Chengdu Guluoying Technology Co., LTD. (hereinafter referred to as "Our Company") attaches great importance to the protection of users' personal information and privacy. Therefore, we have developed a privacy policy covering how we collect, store, use, share and protect user information and how we provide you with access to, update, delete and protect such information. Through this Privacy Protection Statement (hereinafter referred to as the "Privacy Policy"), we hope to clearly explain to you how we will handle your personal information and other information.
This Privacy Policy is related to your use of Top Widgets products and/or services (hereinafter referred to as "Universal Widget"). Please fully read and thoroughly understand the Universal Widget Privacy Policy and ensure that you understand our rules for handling your personal information and other information before using all products and/or services of Universal Widget. And choose accordingly as you see fit.
If you do not agree with any content of this Privacy Policy, which means that you opt out of using the Universal Widget Products and/or Services, please immediately stop using the Universal Widget Products and/or Services. By using any of the products and/or services of Universal Widget, you agree to and fully understand the contents of this Privacy Policy. We will explain relevant information item by item in the privacy policy, please pay special attention to it.
In addition to this privacy Policy, under certain circumstances, we will also explain to you the purpose, scope and use of the corresponding information through instant notification (including pop-up window, page prompt and little red dot prompt) and function update description. These instant notification and function update description form part of this Privacy Policy and have the same effect as this Privacy Policy.
The following will help you understand in detail how we collect, use, store, transmit, disclose and protect personal information; Help you understand how personal information is handled. We will explain relevant information item by item in the privacy policy, please pay special attention to it.
1.Information collection scope
2.How do we collect information
3.How do we use information
4.Third-party partner sharing, transfer and public disclosure
5.How do we store and protect personal information
6.Protection of minors
7.Manage your personal information
8.Service content changes
9.Access and revision of Privacy policy
10.Contact us
1. Information collection scope
1.1 When you register, log in, subscribe to members within the APP and use relevant services, you can register and log in to the APP by using a third-party account, but you need to authorize us to obtain your information on the third-party platform (public information of profile picture, nickname and other information authorized by you) for generating a universal widget account bound to the third-party account. So that you can directly register, log in and use the relevant services of the APP. In some cases, we need to re-verify and bind your mobile phone number to confirm the authenticity and relevance of the third-party account.
1.2 We will generate a universal widget account for your account when you log in the APP with the authorization of a third party. This is the public identifying information of your account. When you use the widget login and sharing function of the APP, this information will be publicly displayed.
1.3 In order to provide continuous service and ensure service quality, we will record and save your login and use information of the Service during your use of the Product, including software and hardware characteristic information and user identifier.
2. How to collect information
2.1 We collect your information through your voluntary submission and the corresponding records generated during your use of our services.
2.2 We may collect and use your information through preferences and other relevant techniques. Some of the specific uses we use preferences for include remembering your identity. For example: preferences help us to identify your identity as our registered users, analyze your use of our services, in order to provide you with more thoughtful personalized services, system preference setting services.
2.2 We are committed to providing you with safe and reliable products and use environment. Providing high-quality and reliable services and information is our core goal. In order to maintain the normal and stable operation of relevant products or services, and protect the safety and legal interests of you or other users or the public, we will collect such information at each startup with your consent. Necessary information:
(1) In order to ensure the safe operation, quality and efficiency of the software and service, we will collect your hardware model, operating system version number, device identifier (IMEI, OAID, Deviceld, IMSI, ICCID, GAID, MEID, IDFA、IDFV; Different identifiers vary in terms of their validity period, whether they can be reset by the user, and how they are obtained.), network device hardware address (MAC address), hardware serial number, IP address, WLAN access point (such as SSID, BSSID), Bluetooth, base station, software version number, network access mode, type, status, network quality data, operation, usage, service log, sensor information data.
(2) In order to prevent malicious programs and ensure operation quality and efficiency, we will collect information about installed applications or running processes, the overall operation, usage and frequency of applications, application crashes, overall installation and usage, performance data and application sources.
