Privacy Policy

Update date: [December 02, 2022]

Effective date: [December 02, 2022]

Shenzhen Jiayz Co., Ltd.(hereinafter referred to as "we") is a high-tech enterprise integrating product research and development, production and sales.

We are well aware of the importance of personal information to you, and we will protect your personal information and privacy in accordance with laws and regulations. We formulate this privacy policy and give a special reminder: We hope that you will carefully read and understand this privacy policy before using our applications and related services so that you can make appropriate choices. This privacy policy applies to Saramonic, BOYA Central and other App products developed by us.

Summary

Through this privacy policy, we will introduce to you how we handle personal information in different scenarios. When you open or use our application, we will process relevant information in order to implement the functions and services you choose to use, or to comply with the requirements of laws and regulations. Except for the information required to realize basic functions and services, and the information necessary in accordance with laws and regulations, you can refuse us to process other information, but this may cause us to be unable to provide corresponding functions and services. We will explain the relevant situations item by item in the privacy policy. Important terms regarding your personal information rights have been highlighted in bold, so please pay special attention.

In addition to this privacy policy, in certain scenarios, we will also explain to you the corresponding purpose, scope and use of information through instant notifications (including pop-up windows, page prompts, etc.), function update instructions, etc. These instant notifications and function update instructions, etc. form part of this Privacy Policy and have the same effect as this Privacy Policy.

The following will help you understand in detail how we collect, use, store, transmit, disclose and protect personal information; help you understand how to query, correct, supplement, delete, copy and transfer personal information. Among them, important content regarding your personal information rights has been highlighted in bold, so please pay special attention.

¡¾Table of contents¡¿

1.How we collect and use personal information

2.Partners involved in data use and transfer and disclosure of personal information

3.Manage your personal information

4.How we protect the security of personal information

5.How we store personal information

6.How we protect minors

7.Review and revision of privacy policy

8.Contact us

1 How we collect and use personal information

1.1 Account services

1.1.1 Register and log in

When you register, log in to our applications and use related services, you can create an account through your mobile phone number or email, and you can complete relevant online identity information (avatar, nickname, birthday, password, etc.). We collect this information for To help you complete your registration. Collecting mobile phone numbers is necessary information to fulfill the requirements of national laws and regulations on the online real-name system (real identity information authentication). If you refuse to provide your mobile phone number for registration and login, we may not be able to provide you with information release (including sharing, commenting, etc.) functions. .

Based on our cooperation with communication operators, when you use the "one-click login" function, with your consent, we will use the functions provided by the operator to use the mobile phone number in your device as your registration and login account and free of charge. Based on password or dynamic verification code verification, we provide you with fast registration and login services. If you do not want to use the "one-click login" function, you can register and log in to the application through other methods.

You can use a third-party account to register and log in to the application, but you need to authorize us to obtain your information on the third-party platform (avatar, nickname and other public information and other information authorized by you) to generate applications bound to the third-party account. Account allows you to directly register, log in and use applications and related services. In some cases, we need to re-verify and bind your mobile phone number to confirm the authenticity and relevance of the third-party account.

If you forget how to log in to your app, you can use the password recovery feature. To ensure the security of your account, we may require you to fill in relevant information for verification. If necessary, we may verify your identity through real identity information verification and other methods.

1.1.2 Account public information

We will generate an account as a public identifier for your account when you register the application. You can choose to set user information according to your own needs.

You can fill in your gender, birthday, region and personal introduction to complete your information. Failure to fill in the information will not affect your use of your account and services.

Articles or videos you like (like), products you recommend, and content you collect will be publicly displayed on your account's personal homepage.

When we issue a violation penalty announcement, we will announce the nickname and other information of the offending account.

1.1.3 Unified account

You can use your application account to easily log in and synchronize the accounts and content of other applications developed by us, which may include: sharing your nickname, avatar, region, gender and other account information you have set as public; synchronizing other information you authorize.

1.2 Content browsing and search

When you use the app, we will record your usage. If you are not logged in to your account, we will record your [click, browse, and share information] through the identifier information corresponding to the device. If you have logged in to your account, we will record your [clicks, browsing, sharing, collections, feedback, etc.] through your account.

When providing you with content or services related to the location of your device, with your authorization, we will use geographical location information related to this service (such as precise positioning information, WLAN access points, Bluetooth and base stations, sensor information), To ensure the quality of content or services. The precise positioning information is personal sensitive information. If you refuse to authorize location permission, it will affect the accuracy of positioning, but it will not affect the normal use of other functions and services. We will only use the city and/or the corresponding network information (such as IP). Or show you potentially relevant content or services.

