• Home
  •   /  
  • Privacy
Privacy Policy

Welcome to use our software and related services!

Sichuan Chaojiaochong Technology Co., Ltd. (hereinafter referred to as "us" or "company") is well aware of the importance of personal information to you, and will collect, use and protect your personal information in accordance with the requirements of laws and regulations. We hope that through this privacy policy, we will provide you with a clear introduction to how we handle your personal information when using our products/services, as well as the ways we can provide you with access, correction, deletion and protection of this information.

introduction

(1) This privacy policy will help you understand the following:

  1. We will collect and use your information in accordance with the privacy policy, but we will not collect personal information in a mandatory bundle just because you agree to this privacy policy.
  2. When you use or turn on relevant functions or use services, we will collect and use relevant information in order to realize the functions and services necessary. Unless it is necessary for the realization of basic business functions or in accordance with the requirements of laws and regulations, you can refuse to provide without affecting other functions or services. We will explain what is necessary information item by item in the privacy policy.
  3. If you are not logged in to your account, we will use the identifier information corresponding to the device to protect the basic functions. If you log in to your account, we will push information based on the account information.
  4. Geographic location, camera, photo album (storage), and phone permissions will not be turned on by default, and will only be used for specific functions or services with your express authorization, and you can also withdraw authorization. In particular, we need to point out that even if we have obtained these sensitive permissions with your authorization, we will not collect your information when the relevant functions or services are not needed. For specific permission application and usage, please see the attachment: Permission List
  5. This privacy policy applies to your access and use of our products and services through this product application, the product development kit (SDK) and application programming interface (API) for third-party websites and applications.

(2) Special reminder

  1. Before using this product and/or related services, please read carefully and choose to accept or not accept this privacy policy. We strive to use easy-to-understand, concise and concise text to express important content such as terms related to your personal information rights and interests. It has been prompted in bold or underlined form, please pay special attention. Once you use or continue to use our products/services, it means that you agree to our processing of your relevant information in accordance with this privacy policy.
  2. If you do not agree with this privacy policy, we cannot provide you with complete products and services, and you can also choose to stop using it. When you choose to continue or use it again, based on what is necessary to provide products and services, it will be deemed that you accept and approve that we will process your relevant information in accordance with this policy.
  3. If you are under the age of 18, please read carefully and fully understand this privacy policy accompanied by your guardian, and obtain the consent of the guardian to use our services or provide us with information.
  4. If you have any questions about this privacy policy, you can contact us through the methods provided in the "Contact Us" section of this privacy policy.
  5. Please note that this policy does not apply to other third-party products/services that you access through our products/services ("other third parties", including your counterparty to transactions, any third-party websites, and third-party service providers Etc.), please refer to the third party’s privacy policy or similar statement for specific provisions.

1. How we collect and use personal information

We will collect information that you proactively provide when you use the service in the following ways, and collect information generated during your use of the function or the process of receiving the service through automated means:

(1) Basic necessary functions

  1. register log in
  2. When you register and log in to this product and/or related services, you can log in and use a third-party account, and you will authorize us to obtain your public information (avatar, nickname, and other information authorized by you) on the third-party platform. Used to bind with this product account, so that you can directly log in and use this product and related services.

  3. Certification
  4. When you use identity authentication functions or services, according to relevant laws and regulations, you may need to provide your real identity information (real name, ID number, phone number, etc.) to complete real-name verification. In order to achieve the purpose of identity authentication, you agree and authorize us to provide, inquire, and verify your aforementioned identity information to the relevant identity authentication agency by itself or by entrusting a third party. This information is personal sensitive information, you can refuse to provide it, but you may not be able to obtain related services, but it will not affect the normal use of other functions and services.

  5. Operation and safety assurance
    1. We are committed to providing you with a safe and reliable product and use environment, and providing high-quality and reliable services is our core goal. The information collected to realize the security function is necessary information. We may use or integrate your account information, transaction information, device information, service log information, and information that our affiliates and partners have obtained your authorization or shared in accordance with the law to comprehensively determine the transaction risks of your account, perform identity verification, testing, and Prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures.
    2. Device information and log information
      1. In order to ensure the safe operation of software and services, we will collect your WLAN access point, base station, network access method, type, status, network quality data, operation log, device attribute information [SDK version, device manufacturer, device model , Device language, device name, application list information, hardware serial number, operating system and application version and type, language setting, resolution, IP address, GPS location, system platform, system version, application package name and version, before and after application Set time, independent device identification, iOS advertising identifier (IDFA), network card (MAC) address, international mobile equipment identity (IMEI), anonymous equipment identifier (OAID), international mobile subscriber identity (IMSI) base station information, sensors Information, Bluetooth information, WIFI status information, CPU information, memory information, battery usage].
      2. In order to prevent malicious programs and necessary for safe operation, we may collect installed application information or running process information, the overall operation of the application, usage and frequency, application crashes, overall installation and usage, performance data, application sources .
      3. We may use your account information, device information [including device model, operating system and version, client version, device resolution, package name, device settings, process and software list, andriod_id/Android device unique identifier, bssid/WIFI MAC physical address, IMSI/International Mobile User Identity, IMEI/International Mobile Equipment Identity, iccid/mobile SIM card number, IDFA, OPENUDID, GUID, OAID, device MAC address], service log information and our affiliates and cooperation The information that the party is authorized by you or can be shared in accordance with the law is used to determine account security, perform identity verification, detect and prevent security incidents.
    3. Please note that separate device information and log information are information that cannot identify a specific natural person. If we combine this type of non-personal information with other information to identify a specific natural person, or combine it with personal information, during the combined use period, this type of non-personal information will be treated as personal information, unless you have obtained your authorization Or unless otherwise provided by laws and regulations, we will anonymize and de-identify this type of personal information. During the combined use, this information will be treated and protected as your personal information in accordance with this policy.

