Abbreviated Privacy policy
As the operator of InkNovel (hereinafter referred to as the "Software"), we understand the importance of personal information to you and will do our best to protect your personal information safe and secure. This concise guide will help you to intuitively and concisely understand how we collect and process personal information and how to protect your privacy information. For more details, please read the full Software Privacy Policy below.
1. How do we collect and use information
(1) Contact information
[Help & Feedback] When you submit a complaint, feedback or suggestion, we may contact you through the mobile number you have provided.
(2) Browsing and search records
【 Browsing Records 】 In order to show you your bookshelf records, we collect your bookshelf records.
【 Search History 】 When you use our search service, we will record your operation logs, including search keywords, cumulative usage time, books and chapters read.
(3) Device information
【 Guarantee security 】 In order to protect your account security and system security, We obtain your device number, device unique identifier (IMEI, OAID, AndroidID, ICCID, SIM card information), IP address, device manufacturer, device model, operating system, network access method, network status, network quality data, system setup information and operation, usage, and service logs.
(4) Clipboard
[Third Party Activities] When you launch the software, in order to determine whether you participate in a specific activity conducted by us and a third party, we will read the content of your clipboard to identify whether there is relevant password information. Only when the clipboard has the aforementioned information, we will collect the information for verification and feedback to you about the activity benefits. We will not store other information about your clipboard. And clipboard information alone does not identify you specifically.
(5) Help and feedback: When you "give feedback" through the software, we need you to provide account information, problem description, and we may ask you to provide your mobile phone number and other personal information.
(6) Personalized content recommendation
[Personalized Content Recommendation] In order to recommend books of interest to you for personalized recommendation, we will collect your reading behavior, reading time, bookshelf behavior, reading preference, nickname, gender, IP address for personalized content recommendation. Personalized Content recommendation When we collect and use personal information, we conduct de-identification processing, and data analysis only corresponds to a specific code that cannot be directly associated with the user's identity, and cannot and will never be associated with your real identity.
If you are not interested in the content we recommend for you, you can turn off the personalized recommendation through [My] - [About Us] - [Understanding and Management of Personalized recommendation], after you close, we will not provide personalized recommendation services, and will not affect the normal use of other products and services we provide.
(7) Basic functions
If you only want InkNovel to provide you with basic function mode, including novel reading, you can choose to enter Basic function mode. In the basic mode, if you open the basic function mode, we will not collect your personal information according to the relevant provisions of laws and regulations. In basic mode, you can only use our products and services in browsing mode (i.e. not logged in), and in basic mode, you cannot use registration/login, content recommendation, event participation, content search and other services.
You can re-enter InkNovel after withdrawing your consent to the Privacy policy and choose to use the Basic feature mode.
2. Third party data processing involved in our services
In the process of cooperation with third parties, we strictly abide by the provisions of laws and regulations, and handle relevant data safely and prudently in accordance with the principle of minimum necessity. We will sign strict confidentiality agreements with third parties, requiring them to process personal information in accordance with our requirements, this Privacy Policy, and any other relevant confidentiality and security measures required by laws and regulations.
3. How do we protect information
We take a variety of industry standards, reasonable and practicable physical, electronic and management security measures to protect your personal information security; We will protect your personal information using encryption technologies, anonymization and relevant reasonably practicable means that are no less than those of industry peers; We will establish a special security department, security management system, data security process to manage and regulate the storage and use of personal information; We will sign a strict confidentiality agreement with our employees; We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information; We will develop an emergency response plan and immediately launch an emergency response plan in the event of a user information security incident.
4. How do you manage your personal information
(1) Manage personalized content recommendations
[Manage Personalized Recommendations] If you are not interested in the content we recommend for you, you can turn off personalized recommendations by going to [My] - [About Us] - [Understand and Manage Personalized recommendations]. After you close, we will not provide personalized recommendation services, and it will not affect the normal use of other products and services provided by us. After the personalized push function is turned off, the relevant functions are no longer based on your preferences, preferences and other personal information for accurate push, but universal push or random push of non-personalized recommendation content.
(2) Manage personal information and privacy Settings
We provide you with convenient personal information management functions, you can in the 【 My 】, 【 Bookshelf 】 page for your information management. For example, you can view your browsing history or clear your browsing history in [Bookshelf] - [Reading History].
Privacy Policy
Updated Date: [4] [3] [2025]
Effective Date: [4] [3] [2025]
You are welcome to use the software and related services.
