Xinchen Team(hereinafter referred to as "we", "us" or "our") attaches great importance to the privacy and personal information protection of users. When you use our products and services, we may collect and use information about you. We hope to explain to you through this Privacy Policy (hereinafter referred to as "this Policy" or "this Privacy Policy") how we collect, use, store, share and transfer this information when you receive our products and services, as well as the ways we provide you to access, update, control and protect this information.Xinchen Team is well aware of the importance of personal information to you, and will do its best to protect your personal information safe and reliable. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of opt-in consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry.
Please carefully read and understand this Policy, especially the terms of exemption or limitation of liability, application of law and dispute resolution clauses, before using the services of Xinchen Team. If you do not agree with the content of this Policy, we will not be able to provide you with complete services, and please stop using our products and services immediately. By using or continuing to use the products and/or services we provide, you consent to our collection, use, storage and sharing, disclosure and protection of your personal information in accordance with this Policy. If you have any questions, comments or suggestions about the content of this Policy, please contact us at the end of this article.When you click Confirm to agree to this Policy, it means that you have fully read, understood and accepted all the contents of this Policy, and have reached an agreement with us, and this Policy is legally binding on you and us.
This User Privacy Policy will help you understand the following· 1. Scope of application of this Policy and the meaning of related terms· 2. How we collect, store and use your personal information· 3. How We Use Cookies and Similar Technologies· 4. How We Share, Transfer, and Publicly Disclose Your Personal Information· 5. How We Protect Your Personal Information· 6. Your Rights· 7. How We Process Children's Personal Information· 8. How Your Personal Information Is Transferred Globally· 9. How this Policy is Updated· 10. How to Contact Us
This policy applies when you use any of our products and services, regardless of whether the products and services have a separate privacy policy, and whether you are a browsing user (visitor) or a registered logged-in user. Please note that this Policy does not apply to the following situations:information collected by third-party services (including any third-party websites) accessed through our Services;Information collected through other companies and agencies that advertise on our Services. 1.1 Collect information about the equipment you useWhen you use our products and services, the game will collect and record the relevant device information you use according to the specific permissions you have authorized in the installation and use of the software, so as to provide you with high-quality game operation support on an ongoing basis. In order to improve the user experience and convenience of products and services, the following personal information will be collected from you by calling the device permission. If you do not agree to provide such personal information, you may not be able to use the functions related to improving the user experience, and some games also require you to repeatedly consent to the device to obtain relevant permissions during the use of products and services, but your failure to provide relevant permissions will not affect your operation of the game. Cache and other informationWe will request to read the following information, including phone status and device permissions
1.1.1 Device and Software InformationIn order to ensure the security of the operating environment, ensure the normal operation of software and services, and better optimize the game experience based on data, it is necessary to obtain device and software information. Relevant device information includes information such as device name, device model, operating system version, hardware serial number, MAC, application version, unique device identifier, etc. This mobile phone information helps us understand the problems you encounter during use and optimize our products. We need to collect information such as International Mobile Equipment Identity (IMEI), Network Device Hardware Address (MAC), OAID, and Android ID at the first startup to confirm your identity so that we can provide you with consistent services. If you refuse to provide the service, you will not be able to enjoy the services that are convenient for you, but it will not affect your normal use of other functions.
1.1.2 Location Information Due to differences in different channels and regions, in order to achieve accurate and diversified advertising content, third-party advertising SDKs require you to authorize you to call the location permissions in the device you are using, including precise location and approximate location. When you use location-related services, we will obtain your geographic location information through IP address, GPS, WLAN (such as WiFi) or base station, and we will also record the location information of your device in order to provide you with relevant services.
1.1.3 Storage PermissionsIn order to ensure that you can save and store the current game data while playing, you need to call the read and write external storage permissions that are convenient for you to use (including modifying/deleting the contents of the SD card, and reading the game error caused by the operation on the SD card. The operation of the game is causing an abnormality.
