APP User Privacy Policy
This policy applies to the products or services of "ARCCAPTAIN APP" (hereinafter referred to as "this application").
This part of the privacy policy will help you understand the following information:
I. Definitions and Scope of Application
II. Instructions on Self-start and Associated Start
III. How We Collect and Use Your Information
IV. How We Use Cookies and Similar Technologies
V. How We Share, Transfer, and Publicly Disclose Users' Personal Information
VI. How We Protect Users' Information Security
VII. How You Manage Your Personal Information
VIII. How We Handle the Information of Minors
IX. How Your Information Is Transferred Globally
X. How This Privacy Policy Is Updated
XI. How to Contact Us
Shenzhen Jingqing Innovation Technology Co., Ltd. (hereinafter referred to as "we") are well aware of the importance of your personal information. We will provide full protection for the security of your personal information in accordance with the requirements of laws and regulations and with reference to the best industry practices. We are committed to maintaining your trust in us and adhering to the following principles to protect your personal information: the principle of consistency between rights and responsibilities, the principle of clear objectives, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. In view of this, we have formulated this "Privacy Policy" (hereinafter referred to as "this policy / this privacy policy") to help you fully understand how we collect, use, share, store, and protect your personal information, as well as how you can manage your personal information during your use of our products/services.
Before using various products or services of this application, please read and thoroughly understand this policy carefully. Use the relevant products or services only after confirming that you fully understand and agree. Once you start using various products or services of this application, it means that you have fully understood and agreed to this policy. If you have any questions, comments, or suggestions regarding the content of this policy, you can contact us through the various contact methods provided by this application.
I. Definitions and Scope of Application
Personal Information: Various types of information recorded in electronic or other forms that can identify the identity of a specific natural person alone or in combination with other information, or reflect the activities of a specific natural person. Personal information includes (name, date of birth, identification document number, personal biometric information, address, communication contact information, communication records and content, account password, property information, credit information, whereabouts trajectory, accommodation information, health and physiological information, transaction information), etc.
Sensitive Personal Information: Personal information that, once leaked, illegally provided, or misused, may endanger personal and property safety and is highly likely to cause damage to personal reputation, physical and mental health, or discriminatory treatment, etc. Sensitive personal information includes (identification document number, personal biometric information, bank account, communication records and content, property information, credit information, whereabouts trajectory, accommodation information, health and physiological information, transaction information, personal information of children under 14 years old (inclusive)), etc.
Personal Information Processing: It includes the collection, storage, use, processing, transmission, provision, disclosure, deletion, etc. of personal information.
Deletion of Personal Information: It refers to the act of removing personal information from the systems involved in realizing daily business functions, keeping it in a state where it cannot be retrieved or accessed.
Anonymization of Personal Information: A process of technically processing personal information so that the subject of the personal information cannot be identified or associated, and the processed information cannot be restored.
De-identification of Personal Information: A process of technically processing personal information so that the subject of the personal information cannot be identified or associated without the help of additional information.
Subject of Personal Information: A natural person identified or associated with personal information.
Controller of Personal Information: An organization or individual who has the ability to determine the purpose, method, etc. of personal information processing.
Device Information: It includes device identifiers (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters and system information (device type, device model, operating system and hardware-related information), and device network environment information (IP address, WiFi information, base station information and other network-related information), subject to the actual collection situation of the product.
Child: It refers to a minor under 14 years old.
II. Instructions on Self-start and Associated Start
Before you agree to the user agreement and privacy policy, if you click to view the user agreement and privacy policy, in order to prevent third-party SDKs from collecting your personal information, we will launch the system browser for you to view the user agreement and privacy policy.
III. How We Collect and Use Your Information
When you use our products or services, we need to collect and use your personal information in the following three categories:
Necessary information that you must authorize us to collect and use in order to provide you with the basic functions of our products or services. If you refuse to provide the corresponding information, you will not be able to use our products or services normally.
