Privacy Policy


Version release date: March 14, 2023

More relative policy : Cookie Policy

Special prompt

PieCloudDB Privacy Policy (hereinafter referred to as “the Privacy Policy” applies to the products and services provided by Hangzhou OpenPie Technology Development Co., Ltd. (hereinafter referred to as “we”, “OpenPie” or “the Company”) and its extended functions (hereinafter referred to as “OpenPie Services”). If a product we provide has a separate privacy policy or there is a special agreement in the corresponding user service agreement, the Privacy Policy of the product will take precedence. For the content not covered by the Privacy Policy and user service agreement, the content of the Policy shall prevail.
We are well aware of the importance of personal information to you, and will do our best to protect your personal information safe and reliable. We are committed to maintaining your trust in us and to legally, legitimately, necessarily, and in good faith in the processing of your personal information, and therefore have the Policy in order to fully understand how we collect, use, preserve, share, and transfer this information when you use OpenPie Services, and how we provide you with access, updating, deletion and protection of this information.
Before you use the services we provide, please be sure to read the Policy carefully to fully understand the content of each clause, and you can follow the guidelines of the Privacy Policy to make choices you think are appropriate. We try to concisely describe the relevant terms involved in the Privacy Policy and provide links to further instructions so that you can better understand them. If you have any questions, please contact us.

The Policy will help you understand the following contents:

I. Scope of application
II. How do we collect and use your personal information
III. How do we use Cookies or similar technologies
IV. How do we share, transfer or publicly disclose your personal information
V. How do we protect your personal information
VI. How do you manage your personal information
VII. How do we handle the personal information of minors
VIII. How to update the Privacy Policy
IX. How to contact us

I. Scope of application

1.1 The Privacy Policy applies to the services provided by us through the relevant websites under the domain name (;, our official website (, and the cloud market (such as Alibaba Cloud market), such as providing you with page browsing, enjoying the service by registering to log into the PieCloudDB Database, learning more product information and the technological services we provide to you through the website.
1.2 The Privacy Policy does not apply to the information you provide to a third party. For example, PieCloudDB Database will be settled in a third-party cloud market service provider. The protection of the information you provide to the cloud market service provider does not apply to the Privacy Policy, but applies to information protection and other related policies or regulations between you and cloud market service providers.
1.3 As a special prompt, the data uploaded and stored by you in the course of using the PieCloudDB Database service belongs to your business data ("User Business Content"); for your business data, without your authorization or the requirements of laws, regulations and relevant regulatory authorities, the Company will not view or use such data, and such business data is not applicable to the Privacy Policy.

II. How do we collect and use your personal information

2.1 How do we collect your information

2.1.1 Website use

When you visit or use our website, we automatically collect certain information, including information about the specific computer or equipment you are using, such as your compute's operating system and internet protocol (IP) address. We may also automatically collect and store information about your activities on our website, such as information about how you access and use our website, event information (such as access time, browser type and language), and data collected by Cookies and other similar technologies to identify your browsers, computers and/or other devices. For more information on the use of Cookies and other tracking technologies, please refer to “III. How do we use Cookies or similar technologies”.
We may also collect your name, email, postal address, phone number and other information you offer when you submit via the website to request more information about our services, complete surveys or download OpenPie promotional materials, provide feedback or even complaints about our services.

2.1.2 Account registration

When you need to register an account using PieCloudDB Database, you need to provide your mobile phone number or email for registration, set a user name and account name that meet the registration requirements, and set a login password. Such mobile phone number and email submitted by you may be subsequently used to receive verification code when logging in account and password retrieval, and shall be used as one of the contact information designated by us and you for receiving relevant business notices (such as new product launch and service change) or publicity and promotion of products and services.

2.1.3 Customer service function

If you contact our customer service, we may require you to provide necessary personal information for identity verification to ensure your account security. In order to provide services according to your demands, upon your authorization, the personnel in charge of customer service need to inquire or inspect your relevant information within the scope of your authorization. We will take technological and management measures as far as possible to ensure your information security and use it within the necessary scope. We may save your contact information (mobile phone number, WeChat number, QQ number or other contact information you use or provide actively), your communication records and content with us, and other necessary information to provide and record customer service for you.

