documents and document information uploaded to the cloud (including but not limited todocument type, size, document permissions, and storage location).

3.2.2 Kingsoft Conference

You can use the audio and video conferencing function provided by Kingsoft Conference in the WPS DOCS. In order to use the audio and video conference function, you need to authorize us to obtain the camera/microphone permission of the device.If you refuse to authorize, you will not be able to use this function.

3.2.3 Kingsoft Calendar

You can use the Kingsoft Calendar function in WPS DOCS to add your own schedule, event notifications, accept or send meeting invitations, and subscribe to schedule information provided by third parties. You can set permissions for your own calendar arrangements.

3.2.4 Kingsoft Form

Kingsoft Forms (website: ) provides you with the functions of creating, editing, publishing and filling out forms.

3.2.4.1 Create, edit, publish forms

When you can use the Kingsoft Form function in WPS DOCS to create, edit, and publish forms, we will check whether the content of the form is suspected of infringing on national security and interests, public interests, or other illegal activities.

3.2.4.2 fill out the form

The content of the form is edited by the originator of the form. The originator of the form has the right to decide the form and content of the form, as well as whether or not to disclose it and the scope of disclosure. The originator of the form has the right to use and own the title of the form and related analysis results it creates. WPS DOCS only as a technology provider, we will not use any information you submit in any way without your permission.

You (as the form filling party) should make your own judgment as to whether you agree to fill in the form and whether you agree to submit your personal information (including but not limited to, ID number, mobile phone number, address, WeChat ID, QQ number, bank account number, Alipay account number, geographic location). Once you fill in and submit the form, the relevant form data is under the control of the originator of the form. If you refuse to provide the answer sheet data to the originator of the form, please do not take the initiative to fill in and submit the form.

3.2.4.3 Statistics form

We will assist you to count the forms that you have posted, filled out and submitted by form respondents. As the initiator of the form, you are the collector and controller of the filled-in data, and the data you recover may contain personal information of other subjects such as the form responder. You have the right to use and control the collected form data. We only provide you with technical services for the recovery, storage and statistics of the form data, so as to facilitate your analysis and use. Without the consent of you and the relevant personal information subject of the form data, we will Your form data will not be used, processed, transmitted or shared beyond the scope of laws and regulations and the scope authorized by this policy.

3.2.4.4 Get location information

When you fill out the form including the location option, Kingsoft Forms will apply to you for location permission through WPS DOCS to obtain your l location information.

3.2.4.5 Copy and share

When you share or copy information, we need to access your clipboard and read the links and other content information contained in it to realize functions or services such as redirecting, copying, and sharing.

3.3 order and payment

3.3.1 Ordering and order management

When you purchase the value-added services of this service, we need to collect some or all of the following personal information according to the type of goods/services, including your transaction goods/service information, order number, order time, order amount, your remarks, Invoice related invoice information (invoice type, invoice header, tax ID, registered address, registered phone number, bank account, bank account number, invoice content, invoice amount, invoice remarks, invoice acceptance phone number or email address).

Please know and understand that we collect this information to help you successfully complete the purchase of goods/services, receive, query order information, and provide customer service (such as after-sales service), etc. At the same time, in order to facilitate you to understand, query and manage order information, we will collect the order information generated during your use of our services for display to you.

3.3.2 pay

In order to complete order payment and ensure transaction security, we need to collect your transaction amount, order time, order merchant, order number, payment method, payment account number, payment status information, , and communicate with payment institutions (financial institutions such as WeChat, Alipay, etc.) financial institutions) to share some or all of the aforementioned information.

3.4 improve our products or services

We will use the software information (including but not limited to version number, language type, channel number, channel type), device information, device connection information (including but not limited to browser type, operator type, network type), account information, network Location information and operation behavior data (including but not limited to document upload frequency and usage duration) are used for data analysis to understand the usage and adaptation of products, and provide data support for the development of new products and services, and the improvement of existing functions and services. For the personal information generated by your use of this service, with your authorization and consent, we may associate it with the personal information collected by you using other products/services developed and operated by us, so as to facilitate your use of our unified services in different product scenarios (such as unified account login services).

