Last updated: November 16, 2021.
Version effective date: November 1, 2023.
If we receive your questions, comments or suggestions, we will reply within 15 days.
This "Personal Information Protection Policy" (hereinafter referred to as "this Policy") applies to the processing and protection of the personal information you provide when we provide you with products and services. The products and services we provide are digital reading products and other similar products and services that are innovatively developed from time to time.
If you are under 18 years old, please read this agreement and other above-mentioned agreements accompanied by a guardian, and obtain the consent of your parent or legal guardian in advance. If you are the guardian of a minor and you have any questions about the personal information of the minor under your guardianship, please contact us through customer service.
Please be sure to read this policy carefully before using our products. While reading this policy, if you do not agree with this policy or any of its contents, you should stop using it immediately. If you use or continue to use our products and services, you are deemed to have fully understood and accepted the entire content of this policy, which means that you agree to our collection, use, storage and sharing, and protection of your information in accordance with this policy.
Please note that we keep our policy under review from time to time, so some measures may be adjusted accordingly. Please make sure you are always aware of the latest version of our Personal Information Protection Policy. This policy is an integral part of the user service agreement for our products.
This policy will help you understand the following:
1. Personal information collection and use rules
(1) Personal information protection principles
(2) Information we may collect
1. Reasons why we collect personal information
2. List of functions for which we use personal information
3. The information we need to collect corresponds to each function
4. Reasons why we may access the terminal device content and corresponding destination list information
5. Permissions required to access third-party SDK services and third-party privacy policies
6. Sensitive information we may collect
7. Business functions that require high-frequency collection of personal information
(3) Purpose, method and scope of use of your personal information
2. How we use cookies and similar technologies
3. Your authorization and consent
4. How we share, transfer and publicly disclose your personal information
5. Third-party services
6. How we protect your personal information
7. How we give you the right to manage personal information
8. How we process children’s personal information
9. How we store your personal information
10. How to update and modify this policy
11. How to contact us
Appendix: Third-party SDK directory
1. Personal information collection and use rules
(1) Personal information protection principles
1. Protecting users’ personal information is one of our basic principles. We only collect information necessary to implement product functions based on the principles of legality, legitimacy and necessity.
2. We will use various security technologies and procedures to establish a complete management system to protect your personal information from unauthorized access, use or disclosure.
3. We will not provide, sell, rent, share or trade your personal information to any unrelated third party without your consent, unless otherwise provided by laws and regulations or with your prior permission.
4. We attach great importance to the protection of minors’ personal information. If parents (guardians) want minors (especially children under ten years old) to use the services we provide, they must apply for registration in the name of the parents (guardians), and they should judge whether the services are suitable for minors as legal guardians. .
5. We guarantee not to disclose or provide user registration information to the public or to third parties, as well as non-public content and information stored on our platform, servers or databases when users use network services, except in the following circumstances: 1) Obtain the user's information in advance Clear authorization; 2) In accordance with relevant laws and regulations; 3) In accordance with the requirements of relevant government departments and judicial authorities.
(2) Personal information we may collect
In accordance with the relevant laws and regulations mentioned in the introduction, we will follow the principles of legitimacy, legality and necessity, and for the purposes stated in this policy, we will collect and use the personal information that you actively provide during the use of our products and that are related to your use of our products. Your personal information generated and obtained by us from third parties.
1. Reasons why we collect personal information
We need to collect and use your information for the following reasons:
(1) Provide you with core reading services;
(2) Safety guarantee. We will use your information for identity verification, security prevention, anti-fraud monitoring, archiving backup, and customer security services;
(3) Product development and optimization. When our system fails, we will record and analyze the information generated during the system failure to optimize our services;
(4) Execute software, perform software certification or software upgrades;
(5) Allow you to participate in surveys about our products and services;
(6) With your consent, statistical data, behavioral analysis and non-associated user identification information based on user information will be provided to cooperative entities for the purpose of demonstrating cooperation effects;
(7) Push notifications and service information we provide to users;
(8) Modify global system settings; change the screen display direction; use simulated location sources for testing; edit text messages or multimedia messages.
