SDK Privacy Policy
Welcome to us the Baidu Log Service Software Development Kit (hereinafter referred to as “Log Service SDK”) services!
The Log Service SDK is a software development kit (SDK) designed to provide mobile application developers (hereinafter referred to as "developers") with capabilities for log collection, aggregation, and transmission. Mobile app developers can use the Log Service SDK to offer the described features and services to their app users (hereinafter referred to as "end users") after integrating it into their applications (hereinafter referred to as "developer applications"). Upon integration, developers entrust the Log Service SDK with the data processing associated with their applications, which includes handling the personal information of end users. These Privacy Policies are intended to help developers and end users understand the types of personal information we collect, as well as how we use and protect it. For easier understanding, we have defined technical terms in Appendix 1: Explanation of Terms included in these Privacy Policies.
Special note:
1. The developers who integrate and use the Log Service SDK services in their mobile applications shall promise that:
(1) Developers shall abide by all applicable laws, policies and regulations related to the collection and use of personal information of end users to protect the safety of personal information of users.
(2) Developers shall inform end users of the integration and use of the Log Service SDK services in their mobile applications and the collection, use and protection rules of the Log Service SDK for the necessary personal information of end users (i.e. these Privacy Policies) in a prominent position of their mobile applications or in other ways that can reach end users (including but not limited to providing a link where end users can browse these Privacy Policies in a prominent position of their mobile applications), and obtain the complete, legal and valid authorizations and consents of end users for the collection and use of their personal information by the Log Service SDK. If the end user of developer's mobile application is a minor under 14, you must obtain the complete, legal and valid authorization from his parents or other guardians for Log Service SDK to collect and use the end user’s personal information during the use of Log Service SDK service.
(3) Developers shall provide end users with easy user rights realization mechanisms such as consulting, correcting, supplementing, deleting, copying or transferring their personal information, withdrawing or changing their authorizations and consents, canceling their individual accounts, and asking developers to explain the rules on personal information processing.
(4) For the specific execution of above promises, please refer to Log Service SDK Developer Personal Information Protection Compliance Guidelines。
2. We hope that the developer applications that integrate and use the Log Service SDK collect and use the personal information of end users in a legal and compliant manner, but we don't know and can't control how developers and their mobile applications use the personal information of end users in their control so we are not responsible for their actions. We recommend that end users carefully read the privacy policies of developer applications, and then use the developer applications after confirming that they fully understand and agree with how they collect and use the personal information of end users.
3. These Privacy Policies are inapplicable to those services that are displayed or linked to or repackage our services and provided by third parties subject to the privacy policies of third parties. Although third parties display, link to or repackage our services, we don't know or control their actions, so we are not responsible for their actions. Developers and end users are requested to carefully access or use their services before they have reviewed and accepted their privacy policies.
4. The service contents of the Log Service SDK specifically obtained by end users are selected by the developers according to the needs of their mobile applications, and may vary the different developer applications used by end users. The personal information obtained by the Log Service SDK depends on the specific types/versions of the developer applications used by end users and the functions adopted by end users. If some developer application versions do not cover certain services or provide specific functions, the contents of these Privacy Policies related to the services/functions and related personal information do not apply.
We encourage both developers and end users to thoroughly read and understand these Privacy Policies before integrating and using the Log Service SDK services.
These Privacy Policies will help developers and end users understand the following:
- How we collect and use the personal information of end users
- How we use Cookie and similar technologies
- How we share, transfer and disclose the personal information of end users
- How we keep and protect the personal information of end users
- How we guarantee the end users to exercise their rights related to personal information
- How we handle the personal information of minors
- Revision of privacy policies
- How to contact us
We cherish the trust of end users in providing us with their personal information, and will handle the personal information of end users and ensure the safety of end users’ information in accordance with these Privacy Policies.
I. How we collect and use the personal information of end users
(I) To help developers provide corresponding functions and services to end users
To provide necessary features and services, the system will request end-user device permissions through developer applications when users utilize specific functionalities. Developers must ensure that end users can revoke permissions or stop data collection anytime through the application's settings. However, revoking permissions may limit users from accessing certain features or achieving the intended effects of services tied to personal information, though other SDK features that do not require such permissions can still function normally.
