BlinkNote Privacy Policy

This Privacy Policy (hereinafter referred to as “This Policy”) aims to clarify the rules for the BlinkNote Notebook Software (hereinafter referred to as “This Application”) for collecting, using, storing, disclosing, and protecting user information in accordance with the International General Data Protection Principles (including, but not limited to, OECD Privacy Principles, GDPR, and EU General Data Protection Regulations) and in accordance with the principles of legality, fairness, transparency, and minimum necessity to protect the security of personal information and the legitimate interests of users worldwide. This Policy applies to all users who download, install, and use this Application, regardless of the device (mobile, tablet, computer, etc.) through which users access and use the Application Services. Once users use this App, it is considered that they have read, understood, and agreed to all terms of this Policy; if users do not agree to any terms of this Policy, please stop using this App immediately.

1. Terminology and Applicability

1.1 Core Terminology Definitions

1.1.1 Personal Information: Means information that can identify a specific natural person individually or in combination with other information, including but not limited to device information, usage records, notes related metadata, etc., excluding information that cannot be identified as a personal person after being anonymized.

1.1.2 User Data: Means all data generated by users during the use of this application, including but not limited to the contents of notes, folder classifications, to-do lists, action preferences, etc.

1.1.3 Operator: Means the development, operating entity of this Application, responsible for functional maintenance, data processing, and service delivery of this Application.

1.2 Applicability Scope

1.2.1 This Policy covers all core functions of this Application, including but not limited to all services such as note editing, saving, classification management, recycling station, to-do list editing, etc.

1.2.2 This Policy applies only to the information processing behavior of this Application, and does not apply to any third-party software, services, or links. Third-party privacy behavior is their own independent responsibility.

1.2.3 This Policy does not apply to information that users voluntarily disclose to the social public, and information that can be legally collected and used without obtaining user consent.

2. Scope and Methods of Information Collection

2.1 Required Information Collection (Following the Minimum Required Principle)

2.1.1 Basic Device Information: To ensure the proper operation of this application, adapt to different devices and optimize the usage experience, basic parameters such as user device model, operating system version, storage capacity, etc., will be collected for functional adaptation and performance optimization only, and sensitive device information such as device unique identifiers, MAC addresses, etc., will not be collected.

2.1.2 Note Related Metadata: When users create and edit notes, metadata such as file name, creation time, modification time, and classification tags of notes are collected. This is used to implement core functions such as classification, retrieval, and automatic saving of notes, without collecting the specific contents of the notes themselves.

2.2 Automatically Collected Information

2.2.1 Usage records: Users‘ basic action behaviors, including opening, editing, deleting, categorizing, and adjusting notes, are automatically recorded. These records are used to remember user usage habits and optimize functional interaction experiences. All records are stored on the user‘s local device.

2.2.2 Error Logs: When this application encounters anomalies such as crashes, freezes, and so on, anonymized error logs (not containing any personally identifiable information) will be automatically collected for troubleshooting, vulnerability remediation, and version optimization. The logs will be stored locally only and not uploaded.

2.3 Information Not Collected

2.3.1 Do not actively collect sensitive personal information such as the user‘s name, email address, phone number, geographical location, contact information, photo, camera permissions, microphone permissions, etc., and do not require the user to provide any personal identification information.

2.3.2 Do not read, collect, or upload other documents, files, and private information locally from the User, do not track the User‘s other application usage behavior, and do not use cookies and similar tracking technologies.

2.3.3 We do not collect the specific content of user notes, do not perform any form of analysis, identification or dissemination of the content of notes, and fully respect the privacy of user notes.

3. Purposes and Rules for Information Use

3.1 Core Service Usage

3.1.1 Based on the collected device information and notebook metadata, the core functions of this application, including note editing, automatic saving, classified archiving, recycling station recovery, to-do list management, etc., are implemented to ensure a normal user experience.

3.1.2 Based on user usage records, remember user action preferences (such as font size, categorization method), optimize interface layout and operation processes, and improve user usability.

3.2 Product Optimization and Improvement

3.2.1 Based on anonymized error logs, troubleshoot application failures, fix program vulnerabilities, improve the operational stability and security of this application, and optimize product performance.

3.2.2 Analyzing user feature usage frequency to understand user needs, efficiently iterating product features, streamlining application volumes, and providing more tailored services to users. All analyses are based on locally anonymous data and do not involve personal identification information.

3.3 Compliance and security assurance

3.3.1 To prevent security risks such as application abuse, malicious attacks, data tampering, and to ensure the security of this application and user devices, maintaining a normal usage environment.

3.3.2 In accordance with relevant international laws and regulations and data protection guidelines, use of user information only to the extent permitted by law, and does not exceed the scope of use stipulated in this Policy.

3.3.3 User information shall not be used for any purpose other than as stipulated in this Policy, for secondary processing or for commercial promotion without the explicit consent of the user.

4. Information Storage and Security

4.1 Storage Methods and Durations

4.1.1 All collected user information, note data, and related records are stored only on the user‘s local device, are not uploaded to any operator servers, do not perform cross-device synchronization (unless the user voluntarily turns on the personalized synchronization feature and expressly authorizes it), and only the user has access to their own data.

4.1.2 Information storage duration is consistent with the duration of user use of this App, and after user uninstalls this App, all locally stored user information, note data, and related records will be automatically deleted from the device and cannot be recovered.

4.1.3 If the user turns on the personalized sync feature, the sync data will be stored in an encrypted manner, the storage period will be consistent with the lifetime of the user‘s account, and the sync data will be permanently deleted after the user signs out of the account.

