Privacy Policy

Last update date: 2023.12.21

Reminder terms

It should be noted that this policy does not apply to services provided to you by other third parties. To ensure a smooth product experience, you may receive content or network links from third parties. Please carefully choose whether to access links, content, products, and services provided by third parties. Before submitting personal information to third parties, please carefully read these third-party privacy policies

Part 1 Definition

Personal information: refers to various information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person, either individually or in combination with other information

Personal sensitive information: refers to personal information including ID number, personal biometric information, bank account number, property information, travel trajectory, transaction information, etc.

Personal information deletion: refers to the act of removing personal information from systems involved in implementing daily business functions, keeping it in a state that is not retrievable or accessible.

Part 2 Privacy Policy

This privacy policy section will help you understand the following content:

1、 How do we collect and use your personal information

2、 How do we use cookies and similar technologies

3、 How do we share, transfer, and publicly disclose your personal information

4、 How do we protect your personal information

5、 How do you manage your personal information

6、 How do we handle children's personal information

7、 How to transfer your personal information globally

8、 How to update this privacy policy

9、 How to contact us

1、 How do we collect and use your information

You understand and agree that:

1. We are committed to creating a diverse range of products and services to meet your needs. Due to the wide variety of products and services we provide to you, and the specific range of products/services that different users choose to use, there may be differences in various functions and the types and scope of personal information collected and used. Please refer to the specific product/service functions;

2. To provide you with a better product and service experience, we are continuously striving to improve our technology. As a result, we may occasionally introduce new or optimized features, which may require the collection and use of new personal information or changes in the purpose or method of personal information usage. We will explain to you separately the purpose, scope, and usage of the corresponding information through updating this policy, pop ups, page prompts, and other means. We will also provide you with the option to choose and agree, and collect and use it with your explicit consent. During this process, if you have any questions, opinions or suggestions, you can contact us through the various contact methods provided in Article 8 "How to contact us", and we will provide you with answers as soon as possible.

(1) Help you become our user

1、Registration Services

To help you become our user, so that we can provide you with user service. You need to provide your phone number or email address to create a username and password (or verification code) to become our registered user.

If you only need to use browsing, search and other services, you do not need to register as our user and provide the above information.

2、Third party authorized login

SDK used for third-party authorized login:com.tencent.open(Tencent Open Platform),com.tencent.tauth(Tencent Open Platform),com.sina.weibo(Sina Weibo Open Platform),com.alipay(Alipay open platform),Tiktok open platform

3、Additional services

You can choose to further improve the account information of this product and bind itMobile phone number or email, you can also provide us with your profile picture, nickname, genderTo obtain more personalized additional services. We need to obtain your camera/album permissions to provide you with the service of setting up your avatar, and this permission is only invoked when you set up your avatar. You can refuse the application for the aforementioned permissions. If you refuse, you will not be able to access the relevant services, but it does not affect your use of other services.

4、Account authentication service

When you use features or services that require identity authentication, such as application updates, content publishing, etc., according to relevant laws and regulations, you may need to provideName, ID card number, telephone numberTo confirm your true identity. Some of this information belongs to personal sensitive information, and you may refuse to provide it, but you may not be able to access relevant services, but it does not affect the normal use of other functions and services.

5、Account login security

During your use of our services, in order to identify abnormal account status and based on basic operational requirements such as file caching and log storage, we need to obtain your public area read and write permissions, and may automatically collect your usage information and store it as network log information, including:

Device information: We will receive and record information related to the devices you use based on your specific operations during software installation and/or use (including Device model, operating system version, device serial number, device settings, MAC address, Equipment serial number, IMEI and other unique device identifiers, device environment, mobile application list and other software and hardware feature information), device location related information (including your authorized GPS location and sensor information such as WLAN access points, Bluetooth, and base stations)).

Service log information: When you use the products or services we provide, we will automatically collect your detailed usage of our services as a service log, including browsing, managing, publishing information, and so on IP address, browser type, telecommunications operator, language of use, access date and time.

