Condensed version of privacy policy

As the operator of ifnovel (hereinafter referred to as "this software"), Tianjin Shuchen Technology Co., Ltd. and its affiliates (hereinafter referred to as "we"), we are fully aware of the importance of personal information to you and will do our best to protect your personal information. Safe and reliable. This concise guide will help you understand intuitively and concisely how we collect and process personal information and how to protect your privacy information. Please read the complete privacy policy for this software below for more details.

1. How we collect and use information
(1) Contact information
[Help and Feedback] When you submit a complaint, feedback or suggestion, we may contact you through the mobile phone number you provided.
(2) Browsing and search records
[Browsing History] In order to show you your bookshelf records, we will collect your added bookshelf records.
[Search record] When you use our search service, we will record your operation log, including search keywords, cumulative usage time, books and chapters read.
(3) Equipment information
[Ensure security] In order to ensure the security of your account and system, we will obtain your device number, device unique identifier (IMEI, OAID, AndroidID, ICCID, SIM card information), IP address, device manufacturer, device model, operation System, network access method, network status, network quality data, system setting information and operation, usage and service logs.

(4) Clipboard

[Third Party Activities] When you start this software, in order to determine whether you participate in specific activities we carry out with third parties, we will read the contents of your clipboard to identify whether there is relevant password information. Only if the clipboard has the aforementioned We will only collect the information for verification and feedback activity benefits to you when the information is received. We will not store other information on your clipboard, and separate clipboard information cannot identify your specific identity.
(5) Help and feedback: When you provide "feedback" through this software, we need you to provide account information and problem description. At the same time, we may ask you to provide your mobile phone number and other personal information.
(6) Personalized content recommendation
[Personalized content recommendation] In order to recommend books of interest to you for personalized recommendations, we will collect your reading behavior, reading time, adding bookshelf behavior, reading preferences, nickname, gender, and IP address to implement personalized content recommendations. After personalized content recommendation is turned on, we de-identify the personal information we collect and use. The data analysis only corresponds to specific codes that cannot be directly associated with the user's identity. It cannot and will never be associated with your real identity.
If you are not interested in the content we recommend for you, you can turn off personalized recommendations through [My] - [About Us] - [Understand and Manage Personalized Recommendations]. After you close it, we will not provide personalized recommendation services. , and does not affect the normal use of other products and services we provide.
(7) Basic functions
If you only want ifnovel to provide you with basic function mode, including novel reading, you can choose to enter the basic function mode. In the basic mode, if you turn on the basic function mode, we will not collect your personal information in accordance with the relevant provisions of laws and regulations. In basic mode, you can only use our products and services in browsing mode (that is, not logged in), and in basic function mode, you cannot use registration/login, content recommendation, event participation, content search and other services.
You can re-enter ifnovel after withdrawing your consent to the privacy policy and choose to use basic functional mode.
2. Third-party data processing involved in our services
In the process of cooperating with third parties, we strictly abide by the provisions of laws and regulations, follow the principle of minimum necessity, and process relevant data safely and prudently. We will sign strict confidentiality agreements with third parties, requiring them to handle personal information in accordance with our requirements, this Privacy Policy, and any other relevant confidentiality and security measures required by laws and regulations.
3. How we protect information
We adopt various physical, electronic and management security measures that are in line with industry standards and are reasonably feasible to protect the security of your personal information; we will use encryption technology, anonymization processing and related reasonable and feasible means that are no lower than those of industry peers for protection. Your personal information; we will establish a dedicated security department, security management system, and data security process to manage and regulate the storage and use of personal information; we will sign strict confidentiality agreements with our employees; we will adopt strict data use and access systems, Ensure that only authorized personnel have access to your personal information; we will develop an emergency response plan and activate it immediately when a user information security incident occurs.
4. How do you manage your personal information?
(1) Manage personalized content recommendations
[Manage Personalized Recommendations] If you are not interested in the content we recommend for you, you can turn off the personalized recommendation function through [My] - [About Us] - [Understand and Manage Personalized Recommendations]. After you close it, we will not provide personalized recommendation services, and it will not affect the normal use of other products and services we provide. After turning off the personalized push function, the relevant functions will no longer provide precise push based on your preferences, preferences and other personal information, but will instead push non-personalized recommended content generally or randomly.
(2) Manage personal information and privacy settings
We provide you with convenient personal information management functions. You can manage your various information on the [My] and [Bookshelf] pages. For example, you can go to [Bookshelf]-[Reading History] to view your browsing history or clear your browsing history.