As the operator of Inknovel (hereinafter referred to as the "Software"), we understand the importance of personal information to you and will do our best to protect your personal information safe and secure. We are committed to maintaining your trust in us by adhering to the following principles to protect your personal information: the principle of consistency of authority and responsibility, the principle of clarity of purpose, the principle of choice and consent, the principle of minimum necessity, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency. At the same time, we promise that we will take appropriate security measures to protect your personal information according to the industry's mature security standards.
This Agreement is an agreement between you and us regarding your download, installation and use of Inknovel (hereinafter referred to as the "Software") in relation to the protection of user personal information and privacy policy. Please read and understand this Privacy Policy carefully before using the software products and services. Key content has been bold and black tips, please pay special attention to and focus on reading. You agree that the Privacy policy only means that you have understood the functions provided by the application and the necessary personal information required for the operation of the functions, and does not mean that you have agreed that we can collect non-essential personal information, non-essential personal information will be based on your authorization during the use of your consent.
The corresponding device permissions will not be turned on by default. When important or sensitive device permissions are involved, we will pop up another window when you use the corresponding business functions and then open it with your consent. After the permission is enabled, you can also disable the permission at any time through the device Settings. If you do not agree to enable the permission, the normal use of other non-related services will not be affected. For sensitive personal information, we will separately obtain your consent for processing.
In order to provide you with better products and services, we will continue to improve our products, so we may often launch new or optimized business functions, when it may be necessary to collect new personal information or change the purpose or way of using personal information, we will update the terms of this policy according to the updated situation and relevant requirements of laws and regulations. This update forms part of this policy. If the update results in a substantial reduction or significant change of your rights in this policy, we will separately explain to you the purpose, content, use method and scope of the information collected through red dots and other means, and collect it after obtaining your express consent. You can check the latest Personal information protection and privacy policy on this page at any time, and you have the right not to accept the updated policy, but it may cause you to stop using a certain software or service provided by this software.
This policy will help you understand the following:
1. How do we collect and use your personal information
2. How do we use cookies and similar technologies
3. How do we share, transfer and publicly disclose your personal information
4. How do we protect your personal information
5. Your Rights
6. How do we handle children's personal information
7. How do we store Personal information
8. How is this policy updated
9. How can I contact us
How do we collect and use your Personal information
When you use the Software products and services, we will collect your personal information that is voluntarily provided in the course of the software products and services or generated by the use of the software products and services. The collection and use of your personal information by the software includes the following two situations:
(1) Necessary personal information required for basic business functions: Such information is necessary for the normal operation of products and services, and you must collect and use it from the authorized software. If you refuse to authorize and provide, you will not be able to use the software products and services normally.
(2) Non-essential personal information required for additional business functions: This information is information required for non-basic business functions and is necessary for the realization of some specific functions and services. When you use or open relevant functions or use services, we will collect and use the personal information necessary for the above specific functions and services.
The corresponding device permissions will not be turned on by default. When important or sensitive device permissions are involved, we will pop up another window when you use the corresponding business functions and then open it with your consent. After the permission is enabled, you can also disable the permission at any time through the device Settings. If you do not agree to enable the permission, the normal use of other non-related services will not be affected. For sensitive personal information, we will separately obtain your consent for processing.
The Company will only collect and use your personal information to provide you with reading services for the following purposes as described in this policy:
(1) Browsing and searching
A. Scope of use of Personal information:
1. In order to show you your browsing history and shelf history, we will collect your browsing history and add it to the shelf history.
2. When you use our search service, we will record your operation logs, including search keywords, cumulative usage time, and books and chapters you have read.
3. Basic functional services
According to the Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications, this software belongs to the type of electronic books, and its basic function is to read electronic books. If you only want Inknovel to provide you with basic function mode, you can choose to enter Basic function mode. If you open the basic function mode, we will not collect your personal information according to the relevant provisions of laws and regulations. In basic mode, you can only use our products and services in browsing mode (i.e. not logged in), and in basic mode, you cannot use registration/login, content recommendation, event participation, content search and other services.
B. Sensitive permissions to invoke:
This feature does not invoke your sensitive permissions;
C. Using third-party SDKS:
This feature does not use third-party SDKS.
(2) Safety guarantee function
A. Scope of use of Personal information:
1. Account security
In order to provide you with safe and stable services, ensure the safety of your account property, prevent fake login, and ensure the quality and efficiency of operations, We need to record your device number, device unique identifier (IMEI, OAID, AndroidID, ICCID, SIM card information), IP address, device manufacturer, device model, operating system, network access method, network status, network quality data, system setup information and operation, usage, service logs. If you do not agree to our recording of the above information, you may not be able to complete the risk control verification, resulting in your inability to use our products and services.
