Privacy

Privacy and Security Statement

 

This platform (hereinafter referred to as "we") is well aware of the importance of personal information to you, and will do its best to protect your personal information safely and reliably. We are committed to maintaining your trust in us, abiding by the principles stipulated in the "Civil Code of the People's Republic of China", "Cybersecurity Law of the People's Republic of China", "Information Security Technology Personal Information Security Specification" (GB/T 35273-2020) and other relevant laws, regulations and technical specifications, and protecting your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum necessity, the principle of openness and transparency, the principle of ensuring security, the principle of subject participation, etc. At the same time, we promise to take corresponding security protection measures to protect your personal information in accordance with the mature security standards of the industry. Please read and understand this Privacy Policy carefully before using our products (or services). We will collect, process and disclose your information in accordance with this policy.

 

Before you start using our products and services, please be sure to read and understand this policy carefully, especially the terms marked in bold/bold underline [Platform Adjustment According to Actual Conditions], to ensure that you fully understand and agree before starting to use. We try to explain the professional terms involved in this policy in a concise and popular way so that you can understand. If you have any questions, comments, or suggestions about the content of this policy, you can contact us through the various contact methods provided in this policy.

 

1.1 Personal information

 

Refers to various information recorded electronically or otherwise that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. Such as name, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, account password, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, etc.

 

1.2 Personal sensitive information

 

Including ID number, personal biometric information, bank account, property information, whereabouts, transaction information, personal information of children under 14 years old (inclusive), etc.

 

1.3 Deletion of personal information

 

Refers to the act of removing personal information in the system involved in realizing daily business functions so that it remains inaccessible and cannot be retrieved.

 

1.4 Business data

 

Different from personal information, it refers to the data that users of this platform upload, download, distribute, and process through the technical services of this platform using the services of this platform.

 

2. Information we may collect

 

When we provide products or services, we may collect, store, and use the following information related to individuals (or "you" for short). If you do not provide relevant information, you may not be able to register as our user or enjoy certain services we provide, or achieve the intended effects of the relevant services.

 

2.1 Not related to personal identity

 

When you use the products or services of this platform, we may collect and summarize information such as the source path of users, access sequence, and stay time, such as recording the source path and browser software of each user who uses the products or services of this platform.

 

2.2 Related to Personal Identity

 

When you use the products or services of this platform, we may collect and summarize or ask you to provide information about your personal identity, such as:

 

1) Personal identity proof (including ID card, social security card, etc.);

 

2) Birthday, place of origin, gender, age, hobbies, personal phone number, address, work information, avatar;

 

3) Network identity information (including system account, IP address, email address and passwords, passwords, password protection answers, user personal digital certificates, etc. related to the above);

 

4) Personal health and physiological information;

 

5) Personal property information (bank account, identification information, coupons, redemption codes, etc.);

 

6) Communication information (text messages, pictures, audio and video records and content

 

7) Contact information (address book);

 

8) Personal Internet browsing records and log information (including website browsing records, software usage records, click records, operation logs, etc.);

 

9) Device information (including device model, device MAC address, operating system type, device settings);

 

10) Software list unique device identification code (such as IMEI/androidID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc., describing the basic situation of personal commonly used devices);

 

11) Personal location information (including precise positioning information, longitude and latitude, etc.);

 

12) Other information collected or summarized by this platform based on the need to provide you with services.

 

III. How we collect and use your personal information

 

In order to realize the business functions of this platform, we may need to collect personal information from you. The following will list in detail the business functions of this platform and the personal information collected to realize this function. If you refuse to collect, you will not be able to use the service.

 

We will collect, store and use your personal information for the following purposes as described in this statement and policy:

 

3.1 Basic business functions

 

3.1.1 Help you become our user

 

You need to register an account so that we can provide you with services. When you register, you need to provide us with at least your mobile phone number and password, and we will verify your identity by sending a text message verification code. If you only need to use basic services such as browsing and searching, you do not need to register an account and provide the above information.

 

Your login name includes but is not limited to your mobile phone number, email account, and user name. You can complete your nickname, password, avatar, contact address, date of birth and other related information. Supplementing this "account information" will help us provide you with more personalized services.

 

When you actively cancel your account, we will make it anonymous or delete your personal information as soon as possible in accordance with the requirements of relevant laws and regulations.

