Privacy Policy Concise Version
As the operator of YoYo Novel (hereinafter referred to as the "Software"), Tianjin Shuchen Technology Co., Ltd. and its affiliates (referred to as "us") are aware of the importance of personal information to you and will do our best to protect the security and reliability of your personal information. This concise guide will help you gain an intuitive and concise understanding of how we collect and process personal information, as well as how to protect your privacy information. For more detailed information, please read the complete privacy policy of this software below.1. How do we collect and use information
(1) Contact information
When you submit a complaint, feedback, or suggestion, we may contact you through the phone number you provided.
(2) Browsing and search history
In order to show you your bookshelf records, we will collect your bookshelf addition records.
When you use our search service, we will record your operation logs, including search keywords, cumulative usage time, books and chapters you have read.
(3) Device information
To ensure the security of your account and system, we will obtain your device number, unique device identifier (IMEI, OAID, AndroidID, ICCID, SIM card information), IP address, device manufacturer, device model, operating system, network access method, network status, network quality data, system settings information and operation, usage, and service logs.
(4) Application List Information
When you start this software, TalkingData mobile application analysis and statistics will obtain your application list information through a third-party SDK; When browsing third-party advertisements, to identify whether you have downloaded relevant software, the above SDK will obtain your application list information.
(5) Clipboard
When you launch this software, in order to determine whether you are participating in specific activities we conduct with third parties, we will read the contents of your clipboard to identify whether there is relevant password information. We will only collect this information for verification and provide you with activity benefits when the clipboard contains the aforementioned information. We will not store any other information about your clipboard, and individual clipboard information cannot recognize your specific identity.
(6) Help and Feedback: When you provide feedback through this software, we require you to provide account information, problem description, and we may also ask you to provide your phone number and other personal information.
(7) Personalized content recommendation
In order to recommend books of interest to you for personalized recommendations, we will collect your reading behavior, reading time, joining the bookshelf behavior, reading preferences, nicknames, gender, and IP addresses to achieve personalized content recommendations. After the personalized content recommendation is enabled, we have conducted deidentification processing when collecting and using personal information. Data analysis only corresponds to specific codes that cannot be directly associated with user identity, and cannot and will never be associated with your real identity.
If you are not interested in the content we recommend to you, you can turn off personalized recommendations through [My] - [About Us] - [Understanding and Managing Personalized Recommendations]. After you turn off, we will not provide personalized recommendation services and will not affect the normal use of other products and services we provide.
(8) Basic functions
If you only want YoYo Novel to provide you with basic function modes, including novel reading, you can choose to enter the basic function mode. In basic mode, if you enable basic function mode, we will not collect your personal information in accordance with relevant laws and regulations. In basic mode, you can only use our products and services in browsing mode (i.e. not logged in), and in basic function mode, you cannot use services such as registration/login, content recommendation, activity participation, and content search.
You can re-enter YoYo Novel and choose to use the basic feature mode after withdrawing your consent to the privacy policy.
2. The third-party data processing involved in our services
We strictly comply with laws and regulations in the process of cooperating with third parties, and handle relevant data safely and prudently according to the principle of minimum necessity. We will sign strict confidentiality agreements with third parties, requiring them to handle personal information in accordance with our requirements, this privacy policy, and any other relevant confidentiality and security measures required by laws and regulations.
3. How do we protect information
We take various physical, electronic, and management security measures that comply with industry standards and are reasonable and feasible to protect the security of your personal information; We will use encryption technology, anonymization processing, and relevant reasonable and feasible means not inferior to industry peers to protect your personal information; We will establish a dedicated security department, security management system, and data security process to manage and standardize the storage and use of personal information; We will sign strict confidentiality agreements with our employees; We adopt strict data usage and access policies to ensure that only authorized personnel can access your personal information; We will develop an emergency response plan and immediately activate it in the event of a user information security incident.
4. How do you manage your personal information
(1) Manage personalized content recommendations
If you are not interested in the content we recommend to you, you can turn off the personalized recommendation function by going to [My] - [About Us] - [Understanding and Managing Personalized Recommendations]. After you close, we will not provide personalized recommendation services, and it will not affect the normal use of other products and services we provide. After disabling the personalized push function, the relevant functions no longer accurately push based on your preferences, preferences, and other personal information, but instead generally push or randomly push non personalized recommended content.
(2) Manage personal information and privacy settings
We provide you with convenient personal information management functions, where you can manage your various information on the 【 My 】 and 【 Bookshelf 】 pages. If you can view your browsing history or clear it in 【 Bookshelf 】 - 【 Reading History 】.
