Privacy Policy

Last Updated:September 29, 2025
Effective Date:September 10, 2021

Yunshu is a product of Hangzhou EagleCloud Security Technology Inc. (Registered address: 8th Floor, Building 4, Haizhi Center, 2301 Yuhangtang Road, Yuhang District, Hangzhou, Zhejiang Province, China. Hereinafter referred to as "we" or "Eaglecloud") network access tools to provide services. In order to explain how eaglecloud collects, uses and stores your personal information and what your rights are, this policy will help you to understand the following, the main points of which are as follows.

  1. How We Collect and Use Your Personal Information
  2. How We Protect and Store Your Personal Information
  3. How We Ensure Information Security
  4. How We Share or Disclose Your Information
  5. Your Rights
  6. How We Handle Personal Information of Minors
  7. How We Update This Policy
  8. Other Considerations
  9. How to Contact Us
  10. Disclosure and Sharing of Personal Information with Third Parties

Yunshu respects and protects the privacy of all users of the service. In order to provide you with a more accurate and personalised service, Yunshu will use and disclose your personal information as set out in this Privacy Policy. Yunshu will not disclose this information to the public or provide it to third parties. This privacy policy is an integral part of the agreement for the use of Yunshu services. Please read and understand this Privacy Policy carefully before using our products (or services). You are not authorized to use the Eaglecloud service unless you have fully read, fully understood and accepted all of the terms of this agreement.

1. How We Collect and Use Your Personal Information

When you use Yunshu services, we collect personal information that you actively provide or that is generated as a result of your use of the services. This information is used to provide services, optimize our offerings, and ensure the security of your account:

(a) Location Information
We may collect your location based on your IP address or other device sensor data to provide better service—for example, connecting you to the nearest and fastest server. You can stop the collection of your location information by disabling location services. Doing so will not affect your ability to use other features of Yunshu.

(b) Device Information
We collect information such as your device model, operating system, unique device identifiers (a string of characters embedded in your device by the manufacturer to uniquely identify the device), login IP address, Yunshu software version, network connection type, and network quality metrics. These data are essential for providing our services, ensuring the proper operation of our platform, improving and optimizing the user experience, and securing your account.

(c) Usage Records
When you use Yunshu’s network connection features, your operations are recorded and stored on our servers. This storage is necessary to provide these features. Records are stored in encrypted form, and you may delete them at any time. Except as required by applicable laws or with your explicit consent, we will not share this information externally or use it for purposes other than the intended functionality.

Please understand that the features and services we provide are continuously updated and evolving. If any feature or service that is not described above collects your information, we will notify you separately of the content, scope, and purpose of such data collection through in-app prompts, interactive flows, or website announcements, and obtain your consent before collecting the information.

The specific list is as follows:

Information CollectedPurpose
IP AddressUsed to enforce internal network access policies
Device ModelUsed to enforce internal network access policies
Operating SystemCollected to enable internal network access
ANDROID IDEnsures unique device identification (Android only)
Login IP AddressUsed to enforce internal network access policies
Yunshu Software VersionApplication updates
Network Connection TypeTo check network status (Wi-Fi/5G)
Network Quality DataUsed to enforce internal network access policies
Anonymous Device Identifier (HarmonyOS OAID / Other OAID)Ensures unique device identification (HarmonyOS NEXT only)

2. How We Protect and Store Your Personal Information

(a) Disclosure to Third Parties
Yunshu will not transfer or disclose your personal information to any third party, except in the following circumstances:

  • As required by applicable laws, regulations, or requests from judicial or administrative authorities.
  • In connection with a merger, division, acquisition, or transfer of assets.
  • When necessary to provide the services you have requested.
  • In accordance with the Yunshu Privacy Policy or other applicable agreements that permit transfer or disclosure to third parties.
  • Yunshu attaches great importance to protecting the personal information of minors. If you do not have full legal capacity, you must obtain the consent of your guardian before using Yunshu services.