 

3.2 Extended business functions

 

In order to better improve the quality of service, in addition to basic business functions, the platform also provides a number of extended business functions. Before the first use of the extended business function, we will inform you of the extended business functions provided and the necessary personal information collected through interactive interfaces or designs such as pop-ups and text instructions and obtain your consent.

 

If you do not agree to collect personal information that is necessary for the extended business function, you will not be able to use the extended business function, but this will not affect the platform's provision of basic business functions to you.

 

3.3 Third-party websites or services

 

The products or services we provide may include third-party products or services, such as positioning, statistics, etc. Some of them will be provided in the form of links to third-party websites, and some will be accessed in the form of SDKs, APIs, etc.

 

The products or services provided by third parties are operated by the relevant third parties, and your information may also be collected when you use these products or services. We will not store or access personal information collected in this way, and we are not responsible for how third parties use personal information collected from you, nor can we control its use. Our privacy policy does not apply to products or services provided by third parties linked to our services.

 

Therefore, we strongly recommend that you take the time to carefully read the privacy policy of the third party to determine whether to use this function. The corresponding third party is independently responsible for the services it provides and data security. Please negotiate with the third party to resolve disputes arising from the third-party service or its use of your information, or the third-party service violates relevant laws and regulations, or you suffer losses in the process of using the third-party service.

 

3.4 Your personal information collected indirectly

 

We may obtain your account information (avatar, nickname, contact information) authorized to be shared from a third party and bind your third-party account to your account after you agree to the statement and privacy so that you can log in directly through the third-party account and use our products and/or services. We will use your personal information in accordance with the agreement with the third party and the legitimacy of the source of personal information, subject to the relevant laws and regulations. In order to confirm the transaction status and provide you with after-sales and dispute resolution services, we will collect your transaction, payment, and logistics information related to the transaction progress through the transaction object, payment institution, logistics company, etc. selected by you based on the exchange, or share your transaction information with the above service providers.

 

You can use the products or services provided by our affiliated companies through the link entrance we provide through the same account. In order to facilitate us to provide you with one-stop services based on the associated accounts and facilitate your unified management, we will display your information or recommend information of interest to you on this platform.

 

When you use the above services through our products or services, you authorize us to receive, summarize, and analyze your personal information or transaction information from our affiliated companies that we confirm is legitimate or that you authorize and agree to provide to us based on actual business and cooperation needs.

 

If you refuse to provide the above information or refuse to authorize it, you may not be able to use the corresponding products or services of our affiliated companies or display relevant information, but it will not affect the use of the basic business functions of this platform.

 

3.5 Provide you with security

 

Please note that in order to ensure the authenticity of your account identity and provide you with better security, you can provide us with identity information such as your ID card, bind your payment account, etc. to complete real-name authentication. If you refuse to provide the above information, you may not be able to use the corresponding business functions, continue operations that may be risky, etc., but it will not affect your use of browsing, searching, and other services.

 

In order to improve the security of your use of services provided by us and our affiliates and partners, protect the personal and property safety of you or other users or the public from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, and more accurately identify violations of laws and regulations or relevant agreements of this platform, we may use or integrate your account information, transaction information, device information, relevant network logs, and information shared by our affiliates and partners with your authorization or in accordance with the law to comprehensively judge your account and transaction risks, conduct identity authentication, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

 

3.6 Other Uses

 

When we use information for other purposes not specified in this statement and policy, or use information collected for specific purposes for other purposes, we will seek your consent in advance.

 

3.7 Exceptions to obtaining authorization and consent

 

According to relevant laws and regulations, your authorization and consent is not required for collecting your personal information in the following circumstances:

 

1) Directly related to national security and national defense security;

 

2) Directly related to public security, public health, and major public interests;

 

3) Directly related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial, and execution of judgments;

 

4) For the purpose of safeguarding your or other individuals’ life, property, reputation, and other major legitimate rights and interests, but it is difficult to obtain your consent;

 

5) The collected personal information is disclosed to the public by you on your own;

 

6) Personal information is collected from legally disclosed information, such as legal news reports, government information disclosure, and other channels;

 

7) It is necessary to sign and perform relevant contracts or other written documents according to your requirements;

 

8) It is necessary to maintain the safe and stable operation of the products and/or services provided, such as discovering and handling product and/or service failures;

 

9) It is related to our performance of obligations stipulated by laws and regulations;

 

10) Other circumstances stipulated by laws and regulations.

