Privacy Policy

Privacy Policy

Privacy Policy

Update date: June 01, 2023

Effective Date: June 01, 2022

This policy applies to the products or services of "BabyN APP" (hereinafter referred to as "the Application").

This privacy policy section will help you understand the following:

  1. Definition and scope of application
  2. How we collect and use your information;
  3. How we make x use cookies and similar technologies;
  4. How we share, transfer and publicly disclose users' personal information;
  5. How do we protect users' information security;
  6. How you manage your personal information;
  7. How do we handle the information of minors;
  8. How your information is transferred globally;
  9. How to update this privacy policy;

10.How to contact us.

       (hereinafter referred to as "We") is fully aware of the importance of personal information to you. We will provide full protection for your personal information security in accordance with the requirements of laws and regulations and with reference to the best practices in the industry. The principle of consistency of power and responsibility, the principle of clear purpose, the principle of choice consent, the principle of least sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency and so on. In view of this, we have formulated this Privacy Policy (hereinafter referred to as "This Policy/this Privacy Policy") to help you fully understand how we collect, use, share, store and protect your personal information when you use our products/services and how you manage your personal information.

Before using the products or services of this application, please be sure to carefully read and thoroughly understand this policy, and use the relevant products or services after confirming that you fully understand and agree. Once you start to use the products or services of this application, it means that you have fully understood and agreed to this policy. If you have any questions, comments or suggestions about the contents of this policy, you may contact us through the various contact methods provided in this application.

Our product is developed based on Android Studio and X code tools. During the application running, we need to collect your device unique identification code (device ID, android ID, device MAC address) to provide statistical analysis services, and improve performance and user experience through application startup data and abnormal error log analysis. Provide better service for users.

Ⅰ. Definition and scope of application

Personal Information: All kinds of information recorded electronically or by other means that can identify a specific natural person or reflect the activities of a specific natural person alone or in combination with other information, Personal information includes (name, date of birth, ID card number, personal biometrics information, address, communication contact information, communication records and contents, account and password, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information), etc.

Sensitive Personal Information: Once the disclosure, illegal provision or abuse of personal information may endanger personal and property safety, easily lead to personal reputation, physical and mental health damage or discriminatory treatment, etc. Sensitive personal information includes (ID card number, personal biometric information, bank account, communication records and contents, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, personal information of children under 14 years old, etc.).

Processing of personal information: including collection, storage, use, processing, transmission, provision, disclosure and deletion of personal information.

Personal information deletion: refers to the act of removing personal information from the system involved in the realization of daily business functions, so that it remains unsearchable and inaccessible.

Personal information anonymization: Through the technical processing of personal information, the subject of personal information cannot be identified or associated, and the processed information cannot be restored.

Personal information de-identification: the process of technical processing of personal information so that it is impossible to identify or associate the subject of personal information without the help of additional information.

Personal information subject: the natural person identified or associated with the personal information.

Personal information controller: an organization or individual who has the ability to decide the purpose and method of personal information processing.

Device Information: This includes device identifiers (Android ID, MAC, IMSI, and other device related information), application information (app crash information, notification switch status, app installed list, and other app related information), device parameters, and system information (device type, device model, operating system, and hardware related information). The equipment network environment information (IP address, base station information and other network related information) is subject to the actual collection of the product.

Child: refers to a minor under the age of 14.

Ⅱ. How do we collect and use your information

When you use our products/services, we need to collect and use your personal information, including the following two types:

  1. In order to provide you with the basic functions of our products/or services, you must authorize us to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally;
  2. In order to provide you with additional functions of our products and/or services, you may choose to separately agree with or disagree with the information collected and used by us. If you refuse to provide it, you will not be able to normally use the relevant additional functions or achieve the functional effects we intend to achieve, and it will not affect your use of our basic functions.
  3. With your authorization, we will use the geographic location information (such as precise positioning information, WLAN access point, Bluetooth and base station, sensor information) related to the service to ensure the quality of the content or service when providing you with content or services related to the location of the device. If you refuse to authorize the location permission, it will affect the accuracy of positioning, but will not affect the normal use of other functions and services. We will only show you the content or services that may be relevant based on the city and/or county corresponding to the network information (such as IP).
  4. When you use the App, the sensor information of the direction sensor and the gyroscope device will be obtained to identify whether you are a real user. When you use the video camera related function, the acceleration device sensor information is obtained, which is used to obtain the Angle of the shooting phone.