2. List of functions for which we use personal information:
(1) Basic account services: Use your mobile phone number*, nickname and password to bind the account, and then use services that require a platform account to open: comments, sharing, check-in, activities, uploading/changing avatars, and displaying users public honors received;
(2) Social/publishing function: When you post information in the comment area, we need your personal information: Nickname/avatar is used for publishing public content;
(3) When users participate in activities held on the site, we need the user's personal information: nickname/avatar is used to display lottery results, fan rankings and other public content.
(4) Personalized recommendations: In order to provide books and advertising information that are more in line with your interests, we apply to obtain your OAID, device brand, device model, operator information, and network conditions. If you do not agree to authorize the above information, the number of books and advertisements you see will not change, but the relevance will decrease. If you do not agree to provide the aforementioned information, or are not interested in the personalized content or advertisements we recommend, and wish to turn off personalized recommendations, you can choose to turn it off through the "My-Settings-Personalized Recommendations" path on the software page. After closing, you will not be able to enjoy the personalized recommendation service, but it will not affect your use of other business functions.
3. Our various functions correspond to the information needed to be collected
In order to realize the basic business functions of the product, we may need to collect relevant personal information from you. The following will list one by one our basic business functions and the personal information we need to collect to implement these functions.
We collect the following types of information
3.1 Information required for account service:
(1) The information you filled in when registering or binding your account: mobile phone number*;
(2) We may obtain the information disclosed to us by the third party when you log in or bind with the account of a third-party partner (WeChat or QQ), including: user name, avatar. For this part, please carefully read the user agreement or privacy policy of the third-party partner service;
(3) The information you fill in when editing your profile: avatar, nickname, gender, birthday;
(4) Personal account information display: avatar, nickname, in-app virtual currency balance*, recharge records*, consumption records*;
(5) Account security: We need to collect some of your information to ensure the security of your account and determine your account and transaction risks, including the following information: account login location*, login IP address*, login time, product version number, transaction Information*, real-name authentication information*; once we detect that there is or is suspected to be an account security risk, we will use the relevant information to conduct security verification and risk elimination to ensure the safety of the products and services we provide to you. Your rights and interests are not infringed.
(6) Device information: In order to ensure the security of your account and system, we will obtain your device's MAC address, ICCID, IMEI, IMSI, Android ID, IP address, OAID, MEID, while it is running or running in the background. SSID, DEVICEID, SUPI, SUCI, device hardware serial number, device brand, device model, operating system, task process (running process) and sensor information (including acceleration sensor, gravity sensor, linear acceleration sensor and gyroscope sensor), In addition, OAID will also be used to correlate user behavior.
(7) When you use functions such as "Shake", we will call the device's gravity, acceleration and other sensors to identify and determine whether the device is shaken. Please understand that device sensor data alone does not involve any personal location information and cannot be combined with other information to identify a specific natural person.
(8) Self-starting and associated startup instructions: In order to ensure that the application can normally receive information pushed by the client when it is closed or running in the background, the application must use the (self-starting) capability to send broadcast wake-ups through the system at a certain frequency. The self-starting or associated startup behavior of this application is necessary to implement functions and services. When you open a content push message, the relevant content will be redirected to you after obtaining your explicit consent. Without your consent, there will be no self-start or associated startup. When you open a file downloaded within this App, the third-party App will be associated to start.
3.2 Information required for products or services
Balance information: Your virtual currency recharge balance is used to record records generated when ordering membership, e-books and other products, including order records, consumption records, and balance information. This information will be stored in our server. The above information is necessary for software functions. If you do not agree with us recording the above information, we will not be able to provide you with book purchasing and reading services. If you use the ordering and payment function, the third party company that provides you with payment services will directly collect payment-related information.
Device application installation list: Permission to obtain the installation package list: By obtaining your installer list, we can confirm whether you have installed the software we promote, so that we can issue corresponding rewards to you in a timely manner.
