Privacy Policy
Update date: January 1, 2023
Effective date: January 1, 2023
Shenzhen Jewelry Display Co., Ltd. (hereinafter referred to as "we") is well aware of the importance of personal information to you. We will provide adequate protection for your personal information security in accordance with the requirements of laws and regulations and with reference to the best practices of the industry. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, and the principle of minimum adequacy, The principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. In view of this, we have formulated this Privacy Policy (hereinafter referred to as "this Policy/this Privacy Policy") to help you fully understand how we will collect, use, share, store and protect your personal information and how you manage your personal information in the process of using our products/services.
Before using the products or services of this application, you must carefully read and thoroughly understand this policy, and use the relevant products or services after confirming that you fully understand and agree. Once you start to use the products or services of this application, you have fully understood and agreed to this policy. If you have any questions, opinions or suggestions about the content of this policy, you can contact us through the various contact methods provided by this application.
This privacy policy section will help you understand the following:
1、 Definition and scope of application
2、 How we collect and use your information;
3、 How we use cookies and similar technologies;
4、 How we share, transfer and publicly disclose your information;
5、 How we protect your information;
6、 How do you manage your information;
7、 How do we deal with the information of minors;
8、 How your information is transferred globally;
9、 How to update this privacy policy;
10、 How to contact us
Definition and scope of application
Personal information: all kinds of information related to identified or identifiable natural persons recorded in electronic or other ways, excluding information after anonymization.
Personal sensitive information: sensitive personal information refers to personal information that, once leaked or illegally used, is likely to cause the human dignity of natural persons to be infringed or the safety of personal and property to be jeopardized, including biometrics, religious beliefs, specific identities, medical health, financial accounts, track information, and personal information of minors not less than 14 years old.
Personal information processing: including the collection, storage, use, processing, transmission, provision, disclosure and deletion of personal information.
Personal information deletion: refers to the removal of personal information from the system involved in the realization of daily business functions, so that it can not be retrieved and accessed.
Anonymization of personal information: refers to the process that personal information cannot be identified and cannot be recovered after being processed..
De-identification of personal information: refers to the process that personal information is processed so that it cannot identify specific natural persons without the help of additional information.
Device information: including device identifier (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters and system information (device type, device model, operating system and hardware-related information), The equipment network environment information (IP address, WiFi information, base station information and other network-related information) is subject to the actual collection of the product.
Children: refer to minors under the 14th anniversary.
This policy is applicable to "Jewelry Display APP" products or services (hereinafter referred to as "this application")
How do we collect and use your information
When you use our products/services, we need/may need to collect and use your personal information, including the following two types:
In order to provide you with the basic functions of our products and/or services, you must authorize us to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally;
In order to provide you with additional functions of our products and/or services, you can choose to share or disagree with the information we collect and use separately. If you refuse to provide, you will not be able to use the relevant additional functions normally or achieve the function effect we intend to achieve, and will not affect your use of our basic functions.
We would like to remind you that we are committed to creating a variety of products and services to meet your needs. Because we provide you with a wide range of products and services, and different users choose to use different specific products/services, the basic/additional functions and the types and scope of personal information collected and used will vary. Please refer to the specific product/service functions.
The specific functional scenarios we provide for you include:
1. Help you become our user
To complete the creation of an account so that we can provide services for you, you need to provide the following information: your mobile phone number and other information. When you register, provide us with the mobile phone number used for registration (for receiving the verification code), and we will send the SMS verification code to verify whether your identity is valid. You can modify and supplement your nickname, gender, birthday, avatar, real name verification binding, your Alipay account, WeChat account (for account withdrawal) and other relevant information, which belong to your "account information". When you log in with a third-party account (WeChat account, applet le account), if you decide to bind the account of the third-party platform, after your third-party platform account binding authorization, the third-party platform will synchronize some of your relevant information under the third-party platform account to us, such as user name, mobile number, avatar, nickname, region, gender, etc. (subject to your authorization) and identity verification information. We collect the above information to provide you with account login services, ensure your account security and prevent security risks. If you refuse to authorize the above information, you will not be able to use the account of the third-party platform to log in to the application platform, but it will not affect the other products we provide for you and the normal use of other services.
In the process of use, if you provide the following additional information to complete your personal data, it will help us to provide you with better service and experience: your birthday, occupation, interest, mobile phone number. However, if you do not provide this information, it will not affect the basic functions of using this application product or service.