1.1.4 Device information collected by third-party SDKsWe will cooperate with third-party service providers to integrate third-party servers into our products and services for your convenience services (including advertising and statistical third-party services). We do not directly share your personal information with third-party services, nor do we collect your personal information on behalf of third-party service providers. Third-party service providers that access our products and services have their own privacy policies, which are not subject to this Privacy Policy. Third-party service providers collect personal information necessary to provide services to you in accordance with their own privacy policies. We will use commercially reasonable efforts to require third-party service providers to comply with applicable laws and regulations when processing your personal information, and to use their best efforts to require them to take relevant confidentiality and security measures.
1.2 Meanings of Related TermsPersonal information: refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information. The personal information involved in this Privacy Policy includes the basic information of a natural person (including name, date of birth, gender, address, telephone number, and e-mail address), personal identification information (including ID number), personal biometric information (including fingerprints and facial features), and network identification information (including system account number and IP). Address, e-mail address, and passwords, passwords, and password protection answers related to the foregoing), personal property information (including bank account numbers, passwords, transaction and consumption records, virtual currency, virtual transactions, redemption codes and other virtual property information), address book information, personal Internet access records (including website browsing records, software usage records), personal commonly used device information (including hardware serial number, hardware model, device MAC address, operating system type, software list, unique device identifiers), personal location information (including approximate geographic location, precise location information). The specific types of personal information we actually collect are subject to the descriptions below.Sensitive personal information: refers to personal information that, once disclosed, illegally provided or abused, may endanger personal and property safety, and can easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. The sensitive personal information involved in this Privacy Policy includes your personal property information, personal identification information (including ID number), personal biometric information, network identification information, address book information, precise location information, delivery address, and personal information of children under the age of 14 (inclusive). The specific types of sensitive personal information we actually collect are subject to the following descriptions. You consent to the processing of your sensitive personal information for the purposes and in the manner described in this Policy.Device: means a device that can be used to access our products and/or services, such as a desktop computer, laptop, tablet or smartphone.Unique Device Identifier (Unique ID or UUID): A string of characters programmed into a device by the device manufacturer that can be used to uniquely identify the device (e.g., the IMEI number of a mobile phone). Unique device identifiers are used for a variety of purposes, including to serve ads when cookies cannot be used, such as in mobile applications.IP address: Every device that surfs the Internet is assigned a number, called an Internet Protocol (IP) address. These numbers are usually assigned based on geographic areas. An IP address can often be used to identify where a device is located when it connects to the Internet.SSL: SSL (Secure Socket Layer), also known as Secure Socket Layer, is a security protocol implemented on the transmission communication protocol (TCP/IP). SSL supports various types of networks and provides three basic security services, all of which use public key and symmetric key technologies to achieve information confidentiality.Cookies: Cookies are small files containing strings of characters that are sent to and stored on your computer, mobile device or other device when you log in to and use a website or other web content (usually encrypted). Cookie-like technologies are other technologies that can be used for similar purposes to cookies, such as web beacons, proxies, embedded scripts, etc.De-identification/anonymization: refers to the process of technical processing of personal information so that it cannot identify the subject of personal information without the help of additional information, and the processed information cannot be restored.Server logs: Typically, our servers automatically record web page requests that you make when you visit our website. These "server logs" typically include your web request, Internet Protocol address, browser type, browser language, the date and time of the request, and one or more cookies that uniquely identify your browser.Shared Information: means information about you that you voluntarily share publicly with your social networks and all users of the Services on our Services, or that is shared with others about you, for example, information they upload or post that contains information about you, and information about you that they send to you and other users of our Services.Non-Personally Identifiable Information: means any information relating to you that does not actually identify you, directly or indirectly, including personal information that is aggregated, anonymized, or pseudonymized. You acknowledge and agree that information that does not identify you personally is not personal information.