(1) Word book and comic reading and listening functions: In order to better provide you with novel reading services, improve the reading experience, and optimize the novel display effect, we need to collect the following information: device model, device brand, MAC address, device Unique identifier, operating system and application version and source channel, network type, login IP address*, log information* (operation log, service log, development log, crash log), Bluetooth address, Bluetooth name;
(2) Search function: When you use the search function, we need to collect your search terms and browsing history to provide you with better search results and improve our products and services;
(3) Comment and Q&A information publishing functions: When you use the comment and posting functions, we will collect the graphic and textual information you actively provide;
(4) Customer service/user feedback function: When you make inquiries or account complaints through customer service, we may need to collect your account information to verify your identity, and we may also collect the mobile phone number*, QQ account, WeChat ID;
(5) Information submitted when you participate in our activities: name*, mobile phone number*, shipping address*.
4. Based on user behavior and product features, we may access the following content on your mobile phone:
For users who use the Android system, when you use the relevant products we provide you, we may obtain the information of your terminal device for the purpose of providing, processing, maintaining, improving, developing our products and/or providing services to you. The following permissions:
(1) When users download books, they need to store the book data in the SD card and write/delete the internal storage;
(2) When the user reads a downloaded book, the internal storage is read because the book data needs to be read;
(3) In order to confirm the storage method of downloaded book data, it is necessary to determine whether the user has inserted the SD card and use the mounted file system permission;
(4) Use the permission to obtain the application size to calculate the free area of storage space;
(5) When the user uses the voice reading function, the phone status and identity are read to ensure that the voice reading stops when an incoming call comes;
(6) When uploading a profile picture for the user, you can choose to use the camera to take photos and use the permission to take photos and videos, and access the flash;
(7) Use network access permissions to use the networking functions of this software;
(8) Obtain the user's network status in order to determine the user's current network status and prompt the user;
(9) Prompt the user to open the network and use the permission to change network status;
(10) When the user downloads books, when the user's current network is 2G/3G/4G, in order to save user traffic, the user is prompted to open the wifi network and use the permission to obtain and change wifi status;
(11) Apply for permission to change system settings so that users can change the horizontal and vertical screen directions when reading;
(12) Read and write system settings for users to adjust the brightness of their mobile phones;
(13) In order to ensure that users can be notified as soon as possible when the books they are reading are updated, the program is allowed to run automatically on startup and the background process is still running after the phone screen is turned off;
(14) Use the permission to end system tasks in order to restart the software when an abnormality occurs;
(15) Use sorting system tasks to create shortcuts on the mobile phone desktop;
(16) In order to implement the ShortCut shortcut function on Android 7.1 and above, you need to create desktop shortcut permissions;
(17) The user uses the permission to modify the sound settings to adjust the volume when using the voice reading function;
(18) Use the permission to allow vibration to cause the phone to vibrate when a book update notification is sent to the user's phone;
(19) Read system logs to help users solve problems when an exception occurs in the software;
(20) In order to monitor whether the function of users sharing books to other applications is normal, use the allowed program to obtain the permissions of currently or recently running applications;
(21) Use the display system window permissions to implement the floating window function;
(22) Use fingerprint unlock permission to quickly unlock the phone through fingerprint when the screen is locked;
(23) Use the battery status permission to enable users to display battery power information on the reading page when reading in full screen;
(24) When the user sets the reading interface to be always on, the user needs to use the permission to keep the screen always on so that the system will not turn off the screen because the user does not operate for a long time;
(25) In order to allow users to use the real-person book listening function through Bluetooth headsets, audio playback will be automatically paused when Bluetooth is disconnected, and the permission to create a Bluetooth connection is used;
(26) In order to allow users to use the real-person book listening function through Bluetooth headsets, Bluetooth pairing management permissions are required;
(27) Receive broadcasts sent from within the Android system and allow a program to quickly receive the next broadcast after receiving the broadcast;
(28) In order to allow the application to restart its own process after a crash, the background process function needs to be killed;
(29) Allow broadcast notifications to be sent after the download is completed;
(30) For the best user experience, the download function is not displayed in the notification bar, and the download status is displayed after the download is completed.
(31) Upgrading to a new version and installing applications requires opening unknown source permissions. Please go to settings to enable permissions.
(32) In order to identify whether you have downloaded the relevant software in the advertisement, your running process information will be obtained.