Privacy Policy
Update date:【2022】year【9】month【9】day
Effective date: [9] month [9] day [2022]
Welcome to use this software and related services.
As the operator of ifnovel (hereinafter referred to as "this software"), Tianjin Shuchen Technology Co., Ltd. and its affiliates (hereinafter referred to as "we"), we are fully aware of the importance of personal information to you and will do our best to protect your personal information. Safe and reliable. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: principle of consistency of rights and responsibilities, principle of clear purpose, principle of choice and consent, principle of minimum necessity, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry.
This agreement is an agreement between you and us regarding matters related to the protection of user personal information and privacy policy when you download, install, and use ifnovel (hereinafter referred to as "this software"). Please read and understand this Privacy Policy carefully before using this software products and services. The key content has been highlighted in bold, so please pay special attention and read it carefully. Your agreement to the privacy policy only means that you understand the functions provided by the application and the necessary personal information required to run the functions. It does not mean that you have agreed that we can collect non-essential personal information. Non-essential personal information will be collected according to your authorization during use. Your consent is sought separately.
The corresponding device permissions will not be turned on by default. When important or sensitive device permissions are involved, we will ask for your consent in a separate pop-up window when you use the corresponding business function. After the permissions are turned on, you can also open them at any time. Turn off permissions through device settings; if you do not agree to turn on permissions, it will not affect the normal use of other non-related business functions. For sensitive personal information, we will separately obtain your consent before processing.
In order to provide you with better products and services, we will continue to improve our products, so we may often launch new or optimized business functions. At that time, we may need to collect new personal information or change the purpose or method of using personal information. We The terms of this policy will be updated based on the resulting updates and relevant requirements of laws and regulations, and the updates will form part of this policy. If the update causes a substantial reduction or major change in your rights under this policy, we will separately explain to you the purpose, content, usage and scope of the information collection through red dots and other means, and collect it after obtaining your express consent. . You can check the latest personal information protection and privacy policy at any time on this page. You have the right not to accept the updated policy, but it may cause you to stop using certain software or services provided by this software.
This policy will help you understand the following:
1. How we collect and use your personal information
2. How we use cookies and similar technologies
3. How we share, transfer and publicly disclose your personal information
4. How we protect your personal information
5. Your rights
6. How we process children’s personal information
7. How we store personal information
8. How to update this policy
9. How to contact us

1. How we collect and use your personal information
When you use this software products and services, we will collect personal information that you actively provide in the process of this software products and services or that is generated by using this software products and services. The collection and use of your personal information in this software includes the following two situations:
(1) Necessary personal information required for basic business functions: This type of information is necessary for the normal operation of products and services, and you must authorize this software to collect and use it. If you refuse authorization and provision, you will not be able to use the products and services of this software normally.
(2) Non-essential personal information required for additional business functions: This information is information required for non-basic business functions and is necessary to achieve some specific functions and services. When you use or enable related functions or use services, we will Personal information necessary to collect and use some of the above-mentioned specific functions and services.
The corresponding device permissions will not be turned on by default. When important or sensitive device permissions are involved, we will ask for your consent in a separate pop-up window when you use the corresponding business function. After the permissions are turned on, you can also open them at any time. Turn off permissions through device settings; if you do not agree to turn on permissions, it will not affect the normal use of other non-related business functions. For sensitive personal information, we will separately obtain your consent before processing.
The Company will only collect and use your personal information when providing you with reading services for the following purposes described in this policy:

(1) Browsing and searching
A. Scope of use of personal information:
1. In order to show you your browsing history and bookshelf records, we will collect your browsing history and add it to your bookshelf records.
2. When you use our search service, we will record your operation log, including search keywords, cumulative usage time, books and chapters read.
3. Basic functional services
According to the "Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications", this software belongs to the e-book type, and its basic functional service is e-book reading. If you only want ifnovel to provide you with basic functionality mode, you can choose to enter basic functionality mode. If you turn on the basic function mode, we will not collect your personal information in accordance with the relevant provisions of laws and regulations. In basic mode, you can only use our products and services in browsing mode (that is, not logged in), and in basic function mode, you cannot use registration/login, content recommendation, event participation, content search and other services.
B. Sensitive permissions called:
This feature does not invoke your sensitive permissions;
C. Use third-party SDK:
This feature will not use third-party SDKs.
(2) Security function
A. Scope of use of personal information:
1. Account security
In order to provide you with safe and stable services, ensure the security of your account and property, prevent fake logins, and ensure operational quality and efficiency, we need to record your device number, device unique identifier (IMEI, OAID, AndroidID, ICCID, SIM card information ), IP address, device manufacturer, device model, operating system, network access method, network status, network quality data, system setting information and operation, usage and service logs. If you do not agree with us recording the aforementioned information, the risk control verification may not be completed, resulting in your being unable to use our products and services.
2. Operation and safety
In order to ensure the security of the service and ensure operational quality and efficiency, we may collect application information or running process information, application frequency, crash data, overall usage, performance data and the source of the application.
B. Sensitive permissions called:
This feature does not invoke your sensitive permissions;
C. Use third-party SDK:
This feature will not use third-party SDKs.

(3) Clipboard
A. Scope of use of personal information:
When you start this software, in order to determine whether you participate in specific activities we carry out with third parties, we will read the contents of your clipboard to identify whether there is relevant password information. Only when the clipboard has the aforementioned information, we will This information will be collected for verification and feedback to you about activity benefits. We will not store other information on your clipboard, and separate clipboard information cannot identify your specific identity.
B. Sensitive permissions called:
This feature does not invoke your sensitive permissions;
C. Use third-party SDK:
This feature will not use third-party SDKs.
(4) Help and feedback
A. Scope of use of personal information:
You can initiate complaints, appeals or inquiries to customer service. When you pass "Feedback", we need you to provide account information and problem description. At the same time, we may ask you to provide your mobile phone number and other personal information so that we can provide you with customer service feedback in a timely manner. Serve. If you refuse to provide the above information, we may not be able to provide you with timely feedback on the results of your complaint, appeal or consultation.
B. Sensitive permissions called:
This feature does not invoke your sensitive permissions;
C. Use third-party SDK:
This feature will not use third-party SDKs.
(5) Personalized recommendations
A. Scope of use of personal information:
When you browse our website or client, you can choose to collect books that interest you. In order to provide you with personalized recommendations, we will collect your reading behavior, reading time, adding bookshelf behavior, reading preferences, nickname, gender, and IP address to implement the above functions and other purposes clearly informed by us. This type of information is necessary to make personalized recommendations to you. If you refuse to provide it, we will not be able to recommend personalized information or services to you.
Please understand that the personalized recommendation functions and services will be turned off by default. When using the personalized recommendation function, users must turn it on independently under [My] - [About Us] - [Understand and Manage Personalized Recommendations]. After it is turned on, we will de-identify it when collecting and using personal information. Data analysis only corresponds to specific codes that cannot be directly associated with the user's identity. It cannot and will never be associated with your real identity. If you are not interested in the content we recommend for you, you can turn off the personalized recommendation function through [Me] - [About Us] - [Understand and Manage Personalized Recommendations]. After you close it, we will not provide personalized recommendation services, and it will not affect the normal use of other products and services we provide. After turning off the personalized push function, the relevant functions will no longer provide precise push based on your preferences, preferences and other personal information, but will instead push non-personalized recommended content generally or randomly.
B. Sensitive permissions called:
This feature does not invoke your sensitive permissions;
C. Use third-party SDK:
This feature will not use third-party SDKs.
(6) You need to be reminded that your consent is not required for the collection and use of your personal information in accordance with laws, regulations and rules in the following situations:
1. Related to national security, national defense security and other national interests;
2. Directly related to public security, public interests, public health and other major public interests;
3. Directly related to criminal investigation, prosecution, trial and judgment execution;
4. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;
5. The personal information involved is disclosed to the public by the personal information subject on his own initiative;
6. Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
7. Necessary to maintain the safety and stability of the products or services provided, such as discovering and handling product or service failures;
8. Other situations stipulated by laws and regulations.