The above information provided by you will continue to authorize us to use it during your use of the service. When you voluntarily apply for cancellation of your account, we will make it anonymous or delete your personal information as soon as possible according to the requirements of applicable laws and regulations.
2. Display and search of goods or services for you
In order to show you more content or services that meet your needs, we will collect and use your device information (including device identifier (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information) Equipment parameters and system information (equipment type, equipment model, operating system and hardware-related information), equipment network environment information (IP address, WiFi information, base station information and other network-related information) Service log information (browse records, click to view records, search query records, favorites, follow and share information, publish information, IP address, browser type, telecom operator, language used, access date and time), and basic information you submit (such as nickname, gender, mobile phone number), which is used to improve your personal information.
3. Provide you with goods or services
3.1 Information you provide us
The relevant personal information you provide to us when you register your account or use our services, such as WeChat basic information (nickname, avatar, gender), phone number, etc;
The shared information you provide to other parties through our services and the information you store when using our services. Before providing the aforementioned personal information of the other party to this application, you need to ensure that you have obtained its authorization and consent.
3.2 Information we collected during your use of the service
In order to provide you with a page display and search results that are more suitable for your needs, understand the product suitability, and identify the abnormal status of your account, we will collect and correlate information about the services you use and how you use them, including:
3.2.1 Equipment information:
To ensure the safe operation of applications and services, we will collect your device model, application list (installation list), device name, device unique identifier, login IP address, product version number, and mobile network information.
Our product is based on the development of DCloud uni-applets (5+applets/Web2 applets). During the operation of the application, you need to collect your unique device identification code (device ID, IMEI/android ID/IDFA, MAC, OAID, SIM card IMSI information) to provide statistical analysis services, and improve performance and user experience through application startup data and exception error log analysis, so as to provide better services for users.
We will collect your (device identifier, application list, IMEI, IDFA, MAC, name, mobile number, location) and other information in the silent/background state to identify the user's identity information. (Please modify according to the actual function of the application)
Our product integrates a push SDK. During the application operation, you need to collect your unique device identification code (IMEI/android ID/IDFA, MAC, OAID information) to facilitate the generation of user identification. By obtaining the application list (installation list) information, it is convenient for the service provider to adjust the push link and promote the closed SDK push process.
3.2.2 According to the specific permissions you have granted during software installation and use:
(1) Read photos or take photos permission (please modify according to the actual function of the application)
For example, when you modify your profile avatar information, post comments and feedback, we will ask you for photo album or camera permissions.
On some models, the permission to read the album is "read the contents of the memory card".
When you use the publish live broadcast function, we will ask you for camera permissions (i.e. camera permissions) to collect video stream information.
If you refuse to authorize to provide photo album or camera permissions, you will not be able to use the corresponding functions, but it will not affect your normal use of other functions of this application.
(2) Write photo album permission (please modify according to the actual function of the application)
For example, when you use the download photo function, we will ask you for the permission to write the photo album or the permission to write the memory card.
On some models, the permission to write the album is "modify or delete the contents of the memory card".
(3) Record audio permission (please modify according to the actual function of the application)
For example, when you use the publish live broadcast function, we will ask you for recording audio permission, that is, microphone permission, to collect audio stream information.
(4) Get the location permission (please modify it according to the actual function of the application)
For example, when you use the browse product function, we will ask you to obtain the location permission to better browse the businesses near you.
If you refuse to authorize to provide location permission, you will not be able to use the nearby browsing function, but it will not affect your normal use of the browsing function.
(5) Permission to receive notification (please modify according to the actual function of the application)
For example, in the process of use, we will use the third-party push SDK (individual push) to push system notifications, discount notifications, logistics alerts, and event alerts to you. In order to facilitate timely delivery and reminders, we will request notification permissions from you.
If you refuse to provide notification permission, our notification will not be able to remind you at the first time, but you can still view historical information in my message.
(6) Third-party SDK integrated with this application and corresponding permissions
Uni-applets integrate the following third-party SDKs by default to ensure operation:
This application integrates the following third-party SDKs to ensure operation:
3.2.1 Service log information: including browse records, click to view records, search query records, collection, transaction, after-sales, follow and share information, release information, IP address, browser type, telecom operator, language of use, access date and time.
