Updated on April 3, 2025
Effective date: April 3, 2025
Thank you for your trust and use. In order to better protect your rights, we have updated the " Privacy Protection Agreement" in accordance with relevant laws, regulations, and technical specifications
Please carefully read and fully understand the entire text before using/continuing to use , and agree to use/continue using the entire content
Privacy Protection Agreement
's products and services include: App, website, and the web page, mobile client, WeChat official account, etc. that we will develop in the future to realize all or part of 's functions, collectively referred to as“ ”, Not applicable to services provided to you by other third parties through
When you use , we may collect and use your relevant information. We are well aware of the importance of personal information to you. Based on better demonstrating and explaining our privacy rules and your user permissions, as well as explaining how collects, uses, and stores your personal information and protects your privacy rights, we will explain in this privacy protection guide the types of personal information we collect from you and their corresponding purposes, so that you can understand the specific types of personal information we collect for specific functions, the reasons for use, and the methods of collection
Before using , please carefully read and thoroughly understand this privacy protection guide, and use related products or services after confirming full understanding and agreement. If you do not agree with any content of this privacy protection guideline, you should immediately stop using . Once you start using , it means that you have fully understood and agreed to this privacy protection guideline
1. Scope of application
This privacy protection guideline applies to all products and services on
II. Definition
-
Personal information: refers to various types of information recorded electronically or in other ways that can be used alone or in combination with other information to identify the identity of a specific natural person or reflect the activities of a specific natural person
-
Personal sensitive information: including ID number, personal biometric information, bank or other fund account information, property information, whereabouts, transaction information. Sensitive information will be highlighted in bold in this guide
-
Personal Information Deletion: Refers to the act of removing personal information from systems involved in implementing daily business functions, keeping it in a state where it cannot be retrieved or accessed
III. Basic Principles
We will follow the principles of legality, reasonableness, and necessity and collect, use, and store personal information that you voluntarily provide or generate as a result of your use of , in accordance with the purposes described in this guide. If we want to use your personal information for other purposes not specified in this guide, or use the collected information for other purposes based on specific purposes, we will inform you again and obtain your consent before use
4. How do we collect and use your personal information
(1) About Personal Information Collected and Corresponding Purposes
1.Ensure the normal operation of the product
In order to ensure the basic functions and normal services of your platform, improve and optimize our service experience, and protect the security of your account, when you use our platform's services or access the platform's website, we will collect your
device model and device identification code (includingIMEI
,IMSI
ICCID、IDFA、IDFV、GUID、OAID、SN ID、MEID、Android ID、UserAgent)、OPEN ID、Union ID、 Software list, device operating status information, system version, MCC, MNC, Mac address information (including mobile Mac address and Bluetooth Mac address), telecommunications operator, and device sensor information. If you do not authorize the platform to collect or use the aforementioned information, it may result in the platform being unable to provide you with relevant services
2.Help you register an account
-
When you register for a account, we will collect your phone number. When you use“ One click login” When providing services, with your consent, we and our partner operators will use the phone number on your device as your registration/login account and be exempt from SMS verification code verification, so that we can provide you with convenient registration/login services. If you do not wish to use“ One click login” Service, you can register/log in by obtaining a verification code. At that time, we will verify your identity by sending a SMS verification code. Based on the automatic information reading function of your phone, we will read your phone's SMS to obtain the registration verification code< Your mobile phone number is your personal information, and we collect this type of information to meet the requirements of relevant laws and regulations for online real name registration. If you do not provide this type of information, you may not be able to complete registration and basic account creation properly, and therefore may not be able to use products and their features
You can choose to further improve the account information of this product by providing us with your nickname, avatar, gender, and age for more personalized additional services. When you provide an avatar, we will request your authorization for camera and photo album permissions. If you do not agree to authorize or refuse us to obtain the above information, you will not be able to receive personalized services, but it will not affect your normal use of other functions of the product
When you log in to the product through a third-party account (such as WeChat), you need to authorize us to obtain the public information of the third-party account you use for login (such as avatar, nickname, gender, etc.), and bind the account with your product account. If you do not agree to authorize or refuse us to obtain the above information, you will not be able to log in to the product through a third-party account, but it will not affect your normal use of other functions of the product