2.1.1 Your Information Shared by Other PartiesYou understand and acknowledge that we cannot obtain the personal information you provide to an external third party, or your personal information collected by an external third party, let alone use unconventional means (such as: maliciously interfering with the other party's series of apps). data) to obtain your personal information through software programs without authorization. In order to provide you with better services, confirm the transaction status and provide you with after-sales and dispute resolution services, with your authorization, we will collect your transaction and payment related information related to the transaction progress through the transaction partner you select and the third-party information system and payment institution directly involved in the transaction, so that we can process your order and ensure the smooth completion of the service, or better prevent fraud, order swiping and other malicious acts. In accordance with the requirements of laws and regulations and the agreement with third parties, we will obtain your relevant information from our affiliates and partners in a pop-up window with your authorization, and use your information after confirming the legitimacy of their information sources. If you are authorized to use a third-party account to log in, the Platform will obtain the account information (such as avatar and nickname) shared by you from the third party, and bind your third-party account with our account after you agree to this Privacy Policy and when you use the relevant functions.Our professional security team will strengthen the security of personal information (including sensitive information reporting, encrypted storage of sensitive information, access control control, etc.). We will protect the personal information we have acquired indirectly with the same means and measures as we do for the personal information of our users.
2.1.2 Your Information We Obtain AutomaticallyWith your prior consent, we will automatically collect your information or obtain system permissions based on the analysis of your use of our products and/or services and the purpose of advertising optimization, which may include the following information:Log information: refers to the technical information that the system may automatically collect through cookies, web beacons or other means when you use our services, including:Device or software information, such as configuration information provided by your mobile device, web browser, or other programs you use to access our Services, your IP address, and the version and device identifier of your mobile device;information you search for and browse while using our Services, such as the web search terms you use, the URLs of the social media pages you visit, and other information and content details that you view or request while using our Services;information about mobile applications (apps) and other software that you have used and how you have used such mobile applications and software;Information about your communications through our Services, such as the account number you have communicated with, and the time, data and duration of your communications;Information (metadata) contained in content you share through our Services, such as the date, time, or location of the shared photo or video taken or uploaded.Network information, such as mobile network operator network data information, WIFI signal information, and broadband data information.Please note that device information, log information, etc. alone is information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, such non-personal information will be regarded as personal information during the combination period, and we will anonymize and de-identify such personal information unless we have obtained your authorization or are otherwise provided by laws and regulations.Location information: refers to the information we collect about your location when you turn on the location function of your device and use the relevant services we provide based on location, including:When you use our services through a mobile device with location function, your geographic location information collected by us through GPS or WiFi, etc.;You can stop our collection of your geolocation information at any time by turning off the location function.Audio recording, video recording, photo information: refers to the information we collect when you use our specific functions (such as voice search, QR code scanning, taking photos, etc.), with your authorization. Refusal to provide this information will only make it impossible for you to use the above functions, but it will not affect your normal use of other functions of our services. In addition, you can turn off the relevant functions at any time.Other: We want the services we provide to you to be perfect, so we are constantly improving our services, including technology. This means that new features may be introduced frequently on our Services and new information may need to be collected. If there is a material change or change in the way we collect or use your personal data, we will notify you by appropriate means and this policy may be amended.You need to be aware that we will enable the above functions on the premise of obtaining your consent, and you can choose not to provide us with the personal information related to the implementation of the above functions, or refuse to open the corresponding system permissions, in which case you will not be able to experience the above services. At the same time, you can manage and reject at any time through the system settings or turn off the relevant permissions, which means that you have cancelled these authorizations, and we will no longer continue to collect and use your personal information, nor can we provide you with the services and/or functions corresponding to this authorization, and you need to turn on the access rights again if you continue to use these functions. Your decision to turn off the permission will not affect the processing of personal information previously based on your authorization. Hereby, we guarantee that if you do not choose the above services or functions, it will not affect your normal use of other basic functions provided by us.
2.2 Storage of Personal Information2.2.1 Storage location: We store your personal information within the territory of the People's Republic of China (including Hong Kong, Macao and Taiwan) in accordance with the provisions of laws and regulations. If cross-border storage is required, we will separately obtain your authorization and consent
2.3 How We Use Your InformationIn order to achieve this purpose, your information will be used for the following purposes, if we need to use the collected information for a new purpose, scope or actual transmission method that is inconsistent with this agreement, we will notify you in the form of in-app pop-up window and obtain your express consent:for data analysis in order to provide you with better services;For identity verification, customer service, security, fraud detection, archiving and backup purposes when we provide services, and to ensure the security of the products and services we provide to you;For security, legitimate investigations, etc.;Please note that unless you delete or withdraw your consent (i.e., refuse our collection and use through system settings), all personal information you provide when using our services will continue to be authorized for us to use it within the scope of this Policy during your use of our services. After you cancel your account, we will delete your personal information or anonymize it according to your request, unless otherwise provided by laws and regulations.