2. Operation and safety
In order to ensure the security of our services and safeguard the quality and efficiency of our operations, we may collect information about applications or running processes, frequency of applications, crash data, overall usage, performance data, and the origin of applications.
B. Sensitive permissions to invoke:
This feature does not invoke your sensitive permissions;
C. Using third-party SDKS:
This feature does not use third-party SDKS.
(3) Clipboard
A. Scope of use of Personal information:
When you launch the software, in order to determine whether you participate in a specific activity carried out by us and a third party, we will read the content of your clipboard to identify whether there is relevant password information. Only when the clipboard has the aforementioned information, we will collect the information for verification and feedback to you about the activity benefits. We will not store other information about your clipboard. And clipboard information alone does not identify you specifically.
B. Sensitive permissions to invoke:
This feature does not invoke your sensitive permissions;
C. Using third-party SDKS:
This feature does not use third-party SDKS.
(4) Help and feedback
A. Scope of use of Personal information:
You can make a complaint, appeal or consultation to the customer service. When you pass the "Feedback", we need you to provide account information, problem description, and we may ask you to provide your mobile phone number and other personal information in order to timely feedback customer service to you. If you refuse to provide the above information, we may not be able to provide you with timely feedback on complaints, appeals or consultation results.
B. Sensitive permissions to invoke:
This feature does not invoke your sensitive permissions;
C. Using third-party SDKS:
This feature does not use third-party SDKS.
(5) Personalized recommendation
A. Scope of use of Personal information:
During your visit to our website or client, you can choose to bookmark the books you are interested in. In order to make personalized recommendations to you, we collect your reading behavior, reading time, bookshelf behavior, reading preferences, nickname, gender, IP address for the purposes described above and for other purposes that we expressly inform you. Such information is necessary to make personalized recommendations to you, if you refuse to provide, we will not be able to recommend personalized information or services to you.
Please understand that the personalized recommendation function and service will be turned off by default, and users need to turn on the personalized recommendation function under [My] - [About Us] - [Understand and Manage Personalized recommendation]. When we collect and use personal information, we conduct de-identification processing, and the data analysis only corresponds to a specific code that cannot be directly associated with the user's identity, and cannot and will never be associated with your real identity. If you are not interested in the content we recommend for you, you can turn off the Personalized recommendation feature by going to My - About Us - Understanding and Managing Personalized Recommendations. After you close, we will not provide personalized recommendation services, and it will not affect the normal use of other products and services provided by us. After the personalized push function is turned off, the relevant functions are no longer based on your preferences, preferences and other personal information for accurate push, but universal push or random push of non-personalized recommendation content.
B. Sensitive permissions to invoke:
This feature does not invoke your sensitive permissions;
C. Using third-party SDKS:
This feature does not use third-party SDKS.
(6) Need to remind you that in the following circumstances, according to laws and regulations, the collection and use of your personal information does not require your consent:
1, related to national security, national defense security and other national interests;
(2) Directly related to public security, public interest, public health and other major public interests;
(3) Directly related to criminal investigation, prosecution, trial and execution of judgments;
4, in the protection of your or other individuals' life, property and other major legitimate rights and interests, but it is difficult to get my consent;
5. The personal information involved is disclosed to the public by the personal information subject;
6. Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
7. Necessary to maintain the safety and stability of the products or services provided, such as discovering and disposing of product or service failures;
8. Other circumstances provided by laws and regulations.
(7) When you use the software, in order to ensure the functional realization and safe and stable operation of our products, we may obtain your system permissions, system permissions will not be turned on by default, and only after your express authorization will be used in order to achieve specific functions or services, you can withdraw your authorization. For details about permission application and use, see: List of System Rights.
How do we use cookies and similar technologies
To ensure the normal operation of the software, we store small data files called cookies on your mobile device. Cookies typically contain an identifier, a site name, and some numbers and characters. We may use relevant technologies to send one or more cookies to your device in order to collect, identify and store information about your access to and use of the Products and Services. We do not use cookies for any purpose other than the purposes described in this Policy. We use cookies and similar technologies to perform the following functions or services:
1, ensure the safe and efficient operation of products and services
We may set authentication and security cookies to allow us to verify that you are logged in securely, or that you are experiencing theft or other wrongdoing. These technologies will help us improve service efficiency, login and response speed.