When you use the products or services provided by our website or client, we will automatically collect your detailed usage of our services and save them as relevant network logs. For example, your search query content, Idiv address, browser type, telecom operator, language used, access date and time, and web page records you visited.
Please note that separate equipment information, log information, etc. are information that cannot identify a specific natural person. If we use such non-personal information in combination with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information will be considered as personal information during the combined use period. Unless otherwise authorized by you or specified by laws and regulations, we will anonymize and de-identify such personal information.
When you contact us, we may save your communication/call records and contents or contact information you left, so as to contact you or help you solve the problem, or record the solutions and results of related problems.
3.3 Your personal information collected by us through indirect acquisition
You can use the products or services provided by our affiliates at the link portal provided by us through this application account. In order to facilitate us to jointly provide you with one-stop service based on the associated account and facilitate your unified management, we will display your information in this application. You can discover and use the above services through the basic information and authentication information of the personal center.
When you use the above services through our products or services, you authorize us to receive, summarize and analyze your personal information or activity information provided to us by our affiliates according to the actual business and cooperation needs.
If you refuse to provide the above information or refuse the authorization, you may not be able to use the corresponding products or services of the application normally, or you may not be able to display relevant information, but it will not affect the use of the application to browse, participate in some activities that do not require privacy authorization and other core services.
4. Provide you with security
Please note that in order to ensure the authenticity of user identity and provide you with better security, you can provide us with identity information such as ID card to complete real-name authentication. If you refuse to provide the above information, you may not be able to use services such as account management and continuing transactions that may have risks, but it will not affect your use of services such as browsing and purchasing goods.
In order to improve the security of your use of services provided by us and our affiliates and partners, protect the personal and property security of you or other users or the public from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion and other security risks, and more accurately identify violations of laws and regulations or the relevant agreement rules of this application, we may use or integrate your user information Transaction information, equipment information, relevant network logs and the information that our affiliates and partners have obtained your authorization or shared according to the law to comprehensively judge your account and transaction risk, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis and disposal measures according to the law.
5. Provide you with collection, attention and sharing functions
During your browsing of our website or client, you can choose to collect the goods and/or services you are interested in and share information with other third parties through the functional components we provide. In the process of using the above functions, we will collect the service log information, including your collection and the record of obtaining coupon information, and share the history, for the purpose of realizing the above functions and other purposes that we clearly inform. 6. Exceptions to authorization
According to relevant laws and regulations, it is not necessary to obtain your authorization to collect your personal information under the following circumstances:
6.1 Related to national security and national defense security;
6.2 Those related to public safety, public health and major public interests;
6.3 Related to criminal investigation, prosecution, trial and execution of judgments;
6.4 It is difficult to obtain your consent for the purpose of safeguarding the life, property and other major legitimate rights and interests of the personal information subject or other individuals;
6.5 The collected personal information is disclosed to the public by yourself;
6.6 Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;
6.7 It is necessary to sign the contract according to your requirements;
6.8 Necessary for maintaining the safe and stable operation of the products or services provided, such as finding and handling the faults of the products or services;
6.9 Necessary for legal news reporting;
6.10 It is necessary for academic research institutions to carry out statistics or academic research based on the public interest, and to de-identify the personal information contained in the results when providing the results of academic research or description;
6.11 Other circumstances specified by laws and regulations.
If we stop operating this application product or service, we will stop collecting your personal information in a timely manner, notify you of the notice of stopping operation in the form of one by one delivery or announcement, and delete or anonymize the personal information held.
7. Customer service and after-sales functions
When you contact us or submit an application for after-sales and dispute settlement in the process of sale, we need you to provide necessary personal information to verify your membership in order to ensure the security of your account and system. At this time, our customer service and after-sales functions may use your account information and order information.
In order to contact you, help you solve the problem as soon as possible, or record the solution and results of related problems, we may save your communication/call records and related contents (including account information, order information, other information you provided to prove the relevant facts, or contact information you left) with us. If you consult, complain or provide suggestions for specific orders, We will use your account information and order information.
In order to provide services and improve service quality, we may also use your other information, including the relevant information you provided when you contacted customer service, and the questionnaire response information you sent to us when you participated in the questionnaire.
