Privacy Policy
Welcome to use our software and related services!
Sichuan Chaojiaochong Technology Co., Ltd. (hereinafter referred to as "us" or "company") is
well aware of the importance of personal information to you, and will collect, use and protect
your personal information in accordance with the requirements of laws and regulations.
We hope that through this privacy policy, we will provide
you with a clear introduction to how we handle your personal information when using our
products/services, as well as the ways we can provide you with access, correction, deletion
and protection of this information.
introduction
(1) This privacy policy will help you understand the following:
-
We will collect and use your information in accordance with the privacy policy, but we will
not collect personal information in a mandatory bundle just because you agree to this
privacy policy.
-
When you use or turn on relevant functions or use services, we will collect and use relevant
information in order to realize the functions and services necessary.
Unless it is necessary for the realization of basic
business functions or in accordance with the requirements of laws and regulations, you
can refuse to provide without affecting other functions or services.
We will explain what is necessary information item by
item in the privacy policy.
-
If you are not logged in to your account, we will use the identifier information
corresponding to the device to protect the basic functions.
If you log in to your account, we will push
information based on the account information.
-
Geographic location, camera, photo album (storage), and phone
permissions
will not be turned on by default, and will only be used for specific functions or services
with your express authorization, and you can also withdraw authorization.
In particular, we need to point out that even if we have obtained
these sensitive permissions with your authorization, we will not collect your
information when the relevant functions or services are not needed.
For specific permission application and
usage, please see the attachment: Permission List
-
This privacy policy applies to your access and use of our products and services through this
product application, the product development kit (SDK) and application programming interface
(API) for third-party websites and applications.
(2) Special reminder
-
Before using this product and/or related services, please read carefully and choose to
accept or not accept this privacy policy. We strive to use easy-to-understand, concise and
concise text to express
important content such as terms related to your personal
information rights and interests. It has been prompted in bold or underlined form,
please pay special attention.
Once you use or continue to use our
products/services, it means that you agree to our processing of your relevant
information in accordance with this privacy policy.
-
If you do not agree with this privacy policy, we cannot provide
you with complete products and services, and you can also choose to stop using it.
When you choose to continue or use it again,
based on what is necessary to provide products and services, it will be deemed
that you accept and approve that we will process your relevant information in
accordance with this policy.
-
If you are under the age of 18, please read carefully and
fully understand this privacy policy accompanied by your guardian, and obtain the
consent of the guardian to use our services or provide us with
information.
-
If you have any questions about this privacy policy, you can contact us through the methods
provided in the "Contact Us" section of this privacy policy.
-
Please note that this policy does not apply to other third-party
products/services that you access through our products/services ("other third
parties", including your counterparty to transactions, any third-party websites, and
third-party service providers Etc.), please refer to the third party’s privacy
policy or similar statement for specific provisions.
1. How we collect and use personal information
We will collect information that you proactively provide when you use the service in
the following ways, and collect information generated during your use of the function or the
process of receiving the service through automated means:
(1) Basic necessary functions
- register log in
When you register and log in to this product and/or related services, you can log in and use
a third-party account, and
you will authorize us to obtain your public information (avatar,
nickname, and other information authorized by you) on the third-party platform. Used
to bind with this product account,
so that you can directly log in and use this product and related services.
- Certification
When you use identity authentication functions or services, according to relevant laws and
regulations,
you may need to provide your real identity information (real
name, ID number, phone number, etc.) to complete real-name verification.
In order to achieve the purpose of identity
authentication,
you agree and authorize us to provide, inquire, and verify
your aforementioned identity information to the relevant identity authentication
agency by itself or by entrusting a third party.
This information is personal sensitive information, you can refuse to provide it, but you
may not be able to obtain related services, but it will not affect the normal use of other
functions and services.
- Operation and safety assurance
-
We are committed to providing you with a safe and reliable product and use environment,
and providing high-quality and reliable services is our core goal.
The information collected to realize the security
function is necessary information.
We may use or integrate your account information,
transaction information, device information, service log information, and
information that our affiliates and partners have obtained your
authorization or shared in accordance with the law to comprehensively
determine the transaction risks of your account, perform identity
verification, testing, and Prevent security incidents, and take necessary
recording, auditing, analysis, and disposal measures.
-
Device information and log information
- In order to ensure the safe operation of software and services, we will collect
your WLAN access point, base station, network access method, type, status,
network quality data, operation log, device attribute information [SDK version,
device manufacturer, device model , Device language, device name, application
list information, hardware serial number, operating system and application
version and type, language setting, resolution, IP address, GPS location, system
platform, system version, application package name and version, before and after
application Set time, independent device identification, iOS advertising
identifier (IDFA), network card (MAC) address, international mobile equipment
identity (IMEI), anonymous equipment identifier (OAID), international mobile
subscriber identity (IMSI) base station information, sensors Information,
Bluetooth information, WIFI status information, CPU information, memory
information, battery usage].
- In order to prevent malicious programs and necessary for safe operation, we may
collect installed application information or running process information, the
overall operation of the application, usage and frequency, application crashes,
overall installation and usage, performance data, application sources .
- We may use your account information, device information [including device model,
operating system and version, client version, device resolution, package name,
device settings, process and software list, andriod_id/Android device unique
identifier, bssid/WIFI MAC physical address, IMSI/International Mobile User
Identity, IMEI/International Mobile Equipment Identity, iccid/mobile SIM card
number, IDFA, OPENUDID, GUID, OAID, device MAC address], service log information
and our affiliates and cooperation The information that the party is authorized
by you or can be shared in accordance with the law is used to determine account
security, perform identity verification, detect and prevent security incidents.
-
Please note that separate device information and log information are information that
cannot identify a specific natural person.
If we combine this type of non-personal
information with other information to identify a specific natural person, or combine
it with personal information, during the combined use period, this type of
non-personal information will be treated as personal information, unless you have
obtained your authorization Or unless otherwise provided by laws and regulations, we
will anonymize and de-identify this type of personal information.
During the combined use, this information will be
treated and protected as your personal information in accordance with this policy.