When you use search, we will collect your search keyword information and log records. Search keyword information is temporarily stored on your device, so when you use the search function again on the same device, we will show you your search history.

When you play a video file, in order to adapt to the status of your device, we will call the device's gravity, acceleration and other sensors to identify the horizontal and vertical screen status of your device.

1.3 Information release

1.3.1 Audio, video, graphics and text

When you take audio, video, and pictures, we will ask you to authorize camera, album, and microphone permissions based on the type of function you use. If you refuse authorization, you will not be able to use the corresponding functions, but it will not affect your use of other functions.

1.3.2 Tools

When you use the audio and video special effects, filters, beauty and other tools provided in the app to shoot content, we will use the sensor information based on your operation and the type of tool you use to adapt to the tool you choose. Some tools require processing of your personal information:

(1) If you choose to use a tool that needs to fit the face in the image when shooting content, we need to identify your facial feature value information to provide better visual effects. During this process, unless otherwise expressly stated and with your separate consent, we will not transmit back, store or provide the above information to third parties, and this information will only be processed locally on your device (such as a mobile phone). If you refuse authorization, you will not be able to use this function, but it will not affect your use of other functions.

(2) If you choose to use your geographical location when shooting or editing content, we will use your geographical location information with your authorization. If you refuse authorization, you will not be able to use this function, but it will not affect your use of other functions.

(3) When we refer to services provided by third-party developers, we will publish the relevant policies and terms of the third party's processing of your personal information.

1.4 Other functions

1.4.1 Message notification

You understand and agree that in our operations, we may send you one or more types of notifications, such as messages, at the same time through the contact information (such as phone number) you provide when using products and/or services. Notification, security verification, user experience research; in addition, we may also provide you with commercial information such as services, functions or activities that you may be interested in through text messages and phone calls. But please rest assured that if you do not want to accept this information, you can contact us directly to unsubscribe.

We will push your account updates, content updates you follow, hot content, recommended content, etc. through the system notifications of your device. You can choose to turn off the notification function of the app on your device, or use the notification settings provided by the app. Features Select the information you wish to receive.

1.4.2 Share

When you share, the software client needs to access your clipboard locally and read the links in it to implement jump and sharing functions or services. The client only recognizes the clipboard content locally. In addition, the client will not upload other information about your clipboard to our server. In addition, we may need to read your mobile phone photo album so that you can share videos and pictures.

1.4.3 Application permissions

When we need to use the sensitive privacy permissions involved in this application, we will describe the functional requirements to the user and apply for them. The user can choose to enable the permission to use the relevant functions, or choose to deny the permission and not use the relevant functions.

The sensitive permissions involved are as follows:

(1) Read and write mobile phone storage. We need permission to read/write device storage to read or write necessary information such as video, audio, pictures, files, crash log information, etc. in the storage space to provide you with audio recording, video recording, taking photos, and changing avatars. , download product instruction manual and other functions.

(2) Camera. We need camera permissions to use the mobile phone camera for video recording, taking photos, scanning QR codes and other functions.

(3) Microphone (recording). We need microphone (recording) permission for functions such as recording and video recording.

(4) Positioning (location information). We need positioning (location information) permission for some lower version models to perform Bluetooth search connection function.

(5) Nearby equipment. We need nearby device permissions for functions such as Bluetooth search and connection on some models with higher versions.

(6) Telephone (mobile phone information). We need the phone (mobile phone information) permission to read the mobile phone number information for one-click login function, and to end recording and video recording after getting the call status.

(7) Read the application list. We need permission to read the application list for third-party login, sharing of articles, audio, video and other content, access to the local application market software for software upgrades and other functions.

(8) Notice. We need notification permission for when our company's product is connected to a mobile phone and the application is in the background. Turn on a permanent notification to maintain a continuous connection between the product and the mobile phone, prevent the product from being disconnected, and push related information.

(9) Floating window. We need floating window permissions for some pop-up window functions that need to be adapted to the global context.

(10) Use the acceleration sensor in the application to identify the posture and motion status of the mobile phone, and use it in the audio teleprompter to edit rolling subtitles and change the subtitle layout.