1.Personal information related to various functions and services
| S/N | Function and service | Personal information type | Collection method | Applicable system version |
|---|---|---|---|---|
| 1 | Network quality monitoring: adjust network policies according to network status | WIFI status (required) | Collected directly by SDK | iOS and Android |
| 2 | Network quality monitoring: realize fast disconnection and reconnection during WIFI switching | WIFI-SSID (required) | Collected directly by SDK | iOS and Android |
| 3 | Device performance testing, for the better user experience, classify the device models, and provide different functional models and service policies according to the performance of different models. | Device model (required) | Collected directly by SDK | iOS and Android |
| 4 | SDK communication quality detection | IP address (required) | Collected directly by SDK | iOS and Android |
2. Device permission call
To ensure seamless usage of features and services offered by the Log Service SDK, we will request system permissions on end-user devices via developer applications. Before requesting, we will seek explicit user consent, allowing end users the option to "Allow" or "Deny" the permissions. Users may revoke permissions at any time through the system settings. Note that revoking permissions could prevent users from accessing related features but will not restrict the functionality of other SDK features. The permissions and their related functions are described in detail below:
Android system version
| Device permission | Function and service | Authorization method |
|---|---|---|
| Storage | Collection of log data | The authorization method is determined by the device system developer and the developer application; it is enabled when the end user agrees to grant this permission to the developer application. |
iOS system version
| Device permission | Function and service | Authorization method |
|---|---|---|
| Storage | Collection of log data | The authorization method is determined by the device system developer and the developer application; it is enabled when the end user agrees to grant this permission to the developer application. |
In different devices, the display mode and closing mode of permissions may be different. End users shall refer to the device and system developer's instructions or guidances for details.
(II) Guarantee service safety, optimize and improve service
To help developers provide the above functions and services to end users, more accurately locate and solve the problems encountered by developers and end users when using the Log Service SDK products and services, improve and optimize the developer’s and end users’ experience in the Log Service SDK products and services, more accurately locate and solve the problems encountered by end users when using the Log Service SDK services, improve and optimize the service experience of Log Service SDK, improve the security of Log Service SDK services, and prevent, discover and investigate fraudulent, harmful or illegal acts or violations of our agreements, policies or rules, we will collect device information, position information, log information and other information related to login environment of end users in order to protect the legitimate rights and interests of developers, end users, us or our affiliates, partners and the public.
(III) Anonymization of personal information
Without disclosing or sharing personal information of end users, Baidu retains the right to mine, analyze, and utilize anonymized data (including for commercial purposes), compile usage statistics of products and services, and share anonymized statistical information publicly or with third parties.
(IV)Exceptions with prior authorization and consent
Please notice that in the following cases, collection and use of personal information do not require the prior authorizations and consents of end users:
- Directly related to national security and national defense security;
- Necessary for the conclusion and performance of a contract to which the individual is a party;
- Necessary for performing statutory duties or obligations;
- Necessary for dealing with public health emergencies or protecting the life, health and property safety of natural persons in emergencies;
- Directly related to criminal investigation, prosecution, trial and judgment execution;
- Necessary for protecting the life and property of end users or other individuals, but difficult to get their consents;
- In accordance with the laws and regulations, collect the personal information disclosed by end users to the public themselves or other legally disclosed personal information within a reasonable range;
- In accordance with the laws and regulations, collect personal information of end users within a reasonable range from legally disclosed information, such as legal news reports, government information disclosure and other channels;
- Handle personal information within a reasonable range in order to conduct news reporting, public opinion supervision and other acts for the public interests;
- Necessary for academic research institutions to carry out statistic or academic research based on public interests, with the personal information deidentified when providing the results of academic research or description to the outside;
- Other circumstances as stipulated by laws and regulations.
Remind end users that we will seek the consents of end users before using the information for other purposes unspecified in these Privacy Policies.
II. How we use Cookie and similar technologies
A cookie is a mechanism allowing servers (or scripts) to store and retrieve information on a user's device. When end users interact with the Log Service SDK products or services, one or more cookies or anonymous identifiers may be sent to their devices. These identifiers typically contain site names, numbers, and characters. Using cookies, Baidu can better understand user habits, remember preferences, eliminate repetitive inputs, and offer personalized services. Cookies also help assess account security, quantify traffic, and analyze the effectiveness of designs and advertisements.
We will not use cookies for purposes beyond those outlined in these policies. End users can manage or delete cookies as they see fit. For further details, visit AboutCookies.org. Users can clear saved cookies on their devices, and most web browsers allow cookie blocking. However, by blocking cookies, users may need to reconfigure settings during each visit and may lose access to specific services or features relying on cookies.
