Levistone story User Agreement

Levistone story User Agreement

Effective date: January 31, 2022

preface

Welcome to the Levistone story service!

"Levistone story Service Agreement" (hereinafter referred to as "this Agreement") is the agreement between the user (hereinafter referred to as "you" ) and Chengdu Tianxiang Interactive Culture Communication Co., Ltd. and/or affiliated companies (hereinafter collectively referred to as "we" or "Tianxiang" ) using the Levistone story service. "Interaction" ) is jointly concluded and has legal effect on both parties.

I hope you will carefully read and understand this Privacy Policy before using the Levistone story service. After reading this Policy, if you have any questions about this Privacy Policy or matters related to this Privacy Policy, please contact email: 214090479lu@ gmail.com

If you do not agree with any or all of the terms of this agreement, or you have any comments or suggestions about Levistone story, you can contact our customer service and we will provide you with the necessary assistance within a reasonable scope. If you click Agree, Accept, or Next, or if you register or use the Levistone story service, you will be deemed to have read and agreed to sign this Agreement.

Your use or continued use of Levistone story means that you agree to our collection, use, storage and sharing of your information in accordance with this Privacy Policy. We have highlighted the important content of the terms regarding your personal information rights in bold, please pay special attention to them.

This privacy policy will help you understand the following:

1. How we collect and use information

2. Personal information exempted from obtaining consent for collection and use in accordance with the law

3. Use of COOKIES and similar technologies

4. Information we may share, transfer and disclose

5. How do we access our partners’ SDKs?

6. How we store and protect information

7. How users manage information

8. Age limit

9. Notices and Revisions

10. How to contact us

1. How we collect and use information

We will collect information that you actively provide when using the service as follows, as well as collect through automated means the information generated during your use of functions or acceptance of services:

(1) Business functions

The functions and modules involved in our products are as follows:

1. Sharing function

When you use the Levistone story sharing function to share our services, based on your explicit consent, we will activate your WeChat, QQ or Weibo and other third-party online services. You can use your WeChat, QQ or Weibo at your own discretion Wait for third-party platforms to share with friends, and we will not collect any of your information during this process. If you refuse to wake up your third-party connection functions such as WeChat, QQ or Weibo, you will not be able to use the sharing function, but it will not affect your use of other functions of Levistone story products.

When you use third-party applications such as WeChat, QQ or Weibo, please pay attention to the rules on the use of your personal information in the relevant "Privacy Policy" of their platforms.

2. Advertising function

We would like to remind you that in this game, in order to provide you with more comprehensive services, a third-party SDK is connected to the game. Therefore, the third-party SDK may also collect your device information. (For details, see Policy 5. How we access our partners’ SDKs).

When the application is running in the background, we will collect your device information (including device brand, device identification code (IMEI), system version, screen resolution, device mac address, IDFV information) at certain intervals (according to the minimum frequency required by the business) ) is used to configure or preload ads and support the normal operation of the system's anti-cheat features.

3. Product development and service optimization

In order to repair system failures and optimize our services, we may need to record and analyze the information generated when the system fails.

(3) Equipment information and log information

1. For the following reasons, we need to collect your device information and log information:

(1) Detect whether the user’s account is safe and prevent users from encountering theft, fraud and other behaviors.

(2) Ensure network security and operational security and prevent malicious cheating.

(3) To help us perform fault analysis.

2. Device information refers to: the information of the device you use when using this software. We will collect your device brand, device model, screen resolution, device identification code (IMEI), system version, application identification code, IP address, device MAC address, application list, IDFV, and IDFV information. Among them, when your device is still running Levistone story, we will collect your device's device brand, device identification code (IMEI), system version, screen resolution, device mac at certain intervals (according to the minimum frequency required by the business) Address and IDFV information are used to obtain and configure corresponding advertisements.

3. Log information includes:

(1) Usage information of this software: the version number of the software you use, the overall operation of the software, usage and frequency. This type of data is anonymous, and we will not match this information one-to-one or with your personally identifiable information.

(2) Log information related to network security events, such as network crashes, system activities, etc. This type of information is required to be collected by law. If you do not want this information to be collected by us, please do not use this software.

At the same time, we will apply for permission to access your device information to collect the above basic personal device information and provide you with our basic services and basic functions. If you refuse to provide the above permissions, you may be unable to use our services.