2, help you get easier user experience and service
With the help of cookies, we can store the habit of accessing the program, browsing history, login information, to help you save the step of repeatedly entering registration information, to provide you with a easier user experience and service.
3, for you to recommend, display, push you may be interested in content
We may use cookies and/or similar technologies to understand preferences and usage habits for data analysis in order to improve our products and services and recommend information and content of interest to users.
4. Clearing of cookies
If you refuse to allow us to use cookies and/or similar technologies to collect and use your device, you may delete cookies and/or similar technologies already stored on your computer, mobile device or other device so that we cannot track all or part of your personal information. You understand and acknowledge that our products can only be achieved through the use of cookies and/or similar technologies, if you refuse to use or delete, you may not be able to normally use our related products or obtain the best service experience through our products, and may also have a certain impact on the protection of your information and account security.
3. How do we entrust, share, transfer and publicly disclose your personal information
(1) entrusted handling
Certain specific modules or functions within this business function are provided by external vendors. For example, we may hire service providers to assist us in providing customer support. We will sign strict confidentiality agreements with the companies, organizations and individuals we entrust to process personal information, requiring them to process personal information in accordance with our requirements, this Privacy policy and any other relevant confidentiality and security measures.
(2) Sharing
We will not share your personal information with any company, organization or individual outside of our company, except in the following cases:
1, in the case of obtaining explicit consent: After obtaining your explicit consent, we will share your personal information with our affiliates and other partners in order to provide you with better services.
2. We may share your personal information in accordance with laws and regulations or mandatory requirements of competent government departments.
3, Sharing with Authorized partners: Only for the purposes stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners in order to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific and explicit purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose.
Currently, our licensing partners include the following types:
(1) Authorized partners for advertising and analysis services. Unless we have your permission, we will not share your personally identifiable information (meaning information that can identify you, through which you can be contacted or identified) with our partners who provide advertising and analytics services. However, we may share your anonymized user profile with authorized partners in advertising and analytics services to help them increase AD reach without identifying you personally.
(2) Suppliers, service providers and other partners. We send information to vendors, service providers and other partners who support our business on a global scale by providing technology infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, facilitating payments or conducting academic research and surveys.
In order to enable you to use the services and functions provided by the software, we will embed the SDK list of the partner in the software as follows: Third party information sharing list.
(3) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following cases:
1. Transfer with express consent: After obtaining your express consent, we will transfer your personal information to other parties.
2, in the case of merger, acquisition or bankruptcy liquidation, such as the transfer of personal information, we will require the new company and organization holding your personal information to continue to be bound by this privacy policy, and in the application of the relevant page prompt relevant information and will send a red dot notice, otherwise we will require the company and organization to re-ask you for authorization consent. If you do not accept the relevant privacy agreement of the new subject or have objections, you can contact the new subject for feedback or cancel your personal account.
(4) Public disclosure
We will only publicly disclose your personal information in the following circumstances:
1. After obtaining your explicit consent;
2. Disclosure based on law: In the case of laws, legal procedures, lawsuits or mandatory requirements of government authorities, we may publicly disclose your personal information to relevant authorities.
3. Types of personal information that may be involved in external sharing: device identification code, software version information; Types of personal information that may be involved in public disclosure: books read, length of reading. We are aware of the corresponding legal responsibilities for external sharing, transfer and public disclosure of personal information, and will take reasonable measures to ensure the security of your personal information.
How do we protect your personal information
1, we strive to adopt a variety of industry standards, reasonable and feasible physical, electronic and management security measures to protect the security of your personal information, to prevent the personal information you provide from being improperly used or unauthorized access, public disclosure, use, modification, damage, loss or disclosure.
2, we will use no less than industry peers encryption technology, anonymization processing and relevant reasonable and feasible means to protect your personal information, and use security protection mechanisms to prevent your personal information from malicious attacks.
3. We will establish a special security department, security management system and data security process to manage and regulate the storage and use of personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology in a timely manner.
4. We sign confidentiality agreements with staff information contacts, and regularly conduct training on security capabilities and awareness. At the same time, we strictly select partners, conduct background checks on them, and cooperate with well-known and reputable enterprises; Sign a confidentiality agreement with partner information contacts, agree on the liability for breach of contract, and provide only necessary and reasonable information.
5. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always ensure 100% security of information. We will do our best to ensure the security of the personal information you provide to us.
6. You acknowledge and understand that your access to our product systems and communication networks may cause problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of your personal information, including but not limited to complex passwords, changing passwords regularly, and not disclosing your account passwords and related personal information to others. If you find that your personal information, especially your account or password, is leaked, please contact the customer service of the software immediately, so that we can take corresponding measures according to your application.
7, we will develop emergency response plans, and in the event of user information security incidents immediately activated emergency plans, and strive to prevent the impact of these security incidents and consequences of expansion. In the event of a personal information security incident, we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can independently prevent and reduce risks, and the remedial measures for you. Our disposal measures, your own risk prevention and mitigation recommendations, remedies for you, etc. We will promptly inform you of the relevant information by email, letter, telephone, etc. When it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will also proactively report the disposal of personal information security in accordance with the requirements of the regulatory authorities.
5. Your Rights
In accordance with the relevant laws, regulations and standards of China, as well as the common practices of other countries and regions, we guarantee that you exercise the following rights to your personal information:
(a) Access to your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise your data access rights, you can do so yourself in the following ways:
1, Access avatar, nickname and other basic information:
Enter the software, click "My" page for information query and access.
2. If you cannot access the above personal information through the above path, you can submit personal information for feedback in the "My - Feedback", we will process it within 15 working days and feedback the relevant processing results to you.
You can click on the "Personal Information Collection List" to check the overall situation of our collection of your personal information.
(2) Correction of your personal information
1. You can correct/modify your relevant personal information in our products and/or services. In order to facilitate you to exercise your above rights, we provide you with two ways to correct/modify yourself online and submit an application for correction/modification to us.
2. For some of your personal information, we provide you with operation guidelines and operation Settings on the relevant function page of the product, and you can directly correct/modify it. For example, the path to correct/modify the information of "Bookshelf record" in the software is: Bookshelf.
3. For the difficulties you encounter in exercising the above rights, or for other reasons that may not/cannot provide you with the online right to correct/modify yourself, you have the right to correct or modify the wrong or incomplete information, provided that your identity is verified and the correction does not affect the objectivity and accuracy of the information, or in certain circumstances, especially when the data is wrong. Submit your request for correction/modification to us through our published feedback and errors, etc., asking us to correct or modify your data, except as otherwise provided by laws and regulations. However, due to security and identification considerations, you may not be able to modify some of the initial registration information submitted during registration.
4. If you are unable to correct your personal information through the above methods, you can submit your personal information for feedback in the "My - Feedback" page, and we will process it within 15 working days and feedback the relevant processing results to you.
(C) Delete your personal information
In the following circumstances, you can make a request to delete personal information to us on the "My - Feedback" page or through customer service email, telephone, feedback, etc. :
1. If we process personal information in violation of laws and regulations;
2. If we collect and use your personal information without your consent;
3. If our processing of personal information violates the agreement with you;
4, if you no longer use our products or services;
5, if we no longer provide you with products or services.
Once the above deletion request is responded to, we will also notify the subject who has obtained your personal information from us at the same time, as far as possible, asking them to delete it in a timely manner, unless otherwise provided by law or regulations, or these entities have obtained your independent authorization. At the same time, please be aware that if your public information in the software is captured, cached, stored, copied by other users or independent third parties who do not cooperate with us and are not controlled by us, or uploaded or saved by other users on other networks, the relevant information is not controlled by us.
When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete it when the backup is updated.
(D) Change the scope of your authorization
1, if you plan to change the scope of authorization or do not want to accept the commercial advertisements we send to you, you can contact us according to the contact information we provide.
2, if you want to cancel the agreed authorization, you can submit personal information in the "My - feedback" page for feedback, we will be processed within 15 working days and the relevant processing results feedback to you.
(5) The personal information subject obtains a copy of personal information
You have the right to obtain a copy of your personal information and you can contact us through the contact details provided by us.
Where technically feasible, such as data interface matching, we may also transfer a copy of your personal information directly to a third party designated by you upon your request.
(6) Constraint information system automatic decision-making
In some business functions, we may make decisions based solely on non-human automatic decision mechanisms, including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you can contact us through the contact information provided by us, you have the right to ask us to explain, and we will provide appropriate remedies.
(vii) Responding to your above requests
For security purposes, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
We will respond within 15 working days after verifying your identity. If you are not satisfied, you can also complain to the government or the competent department of the industry according to law.
For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee according to the situation. We may reject requests that are unnecessarily repetitive, require too much technical effort (for example, the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate interests of others, or are highly impractical (for example, involving information stored on backup tapes).