5. The permissions required for third-party SDK access services and the privacy policy of the third party
Our products and services may include products and services of third parties, as well as links to third-party websites. When you use these products or services, your information may also be collected. When a third party provides you with products and services, it may obtain the following permissions:
(1) When users download books, they need to store the book data in the SD card and write/delete the internal storage;
(2) When the user reads a downloaded book, the internal storage is read because the book data needs to be read;
(3) In order to confirm the storage method of downloaded book data, it is necessary to determine whether the user has inserted the SD card and use the mounted file system permission;
(4) When the user uses the voice reading function, the phone status and identity are read to ensure that the voice reading stops when an incoming call comes;
(5) Use network access permissions to use the networking functions of this software;
(6) Obtain the user's network status in order to determine the user's current network status and prompt the user;
(7) Prompt the user to open the network and use the permission to change network status;
(8) When the user downloads books, when the user's current network is 2G/3G/4G, in order to save user traffic, the user is prompted to open the wifi network and use the permission to obtain and change wifi status;
(9) Read and write system settings for users to adjust the brightness of their mobile phones;
(10) Use the permission to allow vibration in order to allow the phone to vibrate when sending book update notifications to the user's phone;
(11) In order to monitor whether the function of users sharing books to other applications is normal, use the allowed program to obtain the permissions of currently or recently running applications;
(12) When the user sets the reading interface to be always on, the user needs to use the permission to keep the screen always on so that the system will not turn off the screen because the user does not operate for a long time;
(13) In order to support UnionPay NFC payment function, you need to obtain near field communication operation permission;
(14) In order to accept messages from Jiguang, you need to obtain Jiguang push permission;
(15) In order to support the push function on OPPO mobile phones, you need to obtain OPPO push custom permissions;
(16) In order to support the push function on Xiaomi mobile phones, you need to obtain Xiaomi push custom permissions;
(17) Permission to obtain the installation package list: the permission required to access Guangdiantong SDK;
(18) To support push capabilities, access to additional location provider command permissions is required;
(19) In order to use the third-party basic image loading library Glide, you need to obtain permission to read and write address book contacts and call records;
(20) MobTech: In order to provide you with one-click login service, MobTech provides instant verification permission;
6. Sensitive information we may collect*
(1) The mobile phone number you provided when binding your account;
(2) When you register an account to obtain a mobile phone identification code, your mobile phone status may be accessed;
(3) When you cache the content we provide for reading locally for reading without a network, you may use reading or writing to external storage;
(4) When you upload a user avatar, your camera permissions may be used. You can turn off this usage permission through the settings of your mobile phone;
(5) When you allow the program to make calls from a non-system dialer, it may allow calling the phone function;
(6) When caching your reading content, files may be created and deleted in SDCard;
7. Business functions that require high-frequency collection of personal information
In order to provide you with reading services, we need to collect your MAC address, unique device identification code, device application installation list and system version frequently.
No matter how we collect and use your personal information through the above methods, we will only collect and use your personal information for the business functions described in this policy. We will usually only do so with your consent, except in certain circumstances where we are required to collect personal information from you due to legal obligations or where it may be necessary to protect your vital interests or those of others.
Please understand that due to changes in business strategies, the service functions of our products may also undergo changes and developments. If we want to use your personal information for other purposes not specified in this policy, or if the personal information collected for a specific purpose will be used for other purposes, we will inform you in a special prompt in our products, and Obtain your consent again before use.
(3) Purpose, method and scope of use of your personal information
In order to provide you with better services, we may use your information for the following purposes:
1. Provide services to you.
2. Provide you with security.
When we provide services, it is used for identity verification, customer service, security, fraud monitoring, archiving and backup purposes to ensure the security of the products and services we provide to you.
We may send you service-related notifications when necessary (for example, when we suspend, change, or terminate a single service due to system maintenance).
3. Participate in online surveys, feedback and other activities.
4. Help us develop, deliver and improve our products and services.
We may use the information collected through a certain service for our other services to help us improve existing services or design new services; at the same time, we may use your information for software updates.