(3) We may use your account information, equipment information and service log information, as well as the information authorized by you or provided to us by our affiliates and partners in accordance with the law, to judge account security, transaction security, identity verification, identification of violations, detection and prevention of security incidents, and take necessary record, analysis and disposal measures according to the law.
2.3 The use of Cookie and other similar technologies
Similar technologies such as cookies and device identification are commonly used on the Internet. When you use the Services and related Services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device for the purpose of collecting and identifying information about your access to and use of the Products. We promise that we will not use cookies for any purpose other than the purpose set forth in this Privacy Policy. We use cookies and similar technologies mainly to achieve the following functions or services:
Ensure the safe and efficient operation of products and services: We may set authentication and security guarantee cookies or anonymous identifiers, so that we can confirm whether you log in to the service safely, or whether you encounter theft, fraud or other illegal activities. These technologies will also help us improve service efficiency and speed up login and response.
Help you have an easier access experience: Using this type of technology can save you from having to repeat the steps and processes of filling out your personal information and entering what you are searching for (examples: Save information from components, form submission).
Recommend, display, and push content that you might be interested in: We may use such technology to learn about your preferences and usage habits, conduct data analysis to improve products and services, recommend information or features that are of interest to users, and optimize your choice of advertising or content.
In the content sharing page, we may use cookies to record browsing activity, to recommend information to you, to detect crashes, latency related exceptions, and to explore better ways to serve.
Clearing of cookies: You can clear Cookie data by going to APP Settings > More > Clear cache, but you may not be able to use the functions or services provided by us that depend on cookies after clearing.
2.4 Exemption from consent processing of personal information in accordance with the law
Please understand that under the following circumstances, according to laws and regulations, we do not need to obtain your authorization to process your personal information.
a) necessary to enter into or perform a contract at your request;
b) necessary for the performance of statutory duties or obligations, such as those directly related to national security, national defense security, criminal investigation, prosecution, trial and enforcement of judgments;
c) necessary for responding to public health emergencies or for protecting the life, health and property safety of natural persons in emergency situations;
d) Conduct news reporting, supervision by public opinion and other acts in the public interest, and process personal information within a reasonable scope;
e) To process, within a reasonable extent, the personal information disclosed by you or other personal information legally disclosed (such as the personal information legally disclosed by news reports, government information disclosure and other channels);
f) Other circumstances stipulated by laws and regulations.
Special Note: According to the law, information that cannot be identified alone or in combination with other information to a specific individual is not personal information. When your information can be identified by you alone or in combination with other information, or when we use data that has no connection with any specific individual in combination with your personal information, we will treat it as your personal information and protect it in accordance with this Privacy Policy.
3. How we use information
3.1 Use of Information
In order to be able to properly provide you with the relevant features of the widget, we will collect relevant device information from you, which will be collected by the application, subject to your consent, each time you use the relevant feature or in the following scenarios, which include
3.1.1 Device information
Phone model, system version, network type, battery level, available storage space, application and file names and types, current application version number information, memory usage, CPU information (frequency, model, architecture) sensing information, device manufacturer.
3.1.2 Application List
When you use custom icons and icon albums we get the Bundle ID of your local application list program so that you can quickly select an icon to install.
When you use Quick Launch widget, in order to facilitate your selection of mobile local application, we will get your local application list application Bundle ID, so that you can quickly match the Quick Launch APP icon.
3.1.3 Location Permissions
Rough geolocation information obtained through network location information (IP and WLAN); precise geolocation information obtained through GPS information, WLAN access point, Bluetooth and base station information. Precise geolocation information is only available when you turn on the Geolocation permission.
When you are using weather widget, negative screen widget, dashboard widget, we need to get location permission to collect and use your geolocation information for displaying and recommending local weather related information of your area (city, district and county).
When you are using the Dry Rice Man widget, we will get location access to collect use your geographic location information for the purpose of recommending information about businesses near your area.
When you use the Health Code widget, we will obtain location access to collect information about the health code applets in your area using your geographic location.
When you use the lock screen distance widget, we will get the location permission to collect your geographic location information and display the distance information of your bound friends on the lock screen widget.
When you use the Wooden Fish widget, we will display the data of your region in the Wooden Fish Merit Ranking List through the rough geographic location information (IP and WLAN).