Information that you can choose to separately agree to or disagree with us collecting and using for the purpose of providing you with the additional functions of our products or services. If you refuse to provide it, you will not be able to use the relevant additional functions normally or achieve the intended functional effects, but it will not affect your use of our basic functions.
When providing you with content or services related to the location of your device, with your authorization, we will use the geographical location information related to this service (such as precise location information, WLAN access points, Bluetooth and base stations, sensor information) to ensure the quality of the content or services. Among them, the precise location information is sensitive personal information. If you refuse to authorize the location permission, it will affect the accuracy of the location, but it will not affect the normal use of other functions and services. We will only display the possibly relevant content or services to you based on the city corresponding to the network information (such as IP).
We would like to especially remind you that: This information is not necessary for the operation of this business function, but it is of great significance for improving service quality, researching and developing new products or services, etc. We will not force you to provide this information, and your refusal will not have an adverse impact on the use of this business function.
The specific functional scenarios we provide for you include:
1. Helping You Become Our User
To complete the account creation so that we can provide you with services, you need to provide the following information: your mobile phone number, email address, etc. When you provide the mobile phone number used for registration (for receiving verification codes) during registration, we will send you a text message verification code to verify the validity of your identity. You can modify and supplement your nickname, gender, and avatar. These pieces of information all belong to your "account information". When you log in with a third-party account (Google account, Facebook account, Instagram account, YouTube account, X account, Apple account), if you decide to bind the account of that third-party platform, with your authorization for binding the third-party platform account, the third-party platform will synchronize some relevant information under your account on that third-party platform to us, such as the username, mobile phone number, avatar, nickname, region, gender, etc. (specifically subject to your authorization) and identity verification information. We collect the above information to provide you with account login services and ensure the security of your account and prevent security risks. If you refuse to authorize the above information, you will not be able to log in to this application platform with the third-party platform account, but it will not affect the other products we provide to you and the normal use of other services.
The above information you provide will be continuously authorized for us to use during the period when you use our services. When you actively apply to cancel your account, we will anonymize or delete your personal information as soon as possible in accordance with the requirements of applicable laws and regulations.
2. Providing You with Services and Meeting Your Needs
To display content or services to you, we will collect and use the device information when you visit or use our website or client (including device identifiers (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters and system information (device type, device model, operating system and hardware-related information), device network environment information (IP address, WiFi information, base station information and other network-related information)), service log information (browsing records, click-to-view records, search query records, favorites, follow and share information, published information, as well as IP address, browser type, telecommunications operator, language used, access date and time), and the basic information you submit (such as nickname, gender, mobile phone number) to improve your personal information.
3. Providing You with Goods or Services
3.1 Information You Provide to Us
The relevant personal information you provide to us when registering an account or using our services;
The shared information you provide to other parties through our services, as well as the information you store when using our services. Before providing the aforementioned personal information of that other party to this application, you need to ensure that you have obtained its authorization and consent.
3.2 Information We Collect During Your Use of the Services
In order to provide you with search results, understand the product adaptability, and identify the abnormal status of the account, we will collect information about the services you use and the way you use them and correlate these pieces of information. These pieces of information include:
3.3 Device Information:
To ensure the safe operation of the application and services, we will collect your device model, application list (installation list), device name, unique device identifier, login IP address, product version number, and mobile network information. We will collect your (device identifier, device serial number, MAC, location) and other information in the silent/background state for the purpose of identifying the user's identity information.
3.3.1 According to the specific permissions you grant during the installation and use of the software: Instructions on the purpose, method, and scope of collecting personal information by this application during your installation and use.
Please refer to the explicit list of personal information collected by ARCCAPTAIN APP for details:
3.3.1.1 Registration and Login: No permissions are used. It is used for registering and creating an account and improving the network identity identification. The mobile phone number, email address, and nickname are collected by the APP through user input.
3.3.1.2 Modifying Personal Information: The permissions for reading the photo album, using the camera, and file storage and reading are used. It is used for modifying the avatar in the personal information, and the avatar photo is collected by the APP.
