Updated: September 1, 2024
Effective: September 1, 2024
"LED Scroller" (hereinafter referred to as "this product") is a service product provided to you by PrimeLime (hereinafter referred to as "this author"). This author is well aware of the importance of personal information and data to users, so it will respect and protect your personal information and privacy security in accordance with the provisions of laws and regulations. We hope that you will carefully read and understand this privacy policy before using this product and related services in order to make appropriate choices. The content of this privacy policy only applies to user information and data collected and stored by "LED Scroller".
When you click the "Agree" button during the use of this product service, it means that you have carefully read and explicitly agree to abide by the content of this privacy policy and all relevant terms and guidelines incorporated by reference therein, and be bound by the corresponding content.
*We will collect your device information (WiFi information, OAID, SSID, BSSID, IMEI, Mac, AndroidID, IDFA, OPENUDID, GUID, ICCID, SIM card, IMSI, sensor parameters, etc.) in silent/background state for data statistics, device abnormality analysis and account security protection.
*When you use or enable related functions or use services, we will collect and use relevant information as necessary to achieve the functions and services. You can refuse to provide information unless it is necessary to achieve basic business functions or in accordance with laws and regulations, and it will not affect other functions or services.
The following content will help you understand in detail the personal information and data issues involved before and during the use of this product and related services.
1. How we collect and use personal information
We will collect the information you actively provide when using the service, and collect the information generated by you in the process of using the function or receiving the service through automated means in the following ways:
1.1 Registration, deregistration and login use
a. When you register and log in to use this product and related services, information (such as avatar, nickname, etc.) is collected to help you complete the registration and modify and improve the account information later.
b. Logout entrance, after you log in, you can go to My->Deregister Account
c. Account deregistration conditions and time limit, accounts that have not been banned and meet relevant national laws and regulations can be deregistered. If there is no login again within 7 days after deregistration, the account deregistration is completed.
1.2 Other functions and permissions
1.2.1 Storage permissions are for saving LEDs.
1.2.2 Mobile device information: Our products integrate Firebase, and GoogleBilll needs to collect your device Mac address, unique device identifier (OAID/IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to provide statistical analysis services, and collect device crash log information to complete the adaptation.
1.2.3 Application list: used for anti-cheating detection (such as determining whether it is a plug-in application with malicious behavior, identifying and analyzing abnormal operation behavior (such as security risks such as black production).
1.2.4 Clipboard information: used to obtain the bullet screen information copied by the user.
1.3 Personal information collected and used with exemption from consent in accordance with the law
Please understand that in the following circumstances, according to laws, regulations and relevant national standards, we do not need to obtain your authorization and consent to collect and use your personal information:
a. Directly related to national security and national defense security;
b. Directly related to public security, public health, and major public interests;
c. Directly related to criminal investigation, prosecution, trial and execution of judgments;
d. For the purpose of safeguarding the major legitimate rights and interests of the subject of personal information or other individuals such as life and property, but it is difficult to obtain the consent of the person concerned;
e. The personal information collected is disclosed to the public by you on your own;
f. Your personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
g. Necessary for signing or performing a contract according to your requirements;
h. Necessary for maintaining the safe and stable operation of the software and related services, such as discovering and handling faults in the software and related services;
i. Necessary for legitimate news reporting;
j. Necessary for academic research institutions to conduct statistical or academic research based on the public interest, and when providing the results of academic research or descriptions to the outside world, the personal information contained in the results shall be de-identified;
k. Other circumstances stipulated by laws and regulations.
Please note that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information or when we use data that cannot be linked to any specific personal information in combination with other personal information of yours, such information will be treated and protected as your personal information in accordance with this Privacy Policy during the period of combined use.
1.4 List of Personal Information Collection
Business Scenario Collection Purpose Collection Method Personal Information Field
Registration and Login User account registration and login User-authorized third-party account public information Mobile phone number, avatar, nickname
Feedback Contact with users User input Mobile phone number
Operation and security guarantee Used for operation and provision of account and data security guarantee APP collection Device information (device model, operating system version, MAC address, AndroidID, IMEI, IMSI, IDFA, OAID and other device identifiers, network access type, WLAN access point, sensor information), service log information, application information
2. Use of Cookies and Similar Technologies
Cookies and similar technologies are commonly used technologies on the Internet. When you use this product and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you visit and use this product. We promise not to use cookies for any other purpose other than the purposes described in this privacy policy. We use cookies and similar technologies mainly to achieve the following functions or services:
2.1 Ensure the safe and efficient operation of products and services
We may set authentication and security cookies or anonymous identifiers to enable us to confirm whether you have logged into the service safely, or whether you have encountered theft, fraud and other illegal activities. These technologies will also help us improve service efficiency and improve login and response speed.