2) When you register for a account, we will collect yourbirthday, personal information (your occupation, interests, and region), which you voluntarily input or choose. The purpose of collection/use is to facilitate your use of social functions on the platform or to obtain recommendations from platform users who match you well.. If you do not wish to provide this type of information, you can choose to skip it directly. Skipping the operation does not affect your normal use of the main functions of
3.We provide you with recharge or membership subscription services
When you make a payment for purchasing virtual props or membership services, we will record your payment method andfund accountto achieve the refund of the original path of purchase failure, the termination of continuous monthly service, and after-sales service. We will share yourorder paymentrelated information, order security related information, and other necessary information required by anti money laundering laws with third parties by embedding third-party payment software tool development kits (SDKs) in the application.. At the same time, based on maintaining payment security and tracing online transaction behavior, in accordance with relevant laws and regulations, we will record, store, and display order information to you< If you refuse to provide the above information, it will prevent you from completing platform item purchases, becoming a member, or enjoying continuous subscription services, but it will not affect your normal use of other functions of
When the amount of your recharge reaches the limit set by us, in order to fulfill the legal obligation to protect minors, you need to provide your
real name, ID number number,real name verification to verify whether you are a minor,
we will provide your real name, ID number number to our partner Shanghai Puxun Information Technology Co., Ltd., Alibaba Cloud Computing Co., Ltd., Tencent Cloud Computing (Beijing) Co., Ltd. to complete your Real name verification. If you refuse to provide it, you will not be able to continue recharging, but it will not affect your normal use of other functions of
4.Help you browse and create rooms (chat room, black room, and guild room)
You can browse user profile pages and user updates; During the browsing process, you can follow users who interest you or add them as friends for message interaction. For this purpose, we may collectdevice information (device model, unique device identifier, operating system, resolution, carrier, phone number)using , and may accessapplication list information and microphone, album, camera functionsof your mobile device to facilitate your normal use of browsing and interactive functions. In addition, during your use of this feature, we will automatically collect the information you actively edit and upload, as well as detailed information about your usage process, and save it as a network log. The log information includes but is not limited to the text information posted on your public screen, the image information you upload, your purchase and consumption records, the date and time of access, the operating system information you requested, the version number of the software, login IP information, and friend records including the people you follow and add as friends. When you enter text and voice interaction on , we will access yourdevice's microphone permission and phone permission (call status permission), so that you can have normal voice communication in the room, or stop the voice chat and microphone recording function when your phone has a call. If you refuse to provide the above information, you will not be able to use some functions of the room, but it will not affect your normal use of other functions of
5.Help you upload or publish information and videos
When you use the information upload/publishing functions such as commenting, sharing, and dynamic publishing, we will obtain corresponding permissions based on your publishing behavior and the type of content you publish. For example, when you upload or publish photos or videos, we need to obtain your album permission and external storage permission. When you upload or share pictures, we need to obtain your external storage permission. Scan and recognize local files on your phone or computer, and display them on the product interface for you to choose to share or copy. At the same time, the photos, comments, likes, audio recordings, and video information you upload will be stored on our servers because storage is necessary to achieve this function. We will store this information in an encrypted manner, and you can delete it at any time. We will not edit or organize this information or use it for purposes other than this function. However, you acknowledge and agree that this information is publicly visible to all users of . Your voluntary uploading behavior is deemed to be your agreement that all users on can browse, save, download, and forward this information< u> Please note that the information you publicly post may involve personal information or even sensitive personal information of yourself or others. If you choose to upload images containing personal information, please consider more carefully whether to share or even publicly share relevant information when using our services
6.Help you participate in various activities organized by
We will hold online marketing and operation activities from time to time, such as inviting new users, checking in, sharing, and clocking in. You may need to proactively submit the necessary information for participating in the activity. For example, when you withdraw or redeem red envelopes, in order to pay taxes to the tax authorities, you need to submit your ID information; In order to send you prizes or event gifts, you also need to providecontact address information. Regarding how to collect and use your personal information for such operational activities, you can refer to the information collection and usage prompt text on the corresponding H5 page
In certain activities, we will read the contents of your clipboard to determine if there is any relevant password information (such as invitation code, activation code). Only when the clipboard has the aforementioned information, we will collect the information, verify it on the server, and provide you with the required content or bind relevant rights. Please rest assured that we do not collect or store any other information from your clipboard, and individual clipboard information cannot identify your specific identity