3.3.1.3 Bluetooth Connection: The permissions for the Bluetooth switch and location are used. It is used for users to scan and connect to nearby Bluetooth devices, and the Bluetooth devices are collected by the APP.
3.3.1.4 Background Geographical Location: The location permission is used. It is used for users to scan and connect to nearby Bluetooth devices, locate the geographical location where the device is activated and used, and the APP collects the background geographical location information.
3.3.2 Service Log Information: It includes access records, device operation records, device alarm records, published message information, as well as the IP address, browser type, telecommunications operator, language used, access date and time. When you use the products or services provided by our website or client, we will automatically collect the detailed usage of our services by you and save it as relevant network logs. For example, the content of your search queries, IP address, browser type, telecommunications operator, language used, access date and time, and the records of the web pages you visited, etc. Please note that the device information and log information alone are information that cannot identify the identity of a specific natural person. If we combine this kind of non-personal information with other information for identifying the identity of a specific natural person, or use it in combination with personal information, then during the period of combined use, this kind of non-personal information will be regarded as personal information. Except when we obtain your authorization or as otherwise provided by laws and regulations, we will anonymize and de-identify this kind of personal information. When you contact us, we may save your communication/call records and content or the contact information you leave, etc., in order to contact you or help you solve problems, or record the solutions and results of relevant problems.
3.4 Personal Information We Collect Indirectly
You can use the products or services provided by our affiliated companies through the link entrance provided by us with your account of this application. To facilitate us to provide you with one-stop services jointly based on the affiliated accounts and for your unified management, we will centrally display your information in this application. You can discover and use the above-mentioned services through functions such as basic information and authentication information in the personal center. When you use the above-mentioned services through our products or services, you authorize us to receive, summarize, and analyze the personal information or activity information about you that we confirm is legally sourced or that you authorize and consent to be provided to us by our affiliated companies according to the actual business and cooperation needs. If you refuse to provide the above information or refuse to authorize it, you may not be able to use the corresponding products or services of this application normally, or you may not be able to display the relevant information, but it will not affect the use of core services such as browsing this application and participating in some activities that do not require privacy authorization.
4. Providing You with Security Protection
Please note that in order to ensure the authenticity of the user's identity and provide you with better security protection, you can provide us with identity information such as an ID card to complete the real-name authentication. If you refuse to provide the above information, you may not be able to use services such as account management and continue transactions that may have risks, but it will not affect your use of services such as browsing and purchasing goods. In order to improve the security of your use of the services provided by us, our affiliated companies, and partners, protect the personal and property safety of you, other users, or the public from being infringed, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and more accurately identify situations that violate laws, regulations, or the relevant agreement rules of this application, we may use or integrate your user information, transaction information, device information, relevant network logs, and the information shared by our affiliated companies and partners with your authorization or in accordance with the law, to comprehensively judge the risks of your account and transactions, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analyzing, and handling measures in accordance with the law.
5. Providing You with the Functions of Favorites, Follow, and Share
During the process of your browsing our website or client, you can choose to favorite goods or services and share information with other third parties through the functional components we provide. During the process of your use of the above functions, we will collect service log information including your records of favorites and obtaining coupon information, and sharing history, etc., for the purpose of realizing the above functions and other purposes that we have clearly informed you of.
6. Exceptions to Obtaining Authorization Consent
According to the relevant laws and regulations, the collection of your personal information in the following situations does not require your authorization consent:
6.1 Related to the fulfillment of obligations by the controller of personal information as required by laws and regulations;
6.2 Directly related to national security and national defense security;
6.3 Directly related to public safety, public health, and major public interests;
6.4 Directly related to criminal investigation, prosecution, trial, and judgment execution, etc.;
6.5 In order to protect the major legitimate rights and interests such as the life and property of the subject of personal information or other individuals, but it is difficult to obtain the authorization and consent of the individual himself;
6.6 The personal information involved is voluntarily disclosed to the public by the subject of personal information;
6.7 Necessary for signing and performing a contract according to the request of the subject of personal information;
6.8 Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels;
6.9 Necessary for maintaining the safe and stable operation of the provided products or services, such as discovering and handling product or service failures;
6.10 The controller of personal information is a news organization, and it is necessary for it to conduct legal news reports;
6.11 The controller of personal information is an academic research institution, and it is necessary for it to conduct statistics or academic research in the public interest, and when it provides the results of academic research or descriptions externally, it de-identifies the personal information contained in the results. If we stop operating the products or services of this application, we will promptly stop the activity of continuing to collect your personal information, notify you of the suspension of operation in the form of individual delivery or public announcement, and delete or anonymize the personal information we hold.