We would like to remind you that this information is not necessary for the operation of the business function, but it is very important for the improvement of service quality, the development of new products or services, etc. We will not force you to provide this information, and your refusal will not adversely affect the use of this business function.

The specific functional scenarios we provide for you include:

  1. Help you become our user to complete the creation of an account so that we can provide you with services, you need to provide the following information: your mobile phone number and other information. When you register, you provide us with the mobile phone number used for registration (for receiving verification code), and we will verify whether your identity is valid by sending SMS verification code. You can modify and supplement your nickname, gender, birthday, avatar, real name verification binding, as well as your Alipay account, wechat account (for account withdrawal) and other related information, which are your "Account information". When you log in with a third-party account (wechat account, Apple account), if you decide to bind the account of the third-party platform, the third-party platform will synchronize part of your relevant information under the third-party platform account to us after your third-party platform account binding authorization. Such as user name, mobile phone number, avatar, nickname, region, gender, etc. (specific to your authorization) and authentication information. We collect the above information to provide you with account login services and to protect your account security and prevent security risks. If you refuse to authorize the above information, you will not be able to use the account of the third party platform to log in to the application platform, but it will not affect other products and normal use of other services provided by us.

In the process of use, if you provide the following additional information to complete your personal data, it will help us to provide you with better services and experience: your birthday, occupation, interests, mobile phone number. However, if you do not provide such information, it will not affect the basic functions of using the Application products or services.

The above information provided by you will continue to authorize us to use during your use of the Service. When you take the initiative to cancel your account, we will anonymize or delete your personal information as soon as possible in accordance with the requirements of applicable laws and regulations.

  1. Provide services and needs for you

To show you content or services, We will collect and use your device information (including device identifiers (IMEI, IDFA, Android) when you access or use the Website or the client ID, MAC, OAID, IMSI and other device related information), application information (app crash information, notification switch status, app installation list and other application related information), device parameters and system information (device type, device model, operating system and hardware related information), Device network environment information (IP address, WiFi information, base station information and other network-related information)), service log information (browsing history, click view record, search query record, collection, attention sharing information, release information, as well as IP address, browser type, telecom operator, language used, access date and time), basic information submitted by you ( Such as nickname, gender, mobile phone number), used to complete your personal information.

  1. To provide you with goods or services

3.1 Information You Provide to us

When you register an account or use our services, you provide us with relevant personal information, such as wechat basic information (nickname, avatar, gender), phone number, etc.;

Shared information you provide to other parties through our Services, and information you store when you use our Services. Before providing the aforementioned personal information of the other party to the Application, you should ensure that you have obtained its authorization and consent.

3.2 Information We Collect when you use the Services

In order to provide you with search results, understand product suitability, and identify account anomalies, we collect and associate information about the services you use and how you use them, including:

3.2.1 Device Information:

In order to ensure the safe operation of applications and services, we will collect your device model, application list (installation list), device name, device unique identifier, login IP address, product version number, mobile network information.

We will collect your (device identifier, MAC, phone number, location) and other information in the silent/background state to identify the user's identity information.