III. How we share, transfer and disclose the personal information of end users
(I) Sharing
Without prior consent or compliance with applicable regulations, we will not share personal information with third parties outside of Baidu, unless the data is processed to prevent identification or recovery.
For companies, organizations, or individuals with whom we share personal information, we will evaluate their data security practices and establish strict confidentiality agreements, requiring them to comply with legal standards and apply robust security measures for handling personal information.
1. In the following cases, we may share personal information with the authorizations and consents of end users:
Certain services are provided in partnership with authorized entities as per these Privacy Policies. We may share limited personal information with these partners to ensure better user experience and customer service. Shared information will only be related to service provision and used for legitimate, legal, and defined purposes. Our partners are prohibited from using this information for any other purposes.
Now, our authorized partners include the following types:
(1) Service platforms or providers: Baidu’s products may integrate third-party services. To use these services, end users must authorize us to share their information with the relevant third-party service platforms or providers, enabling them to deliver the required services.
(2) Hardware/software/system providers: When Baidu’s products integrate with third-party hardware, software, or system services, we will share necessary end-user personal information upon receiving their authorization. This allows for seamless functionality or product usage analysis to enhance user experience.
(3) Advertising and consulting service providers/advertisers: Without the authorization of end users, we will not share their personal information with advertising or consulting service providers. However, we may provide such providers with processed information, such as anonymized user profiles, which ensures end users cannot be identified or their data restored. This is intended to help improve advertising effectiveness and analyze the utilization of our products and services without compromising user identity.
- For companies, organizations, and individuals with whom we share personal information, we will thoroughly assess their data security environment and sign strict confidentiality agreements. These agreements require them to adopt confidentiality and security measures to handle personal information in compliance with our instructions, these Privacy Policies, and other applicable confidentiality and security requirements.
(II) Transfer
We will not transfer the personal information of end users to any company, organization or individual except affiliates, excluding the following cases:
- Obtain the explicit authorizations or consents of end users in advance;
- Meet the requirements of laws, regulations, legal procedures or the mandatory government requirements or judicial rulings;
- In cases where we or our affiliates are involved in transactions such as mergers, divisions, liquidation, acquisitions, or sales of assets or businesses, the personal information of end users may be transferred as part of such transactions. We will ensure the confidentiality of this information during the transfer process and strive to ensure that the new company or organization receiving the data continues to adhere to these Privacy Policies. If not, we will ask the new entity to obtain the authorization of the end users anew.
(III) Public disclosure
We will only publicly disclose the personal information of end users in the following cases:
- Obtain the individual consents of end users;
- As required by laws, regulations, legal procedures, lawsuits, or mandatory government department directives.
(IV)Exceptions with prior authorization and consent when sharing, transferring or publicly disclosing personal information
In the following cases, sharing, transfer and public disclosure of personal information do not require the prior authorizations and consents of end users:
- Directly related to national security and national defense security;
- Necessary for the conclusion and performance of a contract to which the individual is a party;
- Necessary for performing statutory duties or obligations;
- When directly related to public safety, public health, or significant public interests. For example, it may be necessary for managing public health emergencies or safeguarding the life, health, and property of individuals during emergencies.
- Directly related to criminal investigation, prosecution, trial and judgment execution;
- Necessary for protecting the life and property of subject of personal information or other individuals, but difficult to get their consents;
- In accordance with the laws and regulations, handle the personal information disclosed by individuals or other legally disclosed information within a reasonable range, such as legal news reports, government information disclosure and other channels;
- In other circumstances outlined in laws and regulations.
IV. How we keep and protect the personal information of end users
(I) Retention period
We will retain your personal information for the duration required to provide services via the Log Service SDK and developer applications. However, under circumstances where laws and regulations mandate a different retention period, you agree to a longer retention period due to service safety, quality needs, dispute resolution, or technical challenges. We will extend the retention period as legally permissible or within reasonable bounds after the stated retention period.
When the retention period expires, we will delete or anonymize your personal information in accordance with legal requirements.
(II) Retention region
In principle, personal information that we collect and process within the People's Republic of China will be stored within China. If such information needs to be transferred to or accessed from jurisdictions outside the country or region where you use our products or services, we will strictly comply with legal requirements and obtain your prior consent in accordance with applicable laws. Since such jurisdictions may have different or no data protection laws, we will ensure that your personal information is transmitted in compliance with Chinese laws and that it receives the same level of protection as provided within China. For instance, we may request your explicit consent for a cross-border data transfer or implement security measures like data de-identification prior to the transfer.
