Privacy

The following principles protect your personal information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of least sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry. Please read and understand this Privacy Policy carefully before using our products (or services).

1. How we collect and use your personal information

Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person or reflect the activities of a specific natural person either alone or in combination with other information.

(1) Carry out internal data analysis and research, third-party SDK statistical services, and improve our products or services

We collect data based on your interactions with us and the choices you make, including your privacy settings and the products and features you use. The data we collect may include SDK/API/JS code version, browser, Internet service provider, IP address, platform, time stamp, application identifier, application version, application distribution channel, independent device identifier, iOS advertising identification IDFA, Android advertiser identifier, network card (MAC) address, mobile phone storage permissions, International Mobile Equipment Identity (IMEI), device model, terminal manufacturer, terminal device operating system version, session start/stop time, language Location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage, etc.

All usage rights including but not limited to positioning, storage, and mobile phone IMEI are used by third-party necessary SDKs, and we will not store or use them privately

When we want to use information for other purposes not specified in this policy, we will ask for your consent in advance.

When we want to use the information collected for a specific purpose for other purposes, we will ask for your consent in advance.

(2) The three-party SDK we use

1. Admob advertisement:

Contains permission codes: check WLAN connection, get approximate location, get precise location, get camera, read and write storage, read phone status and identity;

Information collection description: software installation list, mobile device version, mobile phone memory card, system version, mobile phone style, mobile phone name, generated ID, IMSI, IMEI, bssid, Iccid, mac address.

Privacy policy link: https://www.pangle.cn/privacy?from=ad.oceanengine.com

(3) Using face data

1. Face data is only used for the current function when the user knows it, and we will not store and analyze it.

2. The service is realized by the three-party interface of the volcano engine

Privacy policy link: https://www.volcengine.com/docs/6256/104448

2. How we share, transfer and publicly disclose your personal information

(1) Sharing

We will not share your personal information with any other company, organization or individual, except in the following cases:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.

3. Sharing with authorized partners: Only to achieve the purpose stated in this privacy policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In such cases, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary to provide services. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

2. When it comes to mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to Ask for your authorization again.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. After obtaining your explicit consent;

2. Disclosure based on laws: We may publicly disclose your personal information under the circumstances of laws, legal procedures, lawsuits or mandatory requirements of government authorities.

3. How do we protect your personal information

(1) We have adopted industry-standard security measures to protect the personal information you provide to prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonable and feasible measures to protect your personal information. For example, we will provide https secure browsing methods for our website; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel Personal information can only be accessed; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

(2) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extended retention period is required or permitted by law.

(3) The Internet is not an absolutely secure environment, and e-mails, instant messaging, and other communication methods with our users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.

(4) The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.

(5) After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and your own prevention and control measures. Advice on reducing risks, remedies for you, etc. We will promptly inform you of the relevant circumstances of the incident by email, letter, phone call, push notification, etc. When it is difficult to inform the personal information subject one by one, we will issue an announcement in a reasonable and effective manner.

At the same time, we will also actively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

4. Your rights

In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee you to exercise the following rights with respect to your personal information:

(1) Access to your personal information

You have the right to access your personal information, except for exceptions provided by laws and regulations. If you wish to exercise your right to access your data, you can do so yourself by:

Address information——you can view it in the APP address collection bar

(2) Change the scope of your authorization and consent

Each business function requires some basic personal information to be completed (see "Part 1" of this policy). For the collection and use of additionally collected personal information, you can give or withdraw your authorization and consent at any time.

You can do it yourself by:

1. Turn off the system permission in the phone settings.

When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

(3) Constrained information system automatic decision-making

In some business functions, we may only make decisions based on non-human automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legal rights, you have the right to request an explanation from us, and we will also provide appropriate remedies.

(4) To respond to your above request

For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. For those that are unnecessarily repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes in existing practices), pose a risk to the legal rights of others, or are very impractical (for example, involving information stored on backup tapes) request, we may deny it. In the following situations, we will not be able to respond to your request in accordance with the requirements of laws and regulations:

1. Related to national security and national defense security;

2. Related to public security, public health, or major public interests;

3. Related to criminal investigation, prosecution and trial;

4. There is sufficient evidence that you have subjective malice or abuse of rights;

5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

V. How do we handle children's personal information

Our products and services are primarily intended for adults. Children may not create their own user accounts without the consent of a parent or guardian. For the collection of children's personal information with parental consent, we will only use or publicly disclose this information when permitted by law, with the explicit consent of parents or guardians, or when it is necessary to protect children. Although local laws and customs define children differently, we consider anyone under the age of 14 to be a child.

If we discover that we have collected personal information from children without prior verifiable parental consent, we will try to delete the data as soon as possible.

6. How your personal information is transferred globally

In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. Since we provide products or services through resources and servers all over the world, it means that after obtaining your authorization and consent, your personal information may be transferred to the overseas jurisdiction of the country/region where you use the product or service, or Receive visits from these jurisdictions.

Such jurisdictions may have different data protection laws, or even no laws at all. In such cases, we will ensure that your personal information is adequately and equally protected within the territory of the People's Republic of China. For example, we will ask for your consent to the cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.

7. How to update this Privacy Policy

We may adjust or change this Privacy Policy in due course, and any update of this Privacy Policy will be published on our website by marking the update time. The content of this document will take effect 7 days after it is notified or published. If you continue to use any of the services we provide or visit our related websites after the adjustment or change of the Privacy Policy, we believe that this means that you have fully read, understood and accepted the revised Privacy Policy and are bound by it.

8. How to contact us

If you have any questions, comments or suggestions about this Privacy Policy, please contact us in the following ways:

E-mail: xypmhxy@126.com