 

Please be aware that, in accordance with applicable laws, if we take technical measures and other necessary measures to process personal information so that the data recipient cannot re-identify a specific individual and cannot restore it, or we may conduct de-identified research, statistical analysis and prediction on the collected information to improve the content and layout of the platform, provide product or service support for business decisions, and improve our products and services (including the use of anonymous data for machine learning or model algorithm training), then the use of such processed data does not require additional notification to you and your consent.

 

If we stop operating the products or services of this platform, we will promptly stop the activities of continuing to collect your personal information, notify you of the suspension of operation in the form of delivery or announcement, and delete or anonymize the personal information held. If it involves children's personal information, we will promptly inform the child's guardian of the suspension of operation.

 

3.8 Device Permission Calling

 

In order to provide you with convenient and high-quality services, we may call some permissions of your device. The following is a list of device permissions that we may call and the corresponding purpose of use. You have the right to choose to close the authorization of the following permissions at any time, but it may affect your normal use of some or all functions of our products or services.

 

Please be aware that even if you have agreed to enable the following permissions, we will only call permissions to obtain necessary personal information when you use related functions through our products or services.

 

1) Location

 

You need to authorize us to use location permissions so that we can display and push service information to you based on location. When you first open the mobile client, you will see a pop-up reminder asking you to authorize. If you refuse to authorize, you may not be able to use the information display and push functions based on geographic location normally.

 

2) Notification

 

You need to authorize us to use notification permissions so that you can use all functions based on this permission, such as payment results and other message reminders. When you first open the mobile client, you will see a pop-up reminder asking you to authorize. If you refuse to authorize, you may not be able to obtain various message reminders normally.

 

3) Wireless data

 

You need to authorize us to use wireless data permissions so that our mobile client can connect to the network and provide services to you. When you first open the mobile client, you will see a pop-up reminder asking you to authorize. If you refuse to authorize, you may not be able to use the mobile client normally.

 

4) WLAN

 

You need to authorize us to use WLAN permissions so that our mobile client can connect to the network and provide services to you. When you first open the mobile client, you will see a pop-up window asking you to authorize. If you refuse to authorize, you may not be able to use the mobile client normally.

 

5) Storage

 

You need to authorize us to use storage permissions so that our mobile client can write and store user information and logs. When you first open the mobile client, you will see a pop-up window asking you to authorize. If you refuse to authorize, you may not be able to use the mobile client normally.

 

IV. How we use cookies and similar technologies

 

4.1 Use of cookies

 

To ensure the normal operation of the website, provide you with an easier access experience, and recommend content that may interest you, we will store cookies, Flash cookies, or other cookies provided by the browser (or associated applications) on your computer or mobile device.

It usually contains identifiers, site names, and local storage of some numbers and characters (collectively referred to as "Cookies").

 

With Cookies, websites can remember your choices, provide personalized enhanced services, etc. You can manage or delete Cookies according to your preferences. For more information, please see AboutCookies.org. You can clear all Cookies saved on your computer, and most web browsers have the function of blocking Cookies. But if you do this, you need to change the user settings every time you visit this platform. For more information on how to change browser settings, please visit the relevant settings page of the browser you use.

 

4.2 Use of Cookie Similar Technologies

 

In addition to Cookies, we will also use other similar technologies such as web beacons, pixel tags, ETags, etc. on the website.

 

For example, the email we send to you may contain an address link to the content of our website. If you click on the link, we will track this click to help us understand your product or service preferences so that we can actively improve our customer service experience. Web beacons are usually transparent images embedded in a website or email. With the help of pixel tags in emails, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

 

ETag (entity tag) is an HTTP protocol header transmitted behind the scenes between the Internet browser and the Internet server, which can replace cookies. ETag can help us avoid unnecessary server load, improve service efficiency, save resources and energy, and at the same time, we may record your identity through ETag so that we can better understand and improve our products or services. Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data-clearing operations in the browser settings function. But please note that if you disable ETag, you may not be able to enjoy a relatively better product or service experience.

 

(III) Use of SDK

 

In order to ensure the stable operation and function implementation of our client and enable you to use and enjoy more services and functions, our applications will embed the SDK or other similar applications of authorized partners.

