Privacy Policy
Last Updated: November 20, 2025
Chapter 1: General Principles – Core Principles of Privacy Protection
We regard the security and privacy protection of users' personal information as our core operational guidelines. We strictly adhere to the principles of "legality, necessity, and minimum scope" in processing personal information, refrain from collecting irrelevant and redundant information, and effectively safeguard your information rights and interests.
Chapter 2: Your Rights to Personal Information
To ensure your control over your own information, you are entitled to the following core rights:
1.Right to Inquiry: You may apply to inquire about the types and related records of your personal information held by us.
2.Right to Correction: If you find that your information is inaccurate or incomplete, you have the right to request timely corrections.
3.Right to Deletion: You may apply to delete your personal data in compliance with legal provisions and the agreements of this Policy.
Chapter 3: Scope of Personal Information Collection
To provide basic services and ensure service quality, we only collect the following necessary information:
3.1 Basic Device Information
●Collected Content: Device model, operating system version, screen resolution, and related hardware parameters.
●Necessity of Collection: Adapt to device performance to ensure stable operation of the service.
3.2 Network Connection Information
●Collected Content: Network type (e.g., Wi-Fi, 5G/4G), IP address.
●Necessity of Collection: Ensure smooth communication and reduce lag and delay.
3.3 Account Security Information
●Collected Content: Unique device identifiers, login verification information, and security protection data.
●Necessity of Collection: Verify identity and prevent security risks such as account theft and unauthorized access.
Chapter 4: Specifications for the Use of Personal Information
Collected personal information is only used for the following purposes and will not be extended to other scenarios without additional authorization:
●Ensure the stable operation of basic services such as match matching and data synchronization.
●Optimize performance based on device and network information to improve fluency and user experience.
●Maintain a fair service environment and protect the legitimate rights and interests of compliant users.
●Identify and handle violations such as plug-ins and cheating to maintain service order.
Chapter 5: Data Security and Storage Rules
5.1 Security Protection Measures
We have established a dual protection system of "technology + management":
●Technical Protection: Adopt industry-standard encryption technologies (for transmission and storage), and deploy firewalls and multiple security protection systems.
●Management Protection: Implement hierarchical permission control, only authorizing necessary personnel to access data; conduct regular security inspections and employee training.
5.2 Storage Mechanism
We follow the principles of "necessary retention and timely cleaning":
●Retention During Service Period: During your continuous use of the service, only retain data necessary for providing the service.
●Cleanup of Historical Data: Regularly delete historical information that exceeds business needs.
●Disposal of Non-Compliant Data: Once a violation is verified, immediately stop storing relevant data.
Chapter 6: Handling of Special Scenarios
6.1 Protection of Minors
This service does not provide services to minors (under 18 years old). If minors' information is accidentally collected, we will immediately fully delete it and terminate the service.
6.2 Cross-Border Data Transmission
When data needs to be processed overseas due to global operations, we will adopt security measures such as encrypted transmission and signing data protection agreements to ensure data security. All cross-border data transmission complies with local regulatory requirements such as India's Digital Personal Data Protection (DPDP) Act, and necessary approvals will be obtained if required.
Chapter 7: Policy Update Mechanism
We will revise this Policy in the following circumstances: major adjustments to business functions; changes in data processing methods; updates to regulatory requirements.
The updated Policy shall take effect on the date of publication. We recommend that you review the latest version regularly.