(11) The SMS/authentication service provided within the app requires users to provide relevant information such as mobile phone SIM card and SD card so that we can push relevant SMS messages to users/provide authentication services to facilitate users to register accounts in the APP and use mobile phone verification codes. Login and third-party login.

1.5 Operation and safe operation

We are committed to providing you with safe and trustworthy products and usage environments. Providing high-quality and reliable services and information is our core goal. In order to maintain the normal and stable operation of related products or services and protect the safety and legitimate interests of you or other users or the public, we will collect the following necessary information:

(1) In order to ensure the safe operation, operation quality and efficiency of software and services, we will collect your hardware model, operating system version number, device identifier (Android such as IMEI, AndroidID, OAID, IMSI, ICCID, GAID, MEID , iOS such as IDFV, IDFA; different identifiers will differ in terms of validity period, whether they can be reset by the user, and how to obtain them), network device hardware address (MAC address), hardware serial number, IP address, WLAN access point ( Such as SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service logs, sensor information and other data.

(2) In order to prevent malicious programs and ensure operation quality and efficiency, we will collect installed application information or running process information, the overall operation, usage and frequency of applications, application crashes, overall installation usage, and performance data. , application source.

(3) We may use your account information, device information, service log information, and information that our affiliates and partners have obtained your authorization or can provide to us in accordance with the law to determine account security, transaction security, and identity verification. , Identify violations of laws and regulations, detect and prevent safety incidents, and take necessary recording, analysis, and disposal measures in accordance with the law.

1.6 Use of Cookies and other similar technologies

Similar technologies such as cookies and device information identification are commonly used technologies on the Internet. When you use the application and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information when you access and use this product. We promise not to use Cookies for any other purpose than those stated in this Privacy Policy. We use cookies and similar technologies mainly to achieve the following functions or services:

(1) Ensure the safe and efficient operation of products and services: We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you are safely logged into the service, or whether you have encountered theft, fraud or other illegal activities. These technologies will also help us improve service efficiency and improve login and response speeds.

(2) Help you get an easier access experience: Using this kind of technology can help you save the steps and processes of repeatedly filling in personal information and entering search content (examples: record search, form filling).

(3) Recommend, display, and push content that may be of interest to you: We may use such technologies to understand your preferences and usage habits, and conduct data analysis to improve product services and recommend information or features that users are interested in. and optimize your selection of ads or content.

(4) On the sharing page, we may use cookies to record browsing activities to recommend information to you, troubleshoot abnormal situations related to crashes and delays, and explore better service methods.

(5) Cookie clearing: If you use our webpage, most browsers provide users with the function of clearing browser cache data. You can clear cookie data in the browser settings, but you may not be able to use it after clearing it. Functions or services provided that rely on cookies.

1.7 Changes in service content

Please understand that as our business develops, the products or services we provide may be adjusted. If the purpose, method and scope of processing personal information in the adjusted products or services changes, we will inform you again and obtain your consent in accordance with the relevant requirements of laws and regulations.

1.8 Legally exempted from obtaining consent to process personal information

Please understand that in the following situations, in accordance with laws and regulations, we do not need to obtain your authorization to process your personal information.

a) Necessary to enter into or perform a contract at your request;

b) Necessary to perform legal duties or obligations, such as those directly related to national security, national defense security, criminal investigation, prosecution, trial and judgment execution;

c) It is necessary to respond to public health emergencies, or to protect the life, health and property safety of natural persons in emergency situations;

d) Implement news reporting, public opinion supervision and other activities for the public interest, and process personal information within a reasonable scope;

e) Process within a reasonable scope the personal information you disclose yourself, or other personal information that has been legally disclosed (such as personal information legally disclosed through legal news reports, government information disclosure and other channels);

f) Other situations stipulated by laws and regulations.

Special note: According to legal provisions, if the information cannot identify a specific individual alone or in combination with other information, it does not belong to personal information. When your information can identify you alone or in combination with other information, or when we combine data that is not associated with any specific individual with your personal information, we will treat it as your personal information in accordance with this Privacy Policy Process and protect.

2 Partners involved in the data use process and the transfer and disclosure of personal information

2.1 Partners involved in data use

2.1.1Basic principles

When we cooperate with our partners, we will abide by the following principles:

a) Principle of legality: When data processing activities are involved, the principle of legality should be observed.

b) Principle of legitimacy and minimum necessity: Data use must have legitimate purposes and should be limited to what is necessary to achieve the purpose.

c) Security and Prudence Principle: We will carefully evaluate the purpose of data use by partners, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with legal cooperation agreements. We will conduct strict security monitoring on the software tool development kit (SDK) and application program interface (API) used by partners to obtain information to protect data security.