We will not be able to respond to your request in the following circumstances:
1, related to the personal information controller to fulfill the obligations stipulated by laws and regulations;
2. Directly related to national security and national defense security;
(3) Directly related to public safety, public health and major public interests;
(4) Directly related to criminal investigation, prosecution, trial and enforcement of judgments;
5. The personal information controller has sufficient evidence that the personal information subject has subjective malice or abuse of rights;
6. For the purpose of safeguarding the life, property and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;
7. Responding to the request of the personal data subject will cause serious damage to the legitimate rights and interests of the personal data subject or other individuals and organizations;
8. Involving trade secrets.
6. How do we handle children's personal information
Our products, websites and services are primarily aimed at adults. Children may not create their own user accounts without the consent of a parent or guardian. If a child sets up a personal account with our products and starts using them, we will consider that they have received permission from their guardian.
If you are the guardian of a child under the age of 14, before using our products or services, please carefully read and fully understand the Children's Personal Information Protection Rules, we will specifically explain to you the children's Personal information protection rules.
In cases where a child's personal information is collected with the consent of the guardian's parents, we will only use or publicly disclose this information when permitted by law, with the express consent of the parent or guardian, or when necessary to protect the child.
Although local laws and customs define children differently, we consider anyone under the age of 14 to be a child.
If we discover that we have collected personal information from children without prior verifiable parental consent, we will seek to delete the data as quickly as possible.
How do we store Personal Information
(1) Storage location
We store your personal information collected and generated during our domestic operations in the territory of the People's Republic of China in accordance with laws and regulations. At present, we will not transfer the above information overseas, if there is a cross-border transfer of personal information in the future, we will strictly comply with the relevant provisions of the laws and regulations of the People's Republic of China, and obtain your explicit authorization, except for your personal initiative such as cross-border release of dynamic information through the Internet.
(2) Storage period
1. We will take all reasonably practicable measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the shortest period necessary to achieve the purposes described in this policy and as required by law. When your personal information exceeds the retention period, we will delete your personal information or anonymize it in accordance with the requirements of laws and regulations. Unless it is necessary to extend the retention period or permitted by law, we will change the information storage period.
2. In the following cases, we may change the storage time of personal information in order to comply with legal requirements:
(1) To comply with the relevant provisions of applicable laws, regulations or policies and other normative documents;
(2) to comply with the decision of an administrative authority or similar authorized organization, a judgment or order of a judicial authority, an award of an arbitral authority or other legal procedure;
(3) We have reason to believe that we need to comply with relevant laws and regulations;
(4) For the implementation of the relevant service agreement or this policy, to safeguard the public interest, to protect our users, our or our affiliates, other users or employees and other third party personal property safety or other legitimate rights and interests of reasonable and necessary purposes;
(5) When the software stops operating, we will notify you in the form of announcements on the website or in the program, and delete or anonymize your personal information within a reasonable period of time.
Viii. How is this Policy updated
The terms of this Agreement may be changed by the Company at any time, and the User shall periodically review this Agreement. Once the agreement is changed, the company will update it on this page, and prompt the change on the relevant page of the software and will send a red dot notice. The amended Agreement shall, upon publication, effectively replace the original Agreement. If you do not agree with the new terms of the agreement we have changed, you can submit relevant comments or cancel your personal account in "My - Customer Service feedback", we will deal with it within 15 working days and feedback the relevant results to you.
Material changes referred to in this Policy include, but are not limited to:
1. Our service model has undergone significant changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;
2, we have made major changes in the ownership structure, organizational structure, etc. Such as business adjustment, bankruptcy merger and acquisition caused by the owner change;
3, the main object of personal information sharing, transfer or public disclosure has changed;
4, your rights to participate in the processing of personal information and the way they are exercised have changed significantly;
5, we are responsible for handling personal information security departments, contact methods and complaint channels change;
6. When the personal information security impact assessment report indicates that there is a high risk.
Nine, how to contact us
Our contact information: Hong Kong Yueyou Technology Co., LTD
Office registered address: Floor 105, Building 87, Xidian Village, Gaobeidian Township, Chaoyang District, Beijing
Personal Information protection person contact: 【010-85764882】
Customer service phone: 010-85764882
Customer service E-mail: kefu@yueyouxs.com
If you have any questions, comments or suggestions in the process of using the software and this Privacy Policy, you can contact us through the above contact information, we will contact and reply you within 15 working days.