3.2.2 According to the specific permission granted by you in the installation and use of the software: The purpose, method and scope of personal information collected by the application in your installation and use are explained as follows:

 

 

 

 

 

 

 

 

 

 

 

BabyN APP Collects an explicit list of Personal Information

Business scenario

Permission to Use

Purpose of collection

Ways to collect

Personal Information field

Modify my profile, post content, post videos, take photos for feedback

Read albums, camera permissions

It is used to modify the profile picture, publish photos, and publish videos

User input /APP collection

Profile picture, photo, video

Publishing Content

Take photos and record videos

Users shoot videos to publish videos

APP Collection

Video

Binding Bluetooth devices

Location permissions, Bluetooth permissions

Get the user's current location and find the nearby Bluetooth device

App Mobile phone

Location information, Bluetooth

The purpose, method and scope of information collected by the third-party SDK integrated with this application are described as follows:

BabyN APP access third-party SDK directory

SDK Name

Package name information

Purpose of Use

Involving Personal Information

Privacy Policy Link

uni-app integrates the following third-party SDKS by default to ensure its operation:

glide Gallery

com.bumptech.glide

Used for image preview

Stored personal files

http://bumptech.github.io/glide/

To ensure the operation of this application, the following third-party SDKS are integrated:

Jigaung Push

cn.jpush

Push messaging

Standby parameters and system information, device identifier, network information and location information, application list information

https://www.jiguang.cn/license/privacy

Umen statistics

com.uc.crashsdk、com.efscom.umeng

Sharing

When the APP foreground runs, it needs to obtain device information (IMEI, ANDROID_ID, DEVICE_ID, IMSI), application installed list, network information, and obtain device serial number

https://www.umeng.com/page/policy

Wechat open platform

com.tencent.mm

Login and Share

Stored personal files, network information

Wechat Privacy Agreement

Tencent Bugly

com.tencent.bugly

Storage information permission

It is used for BUG abnormal log monitoring and reporting, analyzing and saving error logs, correcting and improving APP functions

Facebook

com.faceboo

facebook Login

Get network status information

Amap

com.amap.api, com.loc, com.autonavi

Implement map and location display

Stored personal files, location information, read phone status and identity, network information

https://lbs.amap.com/agreement/compliance

Google map

com.google

Implement map and location display

Stored personal files, location information, read phone status and identity, network information

https://www.google.cn/intl/zh-CN_CN/help/terms_maps/

 

3.2.3 Service log information: including browsing record, click view record, search query record, collection, transaction, after-sales, attention to share information, release information, IP address, browser type, telecom operator, language used, access date and time.

When you use the products or services provided by our website or client, we will automatically collect your detailed usage of our services as related web logs. Examples include the content of your search query, Idiv address, type of browser, telecom operator, language used, date and time of visit, and web pages you visit.

Note that individual device information, log information, etc. are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, during the combined use, such non-personal information will be regarded as personal information, and we will anonymize and de-identify such personal information unless authorized by you or otherwise provided by laws and regulations.

When you contact us, we may store your communication/call records and contents or the contact information you leave so that we can contact you or help you solve problems, or record the solutions and results of related problems.

3.3 Your Personal Information collected by us through indirect means

You can use the products or services provided by our affiliated companies through the application account in the link entry provided by us. In order to facilitate us to jointly provide you with one-stop services based on the associated account and facilitate your unified management, we display your information in this application. You can find and use the above services through the basic information and authentication information of the personal center.

When you use the above services through our products or services, you authorize us to receive, aggregate and analyze your personal information or activity information provided to us by our affiliates according to the actual business and cooperation needs.

If you refuse to provide the above information or refuse to authorize, you may not be able to use the corresponding products or services of the App normally, or you may not be able to display relevant information, but it will not affect the use of the App to browse, participate in some activities that do not require privacy authorization and other core services.

  1. Provide security for you

Please note that in order to ensure the authenticity of user identity and provide better security for you, you can provide us with identity information such as ID card to complete real-name authentication. If you refuse to provide the above information, you may not be able to use services such as account management and continue trading that may have risks, but it will not affect your use of services such as browsing and purchasing goods.

In order to improve the security of your use of the services provided by us and our affiliates and partners, protect the personal and property safety of you or other users or the public from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, and more accurately identify violations of laws and regulations or relevant agreement rules of this application, We may use or integrate your user information, transaction information, equipment information, related network logs and information authorized by you or shared by our affiliates and partners according to law to comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary record, audit, analysis and disposal measures according to law.