4.2 Security Measures

4.2.1 Industry-standard data encryption techniques are used to encrypt information stored on the user‘s local device to prevent data from being illegally read, tampered with, leaked, or misused.

4.2.2 Strictly limit application access permissions, only this application core functional module can access the collected information, prevent unauthorized data retrieval and access behavior, and follow data integrity and confidentiality principles.

4.2.3 Regularly optimize security protection mechanisms, promptly fix security vulnerabilities, update security policies, respond to various cybersecurity risks, and ensure the security of user information.

4.2.4 Compliance with platform security standards to ensure that the development and operation of this application conforms to the privacy and security requirements of mainstream global device platforms, and regular security testing and upgrades.

5. Information Sharing and Disclosure

5.1 Information Sharing Limits

5.1.1 Operators promise not to sell, share, transfer, or rent User information to any third party, nor to share User Note Data and Personal Information with any third party without the explicit written consent of the User.

5.1.2 If this Application integrates third-party infrastructure tools (such as local file management tools), only provides them with the minimum amount of anonymous data necessary to achieve functionality, and requires the third party to strictly comply with international privacy protection guidelines, adopt security protection measures, and not disclose any user‘s personal information.

5.1.3 If a transaction such as a merger, split, liquidation, asset transfer, etc., occurs among the operators, the user information may be transferred as part of the transaction, and the user will be notified in advance to ensure that the new holder continues to comply with all terms of this Policy, otherwise the data transfer will be terminated and the relevant information will be deleted.

5.2 Legal Disclosures

5.2.1 The disclosure of necessary user information is strictly limited to the minimum required by law, in accordance with the legal requirements of relevant international laws and regulations, judicial authorities, or regulatory bodies.

5.2.2 To protect the legitimate interests of users, operators, or third parties, in emergency situations (such as preventing malicious attacks, preventing illegal and non-compliant behavior), the necessary anonymized, de-sensitive data may be disclosed without disclosing the user‘s personal identity information.

5.2.3 Legal exemptions from disclosure with user consent are enforced in accordance with relevant international laws and regulations.

6. User privacy rights

6.1 Access and View Rights

6.1.1 Users can view their device information, notebook metadata, usage records, and other related information collected within this Application at any time to clearly understand the collection and use of the information.

6.1.2 Users can view, edit, and export the content of notes they create and related data at any time, retaining complete control over personal note information.

6.2 Rights to Modify and Delete

6.2.1 Users can self-modify notebook metadata (such as filenames, classification labels), delete individual notes or all notes, use records, and cached data. Once deleted, the data cannot be recovered.

6.2.2 Users can voluntarily empty the contents of the recycling station and completely delete deleted notes and related data; uninstalling this App will completely delete all information related to this App, without requiring additional action.

6.2.3 If the user turns on the personalized sync feature, they can sign out of their account at any time. After signing out, the sync data will be permanently deleted, and local data can be retained or not on their own choice.

6.3 Objections and right of withdrawal

6.3.1 If the User does not consent to the collection and use of related information by this Application, the User can stop using this Application, which will be considered a withdrawal of consent, and this Application will immediately stop collecting any information.

6.3.2 Users may at any time raise objections to the collection and use of information through the contact channels agreed in this Policy. The operator will respond and process promptly, adjusting the processing method of information according to the user‘s request.

6.3.3 Users may refuse unnecessary permission requests from this Application without affecting the normal use of the core functionality of this Application.

7. Third-party services and protection for minors

7.1 Description of Third Party Services

7.1.1 This Application may integrate third-party tools (such as local file management, input methods, etc.) for implementing core functionality. The privacy policies of third-party services are independently established and held responsible by the third-party services themselves, and operators are not responsible for the privacy of third-party services.

7.1.2 Operators will carefully screen third-party partners to ensure that third-party services comply with international privacy protection standards, require third-parties to collect only the minimum amount of data necessary to implement functionality, and adopt necessary security protections.

7.1.3 When users use third-party services, they should carefully read the third-party privacy policy. The third-party information processing behavior is independent of the operator.

7.2 Protection for Minors

7.2.1 This App is intended for users of all ages, does not deliberately collect any proprietary information about minors, and complies with international regulations related to the protection of privacy of minors.

7.2.2 Adolescents are advised to use this App under the guidance of a guardian to manage the content of their personal notes appropriately. The guardian can assist the minor in exercising their privacy rights, such as deleting inappropriate notes, managing usage records, etc.

7.2.3 If a minor is found to have mistakenly provided personal information, the guardian can communicate with the operator through contact channels, and the operator will assist in deleting the relevant information.

8. Policy updates and contact channels

8.1 Policy Updates

8.1.1 Operators reserve the right to revise this Policy at any time, and the revisions will follow changes in international data protection laws and regulations, product features upgrades, user needs adjustments, etc., to ensure the compliance and applicability of the Policy.

8.1.2 After the amendment of this Policy, it will be published in prominent locations within this App, effective from the date of publication; if the content of the amendment concerns the core privacy interests of users, users will be notified in advance through in-App notification, and users‘ continued use of this App will be considered as consenting to the amended Policy.

8.2 Contact channels

8.2.1 If users have any questions, objections to this Policy, or need to exercise their privacy rights and comment on privacy-related questions, they may contact the operator via the following email address: znsholding@outlook.com.

8.2.2 Operators will respond to users‘ inquiries and complaints within 5 business days after receiving the email, promptly address the relevant issues, and protect users‘ privacy rights and interests.