3.1.4 Photo Permissions
When you add new icons to the component edit page, custom icons, transparent components to upload images, desktop voice widget to upload audio, online customer service, and rabbit nest feedback questions, we will get your photo album permission to upload image components to the widget.
When you share images using the Word of the Day, save images with Horoscope, download wallpapers, download beautification galleries, and save icon materials, we will get your album permission so that you can save the content to the album.
3.1.5 Camera Permissions
When you use the online customer service and rabbit nest to give feedback, we will get your camera permission so that you can take pictures or record the problem to submit feedback information.
3.1.6 Microphone Permissions
When you use the online customer service feedback problem, we will get microphone recording permission, so that you can shoot or record video content through the camera to submit feedback content to customer service to locate the problem you encountered.
3.1.7 Bluetooth Permissions
When you are using the X Panel widget, we will get your Bluetooth permission, which is mainly used to display Bluetooth status information in the X Panel widget.
3.3.8 Real-time Activity Permissions
When you use Lingering Island, Soccer Tournament, Smart Pet Assistant, Quick Launch in iOS16 or above system version, we will get real-time activity permission in order to display the feature in the phone lock screen page.
3.1.9 Sports and Health Permissions
When you use Lively Island, Steps widget, Lock screen step comparison, Dashboard widget, X Panel, Pedometer widget, we will get your Sports & Health permission, which is mainly used to help you use health related widget to show the step feature.
3.1.10 Pedometer Permissions
When you are using the exercise steps related widget, we will get the pedometer permission to monitor the content in the exercise steps display widget.
3.1.11 Log information
During the secure operation of the software and services, we collect your device information and log information. Device information refers to information related to device model, network identifier, network access information and device performance, which may be expressed as "phone information" in mobile devices, and does not mean that the App collects communication content or private information that you actively enter; log information refers to service logs generated during your use of the Services.
3.1.12 Contact Information
When you encounter problems during the use of APP and need to give us feedback, we will collect your phone number/email/QQ/WeChat/other information (optional) so that our product team can better locate and solve the problems you encounter.
3.1.13 APP request tracking permission
Advertising Identifier (IDFA), open permission will not get your private information in other sites, the permission is only used to identify the device, meet your personalized needs, we will optimize our services based on the information generated when the service responds to your needs, and to ensure the safety of the service and prompt browsing experience.
3.1.14 Content recommendations
Recommend content that may be of more interest to you
In order to recommend information that may be of more interest to you, we will collect usage information, device information, location information, search content, search history, and the server will combine these information to provide you with personalized content recommendation services. We will compile statistics and do feature and preference analysis through algorithms to form an indirect crowd profile, which can be used to recommend, display or push information that may be of interest to you, or push specific features or services that are more suitable for you.
When you use the Woodfish widget, we will use the rough geographic location information (IP and WLAN) to display the data of your region in the Woodfish Merit Ranking.
3.1.15 Advertising Push
Posting promotional information about products or services to you
We may publish promotional information (advertisements) about goods or services to you. We may collect usage information, IP addresses, MAC addresses, location information IMEI、IDFA、IDFV, system type, system version, network environment, information recommended based on your preferences, and also information generally published that is not specific in nature. We may share information with partners who conduct promotions and advertising, but we will take the necessary technical means to provide you with more relevant promotional information without identifying you personally.
We may share group profiles or statistical information with service providers, vendors and other partners of our business that is difficult or impossible to correlate with your true identity. This information will help us analyze and measure the effectiveness of our advertising and related services.
3.1.16 Face ID Facial Recognition
When you use the hidden app and app lock function of the app safe, we will get the permission to encrypt the safe; when you forget the password of the app safe, we will get your "Face ID" permission to verify your identity.
3.1.17 Screen usage time
Set screen usage time, limits and restrictions, app usage and content ratings.
When you use the hidden apps, app lock feature of the app safe, we will get the screen time permission so that you can choose the desired app to set the limit and restriction.
3.1.18 Notification Push
When you use the unlocked apps in the app safe, we will get your "Push Notifications" permission. If you refuse this permission, you will not be able to unlock the app quickly, you can only unlock the app by opening the app.