4. Please understand that the collection of device information is the premise and basis for our service provision. After you install and open this software, we will ask for your consent through the "authorization pop-up window".

5. In order to prevent malicious programs and ensure operation quality and efficiency, we need to collect your application list information, including installed application information or running process information, the overall operation, usage and frequency of applications, application crashes, and overall Installation usage, performance data, and application source information to better optimize the functions of our mobile software on your phone and provide you with better services.

6. Individual device information cannot identify a specific natural person, and we have de-identified and anonymized such information.

2. Personal information exempted from obtaining consent for collection and use in accordance with the law

Please understand that in the following circumstances, in accordance with laws, regulations and relevant national standards, we do not need to obtain your authorization to collect and use your personal information:

1. Relevant to the personal information controller’s performance of obligations stipulated in laws and regulations;

2. Directly related to national security and national defense security;

3. Directly related to public security, public health, and major public interests;

4. Directly related to criminal investigation, prosecution, trial and execution of judgment;

5. To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the authorization and consent of the individual;

6. The personal information involved is disclosed to the public by the personal information subject on his own initiative;

7. Necessary to sign and perform a contract according to the requirements of the personal information subject;

8. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

9. Necessary to maintain the safe and stable operation of the products or services provided, such as discovering and handling product or service failures;

10. The controller of personal information is a news unit and it is necessary for it to carry out legal news reports;

11. If the controller of personal information is an academic research institution, and it is necessary to carry out statistical or academic research for the public interest, and when it provides externally the results of academic research or description, the personal information contained in the results will be de-identified.

3. Use of COOKIES and similar technologies

(1) Introduction to COOKIES and similar technologies

We or our third-party partners may obtain and use your information through COOKIES and WEB BEACON, and store such information as log information.

COOKIES refers to a technology. When a user visits this website with a COOKIES device, the server of this website will automatically send COOKIES to your browser and store it in your mobile device. This COOKIES will be responsible for recording your visit in the future. Various activities on this website, personal information, browsing habits, spending habits and even credit history. COOKIES technology can enable us to provide better and faster services, and make this platform to serve you more targeted.

(2) Use of COOKIES and similar technologies

We use our own COOKIES and WEB BEACON for the following purposes:

(1) Remember your identity;

(2) Analyze and optimize our service situation;

(3) Advertising optimization. COOKIES and WEB BEACON help us optimize your advertising choices based on your information.

(3) Authorized use of COOKIES and WEB BEACON

Technologies such as COOKIES and device information tags are commonly used on the Internet. When you use "Levistone story" and related services, we may use related technologies to send one or more COOKIES or anonymous identifiers to your device to collect and identify information when you access and use this product. We promise not to use COOKIES for any other purpose other than those stated in this Privacy Policy. We use COOKIES and similar technologies mainly to achieve the following functions or services:

1. Ensure the safe and efficient operation of products and services

We may set COOKIES or anonymous identifiers for authentication and security to enable us to confirm whether you are logging in to the service safely or whether you have encountered theft, fraud or other illegal activities. These technologies will also help us improve service efficiency and improve login and response speeds.

2. Data analysis and abnormal situation investigation

a. We may use such technologies to understand your usage habits and conduct data analysis to improve products and services.

b. When using "Levistone story", we may use COOKIES to record browsing activities to troubleshoot abnormal situations related to crashes and delays and to explore better service methods.

3. Clearing COOKIES

Most browsers provide users with the function of clearing browser cache data. You can perform the corresponding data clearing operation in the browser settings function. If you clear it, you may not be able to use the services or corresponding functions provided by us that rely on COOKIES.

4. Information we may share, transfer and disclose

(1) Prerequisites for sharing information

1. We will not share your personal information with any other company, organization or individual, except in the following circumstances:

1.1 Obtain your explicit consent or authorization in advance;

1.2 Sharing is necessary in accordance with applicable laws and regulations, legal process requirements, mandatory administrative or judicial requirements;

(2) Sharing information for security and analysis statistics

Ensure safe use: We attach great importance to account and service security. In order to protect the security of your and other users’ accounts and property, and to protect your and our legitimate rights and interests from illegal infringement, and to prevent the use of robots to cheat, we or our service providers may Necessary device, account and log information will be shared.