Privacy Policy
Update date: March 21, 2024
Effective date: March 21, 2024
Welcome to use this software and related services.
As the operator of YoYo Novel (hereinafter referred to as the "Software"), Tianjin Shuchen Technology Co., Ltd. and its affiliates (referred to as "us") are aware of the importance of personal information to you and will do our best to protect the security and reliability of your personal information. We are committed to maintaining your trust in us, adhering to the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of consent, the principle of minimum necessity, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. Meanwhile, we promise to take appropriate security measures to protect your personal information in accordance with mature industry security standards.This agreement is entered into between you and us regarding matters related to the protection of user personal information and privacy policies in the downloading, installation, and use of YoYo Novel (hereinafter referred to as "the Software"). Please carefully read and understand this Privacy Policy before using this software product and service. The key content has been highlighted in bold and black. Please pay special attention and read carefully. Your agreement to the privacy policy only means that you have understood the functions provided by the application and the necessary personal information required for the operation of the functions. It does not mean that you have agreed that we can collect non essential personal information. Non essential personal information will be separately sought for your consent based on your authorization during use.
The corresponding device permissions will not be enabled by default. When important or sensitive device permissions are involved, we will pop up a separate window and obtain your consent to enable them when you use the corresponding business functions; After the permission is enabled, you can also close the permission at any time through device settings; If you do not agree to enable permissions, it will not affect the normal use of other unrelated business functions. We will process sensitive personal information with your consent separately.
In order to provide you with better products and services, we will continuously improve our products. Therefore, we may frequently introduce new or optimized business functions. At that time, it may be necessary to collect new personal information or change the purpose or method of personal information use. We will update the terms of this policy based on the updates and relevant requirements of laws and regulations, which constitute a part of this policy. If this update results in a substantial reduction or significant change in your rights under this policy, we will separately explain to you the purpose, content, usage, and scope of this information collection through red dots or other means, and collect it with your explicit consent. You can check the latest personal information protection and privacy policies on this page at any time. You have the right not to accept the updated policies, but it may cause you to stop using a certain software or service provided by this software.
This policy will help you understand the following content:
1. How do we collect and use your personal information
2. How do we use cookies and similar technologies
3. How do we share, transfer, and publicly disclose your personal information
4. How do we protect your personal information
5. Your rights
6. How do we store personal information
7. How to update this policy
8. How to contact us
1、 How do we collect and use your personal information
When you use this software product and service, we will collect personal information that you voluntarily provide or generate as a result of using this software product and service. The collection and use of your personal information in this software includes the following two situations:
(1) Necessary personal information required for basic business functions: This type of information is essential for the normal operation of products and services, and you must collect and use it from the authorized software. If you refuse authorization and provision, you will not be able to use the products and services of this software normally.
(2) Non essential personal information required for additional business functions: This information is not necessary for basic business functions and is necessary to achieve certain specific functions or services. When you use or enable related functions or services, we will collect and use the personal information necessary for the aforementioned specific functions or services.
The corresponding device permissions will not be enabled by default. When important or sensitive device permissions are involved, we will pop up a separate window and obtain your consent to enable them when you use the corresponding business functions; After the permission is enabled, you can also close the permission at any time through device settings; If you do not agree to enable permissions, it will not affect the normal use of other unrelated business functions. We will process sensitive personal information with your consent separately.
Our company will only collect and use your personal information when providing reading services for the following purposes as stated in this policy:
(1) Browsing and searching
A. Personal information usage scope:
1. In order to show you your browsing history and bookshelf records, we will collect your browsing history and add it to the bookshelf records.
2. When you use our search service, we will record your operation logs, including search keywords, cumulative usage time, books and chapters you have read.
3. Basic functional services
According to the Provisions on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications, this software belongs to the type of e-book, and its basic function service is e-book reading. If you only want YoYo Novel to provide you with basic function mode, you can choose to enter basic function mode. If you enable the basic function mode, we will not collect your personal information in accordance with relevant laws and regulations. In basic mode, you can only use our products and services in browsing mode (i.e. not logged in), and in basic function mode, you cannot use services such as registration/login, content recommendation, activity participation, and content search.
B. Sensitive permissions called:
This feature will not call your sensitive permissions;
C. Using third-party SDKs:
This feature will not use third-party SDKs.