(2) Additional business functions
When you use the additional business functions of this product, in order to meet the purpose of
providing you with the product and service, in addition to the registration information, you
need to further provide us with your personal identification information, location information
and other necessary services for you If you do not use specific products and services, you do
not need to provide relevant information (which will be explained in detail below).
- Online activities
During your use of this product and service, we may be involved in product
online activities for marketing and promotion, and these functions may be adjusted due to
product version upgrades or event deadlines.
If involved: When participating in the online event
payment/withdrawal,
you need to provide the payment/withdrawal information
(including name, mobile phone number, contact address, ID number, e-mail
address, etc., subject to the event rules) to complete the payment/withdrawal
.
- customer service
- When you contact our customer service or use other user response functions (such as
service consultation, personal information protection complaints or suggestions, other
customer complaints and needs),
we may need you to provide necessary personal information
(name, user ID, mobile phone number) , E-mail,
recordings, pictures, videos)
to match and verify your user identity in order to protect
your account and system security.
-
We may also save your contact information (used when you
contact us or other contact information you actively provide to us, such as
telephone, email),
your communication/call records and content (personal
sensitive information) with us
, Other necessary information related to your needs
in
order to contact you or help you solve the problem, or record the solution and result of
the related problem.
This information is personal sensitive
information, you can refuse to provide it, but you may not be able to obtain related
services, but it will not affect the normal use of other functions and services.
- Session and available data
"Session and available data" refers to the information you provide to us
about your use of applications and services, including but not limited to the connection and
service-related data information generated by your use of applications and services.
Sessions and available data include connection requests , Server communication and data
sharing related information, including network testing, service quality, date, time and
location. We can also centrally process sessions and available data. Please note that
sessions and available data do not include any personal information, nor do you include you
Content that can be sent or shared through the use of applications (such as photos,
contacts, schedules, etc.) or services.
- Device permission call
-
In order to ensure the normal implementation of related
business functions, we need to call the corresponding necessary permissions
according to the specific usage scenarios, and ask you a pop-up window before
calling (see attachment: permission list for details).
-
If you need to turn off some of the above specific access functions (such as your
location information), most mobile devices will support this need. For specific methods,
please refer to or contact the service provider or manufacturer of your mobile device.
Please note that if you turn on any permission, you
authorize us to collect and use relevant information to provide you with
corresponding services. Once you turn off any permission, you cancel the
authorization. We will no longer continue to collect and use the corresponding
permissions. Using relevant information, it is also unable to provide you with
the services corresponding to the permission.
However, your decision to close the
authority will not affect the previous collection and use of information
based on your authorization.
- Advertising push function
-
Based on the collected information, we may cooperate with third-party service providers
to access third-party services (such as advertising, links or other forms of promotional
content) in our products and/or services.
We will not provide you to us or what we have
collected from you. In
order to ensure the normal realization of relevant
business functions, we need to call the corresponding necessary permissions
according to the specific usage scenarios, and ask you in the pop-up window
before calling (see attachment for details: Permission
list).
-
If you need to turn off some of the above specific access functions (such as your
location information), most mobile devices will support this need. For specific methods,
please refer to or contact the service provider or manufacturer of your mobile device.
Personal information (such as mobile phone number, nickname,
avatar, friend list) is shared with third-party service providers, and will not
collect your personal information on behalf of third-party service providers.
Third-party service providers who access
through our products and/or services may have their own privacy policies,
which are not subject to this "Privacy Policy".
Third-party service providers may collect
the personal information needed to provide you with services in accordance
with their own privacy policies.
We will make commercially reasonable efforts to require third-party service providers to
comply with relevant laws and regulations when processing your personal information, and
do our best to require them to take relevant confidentiality and security measures, but
we cannot guarantee that they will take corresponding measures in accordance with our
requirements .
-
If you use Xiaomi, Meizu, Huawei and other brands of mobile phones, this product may
directly or through a third party access the above-mentioned mobile phone manufacturer
Push SDK to collect
unique identification information (such as
IMEI),
and may collect your
phone model, system type, Parameters such as system version
and device screen size are used to push information such as products and
activities. For details,
please refer to the privacy policy or relevant statement of the SDK operator.
- Changes to the purpose of collecting and using personal information
Please understand that with the development of our business, the functions of
this product and the services provided may be adjusted and changed.
In principle, when a new function or service is
related to the function or service we currently provide, the personal information
collected and used will be directly or reasonably related to the original processing
purpose.
In scenarios that are not directly or reasonably
related to the original processing purpose, we will collect and use your personal
information, and we will notify you again and obtain your consent.
(3) Information from a third party
-
You can also use a third-party account (such as WeChat) to log in to our platform.
At this time, you can choose to authorize us to read
the public information (user name, nickname,
avatar) that
you registered, announced, and recorded on
the third-party platform
under the premise of complying with relevant laws
and regulations
.
For personal information that we request but cannot be provided by a third party, we can
still ask you to provide additional information.
We may obtain your above information from a third
party for the purpose of remembering your login identity as our user, so that we can
provide you with better products and services.
You can choose to authorize the scope of personal
information that we can obtain when using a third-party account to log in to our
platform.
However, please note that if you stop certain
permissions, you may not be able to enjoy the best service experience, and some services
may not be able to be used normally.
Please read carefully the user agreement or privacy
policy of the third-party partner service.
- The information shared by other users contains your information.
(4) Sensitive information
Before providing us with any personal information that is sensitive
information, please clearly consider that such provision is appropriate and agree that
your personal sensitive information can be processed in accordance with the purposes and
methods described in this policy.
For the definition of sensitive information,
please see the attachment: Nomenclature.
After obtaining your consent, we will collect and use your sensitive information
to implement functions related to our business, and allow you to make a choice to disagree with
the collection and use of this sensitive information, but refusal to use this information will
affect you Use related functions.
(5) Exceptions for obtaining authorization and consent
Please understand that in the following situations, in accordance with laws,
regulations and relevant national standards, we do not need your authorization to collect and
use your personal information:
- Relevant to fulfilling the obligations stipulated by laws and regulations;
- Directly related to national security and national defense security;
- Directly related to public safety, public health, and major public interests;
- Directly related to criminal investigation, prosecution, trial, and execution of judgments;
- In order to protect the life, property and other major legal rights of the personal
information subject or other individuals, but it is difficult to obtain the consent of the
person;
- Your personal information collected is disclosed to the public by yourself;
- Collect your personal information from legally publicly disclosed information, such as legal
news reports, government information disclosure and other channels;
- Necessary for signing or performing a contract according to your requirements;
- Necessary for maintaining the safe and stable operation of software and related services,
such as detecting and handling software and related service failures;
- Necessary for legal news reporting;
- When it is necessary for academic research institutions to conduct statistical or academic
research based on the public interest, and when they provide academic research or
description results to the outside, they de-identify the personal information contained in
the results;
- Other circumstances stipulated by laws and regulations.
You are especially reminded that if the information cannot identify
your personal identity alone or in combination with other information, it does not
belong to your personal information in the legal sense; when your information can
identify your personal identity alone or in combination with other information, or we
When data that cannot be linked with any specific personal information is used in
combination with other personal information of you, this information will be treated and
protected as your personal information in accordance with this privacy policy during the
combined use period.
2. How do we use similar technologies such as cookies
Similar technologies such as cookies and device information identification are
commonly used technologies on the Internet.
When you use this product and/or related services, we may
use related technologies to send one or more cookies or anonymous identifiers to your device
to collect and identify information when you visit and use this product.
We promise that we will not use cookies for any purpose
other than those stated in this privacy policy.
We use cookies and similar technologies to achieve the
following functions or services:
(1) Ensure the safe and efficient operation of products and services
We may set cookies or anonymous identifiers for authentication and security, so that
we can confirm whether you log in to the service safely, or whether you have encountered
embezzlement, fraud, or other illegal acts.
These technologies will also help us improve service
efficiency, improve login and response speed.
(2) Help you get a more relaxed visit experience
Using this type of technology can help you avoid repeating the steps and processes
of filling in your personal information and entering search content.
3. How do we share, transfer, and publicly disclose personal information
(1) Sharing
- Sharing principle
-
Authorization and consent principle:
Sharing your personal information with our affiliates and third parties requires your
authorization and consent, unless the shared personal information is information that
has been de-identified and the third party cannot re-identify such information. Subject
of natural person.
If related parties and third parties use the
information for purposes beyond the scope of the original authorization and consent,
they need to obtain your consent again.
-
The principle of legality and minimum
necessity:
the data shared with related parties and third parties must have a legitimate and
legitimate purpose, and the shared data is limited to the extent necessary to achieve
the purpose.
-
Security and prudence principle:
We will carefully evaluate the purposes of related parties and third-party data sharing
information, comprehensively evaluate the security capabilities of these partners, and
require them to follow the cooperation legal agreement.
We will conduct strict security monitoring on the
software tool development kit (SDK) and application program interface (API) used by
the partners to obtain information to protect data security.
- We are obligated to keep your information confidential and will not sell
or sell any of your information, except in the following cases:
-
Sharing under statutory circumstances:
We may share your personal information externally in accordance with laws and
regulations, litigation, dispute resolution needs, or in accordance with the
requirements of administrative and judicial organs in accordance with the law.
-
Sharing
with explicit consent
: After
obtaining your explicit consent, we will share
your personal information with other parties.
To the extent required or permitted by law, it is necessary to provide your personal
information to a third party in order to protect the interests, property or safety
of us and our users or the public from damage.
-
Sharing with affiliated companies: In
order to facilitate us to provide you with products or services based on platform
accounts, recommend information that may be of interest to you, and identify
abnormalities in our account, your personal information may be related to our affiliates
and/or their designated services Provider shared.
We will only share necessary personal information
and are bound by the purpose stated in this privacy policy. If we share your
sensitive personal information or the affiliate company changes the purpose of using
and processing personal information, we will again ask for your authorization and
consent.
-
Sharing with authorized partners: To
provide you with more complete and high-quality products and services, we may entrust
authorized partners or use third-party SDK-related technologies to provide services for
you or perform functions on our behalf.
We will only share your information for the
legal, legitimate, necessary, specific, and clear purposes stated in this privacy
policy. Partners can only have access to the information they need to perform their
duties and must not use this information for any other purpose.
- Currently, our authorization information includes the following:
-
Realize the shared information of the function or service
-
When you use the functions provided by our affiliates or third parties in our
products or services, or when software service providers, smart device
providers, and system service providers cooperate with us to provide services
for you, we will implement The information necessary for the business is shared
with these related parties and third parties for comprehensive statistics and
algorithmic analysis of characteristics and preferences to form an indirect
population profile to recommend, display or push information that may be of
interest to you, or Push commercial advertisements that are more suitable for
you.
-
Geographic location services: When you use geographic location-related services,
we will share device location information with location service providers
through SDK or related technologies so that you can reflect location results,
including:
IP information, GPS information, WLAN access
Entry point and base station sensor information.
GPS information is personally sensitive information, and refusal to provide it
will only affect the geographic location service function, but does not affect
the normal use of other functions.
-
In order to adapt the message push function to the terminal model you are using,
we may share the phone model, version and related device information with
terminal equipment manufacturers (Meizu, Huawei, OPPO, VIVO, Xiaomi, Samsung,
etc.) through SDK and other technologies. For details, please refer to the
privacy policy or related statement of the SDK operator.
-
Realize advertising-related shared information
We may cooperate with third-party advertising partners to provide you with
advertising services.
Our partners include but are not limited to
Tencent, etc.
Our partners may collect hardware and
software information, such as IP address, device ID and type, advertising ID,
device language, operating system, time zone, location information, and
identifiers associated with cookies or other technologies that may uniquely
identify your device symbol.
The collection and processing of information by the
aforementioned partners abide by their own privacy clauses and do not
apply to this policy.
To protect your legitimate rights and interests, if you find that there is a
risk, it is recommended that you immediately terminate the relevant operation
and get in touch with us in time.
-
Advertisement push: We may share information with partners who entrust us to
promote and advertise.
We will not share the information (name, ID
number) used to identify your personal identity, and will only provide
these partners that cannot identify you personally. The indirect
portrait label of the identity and the de-identified or anonymized
information
to help them increase the effective reach of advertisements without identifying
your personal identity.
-
Advertising statistics: We may share analysis and de-identification statistical
information with our business service providers, suppliers and other partners.
This information is difficult to associate with your identity information. This
information will help us analyze and measure the performance of advertising and
related services. Effectiveness.
-
Realize the shared information of security and analysis statistics
-
Safe use: We attach great importance to the security of accounts and services.
In order to protect the security of your and other users’ accounts and property,
and to protect you and our legitimate rights and interests from illegal
infringements,
we and our affiliates or service providers may share
necessary Device information, account and log
information.
-
Analyze product usage: In order to analyze the usage of our services and improve
user experience, we
will share statistical data on product usage (crash,
crash) with related parties or third parties,
which are difficult to combine with other information to identify you Personal
identity.
-
Third party service
We may link to social media or other services (including websites or
other forms of services) provided by third parties.
include:
-
You can use the "Share" button to share certain content to a third-party
service, or you can use a third-party service to log in to your account.
These functions may collect your
information (including your log information), and may install COOKIES on
your computer to operate the above functions normally;
-
We provide you with links through advertisements or other methods of our
services so that you can link to third-party services or websites;
-
Other access to third-party services.
For example, in order to achieve the
purpose stated in this policy, we may access third-party SDK services and
share some of your personal information collected by us in accordance with
this policy with these third parties in order to provide better customer
service and User experience (see attachment: third-party SDK directory for
access).
Such third-party social media or other services are operated
by the relevant third party.
Your use of such third-party social media
services or other services (including any information you provide to such
third parties) is subject to the third party’s own terms of service and
information protection statement (not this policy). You need to be careful
Read its terms.
This policy only applies to the personal
information we collect, and does not apply to any third-party services or
third-party information usage rules.
If you find that these third-party social
media or other services are at risk, it is recommended that you terminate
the relevant operations to protect your legitimate rights and interests.
(2) Transfer
- We will not transfer your personal information to any other third parties unless we have
your explicit consent.
- With the continuous development of our business, we may carry out mergers, acquisitions, and
asset transfers, and your personal information may be transferred as a result.
In the event of the aforementioned changes, we will
require the successor to protect your personal information in accordance with laws and
regulations and the security standards not lower than this privacy policy, otherwise we
will require the successor to obtain your authorization and consent again.
(3) Disclosure
- We will not publicly disclose your information unless we comply with national laws and
regulations or obtain your consent.
When we publicly disclose your personal information,
we will adopt security protection measures that comply with industry standards.
- We will disclose the relevant account information when we make announcements on penalties
for illegal accounts and fraudulent acts.
- We will publicly disclose information related to the incident after public welfare projects
such as "tracing people" and "fleeing chasing" are in compliance with laws and regulations
and clearly authorized.
When the incident is over, we will promptly delete
the personal information that has been disclosed.
(4) Personal information exempted from obtaining consent for sharing, transfer, and
public disclosure in accordance with the law
Please understand that in the following situations, in accordance with laws,
regulations and national standards, we do not need your authorization to share, transfer, and
publicly disclose your personal information:
- Related to national security and national defense security;
- Related to public safety, public health, and major public interests;
- Related to criminal investigation, prosecution, trial, and execution of judgments;
- To protect your or other individuals’ life, property, and other major legal rights, but it
is difficult to obtain your consent;
- Other situations that safeguard the public interest, for example, your credit evaluation
information needs to be disclosed/shared;
- Your personal information disclosed to the public on your own;
- Collect personal information from legally publicly disclosed information, such as legal news
reports, government information disclosure and other channels.
However, unless you explicitly refuse or process the
information that infringes your major interests.
According to laws and regulations, if personal information that has been
de-identified is shared, transferred, and publicly disclosed, and it is ensured that the data
recipient cannot recover and re-identify the subject of personal information, we will not need
to notify you and obtain information about the processing of such data. Your consent.
4. How do we save and protect your personal information
(1) Storage of personal information
-
Storage period: We only retain your personal information for the shortest period necessary
for the purpose of providing this product and service. After the necessary period is
exceeded, we will delete or anonymize your personal information, but laws and regulations
have otherwise Except as specified.
- Storage area: We store your personal information collected and generated in the course of
domestic operations in accordance with the provisions of laws and regulations in the
People's Republic of China.
At present, we will not transfer the above-mentioned
information overseas. If we transfer overseas, we will follow relevant national
regulations or seek your consent.
(2) Personal information protection measures
-
We attach great importance to the security of your personal information, and will strive to
take reasonable security measures (including technical and management aspects) to protect
your personal information and prevent the personal information you provide from being
improperly used or accessed without authorization, Public disclosure, use, modification,
damage, loss or leakage.
-
We will use encryption technology, anonymization processing and related reasonable and
feasible means that are no less than that of industry peers to protect your personal
information, and use security protection mechanisms to prevent your personal information
from being maliciously attacked.
-
We will establish a dedicated security department, security management system, and data
security process to ensure the security of your personal information.
We adopt a strict data use and access system to
ensure that only authorized personnel can access your personal information, and conduct
security audits on data and technology in a timely manner.
-
Although the above reasonable and effective measures have been
taken and the standards required by relevant laws and regulations have been complied
with, please understand that due to technical limitations and various malicious
methods that may exist, in the Internet industry, even if you do your best to
strengthen security measures, It is also impossible to always guarantee the 100%
security of the information. We will try our best to ensure the security of the
personal information you provide to us.
You know and understand that the system and
communication network used by you to access our services may have problems due
to factors beyond our control.
Therefore, we strongly recommend that you
take active measures to protect the security of personal information, including
but not limited to using complex passwords, regularly changing passwords, and
not disclosing your account password and related personal information to others.
-
We will formulate emergency response plans, and immediately activate emergency plans when
user information security incidents occur, and strive to prevent the impact and consequences
of these security incidents from expanding.
Once a user information security incident (leakage or
loss) occurs, we will promptly inform you in accordance with the requirements of laws
and regulations: the basic situation and possible impact of the security incident, the
disposal measures we have taken or will take, and you can take precautions on your own
And suggestions to reduce risks, and remedial measures for you.
We will promptly inform you of the relevant situation
of the event through push notifications, emails, letters, short messages and related
forms. When it is difficult to inform you one by one, we will adopt a reasonable and
effective way to issue an announcement.
At the same time, we will also report the handling of
user information security incidents in accordance with the requirements of relevant
regulatory authorities.
-
Special reminder: Once you leave this product and/or related
services, browse or use other websites, services and content resources, we will not
have the ability and direct obligation to protect your software and website
submissions other than this product and/or related services Any personal
information, no matter whether you log in, browse or use the above software, the
website is based on the link or guidance of this product.
5. How do you manage your personal information
(1) Access and correct your personal information
Except as required by laws and regulations, you have the right to access and correct your
personal information at any time.
If you need to access or correct other personal
information generated during your use of our products and/or services, please feel free to
contact us.
We will respond to your request in accordance with the
methods and deadlines listed in this privacy policy.
(2) Change the scope of your authorization or withdraw your authorization
-
You can change the scope of your authorization to continue to collect personal information
or withdraw your authorization by deleting information, turning off device functions, and
setting privacy settings in our website or software.
You can also withdraw all our authorization to
continue to collect your personal information by canceling your account.
-
How to change or revoke the permission setting,
you can turn off the permission function in the operating
system of the device itself.
You understand that after you perform the above operations, we will no longer be able to
provide you with services corresponding to the withdrawal of your consent or authorization,
but it will not affect the personal information processing that has been carried out based
on your authorization.
-
You understand that each business function requires some basic personal information to be
completed.
After you withdraw your consent or authorization, we cannot
continue to provide you with services corresponding to the withdrawal of your
consent or authorization, and will no longer process your corresponding personal
information.
Your decision to withdraw your consent or authorization will not affect the previous
processing of personal information based on your authorization.
(3) Account cancellation
You can directly apply for cancellation of your account in our
products.
You can complete the account cancellation through
the mobile APP access settings; after you cancel your account, we will stop
providing you with products and/or services, and according to your requirements,
unless otherwise provided by laws and regulations, we will delete your personal
information Or anonymize it.
(4) Stop operation to inform you
If we cease operations, we will promptly stop the collection of your personal information,
notify you of the suspension of operations in the form of one-by-one delivery or announcement,
and delete or anonymize the personal information we hold.
(5) Respond to your request
If you are unable to access, correct or delete your personal information through the above
methods, or you need to access, correct or delete other personal information generated when you
use our products and/or services, or if you think we have any violation of laws and regulations
Or with your agreement on the collection or use of personal information, you can contact us
through the contact information in this privacy policy.
In order to ensure safety, we may need you to provide a
written request or provide your identification documents. We will respond to your request
within 15 working days after receiving your feedback and verifying your identity.
For your reasonable request, we do not charge fees in
principle, but for repeated requests that exceed reasonable limits, we will charge a certain
cost depending on the circumstances.
For those that are unreasonably repeated, require
excessive technical means (for example, the need to develop new systems or fundamentally
change existing practices), bring risks to the legitimate rights and interests of others, or
are very impractical (for example, involving information stored on backup tapes) Request, we
may refuse.
Six, minor clauses
(1) Consent of the guardian
-
If you are a minor under the age of 18, before using this product
and/or related services, you should read and agree to this privacy policy under the
supervision and guidance of your parents or other guardians.
-
We protect the personal information of minors in accordance with
the relevant national laws and regulations. We will only collect, use, store, share,
transfer or disclose the personal information of minors when permitted by law,
parents or other guardians, or necessary to protect minors. Personal information of
adults; if we find that we have collected personal information of minors without
obtaining verifiable parental consent in advance, we will try to delete the relevant
information as soon as possible.
-
If you are the guardian of a minor, when you have any questions
about the personal information of the minor you are guarding, please contact us
through the contact information disclosed in this privacy policy of the
company.
(2) Special protection for children
-
For the personal information of children under the age of
14 that may be involved, we further take the following measures to protect: For the
collected personal information of children, in addition to complying with the
provisions of this privacy policy on the personal information of users, we will also
uphold legitimate, necessary, and informed consent. , The principles of clear
purpose, safety guarantee, and use in accordance with the law, and strictly follow
the requirements of the "Children’s Personal Information Network Protection
Regulations" and other laws and regulations for storage, use, and disclosure, and
will not exceed the period necessary to achieve the purpose of collection and use.
Later, we will delete or anonymize children's personal information.
For details on the content of special
protection for children, please see the attachment: Declaration on the
Protection of Children's Information.
-
If we find that we have collected personal information of
minors without the prior consent of a verifiable parent or legal guardian, we will
try to delete the relevant data as soon as possible.
(3) Prevent addiction
-
We attach great importance to the protection of minors’ personal information, and continue
to explore updated ways of protecting minors’ personal information.
-
We will actively follow the requirements of the national anti-addiction policy to protect
the legitimate rights and interests of minors by enabling the anti-addiction system.
We will determine whether the real-name information of the
relevant account is a minor through the verification of the real-name identity and
other information, and then decide whether to include this account in the
anti-addiction system.
In addition, we will collect your login time,
game duration and other information, and guide minors to play reasonably by
automatically interfering and restricting minors’ game time at the system level
and enabling mandatory offline functions. After consumption, try to contact
their guardian for reminder, confirmation and processing to help minors to surf
the Internet healthily.
-
If you are the legal guardian of a minor, please pay attention to whether the minor under
your supervision uses our services or provides personal information after obtaining your
authorization.
If you have any questions about the personal
information of the minors under your guardianship, please contact us through the contact
information in this agreement.
-
Special note: The anti-addiction system is only applicable when
the product is recognized as a game product and is connected to the anti-addiction
system.
7. Access, revision and notification of privacy policy
(1) Access to privacy policy
-
You can view the entire content of this privacy policy when you
visit the App welcome page for the first time, or you can view the entire content of
this privacy policy in the settings.
-
Please understand that the product and/or related services described in this privacy policy
may vary according to the mobile phone model, system version, software application version,
mobile client and other factors you are using.
The final products and services are subject to the
products and/or related services you use.
(2) Revision and notification of privacy policy
-
In order to provide you with better services, this product and/or related services will be
updated and changed from time to time. We will revise this privacy policy in due course.
These revisions form part of this privacy policy and have the same effect as this privacy
policy. With your explicit consent, we will not reduce your rights under this privacy policy
currently in effect.
-
After this privacy policy is updated, we will issue an updated version of this product, and
remind you of the updated content in an appropriate way before the updated terms take
effect, so that you can keep abreast of the latest version of this privacy policy.
If you continue to use our services, you agree to accept and be
bound by this revised policy.
8. Dispute Resolution
-
The establishment, effectiveness, performance, interpretation and dispute resolution of the
policies of this agreement shall be governed by the laws of the mainland of the People's
Republic of China.
-
If any dispute or dispute arises between you and us due to the policies of this agreement,
it shall first be settled through friendly negotiation; if the negotiation fails, you agree
to submit the dispute or dispute to the jurisdiction of the people’s court where the company
is located.
Nine, contact us
-
Contact feedback: If you have complaints, suggestions, or questions about personal
information protection, you can send the problem to [email protected], we will check and
verify your user identity and feedback you within 15 working days Complaints and reports.
-
This product is provided by Sichuan Super Hornworm Technology Co., Ltd. and its affiliates
to provide product operations and services.
This privacy policy will be updated and released on 2021-03-30 and will be effective
at the same time.
Attachment: Explanation of terms
Unless otherwise agreed, the terms used in this privacy policy usually only have the
following definitions:
-
Personal information (from GB/T 35273-2020 "Information Security Technology Personal
Information Security Regulations") is recorded electronically or in other ways that can
identify the identity of a specific natural person alone or in combination with other
information or reflect the activities of a specific natural person.
The personal information that may be involved in this privacy
policy includes basic information of natural persons (including name, address, phone
number, and e-mail address), personal identification information (including ID
number), and network identification information (including system account, IP
address, and email address). Address and the aforementioned passwords, passwords,
and password protection answers), personal property information (including bank
account numbers, passwords, transaction and consumption records, virtual currency,
virtual transactions, exchange codes and other virtual property information),
address book information, personal Internet access Records (including website
browsing records, software usage records), device information (including hardware
serial number, hardware model, device MAC address, operating system type, software
list, unique device identifier, MAC address, andriod_id/Android device unique
identifier, bssid /WIFI MAC physical address, IMSI/International Mobile Subscriber
Identity, IMEI/International Mobile Equipment Identity, iccid/mobile SIM card
number), personal location information (including approximate geographic location,
precise location information, longitude, latitude).
The types of personal information we actually
collect shall prevail as described above.
-
Personal sensitive information (from GB/T 35273-2020 "Information Security Technology
Personal Information Security Regulations"): Once leaked, illegally provided or abused may
endanger the safety of people and property, easily lead to personal reputation, physical and
mental health damage or discrimination Personal information such as treatment.
Personal sensitive information that may be involved in this
privacy policy includes your personal property information, personal identification
information (including ID number), network identification information, address book
information, precise positioning information, and contact address.
The types of personal sensitive information
that we actually collect shall prevail as described in the following text.
The types of personal sensitive information
we actually collect shall prevail as described above.
-
Device: Refers to devices that can be used to access our products and/or services, such as
desktop computers, laptops, tablets, or smartphones.
-
SSL: SSL (Secure Socket Layer), also known as the secure socket layer, is a security
protocol implemented on the transmission communication protocol (TCP/IP).
SSL supports various types of networks and provides
three basic security services at the same time, all of which use public key and
symmetric key technologies to achieve the effect of information confidentiality.
-
Cookie: A cookie is a small file containing a string of characters, which is sent and stored
in your computer, mobile device or other device (usually encrypted) when you log in and use
a website or other network content.
-
De-identification/anonymization: refers to the process of technical processing of personal
information so that the subject of personal information cannot be identified without
additional information, and the processed information cannot be restored.
-
Server log: Under normal circumstances, our server will automatically record the web page
requests you make when you visit the website.
These "server logs" usually include your web request,
internet protocol address, browser type, browser language, date and time of the request,
and one or more cookies that can uniquely identify your browser.
-
Affiliated companies refer to companies and institutions that control us, are under our
control, or are under common control with us now and in the future.
Control refers to the ability to directly or
indirectly influence the management/operation of a controlled object through ownership,
voting shares, contracts, actual operating associations, or other legally recognized
methods.
Attachment: Permission list
【Authority Description】
-
In order to ensure the realization of the functions of this product and the purpose of safe
and stable operation, we may apply for or use the relevant permissions of the operating
system;
-
In order to protect your right to know, we use the following list to display the relevant
operating system permissions that the product may apply for and use. You can manage the
relevant permissions according to your actual needs;
-
According to product upgrades, the types and purposes of application and use permissions may
change. We will adjust the list according to these changes in a timely manner to ensure that
you are informed about the application and use of permissions in a timely manner;
-
Please be aware that we may also use third-party SDKs for the functions and security needs
of our business and products, and these third parties may also apply for or use relevant
operating system permissions;
-
In the process of using the product, you may use H5 pages or small programs developed by
third parties. These third-party plug-ins or small programs may also apply for or use
relevant operating system permissions as necessary for business functions.
【List of Permissions】
Attachment: Third-party SDK directory
In order to ensure the implementation of relevant functions of this application and the safe and
stable operation of the application, we may access the software development kit (SDK) provided
by a third party to implement relevant functions.
The relevant third-party SDKs we access are listed in the
catalog.
Please note that third-party SDKs may have some changes
in data processing types due to their version upgrades, policy adjustments and other
reasons. Please refer to the official instructions published by them.
The relevant third-party SDKs we have accessed are:
Umeng
Purpose of use: statistical analysis, improvement of product quality
Obtain information: location authority, network authority, and obtain your device
information and status, network status after your consent.
Tencent
Bugly
Purpose of use: remind users to upgrade the version, analyze crash logs, and
improve product stability
Obtain information: device status permissions, network permissions, system
operation log permissions, and obtain your device information and status, network status and
product operation logs with your consent.
Tencent
Advertising
Purpose of use: personalized recommendations, display ads
Obtain information: location authority, network authority, and obtain your device
information and status, network status after your consent.
Live streaming
Purpose of use: Provide user-interested video content
Obtain information: network permissions, read and write permissions, rough and
precise location permissions, and obtain your device information and status, and location
information with your consent.
unity3D
Purpose of use: auxiliary development tool
Access to information: location permissions, network permissions, storage
permissions, application installation permissions
AppsFlyer
Purpose of use: data analysis, auxiliary operation
Obtain information: device manufacturer and identification information, device
application installation list, and obtain device information after your consent
Google
Purpose of use: data analysis, sharing, image processing, advertising, auxiliary
development
Obtaining information: equipment manufacturer and identification information,
equipment application installation list
Huawei
Advertising
Purpose of Use: Huawei Advertising Service
Obtain information: location authority, network authority, and obtain your device
information and status after your consent.
Kuaishou Advertising
Purpose of use: personalized recommendations, display ads
Obtain information: device access permissions, location permissions, network
permissions, and obtain device brand, model, software version, geographic location, network
connection information with your consent
Today's headline ad
Purpose of use: Toutiao advertising service
Obtain information: device access permissions, location permissions, network
permissions, and obtain device brand, model, software version, geographic location, and network
connection information with your consent.
Usee Technology
Purpose of use: life service, advertising push
Obtain information: device status authority, network authority, operation log,
and obtain device brand, model, software version, network connection information, operation log
with your consent
Speaking
of SDK
Purpose of use: Shushu SDK
Obtain information: device access permissions, network permissions, wifi status,
and obtain device brand, model, software version, network connection information with your
consent.
Shushuo SDK will involve the related capabilities of
iFLYTEK AI Marketing Cloud. After your consent, obtain storage device permissions, location
permissions, current application information, and recording permissions required for voice
interactive advertisements.
Attachment: Declaration of Children's Information Protection
We are committed to protecting the personal information of children who use our products or
services.
"Children's Information Protection Statement"
(hereinafter referred to as "this statement") and "Privacy Policy" are intended to explain
to guardians (hereinafter referred to as "you") and children how we collect, use, store and
process children’s personal information, and how we do The ways you and children provide to
access, correct, delete and protect this information.
Unless otherwise agreed, the terms and acronyms used in
this statement have the same meaning as those in the "User Agreement" and "Privacy Policy".
Special Note
-
Special instructions for child guardians:
If you are the guardian of child users, please read carefully and
choose whether to agree to this statement.
We hope to ask you to work with us to protect
children’s personal information, educate and guide children to enhance their
awareness and ability in personal information protection, and guide, remind and
require them not to provide any network product and service providers without
your consent. Personal information.
-
Special instructions for children:
-
If you are a minor under the age of 14, you need to read
this statement carefully with your guardian, and after obtaining your
guardian's consent, use our products, services or provide us with
information.
-
Please read carefully and fully understand the "Privacy
Policy" and this statement, and then choose whether to agree to the relevant
privacy policy and whether to allow you and the children under your
supervision to use our products or services.
If you do not agree with the relevant
privacy policy and the content of this statement or do not agree with
the information necessary to provide services, it may cause our products
or services to fail to operate normally, or to achieve the service
effects we intend to achieve, you and the children under your
supervision It may not be possible to use our products, services or
related specific business functions normally.
By clicking "Agree", you agree that we collect, use and process
information about you and the children under your supervision in accordance
with the "Privacy Policy" and this statement.
-
Please understand that this statement only applies to our products or
services specifically for children under 14 years of age, products or
services with functional sections specifically for children under 14 years
of age, or require users to enter birthday, age information, etc. to
identify the user’s age Products or services.
For products or services that cannot
identify or actively identify the age of users, the "Privacy Policy"
applies.
The products and services we provide
may include products or services provided by third parties, and you may
also log in and use third-party products and services through QQ,
WeChat, and Weibo.
Please note that this third party may
collect, use or process children's related information, and such third
party needs to obtain your consent separately.
We recommend that you ask children to
seek your consent before authorizing the collection and processing of
any personal information from a third party.
-
We remind you that the important clauses in this statement that are
closely related to the rights and interests of you and the children under
your guardianship (possibly), we have used bold fonts to remind you
specifically, please focus on reviewing them.
-
If you have any questions or requests for rights and other personal
information related matters in the process of reading this statement, we
have provided you with contact information, and we will answer you as soon
as possible.
1. What information do we collect
-
We strictly abide by laws and regulations and agreements with users, and collect the
following personal information of you and the children under your supervision according to
the specific circumstances of the user's choice of products or services.
-
For our products and services or certain functional sections of products and services
specifically for children under the age of 14, or require users to enter
birthday, age information and other products or services that can identify the
user’s age,
such as registering or using such products or services, We will require users to fill in
personal birthday information
to identify whether the user is a child under the age of 14, and in accordance with laws and
regulations, after obtaining the consent of the guardian, the children are allowed to
continue to use related products or services.
-
When we identify the user as a child under the age of 14 based on the above information
provided by the user,
we will collect your contact information, including your mobile phone number
and email address,
and use this information to contact you to verify your relationship with the child under
your supervision. Guardianship.
We may also associate your account with a child
account based on the specific plan of the product or service to verify the guardianship
relationship and obtain your consent, so as to protect the personal information rights
of you and the children under your guardianship.
In some products or services that involve
transactions,
we may request to collect and bind your bank card-related information so
that you can know and manage the transaction behavior of child users.
If the product or service involves uploading avatars
and other functions, we strongly recommend that you instruct children not to upload real
portrait photos and other information when using our products or
services.
-
When children use products or services, we will collect relevant information. For details,
please refer to the "Information We Collect" section of the "Privacy Policy" to learn more
about other children's personal information we collect.
If we need to collect the personal information of you or the children under your custody
beyond the scope of the above collection, we will inform you again and obtain your consent.
-
Please understand that you can choose whether to fill in or provide us with specific
information, but if you do not fill in or provide some specific information, it may cause
our products or services to fail to operate normally, or to fail to achieve the services we
intend to achieve As a result, you and the children under your supervision may not be able
to use our products, services or related specific business functions normally.
2. How we use this information
-
We strictly abide by laws and regulations and agreements with users, and use the collected
information about you and the children under your supervision for the following purposes:
-
Verify the identity of children and guardians
-
Provide necessary products or services, specific functions of products
or services
-
For the purpose of optimizing products or services, security
assurance, and service investigation
-
If we need to use the personal information of you or the children under your custody beyond
the above-mentioned purposes, we will inform you again and obtain your consent.
3. Circumstances for sharing, transferring, and disclosing children's personal
information
We comply with laws and regulations and strictly restrict the sharing, transfer, and
disclosure of children's personal information.
Under normal circumstances, we will not share children's
personal information with third parties.
We may share children’s personal information with third
parties only with the prior consent of the guardian.
-
shared
-
We will
Part of the child’s personal information (such as the child’s user
name, account number, password, and the transaction content of the child’s
user in some of our products and services, etc.)
Share with the guardian, the guardian can access and manage related personal
information.
-
For the purpose of external processing only, we may
cooperate with
third-party partners (third-party
service providers, contractors, agents, application developers, etc.,
for example, communication service providers that send emails or push
notifications on our behalf, for Our map service providers that provide location
services) (they may not be located in your jurisdiction) share children’s
personal information and let them process the above information for us in
accordance with our instructions, privacy policies, and related confidentiality
and security policies.
-
If we entrust a third party to process children’s personal information, we will
conduct a security assessment of the entrusted party and the entrusted behavior,
etc., and sign an entrustment agreement, requiring that the entrusted party’s
processing behavior shall not exceed our authorization scope. We entrust a third
party to process the children’s personal The information is mainly used for the
following purposes:
-
Provide our services to children;
-
To achieve the purposes described in the section "How do we use this
information";
-
Fulfill our obligations and exercise our rights in the "Privacy Policy" and
this statement;
-
Understand, maintain and improve our services.
If we share your and your children's information with the above-mentioned third parties,
we will conduct a security assessment and use
encryption, anonymization, and de-identification
processing
to ensure the safety of your and your children's information.
-
transfer
-
With the continuous development of our business, when mergers, acquisitions, asset
transfers and other transactions lead to the sharing of your and children’s personal
information with third parties, we will inform you of the situation through push
notifications, announcements, etc., in accordance with laws, regulations, and
non-compliance. Continue to protect or require new managers to continue to protect
your and children’s personal information below the standards required by this
statement.
-
We may use the collected children's information for big data analysis
after anonymization, such as forming heat maps and insight reports that do
not contain any personal information.
-
We may publicly disclose and share with our partners information that
does not contain identification content after statistical processing, so as
to understand how users use our services or to let the public understand the
general usage trends of our services.
-
Disclosure
Under normal circumstances, we prohibit the disclosure of children's personal information,
but we may disclose children's personal information for the following
purposes:
-
Comply with applicable laws and regulations and other relevant
regulations;
-
Comply with court judgments, rulings or other legal procedures;
-
Comply with the requirements of relevant government agencies or other
legally authorized organizations;
-
We have reason to believe that we need to comply with laws and
regulations and other relevant regulations;
-
It is reasonable and necessary for the purpose of implementing the
relevant service agreement or this statement, safeguarding the public
interest, and protecting the personal and property safety of our customers,
us or our affiliates, other users or employees, or other legitimate rights
and interests.
4. Store children's personal information
-
We will use encryption and other technical measures to store children's personal information
to ensure information security.
We store children's personal information for no
longer than the period necessary to achieve the purpose of collection and use.
Please refer to the "How We Store and Protect
Personal Information" section of the "Privacy Policy" to learn more about how we store
and protect children's personal information.
-
When our products or services cease to operate or the storage period of your and children’s
personal information expires, we will notify you and the children in the form of push
notifications, announcements, etc., and delete or anonymize them within a reasonable period
of time Personal information about you and your children.
5. Manage children's personal information
During the use of this product or service by children, in order for you and children to
access, correct, and delete relevant personal information more
conveniently
,
we have provided you with corresponding operating settings in the product design, and you
can also use the contact information provided by us
,
To feedback and consult relevant information.
We will contact you promptly after verifying your
feedback.
Please understand that during the verification process,
we may need you to provide
personal information such as the child's account number, child's date of
birth, contact information, etc.,
so that we can continue to respond to your needs after completing the identity verification
and problem verification.
-
Access to children’s personal information
You and the children under your supervision can view the personal information provided or
generated by child users during the use of our products or services,
including but not limited to user names, passwords, avatars, nicknames,
etc.
-
Correcting children's personal information
When you and the children under your supervision find that the children's personal
information we collect, use, and process is wrong, you can contact us to make corrections.
We will take timely measures to correct the problem
after completing the identity verification and verification.
-
Deleting children's personal information
If the following circumstances exist, you and the children under your supervision can
request us to delete the children's personal information collected, used and processed.
We will promptly take measures to delete it after
completing the identity verification and verifying the problem.
-
If we violate the provisions of laws, administrative regulations or the
agreement between the parties to collect, store, use, transfer, and disclose
children's personal information;
-
If we collect, store, use, transfer, and disclose children's personal
information beyond the scope of the purpose or the necessary period;
-
You withdraw your consent;
-
You or a child under your supervision terminates the use of products or services
by way of cancellation or other means.
However, please note that if you and the custodial child request us to delete
the personal information of a particular child, the child user may not be able
to continue to use our products and services or certain specific business
functions of the products and services.
If you find that your child's personal information has been collected without
your prior consent, please contact us in time and we will try to delete the
relevant data as soon as possible.
-
When children can manage their own accounts
after the age of 14 years of child custody, the right to manage their own
accounts.
If a child user chooses to manage product accounts on their own, you will no longer be able
to access or control their accounts.
When the warded child has the right to manage the
account of this product by himself, we will notify you and the warded child.
Sixth, the application of this statement
-
This statement only applies to our products or services specifically for children under 14
years of age, products or services with functional sections specifically for children under
14 years of age, or products or services that require users to enter birthdays, age
information, and other products or services that can identify the user's age ,
Only the "Privacy Policy" applies to products or services that cannot identify
or do not actively identify the user's age.
Please understand that if this statement does not stipulate, please refer to the applicable
"Privacy Policy".
-
In the case of the application of this statement, if there is any
inconsistency between this statement and the provisions of the "Privacy Policy",
this statement shall prevail.
Contact us: [email protected]