 

We will conduct strict security tests on the application program interface (API) and software tool development kit (SDK) that authorized partners use to obtain relevant information, and agree with the authorized partners on strict data protection measures to process personal information in accordance with this policy and any other relevant confidentiality and security measures.

 

5. How we share, transfer, and publicly disclose your personal information

 

5.1 Sharing

 

We will not share your personal information with any company, organization, or individual other than the service provider of this platform, but we may provide personal information to third parties in the following exceptions. When we legally share your personal information with a third party, we will use encryption and other means to protect your information security and conduct a personal information security impact assessment on the sharing behavior. For the companies and organizations with whom we share personal information, we will conduct a reasonable review of their data security environment and sign a strict data processing agreement, requiring the third party to take adequate protection measures for your information and strictly comply with relevant laws, regulations, and regulatory requirements.

 

5.1.1 Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

 

5.1.2 Sharing under legal circumstances: We may share your personal information externally due to the performance of obligations stipulated by laws and regulations, such as litigation, dispute resolution, or requests made by administrative and judicial authorities in accordance with laws and regulations.

 

5.1.3 We hope you understand that we cannot provide you with all the services listed in this policy alone. In many cases, we also need to provide you with these services together with our affiliates and other service providers. Therefore, in order to meet the needs of providing you with the above services, we need to provide some of your personal information to our affiliates, suppliers, partners and other authorized partners by sharing or entrusting them to process. We will take necessary technical and management measures to protect the security of your personal information as much as possible.

 

Sharing with affiliates: In order to facilitate us to provide you with services based on associated accounts, recommend information that may be of interest to you, or protect the personal and property safety of affiliates of this platform or other users or the public from infringement, your personal information may be shared with our affiliates. We will only share necessary personal information (such as sharing your necessary account information with affiliates to facilitate your use of our affiliates' products or services through the same account), and subject to the purposes stated in this Privacy Policy. If we share your personal sensitive information or an affiliate changes the purpose of using and processing personal information, we will ask for your authorization again.

 

Sharing with authorized partners: For the purposes of this statement and privacy policy only, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. For example, when you purchase our products, we must share your personal information with logistics service providers to arrange delivery or arrange for partners to provide services. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services. We will restrict authorized partners through agreements and other means, and they can only access the information required to perform their duties and have no right to use the shared personal information for any other purpose. If you refuse our partners to collect personal information necessary for providing services when providing services, you may not be able to use the third-party service on this platform.

 

Currently, our authorized partners include the following types:

 

1) Authorized partners for advertising and analysis services. Unless you have your permission, we will not share your personally identifiable information (information that can identify you, such as your name or email address, through which you can be contacted or identified) with partners who provide advertising and analysis services. For advertising partners, we will provide these partners with information about their advertising coverage and effectiveness, but not your personally identifiable information, or we will anonymize this information so that it does not identify you; for partners who analyze data, in order to better analyze the use of users of this platform, we may provide them with data such as the number, regional distribution, and activity of users of this platform, but we will only provide these partners with statistical information that cannot identify individuals. For example, only after advertisers agree to abide by our advertising guidelines, we may tell advertisers how effective their ads are, or how many people have seen their ads or installed apps after seeing them, or provide these partners with demographic information that cannot identify individuals (such as "25-year-old male in Beijing who likes software development") to help them understand their audience or customers.

 

2) Suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, payment convenience, or conducting academic research and surveys.

 

We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, statements and privacy and any other relevant confidentiality and security measures.

 

5.2 Transfer

 

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

 

1) Transfer with explicit consent: We will transfer your personal information to other parties after obtaining your explicit consent;

 

2) When the service provider of this platform undergoes a merger, acquisition or bankruptcy liquidation, or other mergers, acquisition or bankruptcy liquidation if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by the statement and privacy, otherwise, we will require the company or organization to re-ask your authorization consent.

 

5.3 Public Disclosure

 

We will not disclose your personal information publicly, except in the following circumstances:

 

1) We may disclose your personal information publicly with your explicit consent or based on your active choice;

 

2) If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of this platform, or to protect the personal and property safety of users of this platform and its affiliates or the public from infringement, we may disclose your personal information in accordance with laws and regulations or the relevant agreement rules of this platform, including relevant violations and measures taken by this platform against you. For example, if you seriously violate the user agreement, we may disclose your identity information, contact information and penalties publicly or share them with partners.