If you refuse to provide the above information, you will not be able to fully participate in platform operations and interactive activities, but it will not affect your partial participation, nor will it affect your normal use of other functions of
7.Provides you with the function to add contacts as friends
When you add friends, you can add them as friends on by enabling the address book permission. We will collect relevant
address book information(including
contact names and corresponding contact information) with your authorization.. Please provide us with your contact list after careful consideration, ensuring that you have obtained the consent of your friends. Your refusal to authorize contact list permissions does not affect your normal use of other functions on . Address book permissions remain disabled by default. If you do not wish to be recommended to your contact list friends, you can also disable the contact list authorization previously opened to through device permission management
8.Information collection and usage when using various additional functions of
1) Additional features based on microphone based speech technology. You can use the microphone to achieve voice chat, recording, or post audio updates after enabling microphone permission. During this process, we will collect your recorded content. Please be aware that even if you have agreed to enable microphone access, we will only obtain voice information through the microphone when you actively use chat or voice or post audio updates
2) Localization function. When you enable the device positioning function and use the location-based services provided by , we will obtain your geographic location information through IP address, GPS, WLAN, or base station channels. These positioning functions will be used to provide you with the following services:
A. Same city matching function: When you use this function service, will obtain the geographical location of the device you are using through your IP address, which will be used to match and recommend other users with similar or identical geographical locations to you.
B. Dynamic Publishing: When you use the dynamic publishing function, you can choose to use the publishing location function. On the premise that you explicitly authorize and choose to use the publishing location publishing function, will obtain yourgeographic location informationthrough GPS function and display your geographic location when dynamically publishing. Without your explicit authorization, the dynamic publishing function will not automatically collect your accurate geographic location information, nor will it automatically display your accurate geographic location to other users during dynamic publishing, except for disclosing the geographical information corresponding to the IP address in accordance with regulatory requirements
1) Implement search services. When you use the product's search service, we collect yoursearch keyword information,log recordsto display you with search result content and search history. You can choose whether to clear the search history independently
2) Message notification function. We may send multiple types of notifications to one or more of the contact information provided by you during the use of our products or services (such as:mobile phone number), for the purpose ofmessage notification, identity verification, security verification, and user experience research; In addition, we may also provide you with commercial information such as advertisements and commercial activities that may be of interest through SMS or phone calls. But please rest assured that if you do not wish to receive this information, you can unsubscribe through the unsubscribe methods provided in SMS or phone calls, or contact us directly to unsubscribe
3) In order to maintain network security and ensure a good ecosystem, the
geographical information corresponding to your IP address will be displayed on your personal homepage, dynamic page, and dynamic comments.. Display domestically to provinces (regions, cities), and overseas to countries (regions), with information based on network operator data
11.Providing you with personalized recommendation, display, or push services
When you use the platform, we will collect the following information from you for personalized recommendation, display, or push services:
1) Your operations and usage behavior on the platform (following, searching, browsing preferences, liking, posting content, commenting)
This information will be stored on our server because storage is necessary to achieve this function
2) Geographic location. After obtaining your consent, we will obtain your location information in order to provide more accurate services. You can hide the 'City Tag' on the 'Me' - 'Privacy and Security' page or turn off geolocation authorization through your phone settings. Refusing to provide this information will only affect the accuracy of the push results and will not affect your normal use of other functions on
3) Application list information. After obtaining your consent, we will send an application list inquiry command to your mobile system and obtain information about your application list based on the results returned by the mobile system. We will not access, browse, or retrieve your application list in its entirety. This information will be stored on our servers as storage is necessary to achieve this function
12.Providing you with customer service and dispute resolution
In order to contact you or help you solve problems, we may need you to provide your name, mobile phone number, email and other contact information, and if necessary, you may need to provide
ID card informationand registered residence information to verify your true identity. If you refuse to provide the above information, we may not be able to provide you with timely feedback on the results of your complaint, appeal, or consultation
13.Providing you with safety risk control services
In order to improve the security of your use of related services and more accurately prevent phishing website fraud and Trojan viruses, we may assess the risk of your account by understanding some of your network usage habits, and may record some URLs that we believe are at risk.