3.1.19 Other Scenarios
Other relevant scenarios that may require the collection of information, if the use of the scenario is not reasonably related to the initial scenario, we will re-obtain your consent before using the information.
4. Third party sharing, transfer and public disclosure
We will not share your information with any unrelated third party without your consent, except as follows:
We may share your information with our affiliates, third party service providers, contractors and agents only for the following purposes:
4.1 Provide functions or services that are necessary in "1. Scope of Information Collection" and are necessary in "3. Information Use is required for the purposes described in the section ".
4.1.2 fulfill our in [user agreement] (https://us.xiaozujian.com/userAgreement.html) or the obligations and exercise our rights in this statement.
4.1.3 If we share your information with any of the above third parties, we will strive to ensure that the third party's use of your information complies with this Statement and other appropriate confidentiality and security measures that we require them to comply with.
4.1.4 In order to ensure the stable operation and function realization of our client, so that you can use and enjoy more services and functions, our application will be embedded in the SDK or other similar applications of authorized partners. During the cooperation with our partners,
The following principles will be observed:
a) Principle of legality: Where data processing activities are involved, the principle of legality shall be observed.
b) The principle of justification and minimum Necessity: Data use must have a legitimate purpose and should be limited to the extent necessary to achieve the purpose.
c) The principle of security prudence: We will carefully evaluate the purpose for which partners use data, conduct a comprehensive assessment of the security guarantee capability of these partners, and require them to follow the cooperation legal agreement.
d) We will strictly monitor the software development kit (SDK) and application program interface (API) through which the partner obtains information to protect data security, and agree strict data protection measures with authorized partners to make them handle personal information in accordance with this Policy and any other relevant confidentiality and security measures. [Click to view the SDK details of our access to third-party authorized partners.] (https://us.www.xiaozujian.com/SDK.html)
4.2 Delegation Processing
In the case of entrusted personal information processing, we will sign relevant processing agreements with the entrusted partner in accordance with laws and regulations, and supervise their personal information use activities.
4.3 Common Processing
For the scenario of jointly processing personal information, we will sign relevant agreements with our partners in accordance with legal provisions and agree on their respective rights and obligations to ensure compliance with relevant legal provisions and data security protection in the process of using relevant personal information.
4.4 Scope of partners
If specific functions and scenarios involve services provided by our affiliates or third parties, the scope of the partners shall include our affiliates and third parties.
4.5 Cooperation scenarios
(1) Message notification: In order to adapt the message push function to the terminal model you use, the terminal device manufacturer Apple Inc. It is possible to use your phone model, version and related device information through SDK and other technologies.
(2) Login and binding of other third party accounts: When you log in our products or services with your wechat account, with your consent, the products or services of the above third party will use your nickname, profile picture and other information authorized by you.
(3) Activity participation: When you choose to participate in the marketing activities held by us, with your consent, we and our partners may need to use your name, correspondence address, contact information and information, so that the cooperation can cash the rewards to you. When you participate in the marketing activities jointly organized by us and our affiliates, you may synchronize your account number (including identifier), participation performance, progress and revenue information among multiple participating mobile applications (referred to as "activity Platform") to ensure that you can obtain a complete service experience in the activity.
(4) Customer service: In order to handle your complaints, suggestions and other demands in a timely manner, the customer service provider needs to use your account and relevant information to understand, process and respond to your needs in a timely manner. If necessary, it may also be necessary to use your mobile phone number or other means of communication to get in touch with you.
(5) Payment service: We will use the payment service when you open the membership. The payment function is provided by Apple Inc. To provide services to you. It may be necessary to collect your payment information, such as the expiration date, mobile phone number, email, address and bank card information, which are personal sensitive information and necessary for the payment function. Refusing to provide such information will cause you to be unable to use this function, but will not affect the normal use of other functions.
