eteams Privacy Policy
Publishing Company: WEAVER NETWORK INTERNATIONAL PTE. LTD. (hereinafter referred to as "WEAVER")
Release date: January 1, 2020
Effective date: January 1, 2020
Revision date: June 11, 2025
Welcome to eteams!
To protect your relevant rights, the "eteams Privacy Policy" (hereinafter referred to as "this Privacy Policy") will explain to you how eteams will collect, use and store your personal information and what rights you have. Please read, understand and agree to this policy before using eteams.
This policy applies to the functions and services of the eteams product itself (including system login, instant messaging, address book, and built-in office applications), and does not apply to any other third-party products or services (hereinafter collectively referred to as third-party services) that corporate users access through the eteams open platform. Before choosing to use third-party services, you should fully understand the product functions and privacy protection policies of third-party services.
This Privacy Policy will help you understand the following:
1. What types of information do we collect
2. How we store this information
3. How we protect this information
4. How we use this information
5. Sharing and providing information to external parties
6. Content and Copyright
7. Changes to this Privacy Policy
8. Others
9. Contact Us
Related definitions:
eteams: eteams is an office management and communication tool provided by WEAVER. eteams products and services include eteams server (deployed in the cloud) and eteams client (including multiple application versions such as Windows, Mac, iOS, Android, Hongmeng, etc.).
Enterprise users: refers to individuals or organizations that have purchased eteams products and have management authority over the products, including but not limited to legal persons, government agencies, other organizations, partnerships or individual businesses, etc. (hereinafter referred to as "enterprise users"); Enterprise users can create their work platforms through eteams, open accounts and invite relevant people to join their work platforms and become their end users.
eteams server: refers to the software and hardware system that provides services for eteams products and is deployed on the cloud server.
Enterprise User Administrator: refers to an individual designated by the enterprise user who has the authority to operate the eteams system backend; the enterprise user administrator can be one person or multiple people.
Individual User: refers to an individual user who is invited by an Enterprise User and logs in to use eteams through an account opened for him by the Enterprise User in the background, hereinafter referred to as "you" or "End User".
Personal information: refers to various information recorded electronically or otherwise that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.
Sensitive personal information: refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, and may easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment, including identity document number, personal biometric information, communication records and content, property information, whereabouts, health and physiological information, transaction information, etc.
1. What types of information do we collect?
In order to provide services to you and corporate users, ensure the normal operation of services, improve and optimize our services, and ensure account security, eteams will collect information that you actively provide, authorize to provide, or that is generated by the use of services in the following ways:
1.1 Account Information: In order for us to provide you with services, you need to provide basic registration or login information, including team name, mobile phone number or email address, and create your account and password. After you log in to the system, you can modify your account password, avatar, mobile phone number, email and other personal information through the account password and personal information modification function provided by eteams . This information will be reported to the eteams server for storage. This information belongs to the enterprise user and is managed by the enterprise user administrator. WEAVER will not collect or process this information.
1.2 When you use eteams , in order to provide you and corporate users with eteams products and services, maintain the normal operation of our services, improve and optimize our service experience and protect the security of your account, the system will collect the following information from you:
1.2.1 Device information: Based on the device model and permissions you grant during the installation and use of eteams , we will collect information about the device you use eteams on, including device model, operating system, unique device identifier (DEVICEID) , Android ID,devicelocation information(such as loginIPaddress,GPSlocationeteamssoftware version number, etc.).
1.2.2 Log Information: When you use eteams , the system will collect log information about your use of the service, including the method, type and status of network access, network quality data, operation logs, and service log information.
You understand and agree that the above information may be saved and recorded on the eteams server, including the operating system, software version used, currently accessed enterprise user ID, unique device identifier (DEVICEID) and other information will be transmitted to the WEAVER APP version upgrade service as judgment data for upgrade detection.
1.3 In order to provide office management and communication services, the system will collect information and data submitted or generated by enterprise users and their end users during the use of eteams (hereinafter referred to as "enterprise controlled data"). Enterprise controlled data may include:
1.3.1 Your name, photo, gender, mobile phone number and other personal information that corporate users require you to provide;
1.3.2 Your geographic location information when using the clock-in function, clock-in records, approval records, texts, pictures, videos, etc. sent during chats;
1.3.3 Other data submitted by enterprise users, such as organizational structure, approval process, etc.
You understand and agree that these data are stored on the eteams server. The enterprise user is the controller of the enterprise control data. The system only processes the data in accordance with the instructions of the enterprise user (including the operations performed by the enterprise user and the enterprise user administrator through the management background, etc.) and the agreement between us and the enterprise user. If you have any questions or comments about the collection purpose, scope and use of the above enterprise control data, please contact the enterprise user administrator for processing.