7. Customer Service and After-sales Functions
When you contact us or submit applications for in-sale and after-sales services, or handling of disputes, in order to ensure the security of your account and the system, we need you to provide the necessary personal information to verify your membership identity. At this time, our customer service and after-sales functions may use your account information and order information. In order to facilitate communication with you, help you solve problems as soon as possible, or record the solutions and results of relevant problems, we may save your communication/call records and relevant content (including account information, order information, other information you provide to prove relevant facts, or the contact information you leave). If you consult, complain, or provide suggestions regarding a specific order, we will use your account information and order information. For the reasonable needs of providing services and improving service quality, we may also use other information of yours, including the relevant information you provide when contacting our customer service and the questionnaire response information you send to us when participating in a questionnaire survey.
IV. How We Use Cookies and Similar Technologies
1. Cookies
Cookies and similar device information identification technologies are commonly used in the Internet. When you use our services, we may use relevant technologies to send one or more Cookies or anonymous identifiers (hereinafter referred to as "Cookies") to your device to collect, identify, and store the information when you access and use our products. We promise that we will not use Cookies for any purposes other than those described in this privacy policy. We use Cookies mainly to ensure the safe and efficient operation of our products and services. It enables us to confirm the security status of your account and transactions, troubleshoot relevant abnormal situations such as crashes and delays, and help you skip the steps and processes of repeatedly filling out forms and entering search contents.
2. Web Beacons and Pixel Tags
In addition to Cookies, we also use other similar technologies such as web beacons and pixel tags on our website. A web beacon is usually a transparent image embedded in a website or an email. With the help of the pixel tags in an email, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
V. How We Share, Transfer, and Publicly Disclose Users' Personal Information
1. Sharing
We will not share your personal information with companies, organizations, or individuals other than the service providers of this application, except in the following situations:
1.1 Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
1.2 Sharing in legal situations: We may share your personal information externally according to the provisions of laws and regulations, the needs of litigation and dispute resolution, or as required by administrative or judicial organs according to law.
1.3 Sharing with affiliated companies: To facilitate us to provide services to you jointly based on affiliated accounts, your personal information may be shared with our affiliated companies. We will only share the necessary personal information (for example, to facilitate your use of our affiliated companies' products or services with your account of this application, we will share your necessary account information with affiliated companies). If we share your sensitive personal information or an affiliated company changes the purpose of using and processing personal information, we will ask for your authorization and consent again.
1.4 Sharing with authorized partners: Only for the purposes stated in this privacy policy, some of our services will be jointly provided by us and authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. For example, arranging partners to provide services. We will only share your personal information for legitimate, just, necessary, specific, and clear purposes, and will only share the personal information necessary for providing services. Our partners have no right to use the shared personal information for other purposes unrelated to the products or services.
Please note that the information you voluntarily share or even publicly share when using our services may involve your or others' personal information, or even sensitive personal information. Please consider more carefully and make a decision.
Currently, our authorized partners include the following types:
1.4.1 Authorized partners in advertising and analysis services. Unless you permit it, we will not share your personal identification information (referring to information that can identify your identity, such as name, email address, mobile phone number, through which you can be contacted or your identity can be identified) with partners providing advertising and analysis services. We will provide these partners with information about the coverage and effectiveness of their advertisements, rather than providing your personal identification information, or we will summarize this information so that it cannot identify you personally. For example, only after the advertiser agrees to abide by our advertising release guidelines, we may tell the advertiser how effective their advertisement is, or how many people have viewed their advertisement or installed the application after seeing the advertisement, or provide these partners with statistical information that cannot identify personal identity (such as "Male, 25-29 years old, located in Beijing") to help them understand their audience or customers.
