User Privacy Agreement

Welcome to use DreamNovel software and related services:
1. This Agreement is an agreement between you and the Company regarding matters related to the protection of user personal information and privacy policy when you download, install and use DreamNovel (hereinafter referred to as "this Software").
2. The content of this Agreement also includes the relevant agreements, statements, business rules and announcement guidelines on user personal information protection and privacy policy that the Company may publish from time to time (hereinafter collectively referred to as "Special Rules"). Once the above content is officially released, it will become an integral part of this Agreement and you shall also comply with it.
3. Last updated, effective and published date: [February] [20] [2025].

This policy will help you understand the following:
1. How we collect and use your personal information
2. How we use cookies and similar technologies
3. How we share, transfer, and publicly disclose your personal information
4. How we protect your personal information
5. Your rights
6. How we handle children's personal information
7. How your personal information is transferred globally
8. How this policy is updated
9. Applicability of this policy
10. How to contact us


The company is well aware of the importance of personal information to you and will do its best to protect your personal information. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum necessity, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, the company promises that we will take corresponding security protection measures to protect your personal information in accordance with the industry's mature security standards.

Please read and understand this Privacy Policy carefully before using our products.
1. How we collect and use your personal information

Personal information refers to various information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.
The Company will only collect and use your personal information when providing you with reading services for the following purposes described in this policy:
1. Business Function 1: Search
When you use our services, this software will record your operation log, including search keywords, cumulative usage time, books and chapters read.
Based on the above information and your collection data, we will analyze your preferences, reading habits and user profiles to show or recommend more relevant search results to you when searching. If you do not agree to provide the above information, you can choose to close it in the My-Preferences interface without affecting your use of other functions of this software.
2. Business Function 2: Ordering and Payment
The records generated when you order membership and other products through this software, including membership ordering records and consumption records, will be stored in our servers. The above information is necessary for the software function. If you do not agree to us recording the above information, we will not be able to provide you with related services such as reading without ads. If you use the ordering and payment functions, Google will directly collect payment-related information, and our company will no longer collect such information separately.
3. Security function:
In order to provide you with safe and stable services, protect your account property security, and prevent impersonation login, we need to record your device model, IP address, device software version information, model, device number, network type, and device unique identifier (IMEI, GAID, MAC, and AndroidID). If you do not agree that we record the above information, you may not be able to complete the risk control verification and there is a risk of account theft.
When you use this software, for the purpose of providing you with services, this software may obtain the following permissions of your terminal device. Of course, you can refuse to enable the following permissions, or turn off the following permissions of this software in the settings of your mobile phone. Turning off the following permissions will not affect your use of other functions of this software:
| Allow the program to read the user's device information, including device model, IP address, device software version information, model, device number, network type, device unique identifier (IMEI, GAID, MAC), so that the software function can be compatible with different systems and models, and confirm the user identification before logging in;
|Allow the program to access the network and detect whether the current network link is valid, so that the software can perform corresponding operations according to the current network status, such as prompting whether to continue downloading;
|Allow the program to read and write permissions to the memory card, so that the software can store business data and error logs;
|Allow the program to access WIFI network status information, so that the software can obtain the current wifi connection status and hotspot related information;
|Allow the program to read system settings information, so that the software can obtain the system screen off and brightness, and modify the phone brightness;
|Allow the program to keep the program awake, so that users can use audiobooks normally;
|Allow the programMaintain the foreground service permissions so that this software can use the audiobook service;
|Allow the program to access local storage. By opening the local storage permissions, you can download the books in this software to your mobile phone storage;
|Allow the program to access the phone status and identity, so that this software can read the phone status (such as obtaining the device number of the phone for statistics and security verification), so that when the user uses the voice reading function, he can ensure that the voice reading is stopped in time and the call is answered normally.
2. How we use cookies and similar technologies
To ensure the normal operation of this software, we will store a small data file called Cookie on your mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, we can store your preferences and usage habits, help you save the steps of repeatedly entering registration information, and help determine the security status of your account to provide you with a more relaxed user experience and services.
We will not use cookies for any purpose other than the purposes described in this policy. You can manage or disable cookies according to your preferences.
3. How we entrust the processing, sharing, transfer, and public disclosure of your personal information
(I) Entrusted processing
Some specific modules or functions in this business function are provided by external suppliers. For example, we will hire service providers to assist us in providing customer support.
We will sign strict confidentiality agreements with companies, organizations and individuals that we entrust to process personal information, requiring them to process personal information in accordance with our requirements, this Privacy Policy and any other relevant confidentiality and security measures.
(II) Sharing
We will not share your personal information with any company, organization or individual outside our company, except in the following circumstances:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other partners such as our affiliated companies to provide you with better services.
2. We may share your personal information with other parties in accordance with laws and regulations or mandatory requirements of government authorities.
3. Sharing with authorized partners: Some of our services will be provided by authorized partners only for the purposes stated in this policy. We may share some of your personal information with partners to provide better customer service and user experience. We will only share your personal information for legitimate, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose.
Currently, our authorized partners include the following types:

Suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business worldwide. This support includes providing technical infrastructure services, analyzing the use of our services, measuring the effectiveness of advertising and services, providing customer service, facilitating payments or conducting academic research and surveys.
For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them and require them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
(III) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Transfer with explicit consent: We will transfer your personal information to other parties after obtaining your explicit consent.
2. In the case of mergers, acquisitions or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, and prompt relevant information on the relevant page of this application and send a red dot notification, otherwise we will require the company or organization to re-ask your authorization consent. If you do not accept the relevant privacy agreement of the new entity or have objections, you can contact the new entity for feedback or cancel your personal account.
(IV) Public Disclosure
We will only publicly disclose your personal information in the following circumstances:
1. After obtaining your explicit consent;
2. Disclosure based on law: We may publicly disclose your personal information to relevant departments under the mandatory requirements of laws, legal procedures, litigation or government authorities.
(V) Types of personal information that may be involved in external sharing: device identification code, software version information; Types of personal information that may be involved in external disclosure: books read, reading time.
We are aware of the corresponding legal responsibilities for external sharing, transfer, and public disclosure of personal information, and will take reasonable measures to protect the security of your personal information.
IV. How we protect your personal information
(I) We have used security protection measures that meet industry standards to protect the personal information you provide and prevent data from being unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, data (such as credit card information) exchanged between your browser and the "Service" is protected by SSL encryption; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(II) Retention period: We only store your personal information in mainland China.
We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected.
We will only retain your personal information for the minimum period required to achieve the purposes described in this policy and as required by law, unless the retention period needs to be extended or is permitted by law.
After your personal information exceeds the retention period, we will delete your personal information or anonymize it in accordance with the requirements of laws and regulations.
(III) The Internet is not an absolutely safe environment, and emails, instant messaging, and your communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.
(IV) The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal liability.
(V) After the unfortunate occurrence of a personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, your suggestions for self-prevention and risk reduction, and your remedial measures, etc. in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant circumstances of the incident by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take reasonable and effective means to issue an announcement.
At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
V. Your rights
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights over your personal information:
(I) Access to your personal information
You have the right to access your personal information, except for exceptions stipulated by laws and regulations. If you want to exercise your data access rights, you can access it yourself in the following ways:
1. Access basic information such as avatars and nicknames:
1) Enter this software and click "My";
2) Click "Login";
3) Query and access information;
(II) Correct your personal information
You can correct/modify your relevant personal information in our products and/or services. To facilitate your exercise of your above rights, we provide you with two ways: online self-correction/modification and submitting correction/modification applications to us.
For some of your personal information, we provide you with operation instructions and operation settings on the relevant function pages of the product. You can directly correct/modify it. For example, the correction/modification path of "browsing history" information in this software is: Bookshelf-Browsing History.
For any difficulties you encounter in exercising the above rights, or other situations where you may not/cannot be provided with the right to make corrections/modifications online, you have the right to make corrections or modifications to the erroneous or incomplete information after verifying your identity and provided that the correction does not affect the objectivity and accuracy of the information, or in certain circumstances, especially when the data is wrong, submit your correction/modification application to us through the feedback and error reporting measures we publish, and request us to correct or modify your data, except as otherwise provided by laws and regulations. However, due to security and identity recognition considerations, you may not be able to modify certain initial registration information submitted during registration.
(III) Deleting your personal information
In the following circumstances, you can delete it yourself in the function or request us to delete your personal information through the customer service email:
1. If our handling of personal information violates laws and regulations;
2. If we collect and use your personal information without your consent;
3. If our handling of personal information violates the agreement with you;
4. If you no longer use our products or services;
5. If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and request them to delete it in a timely manner, unless otherwise provided by laws and regulations or these entities obtain your independent authorization.
When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated. For example, the deletion path of your personal "browsing history" information in this software is: "Bookshelf-Browsing History";

(IV) Changing the scope of your authorization
Each business function requires some basic personal information to be completed. You can give or withdraw your authorization consent at any time for the collection and use of additional personal information.
After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the personal information processing previously carried out based on your authorization.
If you intend to change the scope of authorization or do not want to accept the commercial advertisements we send you, you can contact us according to the contact information we provide.
If you want to cancel the authorization you have agreed to, you can submit your personal information for feedback in "My-Customer Service Feedback". We will process it within 15 working days and feedback the relevant processing results to you.
(VI) The subject of personal information obtains a copy of personal information
You have the right to obtain a copy of your personal information. You can contact us through the contact information we provide.
If it is technically feasible, such as data interface matching, we can also directly transfer a copy of your personal information to a third party designated by you at your request.
(VII) Constraining information system automatic decision-making
In certain business functions, we may make decisions based solely on non-human automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legal rights and interests, you have the right to ask us for an explanation, and we will provide appropriate relief.
(VIII) Responding to your above requests
For security reasons, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.
We will respond within thirty days after verifying your identity. If you are not satisfied, you can also complain to the government or industry authorities in accordance with the law.
In principle, we do not charge for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee depending on the circumstances. We may reject requests that are repeated without reason, require too many technical means (for example, the need to develop new systems or fundamentally change current practices), pose risks to the legal rights and interests of others, or are very impractical (for example, involving information stored on backup tapes).
We will not be able to respond to your request in the following circumstances:
1. Related to the performance of the obligations of the personal information controller as stipulated by laws and regulations;
2. Directly related to national security and national defense security;
3. Directly related to public security, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
5. The personal information controller has sufficient evidence to show that the personal information subject has subjective malice or abuses his rights;
6. For the purpose of safeguarding the life, property, and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the person concerned;
7. Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals and organizations;
8. Involving commercial secrets.
VI. How we handle children's personal information
Our products, websites, and services are mainly for adults. Children may not create their own user accounts without the consent of their parents or guardians. If a child uses our products to establish a personal account and starts using it, we will regard it as having obtained the permission of the guardian.
In the case of collecting children's personal information with the consent of their parents, we will only use or disclose this information when permitted by law, with the explicit consent of their parents or guardians, or when it is necessary to protect children.
Although local laws and customs define children differently, we regard anyone under the age of 14 as a child.
If we find that we have collected children's personal information without first obtaining verifiable parental consent, we will try to delete the relevant data as soon as possible.
VII. How your personal information is transferred globally
At present, we will not transfer or store your personal information across borders. If cross-border transmission or storage is required in the future, we will inform you of the purpose, recipient, security measures and security risks of the information outbound, and obtain your consent.
VIII. How this policy is updated
The terms under this agreement may be changed by the Company at any time, and users need to review this agreement regularly. Once the agreement changes, the Company will update this page, prompt the changes on the relevant pages of this software, and send a red dot notification. Once the changed agreement is announced, it will effectively replace the original agreement. If you do not agree to the new terms of the agreement we have changed, you can submit relevant opinions or cancel your personal account in "My-Customer Service Feedback". We will handle it within 15 working days and feedback the relevant processing results to you.
Major changes referred to in this policy include but are not limited to:
1. Major changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way personal information is used, etc.;
2. Major changes in our ownership structure, organizational structure, etc. Such as changes in owners caused by business adjustments, bankruptcy and mergers and acquisitions, etc.;
3. Changes in the main objects of personal information sharing, transfer or public disclosure;
4. Major changes in your rights to participate in personal information processing and the way you exercise them;
5. When the responsible department, contact information and complaint channel for handling personal information security changes;
6. When the personal information security impact assessment report indicates a high risk.
We will also archive the old version of this policy for your reference.
IX. Applicability of this policy
This policy applies to all services of this software.
In order to ensure the basic safety of your use of this software, we need and only need to collect your device identification code (ie IMEI code or IMSI code) and anonymize it. Please understand and understand.
10. How to contact us
Our contact information: Beijing Yueyou Technology Co., Ltd.
Registered office address: 2nd Floor, Building 105, No. 87, Xidian Village, Gaobeidian Township, Chaoyang District, Beijing
Customer service email: kefu@yueyouxs.com
External dispute resolution agency: China Internet Information Office Editorial Department
If you have any questions, comments or suggestions during the use of the software and this privacy policy, you can contact us through the above contact information, and we will contact and reply to you within 15 working days.