Privacy Policy of JINYU
Update and effective date: January 13, 2025
Important Notice
Tianjin Fenqu Network Technology Co., Ltd. is the developer and operator of Jinyu platform and attaches great importance to the protection of users' privacy and personal information. We understand the importance of personal information to you, and will do our best to protect the security of your personal information. When you use our products or services, we may collect and use information about you. This Privacy Policy (the "Privacy Policy") is intended to explain to you how we collect, use and protect such information when you use our products or services. Other users (third parties) other than you may rely on the platform to provide services to you independently, such services are not collected and used by the company's personal information, so this privacy policy cannot apply, please carefully consider before providing personal information to such third parties.
Before using our products or services, please be sure to read and thoroughly understand this Privacy Policy carefully, and use relevant products or services after confirming full understanding and consent. If you do not agree with any content of this Privacy Policy, you should immediately stop using the products and services of the company. If you use the products or services provided by the Company, it means that you have fully understood and agreed to the contents of the company as described in this Privacy policy.
This Privacy statement will help you understand the following:
1. Definition
2. How do we collect and use Personal information
3. How do we use cookies and similar technologies
4. How do we share, transfer and publicly disclose personal information
5. How do we protect and store your personal information
6. Your Rights
7. How do we protect minors
8. Face and Fingerprint Terms of Use
9. How do we update this Privacy Statement
10. Scope of application
11. How can I contact us
I. Definition
1.1. "You"
"You" in this Privacy Policy means every user who uses JINYU Platform related products or services through JINYUAPP.
1.2. "JINYU Platform" or "Tianjin Fenqu No. 1 Platform" means the collection of software services with JINYUAPP and JINYU client software as the core.
1.3. Personal Information:
The term "personal information" as used in this Privacy Policy refers to all kinds of information recorded electronically or by other means that can identify a specific natural person or reflect the activities of a specific natural person, individually or in combination with other information. The types of personal information referred to in this Privacy Statement are listed in the section entitled "How We Collect and Use Your Personal Information".
In order to ensure your normal use of the basic functions and normal services of the platform, improve and optimize our service experience, and ensure the security of your account, when you use the services of our platform or visit the website of the platform, we will collect your device model according to the specific permissions granted by you during the installation and use process. Device identifier (including IMEI, IMSI, ICCID, IDFA, GUID, OAID, SNID, MEID, UserAgent, and device serial number), OPEN ID, and Union ID, software list, device running status information, system version, MCC, MNC, MAC address information (including the collected MAC address and Bluetooth MAC address), gyroscope sensor, acceleration sensor, telecom carrier, and device sensor information. If you do not authorize the Platform to collect or use the aforementioned information, the Platform may not be able to provide relevant services to you.
Sensitive personal information: refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. The personal sensitive information involved in this privacy life includes: your property information (including transaction records and charm and other virtual property information); Personally identifiable information (including identity card); Network identification information (including account name, account nickname and the relevant password mentioned above); Other information (including personal phone number, mobile number, location information, web browsing history). For the personal sensitive information listed in this user privacy statement, in order to facilitate you to be alert when reading, in addition to the unified definition and display, we will still in this user privacy Statement font bold, underlined, or pointed out and other highlighted ways to prompt your attention.