(7) When you use this software, in order to ensure the realization of our product functions and the safe and stable operation, we may obtain your system permissions. System permissions will not be enabled by default and will only be used with your express authorization. When used to implement specific functions or services, you can withdraw your authorization. For specific permission application and usage details, please see:System permission list

2. How we use cookies and similar technologies
To ensure the normal operation of this software, we will store small data files called Cookies on your mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. We may use relevant technologies to send one or more cookies to your device to collect, identify and store information about your access and use of this product and service. We will not use Cookies for any purpose other than those stated in this policy. We use Cookies and similar technologies to mainly implement the following functions or services:
1. Ensure the safe and efficient operation of products and services
We may set authentication and security cookies to allow us to confirm whether you are logged in safely or if you encounter theft or other illegal activities. These technologies will help us improve service efficiency and improve login and response speeds.
2. Help you obtain easier user experience and services
With the help of cookies, we can store program access habits, browsing history, and login information, helping you save the need to repeatedly enter registration information to provide you with an easier user experience and services.
3. Recommend, display and push content that may be of interest to you
We may use cookies and/or similar technologies to understand the preferences and usage habits and conduct data analysis to improve product services and recommend information and content that users are interested in.
4. Clearing cookies
If you refuse our use of cookies and/or similar technologies to collect and use your related devices, you can delete the cookies and/or similar technologies that have been stored in your computer, mobile device or other devices, so that we cannot fully or partially Track your personal information. You understand and know that: Our products can only be implemented through the use of Cookies and/or similar technologies. If you refuse to use or delete them, you may not be able to use our related products normally or obtain the best results from our products. Service experience may also have a certain impact on your information protection and account security.
3. How we entrust you to process, share, transfer and publicly disclose your personal information
(1) Entrusted processing
Certain specific modules or functions in this business function are provided by external suppliers. For example, we may engage service providers to assist us in providing customer support. We will sign strict confidentiality agreements with the companies, organizations and individuals we entrust to process personal information, requiring them to process personal information in accordance with our requirements, this Privacy Policy and any other relevant confidentiality and security measures.
(2) Sharing
We will not share your personal information with any company, organization or individual outside our company, except in the following circumstances:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with our affiliated companies and other cooperative parties in order to provide you with better services.
2. We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.
3. Sharing with authorized partners: Only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and we will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose.
Currently, our authorized partners include the following categories:
(1) Authorized partners in advertising and analysis services. Unless we have your permission, we will not share your personally identifiable information (referring to information that can identify you, through which you can be contacted or identified) with partners that provide advertising and analysis services. However, we may share your anonymized user portrait with authorized partners in advertising and analysis services to help them improve the effective reach rate of advertising without identifying you personally.
(2) Suppliers, service providers and other partners. We send information to our vendors, service providers and other partners around the world who support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of our advertising and services, providing customer Services, payment facilitation or conducting academic research and surveys.

In order to enable you to use the services and functions provided by this software, we will embed the partner's SDK list in this software as follows:Third Party Information Sharing List