2.4 Exceptions to Obtaining Authorization and ConsentIn accordance with relevant laws and regulations and national standards, we may collect and use your personal information without your consent in accordance with the law under the following circumstances:(1) Directly related to national security and national defense security;(2) Directly related to public safety, public health, or major public interests;(3) Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;(4) For the purpose of protecting the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain your consent;(5) The personal information collected is disclosed to the public by yourself;(6) Personal information is collected from legally and publicly disclosed information, such as: legitimate news reports, government information disclosure and other channels;(7) It is necessary to conclude and perform a contract according to your requirements;(8) It is necessary to maintain the safe and stable operation of the products or services provided, such as discovering or disposing of faults in products or services;(9) When it is necessary for news units or academic research institutions to carry out statistical or academic research based on news reports or public interests, and when the results of academic research or descriptions are provided to the public, the personal information contained in the results is de-identified, and the data recipient is unable to restore and re-identify the personal information;(10) Other circumstances stipulated by laws and regulations.
3How We Use Cookies and Similar Technologies3.1CookiesTo ensure the proper functioning of our website, we store small data files called cookies on your computer or mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. With the help of cookies, the website is able to store data such as your preferences or the items in your shopping basket.We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. For details, see AboutCookies.org. You can erase all cookies saved on your computer, and most web browsers have a function to block cookies. However, if you do so, you will need to change your user settings every time you visit our website.
3.2 Web Beacons and Pixel TagsIn addition to cookies, we also use other similar technologies, such as web beacons and pixel tags, on our website. For example, an email we send you may contain a click-through URL that links to content on our website. If you click on the link, we will track that visit to help us understand your product or service preferences and improve customer service.
4. How We Share, Transfer, and Publicly Disclose Your Personal Information4.1 SharingYou agree that we may share your personal information necessary with our affiliates to provide and develop our products and services. Except in the following circumstances, we and our affiliates will not share your personal information with any third party without your consent:You may request us to delete your personal information under the following circumstances:(1) Obtain your explicit consent or authorization in advance;(2) When it is necessary to provide it to the outside world in accordance with the requirements of laws, regulations, legal procedures, or mandatory administrative or judicial requirements;(3) Comply with the relevant agreements signed with you (including the electronic agreements signed online and the corresponding platform rules) or other legal documents;(4) We and our affiliates may share your personal information with our affiliates, partners and third-party service providers, contractors and agents (such as communication service providers who send email or push notifications on our behalf, and map service providers who provide us with location data) for the following purposes, but we will only share necessary personal information and are subject to the purposes stated in this Privacy Policy. If our affiliates, partners and third-party service providers, contractors and agents want to change the purpose of processing personal information, they will seek your authorization and consent again, and they have no right to use the shared personal information for any other purpose:
to provide our services to you;for the purposes described in the "How We Use Your Information" section;to fulfill our obligations and exercise our rights under the User Terms of Service or this Privacy Policy;to understand, maintain, and improve our Services;(5) To handle disputes or controversies between you and others at your request.Our partners include the following types:(1) Suppliers of goods or technical services. We may share your personal information with third parties who support our features. This support includes providing payment services to us, data processing, etc. We share this information to enable the core functionality of our products and/or services;(2) Third-party SDK service providers. Our products may contain third-party SDKs or other similar applications, and if you use such services provided by third parties on our platform, you agree that their information will be directly collected and processed (such as in the form of embed codes, plug-ins, etc.). The following describes the relevant third-party SDKs for access:(3) We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.If we share your personal information with any of the above-mentioned third parties, we will strive to ensure that such third parties comply with this Policy and other appropriate confidentiality and security measures that we require them to comply with when using your personal information, and we will investigate their data security capabilities and environment, sign strict confidentiality agreements with them, and only share personal information that is necessary for the specific purpose.As our business continues to grow, we may enter into a merger, acquisition, asset transfer, or similar transaction, and your personal information may be transferred as part of such transaction, and we will require the new owner to continue to comply with this policy, or we will require them to obtain your authorization again.