 

3) Based on the provisions of laws and regulations, litigation, dispute resolution needs, or requests made by administrative and judicial authorities in accordance with the law, we may disclose your personal information to the competent authorities. However, we guarantee that when the above situation occurs, we will require the disclosure requesting party to produce corresponding valid legal documents and take security protection measures that comply with laws and industry standards for the disclosed information.

 

5.4 Exceptions to prior authorization and consent when sharing, transferring, or publicly disclosing personal information

 

In the following circumstances, sharing, transferring, or publicly disclosing your personal information does not require your prior authorization and consent:

 

1) Directly related to national security and national defense security;

 

2) Directly related to public security, public health, or major public interests;

 

3) Directly related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial, and execution of judgments;

 

4) For the purpose of safeguarding your or other individuals’ major legitimate rights and interests such as life, property, and reputation, but it is difficult to obtain your consent;

 

5) Personal information that you disclose to the public on your own;

 

6) Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure, and other channels;

 

Please be aware that, according to legal provisions, sharing and transferring de-identified personal information and ensuring that the data recipient cannot restore and re-identify the subject of the personal information does not constitute external sharing, transfer, or public disclosure of personal information, and the preservation and processing of such data will not require separate notification to you and your consent.

 

VI. User Business Data and Public Information

 

Different from your personal information, this platform will process user business data and public information as follows:

 

6.1 User Business Data

 

1) The data you process, store, upload, download, distribute and process in other ways through the services provided by this platform are all your user business data, and you fully own your user business data. As a service provider, this platform will only strictly follow your instructions to process your business data, and will not make any unauthorized use or disclosure of your business data except in accordance with the agreement with you or the implementation of clear laws and regulations.

 

2) You are responsible for the source and content of your user business data. This platform reminds you to carefully judge the legality of the source and content of the data. You shall bear all the consequences and responsibilities caused by the violation of laws, regulations, departmental regulations or national policies by your user business data content.

 

3) This platform abides by its security commitment to users and protects the data stored by users in the data center of this platform in accordance with applicable laws.

 

6.2 Public Information

 

1) Public information refers to any information you share publicly, and anyone can view or access this information during the use and non-use of this platform service. For example, the comments you publicly posted.

 

2) In order to use the products or services of this platform, there may be information that you must share publicly.

 

3) When using the products or services of this platform, you will inevitably need to disclose your personal information, such as contact information or postal address. Please properly protect your personal information and provide it to others only when necessary. You can also establish connections and share with each other through our services. When you create communication, transactions or sharing through our services, you can independently choose the object of communication, transaction or sharing, as a third party that can see your contact information, communication information or sharing content and other related information. If you find that your personal information has been leaked, especially if your account or password has been leaked, please contact us immediately according to the contact information provided in this policy so that this platform can take corresponding measures.

 

VII. How we protect your personal information

 

[Modify according to actual situation]

 

7.1 We have taken reasonable and feasible security protection measures that meet industry standards to protect the security of the personal information you provide and prevent personal information from being unauthorized access, public disclosure, use, modification, damage or loss. For example, when data (such as payment information) is exchanged between your browser and the server, it is protected by https encryption; we also provide https secure browsing for websites related to this platform; we will use encryption technology and firewalls to improve the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms, the database is only accessible through the intranet, and we will try our best to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information. However, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. You need to understand that the system and communication network you use to access our services may have problems due to factors beyond our control.

 

7.2 We have an industry-leading data security management system that focuses on data and revolves around the data life cycle, and improves the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology.

 

7.3 We will take reasonable and feasible measures to try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes described in this statement and privacy policy, unless the retention period needs to be extended or is permitted by law.

 

7.4 The Internet is not an absolutely safe environment. We strongly recommend that you do not send personal information using communication methods not recommended by this platform. You can establish connections and share with each other through our services. When you create communication, transactions or sharing through our services, you can choose the object of communication, transaction or sharing on your own, as a third party who can see your transaction content, contact information, communication information or sharing content and other related information.

 

Please properly protect your personal information and provide it to others only when necessary. If you find that your personal information, especially your account or password, has been leaked, please contact us immediately so that we can take appropriate measures according to your application.