(2) Security protection function
A. Personal information usage scope:
1. Account security
To provide you with secure and stable services, ensure the security of your account property, prevent false login, and ensure operational quality and efficiency, we need to record your device number, unique device identifier (IMEI, OAID, AndroidID, ICCID, SIM card information), IP address, device manufacturer, device model, operating system, network access method, network status, network quality data, system settings information and operation, usage, and service logs. If you do not agree with us recording the aforementioned information, it may not be possible to complete risk control verification, which may result in you being unable to use our products and services.
2. Operations and Security
To ensure service security, operational quality and efficiency, we may collect application information or running process information, application frequency, crash data, overall usage, performance data, and the source of the application.
B. Sensitive permissions called:
This feature will not call your sensitive permissions;
C. Using third-party SDKs:
This feature will not use third-party SDKs.
(3) Application List Information
When you start this software, TalkingData mobile application analysis and statistics will obtain your application list information through a third-party SDK; When browsing third-party advertisements, to identify whether you have downloaded relevant software, the above SDK will obtain your application list information.
(4) Clipboard
A. Personal information usage scope:
When you start this software, in order to determine whether you are participating in specific activities we conduct with third parties, we will read the contents of your clipboard to identify whether there is relevant password information. Only when the clipboard contains the aforementioned information, we will collect that information for verification and provide you with activity benefits. We will not store other information about your clipboard, and individual clipboard information cannot recognize your specific identity.
B. Sensitive permissions called:
This feature will not call your sensitive permissions;
C. Using third-party SDKs:
This feature will not use third-party SDKs.
(5) Help and feedback
A. Personal information usage scope:
You can file a complaint, appeal, or consultation with customer service. When you provide feedback, we require you to provide your account information and problem description. At the same time, we may ask you to provide your phone number and other personal information in order to provide timely feedback on customer service. If you refuse to provide the above information, we may not be able to provide you with timely feedback on the complaint, appeal, or consultation results.
B. Sensitive permissions called:
This feature will not call your sensitive permissions;
C. Using third-party SDKs:
This feature will not use third-party SDKs.
(6) Personalized recommendations
A. Personal information usage scope:
During your browsing of our website or client, you can choose to bookmark books of interest. In order to provide you with personalized recommendations, we will collect your reading behavior, reading time, joining the bookshelf behavior, reading preferences, nicknames, gender, IP addresses, for the purpose of achieving the above functions and other purposes that we have clearly informed you. This type of information is necessary for personalized recommendations to you. If you refuse to provide it, we will not be able to recommend personalized information or services to you.
Please be aware that the personalized recommendation function and services will be disabled by default. Users need to enable it independently under "My" - "About Us" - "Understanding and Managing Personalized Recommendations" when using the personalized recommendation function. After opening, we conducted de identification processing when collecting and using personal information. Data analysis only corresponds to specific codes that cannot be directly associated with user identity, and cannot and will never be associated with your real identity. If you are not interested in the content we recommend to you, you can turn off the personalized recommendation function through [My] - [About Us] - [Understanding and Managing Personalized Recommendations]. After you close, we will not provide personalized recommendation services, and it will not affect the normal use of other products and services we provide. After disabling the personalized push function, the relevant functions no longer accurately push based on your preferences, preferences, and other personal information, but instead generally push or randomly push non personalized recommended content.
B. Sensitive permissions called:
This feature will not call your sensitive permissions;
C. Using third-party SDKs:
This feature will not use third-party SDKs.
(7) Please be reminded that in the following situations, according to laws, regulations, and rules, collecting and using your personal information does not require your consent:
1. Related to national security, national defense security, and other national interests;
2. Directly related to major public interests such as public safety, public interest, and public health;
3. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;
4. Being in a position to protect your or other individuals' significant legitimate rights and interests in life, property, etc., but it is difficult to obtain my consent;
5. The personal information involved is publicly disclosed by the individual information subject to the public on their own;
6. Collect your personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;
7. Necessary for maintaining the safety and stability of the provided products or services, such as discovering and handling malfunctions in the products or services;
8. Other situations stipulated by laws and regulations.
(8) When using this software, in order to ensure the implementation and safe and stable operation of our product functions, we may obtain your system permissions. System permissions will not be enabled by default, and will only be used for specific functions or services with your explicit authorization. You may revoke your authorization. For specific permission applications and usage details, please refer to:System rights list.。
2、 How do we use cookies and similar technologies
To ensure the normal operation of this software, we will store a small data file named Cookie on your mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. We may use relevant technologies to send one or more cookies to your device to collect, identify, and store information about your access and use of this product and service. We will not use cookies for any purpose other than those stated in this policy. We primarily use cookies and similar technologies to achieve the following functions or services:
1. Ensure the safe and efficient operation of products and services
We may set up authentication and security cookies to confirm whether you are securely logged in, or encounter theft and other illegal activities. These technologies will help us improve service efficiency, enhance login and response speed.
