AegisSpeed Third-Party Information Collection Directory
AegisSpeed Third-Party Information Collection Directory
Version: V1.0.0
Effective Date: February 24, 2026
Important Notice
This statement is a supplementary document to the AegisSpeed Privacy Policy, providing detailed explanations of the third-party information collection behaviors that may be involved during the use of this software. Please read this statement carefully before using this software.
Article 1: Purpose of This Statement
This statement aims to clearly explain to users the third-party services that may be involved in the operation of this software, the purposes of data collection, types of data, and data processing methods, ensuring that users are informed about and understand the data processing practices of this software.
Article 2: Overview of Third-Party Services
This software may invoke the following third-party services to implement core functions:
| No. | Service Type | Service Name | Service Provider | Primary Purpose |
|---|---|---|---|---|
| 1 | Identity Authentication Service | Alibaba Cloud Real Person Authentication | Alibaba Cloud Computing Co., Ltd. | Verify the authenticity of user's ID number and name |
| 2 | Cloud Server | Cloud Server ECS | Alibaba Cloud Computing Co., Ltd. | Host server programs and databases |
| 3 | Cloud Database | Cloud Database RDS MySQL | Alibaba Cloud Computing Co., Ltd. | Store user account information and check logs |
| 4 | Log Service | Log Service SLS | Alibaba Cloud Computing Co., Ltd. | Collect and analyze system operation logs |
| 5 | Content Delivery Network | CDN | Alibaba Cloud Computing Co., Ltd. | Accelerate static resource loading |
Article 3: Alibaba Cloud Real Person Authentication Service
3.1 Service Description
This software integrates Alibaba Cloud Real Person Authentication Service (Product Name: Real Person Authentication - Identity Authentication) to verify whether the ID number and name information provided by users is authentic and valid.
3.2 Data Collection Scope
When users use the identity authentication function, the following information will be sent to Alibaba Cloud services for processing:
| Data Type | Specific Content | Necessity |
|---|---|---|
| Identity Information | ID Number (18 digits) | Required |
| Identity Information | Name (Real Name) | Required |
| Device Information | Device Fingerprint, IP Address | Required |
3.3 Data Processing Purposes
- Verify the authenticity of user identity information
- Prevent others from using false identities to register accounts
- Meet the real-name authentication requirements mandated by laws and regulations
3.4 Data Storage and Retention
- Alibaba Cloud will store relevant data according to its privacy policy
- Authentication results will be returned to this software's server for recording
- For specific retention periods, please refer to Alibaba Cloud's privacy policy
Article 4: Cloud Server and Cloud Database Services
4.1 Service Description
This software uses cloud servers to host server programs and cloud databases to store user data and system data.
4.2 Data Collection Scope
| Data Type | Specific Content | Necessity |
|---|---|---|
| Account Information | ID Number, Name, Phone Number, Email | Required |
| Account Credentials | Encrypted Password Hash Value | Required |
| Authentication Token | JWT Token | Required |
| Machine Information | Machine Code, Hardware Fingerprint, OS Information | Required |
| Check Logs | ASAC Security Check Results, Timestamps | Required |
| Operation Logs | User Operation Records, System Operation Logs | Required |
| Network Information | IP Address, Access Time, Access Path | Required |
4.3 Data Processing Purposes
- Provide user account management services
- Store and manage security check data
- Provide identity authentication and access control
- Fulfill data storage obligations required by laws and regulations
4.4 Data Storage Location
- All data is stored within the People's Republic of China
4.5 Data Retention Period
| Data Type | Retention Period |
|---|---|
| Account Information | Within 90 days after user voluntarily cancels account |
| Check Logs | Retained for at least 1 year |
| Operation Logs | Retained for at least 6 months |
| Temporary Cache | No more than 30 days |
Article 5: Log Service
5.1 Service Description
This software uses log services to collect and analyze server operation logs for troubleshooting, performance optimization, and security auditing.
5.2 Data Collection Scope
| Data Type | Specific Content |
|---|---|
| System Logs | Service Start/Stop, Error Information, Exception Stack |
| Access Logs | Request Time, Request Path, Response Status |
| Security Logs | Login Attempts, Permission Verification, Abnormal Access |
| Performance Logs | Response Time, Resource Usage |
5.3 Data Processing Purposes
- Monitor server operation status
- Troubleshooting and problem location
- Security incident investigation
- Performance optimization reference
5.4 Log Retention Period
Log data is retained for no less than 6 months.