3.5 Provide you with security

In order to improve the security of your use of our services, protect the personal and property safety of you, other users or the public from infringement, and better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, to accurately identify violations of laws and regulations or our relevant agreement rules, we may use or integrate your account information, device information, network logs, as well as the frequency of your use of the service, crash data and channel distribution information to comprehensively judge the risk of your account, identity verification, detection and prevention of security incidents, meanwhile take necessary recording, auditing, analysis, and disposal measures in accordance with the law. For example, we will comprehensively analyze abnormal user account activity, multi-terminal login, abnormal traffic, etc. to protect your account security.

3.6 Customer service and after-sales

If you need after-sales service support in the process of using this service, we will check your identity and the related products or services you have purchased (if applicable) according to your account information, and will check your application information, device information, device connection information, network location information, log information, and the content of emails, screenshots, documents, public account messages, or telephone conversations with our customer service staff and other methods of submitting inquiries can help you find the cause and solve the problem.

3.7 Other uses

3.8 Exceptions to Authorized Consent

You are fully aware that in the following circumstances, we do not need your authorization and consent to process your personal information:

4 How we use cookies and similar technologies

4.1 Cookie

To ensure the normal operation of this service, we will use related technologies to store small data files called cookies on your device. Cookies usually contain identifiers, site names, and some numbers and characters. We may set authentication and security cookies to confirm whether you are safely logged in to the Services, or have experienced theft, fraud and other wrongdoing. These technologies also help us improve the efficiency of our services and improve login and responsiveness. Using cookies can also help you avoid repeating the steps and processes of filling out your personal information and entering your search content. We will not use cookies for any purpose other than those described in this policy.

4.1 Do Not Track

You can manage or delete cookies according to your preferences. You can clear all cookies saved on your device, and many web browsers have a Do Not Track feature that issues Do Not Track requests to websites. Currently, major Internet standards organization has not established policies governing how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our sites will respect your choice.

5 How we share, transfer, and publicly disclose your personal information

5.1 shared

We share your personal information under the premise of abiding by the "lawful and justifiable, least necessary and clear-purpose principles". At the same time, we will conduct a personal information protection impact assessment in advance for the sharing of personal information, and take effective technical protection measures for the output form, circulation, and use. At the level of cooperation agreements, partners are strictly required to fulfill their obligations and responsibilities for the protection of your personal information, and sign data security protection agreements with business partners before cooperation.

For your convenience, we have formulated the "Third-Party Information Sharing List" to clearly and concisely introduce our main software tool development kits (SDKs) related to your personal information sharing and access.

5.2 transfer

In principle, we will not transfer your personal information, except in the following cases:

5.3 public disclosure

We will not publicly disclose your personal information that you have not disclosed voluntarily or otherwise legally, unless the disclosure is made in compliance with laws and regulations or with your separate authorization and consent, and we will fully disclose your personal information before we publicly disclose your personal information. Evaluate and handle with industry-standard security safeguards.

6 How we protect and store your personal information

6.1 technical protection

We will strictly abide by the relevant laws and regulations of mainland China regarding the handling of personal information, and take strict security measures to protect your personal information and prevent your personal information from being accessed without authorization, publicly disclosed, used, modified, damaged or lost.

The security measures we have taken are as follows, but please understand that no security measures can be flawless.

6.2 Security System Guarantee

We establish a data security management system around the data life cycle, and improve the security of this service from multiple dimensions, including organizational construction, system design, personnel management, product technology, and personal information security impact assessment. At present, we have passed the third-level certification of information security level protection, ISO/IEC 27001:2013 information security international standard certification, and ISO/IEC 27701:2019 personal information protection international standard certification.

6.3 Information Security Incident Handling

When we learn of a security incident of personal information leakage, illegal provision or abuse, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, recommendations for you to prevent and reduce risks yourself, remedies for you, etc. The event-related information will be notified to you in the form of push notifications, and when it is difficult to inform you one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

6.4 How we store your personal information

6.4.1 storage location

By laws and regulations, we store your personal information collected and generated during operations in mainland China in accordance. At present, we will not transmit your personal information overseas. If we transmit it overseas, we will follow relevant national regulations or ask for your consent.