(2) Additional business functions

When you use the additional business functions of this product, in order to meet the purpose of providing you with the product and service, in addition to the registration information, you need to further provide us with your personal identification information, location information and other necessary services for you If you do not use specific products and services, you do not need to provide relevant information (which will be explained in detail below).

  1. Online activities
  2. During your use of this product and service, we may be involved in product online activities for marketing and promotion, and these functions may be adjusted due to product version upgrades or event deadlines. If involved: When participating in the online event payment/withdrawal, you need to provide the payment/withdrawal information (including name, mobile phone number, contact address, ID number, e-mail address, etc., subject to the event rules) to complete the payment/withdrawal .

  3. customer service
    1. When you contact our customer service or use other user response functions (such as service consultation, personal information protection complaints or suggestions, other customer complaints and needs), we may need you to provide necessary personal information (name, user ID, mobile phone number) , E-mail, recordings, pictures, videos) to match and verify your user identity in order to protect your account and system security.
    2. We may also save your contact information (used when you contact us or other contact information you actively provide to us, such as telephone, email), your communication/call records and content (personal sensitive information) with us , Other necessary information related to your needs in order to contact you or help you solve the problem, or record the solution and result of the related problem. This information is personal sensitive information, you can refuse to provide it, but you may not be able to obtain related services, but it will not affect the normal use of other functions and services.
  4. Session and available data
  5. "Session and available data" refers to the information you provide to us about your use of applications and services, including but not limited to the connection and service-related data information generated by your use of applications and services. Sessions and available data include connection requests , Server communication and data sharing related information, including network testing, service quality, date, time and location. We can also centrally process sessions and available data. Please note that sessions and available data do not include any personal information, nor do you include you Content that can be sent or shared through the use of applications (such as photos, contacts, schedules, etc.) or services.

  6. Device permission call
    1. In order to ensure the normal implementation of related business functions, we need to call the corresponding necessary permissions according to the specific usage scenarios, and ask you a pop-up window before calling (see attachment: permission list for details).
    2. If you need to turn off some of the above specific access functions (such as your location information), most mobile devices will support this need. For specific methods, please refer to or contact the service provider or manufacturer of your mobile device. Please note that if you turn on any permission, you authorize us to collect and use relevant information to provide you with corresponding services. Once you turn off any permission, you cancel the authorization. We will no longer continue to collect and use the corresponding permissions. Using relevant information, it is also unable to provide you with the services corresponding to the permission. However, your decision to close the authority will not affect the previous collection and use of information based on your authorization.
  7. Advertising push function
    1. Based on the collected information, we may cooperate with third-party service providers to access third-party services (such as advertising, links or other forms of promotional content) in our products and/or services. We will not provide you to us or what we have collected from you. In order to ensure the normal realization of relevant business functions, we need to call the corresponding necessary permissions according to the specific usage scenarios, and ask you in the pop-up window before calling (see attachment for details: Permission list).
    2. If you need to turn off some of the above specific access functions (such as your location information), most mobile devices will support this need. For specific methods, please refer to or contact the service provider or manufacturer of your mobile device. Personal information (such as mobile phone number, nickname, avatar, friend list) is shared with third-party service providers, and will not collect your personal information on behalf of third-party service providers. Third-party service providers who access through our products and/or services may have their own privacy policies, which are not subject to this "Privacy Policy". Third-party service providers may collect the personal information needed to provide you with services in accordance with their own privacy policies. We will make commercially reasonable efforts to require third-party service providers to comply with relevant laws and regulations when processing your personal information, and do our best to require them to take relevant confidentiality and security measures, but we cannot guarantee that they will take corresponding measures in accordance with our requirements .
    3. If you use Xiaomi, Meizu, Huawei and other brands of mobile phones, this product may directly or through a third party access the above-mentioned mobile phone manufacturer Push SDK to collect unique identification information (such as IMEI), and may collect your phone model, system type, Parameters such as system version and device screen size are used to push information such as products and activities. For details, please refer to the privacy policy or relevant statement of the SDK operator.
  8. Changes to the purpose of collecting and using personal information
  9. Please understand that with the development of our business, the functions of this product and the services provided may be adjusted and changed. In principle, when a new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly or reasonably related to the original processing purpose, we will collect and use your personal information, and we will notify you again and obtain your consent.

(3) Information from a third party

  1. You can also use a third-party account (such as WeChat) to log in to our platform. At this time, you can choose to authorize us to read the public information (user name, nickname, avatar) that you registered, announced, and recorded on the third-party platform under the premise of complying with relevant laws and regulations . For personal information that we request but cannot be provided by a third party, we can still ask you to provide additional information. We may obtain your above information from a third party for the purpose of remembering your login identity as our user, so that we can provide you with better products and services. You can choose to authorize the scope of personal information that we can obtain when using a third-party account to log in to our platform. However, please note that if you stop certain permissions, you may not be able to enjoy the best service experience, and some services may not be able to be used normally. Please read carefully the user agreement or privacy policy of the third-party partner service.
  2. The information shared by other users contains your information.

(4) Sensitive information

Before providing us with any personal information that is sensitive information, please clearly consider that such provision is appropriate and agree that your personal sensitive information can be processed in accordance with the purposes and methods described in this policy. For the definition of sensitive information, please see the attachment: Nomenclature.

After obtaining your consent, we will collect and use your sensitive information to implement functions related to our business, and allow you to make a choice to disagree with the collection and use of this sensitive information, but refusal to use this information will affect you Use related functions.

(5) Exceptions for obtaining authorization and consent

Please understand that in the following situations, in accordance with laws, regulations and relevant national standards, we do not need your authorization to collect and use your personal information:

  1. Relevant to fulfilling the obligations stipulated by laws and regulations;
  2. Directly related to national security and national defense security;
  3. Directly related to public safety, public health, and major public interests;
  4. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
  5. In order to protect the life, property and other major legal rights of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;
  6. Your personal information collected is disclosed to the public by yourself;
  7. Collect your personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
  8. Necessary for signing or performing a contract according to your requirements;
  9. Necessary for maintaining the safe and stable operation of software and related services, such as detecting and handling software and related service failures;
  10. Necessary for legal news reporting;
  11. When it is necessary for academic research institutions to conduct statistical or academic research based on the public interest, and when they provide academic research or description results to the outside, they de-identify the personal information contained in the results;
  12. Other circumstances stipulated by laws and regulations.

You are especially reminded that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or we When data that cannot be linked with any specific personal information is used in combination with other personal information of you, this information will be treated and protected as your personal information in accordance with this privacy policy during the combined use period.

2. How do we use similar technologies such as cookies

Similar technologies such as cookies and device information identification are commonly used technologies on the Internet. When you use this product and/or related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information when you visit and use this product. We promise that we will not use cookies for any purpose other than those stated in this privacy policy. We use cookies and similar technologies to achieve the following functions or services:

(1) Ensure the safe and efficient operation of products and services

We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you log in to the service safely, or whether you have encountered embezzlement, fraud, or other illegal acts. These technologies will also help us improve service efficiency, improve login and response speed.

(2) Help you get a more relaxed visit experience

Using this type of technology can help you avoid repeating the steps and processes of filling in your personal information and entering search content.

3. How do we share, transfer, and publicly disclose personal information

(1) Sharing

  1. Sharing principle
    1. Authorization and consent principle: Sharing your personal information with our affiliates and third parties requires your authorization and consent, unless the shared personal information is information that has been de-identified and the third party cannot re-identify such information. Subject of natural person. If related parties and third parties use the information for purposes beyond the scope of the original authorization and consent, they need to obtain your consent again.
    2. The principle of legality and minimum necessity: the data shared with related parties and third parties must have a legitimate and legitimate purpose, and the shared data is limited to the extent necessary to achieve the purpose.
    3. Security and prudence principle: We will carefully evaluate the purposes of related parties and third-party data sharing information, comprehensively evaluate the security capabilities of these partners, and require them to follow the cooperation legal agreement. We will conduct strict security monitoring on the software tool development kit (SDK) and application program interface (API) used by the partners to obtain information to protect data security.
  2. We are obligated to keep your information confidential and will not sell or sell any of your information, except in the following cases:
    1. Sharing under statutory circumstances: We may share your personal information externally in accordance with laws and regulations, litigation, dispute resolution needs, or in accordance with the requirements of administrative and judicial organs in accordance with the law.
    2. Sharing with explicit consent : After obtaining your explicit consent, we will share your personal information with other parties.
      To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect the interests, property or safety of us and our users or the public from damage.
    3. Sharing with affiliated companies: In order to facilitate us to provide you with products or services based on platform accounts, recommend information that may be of interest to you, and identify abnormalities in our account, your personal information may be related to our affiliates and/or their designated services Provider shared. We will only share necessary personal information and are bound by the purpose stated in this privacy policy. If we share your sensitive personal information or the affiliate company changes the purpose of using and processing personal information, we will again ask for your authorization and consent.
    4. Sharing with authorized partners: To provide you with more complete and high-quality products and services, we may entrust authorized partners or use third-party SDK-related technologies to provide services for you or perform functions on our behalf. We will only share your information for the legal, legitimate, necessary, specific, and clear purposes stated in this privacy policy. Partners can only have access to the information they need to perform their duties and must not use this information for any other purpose.
  3. Currently, our authorization information includes the following:
    1. Realize the shared information of the function or service
      1. When you use the functions provided by our affiliates or third parties in our products or services, or when software service providers, smart device providers, and system service providers cooperate with us to provide services for you, we will implement The information necessary for the business is shared with these related parties and third parties for comprehensive statistics and algorithmic analysis of characteristics and preferences to form an indirect population profile to recommend, display or push information that may be of interest to you, or Push commercial advertisements that are more suitable for you.
      2. Geographic location services: When you use geographic location-related services, we will share device location information with location service providers through SDK or related technologies so that you can reflect location results, including: IP information, GPS information, WLAN access Entry point and base station sensor information. GPS information is personally sensitive information, and refusal to provide it will only affect the geographic location service function, but does not affect the normal use of other functions.
      3. In order to adapt the message push function to the terminal model you are using, we may share the phone model, version and related device information with terminal equipment manufacturers (Meizu, Huawei, OPPO, VIVO, Xiaomi, Samsung, etc.) through SDK and other technologies. For details, please refer to the privacy policy or related statement of the SDK operator.
    2. Realize advertising-related shared information

      We may cooperate with third-party advertising partners to provide you with advertising services. Our partners include but are not limited to Tencent, etc. Our partners may collect hardware and software information, such as IP address, device ID and type, advertising ID, device language, operating system, time zone, location information, and identifiers associated with cookies or other technologies that may uniquely identify your device symbol. The collection and processing of information by the aforementioned partners abide by their own privacy clauses and do not apply to this policy. To protect your legitimate rights and interests, if you find that there is a risk, it is recommended that you immediately terminate the relevant operation and get in touch with us in time.

      1. Advertisement push: We may share information with partners who entrust us to promote and advertise. We will not share the information (name, ID number) used to identify your personal identity, and will only provide these partners that cannot identify you personally. The indirect portrait label of the identity and the de-identified or anonymized information to help them increase the effective reach of advertisements without identifying your personal identity.
      2. Advertising statistics: We may share analysis and de-identification statistical information with our business service providers, suppliers and other partners. This information is difficult to associate with your identity information. This information will help us analyze and measure the performance of advertising and related services. Effectiveness.
    3. Realize the shared information of security and analysis statistics
      1. Safe use: We attach great importance to the security of accounts and services. In order to protect the security of your and other users’ accounts and property, and to protect you and our legitimate rights and interests from illegal infringements, we and our affiliates or service providers may share necessary Device information, account and log information.
      2. Analyze product usage: In order to analyze the usage of our services and improve user experience, we will share statistical data on product usage (crash, crash) with related parties or third parties, which are difficult to combine with other information to identify you Personal identity.
    4. Third party service

      We may link to social media or other services (including websites or other forms of services) provided by third parties. include:

      1. You can use the "Share" button to share certain content to a third-party service, or you can use a third-party service to log in to your account. These functions may collect your information (including your log information), and may install COOKIES on your computer to operate the above functions normally;
      2. We provide you with links through advertisements or other methods of our services so that you can link to third-party services or websites;
      3. Other access to third-party services. For example, in order to achieve the purpose stated in this policy, we may access third-party SDK services and share some of your personal information collected by us in accordance with this policy with these third parties in order to provide better customer service and User experience (see attachment: third-party SDK directory for access).
      Such third-party social media or other services are operated by the relevant third party. Your use of such third-party social media services or other services (including any information you provide to such third parties) is subject to the third party’s own terms of service and information protection statement (not this policy). You need to be careful Read its terms. This policy only applies to the personal information we collect, and does not apply to any third-party services or third-party information usage rules. If you find that these third-party social media or other services are at risk, it is recommended that you terminate the relevant operations to protect your legitimate rights and interests.

(2) Transfer

  1. We will not transfer your personal information to any other third parties unless we have your explicit consent.
  2. With the continuous development of our business, we may carry out mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will require the successor to protect your personal information in accordance with laws and regulations and the security standards not lower than this privacy policy, otherwise we will require the successor to obtain your authorization and consent again.

(3) Disclosure

  1. We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. When we publicly disclose your personal information, we will adopt security protection measures that comply with industry standards.
  2. We will disclose the relevant account information when we make announcements on penalties for illegal accounts and fraudulent acts.
  3. We will publicly disclose information related to the incident after public welfare projects such as "tracing people" and "fleeing chasing" are in compliance with laws and regulations and clearly authorized. When the incident is over, we will promptly delete the personal information that has been disclosed.

(4) Personal information exempted from obtaining consent for sharing, transfer, and public disclosure in accordance with the law

Please understand that in the following situations, in accordance with laws, regulations and national standards, we do not need your authorization to share, transfer, and publicly disclose your personal information:

  1. Related to national security and national defense security;
  2. Related to public safety, public health, and major public interests;
  3. Related to criminal investigation, prosecution, trial, and execution of judgments;
  4. To protect your or other individuals’ life, property, and other major legal rights, but it is difficult to obtain your consent;
  5. Other situations that safeguard the public interest, for example, your credit evaluation information needs to be disclosed/shared;
  6. Your personal information disclosed to the public on your own;
  7. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels. However, unless you explicitly refuse or process the information that infringes your major interests.

According to laws and regulations, if personal information that has been de-identified is shared, transferred, and publicly disclosed, and it is ensured that the data recipient cannot recover and re-identify the subject of personal information, we will not need to notify you and obtain information about the processing of such data. Your consent.

4. How do we save and protect your personal information

(1) Storage of personal information

  1. Storage period: We only retain your personal information for the shortest period necessary for the purpose of providing this product and service. After the necessary period is exceeded, we will delete or anonymize your personal information, but laws and regulations have otherwise Except as specified.
  2. Storage area: We store your personal information collected and generated in the course of domestic operations in accordance with the provisions of laws and regulations in the People's Republic of China. At present, we will not transfer the above-mentioned information overseas. If we transfer overseas, we will follow relevant national regulations or seek your consent.

(2) Personal information protection measures

  1. We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being improperly used or accessed without authorization, Public disclosure, use, modification, damage, loss or leakage.
  2. We will use encryption technology, anonymization processing and related reasonable and feasible means that are no less than that of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.
  3. We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner.
  4. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious methods that may exist, in the Internet industry, even if you do your best to strengthen security measures, It is also impossible to always guarantee the 100% security of the information. We will try our best to ensure the security of the personal information you provide to us. You know and understand that the system and communication network used by you to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing your account password and related personal information to others.
  5. We will formulate emergency response plans, and immediately activate emergency plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage or loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can take precautions on your own And suggestions to reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the event through push notifications, emails, letters, short messages and related forms. When it is difficult to inform you one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
  6. Special reminder: Once you leave this product and/or related services, browse or use other websites, services and content resources, we will not have the ability and direct obligation to protect your software and website submissions other than this product and/or related services Any personal information, no matter whether you log in, browse or use the above software, the website is based on the link or guidance of this product.

5. How do you manage your personal information

(1) Access and correct your personal information

Except as required by laws and regulations, you have the right to access and correct your personal information at any time. If you need to access or correct other personal information generated during your use of our products and/or services, please feel free to contact us. We will respond to your request in accordance with the methods and deadlines listed in this privacy policy.

(2) Change the scope of your authorization or withdraw your authorization

  1. You can change the scope of your authorization to continue to collect personal information or withdraw your authorization by deleting information, turning off device functions, and setting privacy settings in our website or software. You can also withdraw all our authorization to continue to collect your personal information by canceling your account.
  2. How to change or revoke the permission setting, you can turn off the permission function in the operating system of the device itself. You understand that after you perform the above operations, we will no longer be able to provide you with services corresponding to the withdrawal of your consent or authorization, but it will not affect the personal information processing that has been carried out based on your authorization.
  3. You understand that each business function requires some basic personal information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with services corresponding to the withdrawal of your consent or authorization, and will no longer process your corresponding personal information. Your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.

(3) Account cancellation

You can directly apply for cancellation of your account in our products. You can complete the account cancellation through the mobile APP access settings; after you cancel your account, we will stop providing you with products and/or services, and according to your requirements, unless otherwise provided by laws and regulations, we will delete your personal information Or anonymize it.

(4) Stop operation to inform you

If we cease operations, we will promptly stop the collection of your personal information, notify you of the suspension of operations in the form of one-by-one delivery or announcement, and delete or anonymize the personal information we hold.

(5) Respond to your request

If you are unable to access, correct or delete your personal information through the above methods, or you need to access, correct or delete other personal information generated when you use our products and/or services, or if you think we have any violation of laws and regulations Or with your agreement on the collection or use of personal information, you can contact us through the contact information in this privacy policy. In order to ensure safety, we may need you to provide a written request or provide your identification documents. We will respond to your request within 15 working days after receiving your feedback and verifying your identity. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. For those that are unreasonably repeated, require excessive technical means (for example, the need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) Request, we may refuse.

Six, minor clauses

(1) Consent of the guardian

  1. If you are a minor under the age of 18, before using this product and/or related services, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians.
  2. We protect the personal information of minors in accordance with the relevant national laws and regulations. We will only collect, use, store, share, transfer or disclose the personal information of minors when permitted by law, parents or other guardians, or necessary to protect minors. Personal information of adults; if we find that we have collected personal information of minors without obtaining verifiable parental consent in advance, we will try to delete the relevant information as soon as possible.
  3. If you are the guardian of a minor, when you have any questions about the personal information of the minor you are guarding, please contact us through the contact information disclosed in this privacy policy of the company.

(2) Special protection for children

  1. For the personal information of children under the age of 14 that may be involved, we further take the following measures to protect: For the collected personal information of children, in addition to complying with the provisions of this privacy policy on the personal information of users, we will also uphold legitimate, necessary, and informed consent. , The principles of clear purpose, safety guarantee, and use in accordance with the law, and strictly follow the requirements of the "Children’s Personal Information Network Protection Regulations" and other laws and regulations for storage, use, and disclosure, and will not exceed the period necessary to achieve the purpose of collection and use. Later, we will delete or anonymize children's personal information. For details on the content of special protection for children, please see the attachment: Declaration on the Protection of Children's Information.
  2. If we find that we have collected personal information of minors without the prior consent of a verifiable parent or legal guardian, we will try to delete the relevant data as soon as possible.

(3) Prevent addiction

  1. We attach great importance to the protection of minors’ personal information, and continue to explore updated ways of protecting minors’ personal information.
  2. We will actively follow the requirements of the national anti-addiction policy to protect the legitimate rights and interests of minors by enabling the anti-addiction system. We will determine whether the real-name information of the relevant account is a minor through the verification of the real-name identity and other information, and then decide whether to include this account in the anti-addiction system. In addition, we will collect your login time, game duration and other information, and guide minors to play reasonably by automatically interfering and restricting minors’ game time at the system level and enabling mandatory offline functions. After consumption, try to contact their guardian for reminder, confirmation and processing to help minors to surf the Internet healthily.
  3. If you are the legal guardian of a minor, please pay attention to whether the minor under your supervision uses our services or provides personal information after obtaining your authorization. If you have any questions about the personal information of the minors under your guardianship, please contact us through the contact information in this agreement.
  4. Special note: The anti-addiction system is only applicable when the product is recognized as a game product and is connected to the anti-addiction system.

7. Access, revision and notification of privacy policy

(1) Access to privacy policy

  1. You can view the entire content of this privacy policy when you visit the App welcome page for the first time, or you can view the entire content of this privacy policy in the settings.
  2. Please understand that the product and/or related services described in this privacy policy may vary according to the mobile phone model, system version, software application version, mobile client and other factors you are using. The final products and services are subject to the products and/or related services you use.

(2) Revision and notification of privacy policy

  1. In order to provide you with better services, this product and/or related services will be updated and changed from time to time. We will revise this privacy policy in due course. These revisions form part of this privacy policy and have the same effect as this privacy policy. With your explicit consent, we will not reduce your rights under this privacy policy currently in effect.
  2. After this privacy policy is updated, we will issue an updated version of this product, and remind you of the updated content in an appropriate way before the updated terms take effect, so that you can keep abreast of the latest version of this privacy policy. If you continue to use our services, you agree to accept and be bound by this revised policy.

8. Dispute Resolution

  1. The establishment, effectiveness, performance, interpretation and dispute resolution of the policies of this agreement shall be governed by the laws of the mainland of the People's Republic of China.
  2. If any dispute or dispute arises between you and us due to the policies of this agreement, it shall first be settled through friendly negotiation; if the negotiation fails, you agree to submit the dispute or dispute to the jurisdiction of the people’s court where the company is located.

Nine, contact us

  1. Contact feedback: If you have complaints, suggestions, or questions about personal information protection, you can send the problem to [email protected], we will check and verify your user identity and feedback you within 15 working days Complaints and reports.
  2. This product is provided by Sichuan Super Hornworm Technology Co., Ltd. and its affiliates to provide product operations and services.

This privacy policy will be updated and released on 2021-03-30 and will be effective at the same time.

Attachment: Explanation of terms

Unless otherwise agreed, the terms used in this privacy policy usually only have the following definitions:

  1. Personal information (from GB/T 35273-2020 "Information Security Technology Personal Information Security Regulations") is recorded electronically or in other ways that can identify the identity of a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. The personal information that may be involved in this privacy policy includes basic information of natural persons (including name, address, phone number, and e-mail address), personal identification information (including ID number), and network identification information (including system account, IP address, and email address). Address and the aforementioned passwords, passwords, and password protection answers), personal property information (including bank account numbers, passwords, transaction and consumption records, virtual currency, virtual transactions, exchange codes and other virtual property information), address book information, personal Internet access Records (including website browsing records, software usage records), device information (including hardware serial number, hardware model, device MAC address, operating system type, software list, unique device identifier, MAC address, andriod_id/Android device unique identifier, bssid /WIFI MAC physical address, IMSI/International Mobile Subscriber Identity, IMEI/International Mobile Equipment Identity, iccid/mobile SIM card number), personal location information (including approximate geographic location, precise location information, longitude, latitude). The types of personal information we actually collect shall prevail as described above.
  2. Personal sensitive information (from GB/T 35273-2020 "Information Security Technology Personal Information Security Regulations"): Once leaked, illegally provided or abused may endanger the safety of people and property, easily lead to personal reputation, physical and mental health damage or discrimination Personal information such as treatment. Personal sensitive information that may be involved in this privacy policy includes your personal property information, personal identification information (including ID number), network identification information, address book information, precise positioning information, and contact address. The types of personal sensitive information that we actually collect shall prevail as described in the following text. The types of personal sensitive information we actually collect shall prevail as described above.
  3. Device: Refers to devices that can be used to access our products and/or services, such as desktop computers, laptops, tablets, or smartphones.
  4. SSL: SSL (Secure Socket Layer), also known as the secure socket layer, is a security protocol implemented on the transmission communication protocol (TCP/IP). SSL supports various types of networks and provides three basic security services at the same time, all of which use public key and symmetric key technologies to achieve the effect of information confidentiality.
  5. Cookie: A cookie is a small file containing a string of characters, which is sent and stored in your computer, mobile device or other device (usually encrypted) when you log in and use a website or other network content.
  6. De-identification/anonymization: refers to the process of technical processing of personal information so that the subject of personal information cannot be identified without additional information, and the processed information cannot be restored.
  7. Server log: Under normal circumstances, our server will automatically record the web page requests you make when you visit the website. These "server logs" usually include your web request, internet protocol address, browser type, browser language, date and time of the request, and one or more cookies that can uniquely identify your browser.
  8. Affiliated companies refer to companies and institutions that control us, are under our control, or are under common control with us now and in the future. Control refers to the ability to directly or indirectly influence the management/operation of a controlled object through ownership, voting shares, contracts, actual operating associations, or other legally recognized methods.

Attachment: Permission list

【Authority Description】

  1. In order to ensure the realization of the functions of this product and the purpose of safe and stable operation, we may apply for or use the relevant permissions of the operating system;
  2. In order to protect your right to know, we use the following list to display the relevant operating system permissions that the product may apply for and use. You can manage the relevant permissions according to your actual needs;
  3. According to product upgrades, the types and purposes of application and use permissions may change. We will adjust the list according to these changes in a timely manner to ensure that you are informed about the application and use of permissions in a timely manner;
  4. Please be aware that we may also use third-party SDKs for the functions and security needs of our business and products, and these third parties may also apply for or use relevant operating system permissions;
  5. In the process of using the product, you may use H5 pages or small programs developed by third parties. These third-party plug-ins or small programs may also apply for or use relevant operating system permissions as necessary for business functions.

【List of Permissions】

Attachment: Third-party SDK directory

In order to ensure the implementation of relevant functions of this application and the safe and stable operation of the application, we may access the software development kit (SDK) provided by a third party to implement relevant functions. The relevant third-party SDKs we access are listed in the catalog. Please note that third-party SDKs may have some changes in data processing types due to their version upgrades, policy adjustments and other reasons. Please refer to the official instructions published by them. The relevant third-party SDKs we have accessed are:


Umeng

Purpose of use: statistical analysis, improvement of product quality

Obtain information: location authority, network authority, and obtain your device information and status, network status after your consent.

Tencent Bugly

Purpose of use: remind users to upgrade the version, analyze crash logs, and improve product stability

Obtain information: device status permissions, network permissions, system operation log permissions, and obtain your device information and status, network status and product operation logs with your consent.

Tencent Advertising

Purpose of use: personalized recommendations, display ads

Obtain information: location authority, network authority, and obtain your device information and status, network status after your consent.

Live streaming

Purpose of use: Provide user-interested video content

Obtain information: network permissions, read and write permissions, rough and precise location permissions, and obtain your device information and status, and location information with your consent.

unity3D

Purpose of use: auxiliary development tool

Access to information: location permissions, network permissions, storage permissions, application installation permissions

AppsFlyer

Purpose of use: data analysis, auxiliary operation

Obtain information: device manufacturer and identification information, device application installation list, and obtain device information after your consent

Google

Purpose of use: data analysis, sharing, image processing, advertising, auxiliary development

Obtaining information: equipment manufacturer and identification information, equipment application installation list

Huawei Advertising

Purpose of Use: Huawei Advertising Service

Obtain information: location authority, network authority, and obtain your device information and status after your consent.

Kuaishou Advertising

Purpose of use: personalized recommendations, display ads

Obtain information: device access permissions, location permissions, network permissions, and obtain device brand, model, software version, geographic location, network connection information with your consent

Today's headline ad

Purpose of use: Toutiao advertising service

Obtain information: device access permissions, location permissions, network permissions, and obtain device brand, model, software version, geographic location, and network connection information with your consent.

Usee Technology

Purpose of use: life service, advertising push

Obtain information: device status authority, network authority, operation log, and obtain device brand, model, software version, network connection information, operation log with your consent

Speaking of SDK

Purpose of use: Shushu SDK

Obtain information: device access permissions, network permissions, wifi status, and obtain device brand, model, software version, network connection information with your consent. Shushuo SDK will involve the related capabilities of iFLYTEK AI Marketing Cloud. After your consent, obtain storage device permissions, location permissions, current application information, and recording permissions required for voice interactive advertisements.

Attachment: Declaration of Children's Information Protection

We are committed to protecting the personal information of children who use our products or services. "Children's Information Protection Statement" (hereinafter referred to as "this statement") and "Privacy Policy" are intended to explain to guardians (hereinafter referred to as "you") and children how we collect, use, store and process children’s personal information, and how we do The ways you and children provide to access, correct, delete and protect this information. Unless otherwise agreed, the terms and acronyms used in this statement have the same meaning as those in the "User Agreement" and "Privacy Policy".

Special Note

  1. Special instructions for child guardians:
    If you are the guardian of child users, please read carefully and choose whether to agree to this statement.
    We hope to ask you to work with us to protect children’s personal information, educate and guide children to enhance their awareness and ability in personal information protection, and guide, remind and require them not to provide any network product and service providers without your consent. Personal information.
  2. Special instructions for children:
    1. If you are a minor under the age of 14, you need to read this statement carefully with your guardian, and after obtaining your guardian's consent, use our products, services or provide us with information.
    2. Please read carefully and fully understand the "Privacy Policy" and this statement, and then choose whether to agree to the relevant privacy policy and whether to allow you and the children under your supervision to use our products or services. If you do not agree with the relevant privacy policy and the content of this statement or do not agree with the information necessary to provide services, it may cause our products or services to fail to operate normally, or to achieve the service effects we intend to achieve, you and the children under your supervision It may not be possible to use our products, services or related specific business functions normally.
      By clicking "Agree", you agree that we collect, use and process information about you and the children under your supervision in accordance with the "Privacy Policy" and this statement.
    3. Please understand that this statement only applies to our products or services specifically for children under 14 years of age, products or services with functional sections specifically for children under 14 years of age, or require users to enter birthday, age information, etc. to identify the user’s age Products or services. For products or services that cannot identify or actively identify the age of users, the "Privacy Policy" applies. The products and services we provide may include products or services provided by third parties, and you may also log in and use third-party products and services through QQ, WeChat, and Weibo. Please note that this third party may collect, use or process children's related information, and such third party needs to obtain your consent separately. We recommend that you ask children to seek your consent before authorizing the collection and processing of any personal information from a third party.
    4. We remind you that the important clauses in this statement that are closely related to the rights and interests of you and the children under your guardianship (possibly), we have used bold fonts to remind you specifically, please focus on reviewing them.
    5. If you have any questions or requests for rights and other personal information related matters in the process of reading this statement, we have provided you with contact information, and we will answer you as soon as possible.

1. What information do we collect

  1. We strictly abide by laws and regulations and agreements with users, and collect the following personal information of you and the children under your supervision according to the specific circumstances of the user's choice of products or services.
  2. For our products and services or certain functional sections of products and services specifically for children under the age of 14, or require users to enter birthday, age information and other products or services that can identify the user’s age, such as registering or using such products or services, We will require users to fill in personal birthday information to identify whether the user is a child under the age of 14, and in accordance with laws and regulations, after obtaining the consent of the guardian, the children are allowed to continue to use related products or services.
  3. When we identify the user as a child under the age of 14 based on the above information provided by the user, we will collect your contact information, including your mobile phone number and email address, and use this information to contact you to verify your relationship with the child under your supervision. Guardianship. We may also associate your account with a child account based on the specific plan of the product or service to verify the guardianship relationship and obtain your consent, so as to protect the personal information rights of you and the children under your guardianship. In some products or services that involve transactions, we may request to collect and bind your bank card-related information so that you can know and manage the transaction behavior of child users. If the product or service involves uploading avatars and other functions, we strongly recommend that you instruct children not to upload real portrait photos and other information when using our products or services.
  4. When children use products or services, we will collect relevant information. For details, please refer to the "Information We Collect" section of the "Privacy Policy" to learn more about other children's personal information we collect.
    If we need to collect the personal information of you or the children under your custody beyond the scope of the above collection, we will inform you again and obtain your consent.
  5. Please understand that you can choose whether to fill in or provide us with specific information, but if you do not fill in or provide some specific information, it may cause our products or services to fail to operate normally, or to fail to achieve the services we intend to achieve As a result, you and the children under your supervision may not be able to use our products, services or related specific business functions normally.

2. How we use this information

  1. We strictly abide by laws and regulations and agreements with users, and use the collected information about you and the children under your supervision for the following purposes:
    1. Verify the identity of children and guardians
    2. Provide necessary products or services, specific functions of products or services
    3. For the purpose of optimizing products or services, security assurance, and service investigation
  2. If we need to use the personal information of you or the children under your custody beyond the above-mentioned purposes, we will inform you again and obtain your consent.

3. Circumstances for sharing, transferring, and disclosing children's personal information

We comply with laws and regulations and strictly restrict the sharing, transfer, and disclosure of children's personal information. Under normal circumstances, we will not share children's personal information with third parties. We may share children’s personal information with third parties only with the prior consent of the guardian.

  1. shared
    1. We will Part of the child’s personal information (such as the child’s user name, account number, password, and the transaction content of the child’s user in some of our products and services, etc.) Share with the guardian, the guardian can access and manage related personal information.
    2. For the purpose of external processing only, we may cooperate with third-party partners (third-party service providers, contractors, agents, application developers, etc., for example, communication service providers that send emails or push notifications on our behalf, for Our map service providers that provide location services) (they may not be located in your jurisdiction) share children’s personal information and let them process the above information for us in accordance with our instructions, privacy policies, and related confidentiality and security policies.
    3. If we entrust a third party to process children’s personal information, we will conduct a security assessment of the entrusted party and the entrusted behavior, etc., and sign an entrustment agreement, requiring that the entrusted party’s processing behavior shall not exceed our authorization scope. We entrust a third party to process the children’s personal The information is mainly used for the following purposes:
      1. Provide our services to children;
      2. To achieve the purposes described in the section "How do we use this information";
      3. Fulfill our obligations and exercise our rights in the "Privacy Policy" and this statement;
      4. Understand, maintain and improve our services.
    4. If we share your and your children's information with the above-mentioned third parties, we will conduct a security assessment and use encryption, anonymization, and de-identification processing to ensure the safety of your and your children's information.
  2. transfer
    1. With the continuous development of our business, when mergers, acquisitions, asset transfers and other transactions lead to the sharing of your and children’s personal information with third parties, we will inform you of the situation through push notifications, announcements, etc., in accordance with laws, regulations, and non-compliance. Continue to protect or require new managers to continue to protect your and children’s personal information below the standards required by this statement.
    2. We may use the collected children's information for big data analysis after anonymization, such as forming heat maps and insight reports that do not contain any personal information.
    3. We may publicly disclose and share with our partners information that does not contain identification content after statistical processing, so as to understand how users use our services or to let the public understand the general usage trends of our services.
  3. Disclosure
    Under normal circumstances, we prohibit the disclosure of children's personal information, but we may disclose children's personal information for the following purposes:
    1. Comply with applicable laws and regulations and other relevant regulations;
    2. Comply with court judgments, rulings or other legal procedures;
    3. Comply with the requirements of relevant government agencies or other legally authorized organizations;
    4. We have reason to believe that we need to comply with laws and regulations and other relevant regulations;
    5. It is reasonable and necessary for the purpose of implementing the relevant service agreement or this statement, safeguarding the public interest, and protecting the personal and property safety of our customers, us or our affiliates, other users or employees, or other legitimate rights and interests.

4. Store children's personal information

  1. We will use encryption and other technical measures to store children's personal information to ensure information security. We store children's personal information for no longer than the period necessary to achieve the purpose of collection and use. Please refer to the "How We Store and Protect Personal Information" section of the "Privacy Policy" to learn more about how we store and protect children's personal information.
  2. When our products or services cease to operate or the storage period of your and children’s personal information expires, we will notify you and the children in the form of push notifications, announcements, etc., and delete or anonymize them within a reasonable period of time Personal information about you and your children.

5. Manage children's personal information

During the use of this product or service by children, in order for you and children to access, correct, and delete relevant personal information more conveniently , we have provided you with corresponding operating settings in the product design, and you can also use the contact information provided by us , To feedback and consult relevant information. We will contact you promptly after verifying your feedback. Please understand that during the verification process, we may need you to provide personal information such as the child's account number, child's date of birth, contact information, etc., so that we can continue to respond to your needs after completing the identity verification and problem verification.

  1. Access to children’s personal information
    You and the children under your supervision can view the personal information provided or generated by child users during the use of our products or services, including but not limited to user names, passwords, avatars, nicknames, etc.
  2. Correcting children's personal information
    When you and the children under your supervision find that the children's personal information we collect, use, and process is wrong, you can contact us to make corrections.
    We will take timely measures to correct the problem after completing the identity verification and verification.
  3. Deleting children's personal information If the following circumstances exist, you and the children under your supervision can request us to delete the children's personal information collected, used and processed. We will promptly take measures to delete it after completing the identity verification and verifying the problem.
    1. If we violate the provisions of laws, administrative regulations or the agreement between the parties to collect, store, use, transfer, and disclose children's personal information;
    2. If we collect, store, use, transfer, and disclose children's personal information beyond the scope of the purpose or the necessary period;
    3. You withdraw your consent;
    4. You or a child under your supervision terminates the use of products or services by way of cancellation or other means.
      However, please note that if you and the custodial child request us to delete the personal information of a particular child, the child user may not be able to continue to use our products and services or certain specific business functions of the products and services.
      If you find that your child's personal information has been collected without your prior consent, please contact us in time and we will try to delete the relevant data as soon as possible.
  4. When children can manage their own accounts
    after the age of 14 years of child custody, the right to manage their own accounts. If a child user chooses to manage product accounts on their own, you will no longer be able to access or control their accounts.
    When the warded child has the right to manage the account of this product by himself, we will notify you and the warded child.

Sixth, the application of this statement

  1. This statement only applies to our products or services specifically for children under 14 years of age, products or services with functional sections specifically for children under 14 years of age, or products or services that require users to enter birthdays, age information, and other products or services that can identify the user's age , Only the "Privacy Policy" applies to products or services that cannot identify or do not actively identify the user's age. Please understand that if this statement does not stipulate, please refer to the applicable "Privacy Policy".
  2. In the case of the application of this statement, if there is any inconsistency between this statement and the provisions of the "Privacy Policy", this statement shall prevail.

Contact us: [email protected]