2. Helping you achieve a more relaxed user experience and service
With the help of cookies, we can store the habits of accessing programs, browsing history, and login information, helping you save the step of repeatedly entering registration information and providing you with a more relaxed user experience and services.
3. Recommend, showcase, and push content that you may be interested in
We may use cookies and/or similar technologies to understand preferences and usage habits, conduct data analysis, and improve product services, recommend information and content that users are interested in.
4. Clearing Cookies
If you refuse us to use cookies and/or similar technologies to collect and use your related devices, you may delete cookies and/or similar technologies already stored on your computer, mobile device, or other device, so that we cannot track all or part of your personal information. You understand and are aware that our products can only be implemented through the use of cookies and/or similar technologies. If you refuse to use or delete them, you may not be able to use our related products properly or obtain the best service experience through our products. At the same time, it may also have a certain impact on your information protection and account security.
3、 How do we delegate, share, transfer, and publicly disclose your personal information
(1) Entrusted processing
Some specific modules or functions in this business function are provided by external suppliers. For example, we will hire service providers to assist us in providing customer support. We will sign strict confidentiality agreements with companies, organizations, and individuals with whom we entrust the processing of personal information, requiring them to handle personal information in accordance with our requirements, this privacy policy, and any other relevant confidentiality and security measures.
(2) Sharing
We will not share your personal information with any company, organization, or individual outside of our company, except in the following circumstances:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with our affiliated companies and other cooperating parties in order to provide you with better quality services.
2. We may share your personal information with the public in accordance with laws and regulations or mandatory requirements from government regulatory authorities.
3. Sharing with authorized partners: Some of our services will be provided by authorized partners solely for the purposes stated in this policy. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legitimate, legitimate, necessary, specific, and clear purposes, and only share personal information necessary for providing services. Our partners have no right to use the shared personal information for any other purpose.
At present, our authorized partners include the following types:
(1) Authorized partners for advertising and analysis services. Unless we obtain your permission, we will not share your personal identification information (referring to information that can identify your identity, through which you can be contacted or identified) with partners who provide advertising and analysis services. But we may share your anonymized user profile with authorized partners in advertising and analysis services to help them improve effective ad reach without identifying your individual.
(2) Suppliers, service providers, and other partners. We send information to suppliers, service providers, and other partners worldwide who support our business, including providing technical infrastructure services, analyzing the usage of our services, measuring the effectiveness of advertising and services, providing customer service, facilitating payments, or conducting academic research and surveys.
In order to enable you to use the services and functions provided by this software, we will embed the SDK list of our partners in this software as follows:List of Third Party Information Sharing.
(3) Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.
2. When it comes to mergers, acquisitions, or bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies or organizations that hold your personal information to continue to be bound by this privacy policy, and will prompt relevant information on the relevant pages of this application and send red dot notifications. Otherwise, we will require the company or organization to seek your authorization and consent again. If you do not accept the relevant privacy agreement of the new entity or have any objections, you can contact the new entity for feedback or cancel your personal account.
(4) Public disclosure
We will only publicly disclose your personal information in the following circumstances:
1. After obtaining your explicit consent;
2. Legal disclosure: In the event of legal, procedural, litigation, or mandatory requirements from government authorities, we may publicly disclose your personal information to relevant authorities.
3. The types of personal information that may be involved in external sharing include device identification codes and software version information; The types of personal information that may be involved in public disclosure include reading books and reading duration. We are aware of the corresponding legal responsibilities for sharing, transferring, and publicly disclosing personal information to the public, and will take reasonable measures to ensure the security of your personal information.
4、 How do we protect your personal information
1. We strive to adopt various physical, electronic, and management security measures that comply with industry standards and are reasonable and feasible to protect the security of your personal information, preventing improper use or unauthorized access, public disclosure, use, modification, damage, loss, or leakage of the personal information you provide.
2. We will use encryption technology, anonymization processing, and other reasonable and feasible means not inferior to industry peers to protect your personal information, and use security protection mechanisms to prevent malicious attacks on your personal information.