2.2 Help you get an easier access experience
2.3 Clear cookies
The mobile application management function supports clearing application data, and you can perform corresponding data clearing operations in the settings function. If you clear it, you may not be able to use the services or corresponding functions provided by the company that rely on cookies due to these changes.
3. How we share, transfer, and publicly disclose personal information
3.1 Sharing
3.1.1 Sharing principles
a. Authorization and consent principle: Sharing your personal information with our third parties requires your authorization and consent, and the shared personal information is de-identified information or information of natural persons whose subjects cannot be identified by the sharing third party, unless we share necessary personal information with related parties and are subject to the purposes stated in this privacy policy. If the purpose of the use of information by related parties or third parties exceeds the scope of the original authorization and consent, they need to obtain your consent again.
b. Legality and minimum necessary principle: The data shared with related parties and third parties must have a legal and legitimate purpose, and the shared data must be limited to what is necessary to achieve the purpose.
c. Security and prudence principle: We will carefully evaluate the purpose of the use of shared information by related parties and third parties, conduct a comprehensive assessment of the security assurance capabilities of these partners, and require them to comply with the cooperation legal agreement. We will conduct strict security monitoring of the software development kit (SDK) and application programming interface (API) used by partners to obtain information to protect data security.
3.1.2 Sharing information for functions or services
Login to a third-party account: When you log in to this product account and click to jump to a third-party product, we may share your de-identified PUID and CID with the third-party product you logged in.
3.1.3 Sharing information for security and analysis statistics
a. Ensure usage safety: We attach great importance to account and service security. In order to protect the account and property security of you and other users and protect your and our legitimate rights and interests from illegal infringement, we and our affiliates or service providers may share necessary equipment, account and log information.
b. Analyze product usage: In order to analyze the usage of our services and improve the user experience, we may share statistical data on product usage (crashes, flashbacks) with affiliates or third parties. These data are difficult to identify your personal identity in combination with other information.
3.1.4 List of personal information shared with third parties
Third-party company name Function type Shared personal information Purpose of use Privacy policy link
3.2 Transfer
For purposes such as statistical analysis, our products will integrate third-party SDKs or other similar applications, such as Umeng+ SDK, which needs to collect information such as the International Mobile Equipment Identity (IMEI), device location, and device model of your device. For the security of your information, we have agreed with third-party SDK service providers on strict data security and confidentiality obligations, and these companies will strictly comply with our data privacy and security requirements. We will not share your personal information with them unless you agree. To help you better understand the types of data and uses collected by Umeng+, as well as how to protect your personal information, you can visit https://www.umeng.com/policy to learn about the Umeng+ privacy policy. We understand and respect your right to choose. If you do not want to participate in Umeng+ big data computing, you can also visit https://outdip.umeng.com/opt_out.html to exercise your opt-out right.
a. We will not transfer your personal information to any other third party unless you have obtained your explicit consent.
b. As our business continues to develop, we may merge, acquire, or transfer assets, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will require the successor to protect your personal information in accordance with laws and regulations and security standards no less stringent than those set forth in this Privacy Policy, otherwise we will require the successor to obtain your authorization and consent again.
3.3 Disclosure
a. We will not disclose your information publicly unless it is in compliance with national laws and regulations or with your consent. We will use security protection measures that meet industry standards when we publicly disclose your personal information.
b. When we announce penalties for illegal accounts or fraudulent behavior, we will disclose the information of the relevant accounts.
3.4 Personal information that is exempted from obtaining consent for sharing, transfer, and public disclosure in accordance with the law
Please understand that in the following circumstances, according to laws, regulations and national standards, we do not need to obtain your authorization and consent to share, transfer, and publicly disclose your personal information:
a. Directly related to national security and national defense security;
b. Directly related to public safety, public health, and major public interests;
c. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
d. For the purpose of safeguarding your or other individuals’ major legitimate rights and interests such as life and property, but it is difficult to obtain the consent of the person concerned;
e. Personal information that you disclose to the public on your own;
f. Personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.
4. How we store personal information
4.1 Storage location
In accordance with the provisions of laws and regulations, we will store your personal information collected and generated during domestic operations in the local territory. At present, we will not transfer the above information abroad. If we transfer it abroad, we will comply with relevant national regulations or seek your consent.
4.2 Storage period
We will only retain your personal information for the period necessary for the purpose of providing "this product" and services: we will retain the information you publish until you withdraw or delete it. After the necessary period, we will delete or anonymize your personal information, except as otherwise provided by laws and regulations.