1.4 When enterprise users need to enable the field tracking service, they need to upload your location information to the eteams server as the basic data for the tracking analysis function. Before enterprise users ask you to upload and manage your location information, please ensure that the enterprise users have informed you in advance and obtained your explicit consent to only collect your information necessary for operational and functional purposes, and have fully informed you of the purpose, scope and use of the relevant data collection.
1.5 When you use some of the functions of eteams (such as logging into the system, approval process, attendance clocking in, etc.), enterprise users may enable passwords or mobile fingerprints to verify your identity for security reasons. This process may collect the passwords and mobile fingerprint information you actively provide . The above information is sensitive information. Refusing to provide this information will only make you unable to use the corresponding function, but will not affect your use of other functions that do not rely on this function.
1.6 You understand and agree that some individual services may require you to enable specific access permissions in your device to enable the collection and use of information involved in these permissions. For example:
(1) After you enable the photo album and camera permissions, you can upload and take photos/pictures/videos, publish information and comments, and perform video chats;
(2) After you turn on the microphone and related voice permissions, you can use the voice function to interact with our products and others, contact customer service, send recording files and voice-to-text functions, etc.;
(3) After you enable location permission, we can obtain your location information so that we can display your current location in feedback comments, send location information in chats, and find nearby customers, etc.;
(4) After you enable the permission to read and write mobile phone storage, we can store some local setting data to reduce your unnecessary network traffic and provide you with a smoother user experience.
(5) After you have enabled the permission to make calls and send text messages, we can click in the system to make calls and send text messages to your colleagues and customer contacts.
(6) After you enable notification permissions, your daily office information can be displayed in the notification bar and related pages can be jumped. If you need a vibration reminder after receiving a message, you can enable the vibration permission in Notification Management; if you need to receive push messages even when you are offline, you can choose to enable the permission for the APP to start automatically when the computer is turned on.
(7) Retrieve running applications: used to detect whether the APP process has been recycled by the system; close the application: automatically restart the APP when an abnormality occurs.
(8) Collect information about installed applications and determine whether the required application has been installed before opening a specific address and using the navigation function of the Amap, Baidu or Tencent Maps APP.
Third-party software development kits (SDKs) we connect to
In order to adapt to the use of [eteams] and third-party platform services on different mobile devices, and realize your audio and video calls, voice-to-text, attendance positioning, customer address management, receiving information push, logging in to third-party platform accounts, sharing information on third-party platforms, and cloud invoice management, [eteams] has accessed third-party SDKs. Some third-party SDKs accessed by [eteams] may call your device permissions and obtain your relevant information so that you can use the corresponding functions normally on different mobile devices or third-party platforms. We will list the names of these third-party SDKs with personal information collection functions, the functions/services provided, official website links, privacy policy links, permissions applied for and types of personal information collected. The types of device permissions called by different third-party SDKs and the information obtained may be different, which may include obtaining your location information, reading/writing your external storage card, reading your mobile phone status and identity, and checking WLAN connections. Regarding the specific types of device permissions called by third-party SDKs and how to collect and use your personal information, it is recommended that you refer to the relevant service agreements and privacy policies of third-party SDKs. If you want to learn more about the third-party SDKs we have accessed, please read the third-party SDK situation description.
Android third-party SDK description
1.8 According to relevant laws and regulations, we do not need your authorization or consent to collect your information in the following circumstances:
(1) Those related to national security or national defense security;
(2) Related to public safety, public health, or major public interests;
(3) Related to criminal investigation, prosecution, trial and execution of judgment;
(4) For the purpose of protecting the life, property, and other major legitimate rights and interests of the information subject or other individuals, but it is difficult to obtain your consent;
(5) The collected information is disclosed to the public by you on your own initiative;
(6) Necessary for entering into a contract according to your request;
(7) Necessary for maintaining the safe and stable operation of eteams services, such as discovering and handling product or service failures;
(8) Necessary for legitimate news reporting;
(9) When academic research institutions conduct statistical or academic research based on public interest and provide the results of academic research or descriptions to the outside, they shall de-identify the information contained in the results;
(10) Other circumstances prescribed by laws and regulations.
1.9 Self-start and associated start instructions
1.9.1 To ensure that this application can normally receive information pushed by the client when it is closed or running in the background, this application must use the (self-start) capability, and will send broadcasts through the system to wake up this application for self-start or related startup behaviors at a certain frequency, which is necessary for realizing functions and services.
1.9.2 When you open a content push message, you will be redirected to the relevant content after obtaining your explicit consent. Without your consent, there will be no automatic or associated launch.
