AegisSpeed Privacy Policy
AegisSpeed Privacy Policy
Version: V1.0.0
Effective Date: February 24, 2026
Important Notice
Please read this Privacy Policy (hereinafter referred to as "this Policy") in its entirety before using AegisSpeed (hereinafter referred to as "this Software"). This Policy provides detailed explanations of how we collect, use, store, protect, and share your personal information. By downloading, installing, copying, or using this Software, you are deemed to have fully understood and agreed to all the terms of this Policy. If you do not agree to any part of this Policy, please stop using this Software immediately.
Article 1: Introduction
1.1 Purpose of the Policy
This Policy aims to clearly explain to users how we process personal information in the course of providing this Software service, ensuring that users are informed about and understand our data processing practices, while complying with applicable privacy protection laws and regulations.
1.2 Scope of Application
This Policy applies to all versions of this Software, including but not limited to:
- AegisSpeed Client Program
- AegisSpeed Server Program
- AegisSpeed Web Portal
- AegisSpeed Documentation Site
- All related services provided by this Software
1.3 Important Principles
We commit to following these privacy protection principles:
| Principle | Description |
|---|---|
| Legality | Collect and process personal information only within the scope permitted by law |
| Necessity | Only collect personal information necessary for implementing functions |
| Transparency | Clearly explain the purposes of data collection and use to users |
| Security | Take reasonable measures to protect the security of personal information |
| Accountability | Take responsibility for personal information processing activities |
Article 2: Definition and Classification of Personal Information
2.1 Personal Information
Personal information refers to various information recorded in electronic or other forms that relates to an identified or identifiable natural person. In this Software, personal information includes but is not limited to:
| Personal Information Category | Specific Content |
|---|---|
| Identity Identification Information | ID Number, Name, Username |
| Contact Information | Phone Number, Email Address |
| Account Information | Password Hash, Authentication Token, Account Status |
| Device Information | Machine Code, Hardware Fingerprint, Operating System Version |
| Network Information | IP Address, Access Time, Browser Identifier |
| Usage Data | Feature Usage Records, Operation Logs, Check Results |
2.2 Sensitive Personal Information
Sensitive personal information refers to personal information that, once leaked or illegally used, is likely to infringe upon the dignity of natural persons or endanger personal or property safety. The sensitive personal information that this Software may process includes:
| Sensitive Information Type | Collection Purpose | Legal Basis |
|---|---|---|
| ID Number | Identity Authentication, Account Registration | User Initiative Provision, Necessary for Contract Performance |
| Name | Identity Authentication, Account Registration | User Initiative Provision, Necessary for Contract Performance |
| Facial Biometric Features (if any) | Identity Authentication | User Initiative Provision, Explicit Consent |
2.3 Non-Personal Information
We may also collect non-personal information that cannot directly identify specific individuals, including:
- Anonymized statistical data
- Aggregated usage data
- Technical log information
Article 3: Collection of Personal Information
3.1 Collection Methods
We collect your personal information through the following methods:
| Collection Method | Description |
|---|---|
| User Initiative Provision | Information you actively provide when registering an account or filling out forms |
| Automatic Collection | Technical information automatically collected when you use this Software |
| Third-Party Sharing | Authentication information obtained from partners |
3.2 Collection Scenarios
3.2.1 Account Registration
When you register for this Software account, we collect the following information:
| Information Type | Necessity | Purpose |
|---|---|---|
| ID Number | Required | Identity Authentication, Account Binding |
| Name | Required | Identity Authentication, Account Display |
| Phone Number | Optional | Account Recovery, Notification Delivery |
| Email Address | Optional | Account Recovery, Notification Delivery |
| Password | Required | Account Security Authentication |
3.2.2 Security Check
When you use the ASAC security check function, we collect the following information:
| Information Type | Necessity | Purpose |
|---|---|---|
| Machine Code | Required | Device Identification, Anomaly Detection |
| Hardware Information | Required | Security Check, Compatibility Assessment |
| System Information | Required | Security Check, Environment Assessment |
| Device Fingerprint | Required | Device Identification, Fraud Detection |
3.2.3 Service Usage
When you use this Software service, we automatically collect the following information:
| Information Type | Necessity | Purpose |
|---|---|---|
| IP Address | Required | Security Audit, Troubleshooting |
| Access Time | Required | Log Recording, Statistical Analysis |
| Operation Records | Required | Service Improvement, Problem Location |
| Performance Data | Required | Performance Optimization, Troubleshooting |
3.3 Collection Refusal
You have the right to choose not to provide non-essential personal information. However, if you refuse to provide non-essential information, it will not affect the use of core functions; if you refuse to provide required information, the related functions will not be available.