Article 6: Content Delivery Network (CDN)
6.1 Service Description
This software uses CDN to accelerate the loading of static resources, including but not limited to documentation site static files, client update packages, etc.
6.2 Data Collection Scope
| Data Type | Specific Content |
|---|---|
| Access Logs | Access Time, Access Page, Source Address |
| Device Information | Browser Type, Operating System, Network Type |
| Performance Data | Loading Time, Cache Hit Rate |
6.3 Data Processing Purposes
- Optimize resource loading speed
- Analyze access hotspots
- Optimize CDN node distribution
Article 7: Data Security Safeguard Measures
7.1 Technical Measures
- Transmission Encryption: All data transmission uses TLS 1.2 and above encryption protocols
- Storage Encryption: Sensitive data (such as passwords) is encrypted using strong hashing algorithms
- Access Control: Role-based access control (RBAC) is implemented
- Audit Logs: All data access and operation behaviors are recorded
- Backup Strategy: Regular backups with off-site disaster recovery
7.2 Management Measures
- Data Minimization: Only collect data necessary for implementing functions
- Separation of Duties: Data access permissions for different roles are isolated from each other
- Employee Training: Regular training on data security and privacy protection
- Emergency Response: Establish emergency response mechanisms for data security incidents
Article 8: User Rights and Choices
8.1 User Rights
Users have the following rights regarding their personal data:
| Right | Description | Exercise Method |
|---|---|---|
| Right to Know | Right to understand the scope and purpose of data collection | Read this statement |
| Right to Access | Right to query the processing of personal data | Contact customer@mail.shicthrs.com |
| Right to Correction | Right to request correction of inaccurate personal data | Contact customer@mail.shicthrs.com |
| Right to Deletion | Right to request deletion of personal data | Submit account cancellation application |
| Right to Refuse | Right to refuse specific data processing behaviors | Contact customer@mail.shicthrs.com |
8.2 Opt-Out Options
- Users can choose not to provide non-essential data, but this may result in some features being unavailable
- Users can withdraw consent at any time (data processed before withdrawal is not affected)
- Users can apply for deletion of account and related data
Article 9: Children's Privacy Protection
9.1 Age Restrictions
This software does not provide services to children under 16 years of age and does not collect any personal information from children.
9.2 Discovery and Handling
If we discover that we have inadvertently collected personal information from children, we will immediately take measures to delete it.
Article 10: Third-Party Links
This software may contain links to third-party websites. We are not responsible for the privacy protection practices of these third-party websites. It is recommended that users read the privacy policies of these websites when visiting them.
Article 11: Statement Updates
11.1 Update Method
We may update this statement at any time. Updated statements will be published through the following channels:
- Official Documentation Site: AegisSpeed Documentation Site
- In-client notifications
11.2 Material Changes
If material changes are made to this statement, we will notify users through reasonable means, including but not limited to:
- In-client popup notifications
- Email notifications
- Official website announcements
Article 12: Contact Us
If you have any questions or suggestions about this statement, please contact us through the following methods:
| Contact Channel | Information |
|---|---|
| support@mail.shicthrs.com | |
| Official Website | AegisSpeed Official Website |
| Documentation Site | AegisSpeed Documentation Site |
We will respond to your request as soon as possible and process it within 15 business days.
Appendix: Summary of Data Processing Activities
| No. | Data Processing Activity | Data Type | Legal Basis | Retention Period |
|---|---|---|---|---|
| 1 | User Registration | Identity Information, Contact Information | Necessary for Contract Performance | 90 days after account cancellation |
| 2 | Identity Authentication | ID Number, Name | Required by Laws and Regulations | At least 3 years |
| 3 | Security Check | System Information, Hardware Information | Necessary for Contract Performance | At least 1 year |
| 4 | Log Recording | Operation Logs, Access Logs | Legitimate Interest (Security Audit) | At least 6 months |
| 5 | Performance Optimization | Device Information, Performance Data | Legitimate Interest (Service Improvement) | No more than 1 year |
© 2026 SHICTHRS, Std. All Rights Reserved.
This statement is subject to the final interpretation of SHICTHRS, Std.