1.4.2 Suppliers, service providers, and other partners. We send information to suppliers, service providers, and other partners who support our business. This support includes providing technical infrastructure services, analyzing the usage of our services, measuring the effectiveness of advertisements and services, providing customer service, facilitating payments, or conducting academic research and investigations.
2. Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following situations:
2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
2.2 In the event of a merger, acquisition, or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by this personal information protection policy. Otherwise, we will require the company or organization to ask for your authorization and consent again.
3. Public Disclosure
We will publicly disclose your personal information in the following situations:
3.1 After obtaining your explicit consent;
3.2 Disclosure based on the law: In cases where it is required by laws, legal procedures, litigation, or mandatory requirements of government authorities, we may publicly disclose your personal information.
4. Exceptions to Obtaining Authorization Consent in Advance for Sharing, Transferring, and Publicly Disclosing Personal Information
In the following situations, sharing, transferring, and publicly disclosing your personal information do not require your prior authorization and consent:
4.1 Related to the fulfillment of obligations by the controller of personal information as required by laws and regulations;
4.2 Directly related to national security and national defense security;
4.3 Directly related to public safety, public health, and major public interests;
4.4 Directly related to criminal investigation, prosecution, trial, and judgment execution, etc.;
4.5 In order to protect the major legitimate rights and interests such as the life and property of the subject of personal information or other individuals, but it is difficult to obtain the authorization and consent of the individual himself;
4.6 Personal information voluntarily disclosed to the public by the subject of personal information;
4.7 Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels.
According to the law, sharing and transferring de-identified personal information and ensuring that the data recipient cannot restore and re-identify the subject of personal information does not belong to the external sharing, transfer, and public disclosure of personal information. The storage and processing of such data will not require further notice to you and your consent.
VI. How We Protect Users' Information Security
1. We have adopted security protection measures that meet industry standards to protect the personal information you provide, preventing the data from being accessed, publicly disclosed, used, modified, damaged, or lost without authorization. We will take all reasonable and feasible measures to safeguard your personal information. For example, when data (such as credit card information) is exchanged between your browser and the server, it is encrypted and protected by the SSL (Secure Socket Layer) protocol (that is, the HTTPS protocol); we will use encryption technology to enhance the security of personal information; we will employ trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms to make every effort to ensure that only authorized personnel can access personal information; and we will conduct security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.
2. We have an industry-leading data security management system with data at its core, which focuses on the data lifecycle and enhances the security of the entire system from multiple dimensions, including organizational construction, system design, personnel management, product technology, and so on.
3. We will take reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period necessary to achieve the purposes described in this policy, unless a longer retention period is required or permitted by law.
4. The Internet is not an absolutely secure environment. We strongly recommend that you do not use communication methods other than those recommended by this application to send personal information. You can establish contacts and share with each other through our services. When you create communication, transactions, or sharing through our services, you can independently choose the objects of communication, transactions, or sharing, who will be third parties able to see your transaction content, contact information, communication information, or shared content and other related information.
If you find that your personal information, especially your account or password, has been leaked, please contact the customer service of this application immediately so that we can take corresponding measures according to your application.
Please note that the information you voluntarily share or even publicly share when using our services may involve your or others' personal information, or even sensitive personal information. For example, when you post updates or choose to upload pictures containing personal information in public places such as group chats and circles. Please consider more carefully whether to share or even publicly share relevant information when using our services.
Please use a complex password to help us ensure the security of your account. We will do our best to ensure the security of any information you send to us. At the same time, we will also report the handling situation of personal information security incidents as required by regulatory authorities.