(III) Security measures
- We adhere to the principle of "minimization" in collecting, using, storing, and transmitting user information. We inform you of the purpose and scope of such usage through user agreements and privacy policies.
- We place a high priority on information security. We have established a dedicated team to develop and implement various security technologies and measures. We conduct security background checks on individuals in critical security positions, have established a robust information security management framework, and implement an internal mechanism for addressing security incidents. Using encryption and trusted protection mechanisms, we ensure the confidentiality and integrity of data to guard against loss, unauthorized access, exposure, usage, damage, or breaches. All reasonable measures are employed to protect your personal information.
- We train and evaluate employees in data security awareness and competencies to reinforce their understanding of personal information protection. Employees authorized to handle personal data are identity-verified, granted controlled access, and required to sign confidentiality agreements. If a confidentiality agreement is violated, cooperation with Baidu will be immediately terminated, and relevant legal responsibilities will be pursued. Former employees who have had contact with personal information are also held to confidentiality standards.
- We remind you that the Internet is not an absolutely secure environment. When you exchange your geographic position or whereabouts trajectory information with other users through the third-party social software, email or SMS embedded in the Log Service SDK, you shall pay attention to ensuring the safety of your personal information if you are not sure whether the third-party software completely encrypts the information transmission
- We also ask you to understand that in the Internet industry, due to technical limitations and rapid development as well as possible malicious attacks, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information.You are expected to understand that the system and communication network that you use when using our products and/or services may have security problems in other links beyond our control.
- As per our security management systems, incidents involving the leakage, damage, or loss of personal information are deemed the most serious type of security breach. In such cases, our top-level emergency response protocol will be activated, managed by an interdisciplinary team comprising members from the Security, Public Affairs, and Legal departments.
(IV) Security event notification
- We will develop contingency plans for network security incidents and address risks like system vulnerabilities, computer viruses, network attacks, and intrusions promptly. Should a network security incident occur, we will immediately activate our emergency response plan, execute remedial measures, and notify the relevant authorities as required.
- Disclosure, damage, or loss of personal information is classified as a company-level critical security incident. We regularly conduct rehearsals of our security plans with our working group to prevent such incidents. If an incident does occur, we will activate the highest-priority emergency protocols, assemble a response team, and work to trace the cause and mitigate losses as swiftly as possible.
- If a personal information security incident occurs, we will promptly notify you of the basic details, potential impacts, measures already taken, and recommendations to minimize risks, along with any remedies available to you, following legal and regulatory requirements. Contact will be made via your registered contact information, such as internal notifications, SMS, phone, or email. If individual notification is impractical, we will issue a public announcement in an accessible and effective manner. Meanwhile, we will proactively report the resolution of the incident to the relevant authorities. Note that if our measures effectively control the harm caused by data leakage, tampering, or loss, notification to users may not be mandatory unless required by relevant authorities.
V. How we handle the personal information of minors
Baidu attaches great importance to the protection of minors' information.
The Log Service SDK products and services are mainly provided to adults. End users under 14 must read carefully the developer application privacy policies, these Privacy Policies and Baidu Children Personal Information Protection Statement under the supervision and guidance of their parents or other guardians before using the developer applications containing the Log Service SDK, and use the developer applications or provide personal information with the consents of their guardians.
If we discover that personal information of minors has been accidentally collected without verifiable parental consent, we will promptly take steps to delete the associated data.
If a guardian has reason to believe that we have collected a minor's personal information without consent, please contact us via tickets. We will take measures to promptly delete the data.
VI. How we guarantee the end users to exercise their rights related to personal information
In accordance with the relevant laws, regulations and standards of China and the common practices of other countries and regions, we will do our best to coordinate, support and guarantee end users to exercise the following rights on their personal information:
1. Rights to consulting, correction and supplement, copy and account cancellation
Recognizing that end users access Log Service SDK services through developer applications without registering or logging into a Baidu account, we require developers to provide user-friendly ways for end users to exercise their rights to consult, correct, supplement, copy their personal information, and cancel developer application accounts, as outlined in these Privacy Policies. If developers fail to meet these obligations, users may contact us as detailed in [VIII. How to Contact Us], and we will assist in safeguarding and implementing the users' rights to the fullest extent possible.