Access partner SDK directory

2.1.2 Delegated processing

For scenarios where personal information is entrusted to be processed, we will sign relevant processing agreements with the entrusted partners in accordance with legal provisions and supervise their personal information use activities.

2.1.3 Joint processing

For scenarios where we jointly process personal information, we will sign relevant agreements with our partners in accordance with legal provisions and stipulate their respective rights and obligations to ensure that we comply with relevant legal provisions and protect data security in the process of using relevant personal information.

2.1.4 Scope of partners

If specific functions and scenarios involve services provided by our affiliates or third parties, the scope of partners includes our affiliates and third parties.

2.2 Scenarios of cooperation

2.2.1 To realize business functions

a) Geolocation services: When you use geolocation-related services, the location service provider may use your GPS information and device information through SDK or related technologies so that location results can be returned to you. Refusing the above use will only affect the geolocation service function, but will not affect the normal use of other functions.

b) Message notification: To adapt the message push function to the terminal model you are using, terminal device manufacturers (Huawei, Xiaomi, OPPO, VIVO, etc.) may use your mobile phone model, version and related device information through SDK and other technologies.

c) Activity participation: When you choose to participate in the marketing activities organized by us, with your consent, we and our partners may need to use your name, mailing address, contact information and other information.

d) Customer service: In order to handle your complaints, suggestions and other demands in a timely manner, the customer service provider needs to use your account and related information to understand, process and respond to your needs in a timely manner. If necessary, we may also need to use your mobile phone number or other communication methods to contact you.

2.2.2 Implement security and statistical analysis

a) Ensure the safety of use: We attach great importance to the security of products and services. In order to protect the legitimate rights and interests of users from illegal infringement, our partners may use necessary equipment, accounts and log information.

b) Analyze product situation: In order to analyze the stability of the application's products and services, partners providing analysis services may need to use information such as service status (crash and crash records), device identification information, and overall application installation and usage.

c) Academic research: In order to improve scientific research capabilities in related fields and promote the level of scientific and technological development, we may use de-identified or anonymized data with cooperative scientific research institutes, universities and other institutions on the premise of ensuring data security and legitimate purposes. data.

2.3 Change of operating entity

As our business continues to develop, we may conduct mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. When the aforementioned changes occur, we will require the successor to protect your personal information in accordance with laws and regulations and security standards no lower than those stated in this Privacy Policy. If the successor changes the original purpose and method of processing, we will require the successor to protect your personal information. The successor must obtain your authorization and consent again.

2.4 Cessation of operations

If we stop operating products or services, we will promptly stop collecting your personal information. We will notify you of the cessation of operations by delivering notices one by one or in the form of announcements, and delete or anonymize the personal information we hold related to the closed products or services.

2.5 Public

We will not proactively disclose information that you have not disclosed yourself, unless we comply with national laws and regulations or obtain your consent.

2.6 Circumstances in which your authorization and consent are not required by law

Please understand that in the following circumstances, in accordance with laws, regulations and national standards, partners do not need to obtain your authorization to use, or we transfer or disclose your personal information:

a) Necessary to enter into or perform a contract at your request;

b) Necessary to perform legal duties or obligations, such as those directly related to national security, national defense security, criminal investigation, prosecution, trial and judgment execution;

c) It is necessary to respond to public health emergencies, or to protect the life, health and property safety of natural persons in emergency situations;

d) Implement news reporting, public opinion supervision and other activities for the public interest, and process personal information within a reasonable scope;

e) Process within a reasonable scope the personal information you disclose yourself, or other personal information that has been legally disclosed (such as personal information legally disclosed through legal news reports, government information disclosure and other channels);

f) Other situations stipulated by laws and regulations.

3 Manage your personal information

We attach great importance to your management of personal information and do our best to protect your rights to access, copy, correct, supplement, delete, withdraw consent, cancel your account, complain and report, etc., so that you have the ability to understand and protect your personal information. Your personal information is safe.

But please understand that specific business functions and services will require your information to be completed. When you withdraw your consent or authorization, we will no longer be able to provide you with the corresponding functions and services, and we will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect our previous processing of personal information based on your authorization.

The management paths we provide in different versions or operating systems may be different, please refer to the actual situation.