We may also need to retain, preserve or disclose your personal information for the following purposes:(1) Directly related to national security, national defense security, public safety, public health, or public interests;(2) Personal information is collected from legally and publicly disclosed information, such as lawful news reports, government information disclosure, and other channels;(3) We believe that it is reasonably necessary to comply with applicable laws and regulations, safeguard the public interest, or protect the personal and property safety or legitimate rights and interests of us, our customers, other users or employees;(4) Other circumstances stipulated by laws and regulations.
4.2 AssignmentWe will not transfer your personal information to any company, organization or individual, except in the following circumstances:Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;In the event of a merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy, otherwise we will require the company or organization to seek your authorization and consent again.
4.3 Public DisclosureWe will only publicly disclose your personal information under the following circumstances and on the premise that we take security measures that comply with industry standards:Disclose the personal information specified by you in the manner of disclosure to which you have expressly consented according to your needs;If it is necessary to provide your personal information in accordance with the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information according to the type of personal information required and the method of disclosure.
4.4 Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal informationIn the following circumstances, we do not need to obtain your prior authorization and consent to share, transfer or publicly disclose your information:(1) Directly related to national security and national defense security;(2) directly related to public safety, public health, or major public interests;(3) Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;(4) For the purpose of protecting the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain your consent;(5) Personal information that you disclose to the public;(6) Personal information is collected from legally and publicly disclosed information, such as lawful news reports, government information disclosure, and other channels.We are responsible for sharing, transferring, and publicly disclosing your personal information externally, and bear corresponding legal responsibilities.
5. How We Protect Your Personal InformationWe take information security very seriously, and we use a variety of security technologies and procedures to prevent loss, misuse, unauthorized access, or disclosure of information. For example, in some services, we will utilize encryption technology, such as SSL, to protect the personal information you provide to us. However, please understand that due to technical limitations and limitations in risk prevention, even if we have tried to strengthen security measures, we cannot always guarantee that the information is 100% secure. You need to understand that the systems and communication networks you use to access our services may have problems due to circumstances beyond our control.We have set up a dedicated team responsible for the development and application of a variety of security technologies and procedures, we will conduct security assessments for the person in charge of security management and personnel in key security positions, we have established a sound information security management system and internal security incident handling mechanism, etc., and we will take appropriate security measures and technical means in line with industry standards to store and protect your personal information to prevent your information from being lost, received from unauthorized access, use, damage or leakage. According to our security management system, the leakage, damage or loss of personal information is classified as a major security incident, and once it occurs, the company's emergency plan will be activated, and a joint emergency response team will be formed by multiple departments such as the network operation department, the information management department, the customer service department, and the legal department.We will conduct data security awareness training and security ability training and assessment for employees, conduct identity authentication and authority control for employees who process personal information, and sign confidentiality agreements with employees and partners who contact your personal information, clarify job responsibilities and code of conduct.In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, suggestions for you to prevent and reduce risks on your own, and remedial measures for you. We will promptly inform you of the relevant circumstances of the incident by email, letter, telephone, push notification, etc., and if it is difficult to inform the Personal Data Subject one by one, we will take reasonable and effective measures to make an announcement.At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.We also ask for your understanding that in the Internet industry, due to the limitations and rapid development of technology and the possible existence of various malicious attack methods, even if the company does its best to strengthen security measures, it is impossible to ensure 100% security of information at all times. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and other personal information to others.
