POLICY


Privacy Policy






We want to help you understand how we collect, use and store your personal information and what your rights are through our Privacy Policy ("this Policy").

This policy is closely related to your use of our services. We recommend that you carefully read and understand the entire content of this policy before starting to use it. We strive to use plain and concise language to express ourselves, and we use bold fonts to highlight the clauses that are of significant relevance to your rights to draw your attention.

By using or continuing to use our services, you agree that we may collect, use, store, and share your relevant information in accordance with this policy.

This policy will help you understand the following:

1. How We Collect and Use Your Information;

2. Information Storage;

3. Information Security;

4. How We Use the Information;

5. Provision to Third Parties;

6. Your Rights;

7. Modification

8. Protection of Minors;

9. Contacting Us.


一、 How We Collect and Use Your Information;

When you use our products or services, the personal information we may need to collect and use from you includes the following:"

1.In order to provide you with the basic functions of our products or services, you need to authorize us to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use our products or services.

2.In order to provide you with additional features of our products or services, you choose to authorize us to collect and use the information. If you refuse to provide it, you will not be able to use the additional functionality or achieve the functionality we intend to achieve, but it will not affect your ability to use the basic functionality of our products or services.

You understand and agree:

1."We are committed to creating a variety of products and services to meet your needs. Due to the diverse range of products and services we offer and the different choices made by users, there may be differences in the basic/additional features and the types and scope of personal information collected and used. Please refer to the specific product or service for accurate information.

2. In order to provide you with a better product and service experience, we are continuously working to improve our technology. As a result, we may occasionally introduce new or optimized features that may require the collection and use of new personal information or changes in the purpose or manner of using personal information. In such cases, we will provide you with separate explanations of the purpose, scope, and manner of collecting the corresponding information through updates to this policy, pop-ups, page prompts, etc. We will also provide you with the option to give your voluntary consent, and we will only collect and use the information after obtaining your explicit consent. If you have any questions, opinions, or suggestions during this process, you can contact us through the various contact methods we provide, and we will respond to you as soon as possible.

We collect and use your personal information to fulfill the functions described below in this policy:

Help You Become Our User

In order to comply with the requirements of laws and regulations, when you register as our user, you need to provide your cell phone number and SMS function to create an account. If you only need to use basic services such as browsing and searching, you do not need to register as our user and provide the above information.

When you use your account, in order to maintain your basic information and improve your service experience, you can improve your network identification information (e.g., avatar, user name and login password, etc.).

Authorized Login: We may share your account information (avatar, nickname, and other information that you have agreed to share) with third parties with your consent so that you can conveniently register or log in to third party accounts. In addition, we may obtain your account information from the third party according to your authorization and bind it with your avatar account, so that you can directly log in through the third party account, use our products or services, or realize the relevant rights and interests of interoperability between accounts. We will use your information within the scope of your authorization according to the agreement with the third party.

Provide You with Information Display of Goods or Services

In the course of your use of our Services, in order to understand product suitability, identify account anomalies, and provide you with page displays and search results that better suit your needs, we may ask you to provide or automatically collect your usage and store it as web log information, including:

1.2.1 Location Information: We may use technologies to locate your physical location, including IP addresses, GPS, and sensor technologies such as WLAN access points, Bluetooth, and base stations that can provide this information. We only collect information about your geographic location at the time, but we do not correlate your location information from time to time to determine your whereabouts.

You can view the status of location information permissions on your device or in our client and turn them on or off at any time at your discretion. You understand and agree that by turning off the location feature and stopping our collection of your geolocation information, you may not be able to use the services we provide to you based on your geolocation, or may not be able to achieve the intended results of the relevant services.

1.2.2 Device Information: We will receive and record device-related information based on your specific operations during software installation and usage, including device model, operating system version, device settings, unique device identifiers, information about mobile applications and other software, as well as hardware and software characteristic information. We may also collect location-related information of the device, including GPS location authorized by you, WLAN access points, Bluetooth, and base station information.

1.2.3 Service Log Information: When you use our website or client-provided products or services, we automatically collect detailed usage information about our services, which is saved as service logs. This includes browsing, clicking, searching queries, bookmarking, sharing, downloading, as well as IP address, telecommunications operator, language used, and access date and time.

Please note that individual device information, log information, and location information alone cannot identify the specific identity of a natural person. If we combine such non-personal information with other information to identify the specific identity of a natural person, or if we combine it with personal information, during the period of combination, such non-personal information will be treated as personal information. Unless authorized by you or otherwise provided by laws and regulations, we will anonymize and de-identify such information. In order to provide you with more convenient and personalized information display, search, and push services, we will extract your preference characteristics based on your device information, location information, and service log information, and create indirect audience profiles based on these characteristics, and display and push information accordingly.