3、 How do we use cookies and similar technologies
1、Cookie
Cookies and information identification technology of similar devices are widely used in the Internet. When you use our services, we may use relevant technologies to send one or more cookies or anonymous identifiers (hereinafter referred to as "cookies") to your device to collect, identify and store information when you access and use this product. We promise that we will not use cookies for any purpose other than those stated in this privacy policy, We use cookies mainly to ensure the safe and efficient operation of products and services, which can enable us to confirm the security status of your account and transactions, troubleshoot the relevant exceptions of crashes and delays, and help you avoid repeating the steps and processes of filling out forms and entering search content.
2. Website beacon and pixel label
In addition to cookies, we will also use website beacons, pixel labels and other similar technologies on the website. For example, the email SMS we send to you may contain an address link to the content of our website. If you click this link, we will track this click to help us understand your product or service preferences so that we can actively improve our customer service experience. Website beacon is usually a transparent image embedded in website or email. With the help of the pixel tag in the email, we can know whether the email is opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
4、 How do we share, transfer and publicly disclose your information
1. Share
We will not share your personal information with companies, organizations and individuals other than the application service provider, except for the following circumstances:
1.1 Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
1.2 Sharing under legal circumstances: We may share your personal information externally according to the provisions of laws and regulations, the needs of litigation dispute resolution, or the requirements of administrative and judicial authorities according to law.
1.3 Sharing with related companies: In order to facilitate us to jointly provide services to you based on related accounts, your personal information may be shared with our related companies. We will only share necessary personal information (for example, to facilitate you to use our affiliate products or services using this application account, we will share your necessary account information with the affiliate). If we share your personal sensitive information or the affiliate changes the use and processing purpose of personal information, we will ask for your authorization again.
1.4 Share with authorized partners: only for the purpose stated in this privacy policy, some of our services will be provided by us and authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. For example, arrange partners to provide services. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and only share the personal information necessary for providing services. Our partners have no right to use the shared personal information for other purposes unrelated to products or services.
Please note that the information you voluntarily share or even publicly share when using our services may involve personal information or even sensitive personal information of you or others. Please be more careful and make a decision.
At present, our authorized partners include the following types:
1.4.1 Authorized partners of advertising and analysis services. Unless we get your permission, we will not share your personally identifiable information (referring to the information that can identify you, such as name or e-mail address, mobile phone number, through which you can be contacted or identified) with partners providing advertising and analysis services. We will provide these partners with information about their advertising coverage and effectiveness, rather than provide your personally identifiable information, or we will summarize this information so that it will not identify you personally. For example, only after advertisers agree to abide by our advertising release guidelines, can we tell advertisers how effective their advertisements are, or how many people have seen their advertisements or installed apps after seeing them, or provide these partners with statistical information that cannot identify themselves (such as "male, 25-29 years old, located in Beijing") to help them understand their audience or customers.
1.4.2 Suppliers, service providers and other partners. We send information to suppliers, service providers and other partners that support our business, including providing technical infrastructure services, analyzing the use of our services, measuring the effectiveness of advertising and services, providing customer services, facilitating payment or conducting academic research and research.
1.4.3 In order to provide you with one-click sharing service, our product integration of Youmeng+U-Share SDK will collect your device identification information (such as IMEI/android ID/IDFA, etc.) and the public information of your social account that you need to share, so as to complete the one-click sharing service. For your information security, we have entered into data security and confidentiality agreements with third-party SDK service providers, which will strictly comply with our data privacy and security requirements. We will not share your personally identifiable information with you unless you agree. To help you better understand the type and purpose of data collected by [Youmeng+] and how to protect your personal information, you can log in https://www.umeng.com/policy Learn about the privacy policy of [Youmeng+].
For companies, organizations and individuals with whom we share personal information, we will sign strict data protection agreements with them, requiring them to process personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures. 2. Transfer
We will not transfer your personal information to any company, organization or individual, except for the following:
2.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
2.2 In the case of merger, acquisition or bankruptcy liquidation, or other cases involving merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company, organization and individual holding your personal information to continue to be bound by this policy, otherwise we will require the company, organization and individual to ask you for authorization again.
3. Public disclosure
We will publicly disclose your personal information under the following circumstances:
3.1 Based on your active choice and other separate consent, we may publicly disclose your personal information;
3.2 If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of this application, or in order to protect the personal and property safety of users of this application and its affiliates or the public from infringement, we may disclose your personal information, including relevant violations and the measures that this application has taken against you, with your consent in accordance with laws and regulations or the relevant agreement rules of this application.