2.1.4 Security guarantee function

In order to improve the security of your use of our products and services, protect your personal and property safety from infringement, better prevent security risks such as fishing websites, fraud, network loopholes, and computer viruses, and more accurately identify violations of laws and regulations, we may collect, use, or integrate your account information, transaction information, and equipment information to comprehensively judge your account and transaction risks, conduct authentication, detection, and prevention of security incidents, and take necessary records, audits, analyses, and handling measures in accordance with the law.

2.1.5 Supplementary account information

After your account is registered, you may continue to fill in your information in the basic information of your account, including but not limited to your real name, birthday, gender and/or unit name (if you have completed real-name authentication, your name and/or unit name will be subject to your real-name authentication information), industry, business term, enterprise size, main business, main products, website domain name, etc. (subject to the display of the web page at that time). If you do not provide this information, it will not affect your use of specific technological services; if you provide the above information, it will help us better understand your needs for our services, so as to promote and introduce to you product.

2.1.6 Obtaining your personal information from third parties

We may obtain personal information that you authorize to share from third parties, such as public virtual data warehouses and websites, business partners and social media platforms. We will use your personal information in accordance with the Agreement with third parties and after confirming the legality of the source of your personal information and subject to relevant laws and regulations.

2.2 You are fully aware that in the following conditions, we do not need to obtain your authorization and consent for the collection and use of personal information

2.2.1 Those related to national security and national defense security.

2.2.2 Those related to public security, public health, and major public interests.

2.2.3 Those related to criminal investigation, prosecution, trial and judgment execution.

2.2.4 Those difficult to obtain the consent of the principal or other individuals for protecting their vital rights and interests such as life and property.

2.2.5 Those disclosed to the public by the subject or guardian of personal information collected.

2.2.6 Those collected your personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.

2.2.7 Those necessary to sign a contract at your request.

2.2.8 Those necessary to maintain the safe and stable operation of the provided products and/or services, such as detecting and disposing product and/or service failure.

2.2.9 Those necessary for legitimate news reporting.

2.2.10 Where it is necessary for academic research institutions to carry out statistical or academic research based on public interests and provide academic research or described results to the public, the personal information contained in the results shall be de-identified.

2.2.11 Other conditions stipulated by laws and regulations.

III. How do we use Cookies or similar technologies

3.1 We may obtain and use your information by using Cookies or similar technologies, and store this information as log information.

3.2 By using Cookies, we provide users with a simple and personalized web experience. A Cookie is a small amount of data that is sent from a web server to your browser and stored on your computer’s hard drive. We use Cookies for the benefit of its users. For example, to make login for product or service names faster, you can choose to have a user name in a Cookie. This makes it easier and faster the next time you want to use the PieCloudDB Database service. Cookies enable us to serve you better and faster, and make your experience on the PieCloudDB Database service more personalized. You can reject or manage Cookies and similar technologies through your browser or user selection mechanism. However, please note that if you disable Cookies and similar technologies, we may not be able to provide you with the best service experience, and some services may not work properly.

3.3 We use our own Cookies or similar technologies for the following purposes:

3.3.1 Remember your identity.

3.3.2 Analyze your use of our services.

3.3.3 Optimize the advertisement.

3.4 If you wish to disable Cookies, you can configure your browser: Select “Reject Cookies” or “Notify you when a website sends Cookies”. Since our services are implemented by supporting Cookies, it may be difficult for you to fully access our services after completing the closing of Cookies. You may not help asking for Cookies, such as whether to keep your user information for easier login procedures (such as automatic login) the next time you enter this website.

IV. How do we share, transfer or publicly disclose your personal information

4.1 Entrusted processing

4.1.1 If we entrust a third party to process your personal information, we will agree with the trustee on the purpose, period, method of processing, types of personal information, protective measures and rights and obligations of both parties, and supervise the trustee’s personal information processing activities.