5. How we protect the security of personal information
a. We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being improperly used or accessed, disclosed, used, modified, damaged, lost or leaked without authorization.
b. We will use encryption technology, anonymization and related reasonable and feasible means that are no less than those of our peers in the industry to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.
c. We will establish a special security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology in a timely manner.
d. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. We will try our best to ensure the security of the personal information you provide to us.
e. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.
f. We will formulate emergency response plans and immediately activate emergency response plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, we will promptly inform you of the following in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for your independent prevention and risk reduction, and remedial measures for you. We will promptly inform you of the relevant circumstances of the incident by push notification, email, letter, SMS and related forms. When it is difficult to inform you one by one, we will take reasonable and effective measures to issue an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
g. Once you leave this product and related services and browse or use other websites, services and content resources, we will have no ability and direct obligation to protect any personal information submitted by you to software or websites outside of this product and related services, regardless of whether you log in, browse or use the above software or websites based on the links or guidance of this product.
6. Manage your personal information
We attach great importance to your management of personal information, and do our best to protect your rights to query, access, modify, delete, withdraw consent authorization, complain and report, and set privacy functions for your personal information, so that you can protect your privacy and information security.
6.1 Autonomous control of receiving information
a. You can decide to receive push messages on your own and choose whether to accept notifications through the phone system settings
6.2 Change or withdraw authorization settings and withdraw and process information
6.2.1 Change or withdraw sensitive permission settings
You can turn off GPS location, address book, camera, microphone, and album permissions in the device's own operating system to change the scope of consent or withdraw your authorization. After withdrawing authorization, we will no longer collect information related to these permissions.
6.2.2 Change or withdraw authorization information processing
Specific business functions and services will require your information to be completed. When you withdraw your consent or authorization, we will no longer be able to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the company's previous personal information processing based on your authorization.
6.3 Access, delete, and correct your personal information
a. Access personal account information: You can query, access, and correct your avatar, user name, gender, region, etc.
b. Please note that for security and identity considerations (such as number complaint services), you may not be able to modify certain initial registration information submitted during registration. If you really need to modify such registration information, please contact us according to the contact information stated in this Privacy Policy.
6.4 Complaints and Reports
You can make complaints or reports in accordance with our publicized system. If you think your personal information rights may be infringed, or if you find clues of infringement of personal information rights (for example: you think that our collection of your personal information violates the law or the agreement between the two parties), you can contact us. We will promptly respond to your complaints and reports after verification.
6.5 Access Privacy Policy
1. When you install this product for the first time, you can click [Privacy Policy] on the pop-up page to view it
2. My page can also view the entire content of this Privacy Policy
3. Please understand that the "this product" and related services described in this Privacy Policy may vary depending on the mobile phone model, system version, software application version, mobile client and other factors you use. The final products and services are subject to the "this product" software and related services you use.
6.6 Notify you of cessation of operation
If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations by delivery or announcement, and delete or anonymize your personal information.
7. Minor Terms
7.1. If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using "this product" and related services.
7.2. We protect the personal information of minors in accordance with the provisions of relevant national laws and regulations, and will only collect, use, store, share, transfer or disclose the personal information of minors when permitted by law, with the explicit consent of parents or other guardians, or when necessary to protect minors; if we find that the personal information of minors has been collected without the prior verifiable consent of parents, we will try to delete the relevant information as soon as possible.
7.3. If you are the guardian of a minor, when you have questions about the personal information of the minor you are protecting, please contact us through the contact information published in this privacy policy of the company.
8. Amendments and Notifications of the Privacy Policy
8.1 We may amend the content of this Privacy Policy from time to time in accordance with the requirements of laws and regulations or the needs of business operations. Unless otherwise specified, any changes or modifications will take effect immediately when the revised content is released on this product, and your use and continued use of this product will indicate that you accept such changes or modifications.
8.2 If you do not agree to all the provisions of this Privacy Policy (including any modifications we may make to it or other rules referenced therein from time to time), please do not use this product and related services, or you can actively cancel the use of this product and related services.
8.3 In order to facilitate your understanding of the terms and conditions applicable to your use of this product, we will publish our modifications to this Agreement on this product, and you should review this Privacy Policy and other rules and content incorporated by reference from time to time.
9. Contact Us
Operator: PrimeLime Ltd
If you have any questions about the LED Scroller related services or the privacy measures involved in this statement, please send an email to the user feedback mailbox at primelime521@gmail.com
10. Applicable Laws and Dispute Resolution Methods
The interpretation, implementation and dispute resolution of this privacy policy shall be subject to local laws and regulations. During the implementation of the policy content, all disputes and disputes arising from or related to this privacy policy shall be resolved through negotiation by the parties first. If the negotiation fails, either party may file a lawsuit with the local people's court.
11. Supplementary Provisions
If any provision of this privacy policy is completely or partially invalid or unenforceable for any reason, the other provisions of this privacy policy will continue to be valid.
Matters not covered in this privacy policy shall be handled in accordance with relevant laws, regulations, relevant business regulations of each information provider and the "User Registration Agreement" agreed to when you registered this website/APP. If it is necessary to formulate supplementary privacy policy content, its legal effect shall be the same as this privacy policy.