Version: V1.0.0
Effective Date: February 24, 2026
Important Notice
This directory is a core annex to the AegisSpeed Privacy Policy, comprehensively summarizing all personal information items collected by this Software during operation. Please read this entire directory carefully before using this Software to ensure you understand how we collect, use, and protect your personal information.
This directory aims to present all personal information items collected by this Software to users in a clear and systematic manner, including information types, collection purposes, legal bases, retention periods, and other key information, helping users fully understand the data processing practices of this Software.
The personal information collected by this Software can be divided into the following major categories:
| Information Type | Specific Content | Collection Method | Collection Purpose | Legal Basis | Retention Period |
|---|
| ID Number | 18-digit ID Number | User Initiative Provision | Real-Name Authentication, Account Binding | Required by Laws and Regulations | 90 days after cancellation |
| Name | Real Name | User Initiative Provision | Real-Name Authentication, Account Display | Required by Laws and Regulations | 90 days after cancellation |
| Username | Account Display Name | User Initiative Provision | Account Identification, Community Interaction | Necessary for Contract Performance | 90 days after cancellation |
| Information Type | Specific Content | Collection Method | Collection Purpose | Legal Basis | Retention Period |
|---|
| Phone Number | 11-digit Phone Number | User Initiative Provision | Account Recovery, Notification Delivery | Necessary for Contract Performance | 90 days after cancellation |
| Email Address | Valid Email Address | User Initiative Provision | Account Recovery, Notification Delivery | Necessary for Contract Performance | 90 days after cancellation |
| Information Type | Specific Content | Collection Method | Collection Purpose | Legal Basis | Retention Period |
|---|
| Login Password | Encrypted Password Hash | User Initiative Provision | Account Identity Verification | Necessary for Contract Performance | 90 days after cancellation |
| Authentication Token | JWT Token | System Generated | Session Maintenance, API Authentication | Necessary for Contract Performance | No more than 24 hours |
| Information Type | Specific Content | Collection Method | Collection Purpose | Legal Basis | Retention Period |
|---|
| Machine Code | Device Unique Identifier | Automatic Collection | Device Identification, Anomaly Detection | Necessary for Contract Performance | At least 1 year |
| Hardware Fingerprint | CPU, Memory, Disk Information | Automatic Collection | Security Check, Compatibility Assessment | Necessary for Contract Performance | At least 1 year |
| Operating System Version | Windows Version Information | Automatic Collection | Environment Assessment, Feature Adaptation | Necessary for Contract Performance | At least 1 year |
| Device Fingerprint | Comprehensive Device Identifier | Automatic Collection | Device Identification, Fraud Detection | Legitimate Interest | At least 1 year |
| Information Type | Specific Content | Collection Method | Collection Purpose | Legal Basis | Retention Period |
|---|
| IP Address | Network Connection IP Address | Automatic Collection | Security Audit, Troubleshooting | Legitimate Interest | At least 6 months |
| Access Time | Request Timestamp | Automatic Collection | Log Recording, Statistical Analysis | Legitimate Interest | At least 6 months |
| Browser Identifier | User-Agent Information | Automatic Collection | Browser Adaptation, Feature Optimization | Legitimate Interest | No more than 1 year |
| Access Path | Requested URL Path | Automatic Collection | Service Improvement, Problem Location | Legitimate Interest | At least 6 months |
| Information Type | Specific Content | Collection Method | Collection Purpose | Legal Basis | Retention Period |
|---|
| Feature Usage Records | Used Feature Modules | Automatic Collection | Service Improvement, User Experience Optimization | Legitimate Interest | No more than 1 year |
| Operation Records | User Operation Records | Automatic Collection | Problem Location, Security Audit | Legitimate Interest | At least 6 months |
| Check Results | ASAC Security Check Data | Automatic Collection | Security Assessment, Risk Identification | Necessary for Contract Performance | At least 1 year |
| Performance Data | Response Time, Resource Usage | Automatic Collection | Performance Optimization, Troubleshooting | Legitimate Interest | No more than 1 year |
Sensitive personal information refers to personal information that, once leaked or illegally used, is likely to infringe upon the dignity of natural persons or endanger personal or property safety.