In addition, we will also use the above-mentioned information to continuously improve and optimize the mentioned functionalities.

To provide you with bookmarking, downloading settings, and sharing functions.

In the process of browsing our website or client, you can choose to bookmark, download and share the products you are interested in. In order to do so, we need to use the storage function of your cell phone when you use the above functions.

Others

1.If the information you provide contains personal information about other users, you need to ensure that you have obtained legal authorization before providing such personal information to us.

2.If we use the information for purposes not specified in this policy, or if we use the information collected for specific purposes for other purposes, or if we proactively obtain your personal information from third parties, we will seek your consent in advance.

If we indirectly obtain your information from a third party, we will explicitly request the third party in writing to collect personal information only after obtaining your consent in accordance with the law. We will inform you of the shared information and, for sensitive information, we will require your explicit confirmation before using it. We will also require the third party to make commitments regarding the legality and compliance of the personal information source. If the third party violates these commitments, we will explicitly request them to assume corresponding legal responsibilities. Additionally, our professional security team will strengthen the security of personal information, including sensitive information reporting, encrypted storage of sensitive information, and access control. We will use no less than the same protection means and measures for our own users' personal information to protect the personal information obtained indirectly.


3.Exceptions to Obtaining Authorized Consent

You fully understand and agree that, in accordance with relevant laws and regulations, we do not need to obtain your authorized consent to collect and use your personal information in the following circumstances, and we may not respond to your requests for correction/amendment, deletion, cancellation, withdrawal of consent, or request for information:

1) Related to national security and national defense security; 

2) Related to public security, public health, and significant public interests;

3) Related to crime investigation, prosecution, trial and judgment execution;

4) For the purpose of safeguarding the subject of personal information or other individuals' life, property and other important legitimate rights and interests, but it is difficult to obtain your consent; 

5) The collected personal information is disclosed to the public by yourself; 

6) Personal information is collected from legitimate publicly disclosed information, such as legitimate news reports, government information disclosure and other channels; 

7) Necessary for signing a contract at your request;

8) Necessary for the secure and stable operation of the provided products or services, such as discovering and handling faults in products or services;

9) Necessary for legitimate journalistic purposes; 

10) Necessary for academic research institutions to conduct statistics or academic research based on public interests, and when providing academic research or describing the results to the public, the personal information contained in the results is de-identified;

11) Other circumstances as stipulated by laws and regulations.

4. If we cease to operate coach related products or services, we will promptly cease activities that continue to collect your personal information, notify you of the cessation of operations by delivering notice to you individually or by means of a public announcement, and delete or anonymize personal information that we hold in connection with the discontinued business.

1. When you voluntarily cancel your account, we will make it anonymous or delete your personal information as soon as possible in accordance with applicable laws and regulations.


2. Information Storage;

2.1 Location of Information Storage

We will store the personal information of users collected within China in accordance with the laws and regulations.

Currently we do not transfer or store your personal information across borders. If we need to transfer or store your personal information across borders in the future, we will inform you of the purpose of the information leaving the country, the recipients, security measures and security risks, and obtain your consent.

2.2 Methods and Duration of Information Storage

Images or videos: When you use functions such as bookmarking to save images or videos, we need to store the aforementioned information and related comments to ensure your normal use. When you actively delete the aforementioned information, we will delete the corresponding information. In the event that our products or services cease operation, we will notify you through push notifications, announcements, etc., and delete your personal information or anonymize it within a reasonable period of time.


3.Information Security;

3.1 Security Protection Measures

We strive to provide security for users' information to prevent leakage, loss, improper use, unauthorized access and disclosure of information. We use multi-faceted security measures to ensure that the protection of users' personal information is at a reasonable level of security, including technical protection means, management system controls, security system safeguards and many other aspects. In addition, we have passed the evaluation and filing of the National Network Security Level Protection (Level 3).

We utilize industry-leading technical protection measures. The technical means we use include, but are not limited to, firewalls, encryption (e.g., SSL), de-identification or anonymization, and access control measures. In addition, we continually enhance the security capabilities of the software installed on your device. For example, we will complete some of the encryption of information locally on your device to consolidate secure transmission; we will know information about applications installed on your device and processes running to prevent viruses, Trojan horses and other malicious programs.