4.2 Sharing

4.2.1 We share your personal information in accordance with the principles of “legality, minimum necessity and clear purpose”. At the same time, we will conduct personal information protection impact assessments on personal information sharing activities in advance, and take effective technological protective measures for output forms, transfers and uses. At the level of cooperation agreements, the information protection obligations and responsibilities of partners are strictly required, and a data security protection agreement is signed with business partners before cooperation.

4.2.2 We will not share your information with any third party other than the Company, except in the following conditions:

(1) Obtain your explicit consent or authorization in advance.
(2) Share your information externally in accordance with applicable laws and regulations, requirements of legal procedures, mandatory administrative or judicial requirements.
(3) Only by sharing your personal information can we realize the core functions of our products and services or provide the services you need.
(4) In order to provide you with relevant products or services, show you content you may be interested in, protect your account and transaction security, etc., we may share your personal information with our affiliates. We will share your personal information with our affiliates in accordance with the terms of the Privacy Policy, but we will only share necessary personal information and be bound by the purposes stated in the Privacy Policy. If our affiliates wish to change the purpose of processing personal information, they will ask for your authorization again.
(5) We may share your information with third parties such as partners to ensure the smooth completion of the services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose.
(6) Provided based on academic research.
(7) Provided in accordance with the individual service agreement signed with you or other legal documents.

4.3 Transfer

4.3.1 Transfer refers to the process of transferring the control of personal information to other companies, organizations or individuals.

4.3.2 We will not transfer your personal information to any third party other than the Company, except in the following conditions:

(1) Obtain your explicit consent or authorization in advance.
(2) With the continuous development of our business, in the event of our merger, acquisition or bankruptcy liquidation, your information may be transferred as part of such transactions. If the transfer of personal information is involved, we will require the new company, organization or individual holding your personal information to continue to be bound by the Policy, otherwise we will require the Company, organization, or individual to seek your authorization again.

4.4 Public disclosure

4.4.1 We will not publicly disclose your personal information with any third party other than the Company, except in the following conditions:

(1) We may publicly disclose your personal information in accordance with laws and regulations, litigation, dispute resolution, or as required by administrative and judicial authorities.
(2) According to your needs, disclose the information you have specified in a disclosure method that you have explicitly agreed to.

V. How do we protect your personal information

5.1 We have always attached great importance to the protection of users’ personal information security. For this reason, we have adopted various security technologies and organizational and management protection measures to minimize the risk of your information being leaked, damaged, misused, accessed, disclosed and changed without authorization.

5.2 We conduct comprehensive security control over data through the non-disclosure agreement of information contactors, monitoring and audit mechanism.

5.3 We will organize security and privacy protection training courses to enhance employees’ security awareness and understanding of personal information protection policies and related procedures.

5.4 Please be aware that although we will try our best to ensure the security of any information you send to us, the Internet environment is not 100% safe, and we will not be liable for any risks or losses arising therefrom or related thereto.

5.5 In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: The basic situation and possible impact of security incidents, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks independently, and remedial measures for you, etc. We will promptly inform you of the event-related procedures via email, letter, phone call, push notification, etc. When it is difficult to inform the personal information subject one by one, we will issue an notification in a reasonable and effective manner. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

VI. How do you manage your personal information

6.1 We attach great importance to the management of your personal information, and do our best to protect your access to personal information, correction, deletion, withdrawal of consent and other legal rights, so that you have sufficient capability to maintain your privacy and personal information security.

6.2 Your personal information access and correction

6.2.1 Except as required by laws and regulations, you have the right to access and correct your personal information at any time, including:

(1) Account information;
(2) Browse information.

6.2.2 If you need to access or correct other personal information generated during the use of our products and services, please contact us at any time. We will respond to your request according to the method and time limit set out in the Privacy Policy.

6.3 Deletion of your personal information

6.3.1 In the following conditions, you can request us to delete personal information through the methods specified in the Policy:

(1) If our handling of personal information violates laws and regulations;
(2) If you no longer use our products and services, or you cancel your account;
(3) If we stop providing products and services, or the storage period has expired;
(4) If the purpose for which we process personal information has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose of processing.

