We are well aware of the importance of personal information to you, and will do our best to protect your personal information safe and reliable, we are committed to maintaining your trust in us, abide by the following principles, protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of opt-in consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security solutions in the industry. In view of this, we have formulated this Privacy Policy (hereinafter referred to as “this Policy/this Privacy Policy”) and remind you that:
This Policy applies to any of our software and related services. Before using our software and related services, please be sure to read and understand this Policy carefully, and use the relevant products or services after confirming that you fully understand and agree to it. Once you use our software and related services, it means that you have fully understood and agreed to this policy. If you have any questions, comments or suggestions about the content of this Policy, you can contact us through the various contact information provided by us.
This Privacy Policy section will help you understand the following:
- Personal information we collect from you and its purposes
- We may need to obtain your device permissions
- How we share and disclose your personal information
- How we protect your personal information
- How do you manage your personal information?
- How we process the personal information of minors
- Where and how we store your personal information
- How this Privacy Policy is updated
- How to contact us
- The personal information we collect from you and its purposePersonal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information, and we will collect and use personal information for the following purposes:
(1) We may keep your communication/call records and content or the contact information you leave when you contact us, so as to contact you or help you solve the problem, or record the handling plan and results of the relevant problem.
(2) Exceptions to obtaining authorization and consent
In accordance with relevant laws and regulations, your authorization and consent are not required for the collection of your personal information under the following circumstances:
- Related to national security and national defense security;
- Related to public safety, public health, or major public interests;
- Related to criminal investigation, prosecution, trial and execution of judgments;
- For the purpose of protecting the life, property and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain your consent;
- The personal information collected is disclosed to the public by yourself;
- Personal information is collected from legally and publicly disclosed information, such as lawful news reports, government information disclosure, and other channels;
- It is necessary to sign a contract according to your requirements;
- Other circumstances stipulated by laws and regulations.
- Your permissions that we may need to obtain:
Note! Not all of our apps will require these permissions. When you use our APP, please pay attention to the permission information.
(1) Some of our APPs require an Internet connection to use, and in these APPs, we need to have network access.
(2) Our products may integrate some information collection content, including collecting your device Mac address and unique device identification code (IMEI/androidID/IDFA/OPENUDID/GUID) to provide statistical analysis services.
(3) In order to enable you to enjoy the services and functions listed in the following table, we will embed our partners’ third-party software tool development kits (SDKs), code plug-ins or other similar applications in the applications, and we will conduct security tests on the application programming interfaces (APIs) and software tool development kits (SDKs) of the partners to obtain relevant information, and agree on strict data protection measures with the authorized partners, so that they can comply with the purpose of our entrustment, service description, This Privacy Policy and any other relevant confidentiality and security measures for the processing of personal information involving the embedding of third-party codes, plug-ins and personal information are listed below:
A、
Scenario description: An ad request
Personal information type: mobile device information, location information, SD card reading and writing, network type
Personal information fields: IMEI, IMSI, UNIQUE DEVICE IDENTIFIER, system version, MAC address, latitude and longitude, application list, and network type
NAME OF THE THIRD PARTY: GOOGLE
De-identification of data transfer: Yes
B、
Scenario description: An ad request
Personal information type: mobile device information, location information, SD card reading and writing, network type
Personal information fields: IMEI, IMSI, UNIQUE DEVICE IDENTIFIER, system version, MAC address, latitude and longitude, application list, and network type
Name of the third-party organization: Pangle
De-identification of data transfer: Yes
C、
Scenario description: An ad request
Personal information type: mobile device information, location information, SD card reading and writing, network type
Personal information fields: IMEI, IMSI, UNIQUE DEVICE IDENTIFIER, system version, MAC address, latitude and longitude, application list, and network type
Name of the third-party organization: UNITY
De-identification of data transfer: Yes
III. How We Share and Disclose Your Personal Information
(1) Sharing: We will not share your personal information with any third party, but if you voluntarily choose to share it or otherwise authorize us to share it with a third party, we will share the personal information that you agree to or choose to share with the third party designated by you.
(2) Disclosure: We will not disclose your personal information to any third party, except in the following circumstances:
- If you voluntarily choose to disclose or otherwise authorize us to disclose to a third party, we will disclose the personal information that you agree to or choose to disclose to the third party designated by you.
- We disclose your personal information in accordance with relevant laws and regulations based on the following circumstances:
(1) Related to national security and national defense security;
(2) Where it is related to public safety, public health, or major public interests;
(3) Where it is related to criminal investigation, prosecution, trial, or enforcement of judgments;
(4) For the purpose of protecting the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the individual;
(5) Personal information is collected from legally and publicly disclosed information, such as lawful news reports, government information disclosure, and other channels;
(6) Other circumstances stipulated by laws and regulations or required by the driver’s authority.