We have established management systems, processes and organizations dedicated to safeguarding the security of personal information. For example, we strictly limit the scope of persons accessing information, require them to comply with confidentiality obligations and conduct audits, and impose penalties in accordance with regulations on persons who violate their obligations. We also review this management system, process and organization to prevent unauthorized access, use or disclosure of user information by unauthorized persons.

3.2 Security Incident Response Measures

If a security incident such as personal information leakage, damage, or loss occurs, we will activate the emergency response plan to prevent the incident from spreading. After a security incident occurs, we will promptly inform you of the basic situation of the incident, the measures we are about to or have already taken for disposal and remediation, and our suggestions for your response, through push notifications, system messages, or other means. If it is difficult to inform each individual, we will issue warnings through announcements or other means.


4 How We Use the Information;

We strictly comply with the provisions of laws and regulations as well as agreements with users, and use the collected information in accordance with the privacy protection guidelines stated herein, in order to provide you with better quality services.

4.1 Rules for the Use of Information

We use the information collected in accordance with the following rules:

1) We will provide you with features and services based on the information we have collected, including services such as the provision of appropriate filters.

2) We will use cookies and related technologies to collect your account number, search history, browsing history, location information and other characteristics to provide you with personalized services, including indirect crowd profiling based on the characteristics of the corresponding account number label and provide you with more accurate and personalized services and content, display more relevant advertisements or other promotional content to optimize the experience of the personalized services, as well as to evaluate and improve the effectiveness of our advertisements and other promotional activities; 1) We will provide you with various functions and services based on the information that we have collected, including the provision of corresponding filters and other services

4.2 Obtaining Consent After Informing the Purpose of the Changes.

We will use the collected information within the scope covered by this privacy protection guideline. If we use your personal information beyond the purposes stated at the time of collection and beyond the scope that has a direct or reasonable connection, we will inform you again and obtain your explicit consent before using your personal information.


5.Provision to Third Parties;

Currently, we will share information with our APP partners so that they can send users information about their relevant products and services. When we share your information, we will urge affiliated companies, alliance members, partners, or other trusted third-party suppliers, service providers, and agents to comply with the privacy policy and require them to take relevant confidentiality and security measures to handle the aforementioned information. We will use technologies such as IP address, GPS, WLAN access points, Bluetooth, and base stations to determine your actual location. We only collect the geographical location where you are at that time, but we will not associate the location information of different time periods to track your movements.

We will not publicly disclose the collected personal information to third parties. If it is necessary to disclose it publicly, we will inform you of the purpose of the disclosure, the types of information to be disclosed, and any sensitive information that may be involved, and obtain your explicit consent.

As our business continues to grow, we may engage in transactions such as mergers, acquisitions, and asset transfers. We will inform you of relevant situations and continue to protect your personal information in accordance with laws and regulations and standards that are no less stringent than those required by this guideline. We will also require any new controllers to continue protecting your personal information.

In addition, according to relevant laws, regulations, and national standards, the following circumstances may allow us to share, transfer, or publicly disclose personal information without obtaining prior authorization from the data subject:

1) Related to national security and national defense security; 

 2)Related to public security, public health, and significant public interests;

 3)Related to crime investigation, prosecution, trial and judgment execution;

4)For the purpose of safeguarding the subject of personal information or other individuals' life, property and other important legitimate rights and interests, but it is difficult to obtain your consent; 

5)Personal information that the subject of the personal information discloses to the public by himself/herself;

6)Personal information is collected from legitimate publicly disclosed information, such as legitimate news reports, government information disclosure and other channels; 


6. Your Rights;

In order to make it easier for you to access, correct and delete your personal information, as well as to protect your right to withdraw your consent to the use of your personal information and to cancel your account, we have provided you with the appropriate operational settings in our product design, and you can refer to the following guidelines for operation. In addition, we have also set up a channel for complaints and reports, and your comments will be dealt with promptly.


7.Modification

We may revise this guideline from time to time. When there are changes to the terms of the guideline, we will notify you of the updated guideline through push notifications, system messages, pop-ups, or other forms when you log in or update the version. Please note that we will only collect, use, and store your personal information in accordance with the updated guideline after you click the "Agree" button in the pop-up.


8.Protection of Minors;

We attach great importance to the protection of personal information of minors. According to relevant laws and regulations, if you are under the age of 18, you should obtain written consent from your parent or legal guardian before using our website services. If you are the guardian of a minor and have any questions regarding the personal information of the minor you are responsible for, please contact us through the contact information provided in Article 9.