Article 4: Use of Personal Information
4.1 Purposes of Use
We only use the collected personal information for the following purposes:
| Purpose | Legal Basis | Description |
|---|---|---|
| Account Management | Necessary for Contract Performance | User Registration, Login, Account Maintenance |
| Identity Authentication | Required by Laws and Regulations | Real-Name Authentication, Identity Verification |
| Service Provision | Necessary for Contract Performance | Feature Usage, Data Processing |
| Security Protection | Legitimate Interest | Fraud Detection, Anomaly Identification |
| Service Improvement | Legitimate Interest | Product Optimization, Feature Enhancement |
| Legal Compliance | Required by Laws and Regulations | Data Preservation, Regulatory Cooperation |
4.2 Use Restrictions
We commit to:
- Not using personal information for purposes unrelated to the collection purpose;
- Not selling, renting, or otherwise commercializing personal information;
- Not sharing personal information beyond the scope of explicit user consent;
- Not using personal information for automated decision-making (except as otherwise provided by law).
4.3 Automated Decision-Making
This Software may use automated decision-making technology for:
- Account security risk assessment
- Anomaly behavior detection
- Service quality optimization
You have the right to object to automated decision-making results and request human review.
Article 5: Storage of Personal Information
5.1 Storage Location
| Data Type | Storage Location | Cross-Border Transfer |
|---|---|---|
| User Account Information | Within People's Republic of China | No |
| Identity Authentication Information | Within People's Republic of China | No |
| Security Check Data | Within People's Republic of China | No |
| Operation Logs | Within People's Republic of China | No |
| Cache Data | Within People's Republic of China | No |
5.2 Storage Period
| Data Type | Storage Period | Processing After Expiration |
|---|---|---|
| Basic Account Information | 90 days after account cancellation | Permanent Deletion |
| Identity Authentication Information | 90 days after account cancellation | Permanent Deletion |
| Security Check Records | At least 1 year | Anonymization |
| Operation Logs | At least 6 months | Permanent Deletion |
| Cache Data | No more than 30 days | Automatic Clearing |
| Backup Data | No more than 1 year | Permanent Deletion |
5.3 Storage Security
We take the following technical measures to protect the security of personal information:
- Transmission Security: All data transmission uses TLS 1.2 and above encryption protocols
- Storage Security: Sensitive data is encrypted using AES-256
- Access Control: Role-based access control (RBAC) is implemented
- Audit Logs: All data access and operation behaviors are recorded
- Backup and Recovery: Regular backups with quick recovery support
- Intrusion Detection: Deployment of intrusion detection and prevention systems
Article 6: Sharing of Personal Information
6.1 Sharing Principles
We commit to sharing personal information only in the following circumstances:
- After obtaining your explicit consent;
- When required by laws and regulations;
- When necessary for providing core functions;
- When necessary for protecting significant legitimate rights and interests.
6.2 Sharing Scenarios
6.2.1 Third-Party Service Providers
To implement the core functions of this Software, we may share necessary information with the following third parties:
| Third-Party Name | Shared Information | Sharing Purpose | Third-Party Responsibility |
|---|---|---|---|
| Alibaba Cloud Computing Co., Ltd. | Identity Authentication Information | Real-Name Authentication Service | Comply with its privacy policy |
| Alibaba Cloud Computing Co., Ltd. | Technical Logs | Cloud Service Hosting | Data security protection |
6.2.2 Legal Requirements
In the following circumstances, we may share personal information with relevant authorities in accordance with the law:
- Judicial authorities conducting investigations and evidence collection in accordance with the law;
- Administrative authorities conducting inspections or enforcement in accordance with the law;
- Other circumstances prescribed by laws and regulations.