VII. How You Manage Your Personal Information
You can consult and manage your information through the following methods, and we will respond to your requests in accordance with the requirements of laws and regulations:
1. Accessing Your Personal Information
You have the right to access your personal information, except in the exceptional situations specified by laws and regulations. You can access your personal information on your own through the following methods:
Personal Information: If you wish to access or edit your personal information, you can perform such operations through "My" - "Settings" after logging into your account.
Authorization for Use: We require authorization for the "Location Service". You can turn off or enable the authorization in the settings of this option in your mobile phone settings.
2. Correcting or Supplementing Your Personal Information
When you find that the personal information about you processed by us is incorrect, you have the right to request us to make corrections or supplements. You can submit a request for correction or supplementation through the methods listed in item (1) "Accessing Your Personal Information" of this article.
3. Deleting Your Personal Information
You can delete some of your personal information through the methods listed in item (1) "Accessing Your Personal Information" of this article.
In the following situations, you can submit a request to delete personal information to us through the customer service:
3.1 If our processing of personal information violates laws and regulations;
3.2 If we collect and use your personal information without obtaining your explicit consent;
3.3 If our processing of personal information seriously violates the agreement with you;
3.4 If you no longer use our products or services, or you cancel your account;
3.5 If we no longer provide products or services to you.
If we decide to respond to your deletion request, we will also notify the subjects who have obtained your personal information from us at the same time as much as possible, and require them to delete it in a timely manner (except as otherwise provided by laws and regulations, or these subjects have independently obtained your authorization).
When you or we assist you in deleting relevant information, due to the limitations of applicable laws and security technologies, we may not be able to immediately delete the corresponding information from the backup system. We will store your personal information securely and limit any further processing of it until the backup can be cleared or anonymized.
4. Changing the Scope of Your Authorized Consent
Each business function requires some basic personal information to be completed (see "Article I" of this privacy policy). In addition, for the collection and use of additional personal information, you can contact the customer service of this application to apply for giving or withdrawing your authorized consent.
Please note that for some types of personal information, such as the information necessary for realizing the basic functions of this application or the information necessary for us to fulfill our obligations as required by laws and regulations, we may not be able to respond to your request to change the scope of authorization. When you withdraw your authorization, we will no longer process the corresponding personal information, but your decision to withdraw the authorization will not affect the personal information processing we have carried out based on your previous authorization.
5. Restricting Automatic Decision-making by Information Systems
In some business functions, we may make decisions based solely on non-human automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you can contact us through the customer service.
6. Responding to Your Above Requests
To ensure security, you may need to provide a written request or prove your identity in other ways. We may first ask you to verify your identity and then process your request.
We will reply within 30 days. If you are not satisfied, you can also file a complaint through the customer service of this application.
For your reasonable requests, we generally do not charge fees, but for requests that are repeated multiple times and exceed a reasonable limit, we will charge a certain cost fee as appropriate. For requests that are groundlessly repeated, require excessive technical means (for example, requiring the development of a new system or a fundamental change to the current practice), pose risks to the legitimate rights and interests of others, or are extremely impractical (for example, involving information stored on backup tapes), we may refuse them.
In the following situations, in accordance with the requirements of laws and regulations, we will not be able to respond to your requests:
6.1 Related to the fulfillment of obligations by the controller of personal information as required by laws and regulations;
6.2 Directly related to national security and national defense security;
6.3 Directly related to public safety, public health, and major public interests;
6.4 Directly related to criminal investigation, prosecution, trial, and judgment execution, etc.;
6.5 The controller of personal information has sufficient evidence to show that the subject of personal information has subjective malice or abuses rights;
6.6 In order to protect the major legitimate rights and interests such as the life and property of the subject of personal information or other individuals, but it is difficult to obtain the authorization and consent of the individual himself;
6.7 The request of the corresponding subject of personal information will cause serious harm to the legitimate rights and interests of the subject of personal information or other individuals and organizations;
6.8 Involving trade secrets.
7. Account Cancellation
We will retain the data on your account for 3 years. If you do not want to continue using our products, you can not log in to our APP services for 3 consecutive years, and we will cancel your account after 3 years. After you actively cancel your account, we will stop providing products or services to you and delete or anonymize your personal information in accordance with the requirements of applicable laws, except for the information that needs to be retained as required by laws and regulations. If you want to cancel your account information in advance, you can contact us through the customer service of this application at any time. We will reply to your access request within 15 days. For other personal information generated during your use of our products or services, we will provide it to you according to the relevant arrangements in item (VII) "Responding to Your Above Requests" of this article.