(b) Indirect Collection from Third Parties
If, for business development purposes, we need to obtain your personal information indirectly from third parties, we will inform you in advance of the source, type, and scope of your personal information. If any processing activities exceed the scope of your original authorization to the third party, we will obtain your explicit consent before processing your personal information.

(c) Data Storage Location
In accordance with applicable laws and regulations, personal information collected within China will be stored within China. If your personal information is transferred from China to overseas locations, we will strictly comply with relevant legal requirements.

(d) Retention Period
We retain your personal information only for as long as necessary to achieve the purposes for which it was collected. For example, phone numbers: whether you log in using your phone number or an existing Yunshu account, we need to continuously verify your phone number (including the originally registered and bound numbers) to ensure you can use the service normally.

(e) Account Deletion
When you delete your Yunshu account, we will delete all personal information associated with it.

Additionally, we strictly comply with applicable laws and regulations and require third parties to ensure the legality of the information they provide.

3. How We Ensure Information Security

(a) Security Measures
We strive to protect the security of users’ personal information to prevent loss, misuse, unauthorized access, or disclosure. We implement various security measures at a reasonable level to safeguard information. For example, we use encryption technologies (such as SSL) and anonymization methods to protect your personal information.

(b) Device Security
We continuously enhance the security capabilities of the software installed on your device to prevent the leakage of personal information. For instance, for secure transmission, certain information encryption processes are performed locally on your device.

(c) Protection Against Malicious Programs
To prevent viruses, Trojans, or other malicious programs and websites, we may collect information about the applications installed on your device, running processes, or data stored in device memory.

(d) Fraud and Security Monitoring
To prevent fraud, account theft, impersonation, or other unlawful activities, and to conduct security checks, we may analyze data such as unique device identifiers, login IP addresses, operation logs, and location information to take security measures or provide security alerts. We have established dedicated management systems, processes, and organizational measures to ensure information security. For example, we strictly limit access to information, require personnel to comply with confidentiality obligations, and perform audits.

(e) Incident Response
In the event of a personal information breach, we will activate emergency plans to prevent the incident from escalating and notify you via push notifications or announcements.

Currently, Yunshu has passed China’s National Cybersecurity Classified Protection (Level 3) assessment and filing. In terms of information security, we meet the standards of ISO27001, international information security management systems, TRUSTArc, and other authoritative international certifications, and we have obtained the corresponding certifications.

We will make every effort to protect your personal information. However, please understand that no security measures can guarantee absolute protection.

4. How We Share or Disclose Your Information

(a) Sharing with Partners
We do not share personally identifiable information (such as your name or email address) with our partners unless you have explicitly authorized us to do so.

(b) Third-Party Disclosure
We will not provide your personal information to any third party without your explicit consent.

(c) Business Development Transactions
As our business continues to develop, we may engage in transactions such as mergers, acquisitions, or asset transfers. In such cases, we will inform you accordingly and continue to protect your personal information, or require the new controller to continue protecting your personal information, in accordance with applicable laws, regulations, and standards no less stringent than those outlined in this policy.

Additionally, in accordance with applicable laws, regulations, and national standards, we may share, transfer, or disclose personal information without obtaining prior authorization or consent from the data subject in the following circumstances:

  • When necessary to fulfill legal obligations imposed on us by laws or regulations;
  • When directly related to national security or defense security;
  • When directly related to public safety, public health, or significant public interests;
  • When directly related to criminal investigations, prosecutions, trials, or execution of court judgments;
  • When necessary to protect the vital legal interests of the data subject or other individuals, and obtaining prior consent is impracticable;
  • When the personal information has been voluntarily disclosed by the data subject to the public;
  • When personal information is collected from lawfully publicly available sources, such as legally published news reports or government information disclosures.

5. Your Rights

(a) Access, Correction, and Deletion
During your use of Yunshu, you have the right to access, correct, or delete your personal information. You also have the right to withdraw your consent for the use of personal information and to delete your account.

(b) Complaints and Feedback
We provide channels for complaints and feedback, and your concerns will be addressed promptly. Please note that operational settings may vary across different operating systems and different versions of Yunshu software. Additionally, we may adjust settings to optimize your user experience.