Please note that individual device information and service log information cannot identify the identity of a specific natural person. If we combine this type of non personal information with other information to identify a specific natural person's identity, or use it in combination with personal information, during the combined use period, this type of non personal information will be considered personal information. Unless authorized by you or otherwise required by laws and regulations, we will anonymize and de identify this type of information.

In addition, we will also use your above information to continuously improve and optimize the above features.

(2)Application Management

(3)Customer service and problem-solving

Contact us through customer service consultation and other means: When you contact us, we will collect the consultation content you provide, as well as your device information and contact information(Account, address, email, communication/call history and content, or other contact information you leave behind)Waiting for information so that we can contact you or help you solve problems, or record the solutions and results of related issues.

(4)Providing You with Security

To enhance the security of your use of services provided by us and our partners, protect your or other users or the public's personal and property security from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and more accurately identify violations of laws, regulations, or relevant agreement rules, We embed application security software SDKs developed by third-party companies in the application to collect your Device information, service log information, and may use or integrate your membership information, transaction information, and information that our partners have authorized or legally shareable with you,To comprehensively assess the risks of your account and transactions, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

(5)Other

1、If the information you provide contains personal information of other users, you need to ensure that you have obtained legal authorization before providing us with this personal information.

2、If we use the information for other purposes not specified in this policy, or collect information for specific purposes for other purposes, or if we proactively obtain your personal information from a third party, we will obtain your consent in advance.

If we indirectly obtain your information from a third party, we will explicitly request in writing that the third party collect personal information after obtaining your consent in accordance with the law before collection, and inform you of the content of the shared information. If sensitive information is involved, it must be confirmed by you before being provided to us for use. We will require the third party to make a commitment to the legality and compliance of the source of personal information. If the third party violates the law, We will clearly require the other party to assume corresponding legal responsibilities; At the same time, our professional security team will strengthen the security of personal information (including sensitive information reporting, encrypted storage of sensitive information, access control, etc.). We will use no less than the same protection measures and measures as we do for our own user personal information to protect indirectly obtained personal information.

3、Exceptions to obtaining authorized consent

You fully understand and agree that we do not require your authorized consent to collect and use your personal information under the following circumstances, and we may not respond to your requests for correction/modification, deletion, cancellation, withdrawal of consent, or request for information:

(1)Related to national security and national defense security;

(2)Related to public safety, public health, and major public interests;

(3)Related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial, and enforcement of judgments;

(4)For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;

(5)Personal information that you disclose to the public on your own;

(6)Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels道

(7)According to the necessary agreements or other written documents signed and fulfilled with you;

(8)Necessary for maintaining the safe and stable operation of the provided products and/or services, such as discovering and dealing with faults in the products and/or services;

(9)Necessary for legitimate news reporting;

(10)When academic research institutions conduct statistical or academic research based on the public interest and provide academic research or descriptive results to the public, they de identify the personal information contained in the results;

(11)Other situations stipulated by laws and regulations.

Please be informed that, according to applicable laws, if we take technical and other necessary measures to process personal information such that the data recipient cannot re identify a specific individual and cannot recover it, or if we may conduct deidentification research, statistical analysis, and prediction of the collected information to improve our content and layout, and provide product or service support for business decision-making, And to improve our products and services (including using anonymous data for machine learning or model algorithm training), the use of such processed data does not require separate notice to you and your consent.

4、If we cease to operate our products or services, we will promptly cease the collection of your personal information, notify you of the cessation of operation in the form of individual deliveries or announcements, and delete or anonymize the personal information related to the closed business that we hold.

2、How do we use cookies and similar technologies

(1)Cookie

If your browser or browser add-on service allows, you can modify the acceptance level of cookies or reject our cookies. For more details, please refer to AboutCookies.org . But if you do so, you may not be able to enjoy a better service experience, and in some cases, it may even affect your safe access to our website, and you may need to change user settings every time you visit our website.

This website or application uses Google's cookies to provide services and analyze traffic.Your IP address, user agent, performance and security metricsWe will share with Google to ensure service quality, generate usage statistics, and detect and address abuse issues.