| Sensitive Information Type | Specific Content | Collection Purpose | Legal Basis | Protection Measures |
|---|
| ID Number | 18-digit ID Number | Real-Name Authentication, Account Binding | User Initiative Provision, Required by Laws and Regulations | AES-256 Encrypted Storage, Strict Access Control |
| Name | Real Name | Real-Name Authentication, Account Display | User Initiative Provision, Required by Laws and Regulations | AES-256 Encrypted Storage, Strict Access Control |
- Minimization Principle: Only collect sensitive information necessary for implementing functions
- Encrypted Storage: All sensitive information is stored using strong encryption algorithms
- Access Control: Implement strict role-based access control
- Audit Trail: Record all access behaviors to sensitive information
- Periodic Review: Regularly review the necessity of sensitive information
This Software may collect the following information through third-party services during operation:
| Third-Party Service Provider | Service Name | Information Type Collected | Collection Purpose | Data Storage Location |
|---|
| Alibaba Cloud Computing Co., Ltd. | Real Person Authentication | ID Number, Name, Device Fingerprint, IP Address | Real-Name Authentication | Within People's Republic of China |
| Alibaba Cloud Computing Co., Ltd. | Cloud Server ECS | Account Information, Check Logs, Operation Logs | Service Hosting | Within People's Republic of China |
| Alibaba Cloud Computing Co., Ltd. | Cloud Database RDS | User Account Information, Authentication Information, Log Data | Data Storage | Within People's Republic of China |
| Alibaba Cloud Computing Co., Ltd. | Log Service SLS | System Logs, Access Logs, Security Logs | Log Analysis | Within People's Republic of China |
| Alibaba Cloud Computing Co., Ltd. | CDN | Access Logs, Device Information, Performance Data | Resource Acceleration | Within People's Republic of China |
| Data Type | Specific Content | Necessity | Processing Method |
|---|
| Identity Information | ID Number (18 digits) | Required | Sent to Alibaba Cloud for authenticity verification |
| Identity Information | Name (Real Name) | Required | Sent to Alibaba Cloud for authenticity verification |
| Device Information | Device Fingerprint, IP Address | Required | Used for risk control and anti-cheat |
| Data Type | Specific Content | Necessity | Processing Method |
|---|
| Account Information | ID Number, Name, Phone Number, Email | Required | Stored in Alibaba Cloud RDS database |
| Account Credentials | Encrypted Password Hash Value | Required | Stored in Alibaba Cloud RDS database |
| Authentication Token | JWT Token | Required | Stored in server-side session |
| Machine Information | Machine Code, Hardware Fingerprint, OS Information | Required | Stored in Alibaba Cloud RDS database |
| Check Logs | ASAC Security Check Results, Timestamps | Required | Stored in Alibaba Cloud RDS database |
| Operation Logs | User Operation Records, System Operation Logs | Required | Stored in Alibaba Cloud SLS log service |
| Data Type | Specific Content | Processing Purpose |
|---|
| System Logs | Service Start/Stop, Error Information, Exception Stack | Troubleshooting, Problem Location |
| Access Logs | Request Time, Request Path, Response Status | Security Audit, Traffic Analysis |
| Security Logs | Login Attempts, Permission Verification, Abnormal Access | Security Monitoring, Incident Investigation |
| Performance Logs | Response Time, Resource Usage | Performance Optimization |
| Data Type | Specific Content | Processing Purpose |
|---|
| Access Logs | Access Time, Access Page, Source Address | Access Analysis, Hotspot Analysis |
| Device Information | Browser Type, Operating System, Network Type | Adaptation Optimization |
| Performance Data | Loading Time, Cache Hit Rate | Performance Optimization |
| No. | Processing Activity | Personal Information Type | Processing Purpose | Legal Basis | Retention Period | Sharing Third Party |
|---|
| 1 | User Registration | ID Number, Name, Password, Contact Information | Account Creation and Management | Necessary for Contract Performance | 90 days after cancellation | Alibaba Cloud Computing Co., Ltd. |
| 2 | Identity Authentication | ID Number, Name | Real-Name Authentication | Required by Laws and Regulations | At least 3 years | Alibaba Cloud Computing Co., Ltd. |
| 3 | Security Check | Machine Code, Hardware Information, System Information, Device Fingerprint | Security Assessment | Necessary for Contract Performance | At least 1 year | None |
| 4 | Account Login | IP Address, Login Time, Authentication Token | Identity Verification, Security Audit | Necessary for Contract Performance | At least 6 months | None |
| 5 | Service Usage | Operation Records, Performance Data, Used Features | Product Optimization | Legitimate Interest | No more than 1 year | None |
| 6 | Legal Compliance | Various Data | Regulatory Cooperation | Required by Laws and Regulations | As per legal requirements | Relevant authorities |