(6) Advertising: We may share analytically de-identified device information or statistical information with advertising service providers, suppliers and other partners (collectively, "advertising partners") that is difficult or impossible to relate to your true identity. This information will help us analyze and measure the effectiveness of our ads and related services.
a) Advertising push and placement: Advertising partners who carry out push/promotion and advertising placement or provide related services may need to use de-identified or anonymized device, network, channel information and label information; Advertising partners working with advertisers for AD feed/promotion, placement/analytics services may need to use the foregoing information to achieve AD placement, optimize and increase effective AD reach.
b) Advertising statistical analysis: Advertising partners providing advertising statistical analysis services may need to use your device, network, AD clicks, viewing, display, and AD conversion data information to analyze, measure, and improve the effectiveness of ads and related services.
c) Use of information by advertising partners: Advertising partners may combine the above information with other data legally obtained to optimize the effect of advertising delivery. We will require them to use the information in accordance with the principles of legality, legitimacy and necessity to ensure that users' legitimate rights are not infringed.
d) Advertisement information: The contact information and address information you fill in and submit in the advertisement may be collected and used by the advertiser or its entrusted partners.
(7) Realize security and statistical analysis
a) Ensure use safety: We attach great importance to the security of our products and services. In order to protect users' legitimate rights and interests from illegal infringement, our partners may use necessary equipment, account numbers and log information.
b) Product analysis: To analyze the stability of products and services, partners providing analysis services may require service usage (crash and flash shutdown records), device identification information, and overall application installation and usage information.
(8) One-click sharing service: In order to provide you with one-click sharing service, our product integrates the Alliance + U-Share SDK, which will collect your device ID information (such as IMEI/IDFA/deviceld) and the public information of your social account that you need to share, so as to complete the one-click sharing service. For the sake of your information security, we have made a data security confidentiality agreement with third-party SDK service providers, and these companies will strictly abide by our data privacy and security requirements. We will not share your personally identifiable information with them unless we have your consent. To facilitate you better understand the data types and their Allies + 】 【 USES, and how to protect your personal information, you can log on to https://www.umeng.com/policy for + 】 【 Allies privacy policy."
5. How do we store and protect personal information
5.1 Information Storage
5.1.1 We store your personal information collected and generated during our operations within the territory of the People's Republic of China in accordance with laws and regulations. We will not transmit the above information overseas. If we do, we will follow the relevant national regulations or seek your consent.
5.1.2 Storage Duration
a) We will only retain your personal information for as long as it is necessary to provide you with our products or services, such as:
The content and related information posted by you will be retained by us to provide you with ongoing business functions until you withdraw, delete or cancel your account.
b) We will delete or anonymize your personal information if you cancel your account, delete your personal information voluntarily or if your information exceeds the necessary retention period, except in the following cases:
Comply with the information retention requirements of laws and regulations (for example, the Electronic Commerce Law stipulates that commodity and service information and transaction information shall be kept for no less than three years from the transaction completion date).
Where the time limit needs to be reasonably extended for financial, auditing, dispute resolution and other purposes.
5.1.3 Generally, we retain your information only for the duration of the service provided to you and no longer than necessary for the relevant purposes. However, we may need to retain your information or part of your information for an extended period of time if:
Comply with applicable laws and regulations and other relevant provisions.
a) Comply with the requirements of a court judgment, order or other legal process.
b) Comply with the requirements of public security organs, government organs or other competent authorities.
c) We have reason to believe that laws and regulations and other relevant provisions shall be complied with.
d) Use reasonably necessary to implement the relevant service Agreement or this Privacy Statement, safeguard the public interest, handle complaints/disputes, and protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliates, other users or employees.
5.2 Information Security
5.2.1 We strive to ensure information security to prevent information loss, improper use, unauthorized access or disclosure.
We use a variety of security technologies to keep information safe. For example, we will use server multiple backup, password encryption security measures to prevent information disclosure, damage, loss.
5.2.2 We will establish a special security department, security management system and data security process to ensure the security of your personal information. We adopt a strict system of data use and access to ensure that only authorized personnel have access to your personal information. We regularly conduct safety education and training for our personnel, and conduct safety audits on data and technology when appropriate.