(2)Cookie related technologies

In addition to cookies, we also use other similar technologies such as website beacons, pixel tags, ETags, etc.

For example, the email we send you may contain an address link to our website content, and if you click on that link, we will track that click to help us understand your product or service preferences, so that we can proactively improve our customer service experience. A website beacon is usually a transparent image embedded in a website or email. By using pixel labels in emails, we can determine whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

ETag (Entity Tag) is the HTTP protocol header transmitted behind the Internet browser and Internet server, which can replace cookies. ETag can help us avoid unnecessary server load, improve service efficiency, save resources and energy. At the same time, we may use ETag to record your identity so that we can have a deeper understanding and improve our products or services. Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data clearing operations in the browser settings function. However, please note that if you deactivate ETag, you may not be able to enjoy a relatively better product or service experience.

***(3)友盟+ SDK***

We will use the Youmeng SDK for statistics and analysis, such asPersonal information, page usage records, and device information (IMEI/device serial number/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/approximate geographic location)).

We use the Youmeng SDK to collect the above information in order to better analyze the features that users like and relatively dislike, and to calculate the download, usage, and retention status of each channel for better promotion and operation in the future. Collecting device information and approximate geographical location is for regional, personalized recommendations, and multi-channel operations targeting regions or users in the future

Link to Youmeng SDK Privacy Policy:https://www.umeng.com/page/policy

***(4)bugly SDK***

We will use the bugly SDK to collect applications Crash information,In order for us to modify bugs and upgrade maintenance in the future.

***(5)穿山甲 SDK***

We will use the pangolin SDK to showcase suitable advertisements for you. Possible information to be collected:Basic information such as device brand, model, operating system version information, software installation list, device identifier (such as IMEI, device serial number, Android ID, OAID, IMSI, ICCID, GAID, MEID, IDFV, IDFA, device MAC address, specific fields may vary depending on software and hardware versions), application information: developer application name, application package name, version number, etc. Other information: operator information, device time zone, etc Equipment geographical location, network device hardware address (MAC address), IP address, WLAN access point (such as SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service logs.

In addition, we may use accelerometer (gyroscope sensor, gravity sensor) permissions for the purpose of shaking the advertisement function. Method: Obtain accelerometer (gyroscope sensor, gravity sensor) data when using the shaking advertisement function. Scope: We will only use the basic part of accelerometer (gyroscope sensor, gravity sensor) data, such as speculating whether the user has shaken the phone

***(6)支付宝 SDK***

Alipay privacy policy

***(7)微信 SDK***

WeChat Privacy Policy

3、How do we share, transfer, and publicly disclose your personal information

(1)Sharing

1、Sharing under legal circumstances: We may share your personal information with the public in accordance with laws and regulations, litigation, dispute resolution needs, or requirements made by administrative and judicial authorities in accordance with the law.

2、Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

3、Sharing with authorized partners: We may entrust authorized partners to provide you with certain services or perform functions on our behalf. We will only share your information for the legitimate, legitimate, necessary, specific, and clear purposes stated in this privacy policy. Authorized partners can only access the information they need to perform their duties and may not use this information for any other purpose.

Currently, our authorized partners include the following types:

(2)Suppliers, service providers, and other partners. We send information to suppliers, service providers, and other partners who support our business, including technical infrastructure services commissioned by us, analysis of our service usage, measuring the effectiveness of advertising and services, providing customer service, facilitating payment, or conducting academic research and investigations.

(3)In order for you to receive information push notifications and share information on third-party platforms, our application will embed authorized partner SDKs or other similar applications. Click on the third-party SDK to collect usage information instructions for more details.

We will conduct strict security checks on the application program interfaces (APIs) and software tool development kits (SDKs) used by authorized partners to obtain relevant information, and agree with authorized partners on strict data protection measures to ensure that they process personal information in accordance with our entrusted purposes, service instructions, this privacy policy, and any other relevant confidentiality and security measures.

(2)Assignment

We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

(1)Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

(2)In the event of a merger, acquisition, or bankruptcy liquidation involving the service provider of this product, or any other merger, acquisition, or bankruptcy liquidation involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization, and individual to seek your authorization and consent again.