6.4 Change or withdrawal of your consent

6.4.1 You can withdraw all authorizations for us to continue collecting your personal information by canceling your account.

6.4.2 Please understand that PieCloudDB Database may require the collection of necessary personal information in order to be implemented. When you withdraw your consent, we will not be able to continue to provide you with the services corresponding to the withdrawal of consent, but it will not affect the previous personal information processing services based on your authorization.

6.5 Cancellation of your account

6.5.1 You can cancel your previously registered account by contacting us.

6.5.2 After you cancel your account, the content, information, data, records, etc. under the account will be deleted or anonymized (unless otherwise stipulated by laws and regulations or otherwise required by regulatory authorities). At the same time, once the account is canceled, it cannot be restored.

6.6 Response to your above request

6.6.1 If you are unable to exercise your rights in the above way, you can contact us using the contact information specified in the Policy. In order to ensure the security of your account, when you make the above request to us, we may ask you to verify your identity before processing your request.

6.6.2 For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technological means, pose risks to the legitimate rights and interests of others, or are very impractical.

We will not be able to respond to your request in the following conditions:
(1) Those related to our fulfillment of obligations stipulated by laws and regulations;
(2) Those directly related to national security and national defense security;
(3) Those directly related to public security, public health and major public interests;
(4) Those directly related to criminal investigation, prosecution, trial and execution of judgments;
(5) Those we have sufficient evidence that the subject of personal information has subjective malice or abuse of rights;
(6) Those difficult to obtain the consent of the principal or other individuals for protecting their vital rights and interests such as life and property;
(7) Those causing serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations due to response to the request of the personal information subject;
(8) Those involving commercial secrets.

VII. How do we handle the personal information of minors

7.1 We attach great importance to the protection of personal information of minors. If you are a minor under the age of 18, you shall obtain your guardian’s consent before using our products and services. We will protect the personal information of minors in accordance with relevant national laws and regulations.

7.2 We will not take the initiative to directly collect personal information from minors. In cases where the personal information of minors is collected with the consent of the guardian, we will only use, share, transfer or disclose this information when permitted by law, the consent of the guardian or necessary to protect minors.

7.3 If it is proven that minors have used our products and services without the consent of their guardians, we will negotiate with the relevant guardians and try to delete the relevant personal information as soon as possible.

7.4 For minors under the age of 14, in addition to complying with the provisions of the Privacy Policy on user personal information, we will also adhere to the principles of legitimate necessity, informed consent, clear purpose, security guarantee and legal use. We will store, use and disclose children’s personal information in strict accordance with the requirements of laws and regulations such as the Provisions on the Network Protection of Children’s Personal Information, and will not exceed the period necessary to achieve the purpose of collection and use, after which we will delete or anonymize children’s personal information.

7.5 If you are a parent or other guardian of a minor under the age of 14, we may need to collect personal information from you about the child under custody as necessary to perform related services to you. If we need to collect children’s personal information from you in the specific services, we will obtain your consent in advance and inform you of the purpose and use of the collection. If you do not provide the aforementioned information, you will not be able to enjoy the relevant services we provide.

VIII. How to update the Privacy Policy

8.1 Our Privacy Policy may change in due course. We will post any changes in the Privacy Policy on our website. For major changes, we will provide a more formal notice, such as by making a special prompt on the browsing page, explaining the specific changes in the Privacy Policy. We will not reduce your rights under the Privacy Policy without your express consent.

8.2 Major changes referred to in the Privacy Policy include but are not limited to:

8.2.1 Our service model has major changes.

8.2.2 The main object of personal information sharing, transfer or public disclosure has major changes.

8.2.3 Your rights to participate in the processing of personal information and how they are exercised have major changes.

8.2.4 Our contact information and complaint channels have changes.

8.2.5 When the impact assessment report on personal information security indicates that there is a high risk.

8.2.6 We will archive the previous version of the Privacy Policy for your reference.

IX. How to contact us

If you have any questions, comments or suggestions on the Privacy Policy, we will generally reply within 15 working days, please contact us by the following methods:
Contact information: 021-51162549.