2. Right to deletion
To ensure end users can exercise their right to delete personal information, developers are required to provide straightforward processes for this in their Privacy Policies and other agreements. Users should follow these developer-provided procedures to request data deletion. If developers fail to comply, users can reach out to us via the contact details provided in [VIII. How to Contact Us] and request the deletion of personal data under the following conditions:
- We handle the personal information against laws, regulations or agreements with end users;
- Our processing purpose has been achieved, cannot be achieved or is no longer necessary for processing purpose;
- We stop providing products or services, or the retention period has expired
- End users withdraw their consents;
- Other instances as specified in applicable laws and regulations.
When end users delete information from our service, the corresponding data may not be immediately removed from our backup system. However, it will be deleted once the backup is updated. End users should understand that if the retention period mandated by laws, administrative regulations, or outlined in the Privacy Policies has not expired, or if it is technically challenging to delete certain personal information, we will cease processing it aside from storing it and implementing necessary security safeguards.
3. Withdrawal of consent
Each service function requires specific essential personal information to operate effectively. For the collection and use of additional personal information, end users may grant or revoke their consent at any time.
End users can directly disable the potential device system permissions described in these Privacy Policies or adjust the related authorization settings provided by developer applications (if applicable) to alter the scope of their consent or revoke authorizations.
If end users withdraw their consent, we will stop providing services tied to that consent and cease using the relevant personal information. The decision to withdraw consent will not affect any prior processing of personal information carried out based on the previously granted consent.
4. Right to data portability
To safeguard end users' rights to transfer their personal information, developers are required to commit to providing a simple implementation approach in these Privacy Policies and agreements with developers. To transfer personal information, end users should follow the implementation methods provided by developers. If developers fail to meet these commitments, end users can reach out to us via the methods outlined in [VIII. How to Contact Us], and we will strive to coordinate, support, and ensure the realization of these rights.
In compliance with applicable laws, regulations, and requirements established by the national network information authorities, and if technologically feasible, end users may request us to transfer their personal information to other entities designated by them.
5. Right to advance notification of product and service termination
The Log Service SDK remains committed to supporting developers and end users at all times. Should the Log Service SDK products cease operations due to specific circumstances, we will inform developers and end users through prominent notices on product pages, internal messages, emails, or other accessible means within a reasonable timeframe. We will stop collecting personal information and either delete or anonymize collected data in accordance with legal requirements.
6. Right to obtain explanation
End users have the right to request clarification regarding rules related to the processing of their personal information. They can contact us through the methods provided in [VIII. How to Contact Us].
VII. Revision and notification of privacy policies
Our Privacy Policies are subject to change.
We will not reduce end users' rights as outlined in these Privacy Policies without their explicit consent. Any changes to these Privacy Policies will be posted on this page.
For significant changes, we will publicize the changes to developers and end users via the main page of the Log Service SDK official website and notify developers through any accessible means. If developers disagree with the changes, they may stop integrating and using the Log Service SDK products and services. Continued integration and use of the Log Service SDK products and/or services will indicate agreement to the revised Privacy Policies. Developers are required to notify end users of these changes and secure full, lawful, and valid consent regarding the modifications during the continued use of Log Service SDK services. If end users object to these changes, they may discontinue using the Log Service SDK products and services, and developers should provide the mechanisms necessary for users to take such actions. If end users continue using the Log Service SDK products and/or services, it will imply their acceptance of and agreement to abide by the revised Privacy Policies.
Major changes referred to in these policies include but are not limited to:
- Our operational framework undergoes substantial changes, such as alterations to the purpose of processing personal information, the types of personal information processed, or how it is utilized.
- There are significant changes to our ownership structure or organizational framework, such as those resulting from business adjustments, bankruptcy, mergers, or acquisitions.
- The main object of personal information sharing, transfer or public disclosure changes;
- The rights of end users to participate in personal information processing and the way to exercise the rights have major changes;
- Our department responsible for handling personal information security, contact information and complaint channels change;
- The personal information security impact assessment report identifies high-risk concerns.
Following updates to these policies, we will archive previous versions for end users to review.
For matters not expressly addressed in these Privacy Policies, the Baidu Privacy Protection Statement will apply.
VIII. How to contact us
The growth of the Log Service SDK is inseparable from the joint efforts of all developers and end users. We are very grateful to developers and end users for their contributions to data update and use feedback of the Log Service SDK.
Developers and end users can feed back their suggestions on the Log Service SDK products and services and the problems encountered during the use through tickets, to help us optimize product functions and services and make more users use our products and services more conveniently.
Developers and end users can contact us through the personal information protection feedback platform (http://help.baidu.com/personalinformation).