3.1 Setting management

3.1.1 Basic function mode

Audio and video recording is our basic function, so if you only allow us to process the personal information necessary to achieve basic functions, you can choose to turn on the basic function mode.

In this mode, we will only process your personal information based on the need to provide basic functions and protect system security, that is, you can browse audio, video and article content, but cannot post any content including comments, likes, and collections. The videos and other information you see will also be randomly pushed by us from the selected content; you can use the search function, and we will only provide search results based on your search keywords and will not optimize the search results.

3.1.2 System permission settings

a) You can turn on or off permissions such as geographical location, address book, camera, microphone, photo album, etc. in the device settings function, change the scope of authorization, or withdraw your authorization. After withdrawing your authorization, we will no longer collect information related to these permissions, but it will not affect our previous processing of personal information based on your authorization.

b) You can choose whether to receive system notifications sent by the application in the device settings, or set the form of system notifications you wish to receive.

3.1.3 Account management

You can manage your account or apply for related services in [My]-[Settings]-[Account and Security]:

In [Save Login Information], you can choose whether you want us to record your historical login information.

[Authorization Management] can manage your authorization for other third-party products or services. Please note that after you cancel authorization for other third-party products or services, you cannot use your software account to log in to that third-party product or service again.

[Third-party account binding] allows you to manage the third-party accounts bound to your software account.

[Login Device Management] allows you to manage the devices, login methods and products that your software account has recently logged into. You can select [Log Off Now] to log out of this login.

3.1.4 Controlling the storage/disclosure scope of information

(1) You can control the storage/disclosure scope of information in [My]-[Settings]-[Privacy Settings] in the following ways:

[Browsing History] allows you to control whether your browsing of a certain content will be seen by the author of the content. After turning it off, you won't be able to see the browsing history of your content being viewed.

[Share with people you may know] allows you to control whether to recommend you to people you may know. After closing, we will not recommend you to him or her based on possible connections between you and other users, or your mobile phone number stored in other users' address books.

3.1.5 Independent subscription and personalized content

a) If you do not want to be recommended personalized content, you can turn off "Personalized content recommendation". When you choose to turn off personalized content recommendations, you will no longer be shown content related to your personal information or interests.

b) When you are not interested in specific content or want to reduce the recommendation of a certain type of content, you can long press the content and select "Not interested", and we will adjust the strategy based on your feedback. At the same time, we also provide a "Feedback" portal to listen to your opinions and suggestions.

c) The content you follow will be displayed in the following channel.

d) When there is no content you are interested in, you can also enter the keywords you are interested in in the search bar, click and read the search results.

3.2 Copy and transfer your personal information

If you need a copy of the personal information we collect and store, you may contact us via the contact information listed at the end of the Agreement.

If you need to transfer the personal information we collect and store, we will provide you with a transfer path in accordance with the requirements of laws and regulations.

3.3 Account cancellation

You can log out of your account in [My]-[Cancel Account]. Before you cancel your account, we will verify your personal identity, security status, device information, etc. that you have authorized to us. You know and understand that the act of canceling your account is irreversible. When you cancel your account, we will delete relevant information about you. If it is technically difficult to delete personal information, we will anonymize it or stop deleting it. Storage and processing without taking necessary safety protection measures, unless otherwise provided by laws and regulations.

In addition to the above, if you or other entitled parties have any claims, requirements or questions about the exercise of personal information rights granted by relevant laws and regulations, you can go to [Me] - [Settings] - [Feedback and Help] and enter the User Contact us through the feedback interface. We will review the issues involved as soon as possible and respond within fifteen working days after verifying your user identity.

4 How we protect the security of personal information

We attach great importance to the security of your personal information and will strive to take reasonable security measures to protect your personal information, ensure that our personal information processing activities comply with the requirements of laws, administrative regulations or other applicable systems in accordance with the law, and prevent unauthorized access and personal information leakage, tampering, and loss.

4.1 Safety technical measures

We will use encryption, de-identification technology, anonymization and related reasonable and feasible means that are no lower than the usual industry level to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

4.2 Management system

We will establish a special security management system and data security process to ensure the security of your personal information. We adopt strict data use and access policies to ensure that only authorized personnel have access to your personal information. We will regularly conduct security education and training for personnel, and conduct security audits of data and technology in a timely manner.