  1. Provide you with functions of collection, attention and sharing

When you browse our website or client, you may choose to bookmark products and/or services and share information with other third parties through the functional components provided by us. When you use the above functions, we will collect the service log information, including your collection, coupon information acquisition records and sharing history, for the purpose of implementing the above functions and other purposes explicitly informed by us.

  1. Exceptions to authorized consent

According to relevant laws and regulations, the collection of your personal information in the following circumstances does not require your authorization and consent:

6.1 It is related to the performance of obligations stipulated by laws and regulations by the personal data controller;

6.2 directly related to national security and national defense security;

6.3 Those directly related to public security, public health and major public interests;

6.4 Those directly related to criminal investigation, prosecution, trial and execution of judgment;

6.5 For the purpose of safeguarding the life, property and other important legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain their authorization and consent;

6.6 The personal information involved is disclosed to the public by the personal information subject himself;

6.7 It is necessary to sign and perform the contract as required by the personal data subject;

6.8 Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

6.9 Necessary to maintain the safe and stable operation of the provided products or services, such as the detection and disposal of failures of the products or services;

6.10 The controller of personal information is a news unit and it is necessary for it to carry out legal news reports;

6.11 The personal information controller is an academic research institution, which is necessary to carry out statistical or academic research in the public interest, and provides the results of academic research or description to the outside world, and de-identifies the personal information contained in the results.

If we stop operating the application products or services, we will promptly stop the activities of continuing to collect your personal information, notify you of the notice of cessation of operation in the form of delivery or announcement one by one, and delete or anonymize the personal information we hold.

  1. Customer service and after-sales functions

In order to protect the security of your account and system, we need you to provide necessary personal information to verify your membership identity when you contact us or apply for the settlement of disputes and disputes. In this case, our customer service and after-sales functions may use your account information and order information.

In order to facilitate contact with you, help you solve the problem as soon as possible or record the solution and results of the related problem, we may save your communication/call records and related content (including account information, order information, other information provided by you to prove the relevant facts, or contact information left by you). We will use your account information and order information if you consult, complain or provide suggestions for a specific order.

In order to provide services and improve service quality, we may also use your other information, including the relevant information you provide when you contact customer service, and the questionnaire response information you send to us when you participate in the questionnaire survey.

.How do we use cookies and similar technologies

1.Cookies

Cookies and similar device information identification technologies are widely used in the Internet. When you use our services, we may use related technologies to send one or more cookies or anonymous identifiers (hereinafter referred to as "cookies") to your device to collect, identify and store information when you access and use this product. We will not use cookies for any purpose other than the purpose stated in this Privacy Policy. We use cookies mainly to ensure the safe and efficient operation of our products and services, to confirm the security status of your account and transactions, to troubleshoot related anomalies such as crashes and delays, and to help you avoid repeating the steps and processes of filling in forms and entering search contents.

  1. Web beacons and pixel tags

In addition to cookies, we use other similar technologies on our websites, such as web beacons and pixel tags. A web beacon is usually a transparent image embedded in a website or email. With the help of the pixel labels in the email, we can tell if the email has been opened. If you do not wish your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

  1. How do we share, transfer and publicly disclose your information
  2. Sharing

We will not share your personal information with companies, organizations and individuals other than the service providers of this application, except in the following circumstances:

1.1 Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

1.2 Sharing under legal circumstances: We may share your personal information in accordance with laws and regulations, litigation dispute resolution requirements, or in accordance with the requirements of administrative and judicial authorities.

1.3 Sharing with Affiliates: Your personal information may be shared with our affiliates in order for us to provide services to you jointly based on our affiliate accounts. We will only share necessary personal information (such as to facilitate your use of the application account to use the products or services of our affiliated companies, we will share your necessary account information with the affiliated companies). If we share your sensitive personal information or the affiliated companies change the purpose of using and processing personal information, we will ask for your authorization and consent again.