3. We will establish a dedicated security department, security management system, and data security process to manage and standardize the storage and use of personal information. We adopt strict data usage and access policies to ensure that only authorized personnel can access your personal information, and conduct timely security audits of data and technology.
4. We sign confidentiality agreements with employee information contacts and regularly provide training on security skills and awareness. At the same time, we strictly select our partners, conduct background checks on them, and cooperate with well-known and reputable enterprises; Sign a confidentiality agreement with the contact person of the partner information, specifying the breach of contract liability for leakage, and only provide necessary and reasonable information.
5. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that in the Internet industry, even if we try our best to strengthen security measures, it is impossible to always guarantee the security of information 100% due to technical restrictions and possible malicious means. We will try our best to ensure the security of personal information you provide us.
6. You are aware and understand that there may be issues with your access to our product system and communication network due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of personal information, including but not limited to complex passwords, regularly changing passwords, and not disclosing your account passwords and related personal information to others. If you find that your personal information, especially your account or password, has been leaked, please contact the customer service of this software immediately so that we can take corresponding measures based on your application.
7. We will develop emergency response plans and immediately activate them in the event of user information security incidents, striving to prevent the impact and consequences of these security incidents from expanding. Once a personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impacts of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. Our disposal measures, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation through email, letter, phone, and other means. If it is difficult to inform the individual information subject one by one, we will take reasonable and effective measures to publish an announcement. At the same time, we will also proactively report the disposal of personal information security in accordance with regulatory requirements.
5、 Your rights
According to relevant laws, regulations, standards in China, as well as common practices in other countries and regions, we guarantee that you exercise the following rights over your personal information:
(1) Access your personal information
You have the right to access your personal information, except in exceptional circumstances stipulated by laws and regulations. If you want to exercise data access rights, you can access them yourself through the following methods:
1. Access basic information such as avatars and nicknames:
Enter this software and click on the "My" page to search for information and access it.
2. If you are unable to access the above personal information through the above path, you can submit your personal information for feedback in "My Feedback", and we will process it within 15 working days and provide you with the relevant processing results.
You can click onPersonal Information Collection ChecklistReview the overall situation of our collection of your personal information.
(2) Correcting your personal information
1. You can correct/modify your relevant personal information in our products and/or services. To facilitate your exercise of the above rights, we provide you with two methods: online self correction/modification and submitting a correction/modification request to us.
2. For some of your personal information, we provide you with operation instructions and settings on the relevant functional pages of the product. You can directly correct/modify it. For example, the correction/modification path for "bookshelf record" information in this software is: bookshelf.
3. For any difficulties you encounter during the exercise of the above rights, or for other situations where you may not/cannot be provided with online self correction/modification permissions, and after verifying your identity and ensuring that the correction does not affect the objectivity and accuracy of the information, you have the right to make corrections or modifications to incorrect or incomplete information, or in specific circumstances, especially when data errors occur, submit your correction/modification application to us through feedback and error reporting measures published by us, requesting us to correct or modify your data, except as otherwise provided by laws and regulations. However, due to security and identity recognition considerations, you may not be able to modify certain initial registration information submitted during registration.
4. If you are unable to correct your personal information through the above methods, you can submit your personal information for feedback on the "My Feedback" page. We will process it within 15 working days and provide you with the relevant processing results.
(3) Delete your personal information
In the following situations, you can request us to delete personal information on the "My Feedback" page or through customer service email, phone, feedback, and other means:
1. If our handling of personal information violates laws and regulations;
2. If we collect and use your personal information without your consent;
3. If our handling of personal information violates our agreement with you;
4. If you no longer use our products or services;
5. If we no longer provide you with products or services.
Once the above deletion request is responded to, we will also notify the entities that have obtained your personal information from us as much as possible, requesting them to delete it in a timely manner, unless otherwise provided by laws and regulations, or if these entities have obtained your independent authorization. At the same time, please be aware that if your public information in this software is captured, cached, stored, copied, or uploaded or saved through other users on other networks by other users or independent third parties who do not cooperate with us and are not under our control, the relevant information is not under our control.
When you delete information from our service, we may not immediately delete the corresponding information from the backup system, but we will delete this information during backup updates.
(4) Change the scope of your authorization
1. If you plan to change the scope of authorization or do not want to accept the commercial advertisements we send you, you can contact us using the contact information we provide.
2. If you want to cancel the agreed authorization, you can submit personal information for feedback on the "My Feedback" page. We will process it within 15 working days and provide you with the relevant processing results.