| 7 | Log Recording | System Logs, Access Logs, Security Logs | Troubleshooting, Security Audit | Legitimate Interest | At least 6 months | Alibaba Cloud Computing Co., Ltd. |
| 8 | CDN Acceleration | Access Logs, Device Information | Resource Acceleration, Performance Optimization | Legitimate Interest | No more than 30 days | Alibaba Cloud Computing Co., Ltd. |
| No. | Processing Activity | Sensitive Information Type | Legal Basis | Protection Measures | Retention Period |
|---|
| 1 | Real-Name Authentication | ID Number, Name | Required by Laws and Regulations | Encrypted Storage, Access Control | At least 3 years |
| 2 | Account Binding | ID Number, Name | Necessary for Contract Performance | Encrypted Storage, Access Control | 90 days after cancellation |
| Right Type | Description | Exercise Method |
|---|
| Right to Know | Understand the scope and purpose of personal information collection | Read this Directory and Privacy Policy |
| Right to Access | Query the processing of personal information | Contact support@mail.shicthrs.com |
| Right to Correction | Request correction of inaccurate personal information | Contact support@mail.shicthrs.com |
| Right to Deletion | Request deletion of personal information and account | Submit account cancellation application |
| Right to Restrict Processing | Restrict processing of specific personal information | Contact support@mail.shicthrs.com |
| Right to Data Portability | Obtain personal information in structured format | Contact support@mail.shicthrs.com |
| Right to Refuse | Refuse specific data processing behaviors | Contact support@mail.shicthrs.com |
| Right to Complain | File complaints with regulatory authorities for violations | Contact personal information protection regulatory authority |
We will respond to your rights exercise requests within 15 business days. If we need to extend the processing time, we will notify you separately.
This Software does not provide services to minors under 16 years of age, and we will not intentionally collect any personal information from children.
If we discover that we have inadvertently collected personal information from minors, we will immediately:
- Stop collecting and delete the relevant information
- Cancel the relevant account (if any)
- Take reasonable measures to ensure the data is not further used
| Data Type | Storage Location | Cross-Border Transfer |
|---|
| User Account Information | Within People's Republic of China | No |
| Identity Authentication Information | Within People's Republic of China | No |
| Security Check Data | Within People's Republic of China | No |
| Operation Logs | Within People's Republic of China | No |
| Cache Data | Within People's Republic of China | No |
| Measure Type | Specific Content |
|---|
| Transmission Security | TLS 1.2 and above encryption protocols |
| Storage Security | AES-256 encrypted storage for sensitive data |
| Access Control | Role-based access control (RBAC) |
| Audit Logs | Record all data access and operation behaviors |
| Backup and Recovery | Regular backups with quick recovery support |
| Intrusion Detection | Deployment of intrusion detection and prevention systems |
If you have any questions or suggestions about this Directory, please contact us through the following methods:
We will respond to your request as soon as possible and process it within 15 business days.
| Collection Method | Personal Information Type |
|---|
| User Initiative Provision | ID Number, Name, Username, Phone Number, Email, Password |
| Automatic Collection | Machine Code, Hardware Fingerprint, Operating System Version, Device Fingerprint, IP Address, Access Time, Browser Identifier, Access Path, Operation Records, Performance Data |
| Third-Party Sharing | Authentication results returned from Alibaba Cloud Real Person Authentication |
| Legal Basis | Personal Information Type |
|---|
| Necessary for Contract Performance | Username, Password, Authentication Token, Phone Number, Email, Machine Code, Hardware Fingerprint, System Information, Device Fingerprint, Check Results |
| Required by Laws and Regulations | ID Number, Name |
| Legitimate Interest | IP Address, Access Time, Browser Identifier, Access Path, Operation Records, Performance Data, Log Data |
| Retention Period | Personal Information Type |
|---|
| 90 days after cancellation | ID Number, Name, Username, Phone Number, Email, Password |
| At least 3 years | ID Number, Name (Authentication Records) |
| At least 1 year | Machine Code, Hardware Fingerprint, System Information, Device Fingerprint, Check Results |
| At least 6 months | IP Address, Access Time, Access Path, Operation Records |
| No more than 1 year | Browser Identifier, Performance Data, Usage Records |
| No more than 30 days | Cache Data, CDN Access Logs |
| No more than 24 hours | Authentication Token |
© 2026 SHICTHRS, Std. All Rights Reserved.
This Directory is subject to the final interpretation of SHICTHRS, Std.
← Back to Legal Agreements | ← Privacy Policy | ← Third-Party Information Collection Statement | ← Back to Home