1.4 Sharing with Authorized partners: Only for the purposes stated in this Privacy Policy, some of our services will be jointly provided by us and authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. Such as arranging partners to provide services. We will only share your personal information for lawful, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Our partners do not have the right to use the shared personal information for other purposes unrelated to products or services.

Please note that the information you voluntarily share or even publicly share when using our services may involve personal information or even sensitive personal information of you or others. Please consider and make decisions more carefully.

Currently, our authorized partners include the following types:

1.4.1 Authorized partners of advertising and analysis services. We will not share your personally identifiable information (i.e., information that identifies you, such as name or email address, mobile phone number, which can be used to contact you or identify you) with partners who provide advertising and analytics services unless we have your permission. We provide these partners with information about the reach and effectiveness of their ads without providing your personally identifiable information, or we aggregate this information so that it does not identify you personally. For example, we may only tell advertisers how effective their ads were, or how many people viewed their ads or installed the app after seeing them, or provide these partners with non-personally identifiable statistical information (e.g., "Male, 25-29 years old, located in Beijing") if they agree to abide by our AD publishing guidelines. Help them understand their audience or customers.

1.4.2 Suppliers, service Providers and other Partners. We send information to vendors, service providers, and other partners who support our business by providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, facilitating payments, or conducting academic research and surveys.

1.4.3 In order to provide you with the one-click sharing service, our products integrate with the Umeng + U-Share SDK, which will collect your device identification information (such as IMEI/android ID/IDFA, etc.) and the public information of your social accounts that you need to share in order to complete the one-click sharing service. For the security of your information, we have entered into data security and confidentiality agreements with third-party SDK service providers, and these companies will strictly comply with our data privacy and security requirements. We will not share your personally identifiable information with them unless we have your consent. To facilitate you better understand the data types and their Allies 【Umeng+, and how to protect your personal information, you can log on to https://www.umeng.com/policy for Umeng+ Allies privacy policy.

We will sign strict data protection agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

  1. Transfer

We will not transfer your personal information to any company, organization or individual except in the following circumstances:

2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

2.2 In the case of merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by this personal information protection Policy, otherwise we will require the company or organization to seek authorization consent from you again.

  1. Public disclosure

We will publicly disclose your personal information in the following circumstances:

3.1 After obtaining your explicit consent;

3.2 Disclosure based on law: We may publicly disclose your personal information when required by law, legal procedure, lawsuit or government authorities.

  1. Exceptions for prior authorization and consent when sharing, transferring or publicly disclosing personal information

In the following circumstances, the sharing, transfer and public disclosure of your personal information do not require your prior authorization and consent:

4.1 It is related to the performance of obligations stipulated by laws and regulations by the personal data controller;

4.2 directly related to national security and national defense security;

4.3 Those directly related to public security, public health and major public interests;

4.4 Those directly related to criminal investigation, prosecution, trial and execution of judgment;

4.5 For the purpose of safeguarding the life, property and other important legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the authorization and consent of the person;

4.6 Personal information disclosed to the public by the personal information subject;

4.7 Collecting personal information from information centers that are legally and publicly disclosed, such as legal news reports, government information disclosure and other channels.

According to the law, sharing and transferring the de-identified personal information and ensuring that the data recipient cannot recover and re-identify the personal information subject does not belong to the external sharing, transfer and public disclosure of personal information, and the storage and processing of such data will not need to notify you separately and obtain your consent.

  1. How do we protect your information
  2. We have adopted industry-standard security measures to protect the personal information you provide and prevent unauthorized access, public disclosure, use, modification, damage or loss of the data. We will take all reasonable and feasible measures to protect your personal information. For example, exchanging data (such as credit card information) between your browser and the server is encrypted and protected by the SSL (Secure Socket Layer) protocol (i.e. HTTPS protocol); We will use encryption technology to improve the security of personal information; We will use trusted protection mechanisms to prevent malicious attacks on personal information; We will deploy access control mechanisms to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.
  3. We have the industry's advanced data security management system centered on data life cycle, which improves the security of the whole system from the aspects of organization construction, system design, personnel management, product technology and so on.
  4. We will take reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for as long as necessary to achieve the purposes set out in the policy, unless an extension of the retention period is required or permitted by law.
  5. The Internet is not an absolutely secure environment. We strongly recommend that you do not send personal information by means of communication other than those recommended by this application. You can connect and share with each other through our services. When you create a communication, transaction or share through our services, you can choose the object of communication, transaction or share, as a third party that can see your transaction content, contact information, communication information or share content and other related information.