6.3 Sharing Restrictions
We will not:
- Share personal information with advertisers or marketing parties;
- Use personal information for targeted advertising;
- Sell personal information to any third party;
- Share your personal information on a large scale without informing you.
Article 7: User Rights
7.1 Right to Know
You have the right to understand what personal information we collect, how we use this information, and with whom we share it. You can obtain this information by reading this Policy.
7.2 Right to Access
You have the right to request access to your personal information that we hold. We will respond to your request within 15 business days.
| Access Request Method | Processing Time Limit |
|---|---|
| Within 15 business days | |
| Written Application | Within 15 business days |
7.3 Right to Correction
If you find that the personal information we hold is inaccurate or incomplete, you have the right to request correction. We will complete the correction within 15 business days after verification.
7.4 Right to Deletion
In the following circumstances, you have the right to request deletion of your personal information:
- We process your personal information in violation of laws and regulations;
- The collection purpose has been achieved or cannot be achieved;
- You withdraw your consent;
- The processing behavior violates laws and regulations.
Note: In accordance with legal requirements, some personal information cannot be immediately deleted under specific circumstances.
7.5 Right to Restrict Processing
In the following circumstances, you have the right to restrict our processing of your personal information:
- You contest the accuracy of the personal information;
- The processing is unlawful, but you do not want deletion;
- We no longer need this information, but you need it for legal claims.
7.6 Right to Data Portability
You have the right to obtain the personal information you provided in a structured, commonly used machine-readable format, and have the right to transfer this information to another data controller.
7.7 Right to Refuse
You have the right to refuse our processing of your personal information based on the following legitimate interests:
- Direct marketing;
- Public interest tasks;
- Scientific or historical research statistics.
7.8 How to Exercise Rights
To exercise any of the above rights, please contact us through the following methods:
| Contact Channel | Information |
|---|---|
| support@mail.shicthrs.com | |
| Official Website | AegisSpeed Official Website |
| Documentation Site | AegisSpeed Documentation Site |
We will respond to your request within 15 business days. If we need to extend the processing time, we will notify you separately.
7.9 Right to Complain
If you believe that our processing of personal information violates laws and regulations, you have the right to file a complaint with the personal information protection regulatory authority.
Article 8: Cookies and Similar Technologies
8.1 Cookie Usage
This Software and services may use Cookies and similar technologies to enhance user experience. Cookies are small text files stored on your device.
| Cookie Type | Purpose | Validity Period |
|---|---|---|
| Essential Cookies | Maintain normal software operation | During session |
| Functional Cookies | Remember user preferences | No more than 1 year |
| Analytical Cookies | Analyze usage and improve services | No more than 1 year |
8.2 Cookie Management
You can manage Cookies through browser settings, including:
- Enable or disable Cookies;
- Delete stored Cookies;
- Set Cookie notification preferences.
Note: If essential Cookies are disabled, some features may not function properly.
Article 9: Minor Protection
9.1 Age Restrictions
This Software does not provide services to minors under 16 years of age, and we will not intentionally collect personal information from minors.
9.2 Discovery and Handling
If we discover that we have inadvertently collected personal information from minors, we will immediately take measures:
- Stop collecting and delete the relevant information immediately;
- Cancel the relevant account (if any);
- Take reasonable measures to ensure the data is not further used.
9.3 Parental Responsibility
Parents or guardians should properly safeguard minors' device information and account information to prevent minors from using this Software without authorization.
Article 10: Cross-Border Data Transfer
10.1 Transfer Principles
In principle, we will not transfer personal information outside the People's Republic of China.
10.2 Circumstances of Overseas Transfer
If it is necessary to transfer personal information overseas due to business needs, we will:
- Assess the data protection capability of the overseas recipient;
- Sign data transfer agreements that comply with legal requirements;
- Inform users of the purpose, method, and scope of overseas transfer;
- Take necessary security safeguard measures.
10.3 Protection Measures
We ensure that personal information transferred overseas receives the same level of protection as within the country.