Analyzing product usage: In order to analyze the usage of our services and improve user experience, statistical data on product usage (crashes, crashes) may be shared with affiliates or third parties. These data are difficult to identify when combined with other information. Your personal identity.

We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Policy and other relevant confidentiality and security measures. At the same time, we will only provide information about the coverage and effectiveness of the promotion to third parties, and will not provide information that can identify you, or we will aggregate and anonymize this information so that it does not identify you personally.

We will only share your information for legitimate, necessary, and specific purposes.

(3) Transfer of personal information during acquisition, merger, and reorganization

As our business continues to develop, we may engage in mergers, acquisitions, asset transfers or similar transactions, and your personal information may be transferred as part of such transactions. We will require new companies and organizations that hold your information to continue to be bound by this Privacy Policy. Otherwise, we will require the company or organization to seek your authorization and consent again.

(4) Information disclosure based on other reasons

We may also need to retain, save or disclose your personal information for the following reasons:

1. Related to national security and national defense security;

2. Relevant to public safety, public health, and major public interests;

3. Relevant to criminal investigation, prosecution, trial and judgment execution, etc.;

4. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

5. Personal information you disclose to the public on your own

6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

7. In accordance with legal provisions, sharing and transferring de-identified personal information and ensuring that the data recipient cannot recover and re-identify the subject of personal information does not constitute the external sharing, transfer and public disclosure of personal information. In this regard The storage and processing of such data will not require further notification to you and your consent.

5. How do we access our partners’ SDKs?

Please be aware that some of our services will be provided jointly by us and authorized partners. We will access the partners' SDK. For legal, legitimate, necessary, specific and clear purposes, they will collect your personal information necessary to realize product functions and services through the SDK interface to realize product functions. We will not collect any information from you during this process. Our partners have no right to use the collected personal information for other purposes unrelated to products or services. We will show you the purpose of accessing the partner's SDK; the partner will collect your personal information necessary to implement product functions and services through the SDK interface; the type or identity of the partner. Currently, our authorized partners include the following types:

(1) SDK access based on statistics and crash logs

At present, our statistical crash log service is provided by Umeng Tongxin (Beijing) Technology Co., Ltd. We will access the SDK of Umeng+, and they will collect your IMEI, IMSI, mobile phone model and system version information, and operator through the SDK information.

You can learn how the SDK will use your personal information by reading the privacy policy of Umeng+ SDK. Umeng+ Privacy Policy: https://www.umeng.com/page/policy

(2) Advertising-based SDK access

a. Advertising push: We may access the SDK of partners who entrust us with promotion and advertising. They will collect indirect portrait tags and de-identified or anonymized information through the SDK to help them in Improve the effective reach rate of advertising without identifying you personally.

b. Advertising statistics: We may access the SDK of business service providers, suppliers and other partners. They will collect de-identified statistical information through the SDK. This information is difficult to associate with your identity information. This information will help us Analyze and measure the effectiveness of advertising and related services.

c. Advertising-based SDK access.

Our ads are currently provided by Beijing ByteDance Technology Co., Ltd. We will access the company's SDK, and they will collect your imei/network status/mac address/location information/application list information through the SDK. If you refuse to provide it, you will not be able to use the cloud energy replenishment service, but it will not affect the normal use of other functions.

(3) Withdrawal-based services

Our cash withdrawal service is currently provided by Tencent Technology (Shenzhen) Co., Ltd. and Alipay (China) Network Technology Co., Ltd. We will request your avatar, nickname, region, gender information and the ID of the corresponding platform through WeChat or Alipay to provide services We will collect your IMEI and IMSI information through the SDK. If you refuse to provide it, you will not be able to use WeChat or Alipay account binding and cash withdrawal related services, but this will not affect the normal use of other functions.

6. How we store and protect information

(1) Location where information is stored

We will only retain your information for the period necessary for the purposes stated in this Privacy Policy and within the time limits required by laws and regulations. The information we collect and generate during our operations in the People's Republic of China is stored in China. If cross-border transmission is required, we will obtain your authorization separately.

(2) Information storage time

Generally speaking, we only retain your personal information for the time necessary to achieve the purpose of the product, and your personal information will be retained for the shortest period within the scope of the law and no longer than 5 years. When the above period expires or our products and services cease operations, we will notify you in the form of push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period.