4. Exceptions to obtaining authorization prior to sharing, transferring and public disclosure of personal information
In the following cases, sharing, transferring and public disclosure of your personal information does not require your prior authorization:
4.1 Related to national security and national defense security;
4.2 Those related to public safety, public health and major public interests;
4.3 Related to criminal investigation, prosecution, trial and execution of judgment;
4.4 For the purpose of protecting your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
4.5 Personal information that you disclose to the public;
4.6 Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.
According to the law, sharing and transferring personal information that has been de-identified, and ensuring that the data receiver cannot recover and re-identify the subject of personal information, does not belong to the external sharing, transfer and public disclosure of personal information. The storage and processing of such data will not need to notify you and obtain your consent.
5、 How do we protect your information
1. We have taken reasonable and feasible security protection measures in line with the industry's general solution to protect the personal information provided by you from unauthorized access, public disclosure, use, modification, damage or loss. For example, when exchanging data (such as credit card information) between your browser and server, it is protected by SSL (Secure Socket Layer) protocol encryption (i.e. HTTPS protocol); We will use encryption technology to improve the security of personal information; We will use trusted protection mechanisms to prevent malicious attacks on personal information; We will deploy an access control mechanism to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.
2. We have an industry-advanced data security management system centered on data and centered on the data life cycle, which improves the security of the entire system from the aspects of organization construction, system design, personnel management, product technology and other aspects.
3. We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only retain your personal information for the period required to achieve the purpose stated in this policy, unless the retention period needs to be extended or permitted by law.
4. The Internet is not an absolutely safe environment. We strongly recommend that you do not send personal information using the communication method not recommended by this application. You can establish contact and share with each other through our services. When you create communication, transaction or sharing through our service, you can choose the object of communication, transaction or sharing independently as the third party who can see your transaction content, contact information, exchange information or share content and other relevant information.
If you find that your personal information, especially your account or password, has been leaked, please contact our customer service immediately so that we can take corresponding measures according to your application.
Please note that the information you voluntarily share or even publicly share when using our service may involve personal information or even personal sensitive information of you or others. For example, you choose to upload pictures containing personal information when publishing news or in group chat, circle and other public places. Please be more careful to consider whether to share or even publicly share relevant information when using our services.
Please use complex passwords to help us ensure the security of your account. We will try our best to ensure the security of any information you send us. At the same time, we will also report the disposal of personal information security incidents according to the requirements of regulatory authorities.
6、 How do you manage your information
You can view and manage your information in the following ways, and we will respond to your request in accordance with laws and regulations:
1. Access your personal information
You have the right to access your personal information, except for the exceptions specified by laws and regulations. You can access your personal information in the following ways:
Personal data - If you want to access or edit the date of birth, occupation, hobbies, mobile phone number and other information in your personal data, you can perform such operations through "My" - "Settings" by logging in to your account.
Authorized use - you can log in to the account by clicking the "Settings" icon in the upper right corner, and clicking "avatar" - "Settings" to turn off or enable authorization in the authorization options.
2. Correct or supplement your personal information
When you find that there are errors in the personal information we handle about you, you have the right to ask us to make corrections or supplements. You can apply for correction or supplement through the methods listed in "(I) Access to your personal information" of this article.
3. Delete your personal information
You can delete part of your personal information in the way listed in "(I) Access to your personal information" of this article.
In the following cases, you can request us to delete personal information through customer service:
3.1 If we handle personal information in violation of laws and regulations;
3.2 If we collect and use your personal information without your explicit consent;
3.3 If our handling of personal information seriously violates the agreement with you;
3.4 If our processing purpose has been achieved, cannot be achieved or is no longer necessary to achieve the processing purpose;
3.5 If we stop providing products or services, or the storage period has expired.
If we decide to respond to your request for deletion, we will also notify the subjects who have obtained your personal information from us as much as possible and require them to delete it in a timely manner (unless otherwise specified by laws and regulations, or these subjects have independently obtained your authorization).
When you or we assist you in deleting relevant information, we may not be able to immediately back up the deleted response information from the backup system due to the legal and security technology limitations. We will safely store your personal information and restrict any further processing until the backup can be clear or anonymous.
4. Change the scope of your authorization
Each business can only be completed with some basic personal information (see "Article 1" of this privacy policy). In addition, for the collection and use of additional personal information, you can contact the customer service of this application to apply for granting or withdrawing your authorization.
