Privacy Policy
2025 .7 .9
Special Tips
1. Thank you for your use and trust in us. We will continue to be committed to providing you with safer and more reliable services.
2. This Privacy Policy applies to all of our products and / or services (including all our products and / or services and our products and / or services affiliated with us), but certain specific products and / or services will also be subject to specific privacy policies.
3. The privacy policies of the aforementioned specific products and / or services constitute part of this Privacy Policy. If there is any inconsistency with this Privacy Policy, the privacy policies of the specific products and / or services shall prevail.
4. Unless otherwise expressly stated in this Privacy Policy, this Privacy Policy does not apply to products and / or services independently provided to you by a third party that are accessed through our products and / or services, such as products or websites displayed to you in search results, websites that may include third-party services , or other websites linked to in our services. Please note that if you provide your personal information and other information to a third party when using its products and/or services, your information shall be subject to the privacy statement or similar policy of the third party, and we shall not bear legal responsibility for any third party's improper use or disclosure of the information you provide.
5. This Privacy Policy only applies to users over the age of 14. If you are a child under the age of 14 , or you are a guardian who intends to register an account for a child, please immediately stop reading this Privacy Policy and any other operations. We do not provide products and / or services to children under the age of 14 , nor do we allow anyone to register an account on behalf of a child or provide the registered account to a child. If we find that you or the relevant party has engaged in the aforementioned behavior, we have the right to take relevant measures depending on the circumstances, including but not limited to restricting use, canceling the account, etc., and we will delete the collected personal information of the child.
definition
1. [Personal Information] Personal information refers to any information recorded electronically or otherwise that can, alone or in combination with other information, identify a specific natural person or reflect the activities of a specific natural person.
2. [Sensitive Personal Information] Sensitive personal information refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, and may easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. It includes identity document number, personal biometric information, personal health and physiological information, bank account number, credit information, transaction and consumption records, whereabouts, accommodation information, transaction information, communication records and content, etc.
1. How we collect and use your personal information and other information
We will only collect and use your personal and other information for the following lawful purposes:
(I) Situations in which you need to authorize us to collect and use your personal information and other information when using our products and / or services
Our products and / or services include some specific business functions and additional functions, which include functions necessary to realize the services we provide, such as free network communication, functions necessary to improve our products and / or services, and functions necessary to ensure communication security. We may collect, save and use the following information about you to realize the aforementioned functions. If you do not provide relevant information, you may not be able to enjoy the products and / or services we provide .
Therefore, in order to provide you with better and safer products and / or services, you agree that we collect the following information:
1. Information that may be collected during your use of products and / or services.
We may collect information about your use of products and / or services (including how you use them), including:
1) [Device Information] In order to ensure your normal use of this product and / or service and to protect the security of your account, we will collect device attribute information (such as your hardware model, operating system version, unique device identifier IMEI , network device hardware address MAC , etc.) and device connection information (telecom operator, language used).
2) [Log Information] In order to ensure your safe use of this product and / or service, when you use us, access our web content and interface services, corresponding technical information may be automatically collected, including but not limited to browser type and language, system type, access time, referenced website uniform resource locator, etc. Please note that the above information does not include any of your personal information and other information, nor does it include content that you may send or share through the use of related applications, services or websites. At the same time, we will also encrypt the information to ensure the security of the information.
3 ) [Modify / delete SD card content; obtain access to storage space] When you use us, we will obtain access rights and store the receipts generated during your use of us in your own storage space /SD card on your device . You can modify or delete the data stored in our own storage space /SD card on your device by modifying or deleting the corresponding information in us . During your subsequent use, we will read the corresponding data stored in your own storage space /SD card on your device according to your operation request so that you can use our various functions normally.
4 ) [Collect user clipboard] In order to facilitate your quick and efficient feedback , we may obtain your clipboard data for content filling.
The above information is collected and stored anonymously. At the same time, we will encrypt or desensitize sensitive information to ensure the security of the information.
2. Information you may need to provide to us when using specific products and / or services
If you use the specific products and / or services we provide , in order to meet your product and / or service needs, you must agree to provide us with the corresponding information based on the products and / or services you choose. Please note that if you do not choose to use specific products and / or services, you do not need to provide the corresponding information, and it will not affect your use of other specific products and / or services you have selected .