6. How We Handle Personal Information of Minors

We attach great importance to the protection of minors’ personal information.

In accordance with applicable laws and regulations, if you are a minor under the age of 18, you must obtain the prior written consent of your parent or legal guardian before using Yunshu services. If you are the guardian of a minor and have questions regarding the personal information of the minor under your care, please contact us using the contact information provided in Section 9.

7. How We Update This Policy

We may revise this Policy from time to time. When the terms of this Policy change, we will notify you of the updated Policy through push notifications, pop-ups, or other appropriate means when you log in or update your Yunshu software.

8. Other Considerations

The Yunshu Privacy Policy represents the general privacy terms uniformly applicable by Yunshu. The user rights and information security measures stipulated in this Policy apply to all Yunshu users. In the event of any inconsistency or conflict between the Yunshu User Agreement and this Policy, this Policy shall prevail.

9. How to Contact Us

If you have any complaints, suggestions, or issues related to the personal information of minors, please contact us via https://www.eaglecloud.com/

You may also send your inquiries to support@eaglecloud.com. We will review your request as soon as possible and provide a response within 15 days after verifying your user identity.

10. Disclosure and Sharing of Personal Information with Third Parties

The personal information collected by Yunshu is not shared with any third parties. Should there be any future adjustments, we will notify you in a timely manner and update this Privacy Policy accordingly.

Appendix: List of Third-Party SDKs Used (Android Version)

Third-Party NamePurposeFunction TypePersonal Information Involved
com.github.bumptech.glide:glideLoad network imagesImage loading libraryNone
io.sentry:sentry-androidReal-time event logging and aggregationLog statisticsDevice information
com.alibaba:arouter-compilerComponentized communicationRouting frameworkNone
com.squareup.okhttp3:okhttpHTTP requestsNetwork requestsNone
com.google.code.gson:gsonJSON data parsingData parsingNone
com.lzy.net:okgoNetwork requestsNetwork requestsNone
com.yanzhenjie:permissionPermission requestsPermission managementUser permissions
com.squareup.retrofit2Network requestsNetwork access frameworkNone
com.kyleduo.switchbutton:libraryToggle buttonUINone
com.alibaba.android:ddsharesdkDingTalk authorization loginOne-click loginDevice information
com.alibaba:arouter-apiModularization supportComponent frameworkNone
larkssoFeishu/Lark authorization loginOne-click loginDevice information
lib_wwapi-2.0.12.11.aarWeCom (Enterprise WeChat) authorization loginOne-click loginDevice information
com.github.chrisbanes:PhotoViewExtended Android ImageViewUINone
com.google.zxingQR code scanningScanningStorage
pub.devrel:easypermissionsPermission requestsPermission managementUser permissions
com.squareup.picasso:picassoAsynchronous image loadingImage loading libraryNone
NameDescriptionTypeWebsite
ZxingA library for generating and parsing QR codes.APILink
SwitchButtonA cute Switch Button widget for creating beautiful and user-friendly UI.APILink
FastjsonA JSON parsing library.APILink
ImageViewZoomAndroid ImageView widget with zoom and pan capabilities.APILink
RetrofitA network request library based on OkHttp.APILink
FirebaseA real-time cloud data service platform by Google that enables apps to provide real-time data.APILink
Android-EasingA lightweight Android easing library.APILink
MatisseA well-designed local image and video selector for Android.APILink
GsonA JSON parsing library developed by Google.APILink
OkHttpAn efficient HTTP client library.APILink
OkHttp-OkGoA network request framework based on HTTP and OkHttp, easier to use than Retrofit, supports RxJava/RxJava2, custom caching, batch breakpoint downloads, and batch uploads.APILink
EasyPermissionsA library for handling Android permission requests.APILink
ARouterA middleware routing framework for pages and services on the Android platform.APILink
GlideA multimedia management and image loading framework for Android.MultimediaLink
Commons-IOAn open-source library for file I/O operations.APILink
GreenDAOA light and fast ORM solution for Android that maps objects to SQLite databases.APILink
OkioA modern I/O library for Java.APILink