Please note that for some types of personal information, we may not be able to respond to your request to change the scope of authorization if it is necessary to realize the basic functions of the application or to fulfill our obligations under laws and regulations. When you withdraw your authorization, we will no longer process the corresponding personal information, but your decision to withdraw your authorization will not affect our previous personal information processing based on your authorization.
5. Automatic decision of constraint information system
In some business functions, we may only make decisions based on the non-manual automatic decision-making mechanism including algorithms. If these decisions affect your legal rights and interests, you can contact us through customer service.
6. Respond to your above request
To ensure security, you may need to provide a written request, or prove your identity in other ways. We may ask you to verify your identity before processing your request.
We will reply within 30 days. If you are not satisfied, you can also initiate a complaint through the application customer service.
In principle, we will not charge for your reasonable request, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. We may reject those requests that are unnecessary, need too many technical means (for example, need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or are very unrealistic.
In the following cases, according to the requirements of laws and regulations, we will not be able to respond to your request:
6.1 Related to national security and national defense security;
6.2 Those related to public safety, public health and major public interests;
6.3 Related to criminal investigation, prosecution, trial and execution of judgments;
6.4 There is sufficient evidence to show that the personal information subject has subjective malice or abuse of rights;
6.5 Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;
6.6 Those involving trade secrets.
7. Account cancellation
We will keep the data on your account (180 days). If you do not want to continue using our products, you can submit an application for account cancellation to us through My Settings Account Cancellation.
After you actively cancel your account, we will stop providing you with products or services, and delete or anonymize your personal information according to the requirements of applicable laws.
If you cannot access such personal information through the above path, you can contact us at any time through the application customer service. We will reply to your visit request within 15 days.
For other personal information generated by you in the process of using our products or services, we will provide it to you according to the relevant arrangements in "(VII) Responding to your above request" of this article.
7、 How do we deal with minors' information
In digital office/learning, communication and collaborative activities, we presume that you have the corresponding civil capacity. If you are a minor, we require you to ask your parents or other guardians to read this policy carefully and use our services or provide us with information before obtaining the consent of your parents or other guardians.
If you are a child under the age of 14, before you use our services, you and your guardian should carefully read the contents of this privacy policy to ensure that you can use our services under the guidance of your guardian after obtaining the consent of your guardian, and ensure your safety when using our services and conducting transactions.
If you are the child's parent or other guardian, please pay attention to whether the child uses our services after obtaining your authorization and consent. If you have any questions about the child's personal information, please contact our personal information protection professional department.
In the case of collecting personal information of minors by using our products or services with the consent of our parents or guardians, we will only use, share, transfer or disclose this information if laws and regulations allow, parents or guardians expressly agree or it is necessary to protect minors.
8、 How your information is transferred globally
Personal information collected and generated by us in the operation of the People's Republic of China is stored in China, except for the following circumstances:
8.1 Laws and regulations have clear provisions;
8.2 Obtain your explicit authorization;
8.3 You conduct cross-border live broadcast/news release and other personal initiatives through the Internet.
In view of the above situations, we will ensure that your personal information is adequately protected in accordance with this privacy policy.
9、 How to update this privacy policy
In order to bring you a better product and service experience, we continue to strive to improve our products, services and technologies. When new services and business processes change, we may update our privacy policy to inform you of your rights under this policy.
For major changes, we will also provide more significant notifications (including that we will notify you through small red dots or provide you with pop-up prompts),
Major changes referred to in this policy include:
Significant changes have taken place in the business model of the product, such as the purpose of processing personal information, the type of processing personal information, and the use of personal information;
Subject change of privacy policy caused by business adjustment, transaction merger and acquisition, and the new subject receiver changes the original purpose and method of processing;
The main objects of personal information sharing or public disclosure have changed;
Significant changes have taken place in the user's personal information rights and the way in which they are exercised;
When the contact information and complaint channel of the person in charge of handling personal information protection change;
The personal information protection impact assessment report indicates that the product has a significant impact on personal rights and interests; We will also archive the old version of this policy on the special page of this application for your reference.
10、 How to contact us
You can contact us through the following ways, and we will reply to your request within 15 days:
1. If you have any questions, comments or suggestions about the contents of this policy, you can contact us through the applet customer service and the "My" - "Contact customer service" in the applet;
2. If you find that personal information may be leaked, you can report it through the feedback of this application;