We will formulate, organize and implement the emergency plan for personal information security incidents, and immediately start the emergency plan when personal information security incidents occur, and strive to control the impact of these security incidents and prevent the expansion of adverse consequences. In the event of any personal information security incident (disclosure, tampering, loss) occurring or possibly occurring, we will inform you of the following information in a timely manner in accordance with the requirements of laws and regulations: The types and causes of personal information leakage, tampering and loss that occurred or may occur, the possible harm, the remedial measures we have taken, the measures you can take to mitigate the harm and the way to contact us.
We will timely inform you of the relevant information through push notification, email, letter, SMS and other relevant forms. If it is difficult to inform you one by one, we will make announcements in a reasonable and effective way.
At the same time, we will also report the handling of personal information security incidents according to the requirements of relevant regulatory authorities.
5.2.3 We attach great importance to information security compliance and fully guarantee your information security through numerous international and domestic security certifications.
However, please understand that due to technological limitations and possible malicious means, in the Internet environment, it is impossible to ensure 100% security of information even if we do our best to strengthen security measures. You need to understand that the systems and communication networks you use to access our services may become problematic due to factors beyond our control. You agree to exempt us from liability in this case.
In case of personal information leakage and other security incidents, we will launch an emergency plan to prevent the expansion of security incidents, report it in time according to the relevant provisions of the National Cyber Security Incident Emergency Plan, inform you of the relevant situation by sending emails, push notifications and announcements, and give you security suggestions.
5.2.4 In order to ensure your information security more effectively, we also hope that you can strengthen your awareness of self-protection. We are only responsible for the disclosure of your personal information directly caused by the service. Therefore, please keep your account and password information properly to avoid the disclosure of your personal information. Do not provide your account password or other personal information to any third party unless you deem it necessary.
6 Protection of minors
We attach great importance to the protection of minors' personal information
6.1 We presume that you have the corresponding capacity for civil conduct. If you are a minor, we ask that you ask your parents or other guardians to read this policy carefully and use our services or provide us with information with the consent of your parents or other guardians.
If you are the parent or other guardian of a minor, please pay attention to whether the minor has obtained your authorization to use our services.
6.2 If you fail to obtain your guardian's consent or you fail to allow your ward to use our services and provide us with information, you or your ward shall immediately stop using our services and contact us in time.
Upon receipt of your written notice that Autonavi has collected minors' personal information without prior consent of the guardian, Autonavi will immediately stop the collection and use of such information.
7. Manage your personal information
We attach great importance to your management of personal information, and do our best to protect your rights to access, copy, correct, supplement, delete, withdraw authorization, cancel account, complain and report your personal information, so that you have the ability to understand and protect the security of your personal information.
However, please understand that specific business functions and services will require your information to be completed. After you withdraw your consent or authorization, we will not be able to provide you with the corresponding functions and services, nor will we process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect our previous processing of personal information based on your authorization.
The management methods provided by us may vary in different versions or operating systems. The actual conditions prevail.
7.1 Setting System Permission
a) You can turn on or off location information, health, albums, permissions, change the scope of authorization or withdraw your authorization in the Settings function of the device. After the authorization is withdrawn, we will no longer collect information related to these permissions, but it will not affect our previous personal information processing based on your authorization. You can read/permission to apply for and use case (https://us.xiaozujian.com/userPermissionIos.html), in order to understand our application and use of system permissions.
b) You can choose whether to receive system notifications from the APP or set the type of system notifications you want to receive from the mobile system Settings > Notifications >TopWidgets >.
c) If you do not want us to access your album to help you change the widget background border, you can turn off the authorization of the album by going to mobile Settings >Top Widgets > Permission List.
d) If you don't want our weather Widgets to get your geolocation, you can turn off location authorization from mobile System Settings >Top Widgets > Permission List.
e) If you do not want to be recommended personalized content, you can turn off "Personalized Content Recommendation" by going to APP > More > License Settings > Personalized Ads. When you choose to turn off personalized content recommendations, it will no longer show you content related to your personal information or interests, but it will still show you ads.
7.2 You may access, modify and delete your information during the use of our services. How you access, modify, and delete information will depend on the specific service you use.
7.3 If you find that we collect or use your information in violation of laws and regulations or as agreed by both parties, you may request us to delete it. If you find that your information collected and stored by us is wrong and cannot be corrected by yourself, you may also ask us to correct it.