14. Collection, use of personal information and corresponding changes in purpose
We may improve the through business development. When new features or services are related to registration, chat, dynamic, personalized content push, publishing graphics and text, interactive communication, search, query, authentication, and virtual property scenarios, the collection and use of personal information is directly related to the original purpose. In scenarios that are not directly related to the original purpose, we will collect and use your personal information with your consent again
Please note that our multiple services allow you to share information not only with your own social network circle, but also with all users who use this feature to publicly share your relevant information, such as the information you upload or post on our platform, your responses to information uploaded or posted by others, and including location data, audio and video information related to this information. Other users who use our services may also share information related to you, including your location data, audio and video information, and published information. Especially, our social media services are designed to enable you to share information with users around the world, allowing for real-time and widespread dissemination of shared information< u> As long as you do not delete the shared information, the relevant information will remain in the public domain; Even if you delete shared information, the information may still be independently cached, copied, or stored by other users or non affiliated third parties beyond our control, or saved by other users or third parties in the public domain Therefore, please carefully consider the information content uploaded, published, and communicated through our service. In some cases, you may control the scope of users who have the right to browse your shared information through the privacy settings of certain of our services
(2) The fact that we obtained your personal information from a third party
In order to provide you with better service, you agree that we may obtain your personal information from third parties, including but not limited to our affiliated companies and partner terminal products. We may obtain your authorized shared account information from third parties (including but not limited to nickname, avatar, gender, OPPEN ID, Union ID), and bind your third-party account with your account after you agree to this privacy protection guideline. We use your personal information in accordance with the provisions of this agreement and in compliance with relevant laws and regulations
(III) Exceptions to the Use of Personal Information
According to relevant laws and regulations, we may collect and use necessary personal information without your authorization and consent in the following scenarios:
-
Directly related to national security and defense security
-
Directly related to public safety, public health, and major public interests
-
Directly related to criminal investigation, prosecution, trial, and execution of judgments
-
For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent
-
The personal information collected by
is disclosed by you to the public on your own
-
Collect your personal information from legally disclosed information, such as from legitimate news reports, government information disclosure, and other channels
-
According to your requirements, long-term and supplementary contracts are necessary
-
Necessary for maintaining the safe and stable operation of products and/or services on , such as detecting and handling product or service failures
-
Other circumstances stipulated by laws and regulations
5. How do we share, jointly process, transfer, and publicly disclose your information
(1) Share your personal information
-
We provide our services to you. We may share your information with our partners and other third parties to enable you to use the services you need normally. For example, payment institutions that provide payment services, partners that provide data services (including online advertising monitoring, data statistics, and data analysis)
-
Implement this guideline“ How do we collect and use your personal information; Other purposes mentioned in the section
-
Fulfill our obligations and exercise our rights in this guide or other agreements we have reached with you
-
Within the scope permitted by laws and regulations, we may exchange information with other companies and organizations in order to comply with the law, safeguard the interests, property, or safety of ourselves, our affiliates or partners, you or other users, or the general public, such as to prevent illegal activities such as fraud and reduce credit risks. However, this does not include information that is sold, rented, shared, or otherwise disclosed for profit in violation of the commitments made in this guideline
-
At your lawful request or with your authorized consent
-
Provide your information at the lawful request of your guardian
-
Provided in accordance with the individual service agreement (including electronic agreements signed online and corresponding platform rules) or other legal documents agreed upon with you
-
Provided based on academic research
-
Provided based on social and public interests that comply with laws and regulations
We will only share your personal information for lawful, legitimate, necessary, specific, and clear purposes. We will sign strict confidentiality agreements with companies, organizations, and individuals with whom we share personal information, requiring them to handle the information in accordance with our instructions, this guideline, and any other relevant confidentiality and security measures
(II) Transfer
We will not transfer your personal information to any company, organization, or individual unless we obtain your explicit consent
In the event of restructuring, merger, division, acquisition, asset sale or bankruptcy liquidation of and its affiliated companies, or other similar situations involving the transfer of personal information, we will require the transferee to adopt the same or higher standards and requirements as this guideline for processing and protection. Otherwise, we will require the transferee to seek your consent again