 

Please note that the information you voluntarily share or even publicly share when using our services may involve your or others' personal information or even personal sensitive information. Please consider more carefully whether to share or even publicly share relevant information when using our services. If you need to delete your personal information, you can contact us and we will help you delete the content you specify.

 

Please use a complex password to help us ensure the security of your account. We will do our best to ensure the security of any information you send to us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal liability.

 

7.5 We will update and disclose security risks, personal information security impact assessment reports and other related content from time to time, and you can obtain them through the announcement of this platform.

 

7.6 After the unfortunate occurrence of a personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, your suggestions for self-prevention and risk reduction, and your remedial measures. We will inform you of the relevant circumstances of the incident by email, letter, phone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take reasonable and effective measures to issue an announcement.

 

7.7 We will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

 

VIII. How we handle children's personal information

 

Our products, websites, and services are mainly for adults, and we presume that you have the corresponding civil capacity. Without the consent of your parents or guardians, minors shall not create their own user accounts. If you are a minor, it is recommended that you ask your parents or guardians to read this privacy policy carefully and use our services or provide us with information with the consent of your parents or guardians.

 

For the collection of minors' personal information by using our products or services with the consent of parents or guardians, we will only use, share, transfer or disclose this information when permitted by laws and regulations, with the explicit consent of parents or guardians, or when necessary to protect minors.

 

If we find that we have collected minors' personal information without obtaining verifiable parental consent in advance, we will delete the relevant data as soon as possible.

 

If you are the parent or other guardian of a minor, please pay attention to whether the minors under your guardianship use our services after obtaining your authorization and consent. If you have any questions about the personal information of the minors under your guardianship, please contact us through the contact information provided in this policy.

 

IX. Storage of your personal information

 

9.1 In principle, the personal information we collect and generate during our operations within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China, except in the following circumstances:

 

1) Clearly stipulated by laws and regulations;

 

2) Obtain your explicit authorization;

 

3) Your personal initiative.

 

In response to the above circumstances, we will ensure that your personal information is adequately protected in accordance with this privacy policy. We will inform you of the purpose and recipient of the data outbound transfer through pop-ups or emails, and obtain your authorization and consent. We will ensure that the data recipient has sufficient data protection capabilities to protect your personal information.

 

Because we provide products and services through resources and servers around the world, this means that, after obtaining your authorization and consent, your personal information may be transferred to or accessed from overseas jurisdictions of the country/region where you use the product or service.

 

Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your personal information is adequately protected in the People's Republic of China. For example, we will ask for your consent to the cross-border transfer of personal information, or take security measures such as de-identification before cross-border data transfer.

 

9.2 We promise that the storage time of your personal information will always be within the reasonable and necessary period. The storage period of personal information collected under the browsing function, such as browsing history and IP information, will not exceed one month. For personal information that exceeds the period, we will immediately delete or anonymize it.

 

9.3 If we cease operations due to poor management or other reasons, we will immediately stop collecting your personal information and delete the collected personal information. We will announce this situation on the website or communicate it to each user one by one through other reasonable means such as in-site letters, emails, etc.

 

X. How to update this statement and policy

 

Our privacy policy may change.

 

Without your explicit consent, we will not reduce your rights under the statement and privacy. We will publish any changes to this statement and privacy on this page.

 

For major changes, we will also provide more prominent notifications (including notifications through website announcements or even pop-up prompts).

 

The major changes referred to in this statement and privacy include but are not limited to:

 

1) Major changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way personal information is used, etc.;

 

2) Major changes in our ownership structure, organizational structure, etc. Such as changes in owners caused by business adjustments, bankruptcy and mergers and acquisitions, etc.;

 

3) Changes in the main objects of personal information sharing, transfer or public disclosure;

 

4) Major changes in your rights to participate in personal information processing and the way you exercise them;

 

5) When the responsible department, contact information and complaint channel for handling personal information security changes;

 

6) When the personal information security impact assessment report indicates a high risk.

 

We will also archive the old version of this statement and privacy for your reference.

 

XI. How to Contact Us

 

If you have any questions, comments or suggestions about this privacy policy or find that your personal information has been leaked or infringed upon your legal rights, please contact us through the following methods: (+86) 15328151424 (+86) 18380435262

 

Generally, we will respond within thirty days after receiving your questions, comments or suggestions and verifying your user identity.