Your personal information will be anonymized to form data that can be used and circulated. We do not need to notify you and obtain your consent for the storage and processing of such data.

(3) Information protection methods

1. We will use reasonable and feasible means such as encryption technology and anonymization that are no lower than those of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

2. We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information.

3. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology in a timely manner.

4. In order to deal with possible risks such as leakage, damage and loss of personal information, we have established a dedicated emergency response team. In accordance with the company's relevant security incident handling specifications, we initiate security plans for different security incidents, stop losses, analyze and formulate them. Remedial measures should be taken, and relevant departments should be jointly traced and cracked down. At the same time, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, remedial measures for you, etc. . At the same time, we will promptly notify you of the incident-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

5. Although the above reasonable and effective measures have been taken and the standards required by relevant legal regulations have been complied with, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security Measures cannot always guarantee 100% security of information. We will try our best to ensure the security of the personal information you provide to us.

6. Please note: Once you leave this software and browse or use other websites, services and content resources, we will have no ability and direct obligation to protect any personal information you submit in software and websites other than this software and related services. , regardless of whether you log in, browse or use the above software or website based on links or guidance from "this software".

7. How users manage information

(1) Access, update and deletion

You can check your system authorization permissions by collecting "Settings" - "Application" - "Permissions" - "Levistone story". You need to check the personal information generated during your use of Levistone story. Upon reasonable request, we will provide You provide. If you are unable to access, correct or delete your personal information through the above methods, you can also contact us by sending an email to 214090479lu@gmail.com and we will reply to you within 15 working days.

(2) Close or withdraw authorization

You can change or withdraw the scope of your authorization for us to collect and process your personal information: You can change the settings of your smart mobile device to give, modify or withdraw your authorization and consent. The settings of each device manufacturer are different. But most of them can be done in the phone settings. For example, on Huawei phones, you can give, change the scope of authorization, or withdraw your authorization through "Settings" - "Applications" - "Application Management" - "Levistone story" - "Permissions".

(3) Cancellation

1. If you violate the conditions of Levistone story's service agreement or the relevant national laws and regulations, your account may be canceled or deleted. When an account is canceled or deleted, all service information and data related to the account will be deleted or anonymized.

(4) Complaints

You can make a complaint or report according to the contact information of our company. If you think your personal information rights may have been infringed, or find clues that your personal information rights have been infringed, you can contact us through the contact information below the "Privacy Policy" (214090479lu@gmail.com), and we will contact you within 15 days after receipt. Feedback your complaints and reports within 1 working day.

8. Age limit

1. This software service is mainly for adults. Our products, websites and services are primarily intended for adults. If you are a minor under 14 years old, before using our products and/or services, you should be accompanied by your guardian to read this Privacy Policy and User Agreement, and you should ensure that you have obtained the consent of your guardian before using our services. services and provide us with your information. We will focus on protecting the personal information of minors in accordance with relevant national laws and regulations.

2. If your guardian does not agree with you using our services or providing information to us in accordance with this Privacy Policy and User Agreement, please terminate your use of our services immediately and notify us in a timely manner.

3. We will only use or publicly disclose this information when permitted by law, with the explicit consent of parents or guardians, or when necessary to protect minors.

4. If you are the guardian of a minor, if you have any questions about the minor under your guardianship's use of our services or the user information they provide to us, please contact us in time. We will protect minor user information in accordance with relevant national laws and regulations and the provisions of this Privacy Policy and User Agreement. If we discover that we have collected personal information from a minor without prior parental or legal guardian consent, we will seek to delete the relevant data as quickly as possible.

9. Notices and Revisions

1. We may modify the privacy agreement in accordance with national laws and regulations and business development needs. Generally speaking, we will publish the changed privacy policy on the home page of the game. For changes to the Privacy Policy, we will notify you in a conspicuous manner (providing a pop-up prompt). Changes referred to in this policy include but are not limited to: daily updates and revisions, major changes in our service model, such as processing of personal information

2. Please read and understand this Privacy Policy carefully before using our services to ensure that you are always aware of the latest version of this Privacy Policy. If you confirm that you accept the changed content, you can use the related services of this software normally; if you do not agree with the changed content, please do not click to confirm or continue to use this software.

10. How to contact us

If you have any questions, comments or suggestions about this Privacy Policy, please contact us through the following methods:

Shijingwu Email: 214090479lu@gmail.com