(III) Public Disclosure
We will not publicly disclose your personal information unless we obtain your explicit consent, except as provided in this privacy protection guideline
We may disclose your personal information to relevant authorities in accordance with the law, legal procedures, litigation, or mandatory requirements of government regulatory authorities. However, we guarantee that in such cases, we will require the disclosing party to provide corresponding valid legal documents, and the disclosed information will be protected by security measures that comply with laws and industry standards
(IV) Exceptions to Authorization Consent for Sharing, Joint Processing, Transfer, and Public Disclosure of Personal Information
You fully understand that in the following scenarios, we do not need your authorization to share, transfer, or publicly disclose your personal information:
-
Related to national security and social public interests
-
Related to criminal investigation, prosecution, trial, and execution of judgments
-
For the purpose of safeguarding the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain their consent
-
The personal information collected by
is disclosed by the personal information subject to the public on their own
-
Collecting your personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels
-
Violating legal regulations or violating our platform rules has resulted in us taking necessary measures against you
-
According to your requirements, long-term and supplementary contracts are necessary
-
Used to maintain the safe and stable operation of the provided products or services, such as detecting and handling product or service failures
-
is necessary for legitimate news reporting
-
When academic research institutions or non-profit organizations conduct statistical or academic research necessary for public interest or non-profit purposes, and provide the results of academic research or descriptions to the outside world, they de identify the personal information contained in the results
-
Other circumstances stipulated by laws and regulations
According to legal provisions, sharing and transferring personal information that has undergone de identification processing, and ensuring that the data recipient cannot recover and re identify the personal information subject, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require additional notice to you and your consent
VI. Third Party Services
To ensure the stable operation and functional implementation of our client, and to enable you to enjoy and use more services and features, we may integrate SDKs provided by third-party service providers to provide you with better services and user experience. At present, the third-party service providers we access mainly include the following types:
-
Used for message push functions, including push notifications from mobile phone manufacturers and specific event reminders
-
Used for payment related services, including order payment, transaction behavior verification, income settlement, and payment information summary and statistics
-
Used to obtain device location permissions, collect device information, and log information with your consent
-
Used for third-party authorization services, including third-party account login and sharing relevant content to third-party products
-
is used to optimize product performance, including improving hardware distribution capabilities, reducing server costs, and performing functional hot repairs
-
Used for account security, product reinforcement related services, including network monitoring, domain name resolution, anti hijacking, anti black industry, anti cheating, encryption and decryption services
Some third-party SDKs we access may collect your personal information. If you use such services provided by third parties in our services, you agree that they will directly collect and process your information. We will evaluate the legality, legitimacy, and necessity of collecting personal information through such third-party services, require them to take protective measures for your personal information, and strictly comply with relevant laws, regulations, and regulatory requirements. You can check the ' Access Third Party SDK Catalog' below to learn about the basic information of the third-party SDKs we mainly access
| accesses third-party SDK directory |
| Third party |
The information involved |
Purpose: |
| OAID |
Phone status, network access |
Personalized advertising placement function for products in the application market |
| http://www.msa-alliance.cn/col.jsp?id=120 |
| Tencent Instant Messaging IM |
Apply for access to user microphones, recordings, cameras, photo albums, media permissions, audio and video message collection, and backend location permissions |
Voice and text chat, customer service |
| https://cloud.tencent.com/document/product/269/58094 |
| Tencent Mobile Push |
https://www.tencentcloud.com/zh/document/product/1024/36175 |
| Vietnam Unicom SDK |
Network type, network address, operator type, local phone number, international mobile user identification code, number of SIM cards, mobile device type, mobile operating system, hardware manufacturer, screen size, screen resolution information |
Used to achieve one click login |
| https://opencloud.wostore.cn/authz/resource/html/disclaimer.html?fromsdk=true |
| China Mobile SDK |
https://wap.cmpassport.com/resources/html/contract.html |
| China Telecom SDK |
Device information (IMSI, SIM card information), operator information |
Used to achieve one click login |
| https://www.189.cn/gd/sy_yw/sy_yw_gwzn/101933.html |
| WeChat Open Platform SDK |
Accessing network status IMEI、IMSI、ICCID、MAC、 Network information, BSSID, SSID, location information, application installation list |
Provide WeChat third-party login and WeChat social sharing |
| https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/ONwPihxKd82RAkIJ |
| Xiaomi Push SDK |
Device identification OAID, encrypted Android ID, device manufacturer, device model, device memory, operating system version, Xiaomi Push SDK version, device location (country or region), application information using push services (application package name, version number, running status), SIM card operator name, current network type, WiFi status |