If you find that your personal information, especially your account or password, has been leaked, please contact our customer service immediately so that we can take appropriate measures according to your application.

Please note that the information you voluntarily share or even publicly share when using our services may involve personal information or even sensitive personal information of yourself or others. For example, you choose to upload pictures containing personal information when Posting updates or in group chats, circles and other public places. Please consider more carefully whether you share or even publicly share relevant information when using our services.

Please help us keep your account safe by using a complex password. We will do our best to ensure the security of any information you send us. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

.How do you manage your information

You can access and manage your information in the following ways, and we will respond to your request in accordance with the requirements of laws and regulations:

  1. Access to your personal information

You have the right to access your personal information, except for the exceptions stipulated by laws and regulations. You can access your personal information by yourself in the following ways:

Personal Data -- If you wish to access or edit your date of birth, occupation, hobbies, mobile phone number and other information in your personal data, you can do so through "My" - "Settings" by logging in to your account.

Authorized Use - You can log in to your account by clicking the "Settings" icon in the top right corner, clicking "Avatar" - "Settings", and disabling or enabling authorization in the authorization options.

  1. Correct or supplement your personal information

When you find that there is an error in your personal information processed by us, you have the right to ask us to make corrections or supplements. You may apply for correction or supplement through the means listed in "(1) Access to Your Personal Information" in this article.

  1. Delete your personal information

You may delete part of your personal information through the means listed in "(1) Access to Your Personal Information" in this article.

In the following circumstances, you can request us to delete personal information through customer service:

3.1 If our processing of personal information violates laws and regulations;

3.2 If we collect and use your personal information without your explicit consent;

3.3 If our processing of personal information seriously violates the agreement with you;

3.4 If you no longer use our products or services, or you cancel your account;

3.5 If we no longer provide products or services to you.

If we decide to respond to your request for deletion, we will also notify the subjects who have obtained your personal information from us as far as possible and require them to delete it in time (unless otherwise provided by laws and regulations, or these subjects have been independently authorized by you).

When you or we assist you in deleting the relevant information, we may not be able to immediately back up the information in response to the deletion from the backup system due to legal and security technical limitations of use. We will securely store your personal information and limit any further processing of it until the backup can be clear or anonymized.

  1. Change the scope of your authorization

Every business may require some basic personal information to be completed (see "Section 1" of this Privacy Policy). In addition, for the collection and use of additional personal information, you can contact the customer service of the application to apply for granting or withdrawing your authorization consent.

Please note that for some types of personal information, such as information necessary to realize the basic functions of the App or to fulfill our obligations under laws and regulations, we may not be able to respond to your request to change the scope of authorization. When you withdraw your authorization, we will no longer process the corresponding personal information, but your decision to withdraw your authorization will not affect our previous processing of personal information based on your authorization.

5, automatic decision of constraint information system

In some business functions, we may only make decisions based on non-human automatic decision mechanisms such as information systems, algorithms, and so on. If these decisions significantly affect your legal rights and interests, you can contact us through customer service.

6, to respond to your above request

For security purposes, you may need to provide a written request or otherwise prove your identity. We may first ask you to verify your identity before processing your request.

We will reply within 30 days. If you are not satisfied, you can also initiate a complaint through the customer service of this application.

For your reasonable request, we will not charge fees in principle, but for repeated, beyond the reasonable limit of the request, we will charge a certain cost. We may reject requests that are unreasonably repetitive, require excessive technical effort (e.g., require the development of new systems or fundamental changes to current practices), pose a risk to the legitimate interests of others, or are highly impractical (e.g., involve backing up information stored on tapes).