5. We may entrust advertising and analysis service partners to provide you with certain services or perform certain functions on our behalf. We will only use third parties authorized to cooperate with us for the legal, legitimate, necessary, specific and clear purposes stated in this privacy policy to access the information necessary for them to perform their duties, and require that third parties not to use this information for other purposes. for any purpose, and require that third party to assume the same responsibility as us for protecting user privacy. The data we share with third parties does not contain any personal or identifiable information.
Although there are forms of collecting your personal information stipulated in this article, we may, when necessary, directly and clearly ask you to decide whether to authorize us to collect personal information, including but not limited to pop-up windows, links, etc.
When we want to use personal information for other purposes not specified in this policy, we will notify you in advance and obtain your consent. When we want to use the information collected for a specific purpose for other purposes, we will also notify you in advance and ask for your consent.
2. How we use cookies and similar technologies
We or our third-party partners may obtain and use your information through COOKIES and WEB BEACON, and store such information as log information.
By using COOKIES, we provide users with a simple and easy network experience. A COOKIES is a small amount of data that is sent to your browser from a web server and stored on your computer's hard drive. We use COOKIES to benefit users and help us determine the pages and content you are connected to, the time you spend on our services and the content you choose. COOKIES enable us to serve you better and faster. However, you should be able to control whether and how COOKIES are accepted by your browser. Please consult the documentation provided with your browser for more information on this.
We use our own COOKIES and WEB BEACON for the following purposes:
1. Remember who you are. For example: COOKIES and WEB BEACON help us identify you as our registered user, or save your preferences or other information you provide us.
2. Analyze your use of our services. We can use COOKIES and WEB BEACON to test the quality of our services.
3. Advertising optimization.
While we use COOKIES and WEB BEACON for the above purposes, we may provide aggregate non-personally identifiable information collected through COOKIES and WEB BEACON to advertisers and other partners for the purpose of analyzing how you and other users use our services and for advertising services. . We and third-party partners may collect and use your information through COOKIES and WEB BEACON, and store such information.
3. Your authorization and consent
(1) Your personal information we obtain from third parties
We may collect and use your personal information from third parties (our partners) within the scope of your authorization and consent. We guarantee that we will handle your personal information strictly in accordance with the contract signed with the third party and relevant legal provisions. Please read the privacy policy and user agreement of the third party in detail. If you refuse a third party to collect, use or transfer your personal information when providing services, you may be unable to use our corresponding services.
(2) Exceptions to obtaining authorized consent
Please understand that in the following circumstances, in accordance with laws, regulations and relevant national standards, we do not need to obtain your authorization to collect and use your personal information:
1. Directly related to national security and national defense security;
2. Directly related to public security, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial and judgment execution;
4. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;
5. Your personal information collected is disclosed to the public by yourself;
6. Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels
7. Necessary according to your request; to protect your or other individuals' life, property and other major legitimate rights and interests but it is difficult to obtain your consent;
8. Necessary to maintain the safe and stable operation of software and related services, such as discovering and handling faults in software and related services;
9. Other situations stipulated by laws and regulations.
In particular, you are reminded that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your relevant information can identify your personal identity alone or in combination with other information, Or when we combine data that cannot be linked to any specific personal information with other personal information of yours, such information will be treated and protected as your personal information during the combined use period in accordance with this policy.
4. How we share, transfer and publicly disclose your personal information
(1) Sharing
We will not share your personal information in identifiable form with any company, organization or individual, except in the following circumstances:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your information with other parties;
2. We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities;
3. Within the scope required or permitted by law, it is necessary to provide your personal information to third parties (including industry organizations such as consumer rights protection departments) in order to protect your or the public’s interests, property or safety from damage;
4. It is necessary to share your personal information in order to protect national security, public safety, and the major legitimate rights and interests of you and other individuals;
We may engage trusted third-party suppliers, consultants or other service providers ("Partners") to provide us with necessary maintenance, support and services to provide better customer service and optimize user experience. We will only share your information for legal, legitimate, necessary, specific, and clear purposes, and will only share information necessary to provide services. Our partners have no right to use the shared information for any other purpose.