6.4.2 storage period

We will take reasonable and practicable steps to avoid collecting irrelevant personal information. We will only retain your personal information for the shortest period necessary to achieve the purposes described in this policy, unless you agree to extend the retention period or are permitted by law. After the storage period is exceeded, we will delete your personal information or take technical measures to anonymize it, unless otherwise stipulated by laws and regulations.

7 your rights

We attach great importance to the management of your personal information, and do our best to ensure the exercise of your rights to access, copy, correct, supplement, delete, and withdraw consent and authorization of personal information.

7.1 Change or withdraw the scope of authorization

You can change or withdraw the scope of your authorization for us to process your personal information by:

7.1.1 System permission settings

You can turn off relevant permissions, change the scope of consent or withdraw your authorization in the operating system settings of the device itself. After the authorization is withdrawn, we will no longer collect information related to this permission.

You can manage the system permission authorization (including but not limited to camera, photo album/storage, microphone, positioning) used by our products in [Me - About - Authorization Management] in the WPS DOCS mobile client.

7.2 Your personal information rights

7.2.1 Inquire and correct your personal information

You can inquire and correct your personal information through the following channels:

7.2.2 Obtaining a copy of personal information

You can obtain a copy of your personal information in the following ways, unless otherwise stipulated by laws and regulations and otherwise agreed in this policy:

7.2.3 Manage your login devices

In order to help you achieve account security management, you can manage your login device through the following methods:

7.2.4 Inquire and correct your other information

7.2.5 log out of your account

You can cancel your account in the following ways and according to the relevant prompts (if any):

Before your account is cancelled, we will verify your personal identity, security status, device information and other information, and we will help you complete cancelling after confirming that your account has no public or private documents, deleted the self- created team (if applicable), is no longer the super administrator of your enterprise (if applicable). You know and understand that the act of canceling your account is irreversible. After your account is canceled, we will delete relevant information about you or anonymization, unless otherwise required to additional processed by laws and regulations or your request.

7.3 Complaint Reporting and Response

If you have any comments or you think that your personal information rights may be violated, or find clues about violations of personal information rights, you can contact us through the contact information published in this policy. Your request will be processed within fifteen working days after we received.

7.4 Visit Privacy Policy

You can view the entire contents of this policy on theWPS DOCS mobile client [I - About - Privacy Policy].

Please understand that the relevant functions of the service described in this policy may vary according to the device model, system version, software application version and other factors you use.

7.5 Know in advance that products and/or services are discontinued

We will continue to provide you with high-quality services. If some or all of our products and/or services are forced to stop operating due to special reasons, we will notify you in a prominent position or send you a push message or otherwise notify you, and will stop the collection of your personal information, and we will delete or anonymize your personal information held within the necessary and shortest period of time in compliance with laws and regulations.

7.6 other

If your close relatives have the right to access, copy, correct or delete your relevant personal information for their own legitimate and legitimate interests after your death in accordance with the then legal and effective regulations on the processing of personal information, We encourage you to make alternative arrangements for your personal information in your will or other estate plan.

8 Protection of Personal Information of Minors

We attach great importance to the protection of minors' personal information. According to relevant laws and regulations, if you are a minor under the age of 18, please obtain the written consent of your parent or legal guardian before using this service. If you are the guardian of a minor, when you have questions about the collection and processing of the personal information of the minor under your guardianship in accordance with this policy, please contact us with the contact information provided in this policy.

Special reminder, if you are a child under the age of 14, we have specially formulated the "Kingsoft Office Children's Information Protection Statement" Before completing the registration and binding of this service, you and your guardian should also carefully read the "Kingsoft Office Children's Information Protection Statement" , after obtaining your guardian's consent to the "Kingsoft Office Children's Information Protection Statement" , you can use this service

9 How this policy is updated

10 This time of update

The main contents of this update include: