Welcome to use our software and related services!
If you are not logged in to your account, we will use the identifier information corresponding to the device to protect the basic functions. If you log in to your account, we will push information based on the account information.
Geographic location, camera, photo album (storage), and phone permissions
will not be turned on by default, and will only be used for specific functions or services with your express authorization, and you can also withdraw authorization.
In particular, we need to point out that even if we have obtained these sensitive permissions with your authorization, we will not collect your information when the relevant functions or services are not needed. For specific permission application and usage, please see the attachment: Permission List
(2) Special reminder
1. How we collect and use personal information
We will collect information that you proactively provide when you use the service in the following ways, and collect information generated during your use of the function or the process of receiving the service through automated means:
(1) Basic necessary functions
- register log in
When you register and log in to this product and/or related services, you can log in and use a third-party account, and
you will authorize us to obtain your public information (avatar, nickname, and other information authorized by you) on the third-party platform. Used to bind with this product account,
so that you can directly log in and use this product and related services.
When you use identity authentication functions or services, according to relevant laws and regulations,
you may need to provide your real identity information (real name, ID number, phone number, etc.) to complete real-name verification. In order to achieve the purpose of identity authentication,
you agree and authorize us to provide, inquire, and verify your aforementioned identity information to the relevant identity authentication agency by itself or by entrusting a third party.
This information is personal sensitive information, you can refuse to provide it, but you may not be able to obtain related services, but it will not affect the normal use of other functions and services.
- Operation and safety assurance
We are committed to providing you with a safe and reliable product and use environment, and providing high-quality and reliable services is our core goal. The information collected to realize the security function is necessary information.
We may use or integrate your account information, transaction information, device information, service log information, and information that our affiliates and partners have obtained your authorization or shared in accordance with the law to comprehensively determine the transaction risks of your account, perform identity verification, testing, and Prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures.
Device information and log information
- In order to ensure the safe operation of software and services, we will collect your WLAN access point, base station, network access method, type, status, network quality data, operation log, device attribute information [SDK version, device manufacturer, device model , Device language, device name, application list information, hardware serial number, operating system and application version and type, language setting, resolution, IP address, GPS location, system platform, system version, application package name and version, before and after application Set time, independent device identification, iOS advertising identifier (IDFA), network card (MAC) address, international mobile equipment identity (IMEI), anonymous equipment identifier (OAID), international mobile subscriber identity (IMSI) base station information, sensors Information, Bluetooth information, WIFI status information, CPU information, memory information, battery usage].
- In order to prevent malicious programs and necessary for safe operation, we may collect installed application information or running process information, the overall operation of the application, usage and frequency, application crashes, overall installation and usage, performance data, application sources .
- We may use your account information, device information [including device model, operating system and version, client version, device resolution, package name, device settings, process and software list, andriod_id/Android device unique identifier, bssid/WIFI MAC physical address, IMSI/International Mobile User Identity, IMEI/International Mobile Equipment Identity, iccid/mobile SIM card number, IDFA, OPENUDID, GUID, OAID, device MAC address], service log information and our affiliates and cooperation The information that the party is authorized by you or can be shared in accordance with the law is used to determine account security, perform identity verification, detect and prevent security incidents.
Please note that separate device information and log information are information that cannot identify a specific natural person. If we combine this type of non-personal information with other information to identify a specific natural person, or combine it with personal information, during the combined use period, this type of non-personal information will be treated as personal information, unless you have obtained your authorization Or unless otherwise provided by laws and regulations, we will anonymize and de-identify this type of personal information. During the combined use, this information will be treated and protected as your personal information in accordance with this policy.
(2) Additional business functions
When you use the additional business functions of this product, in order to meet the purpose of providing you with the product and service, in addition to the registration information, you need to further provide us with your personal identification information, location information and other necessary services for you If you do not use specific products and services, you do not need to provide relevant information (which will be explained in detail below).
- Online activities
During your use of this product and service, we may be involved in product online activities for marketing and promotion, and these functions may be adjusted due to product version upgrades or event deadlines. If involved: When participating in the online event payment/withdrawal,
you need to provide the payment/withdrawal information (including name, mobile phone number, contact address, ID number, e-mail address, etc., subject to the event rules) to complete the payment/withdrawal .