1 ) When you register or log in to our account, you must provide your account name and mobile phone number. Mobile phone numbers are sensitive information. We collect this information to meet the requirements of relevant laws and regulations for the online real-name system for corresponding services. If you do not provide this information, you may not be able to use our services normally.
Please note that if you do not choose to use specific products and / or services, you do not need to provide the relevant information.
(II) Situations in which you can choose whether to authorize us to collect and use your personal information and other information
1. To make your use of us more convenient or provide you with a better experience, we may collect and use your personal information and other information in the following additional features. If you do not provide this personal information and other information, you can still use us, but you may not be able to use these additional features that can bring you a better experience or you may need to fill in some information repeatedly when using certain services. These additional features include:
( 1 ) Additional functions based on the camera: You can use this additional function to complete the functions of taking photos and scanning codes .
( 2 ) Additional functions based on image upload: You can upload your own photo as your avatar.
( 3 ) Service quality improvement function based on various types of information you provide: We may obtain other information about you for the reasonable needs of providing services and improving service quality, including the relevant information you provide when contacting customer service, the questionnaire response information you send to us when you participate in questionnaires or need creative advertising services, and the relevant information we obtain when you interact with us, suppliers and other partners.
( 5 ) Based on the information collected from your various devices, we may associate them so that we can provide you with consistent services on these devices, such as helping you use our account you created to quickly log in to the service platform of our affiliates or partners with one click , or using your third-party service platform account to quickly log in with one click with your authorization .
2. The above additional functions may require you to open access to your geographic location (location information), camera (camera), photo album (photo gallery), and third-party service platform (Weibo, WeChat, etc. ) in your device to us in order to collect and use the information involved in these functions. You can also decide to turn these permissions on or off at any time. Please note that when you turn on these permissions, you authorize us to collect and use these personal information and other information to achieve the above functions. When you turn off the permissions , you cancel these authorizations, and we will no longer continue to collect and use your personal information and other information, and we will not be able to provide you with the above functions corresponding to these authorizations. Your decision to turn off permissions will not affect the processing of personal information and other information previously performed based on your authorization.
(III) You are fully aware that we do not need your authorization or consent to collect and use personal information and other information in the following circumstances:
1. Related to our performance of obligations prescribed by laws and regulations;
2. Directly related to national security and national defense security;
3. Directly related to public safety, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial and execution of judgment;
5. To protect your or other individuals’ life, property and other major legal rights and interests, but it is difficult to obtain their consent;
6. The personal information and other information involved are disclosed to the public by you on your own initiative;
7. Necessary for signing a contract according to your requirements;
8. Your personal information and other information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
9. Necessary for maintaining the safe and stable operation of the products and / or services provided , such as discovering and handling product and / or service failures;
10. Other circumstances prescribed by laws and regulations.
(IV) Rules for the use of your personal information and other information
1. We will use the collected personal information and other information in accordance with the law and the provisions of this Privacy Policy and to realize the functions of our products and / or services.
2. After collecting your personal information and other information, we may de-identify or anonymize such information through technical means in accordance with the law. The de-identified information will not be able to identify the user subject, but may be combined with other information to identify the user subject; the anonymized information will not be able to identify the user subject, and the processed information cannot be restored.
3. [Authorization of Use] Please note that all personal information and other information you provide when using our products and / or services will continue to be authorized for us to use during the period you use our products and / or services, unless you delete it or refuse our collection through system settings.
4. We will only share your personal information and other information for legitimate purposes. At the same time, we will desensitize your information by means of content replacement and anonymization to protect the security of your personal information and other information.
II. Circumstances in which your personal information may be lawfully shared, transferred, or disclosed
1. Sharing
1. We will not share your personal information with any company, organization or individual other than us and our affiliates, except in the following circumstances:
( 1 ) Obtain your explicit consent or authorization in advance through this Privacy Policy or other reasonable means, such as email, phone, pop-up notification, etc., and only for legitimate, proper, necessary, specific and clear purposes;
( 2 ) Providing information when necessary in accordance with applicable laws and regulations, legal procedures, or administrative or judicial authorities.
2. You understand and agree that we may share your personal information with our affiliates for the purpose of improving user experience, optimizing products, providing you with better services based on linked accounts, identifying abnormalities in linked accounts, etc. We will only share necessary personal information and will be subject to the purposes stated in this Privacy Policy. If we share your sensitive personal information or our affiliates change the purpose of processing personal information, we will ask for your authorization and consent again.