Used to implement information push |
| https://dev.mi.com/distribute/doc/details?pId=1534 |
| OPPO Push SDK (OPUSH SDK) |
https://open.oppomobile.com/new/developmentDoc/info?id=10288 |
| Huawei Push Kit |
Basic application information (App ID, Push Service version number, HMS Core version number), in app device identifiers (AAID, Push Token), hardware information of the device (device type), basic system information (system type, system version), system settings information (country code) |
Used to implement information push |
| https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177 |
| VIVO Push SDK |
Equipment identification information (IMEI EmmCID、UFSID、ANDROIDID、GUID、GAID、OPENID、VAID、OAID、RegID、 Encrypted Android ID, application software information using push services (application package name, version number, APPID, installation, uninstallation, factory reset, running status), device manufacturer, network related information (IP address, network type), country code, device type; Push SDK version number, device model, operating system version, current network type, message sending result, push information content, notification bar status (notification bar permissions, user click behavior), lock screen status (whether to lock the screen, whether to allow lock screen notifications); Mobile system status information and application behavior data |
Used to implement information push |
| https://dev.vivo.com.cn/documentCenter/doc/652 |
| Flyme Push SDK |
Mobile phone brand, phone model, system version, system language, device identifier, network status, application package name, application name, application version, and Push SDK version for application access |
Used to implement information push |
| https://open.flyme.cn/docs?id=202 |
| Honor Push SDK |
Device information, network information |
Used to implement information push |
| https://www.hihonor.com/cn/privacy/privacy-policy/ |
| Push SDK |
https://render.alipay.com/p/yuyan/180020010001196791/preview.html?agreementId=AG00000132 |
| openinstall SDK |
| Used for installing scene data statistics and analysis |
| https://www.openinstall.io/privacy.html |
The above third-party services are operated by the relevant third parties. Your use of such third-party services (including any information you provide to such third parties) is subject to the third party's own terms of service and information protection statement (not this guide), and you need to carefully read its terms. This guideline only applies to the personal information we collect and does not apply to any third-party services or information usage rules provided by third parties. If you find that these third-party social media or other services pose risks, we suggest that you terminate the relevant operations to protect your legitimate rights and interests and contact us in a timely manner
7. Rights protection mechanism for personal information
We highly recognize your concern about personal information and make every effort to protect your rights to access, correct, delete, and withdraw consent to your personal information, so that you have sufficient ability to safeguard the security of your personal information. Your rights include:
1.Query and correct your personal information
You can check and correct your personal information by yourself through the following methods:
Account information: If you wish to query or edit account information in your account, change your account password, change your bound phone, query or bind, unbind third-party login methods, or close your account, you can log in to your account on the [Me] - [Settings] page to perform such operations
Profile information: If you wish to query or edit your personal profile in your account, you can log in to and add, modify, or delete your avatar, nickname, gender, birthday, and personal signature on the "Me" - "Edit Profile" page
If you are unable to access the personal information you need to query through the above methods, you can contact us at any time through the contact information disclosed in this guide. Upon reasonable request, we will reply to your request within fifteen working days
2.Delete your personal information
You have the right to communicate with“ 1. Search and correct your personal information; Delete the information that has already been filled out in the manner specified in the document. Meanwhile, in the following situations, you can contact us through the contact information disclosed in this guide to request the deletion of personal information. We will reply to your request within fifteen working days:
1) If our processing of personal information violates laws and regulations
2) If we collect and use your personal information without your explicit consent
3) If our handling of personal information seriously violates our agreement with you
If you no longer use our products or services, or if you voluntarily cancel your account
5) If we permanently cease to provide you with products or services
3.Withdraw the authorization that has been agreed upon
You can operate to give or revoke notifications, location information, cameras, photo albums, file storage and access, microphone authorization and consent in the personal device system. The way permissions are displayed and closed may vary on different devices. Please refer to the instructions or guidelines of the device and system developers for details. You can also close or revoke relevant consent or authorization in the APP settings and privacy and security
For the revocation of authorization for other information processing, you can contact us through the contact information disclosed in this guide
When you withdraw your consent, we will no longer process the corresponding personal information. However, please understand that after you withdraw your consent or authorization, we cannot continue to provide you with the specific functions and/or services corresponding to the withdrawal of consent or authorization
4.Cancel your account