(5) Personal information subject obtains a copy of personal information
You have the right to obtain a copy of your personal information, and you can contact us through the contact information we provide.
On the premise of technical feasibility, such as data interface matching, we can also directly transmit a copy of your personal information to a third party designated by you according to your requirements.
(6) Constrained Information System Automatic Decision Making
In certain business functions, we may only make decisions based on non manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you can contact us through the contact information we provide, and you have the right to request an explanation from us. We will also provide appropriate remedies.
(7) In response to your above request
To ensure security, you may need to provide a written request or other means of proving your identity. We may first request you to verify your identity before processing your request.
We will provide a response within 15 working days after verifying your identity. If you are not satisfied, you can also file a complaint with the government or industry regulatory authorities in accordance with the law.
For your reasonable requests, we do not charge any fees in principle, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as involving information stored on backup tapes).
We will not be able to respond to your request in the following situations:
1. Related to the fulfillment of legal and regulatory obligations by personal information controllers;
2. Directly related to national security and national defense security;
3. Directly related to public safety, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;
5. The personal information controller has sufficient evidence to indicate that the personal information subject has subjective malice or abuse of rights;
6. For the purpose of protecting the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain my consent;
7. Responding to a request from a personal information subject will result in serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;
8. Involving trade secrets.
6、 How do we store personal information
(1) Storage location
We will store your personal information collected and generated during domestic operations within the territory of the People's Republic of China in accordance with laws and regulations. At present, we will not transfer the above information overseas. If there is a cross-border transfer of personal information in the future, we will strictly abide by the relevant provisions of the laws and regulations of the People's Republic of China and obtain your explicit authorization, except for your personal initiatives such as cross-border release via the Internet.
(2) Storage period
1. We will take all reasonable and feasible measures to ensure that unrelated personal information is not collected. We will only retain your personal information for the shortest period required by law to achieve the objectives stated in this policy. If your personal information exceeds the retention period, we will delete it or anonymize it in accordance with legal requirements. Unless it is necessary to extend the retention period or subject to legal permission, we will change the information storage period.
2. In the following situations, we may change the storage time of personal information to comply with legal requirements:
(1) To comply with relevant provisions of applicable laws, regulations, policies, and normative documents;
(2) To comply with the decisions of administrative agencies or similar authorized organizations, judgments, rulings of judicial organs, arbitration awards, or other legal procedures;
(3) We have reason to believe that it is necessary to comply with relevant laws and regulations;
(4) For the purpose of executing relevant service agreements or policies, maintaining social public interests, and for the reasonable and necessary purposes of protecting the personal and property safety or other legitimate rights and interests of our users, our affiliated companies, other users or employees, and other third parties;
(5) When this software stops operating, we will notify you through website or program announcements, and delete or anonymize your personal information within a reasonable period of time.
7、 How to update this policy
The terms of this agreement may be changed by our company at any time, and users are required to regularly review this agreement. Once there is a change in the agreement, our company will update this page and prompt the change content on the relevant pages of this software, and send a red dot notification. The revised agreement is effective as a replacement for the original agreement upon its publication. If you do not agree with the new agreement terms we have changed, you can submit relevant opinions or cancel your personal account in "My Customer Service Feedback". We will handle it within 15 working days and provide you with the relevant processing results.
The significant changes referred to in this policy include but are not limited to:
1. Our service model has undergone significant changes. Such as the purpose of processing personal information, the type of personal information being processed, and the way personal information is used;
2. We have undergone significant changes in ownership structure, organizational structure, and other aspects. Changes in ownership caused by business adjustments, bankruptcy mergers and acquisitions, etc;
3. The main objects of personal information sharing, transfer, or public disclosure have changed;
4. Your right to participate in personal information processing and the way you exercise it have undergone significant changes;
5. When there are changes in the department responsible for handling personal information security, contact information, and complaint channels;
6. When the personal information security impact assessment report indicates a high risk.
8、 How to contact us
Our contact information: Tianjin Shuchen Technology Co., Ltd.
Registered office address: Room 105, 2nd Floor, Building 87, Xidian Village, Gaobeidian Township, Chaoyang District, Beijing
Contact information of the person in charge of personal information protection: [010-85764882]
Customer service hotline: 010-85764882
Customer service email: kefu@yueyouxs.com
If you have any questions, opinions or suggestions regarding this privacy policy during the use of the software, you can contact us through the above contact information. We will contact you within 15 working days and reply to you.