3. In order to better handle your complaints and improve the consumer protection mechanism, or when we plan to merge with other companies, be acquired by other companies, or conduct other capital market activities ( including but not limited to IPO , bond issuance, etc. ) and therefore need to accept due diligence from other entities, we may hire external professional intermediary agencies ( such as law firms, accounting firms ) to provide your personal identity information, account information, and transaction information related to your complaints and lawsuits to such agencies. However, we will require these entities to take reasonable and necessary confidentiality measures for your personal information by signing confidentiality agreements with them, and require them to delete your information within a reasonable period of time after completing the necessary work .
(II) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Obtain your consent or authorization in advance;
2. Provide as required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;
3. Comply with the relevant agreements signed with you (including online electronic agreements and corresponding platform rules) or other legal documents;
4. In the event of a merger, acquisition, asset transfer or similar transaction, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy. Otherwise , we will require the company or organization to re-solicit your authorization and consent.
(III) Public Disclosure
We will only disclose your personal information in the following circumstances and only after taking security measures that meet industry standards:
1. Disclose the personal information you specify in accordance with your needs and in the manner you explicitly agree to;
2. In the event that we must provide your personal information in accordance with the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information based on the type of personal information and disclosure method required. Subject to compliance with laws and regulations, when we receive a request to disclose the above information, we will require the production of corresponding legal documents, such as a subpoena or investigation letter. We firmly believe that the information we are asked to provide should be as transparent as possible within the scope permitted by law. We carefully review all requests to ensure that they have a legal basis and are limited to data that law enforcement agencies have the legal right to obtain for specific investigation purposes. Subject to the permission of laws and regulations, the documents we disclose are protected by encryption keys.
(IV) Statement on Third-Party Liability
[Third-party Services] Please note that your transaction counterparties, third-party website operators you visit, and third parties connected through us (such as third parties providing services in our APP ) may have their own privacy protection policies. We will make it clear to you that the relevant services are provided by third parties; when you view web pages created by third parties or use applications developed by third parties, we recommend that you carefully read the "Privacy Statement" and "Service Agreement" of these third-party websites or service providers to understand how they handle your personal information so that you can make a prudent decision whether to use their services.
IV. How do we safely protect and store your personal information?
1. Storage of Information
1. Storage location
The personal information we collect and generate within the territory of the People's Republic of China is stored within the territory of the People's Republic of China. We will not provide or store personal information outside the territory of the People's Republic of China.
2. Storage period
We will only retain your personal information for the time necessary to achieve the purpose of the service, unless otherwise provided by laws and regulations. We will store your information for the following periods:
( 1 ) We will use the personal information we collect about you to meet our legitimate business needs, such as to provide you with services or to meet applicable legal, tax and financial requirements.
( 2 ) When we no longer have a legitimate business need to use your personal information, we will delete your personal data or anonymize it upon your request. If anonymization or deletion is not possible (for example, your personal information has been stored in a backup), we will securely store your personal information and separate it from other data processing.
(II) Our technologies and measures to protect your personal information
We attach great importance to personal information security and take all reasonable and feasible measures to protect your personal information:
1. [Data security technical measures] We promise that we will ensure that information security protection reaches a reasonable level of security. To protect your information security, we are committed to using various security technologies and supporting management systems to prevent your information from being leaked, damaged or lost, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed, used or modified without authorization , and to avoid data damage or loss.
Our network service adopts encryption technologies such as Transport Layer Security Protocol, and provides security services through https and message body encryption to ensure the security of data during transmission.
We use a variety of encryption technologies to encrypt and store user personal information, and isolate the storage media or information systems containing user personal information through logical or physical isolation.
When using personal information, such as displaying personal information and calculating the association between personal information, we will use a variety of data desensitizing technologies to desensitize sensitive fields to enhance the security of personal information during use.
2. [Other security measures we take to protect personal information] We regulate the security of personal information in various aspects such as internal storage, use, and sharing by establishing an information classification and grading system, a user information security management system, and security development specifications.
We implement comprehensive security controls on data through confidentiality agreements with information contacts, monitoring and auditing mechanisms.
We monitor our staff's handling of your information, continuously train them on relevant laws and regulations, privacy and security guidelines, and strengthen their security awareness. We also organize all staff to take security exams, hold security and privacy protection training courses, and enhance employees' awareness of the importance of protecting personal information.