Developers and end users can contact us through the following contact method:
No.10 Shangdi 10th Street, Haidian District, Beijing, China
Legal Department of Beijing Baidu Netcom Science and Technology Co., Ltd.
Postcode: 100085
To ensure efficient problem resolution and timely feedback, developers and end users should submit valid identification, effective contact details, written requests, and supporting evidence. We will process their requests after verifying their identities.
If developers/end users are unsatisfied with our reply, especially if end users think that our personal information processing behavior has harmed their legitimate rights and interests, developers/end users can also seek a solution through the following external channel: bring a lawsuit to the Haidian District People's Court in Beijing.
Appendix 1: Explanation of Terms
Personal Informationrefers to all kinds of information related to identified or identifiable natural persons recorded electronically or in other ways, excluding the anonymized information. Personal information includes name, date of birth, ID number, individual biometric information, address, contact information, communication records and contents, account password, property information, credit information, whereabouts trajectory, accommodation information, health and physiological information, transaction information, etc. Sensitive personal information refers to the personal information that, once leaked or illegally used, will easily lead to violation of individual dignity of natural persons or harm of personal and property safety, including biometric identification, religious belief, specific identity, medical health, financial accounts, whereabouts and other information, as well as personal information of minors under 14.
Devices refer to devices that can used to apply Baidu products and/or services, such as desktop devices, tablets or smart phones.
Device Information may include the attribute information (such as hardware model, OS version, device configuration, International Mobile Equipment Identity IMEI, International Mobile Subscriber Identity IMSI, network equipment hardware address MAC, advertisement identifier IDFA, supplier identifier IDFV, mobile equipment identifier MEID, anonymous equipment identifier OAID, IC card identifier ICCID, Android ID, hardware serial number and other unique device identifiers of end users), connection information (such as browser type, telecom operator, language used, WIFI information) and status information (such as device application installation list) of the terminal devices used by end users to install and run the Log Service SDK.
Log Information refers to the request automatically recorded by our server when end users access the Log Service SDK, such as end users’ IP address, browser type, language used, hardware information, OS version, network operators’ information, date, time and duration of the end user's access to the service, and other information provided, formed or retained by end users when using our products or services.
Cookie refers to a mechanism that supports the server (or script) to store and search information on the client, and extends the Web-based client/server application by adding simple and persistent client status. The server sends a status message when it returns an HTTP object to the client, which is saved by the client. The valid URL range in this status is explained in the status information. Afterwards, all HTTP requests initiated by the client will return the current value of the status information from the client to the server. This status information is called a Cookie.
Position Information refers to the accurate position information obtained through GPS information, WLAN access point, Bluetooth, base station and other sensor information, and also includes the rough geographic position information obtained through IP address or other network information.
User Portrait refers to the process of analyzing or predicting the personal characteristics of a specific natural person, such as his occupation, economy, health, education, personal preferences, credit and behavior, and forming his personal characteristic model by collecting, gathering and analyzing personal information. The personal information of a specific natural person is directly used to form a characteristic model of the natural person, which is called a direct user portrait. Using personal information not from a specific natural person, such as the data of the group in which he belongs, a characteristic model of the natural person is formed, which is called indirect user portrait.
Deidentification refers to the process that personal information is processed so that it cannot identify a specific natural person without additional information.
Anonymization refers to the process that the subject of personal information cannot be identified and the processed information cannot be recovered through technical processing of personal information. The information obtained by anonymizing personal information is not personal information.
Baidu Platforms refer to Baidu’s special channels or platform services (such as Baidu Search, Baidu APP and its derivatives, Baidu Baike, Baidu Zhidao, Baidu Tieba, Baidu Mobile Assistant and other Baidu products https://www.baidu.com/more/) and other websites, programs, services, tools and clients.
Affiliates refers to the operator of the log service DK [Beijing Baidu Netcom Science and Technology Co., Ltd.] and other companies that are affiliated with Baidu Company. "Affiliation" refers to the entity that directly or indirectly controls, or is controlled by, or is under the same control with an entity (including individual, company, partner, organization or any other entities). The aforementioned "control" refers to other relationships that directly or indirectly have the power to give instructions to the management and decision-making of relevant entities or instruct others to give instructions or constitute actual control in fact by holding voting rights, contracts or other means.
Thanks again to developers and end users for their trust in and use of Log Service SDK!
Beijing Baidu Netcom Science and Technology Co., Ltd.
Updated on February 4, 2024
Effective on February 4, 2024