6. Your RightsRight of AccessIn principle, you can access your personal information in the following ways:Account information: You can log in to your personal account at any time to access or edit the personal information in your account, change your password, add security information, link your account or authenticate your identity, etc.;Usage information: You can check the order information on our website, client and other services, or you can contact us to delete such information through the methods provided at the end of this Policy, and we will provide it after verifying your identity, unless otherwise agreed by laws and regulations;Other information: If you encounter operational problems during this visit or need to obtain other personal information that cannot be obtained as mentioned above, you can contact us through the methods provided at the end of this Policy, and we will provide it after verifying your identity, unless otherwise agreed by laws and regulations.Right to rectificationAfter verifying your identity and the correction does not affect the objectivity and accuracy of the information, you have the right to correct or update the incorrect or incomplete information, and you can make corrections on our website or in the client by yourself, or under specific circumstances, especially in the case of data errors, submit your correction request to us through the contact information provided at the end of this Policy to request us to correct or update your data, except as otherwise provided by laws and regulations. However, for security and identification reasons, you may not be able to modify some of the initial registration information submitted at the time of registration.Right to erasureYou can delete your personal information by yourself on our website or client (click on "My" - click on the gear icon) or contact us at the end of this article, and we will help you delete your personal information after providing relevant information. If we cease to operate or provide relevant services, we will stop collecting your personal information in a timely manner, notify you of the notice of cessation of operation in the form of delivery or announcement, and delete or anonymize the personal information we hold.Right of ClaimIf you need a copy of your personal data, you can contact us through the methods provided at the end of this Policy, and after verifying your identity, we will provide you with a copy of your personal information (such as basic information and identity information) in our services, unless otherwise provided by laws and regulations.Right to Withdraw ConsentIf you want to change the authorization scope of relevant functions (such as location, contacts, camera), you can modify your personal settings through your hardware device, or operate on the relevant function settings interface in our products or services. If you encounter operational problems during this process, you can contact us through the methods provided at the end of this Policy.However, you acknowledge and agree that unless you exercise the aforesaid "right to delete", your actions will not affect our processing and storage of personal information based on your previous authorization.Advance notification of the right to discontinue the operation of products and servicesWe are willing to accompany you all the time, if some or all of our products and services are forced to stop operating due to special reasons, we will notify you 15 days in advance on the main page or website of the product or service, or send you an email or other appropriate means to reach you, and will stop the collection of your personal information, and at the same time will delete or anonymize your personal information held in accordance with the law, unless otherwise provided by laws and regulations.Exception Information FormIn the following circumstances, we will not be able to respond to your request in accordance with the requirements of laws and regulations:directly related to national security and national defense security;directly related to public safety, public health, or major public interests;directly related to criminal investigation, prosecution, trial and enforcement of judgments;There is sufficient evidence that you have subjective malice or abuse of rights;Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.Involving trade secrets.
7. How We Process Children's Personal InformationMinors are not allowed to create their own user accounts without the consent of their parents or guardians. If you are a minor under the age of 18, please be sure to ask your parent or guardian to read this Privacy Policy carefully and use our services or provide information to us with the consent of your parent or guardian.For the collection of minors' personal information with the consent of their parents or guardians to use our products or services, we will only use, share, transfer or disclose this information as permitted by laws and regulations, with the explicit consent of parents or guardians, or as necessary to protect minors.If parents or guardians find that the relevant information of minors is filled in by minors and need to be modified or deleted, please feel free to contact us.Contact email: gzxchd@163.comWe will respond to the notification as soon as we receive it.
8. How Your Personal Information Is Transferred GloballyPersonal information collected and generated in the course of our operations within the territory of the People's Republic of China shall be stored within the territory of China, except in the following circumstances:(1) There are clear provisions in laws and regulations;(2) obtain your explicit authorization;(3) Your personal active behaviors such as conducting cross-border transactions through the Internet.In the above cases, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.
9. How this Policy is UpdatedOur Privacy Policy is subject to change.Without your express consent, we will not reduce your rights under this Privacy Policy. We will post any changes to this policy on this page.For major changes, we will also provide more prominent notices (including we will notify you through the announcement on our official website and even provide you with pop-up prompts).The material changes referred to in this Policy include, but are not limited to:(1) There has been a significant change in our service model. Such as the purpose of processing personal information, the types of personal information processed, and the way in which personal information is used;(2) We have major changes in our ownership structure and organizational structure, such as changes in owners caused by business adjustments, bankruptcy mergers and acquisitions, etc.;(3) Changes in the main objects of personal information sharing, transfer, or public disclosure;(4) There are significant changes in your rights to participate in the processing of personal information and the way in which they are exercised;(5) When there is a change in the department responsible for handling personal information security, contact information and complaint channels;(6) When the personal information security impact assessment report indicates that there is a high risk.
10 How to Contact UsYou can contact us by email gzxchd@163.com,and we will respond to your request within 10 days.