1.9.3 When you open a file downloaded within this App, a third-party App will be associated and launched.
Please understand that the functions and services we provide to you are constantly updated and developed. If a certain function or service is not described above and requires collecting your information, we will explain the content, scope and purpose of information collection to you separately through page prompts, interactive processes, website announcements, etc., in order to obtain your consent.
2. How we store this information
2.1 Where information is stored
Except for the third-party information specifically described above, all other information is stored on the eteams server. If you need to know the specific geographical location of the eteams server, please call us for consultation.
2.2 Duration of information storage
We will only store your personal information for the period necessary for the purposes described in this policy and for the shortest period required by laws and regulations. If we terminate our services or operations, we will promptly stop collecting your personal information and notify you in advance in accordance with relevant laws and regulations. We will delete or anonymize your personal information after the termination of services or operations, unless otherwise provided by laws, regulations or regulatory authorities.
The personal information we collect and generate during our operations within the territory of the People’s Republic of China is stored in China, except in the following circumstances:
1. There are clear provisions in laws and regulations;
2. Obtain your authorization and consent;
3. The eteams service you use involves cross-border transactions, and eteams needs to provide your personal information overseas.
In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this policy and national laws and regulations.
3. How we protect this information
3.1 We will strive to ensure the security of users' information at the system level to prevent the loss, improper use, unauthorized access or disclosure of information.
3.2 eteams uses some of the most advanced network security technologies available today. When you visit our site using industry standard Secure Sockets Layer (SSL) technology, we use server authentication and data encryption to protect your information and ensure that your data is secure and available only to registered users within your organization. Competitors simply cannot access your data.
3.3 Each time a user logs in, they must enter a unique username and password provided to them by eteams. eteams only sends session "cookies" that are used to record encrypted authentication information during a specific session. Session "cookies" do not contain the user's username and password. eteams does not use "cookies" to store other confidential user and session information, but has implemented more advanced security methods that are based on dynamic data and encoded session IDs.
3.4 eTeams is hosted in a secure server environment that uses firewalls and other advanced technologies to prevent interference or access by outside intruders.
4. How we use information
4.1 The device information and log information obtained by the authorized system during the use of eteams is mainly used to ensure the normal operation of the system functions and will not be used for any other commercial purposes.
4.2 For the use of enterprise control data, please consult the corresponding enterprise user administrator.
5. Sharing and providing information to external parties
Except for the necessary data that eteams needs to transmit to third-party systems when interacting with them to ensure the use of system functions as described above, the system itself will not automatically share or transfer your personal information to third parties. However, if you set the page to public, it means that you allow others to view and share your content.
6. Content and Copyright
WEAVER Network Technology Co., Ltd. does not own the content you submit in this service, and the ownership of such content still belongs to you.
You understand that WEAVER Network Technology Co., Ltd. is not responsible or liable in any way for any content provided by others, and WEAVER Network Technology Co., Ltd. has no obligation to pre-screen such content. However, WEAVER Network Technology Co., Ltd. has the right to decide at any time whether the content is appropriate and consistent with these Terms; if such content is found to violate these Terms or is otherwise objectionable, WEAVER Network Technology Co., Ltd. may pre-screen, transfer, reject, modify and/or delete the content at any time and at its absolute discretion without prior notice. The appearance design and patents of this service belong to WEAVER Network Technology Co., Ltd. You may not reproduce, copy, or reuse any part of the code and appearance design without the written permission of WEAVER Network Technology Co., Ltd.
7. Changes to this Privacy Policy
We may revise this Privacy Policy from time to time. When the policy terms change, we will inform you through the privacy update pop-up window of the APP.
8. Others
You may terminate your account and/or stop using the Service at any time.
WEAVER Network Technology Co., Ltd. may terminate or suspend all or part of your account and/or access to the Service at any time and under certain circumstances without prior notice. The reasons for such termination of service include but are not limited to:
Once your account is terminated, you will no longer be able to use the Service normally. In addition, you can choose to delete all information and content under your account.
The creation, management, and cancellation of user accounts are uniformly controlled and managed by the administrator of the team. Changes in account status (such as cancellation) take effect immediately after the administrator's operation.
The correction and deletion of user personal information is triggered by the user's application for information change or deletion, which will take effect immediately after approval by the administrator of the team.
9. Contact Us
If you have other complaints or suggestions, please call our service hotline to contact us. You can report the problem to the project\customer service personnel in charge of your company to provide a work order or send it to the following address:
7500A BEACH ROAD, #06-317 THE PLAZA, SINGAPORE WEAVER (collection)
Zip code: 199591
We will review the issue as soon as possible and respond within fifteen days after verifying your user identity.
Service Hotline:+65 6485 8842