7.4 When accessing, modifying or deleting relevant information, we may require you to verify your identity to ensure the security of your account. Please understand that due to technical limitations and legal and regulatory requirements, some of your requests may not be responded to.
For security and identity reasons, you may not be able to modify some of the initial registration information submitted during registration. If you really need to modify such information, please contact us via email (wannengxiaozujian@163.com). We will review the problem as soon as possible and reply you within 15 working days after your user identity is verified by specially-assigned personnel.
7.5 Some of your information may not be accessible, modified or deleted due to legal requirements and legitimate reasons to ensure information security.
7.6 You can contact or open the APP--> Account --> More --> click the account avatar --> Account Management --> Logout through the contact information listed in the privacy policy to complete the logout process. After we receive your request, the data of your account will be cleared within 24 hours. This operation cannot be recovered.
Please note and be aware that you backed up all information related to your account before logout, and make sure that all services related to this account have been properly handled. After the logout is complete, we will delete your personal information or anonymize it. Please acknowledge and understand that the relevant log records will be retained for at least 6 months according to relevant laws and regulations.
8 Service content changes
Please understand that as our business evolves, we may adjust the products or services we offer. If the purpose, method and scope of personal information processed by the adjusted products or services change, we will inform you again and obtain your consent according to the relevant requirements of laws and regulations.
8.1 As our business continues to grow, we and our affiliates may enter into mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will comply with the requirements of relevant laws and regulations, notify you before transfer, ensure the confidentiality of information transfer, and continue to fulfill the corresponding responsibilities and obligations after the change.
8.2 We may also disclose your information for the following reasons:
a) Comply with applicable laws and regulations and other relevant provisions.
b) Comply with the judgment, order or other legal procedure of the court.
c) Comply with the requirements of public security organs, government organs or other competent authorities.
d) We have reason to believe that laws and regulations and other relevant provisions shall be complied with.
e) Use reasonably necessary to implement the relevant service Agreement or this Privacy Statement, safeguard the public interest, handle complaints/disputes, and protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliates, other users or employees.
f) where you have lawfully authorized it.
If we disclose your information for the above reasons, we will promptly inform you in compliance with relevant laws and regulations and on the basis of this statement.
9 Privacy Policy Access and revision
9.1 Search
a. You can view this Privacy Policy when you first enter the APP, or on the APP -> More -> About -> Privacy Policy page.
b. Please understand that in order to meet the operation needs, we may develop different versions according to the mobile phone model, system version and mobile client you use. Therefore, when you use a specific version, the functions of the APP may be different from those described in this privacy policy, but the purpose, method and scope of data processing will not be affected. The specific available functions are subject to your actual use.
9.2 Updates and Notices
a. In order to provide you with better service, our products and services will be updated and changed from time to time, and we will revise this privacy policy in due time. We will not reduce your rights under the privacy policy currently in effect without your express consent.
b. After the update of this privacy Policy, we will issue the updated version in the APP and remind you of the updated content through the website or other appropriate means, so that you can keep abreast of the latest version of this Privacy policy.
c. We may also update the functions to help you better manage your personal information. Please pay attention to the relevant function description.
10 Contact us
We have set up a special personal information protection team and person in charge of personal information protection. If you have any questions, complaints, reports or suggestions concerning this privacy policy or personal information protection, you can contact us in the following ways:
a) Send an email to wannengxiaozujian@163.com.
b) By mail to: Legal Department, No. 2, 18th Floor, No. 777, Tianfu Fifth Street, High-tech Zone, Chengdu, China (Sichuan) Pilot Free Trade Zone
We will review your questions or suggestions as soon as possible and respond within 15 working days after verifying your user identity.
Company name: Chengdu Guluoying Technology Co., LTD
Unified Social Credit code: 91510100MA6C7J2U7T
Address: No. 2, Floor 18, No. 777, Tianfu Fifth Street, High-tech Zone, Chengdu, China (Sichuan) Pilot Free Trade Zone
Contact number: 028-86698261
Updated: 2023-01-09
Effective date: 2023-01-09