In the following circumstances, we will not be able to respond to your request as required by laws and regulations:

6.1 It is related to the performance of obligations stipulated by laws and regulations by the personal data controller;

6.2 directly related to national security and national defense security;

6.3 Those directly related to public security, public health and major public interests;

6.4 Those directly related to criminal investigation, prosecution, trial and execution of judgment;

6.5 The personal data controller has sufficient evidence to indicate that the personal data subject has malicious intention or abuse of power;

6.6 For the purpose of safeguarding the life, property and other important legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the authorization and consent of the person.

6.7 The request of the corresponding personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;

6.8 Those involving trade secrets.

  1. Account cancellation

We will keep the data on your account (180 days), if you do not want to continue using our products, you can submit an application to cancel your account to us through: My - Settings - Account cancellation.

After you take the initiative to cancel your account, we will stop providing you with products or services, and delete or anonymize your personal information in accordance with the requirements of applicable laws, except that it is required to be retained by laws and regulations.

If you are unable to access such personal information through the above path, you can always contact us through the customer service of this application. We will reply to your access request within 15 days.

For other personal information generated during your use of our products or services, we will provide it to you according to the relevant arrangements in this Article "(VII) Responding to your above Request".

VII. How do we handle the information of minors

In digital office/learning, communication and collaborative activities, we assume that you have the corresponding civil capacity. If you are a minor, we require you to ask your parents or other guardians to read this policy carefully, and use our services or provide us with information under the premise of obtaining the consent of your parents or other guardians.

If you are a child under the age of 14, before you use our services, you and your guardian should carefully read the content of this Privacy Policy to ensure that you can use our services under the guidance of your guardian after obtaining the consent of your guardian, so as to ensure your safety when using our services and conducting transactions.

If you are a parent or other guardian of a child, please pay attention to whether the child uses our services after obtaining your authorization and consent. If you have any questions about the child's personal information, please contact our personal information protection department.

In the case of collecting personal information of minors with the consent of parents or guardians to use our products or services, we will only use, share, transfer or disclose such information as permitted by laws and regulations, with the explicit consent of parents or guardians or necessary to protect minors.

. How will your information be transferred globally

Personal information collected and generated by us during our operations in the People's Republic of China is stored in the People's Republic of China, except in the following circumstances:

8.1 There are clear provisions in laws and regulations;

8.2 With your express authorization;

8.3 Your personal initiative such as cross-border live broadcast/release of dynamic information through the Internet.

In the above circumstances, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

  1. How is this Privacy Policy updated

In order to bring you a better product and service experience, we continue to strive to improve our products, services and technology, in new services and business process changes, we may update our privacy policy has informed you of your rights in accordance with this policy.

We will also provide more prominent notifications for major changes (including when we notify you with a small red dot or provide you with a pop-up alert),

Without your explicit consent, we will not reduce your rights under this Personal Information Protection Policy. We will post any changes to this Policy on this page.

We will also provide more significant notice of major changes (including, for some services, email notices explaining specific changes to our Personal Information Protection policy).

Material changes referred to in this Policy include but are not limited to:

  1. Significant changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, and the way of using personal information;
  2. We have made significant changes in ownership structure, organizational structure, etc. Such as business adjustment, bankruptcy merger and acquisition caused by the owner change;
  3. The main object of personal information sharing, transfer or public disclosure changes;
  4. Significant changes in your rights to participate in the processing of personal information and the way in which you exercise them;
  5. When our responsible department for handling personal information security, contact information and complaint channels change;
  6. When the personal information security impact assessment report indicates a high risk;

We will also archive older versions of this policy on a dedicated page for your review.

.How to contact us

You can contact us through the following ways and we will reply to your request within 15 days:

  1. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the mini program customer service and "My" - "Contact Customer service" in the APP;
  2. If you find that your personal information may be leaked, you can report it through the feedback of this application;