Article 11: Data Security Incidents
11.1 Incident Response
If we discover a personal information security incident, we will:
- Immediately activate the emergency response mechanism;
- Timely assess the impact and risks of the incident;
- Take necessary measures to control the impact of the incident;
- Notify regulatory authorities and affected users in accordance with legal requirements.
11.2 Notification Content
In the event of a personal information security incident, we will notify you of:
- Basic information about the incident;
- Possible impacts;
- Measures we have taken or intend to take;
- Self-protection measures you can take;
- Customer service contact information.
11.3 Notification Time Limit
We will report to regulatory authorities within 72 hours of discovering the incident in accordance with legal requirements, and notify affected users within a reasonable time.
Article 12: Third-Party Services
12.1 Third-Party Service Description
This Software may contain third-party services or links, which have their own privacy policies and data processing practices.
12.2 Third-Party Information Collection
For details on third-party service data collection in this Software, please refer to: Third-Party Information Collection Statement
12.3 Link Responsibility
We are not responsible for the privacy protection practices of third-party websites. You should read their privacy policies when visiting these websites.
Article 13: Policy Updates
13.1 Update Method
We may update this Policy at any time. Updated policies will be published through the following channels:
- Official Documentation Site: AegisSpeed Documentation Site
- In-client notifications
13.2 Material Changes
If material changes are made to this Policy, we will notify you through the following methods:
- In-client popup notifications;
- Email notifications;
- Official website announcements.
13.3 Continued Use
After this Policy is updated, your continued use of this Software constitutes your agreement to the updated Policy.
13.4 Historical Versions
We will retain historical versions on the AegisSpeed Documentation Site for your reference.
Article 14: Liability and Compensation
14.1 Liability Limitations
To the maximum extent permitted by applicable law, we are not responsible for the following:
- Personal information leakage caused by user reasons;
- Personal information leakage caused by third parties (except as otherwise provided by laws and regulations);
- losses resulting from users not properly safeguarding their account information.
14.2 Compensation
If your personal information is leaked due to our intentional or gross negligence and causes losses, we will bear corresponding compensation liability in accordance with the law.
Article 15: Applicable Law
15.1 Applicable Law
The formation, execution, and interpretation of this Policy are all subject to the laws of the People's Republic of China (excluding the laws of Hong Kong, Macau Special Administrative Regions, and Taiwan).
15.2 Dispute Resolution
Any dispute arising from or related to this Policy shall first be resolved through friendly negotiation; if negotiation fails, either party has the right to file a lawsuit with the people's court at the developer's location.
Article 16: Contact Us
If you have any questions or suggestions about this Policy, please contact us through the following methods:
| Contact Channel | Information |
|---|---|
| support@mail.shicthrs.com | |
| Official Website | AegisSpeed Official Website |
| Documentation Site | AegisSpeed Documentation Site |
We will respond to your request as soon as possible and process it within 15 business days.
Appendix: Summary of Personal Information Processing Activities
| No. | Processing Activity | Personal Information Type | Processing Purpose | Legal Basis | Retention Period |
|---|---|---|---|---|---|
| 1 | User Registration | ID Number, Name, Password | Account Creation and Management | Necessary for Contract Performance | 90 days after cancellation |
| 2 | Identity Authentication | ID Number, Name | Real-Name Authentication | Required by Laws and Regulations | At least 3 years |
| 3 | Security Check | Machine Code, Hardware Information, System Information | Security Assessment | Necessary for Contract Performance | At least 1 year |
| 4 | Account Login | IP Address, Login Time | Identity Verification, Security Audit | Necessary for Contract Performance | At least 6 months |
| 5 | Service Improvement | Usage Data, Performance Data | Product Optimization | Legitimate Interest | No more than 1 year |
| 6 | Legal Compliance | Various Data | Regulatory Cooperation | Required by Laws and Regulations | As per legal requirements |
© 2026 SHICTHRS, Std. All Rights Reserved.
This Policy is subject to the final interpretation of SHICTHRS, Std.
← Back to Legal Agreements | ← Third-Party Information Collection Statement | ← Back to Home