(3)Public disclosure

We will only publicly disclose your personal information in the following circumstances:

(1)We may publicly disclose your personal information with your explicit consent or based on your voluntary choice;

(2)If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of this product, or to protect the personal and property safety of users or the public of this product and its affiliated companies from infringement, we may disclose personal information about you, including relevant violations and the measures taken by this product against you, with your consent in accordance with laws and regulations or the relevant agreement rules of this product.

(4)Exceptions to obtaining authorization and consent before sharing, transferring, or publicly disclosing personal information

In the following situations, sharing, transferring, or publicly disclosing your personal information does not require your prior authorization and consent:

1、Related to national security and national defense security;

2、Related to public safety, public health, and major public interests;

3、Related to criminal investigation, prosecution, trial, and enforcement of judgments;

4、For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;

5、Personal information that you disclose to the public on your own;

6、Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels. According to legal regulations, sharing or transferring personal information that has undergone de identification processing, and ensuring that the data recipient cannot recover and re identify the personal information subject, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require separate notice to you and your consent.

(5)Collect and use personal information, use of permissions

(1)We will collect your personal information for analysis, statistics, or personalized recommendations within the application

(2)We will not abuse the permissions you have granted to the app. High risk permissions are used for the following purposes:

1、Read and write file permission (read images): used for uploading images during feedback and setting avatars;

4、How do we protect the security of your personal information

(2)We have an industry-leading data security management system centered around the data lifecycle, which enhances the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology.

(3)We will take reasonable and feasible measures to avoid collecting irrelevant personal information as much as possible. We will only retain your personal information for the period necessary to achieve the objectives stated in this policy, unless there are mandatory retention requirements by law. And our criteria for judging the aforementioned deadline include:

1、Ensure the safety and quality of our services provided to you;

2、Do you agree to a longer retention period;

3、Is there any other special agreement regarding the retention period.

After your personal information exceeds the retention period, we will delete your personal information or anonymize it in accordance with applicable laws.

Please note that the information you voluntarily share or even publicly share when using our services may involve personal information or even sensitive personal information of you or others. Please be more cautious when considering whether to share or even publicly share relevant information when using our services.

Please use complex passwords to assist us in ensuring the security of your account. We will do our best to ensure the security of any information you send us. If our physical, technical, or management protective facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, which damages your legitimate rights and interests, we will bear corresponding legal responsibilities.

(5)We will periodically update and publicly disclose security risk, personal information security impact assessment reports, and other related content, which you can obtain through our announcement method.

(6)In the event of an unfortunate personal information security incident, we will inform you in accordance with legal requirements of the basic situation and possible impacts of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will inform you of the relevant situation of the event through email, letter, phone, push notifications, and other means. If it is difficult to inform the personal information subject one by one, we will take reasonable and effective measures to publish an announcement.

At the same time, we will also report the handling of personal information security incidents in accordance with regulatory requirements.

5、How do you manage your personal information

You can access and manage your personal information through the following methods:

(1)Access your personal information

(1)You have the right to access your personal information, except in exceptional circumstances stipulated by laws and regulations. You can access your personal information through the following methods:

Account Information - If you wish to access or edit personal profile information in your account, you can do so by logging into your account.

Clear Data - You can log in to your account and clear browsing records, input records, cookies, account passwords, history, and cache files by clearing data under "Settings".

(3)For any other personal information generated by you during the use of our products or services, we will provide it to you in accordance with the relevant arrangements in Article (7) in response to your above request.

(2)Correcting or supplementing your personal information

When you discover errors in the personal information we process about you, you have the right to request us to make corrections or supplements. You can apply for correction or supplementation through the methods listed in "(1) Accessing Your Personal Information".

(3)Delete your personal information

(1)You can delete some of your personal information through the methods listed in "(1) Access Your Personal Information".