- customer service
- When you contact our customer service or use other user response functions (such as service consultation, personal information protection complaints or suggestions, other customer complaints and needs),
we may need you to provide necessary personal information
(name, user ID, mobile phone number) , E-mail, recordings, pictures, videos)
to match and verify your user identity in order to protect your account and system security.
We may also save your contact information (used when you contact us or other contact information you actively provide to us, such as telephone, email),
your communication/call records and content (personal sensitive information) with us
, Other necessary information related to your needs in
order to contact you or help you solve the problem, or record the solution and result of the related problem. This information is personal sensitive information, you can refuse to provide it, but you may not be able to obtain related services, but it will not affect the normal use of other functions and services.
- Session and available data
"Session and available data" refers to the information you provide to us about your use of applications and services, including but not limited to the connection and service-related data information generated by your use of applications and services. Sessions and available data include connection requests , Server communication and data sharing related information, including network testing, service quality, date, time and location. We can also centrally process sessions and available data. Please note that sessions and available data do not include any personal information, nor do you include you Content that can be sent or shared through the use of applications (such as photos, contacts, schedules, etc.) or services.
- Device permission call
In order to ensure the normal implementation of related business functions, we need to call the corresponding necessary permissions according to the specific usage scenarios, and ask you a pop-up window before calling (see attachment: permission list for details).
If you need to turn off some of the above specific access functions (such as your location information), most mobile devices will support this need. For specific methods, please refer to or contact the service provider or manufacturer of your mobile device.
Please note that if you turn on any permission, you authorize us to collect and use relevant information to provide you with corresponding services. Once you turn off any permission, you cancel the authorization. We will no longer continue to collect and use the corresponding permissions. Using relevant information, it is also unable to provide you with the services corresponding to the permission. However, your decision to close the authority will not affect the previous collection and use of information based on your authorization.
- Advertising push function
Based on the collected information, we may cooperate with third-party service providers to access third-party services (such as advertising, links or other forms of promotional content) in our products and/or services. We will not provide you to us or what we have collected from you. In
order to ensure the normal realization of relevant business functions, we need to call the corresponding necessary permissions according to the specific usage scenarios, and ask you in the pop-up window before calling (see attachment for details: Permission list).
If you need to turn off some of the above specific access functions (such as your location information), most mobile devices will support this need. For specific methods, please refer to or contact the service provider or manufacturer of your mobile device.
We will make commercially reasonable efforts to require third-party service providers to comply with relevant laws and regulations when processing your personal information, and do our best to require them to take relevant confidentiality and security measures, but we cannot guarantee that they will take corresponding measures in accordance with our requirements .
If you use Xiaomi, Meizu, Huawei and other brands of mobile phones, this product may directly or through a third party access the above-mentioned mobile phone manufacturer Push SDK to collect
unique identification information (such as IMEI),
and may collect your
phone model, system type, Parameters such as system version and device screen size are used to push information such as products and activities. For details,
- Changes to the purpose of collecting and using personal information
Please understand that with the development of our business, the functions of this product and the services provided may be adjusted and changed. In principle, when a new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly or reasonably related to the original processing purpose, we will collect and use your personal information, and we will notify you again and obtain your consent.
(3) Information from a third party
You can also use a third-party account (such as WeChat) to log in to our platform. At this time, you can choose to authorize us to read the public information (user name, nickname, avatar) that you registered, announced, and recorded on the third-party platform under the premise of complying with relevant laws and regulations
- The information shared by other users contains your information.
(4) Sensitive information
Before providing us with any personal information that is sensitive information, please clearly consider that such provision is appropriate and agree that your personal sensitive information can be processed in accordance with the purposes and methods described in this policy. For the definition of sensitive information, please see the attachment: Nomenclature.
After obtaining your consent, we will collect and use your sensitive information to implement functions related to our business, and allow you to make a choice to disagree with the collection and use of this sensitive information, but refusal to use this information will affect you Use related functions.
(5) Exceptions for obtaining authorization and consent
Please understand that in the following situations, in accordance with laws, regulations and relevant national standards, we do not need your authorization to collect and use your personal information:
- Relevant to fulfilling the obligations stipulated by laws and regulations;
- Directly related to national security and national defense security;
- Directly related to public safety, public health, and major public interests;
- Directly related to criminal investigation, prosecution, trial, and execution of judgments;
- In order to protect the life, property and other major legal rights of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;
- Your personal information collected is disclosed to the public by yourself;
- Collect your personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
- Necessary for signing or performing a contract according to your requirements;
- Necessary for maintaining the safe and stable operation of software and related services, such as detecting and handling software and related service failures;
- Necessary for legal news reporting;
- When it is necessary for academic research institutions to conduct statistical or academic research based on the public interest, and when they provide academic research or description results to the outside, they de-identify the personal information contained in the results;
- Other circumstances stipulated by laws and regulations.
2. How do we use similar technologies such as cookies
(1) Ensure the safe and efficient operation of products and services
We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you log in to the service safely, or whether you have encountered embezzlement, fraud, or other illegal acts. These technologies will also help us improve service efficiency, improve login and response speed.
(2) Help you get a more relaxed visit experience
Using this type of technology can help you avoid repeating the steps and processes of filling in your personal information and entering search content.
3. How do we share, transfer, and publicly disclose personal information
- Sharing principle
Authorization and consent principle:
Sharing your personal information with our affiliates and third parties requires your authorization and consent, unless the shared personal information is information that has been de-identified and the third party cannot re-identify such information. Subject of natural person. If related parties and third parties use the information for purposes beyond the scope of the original authorization and consent, they need to obtain your consent again.
The principle of legality and minimum necessity:
the data shared with related parties and third parties must have a legitimate and legitimate purpose, and the shared data is limited to the extent necessary to achieve the purpose.
Security and prudence principle:
We will carefully evaluate the purposes of related parties and third-party data sharing information, comprehensively evaluate the security capabilities of these partners, and require them to follow the cooperation legal agreement. We will conduct strict security monitoring on the software tool development kit (SDK) and application program interface (API) used by the partners to obtain information to protect data security.
- We are obligated to keep your information confidential and will not sell or sell any of your information, except in the following cases:
Sharing under statutory circumstances:
We may share your personal information externally in accordance with laws and regulations, litigation, dispute resolution needs, or in accordance with the requirements of administrative and judicial organs in accordance with the law.
with explicit consent : After obtaining your explicit consent, we will share your personal information with other parties.
To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect the interests, property or safety of us and our users or the public from damage.
Sharing with affiliated companies: In
Sharing with authorized partners: To
- Currently, our authorization information includes the following:
Realize the shared information of the function or service
When you use the functions provided by our affiliates or third parties in our products or services, or when software service providers, smart device providers, and system service providers cooperate with us to provide services for you, we will implement The information necessary for the business is shared with these related parties and third parties for comprehensive statistics and algorithmic analysis of characteristics and preferences to form an indirect population profile to recommend, display or push information that may be of interest to you, or Push commercial advertisements that are more suitable for you.
Geographic location services: When you use geographic location-related services, we will share device location information with location service providers through SDK or related technologies so that you can reflect location results, including:
IP information, GPS information, WLAN access Entry point and base station sensor information.
GPS information is personally sensitive information, and refusal to provide it will only affect the geographic location service function, but does not affect the normal use of other functions.
Realize advertising-related shared information
We may cooperate with third-party advertising partners to provide you with advertising services. Our partners include but are not limited to Tencent, etc. Our partners may collect hardware and software information, such as IP address, device ID and type, advertising ID, device language, operating system, time zone, location information, and identifiers associated with cookies or other technologies that may uniquely identify your device symbol.
The collection and processing of information by the aforementioned partners abide by their own privacy clauses and do not apply to this policy.
To protect your legitimate rights and interests, if you find that there is a risk, it is recommended that you immediately terminate the relevant operation and get in touch with us in time.
Advertisement push: We may share information with partners who entrust us to promote and advertise.
We will not share the information (name, ID number) used to identify your personal identity, and will only provide these partners that cannot identify you personally. The indirect portrait label of the identity and the de-identified or anonymized information
to help them increase the effective reach of advertisements without identifying your personal identity.
Advertising statistics: We may share analysis and de-identification statistical information with our business service providers, suppliers and other partners. This information is difficult to associate with your identity information. This information will help us analyze and measure the performance of advertising and related services. Effectiveness.
Realize the shared information of security and analysis statistics
Safe use: We attach great importance to the security of accounts and services. In order to protect the security of your and other users’ accounts and property, and to protect you and our legitimate rights and interests from illegal infringements,
we and our affiliates or service providers may share necessary Device information, account and log information.
Analyze product usage: In order to analyze the usage of our services and improve user experience, we
will share statistical data on product usage (crash, crash) with related parties or third parties,
which are difficult to combine with other information to identify you Personal identity.
Third party service
We may link to social media or other services (including websites or other forms of services) provided by third parties. include:
Such third-party social media or other services are operated by the relevant third party. Your use of such third-party social media services or other services (including any information you provide to such third parties) is subject to the third party’s own terms of service and information protection statement (not this policy). You need to be careful Read its terms. This policy only applies to the personal information we collect, and does not apply to any third-party services or third-party information usage rules. If you find that these third-party social media or other services are at risk, it is recommended that you terminate the relevant operations to protect your legitimate rights and interests.
You can use the "Share" button to share certain content to a third-party service, or you can use a third-party service to log in to your account. These functions may collect your information (including your log information), and may install COOKIES on your computer to operate the above functions normally;
We provide you with links through advertisements or other methods of our services so that you can link to third-party services or websites;
Other access to third-party services. For example, in order to achieve the purpose stated in this policy, we may access third-party SDK services and share some of your personal information collected by us in accordance with this policy with these third parties in order to provide better customer service and User experience (see attachment: third-party SDK directory for access).
- We will not transfer your personal information to any other third parties unless we have your explicit consent.
- We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. When we publicly disclose your personal information, we will adopt security protection measures that comply with industry standards.
- We will disclose the relevant account information when we make announcements on penalties for illegal accounts and fraudulent acts.
- We will publicly disclose information related to the incident after public welfare projects such as "tracing people" and "fleeing chasing" are in compliance with laws and regulations and clearly authorized. When the incident is over, we will promptly delete the personal information that has been disclosed.
(4) Personal information exempted from obtaining consent for sharing, transfer, and public disclosure in accordance with the law
Please understand that in the following situations, in accordance with laws, regulations and national standards, we do not need your authorization to share, transfer, and publicly disclose your personal information:
- Related to national security and national defense security;
- Related to public safety, public health, and major public interests;
- Related to criminal investigation, prosecution, trial, and execution of judgments;
- To protect your or other individuals’ life, property, and other major legal rights, but it is difficult to obtain your consent;
- Other situations that safeguard the public interest, for example, your credit evaluation information needs to be disclosed/shared;
- Your personal information disclosed to the public on your own;
- Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels. However, unless you explicitly refuse or process the information that infringes your major interests.
According to laws and regulations, if personal information that has been de-identified is shared, transferred, and publicly disclosed, and it is ensured that the data recipient cannot recover and re-identify the subject of personal information, we will not need to notify you and obtain information about the processing of such data. Your consent.
4. How do we save and protect your personal information
(1) Storage of personal information
Storage period: We only retain your personal information for the shortest period necessary for the purpose of providing this product and service. After the necessary period is exceeded, we will delete or anonymize your personal information, but laws and regulations have otherwise Except as specified.
- Storage area: We store your personal information collected and generated in the course of domestic operations in accordance with the provisions of laws and regulations in the People's Republic of China. At present, we will not transfer the above-mentioned information overseas. If we transfer overseas, we will follow relevant national regulations or seek your consent.
(2) Personal information protection measures
We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being improperly used or accessed without authorization, Public disclosure, use, modification, damage, loss or leakage.
We will use encryption technology, anonymization processing and related reasonable and feasible means that are no less than that of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.
We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner.
Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious methods that may exist, in the Internet industry, even if you do your best to strengthen security measures, It is also impossible to always guarantee the 100% security of the information. We will try our best to ensure the security of the personal information you provide to us. You know and understand that the system and communication network used by you to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing your account password and related personal information to others.
We will formulate emergency response plans, and immediately activate emergency plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage or loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can take precautions on your own And suggestions to reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the event through push notifications, emails, letters, short messages and related forms. When it is difficult to inform you one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
Special reminder: Once you leave this product and/or related services, browse or use other websites, services and content resources, we will not have the ability and direct obligation to protect your software and website submissions other than this product and/or related services Any personal information, no matter whether you log in, browse or use the above software, the website is based on the link or guidance of this product.
5. How do you manage your personal information
(1) Access and correct your personal information
(2) Change the scope of your authorization or withdraw your authorization
You can change the scope of your authorization to continue to collect personal information or withdraw your authorization by deleting information, turning off device functions, and setting privacy settings in our website or software. You can also withdraw all our authorization to continue to collect your personal information by canceling your account.
How to change or revoke the permission setting,
you can turn off the permission function in the operating system of the device itself.
You understand that after you perform the above operations, we will no longer be able to provide you with services corresponding to the withdrawal of your consent or authorization, but it will not affect the personal information processing that has been carried out based on your authorization.
You understand that each business function requires some basic personal information to be completed.
After you withdraw your consent or authorization, we cannot continue to provide you with services corresponding to the withdrawal of your consent or authorization, and will no longer process your corresponding personal information.
Your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.
(3) Account cancellation
You can directly apply for cancellation of your account in our products. You can complete the account cancellation through the mobile APP access settings; after you cancel your account, we will stop providing you with products and/or services, and according to your requirements, unless otherwise provided by laws and regulations, we will delete your personal information Or anonymize it.
(4) Stop operation to inform you
If we cease operations, we will promptly stop the collection of your personal information, notify you of the suspension of operations in the form of one-by-one delivery or announcement, and delete or anonymize the personal information we hold.
(5) Respond to your request
Six, minor clauses
(1) Consent of the guardian
We protect the personal information of minors in accordance with the relevant national laws and regulations. We will only collect, use, store, share, transfer or disclose the personal information of minors when permitted by law, parents or other guardians, or necessary to protect minors. Personal information of adults; if we find that we have collected personal information of minors without obtaining verifiable parental consent in advance, we will try to delete the relevant information as soon as possible.
(2) Special protection for children
If we find that we have collected personal information of minors without the prior consent of a verifiable parent or legal guardian, we will try to delete the relevant data as soon as possible.
(3) Prevent addiction
We attach great importance to the protection of minors’ personal information, and continue to explore updated ways of protecting minors’ personal information.
We will actively follow the requirements of the national anti-addiction policy to protect the legitimate rights and interests of minors by enabling the anti-addiction system.
We will determine whether the real-name information of the relevant account is a minor through the verification of the real-name identity and other information, and then decide whether to include this account in the anti-addiction system. In addition, we will collect your login time, game duration and other information, and guide minors to play reasonably by automatically interfering and restricting minors’ game time at the system level and enabling mandatory offline functions. After consumption, try to contact their guardian for reminder, confirmation and processing to help minors to surf the Internet healthily.
If you are the legal guardian of a minor, please pay attention to whether the minor under your supervision uses our services or provides personal information after obtaining your authorization. If you have any questions about the personal information of the minors under your guardianship, please contact us through the contact information in this agreement.
Special note: The anti-addiction system is only applicable when the product is recognized as a game product and is connected to the anti-addiction system.
If you continue to use our services, you agree to accept and be bound by this revised policy.
8. Dispute Resolution
The establishment, effectiveness, performance, interpretation and dispute resolution of the policies of this agreement shall be governed by the laws of the mainland of the People's Republic of China.
If any dispute or dispute arises between you and us due to the policies of this agreement, it shall first be settled through friendly negotiation; if the negotiation fails, you agree to submit the dispute or dispute to the jurisdiction of the people’s court where the company is located.
Nine, contact us
Contact feedback: If you have complaints, suggestions, or questions about personal information protection, you can send the problem to email@example.com, we will check and verify your user identity and feedback you within 15 working days Complaints and reports.
This product is provided by Sichuan Super Hornworm Technology Co., Ltd. and its affiliates to provide product operations and services.
Attachment: Explanation of terms
Personal information (from GB/T 35273-2020 "Information Security Technology Personal Information Security Regulations") is recorded electronically or in other ways that can identify the identity of a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.
Personal sensitive information (from GB/T 35273-2020 "Information Security Technology Personal Information Security Regulations"): Once leaked, illegally provided or abused may endanger the safety of people and property, easily lead to personal reputation, physical and mental health damage or discrimination Personal information such as treatment.
Device: Refers to devices that can be used to access our products and/or services, such as desktop computers, laptops, tablets, or smartphones.
SSL: SSL (Secure Socket Layer), also known as the secure socket layer, is a security protocol implemented on the transmission communication protocol (TCP/IP). SSL supports various types of networks and provides three basic security services at the same time, all of which use public key and symmetric key technologies to achieve the effect of information confidentiality.
Cookie: A cookie is a small file containing a string of characters, which is sent and stored in your computer, mobile device or other device (usually encrypted) when you log in and use a website or other network content.
De-identification/anonymization: refers to the process of technical processing of personal information so that the subject of personal information cannot be identified without additional information, and the processed information cannot be restored.
Server log: Under normal circumstances, our server will automatically record the web page requests you make when you visit the website. These "server logs" usually include your web request, internet protocol address, browser type, browser language, date and time of the request, and one or more cookies that can uniquely identify your browser.
Affiliated companies refer to companies and institutions that control us, are under our control, or are under common control with us now and in the future. Control refers to the ability to directly or indirectly influence the management/operation of a controlled object through ownership, voting shares, contracts, actual operating associations, or other legally recognized methods.
Attachment: Permission list
In order to ensure the realization of the functions of this product and the purpose of safe and stable operation, we may apply for or use the relevant permissions of the operating system;
In order to protect your right to know, we use the following list to display the relevant operating system permissions that the product may apply for and use. You can manage the relevant permissions according to your actual needs;
According to product upgrades, the types and purposes of application and use permissions may change. We will adjust the list according to these changes in a timely manner to ensure that you are informed about the application and use of permissions in a timely manner;
Please be aware that we may also use third-party SDKs for the functions and security needs of our business and products, and these third parties may also apply for or use relevant operating system permissions;
In the process of using the product, you may use H5 pages or small programs developed by third parties. These third-party plug-ins or small programs may also apply for or use relevant operating system permissions as necessary for business functions.
【List of Permissions】
Attachment: Third-party SDK directory
In order to ensure the implementation of relevant functions of this application and the safe and stable operation of the application, we may access the software development kit (SDK) provided by a third party to implement relevant functions. The relevant third-party SDKs we access are listed in the catalog. Please note that third-party SDKs may have some changes in data processing types due to their version upgrades, policy adjustments and other reasons. Please refer to the official instructions published by them. The relevant third-party SDKs we have accessed are:
Purpose of use: statistical analysis, improvement of product quality
Obtain information: location authority, network authority, and obtain your device information and status, network status after your consent.
Purpose of use: remind users to upgrade the version, analyze crash logs, and improve product stability
Obtain information: device status permissions, network permissions, system operation log permissions, and obtain your device information and status, network status and product operation logs with your consent.
Purpose of use: personalized recommendations, display ads
Obtain information: location authority, network authority, and obtain your device information and status, network status after your consent.
Purpose of use: Provide user-interested video content
Obtain information: network permissions, read and write permissions, rough and precise location permissions, and obtain your device information and status, and location information with your consent.
Purpose of use: auxiliary development tool
Access to information: location permissions, network permissions, storage permissions, application installation permissions
Purpose of use: data analysis, auxiliary operation
Obtain information: device manufacturer and identification information, device application installation list, and obtain device information after your consent
Purpose of use: data analysis, sharing, image processing, advertising, auxiliary development
Obtaining information: equipment manufacturer and identification information, equipment application installation list
Purpose of Use: Huawei Advertising Service
Obtain information: location authority, network authority, and obtain your device information and status after your consent.
Purpose of use: personalized recommendations, display ads
Obtain information: device access permissions, location permissions, network permissions, and obtain device brand, model, software version, geographic location, network connection information with your consent
Today's headline ad
Purpose of use: Toutiao advertising service
Obtain information: device access permissions, location permissions, network permissions, and obtain device brand, model, software version, geographic location, and network connection information with your consent.
Purpose of use: life service, advertising push
Obtain information: device status authority, network authority, operation log, and obtain device brand, model, software version, network connection information, operation log with your consent
Speaking of SDK
Purpose of use: Shushu SDK
Obtain information: device access permissions, network permissions, wifi status, and obtain device brand, model, software version, network connection information with your consent. Shushuo SDK will involve the related capabilities of iFLYTEK AI Marketing Cloud. After your consent, obtain storage device permissions, location permissions, current application information, and recording permissions required for voice interactive advertisements.
Attachment: Declaration of Children's Information Protection
Special instructions for child guardians:
If you are the guardian of child users, please read carefully and choose whether to agree to this statement. We hope to ask you to work with us to protect children’s personal information, educate and guide children to enhance their awareness and ability in personal information protection, and guide, remind and require them not to provide any network product and service providers without your consent. Personal information.
Special instructions for children:
If you are a minor under the age of 14, you need to read this statement carefully with your guardian, and after obtaining your guardian's consent, use our products, services or provide us with information.
We remind you that the important clauses in this statement that are closely related to the rights and interests of you and the children under your guardianship (possibly), we have used bold fonts to remind you specifically, please focus on reviewing them.
If you have any questions or requests for rights and other personal information related matters in the process of reading this statement, we have provided you with contact information, and we will answer you as soon as possible.
1. What information do we collect
We strictly abide by laws and regulations and agreements with users, and collect the following personal information of you and the children under your supervision according to the specific circumstances of the user's choice of products or services.
For our products and services or certain functional sections of products and services specifically for children under the age of 14, or require users to enter
birthday, age information and other products or services that can identify the user’s age,
such as registering or using such products or services, We will require users to fill in
personal birthday information
to identify whether the user is a child under the age of 14, and in accordance with laws and regulations, after obtaining the consent of the guardian, the children are allowed to continue to use related products or services.
When we identify the user as a child under the age of 14 based on the above information provided by the user,
we will collect your contact information, including your mobile phone number and email address,
and use this information to contact you to verify your relationship with the child under your supervision. Guardianship. We may also associate your account with a child account based on the specific plan of the product or service to verify the guardianship relationship and obtain your consent, so as to protect the personal information rights of you and the children under your guardianship. In some products or services that involve transactions,
we may request to collect and bind your bank card-related information so that you can know and manage the transaction behavior of child users. If the product or service involves uploading avatars and other functions, we strongly recommend that you instruct children not to upload real portrait photos and other information when using our products or services.
If we need to collect the personal information of you or the children under your custody beyond the scope of the above collection, we will inform you again and obtain your consent.
Please understand that you can choose whether to fill in or provide us with specific information, but if you do not fill in or provide some specific information, it may cause our products or services to fail to operate normally, or to fail to achieve the services we intend to achieve As a result, you and the children under your supervision may not be able to use our products, services or related specific business functions normally.
2. How we use this information
We strictly abide by laws and regulations and agreements with users, and use the collected information about you and the children under your supervision for the following purposes:
Verify the identity of children and guardians
Provide necessary products or services, specific functions of products or services
For the purpose of optimizing products or services, security assurance, and service investigation
If we need to use the personal information of you or the children under your custody beyond the above-mentioned purposes, we will inform you again and obtain your consent.
3. Circumstances for sharing, transferring, and disclosing children's personal information
We comply with laws and regulations and strictly restrict the sharing, transfer, and disclosure of children's personal information. Under normal circumstances, we will not share children's personal information with third parties. We may share children’s personal information with third parties only with the prior consent of the guardian.
Part of the child’s personal information (such as the child’s user name, account number, password, and the transaction content of the child’s user in some of our products and services, etc.)
Share with the guardian, the guardian can access and manage related personal information.
For the purpose of external processing only, we may cooperate with
third-party partners (third-party service providers, contractors, agents, application developers, etc.,
for example, communication service providers that send emails or push notifications on our behalf, for Our map service providers that provide location services) (they may not be located in your jurisdiction) share children’s personal information and let them process the above information for us in accordance with our instructions, privacy policies, and related confidentiality and security policies.
If we entrust a third party to process children’s personal information, we will conduct a security assessment of the entrusted party and the entrusted behavior, etc., and sign an entrustment agreement, requiring that the entrusted party’s processing behavior shall not exceed our authorization scope. We entrust a third party to process the children’s personal The information is mainly used for the following purposes:
If we share your and your children's information with the above-mentioned third parties, we will conduct a security assessment and use
encryption, anonymization, and de-identification processing
to ensure the safety of your and your children's information.
Provide our services to children;
To achieve the purposes described in the section "How do we use this information";
Understand, maintain and improve our services.
With the continuous development of our business, when mergers, acquisitions, asset transfers and other transactions lead to the sharing of your and children’s personal information with third parties, we will inform you of the situation through push notifications, announcements, etc., in accordance with laws, regulations, and non-compliance. Continue to protect or require new managers to continue to protect your and children’s personal information below the standards required by this statement.
We may use the collected children's information for big data analysis after anonymization, such as forming heat maps and insight reports that do not contain any personal information.
We may publicly disclose and share with our partners information that does not contain identification content after statistical processing, so as to understand how users use our services or to let the public understand the general usage trends of our services.
Under normal circumstances, we prohibit the disclosure of children's personal information,
but we may disclose children's personal information for the following purposes:
Comply with applicable laws and regulations and other relevant regulations;
Comply with court judgments, rulings or other legal procedures;
Comply with the requirements of relevant government agencies or other legally authorized organizations;
We have reason to believe that we need to comply with laws and regulations and other relevant regulations;
It is reasonable and necessary for the purpose of implementing the relevant service agreement or this statement, safeguarding the public interest, and protecting the personal and property safety of our customers, us or our affiliates, other users or employees, or other legitimate rights and interests.
4. Store children's personal information
When our products or services cease to operate or the storage period of your and children’s personal information expires, we will notify you and the children in the form of push notifications, announcements, etc., and delete or anonymize them within a reasonable period of time Personal information about you and your children.
5. Manage children's personal information
During the use of this product or service by children, in order for you and children to access, correct, and delete relevant personal information more conveniently
we have provided you with corresponding operating settings in the product design, and you can also use the contact information provided by us
To feedback and consult relevant information. We will contact you promptly after verifying your feedback. Please understand that during the verification process, we may need you to provide
personal information such as the child's account number, child's date of birth, contact information, etc.,
so that we can continue to respond to your needs after completing the identity verification and problem verification.
Access to children’s personal information
You and the children under your supervision can view the personal information provided or generated by child users during the use of our products or services,
including but not limited to user names, passwords, avatars, nicknames, etc.
Correcting children's personal information
When you and the children under your supervision find that the children's personal information we collect, use, and process is wrong, you can contact us to make corrections. We will take timely measures to correct the problem after completing the identity verification and verification.
Deleting children's personal information
If the following circumstances exist, you and the children under your supervision can request us to delete the children's personal information collected, used and processed. We will promptly take measures to delete it after completing the identity verification and verifying the problem.
If we violate the provisions of laws, administrative regulations or the agreement between the parties to collect, store, use, transfer, and disclose children's personal information;
If we collect, store, use, transfer, and disclose children's personal information beyond the scope of the purpose or the necessary period;
You withdraw your consent;
You or a child under your supervision terminates the use of products or services by way of cancellation or other means.
However, please note that if you and the custodial child request us to delete the personal information of a particular child, the child user may not be able to continue to use our products and services or certain specific business functions of the products and services.
If you find that your child's personal information has been collected without your prior consent, please contact us in time and we will try to delete the relevant data as soon as possible.
When children can manage their own accounts
after the age of 14 years of child custody, the right to manage their own accounts.
If a child user chooses to manage product accounts on their own, you will no longer be able to access or control their accounts. When the warded child has the right to manage the account of this product by himself, we will notify you and the warded child.
Sixth, the application of this statement
This statement only applies to our products or services specifically for children under 14 years of age, products or services with functional sections specifically for children under 14 years of age, or products or services that require users to enter birthdays, age information, and other products or services that can identify the user's age ,