We will formulate and organize the implementation of contingency plans for personal information security incidents, and immediately activate the contingency plans when personal information security incidents occur, and strive to control the impact of these security incidents and prevent the expansion of adverse consequences. Once a personal information security incident (leakage, tampering, loss) occurs or may occur, we will promptly inform you of the following circumstances in accordance with the requirements of laws and regulations: the types, reasons and possibilities of personal information leakage, tampering, or loss that occur or may occur. The harm caused, the remedial measures we have taken, steps you can take to mitigate the harm and how to contact us.

We will promptly notify you of event-related information through push notifications, emails, letters, text messages and related forms. When it is difficult to inform you one by one, we will issue announcements in a reasonable and effective manner.

At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of relevant regulatory authorities.

4.3 Safety tips

Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if every effort is made to strengthen security measures, It is also impossible to always guarantee 100% information security. We will try our best to ensure the security of the personal information you provide to us.

You know and understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.

5 How we store personal information

5.1 Storage location

In accordance with the provisions of laws and regulations, we will store your personal information collected and generated during our operations within the territory of the People's Republic of China. We will not transfer the above information overseas. If we transfer it overseas, we will comply with relevant national regulations or seek your consent.

5.2 Storage period

a) We will only retain your personal information for the period necessary to provide you with software products or services, such as:

Mobile phone number: After you register and log in with your mobile phone number, we need to continue to retain your mobile phone number in order to provide you with normal services, respond to your possible inquiries and complaints, and ensure the security of your account and system.

The content and related information you publish will be retained by us to provide you with ongoing business functions until you withdraw, delete or cancel your account.

b) If you cancel your account, voluntarily delete your personal information, or the information exceeds the necessary retention period, we will delete or anonymize your personal information, except for the following circumstances:

Comply with the information retention requirements of laws and regulations (for example: the "E-Commerce Law" stipulates that product and service information and transaction information shall be retained for no less than three years from the date of completion of the transaction).

Reasonable extension of the time limit is necessary for financial, auditing, dispute resolution, etc. purposes.

6 How we protect minors

6.1 General Terms for Minors

a) If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using relevant services.

b) If you are the guardian of a minor under the age of 14, you should read and agree to this privacy policy for your ward before using relevant services.

c) We protect the personal information of minors in accordance with relevant national laws and regulations and will only collect, use, share or disclose minors as permitted by law, with explicit consent from parents or other guardians, or as necessary to protect minors. personal information. If we discover that we have collected personal information from a minor without first obtaining verifiable parental or other guardian consent, we will seek to delete the relevant information as quickly as possible. At the same time, we have established strict rules for the collection and use of minors' information to protect the personal information security of children (under 14 years old) and teenagers (over 14 years old but under 18 years old).

d) If you are the guardian of a minor, if you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information disclosed in this privacy policy.

7 Review and revision of privacy policy

7.1 View

a. You can view this privacy policy on the registration login page, or on the [Me]-[Settings]-[Privacy Policy] page after logging in to your account.

b. Please understand that in order to meet operational needs, we may develop different versions based on the mobile phone model, system version, mobile client and other factors you are using. Therefore, when you use a specific version, the functions of the software may be inconsistent with this privacy policy. There are differences in the policy descriptions, but they will not affect the purpose, method and scope of data processing. The specific available functions are subject to your actual use.

7.2 Updates and notifications

a. In order to provide you with better services, software products and services will be updated and changed from time to time, and we will revise this privacy policy from time to time. Without your explicit consent, we will not reduce your rights under the currently effective Privacy Policy.

b. After this Privacy Policy is updated, we will issue an updated version within the app and remind you of the updated content through an in-site message or other appropriate means so that you can keep abreast of the latest version of this Privacy Policy.

c. We may also help you better manage your personal information through function updates. Please pay attention to the relevant function descriptions.

8 Contact us

8.1 Complaints and Reports

If you think your personal information rights may have been infringed, or find clues that your personal information rights have been infringed, you can go to [Me] - [Settings] - [Feedback and Help] and enter the user feedback interface to contact us.

We will respond to your complaint and report within fifteen working days after verification.

8.2 Other issues

If you have questions or suggestions about personal information protection, you can choose to contact us through the following methods:

a) Send an email to se002@sz-cf.cn

b) Mail to the Data Security and Privacy Protection Center of the Legal Department, Room 2201, Building 11, Tianan Yungu, Bantian, Longgang District, Shenzhen

We will review your questions or suggestions as soon as possible and respond within fifteen working days after verifying your user identity.