Currently, our partners include the following three types:
1. Authorized partners in advertising and analysis services. Unless you give us your permission, we will not share your personal information with partners who provide advertising and analysis services. You and consent to us providing these partners with information about the reach and effectiveness of their advertising, such as information about the devices of users who clicked on the ads, but we will not provide your personally identifiable information, or we will aggregate this information so that it does not Identify you. For example, only after the advertiser agrees to abide by our advertising guidelines, we may tell the advertiser how effective their ads are, or how many people saw their ads or installed the app after seeing the ads, or provide payment services to these partners. Partners provide non-personally identifiable demographic information (e.g. “Male, likes to read”) to help them understand their audience or customers;
2. Consult partners for data services. With your permission, we may share your personal information with partners who require us to provide data service consultation.
3. Communication service provider;
We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.
(2) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
2. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
3. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this policy, otherwise we will require the company or organization to re- Ask for your authorization and consent. If there are any changes to the collection and processing of personal information agreed in this statement, the company or organization will seek your authorization and consent again.
(3) Public disclosure
We will only publicly disclose your personal information under the following circumstances:
1. After obtaining your explicit consent;
2. Disclosure based on law: We may publicly disclose your personal information when required by laws, legal procedures, lawsuits or mandatory requirements from government authorities.
(4) Personal information that is exempted from consent to sharing, transfer, and public disclosure in accordance with the law
Please understand that in the following circumstances, in accordance with laws, regulations and national standards, we do not need to obtain your authorization to share, transfer, and publicly disclose your personal information:
1. Directly related to national security and national defense security;
2. Directly related to public security, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial and judgment execution;
4. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;
5. Personal information that you disclose to the public on your own;
6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
5. How we protect your personal information
1. We have used security measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably feasible measures to protect your personal information. For example, the exchange of data (such as credit card information) between your browser and the "Service" is protected by SSL encryption; we also provide https secure browsing for the official website; we will use encryption technology, anonymization and other means to ensure data confidentiality; we will use trusted protection mechanisms to prevent data from malicious attacks; we have established specialized management systems, processes and organizations to ensure information security. For example, we strictly limit the scope of personnel who have access to information, require them to abide by confidentiality obligations, and conduct reviews; and we hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information. If a security incident such as personal information leakage occurs, we will activate an emergency plan to prevent the security incident from expanding, and inform you through push notifications, announcements, etc.;
2. Our data security capabilities: Build security defense around the data life cycle, covering all data processing stages such as data collection, transmission, storage, use, transfer, archiving, and deletion;
3. We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law;
4. The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account;
5. We will regularly update the relevant content of reports such as security risks and personal information security impact assessments. You can obtain relevant content by contacting us;
6. The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability;
7. After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can prevent and reduce it on your own. Advice on risks, remedies for you, etc. We will promptly inform you of the relevant circumstances of the event;
8. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
6. How we give you the right to manage personal information
We attach great importance to the management of your personal information and do our best to protect your rights to inquire, access, modify, delete, complain and report, and set privacy functions so that you can protect your privacy and information security. .
(1) Access your personal information
You have the right to access your personal information. You can access your information collected by us at any time through the following methods: Click "My" - "Personal Information" in the APP to access your personal information.
(2) Correct your personal information
When you discover an error in the personal information we process about you, you have the right to ask us to make corrections at any time. You can also modify your personal information independently by clicking "My" - "Personal Information" in the APP.
(3) Delete your personal information
If you want to delete your personal information, you can contact us to request that the personal information you provide be closed or deleted;
When deleting relevant information, we may require you to perform identity verification to ensure account security. Once the above deletion request is responded to, your personal information will be deleted, except for information that is otherwise required to be retained by laws and regulations;
We will also notify the entities that obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization;
When you delete information from our services, we may not delete the corresponding information in the backup system immediately, but we will delete the information when the backup is updated.
(4) Change the scope of your authorization and consent
You can give or withdraw your authorization at any time by contacting us;
When you withdraw your consent, we will no longer collect and use your corresponding personal information in the future, but please understand that when you withdraw your consent or authorization, we cannot continue to provide you with the specific functions and/or corresponding to the withdrawal of consent or authorization. or services. Your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.
(5) Personal information subject cancels account
You can cancel your registered account at any time. You can contact us to cancel your account. After we receive your request to cancel your account, we will verify your identity, negotiate with you to handle the assets in your account, and complete the cancellation of your account within 24 hours.