(3) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.
2. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, and the relevant pages in this application will Relevant information will be prompted on the website and a red dot notification will be sent. Otherwise, we will require the company or organization to seek your authorization and consent again. If you do not accept the relevant privacy agreement of the new entity or have objections, you can contact the new entity for feedback or cancel your personal account.
(4) Public disclosure
We will only publicly disclose your personal information under the following circumstances:
1. After obtaining your explicit consent;
2. Disclosure based on law: We may publicly disclose your personal information to relevant departments under the circumstances of law, legal procedures, litigation or mandatory requirements from government authorities.
3. Types of personal information that may be involved in external sharing: device identification codes, software version information; types of personal information that may be involved in public disclosure: books read, reading time. We are aware of the corresponding legal responsibilities for external sharing, transfer, and public disclosure of personal information, and will take reasonable measures to ensure the security of your personal information.
4. How we protect your personal information
1. We strive to adopt various physical, electronic and managerial security measures that are in line with industry standards and are reasonably feasible to protect the security of your personal information and prevent the personal information you provide from being used improperly or accessed without authorization. Public disclosure, use, modification, damage, loss or disclosure.
2. We will use encryption technology, anonymization processing and related reasonable and feasible means that are no lower than those of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.
3. We will establish a dedicated security department, security management system, and data security process to manage and regulate the storage and use of personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology in a timely manner.
4. We sign confidentiality agreements with employees’ information contacts and conduct regular security competency and awareness training. At the same time, we strictly select our partners, conduct background checks on them, and cooperate with well-known and reputable companies; we sign confidentiality agreements with partners’ information contacts, stipulate breach of contract liability for leaks, and provide only necessary and reasonable information.
5. Although the above reasonable and effective measures have been taken and the standards required by relevant legal regulations have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen security Measures cannot always guarantee 100% security of information. We will try our best to ensure the security of the personal information you provide to us.
6. You know and understand that problems may occur when you access our product systems and communication networks due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to complex passwords, regularly changing passwords, and not disclosing your account password and related personal information to others. If you find that your personal information, especially your account or password, has been leaked, please contact the customer service of this software immediately so that we can take appropriate measures according to your application.
7. We will formulate emergency response plans and activate them immediately when user information security incidents occur, and strive to prevent the expansion of the impact and consequences of these security incidents. Once a personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the handling measures we have taken or will take, and suggestions for you to prevent and reduce risks on your own. , remedial measures for you, etc. Our disposal measures, suggestions for you to prevent and reduce risks on your own, remedial measures for you, etc. We will promptly notify you of the relevant information by email, letter, phone, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security in accordance with the requirements of regulatory authorities.
5. Your rights
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights with respect to your personal information:
(1) Access your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you wish to exercise your right to access your data, you can do so yourself by:
1. Access basic information such as avatar and nickname:
Enter the software and click on the "My" page to query and access information.
2. If you are unable to access the above personal information through the above path, you can submit personal information for feedback in "My - Feedback". We will process it within 15 working days and feedback the relevant processing results to you.

You can click《Personal information collection list》Review the overall collection of your personal information.


(2) Correct your personal information
1. You can correct/modify your relevant personal information in our products and/or services. To facilitate you to exercise your above rights, we provide you with two options: online self-correction/modification and application for correction/modification to us. way.
2. For some of your personal information, we provide you with operation guidelines and operation settings on the relevant function pages of the product. You can directly correct/modify it. For example: the correction/modification path for "Bookshelf Records" information in this software is :bookshelf.
3. For difficulties you encounter in exercising the above rights, or other situations where you may not/cannot be provided with online self-correction/modification permissions, your identity will be verified, and the correction will not affect the objectivity and accuracy of the information. Under certain circumstances, you have the right to correct or modify incorrect or incomplete information, or under certain circumstances, especially when data is incorrect, submit your correction/modification application to We, require us to correct or modify your data, unless otherwise provided by laws and regulations. However, due to security and identification considerations, you may not be able to modify some of the initial registration information submitted during registration.
4. If you are unable to correct your personal information through the above methods, you can submit your personal information for feedback on the "My - Feedback" page. We will process it within 15 working days and feedback the relevant processing results to you.
(3) Delete your personal information
In the following situations, you can make a request to us to delete personal information on the "My - Feedback" page or through customer service email, phone, feedback, etc.:
1. If our handling of personal information violates laws and regulations;
2. If we collect and use your personal information without your consent;
3. If our processing of personal information violates our agreement with you;
4. If you no longer use our products or services;
5. If we no longer provide you with products or services.
Once the above deletion request is responded to, we will also try our best to notify the subjects who obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization. At the same time, please be aware that if your public information in this software is captured, cached, stored, copied, or uploaded or saved by other users on other networks by other users or independent third parties that have not cooperated with us and are not under our control, The relevant information is not under our control.
When you delete information from our services, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.
(4) Change the scope of your authorization
1. If you plan to change the scope of authorization or do not want to accept the commercial advertisements we send you, you can contact us according to the contact information we provide.
2. If you want to cancel the authorization you have agreed to, you can submit personal information for feedback on the "My - Feedback" page. We will process it within 15 working days and feedback the relevant processing results to you.
(5) Personal information subject obtains a copy of personal information
You have the right to obtain a copy of your personal information by contacting us using the contact details provided by us.
Where technically feasible, such as data interface matching, we may also directly transfer a copy of your personal information to a third party designated by you at your request.
(6) Constraint information system automatic decision-making
In some business functions, we may only make decisions based on non-human automated decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you can contact us through the contact information we provide. You have the right to ask us for an explanation, and we will also provide appropriate relief.
(7) Respond to your above request
For security reasons, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
We will respond within 15 working days after verifying your identity. If you are not satisfied, you can also complain to the government or industry authorities in accordance with the law.
In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. For those that are gratuitously repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) request, we may deny it.
We will not be able to respond to your request under the following circumstances:
1. Relevant to the personal information controller’s performance of obligations stipulated in laws and regulations;
2. Directly related to national security and national defense security;
3. Directly related to public safety, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial and execution of judgments;
5. The personal information controller has sufficient evidence to show that the personal information subject has subjective malice or abused rights;
6. To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the individual;
7. Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;
8. Involving business secrets.
6. How we process children’s personal information
Our products, websites and services are primarily intended for adults. Children may not create their own user account without the consent of a parent or guardian. If a child establishes a personal account using our products and starts using it, we will treat it as having the permission of their guardian.