VIII. How We Handle the Information of Minors
In digital office/learning, communication and collaboration activities, we presume that you have corresponding civil capacity. If you are a minor, we require you to ask your parents or other guardians to carefully read this policy and use our services or provide information to us only with the consent of your parents or other guardians. If you are a child under 14 years old, before you use our services, you and your guardian should carefully read the content of this privacy policy. Ensure that you can use our services under the guidance of your guardian only after obtaining the consent of your guardian, and ensure your safety when using our services and conducting transactions. If you are the parent or other guardian of a child, please pay attention to whether the child uses our services after obtaining your authorization and consent. If you have questions about the personal information of the child, please contact our dedicated department for personal information protection. In the case of collecting the personal information of minors with the consent of their parents or guardians for using our products or services, we will only use, share, transfer or disclose this information when it is permitted by laws and regulations, when the parents or guardians have explicitly consented, or when it is necessary to protect minors.
IX. How Your Information Is Transferred Globally
The personal information we collect and generate in our global operations is stored globally, except in the following situations:
9.1 Clearly specified by laws and regulations;
9.2 Obtaining your explicit authorization;
9.3 Your personal active behaviors such as cross-border live broadcasts/posting updates through the Internet.
For the above situations, we will ensure that your personal information is provided with sufficient protection in accordance with this privacy policy.
X. How This Privacy Policy Is Updated
To bring you a better product and service experience, we keep working hard to improve our products, services and technologies. When there are changes in new services and business processes, we may update our privacy policy to inform you of the rights you enjoy according to this policy.
For major changes, we will also provide more prominent notifications (including that we will notify you with a small red dot or provide you with a pop-up prompt).
Without your explicit consent, we will not reduce the rights you should enjoy according to this personal information protection policy. We will publish any changes made to this policy on this page.
For major changes, we will also provide more prominent notifications (including that for some services, we will send notifications via email to explain the specific changes in the personal information protection policy).
The major changes referred to in this policy include but are not limited to:
1. Significant changes occur in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
2. Significant changes occur in our ownership structure, organizational structure, etc. Such as changes in ownership caused by business adjustments, bankruptcies, mergers and acquisitions, etc.;
3. The main objects of sharing, transferring or publicly disclosing personal information change;
4. Significant changes occur in your rights and the way you exercise them in the processing of personal information;
5. When the department responsible for handling personal information security, contact information and complaint channels change;
6. When the personal information security impact assessment report indicates the existence of high risks;
We will also archive the old versions of this policy on a dedicated page of this application for your reference.
XI. How to Contact Us
You can contact us through the following methods, and we will reply to your request within 15 days:
1. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the customer service of the mini-program and the "Contact Customer Service" in the "My" section of the APP;
2. If you find that your personal information may have been leaked, you can report it through the feedback function of this application;
Company Name: Shenzhen Jingqing Innovation Technology Co., Ltd.
Office Address: Unit 201D03-360, 2nd Floor, Building B, Buildings A and B, Shenzhen Fubao Technology Industrial Park, No. 3 Huanghuai Road, Fubao Community, Fubao Street, Futian District
Registered Address: Unit 201D03-360, 2nd Floor, Building B, Buildings A and B, Shenzhen Fubao Technology Industrial Park, No. 3 Huanghuai Road, Fubao Community, Fubao Street, Futian District
Contact Telephone Number: +86 18675640231
Email: chenqin202406@gmail.com