If you need to cancel your account, you can follow the instructions on the interface under [Me] - [Settings] - [Cancel Account] option. After verifying the user's identity, we will cease to provide you with products or services, delete your personal information as required by applicable laws, or anonymize it, unless otherwise specified by laws and regulations regarding the period for which we store your personal information
5.Obtain a copy of personal information
You have the right to obtain a copy of your personal information. You can contact us and we will process your request within fifteen days after verifying your user identity
6.Restrict automated decision-making
You can choose whether to use the personalized services we provide on the "Me" - "Settings" page of . In addition, in certain business functions, after informing and obtaining your consent, we may only make decisions based on non manual automated decision-making mechanisms, including information systems and algorithms. If you believe that these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us through the contact information disclosed in this guide. We will also respond to your request within fifteen working days and provide you with a means of appeal
7.How do we respond to your request
To ensure security, you may need to provide a written request or prove your identity in other ways. We may first require you to verify your identity before processing your request. We will provide a response within fifteen working days. For your reasonable requests, we generally do not charge any fees, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may refuse requests that are unnecessarily repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are very unrealistic. In the following situations, as required by laws and regulations, we will not be able to respond to your request:
1) Directly related to national security and defense security
2) Directly related to public safety, public health, and major public interests
3) Directly related to criminal investigation, prosecution, trial, and judgment execution
There is sufficient evidence to indicate that you have subjective malice or abuse of power
5) Responding to your request will result in serious harm to your or other individuals' or organizations' legitimate rights and interests
6) Involving trade secrets
8.CookieUsage
In order to provide you with an easier access experience, when you use our services, we may identify your identity through a small data file. This is done to save you the step of repeatedly entering registration information or to help determine the security of your account. These data files may be cookies, Flash cookies, other local storage provided by your browser or associated applications (collectively referred to as“ Cookie”)。
Please understand that some of our services can only be accessed through the use of“ Cookie” Only then can it be realized. If your browser or browser add ons allow it, you can modify your acceptance of cookies or refuse our cookies, but this action may affect your safe access to websites related to and the use of our services in certain situations
You can refuse or manage cookies or web beacons through your browser settings. However, please note that if cookies or web beacons are disabled, you may not be able to enjoy the best service experience, and some services may not function properly
9. How do we protect and store your personal information
1.Information Security Protection
To ensure your information security, we strive to take various reasonable physical, electronic, and management security measures to protect your information from leakage, damage, or loss, including but not limited to SSL, information encryption storage, and data center access control. We have also implemented strict management measures for employees or outsourced personnel who may have access to your information, including but not limited to implementing different permission controls based on their positions, signing confidentiality agreements with them, and monitoring their operations. We will provide corresponding security measures based on existing technology to protect your information and provide reasonable security guarantees. We will do our best to ensure that your information is not leaked, damaged or lost
Your account has security protection functions, please keep your account and password information safe. We will ensure that your information is not lost, abused, or altered through security measures such as backing up to other servers and encrypting user passwords. Despite the aforementioned security measures, please also understand that there is no such thing as' information network '; Comprehensive security measures
Please protect your personal information properly and only provide it to others when necessary. If you discover that your personal information has been leaked, especially your account and password, please contact our customer service immediately so that we can take appropriate measures
2.Information Storage
1) Information storage methods and deadlines
We will store your information in a secure manner, including local storage (such as using an app for data caching), databases, and server logs
We will only retain your personal information for the shortest period of time necessary to achieve the purposes described in this guideline, unless there are mandatory retention requirements in laws and regulations. For example, according to the requirements of the Electronic Commerce Law of the People's Republic of China and supporting regulations, your order type transaction data will be retained for at least 3 years. Our criteria for determining the aforementioned deadline mainly include and are based on the longer of the following:
A. Complete the service objectives related to you, maintain corresponding service and business records, and respond to your possible inquiries or complaints
B. We guarantee the safety and quality of the services we provide to you
C. Do you agree to a longer retention period
D. Are there any other special provisions regarding retention periods
2) Region of information storage
We will store user personal information collected within Vietnam in accordance with laws and regulations