If you are the guardian of a child under 14 years old, please read carefully and fully understand before using our products or services.《Children's Personal Information Protection Rules》,We will specifically explain to you the rules for protecting children's personal information.


For cases where we collect children's personal information with the consent of the guardian's parents, we will only use or publicly disclose this information as permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.
Although local laws and customs may define children differently, we consider anyone under the age of 14 to be a child.
If we discover that we have collected personal information from children without first obtaining verifiable parental consent, we will seek to delete the data as quickly as possible.
7. How we store personal information
(1) Storage location
In accordance with the provisions of laws and regulations, we will store your personal information collected and generated during domestic operations within the territory of the People's Republic of China. At present, we will not transfer the above information overseas. If there is a cross-border transfer of personal information in the future, we will strictly abide by the relevant provisions of the laws and regulations of the People's Republic of China and obtain your explicit authorization. However, if you conduct cross-border transfers through the Internet Except for personal proactive behaviors such as posting updates.
(2) Storage period
1. We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the shortest period required to achieve the purposes stated in this policy and as required by law. After your personal information exceeds the retention period, we will delete your personal information in accordance with the requirements of laws and regulations, or Perform anonymization. We will change the information storage period unless an extension of the retention period is required or permitted by law.
2. Under the following circumstances, we may change the storage time of personal information in order to comply with legal requirements:
(1) To comply with the relevant provisions of applicable laws, regulations or policies and other normative documents;
(2) To comply with decisions of administrative agencies or similar authorized organizations, judgments and rulings of judicial agencies, awards of arbitration agencies or other legal procedures;
(3) We have reason to believe that we need to comply with laws, regulations and other relevant provisions;
(4) Reasonably necessary purposes to implement relevant service agreements or this policy, safeguard social and public interests, and protect the personal and property safety or other legitimate rights and interests of our users, us or our affiliates, other users or employees and other third parties. ;
(5) When this software ceases to operate, we will notify you through announcements on the website or within the program, and delete or anonymize your personal information within a reasonable period.
8. How to update this policy
The terms under this agreement may be changed by the company at any time, and users are required to review this agreement regularly. Once the agreement changes, the company will update this page, prompt the changes on the software-related pages, and send a red dot notification. Once the changed agreement is announced, it will effectively replace the original agreement. If you do not agree with the new terms of the agreement that we have changed, you can submit relevant comments in "My-Customer Service Feedback" or cancel your personal account. We will process it within 15 working days and feedback the relevant processing results to you.
Major changes referred to in this policy include but are not limited to:
1. Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;
2. We have undergone major changes in ownership structure, organizational structure and other aspects. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;
3. The main objects to whom personal information is shared, transferred or publicly disclosed change;
4. Significant changes in your rights to participate in the processing of personal information and how you exercise them;
5. When our responsible department, contact information and complaint channels for handling personal information security change;
6. When the personal information security impact assessment report indicates that there is a high risk.
9. How to contact us
Our contact information: Tianjin Shuchen Technology Co., Ltd.
Office registration address: 2nd Floor, No. 105, Building 87, Xidian Village, Gaobeidian Township, Chaoyang District, Beijing
Contact information of the person in charge of personal information protection: [010-85764882]
Customer service phone: 010-85764882
Customer service email: kefu@yueyouxs.com
If you have any questions, comments or suggestions during the use of the software or about this privacy policy, you can contact us through the above contact information, and we will contact and respond to you within 15 working days.