3. If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations by individual delivery or announcement, and destroy or anonymize the personal information we hold.
V. How do you access and control the personal information you provide?
1. Your rights regarding your personal information:
1. Accessing your personal information
( 1 ) You can review all your personal information, modify or delete the above personal information, or make relevant privacy and security settings through "Me - Feedback" and "Help and Feedback - Contact Us" online feedback .
( 2 ) You may also make a request to us to access your personal information through customer service or the contact information indicated in the “How to Contact Us” section .
(II) Correcting your personal information
( 1 ) You can change your mobile phone number through "Me - Settings - Account and Security - Change Mobile Number" and change your nickname, profile picture, gender and other information through "Me - Personal Information" .
( 2 ) If you find that the personal information we process about you is incorrect, you have the right to ask us to make corrections. You can make a correction request through the methods listed in "(I) Accessing your personal information".
(III) Deleting your personal information
In the following circumstances, you may request us to delete your personal information by the methods described in “(I) Accessing your personal information”:
( 1 ) If you find that our collection and use of your personal information violates laws, administrative regulations, or the agreement with you or has not obtained your consent;
( 2 ) If you no longer use our products and / or services, or you cancel your account;
( 3 ) If we no longer provide you with products and / or services
Please note: When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.
4. Cancel your account
Our application does not have a user account system. You can use the application normally without registration and login. If the user uninstalls the application, it will be deemed as account cancellation.
(V) Changing the scope of your authorization
1. Each business function requires some basic personal information to be completed (see "I. How we collect and use your personal information and other information" in this Privacy Policy). You can give or withdraw your authorization consent for the collection and use of additional personal information at any time.
You can do this yourself in the following ways:
You can find us in the system settings - application management of your device and manage, modify or delete related permissions.
Once you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.
2. If you find that your personal information has been leaked, especially if your account has been leaked, please contact us immediately through the contact information specified in [How to Contact Us] at the bottom of this policy so that we can take appropriate measures.
3. Before responding to some of your requests under Item 1 (ii) and (iii) above, you may need to provide a written request or prove your identity in other ways for security reasons. We may first ask you to verify your identity before processing your request. We promise to verify and process your request within [ 15 ] working days from the date of receipt of your request under Item 1 above.
4. In the following circumstances, we will be unable to respond to your request in accordance with laws and regulations:
( 1 ) Related to our performance of obligations prescribed by laws and regulations;
( 2 ) Directly related to national security or national defense security;
( 3 ) Directly related to public safety, public health, or major public interests;
( 4 ) directly related to criminal investigation, prosecution and enforcement of judgments;
( 5 ) We have sufficient evidence to show that you have subjective malice or abuse of rights;
( 6 ) For the purpose of protecting your or other individuals’ life, property and other major legal rights and interests, but it is difficult to obtain the consent of the individual;
( 7 ) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.
( 8 ) Infringement of trade secrets.
VI. Notice and Revision
1. In order to provide you with better services and as our business develops, this Privacy Policy will be updated from time to time. However, without your explicit consent, we will not reduce the rights you should enjoy under this Privacy Policy. We will send the updated version on our mobile terminal and remind you of the update of relevant content through website announcements or other appropriate means before it takes effect. Please visit us to keep abreast of the latest privacy policy.
2. If there are any major changes, we will inform you in a more prompt way, including but not limited to sending emails, letters, phone calls, etc. Major changes referred to in this privacy policy include but are not limited to:
( 1 ) Our service model undergoes major changes, such as the purpose of processing personal information, the type of personal information processed, the way personal information is used, etc.;
( 2 ) We have major changes in our ownership structure, organizational structure, etc., such as changes in ownership due to business adjustments, bankruptcy, mergers and acquisitions, etc.;
( 3 ) The main objects of sharing, transfer or public disclosure of personal information have changed;
( 4 ) There are significant changes in your rights to participate in the processing of personal information and how you exercise them;
( 5 ) When our responsible department for handling personal information security, contact information and complaint channels change;
( 6 ) When the personal information security impact assessment report indicates that there is a high risk.
We will also archive previous versions of this policy for your reference.
3. [Amendment of Privacy Policy] Any amendments we may make to this Privacy Policy shall constitute part of this Privacy Policy and shall have retroactive effect. If you continue to use our products and / or services, you agree to be bound by the revised Privacy Policy .
VII. Contact Us
You can contact us via email: lvyanjing1122@163.com