Please note that logging out of your account will result in you permanently losing access to your account and data in your account. In order to provide you with a more convenient way to log out, we will continue to optimize our products and inform you through page announcements.
After canceling your account, we will stop providing products or services to you, and delete or anonymize your personal information, unless otherwise provided by laws and regulations.
(6) Personal information subject obtains a copy of personal information
You have the right to obtain a copy of your personal information and you can obtain a copy of your personal information at any time by contacting us.
(7) Refuse to push
If you do not want to accept our push notifications, you can do so at any time by setting the notification options on your phone;
If these decisions significantly affect your legal rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate relief.
(8) Respond to your above request
For security reasons, we may require verification of your identity before processing your request. You may be required to provide a written request or otherwise prove your identity;
For all requests you make under this section, we will respond within 15 days after receiving your request and verifying your user identity.
We will not be able to respond to your request under the following circumstances:
1. Relevant to the personal information controller’s performance of obligations stipulated in laws and regulations;
2. Directly related to national security and national defense security;
3. Directly related to public security, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial and execution of judgments;
5. The personal information controller has sufficient evidence to show that the personal information subject has subjective malice or abused rights;
6. To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the individual;
7. Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;
8. Involving trade secrets.
8. How we process children’s personal information
We consider anyone under the age of eighteen to be a minor;
We consider anyone under the age of fourteen to be a child;
Our products, websites and services are primarily intended for adults. Children and minors should not create their own personal information subject accounts without the consent of their parents or guardians;
For cases where personal information from minors and children is collected with parental consent, we will only use or publicly disclose this information as permitted by law, with explicit consent from parents or guardians, or as necessary to protect minors and children;
If you believe that we have mistakenly or accidentally collected information from a minor or child, please contact us promptly. If we discover that we have collected personal information from minors or children without first obtaining verifiable parental consent, we will delete the relevant data immediately.
9. How we store your personal information
(1) Storage location
The personal information we collect and generate is stored within the territory of the People's Republic of China.
(2) Storage period
We retain your personal information for the minimum period required by laws and regulations. The log information shall be no less than 6 months, the transaction information shall be no less than three years from the completion date of the transaction, and the record backup shall be no less than 60 days, unless there are mandatory retention requirements by law; after your personal information exceeds the retention period, we will Applicable feedback requests that your personal information be deleted or anonymized;
However, under the following circumstances, and only for the purposes related to the following circumstances, we may need to retain your personal information or part of it for a longer period of time:
1. Comply with applicable laws, regulations and other relevant provisions;
2. Comply with the requirements of court judgments, rulings or other legal procedures;
3. Comply with the requirements of relevant government agencies or other competent authorities;
4. Reasonably necessary to implement relevant service agreements or this privacy policy, safeguard social and public interests, handle complaints/disputes, and protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliates, other users or employees use.
10. How to update and modify this policy
In order to provide you with better services, our products and services will be updated and changed from time to time. We will revise this policy from time to time. These revisions form part of this policy and have the same effect as this policy. Without your explicit consent, We will not reduce your rights under this Privacy Policy;
After this policy is updated, we will issue an updated version and remind you of the updated content through appropriate means before the updated terms take effect, so that you can keep abreast of the latest version of this policy;
For major changes, we will also provide more prominent notices. Major changes referred to in this policy include but are not limited to:
1. Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;
2. We have undergone major changes in ownership structure, organizational structure, etc. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;
3. The main objects to whom personal information is shared, transferred or publicly disclosed change;
4. Significant changes in your rights to participate in the processing of personal information and the way you exercise them;
5. When our responsible department, contact information and complaint channels for handling personal information security change;
6. When the personal information security impact assessment report indicates that there is a high risk.
7. We will also archive old versions of this policy for your review. This policy is an important part of the user service agreement. All rights not expressly granted in this Privacy Policy are reserved by us.
11. How to contact us
We have set up a personal information protection officer. If you have any questions, comments or suggestions about this privacy policy, please contact us through the following methods:
email: chenjiashenghole@outlook.com