IV. How We Protect Your Personal Information
(1) We strive to provide security guarantees for users’ personal information to prevent illegal use, unauthorized access and disclosure, leakage, damage and loss of users’ personal information. We will use various security measures to protect the security of information within a reasonable level of security. For example, we use encryption technology (e.g., SSL), anonymization and other means to protect your personal information; Carry out security and personal information protection training courses to strengthen employees’ awareness of the protection of personal information.
(2) We will take reasonable and practicable measures to avoid collecting irrelevant personal information. If you find that your personal information, especially your account or password, has been compromised, please contact us immediately so that we can take appropriate measures according to your application. Please note that the information you voluntarily share or even publicly share when using our services may involve your or others’ personal information, so please consider more carefully whether to share or even publicly share relevant information when using our services. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
V. How do you manage your personal informationYou can access and manage your personal information in the following ways:
(1) Access to your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations, and you have the right to request that we correct or supplement your personal information if you find that there is an error in the personal information we process about you. You may submit a request for correction or supplementation in the manner set out in “(1) Access to your personal information” in this Article.
(2) Delete your personal information
You may delete part of your personal information in the manner listed in “(1) Access to your personal information” in this article.
You may request us to delete your personal information under the following circumstances:
- If our processing of personal information violates laws and regulations
- If we collect and use your personal information without your explicit consent;
- If our processing of personal information seriously violates the agreement with you;
- If you no longer use our products or services, or you voluntarily cancel your account;
- If we permanently no longer provide you with products or services. If we decide to respond to your deletion request, we will also notify the subjects who have obtained your personal information from us as far as possible and request them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these subjects have obtained your independent authorization.
When you delete information from our Services, we may not immediately delete the information from our backup systems, but we will delete it when the backup is updated.
(3) Changing the scope of your authorized consent
Each business function requires some basic personal information in order to be completed (see Article 1 of this Privacy Policy). In addition, for the collection and use of additional personal information, you can
You can give or withdraw your consent for the collection and use of additional personal information in the settings or by contacting our customer service email address. When consent is withdrawn, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.
(4) Responding to your request
For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will respond within 7 days. If you are not satisfied, you may also initiate a complaint through our customer service email address.
In principle, we do not charge you for reasonable requests, but we may charge a fee for requests that are repeated more than is reasonable. We may refuse requests that are unnecessarily repetitive, require excessive technical means (e.g., the development of a new system or a fundamental change in existing practices), pose a risk to the legal rights of others, or are highly impractical.
In the following circumstances, we will not be able to agree to U-Ul’s request in accordance with the requirements of laws and regulations:
- Related to national security and national defense security;
- Related to public safety, public health, or major public interests;
- Related to criminal investigation, prosecution, trial and enforcement of judgments;
- There is sufficient evidence showing that the Personal Data Subject has subjective malice or abuses rights;
- Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
- Involving trade secrets.
VI. How we handle minors’ personal information
1、We pay special attention to the protection of minors’ personal information. If you are a minor under the age of 14, before using our products and or services, please be sure to read this policy accompanied by your guardian, and ensure that you have obtained your guardian’s explicit consent before using our services and providing us with your personal information.
2、We will only use, share, transfer or disclose the personal information of minors collected through the use of our products or services with the consent of their guardians when permitted by laws and regulations, with the explicit consent of their guardians, or when it is necessary for the protection of minors.
3、If your guardian does not agree with your use of our services or provision of personal information to us in accordance with this policy, please terminate your use of our services immediately and notify us promptly.
4、If you have any questions about the use of our products or services by minors under your guardianship or the user information they provide to us, please contact us promptly.
VII. Where and how we store your personal information Your personal information that we collect in accordance with this Policy is stored within Singapore.
Your personal information that we collect in accordance with this policy is stored in an encrypted manner.
Your personal information that we collect in accordance with this policy will be deleted or logged out immediately after you delete or anonymize it in accordance with relevant laws and regulations, except for those that require an extended retention period in accordance with relevant laws and regulations or the requirements of judicial authorities. During the extended preservation period, we will store your personal information in encrypted form safely and isolate it until it can be deleted or anonymized according to the requirements of relevant laws and regulations or judicial authorities.
VIII. How this privacy policy is updated Our privacy policy is subject to change.
Without your express consent, we will not limit your rights under this Privacy Policy. For significant changes, we will provide notable notices (including we will notify you through public notification or even provide you with pop-up reminders).
Material changes referred to in this policy include, but are not limited to:
- Significant changes in our service model. For example, the purpose of processing personal information, the type of personal information processed, and how personal information is used;
- A significant change in our control, etc. Such as changes in ownership due to mergers, acquisitions, reorganizations, etc;
- Changes in the primary recipients of personal information shared, transferred, or publicly disclosed;
- Significant changes in your right to participate in the handling of personal information and the manner in which it is exercised;
(5) Changes in the department responsible for handling the security of personal information, contact information and complaint channels;
- When the security impact assessment report of personal information indicates that there is a high risk.
IX. How to contact us.
If you have any questions, comments or suggestions about this privacy policy, contact us through the following ways:
Contact: never_suki01@163.com