(2)In the following situations, you can request us to delete personal information:

1、If our handling of personal information violates laws and regulations;

2、If we collect and use your personal information without your explicit consent;

3、If our handling of personal information seriously violates our agreement with you;

4、If you no longer use our products or services, or if you voluntarily cancel your account;

5、If we permanently cease to provide you with products or services.

(3)If we decide to respond to your deletion request, we will also notify the parties who have obtained your personal information from us as much as possible and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or if these parties have obtained your independent authorization.

(4)When you delete information from our service, we may not immediately delete the corresponding information from the backup system, but we will delete this information during backup updates.

(4)Change the scope of your authorized consent

Each business function requires some basic personal information to be completed (see Part 2 of this Privacy Policy). In addition, you can revoke partial authorization by unbinding, modifying personal settings, deleting relevant information, or by disabling the function.

After you withdraw your consent, we will no longer process the corresponding personal information. But your decision to withdraw your consent will not affect the personal information processing previously carried out based on your authorization.

(5)Personal information subject cancels account

(2)After you voluntarily cancel your account, we will stop providing you with products or services, delete your personal information in accordance with applicable laws, or anonymize it.

(6)Constrained Information System Automatic Decision Making

In certain business functions, we may only make decisions based on non manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will also provide an appeal method on the premise of not infringing on the trade secrets or other user rights and social public interests of this product.

(7)In response to your above request

(1)To ensure security, you may need to provide a written request or other means of proving your identity. We may first request you to verify your identity before processing your request.

(2)We will provide a response within 15 days. If you are not satisfied, you can also file a complaint through the customer service contact information specified in Article 9 of this privacy policy.

(3)For your reasonable requests, we do not charge any fees in principle, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical.

(4)In the following situations, according to legal requirements, we will not be able to respond to your request:

1、Related to national security and national defense security;

2、Related to public safety, public health, and major public interests;

3、Related to criminal investigation, prosecution, trial, and enforcement of judgments;

4、There is sufficient evidence to indicate that the personal information subject has subjective malice or abuse of rights;

5、Responding to your request will result in serious damage to your or other individuals or organizations' legitimate rights and interests;

6、Involving trade secrets.

(8)If you are a user of the European Economic Area (EEA) and the United Kingdom, and have agreed to the GDPR message

You can Click here to undo your selection

6、How do we handle children's personal information

Children are not allowed to create their own user accounts without the consent of their guardians. If you are a child, we request that you ask your guardian to carefully read this privacy policy and use our services or provide information to us with the consent of your guardian.

For the collection of personal information of children using our products or services with the consent of our guardians, we will only use, share, transfer or disclose this information when permitted by laws and regulations, with the explicit consent of our guardians, or necessary to protect children.

7、How to transfer your personal information globally

The personal information collected and generated during our operations within the territory of the People's Republic of China is stored within the territory of China, except for the following situations:

1、There are clear provisions in laws and regulations;

2、Obtain your explicit authorization;

3、You conduct cross-border transactions and other personal initiatives through the Internet.

In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this privacy policy.

8、How to update this privacy policy

The significant changes referred to in this policy include but are not limited to:

1、Our service model has undergone significant changes. Such as the purpose of processing personal information, the type of personal information being processed, and the way personal information is used;

2、We have undergone significant changes in control and other aspects. Changes in ownership caused by mergers and acquisitions, etc;

3、The main objects of personal information sharing, transfer, or public disclosure have changed;

4、Your right to participate in personal information processing and the way you exercise it have undergone significant changes;

5、When there are changes in the department responsible for handling personal information security, contact information, and complaint channels;

6、When the personal information security impact assessment report indicates a high risk.

9、How to contact us

Company Name: Zhengzhou Chongtao Network Technology Co., Ltd

(1)If you have any questions, opinions or suggestions about the content of this policy, you can send an email to chongtaonet@qq.com Contact us, our mailing address is: Zisuyuan Station, High tech Zone, Zhengzhou City, Henan Province;

(2)If you are not satisfied with our response, especially if you believe that our personal information processing behavior has damaged your legitimate rights and interests, you can also seek a solution by filing a lawsuit with the court with jurisdiction in the defendant's domicile.