We currently do not transfer or store your personal information across borders. If there is a need for cross-border transmission or storage in the future, we will inform you of the purpose of information export, the recipient, security measures, and security risks, and obtain your consent
3) Notification when product or service ceases operation
When our products or services cease operation, we will stop collecting your personal information after the relevant services cease operation. We will deliver a notice of cessation of operations to you in the form of push notifications or announcements, and delete or anonymize your personal information, except as otherwise provided by laws and regulations
10. Protection of Minors
-
Minors under the age of 18 are required to read this privacy protection guide with the accompaniment of their parents or guardians. The use of our products and services requires the consent of their guardians. We attach great importance to the protection of personal information of minors. Minor users must ask their guardians to carefully read this privacy protection guide and ensure that they have obtained the consent of their guardians before using our services and providing us with your information. If your guardian does not agree to your use of our services or provision of information to us in accordance with these guidelines, please immediately terminate your use of our services and notify us promptly
-
If you register or use , according to relevant laws and regulations, if you are a child under the age of 14, before using , you should follow the registration and use process, obtain the consent of your parents or legal guardians in advance, and have your parents or legal guardians help you complete the registration process of so that you can use the products or services we provide
-
If you are the guardian of a child, you should carefully read this guide before helping the child complete the registration and use of our products or services, decide whether to agree to this guide, and assist the child in registration and use, so that the child can use the products or services we provide
-
We will not collect personal information of minors without their knowledge. Unless the guardian agrees, minors are advised not to register an account or send their name, address, phone number, or email address to us. We will protect the confidentiality and security of information of underage users in accordance with relevant national laws and regulations and the provisions of this guideline. If we accidentally collect information from minors, we will delete it as soon as we become aware of it
-
We will not display search results for personal information of minors without the consent of their guardians; If the guardian of a minor requests us to delete or block the personal information of minors related to them on , please contact us
-
Specifically, in order to better protect the privacy rights of minors, we remind you to carefully post content containing images of minors. Once posted, it is deemed that you have obtained the consent of your guardian to display the portrait and voice of minors, and allow us to use and manage content related to minors in accordance with the User Service Agreement and this Privacy Protection Guidelines. If the rights holder notifies us that the content you post violates the rights of minors, we have the right to handle the content you post for the protection of the rights holder and the rights of minors
-
The behavior of underage users during the use of this service, as well as all consequences arising from their use of this service, shall be borne by the underage and their guardians, and we shall not assume any responsibility
11. Revision of Privacy Protection Guidelines
We may revise the privacy protection guidelines from time to time, which form a part of this privacy protection guideline. Without your explicit consent, we will not reduce the rights you are entitled to under this guideline. We may notify users of significant changes in privacy protection guidelines by prominently posting relevant terms on our website or by publishing push notifications. If you do not agree with the revised privacy protection guidelines, you have the right and should immediately stop using . If you continue to use , you agree to be bound by the revised privacy protection guidelines
Twelve, Jurisdiction and Legal Application
-
The establishment, effectiveness, implementation, interpretation, and dispute resolution of this privacy protection guideline shall be governed by the laws of the People's Republic of Vietnam and shall not be subject to conflict of laws
-
Regardless of the reason for the invalidity of some of the privacy protection guidelines, the remaining terms remain valid and binding on both parties. The waiver of any provision of this Privacy Policy shall not be deemed a further or continued waiver of such provision or any other provision, and any rights or provisions not claimed by us under this Privacy Policy shall not constitute a waiver of such rights or provisions
About Contact Us
We have established a dedicated department for personal information protection. If you have any concerns, opinions or suggestions regarding the privacy protection policy, opinions or suggestions of , or have any complaints or reports about network information security, you can contact us through the following methods:
Contact: Customer Service
Contact information: 84856310715
Contact email: jintao1025@yeah.net
Contact address: 103 Tran Binh Trong Cao Bang,270000Viet Nam
To ensure security, we may first require you to verify your identity before processing your request. You may need to provide a written request or prove your identity in other ways. We will review the issues as soon as possible, and generally, we will respond within fifteen working days after verifying your user identity
For your reasonable requests, we generally do not charge any fees. However, for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may refuse requests that are unnecessarily repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, fall under authorized consent exceptions, or are highly impractical (such as involving information stored on backup tapes)