2.How do we use and use Personal information
We will only collect and use your personal information for the following purposes as described in this User Privacy Statement:
|
Business function |
Types of personal information/system permissions involved |
Purpose of collection/use |
Specific collection method |
|
Log in/register an APP account |
Network ID (account number), password |
a.Distinguish user identities;
|
User voluntary input |
|
Register/log in to APP account through mobile number |
Mobile phone number |
a.Distinguish user identities;
|
User voluntary input |
|
Register/log in to an APP account through a third-party account |
Online identity representation (account number, avatar, nickname) |
Bind an APP account to a third-party account |
User voluntary input |
|
Change user profile picture |
Biometric information (facial features), cameras, photos |
Take my face as the APP account profile picture |
The user voluntarily filmed the transmission |
|
Edit personal data |
Picture, gender, birthday, height, weight, occupation, personality signature, personal recording |
Rich personal information, easy to use social functions |
The user voluntarily filmed the transmission |
|
Personal contact information |
QQ, Email |
Used for customer service to contact users to follow up and deal with product usage problems |
The user voluntarily filmed the transmission |
|
User real name authentication |
Real name, ID information |
Identify the user's real identity |
Users voluntarily input and shoot |
|
Determine the APP running environment |
System version, IP address, viewer type, language and locale Settings, date and time, software and hardware characteristics, and web browsing history |
Determine whether the current environment is normal and safe, and ensure that the program runs correctly |
Automatic acquisition and recording |
|
Download and install software (including APP updates) |
Geographical location, device model, device identifier, operating system, separation rate, carrier, content/external storage space |
Provide the correct software version and connect to the correct server |
Automatic acquisition and recording |
|
Provides basic services and saves logs and troubleshooting information |
Internal/external storage space) |
Monitor and document the normal operation of the program to ensure that sufficient troubleshooting information is collected in the event of a program crash |
Automatic acquisition and recording |
|
Upload or publish content |
Access cameras, photos, videos, microphones, geolocation |
Upload or publish text, photos, audio, video, display geographical location |
Users voluntarily upload and publish |
|
Basic interactive function |
User operation record (recharge, post information, like, comment) |
Record the user's recharge, post information, like, comment operations |
Automatic acquisition and recording |
|
Personalized content presentation and push |
Device model, operating system, resolution, telecom operator, software and hardware characteristic information, user operation record (follow, search, browse), geographical location (help query nearby anchors and push services) |
Provide personalized content according to the user's hardware and software environment, preferences, and geographical location |
Automatic acquisition and recording |
|
Recharge consumption |
Online identifiers (account numbers), transaction and consumption records, virtual currencies/items and their transactions |
Support users to complete consumption, and allow users to query recharge/consumption records |
Automatic acquisition and recording
|
|
Share |
Network identity (account number) |
Allows users to share content from JINYUAPP with others |
Automatic acquisition and recording |
|
Operation and safe operation |
WLAN access point (such as SSID, BSSID), network access method/type/status, device identifier (Android such as AndroidID, OAID, GAID, iOS such as IDFV, IDFA); Different identifiers vary in terms of validity, whether they are reset by the user, and how they are acquired), IP address, Bluetooth, gyroscope sensor, acceleration sensor, |
Ensure the safe operation, operational quality and efficiency of software and services |
User voluntary open |
|
Safety protection function |
User's network usage habits (including web browsing history), application list installed on the device, phone number (obtaining device identifiers such as IMEI and MAC address to determine user identity and ensure account security) |
Prevent phishing sites, other scams, trojans, viruses, and other malicious programs |
Automatic acquisition and recording |
|
Even communication tool |
Communication records and contents |
Realize communication between users |
User's voluntary input; 自动获取及记录 |
|
Jump to the corresponding activity content |
Clipboard information |
When you share the link or share code generated by a specific activity into the clipboard, you can automatically jump to the corresponding activity content when you open the App, so that you can easily browse the activity information. At the same time, Tianjin Fen Qu One will also read your clipboard information for risk control purposes. |
Automatic acquisition and recording |
|
Statistical analysis |
Statistical analysis |
We need to collect application source information through the clipboard for statistics. During the statistics process, we will not send back your personal privacy information written on the clipboard |
Automatic acquisition and recording |
1, Help you register as a JINYU user In order to help you become a JINYU user, that is, to complete the creation of an account, so that we can provide you with JINYU registered user services (for example, registered users can enjoy audio and video release, corresponding browsing, following, sharing, private messages, interactive tips, open notifications, account appeals and other rich technical functions), We provide you with a variety of registration channels for you to choose. When you choose to register with a mobile number, you need to provide us with your mobile number and password (encrypted) personal sensitive information, we use this information to send verification code information for you to submit verification of identity. When you choose to use a third-party account (such as wechat, QQ, etc.) to more conveniently register and log in to a JINYU user account, we will access and collect your explicitly authorized personal information (your profile picture and nickname information in the third-party account) through indirect means. The specific information and permissions authorized by different third-party accounts shall prevail) and bind your third-party account to your JINYU registered account. If you refuse to provide information under the third party account, you can not choose to use the third party account to register and log in, we promise that the third party account channel source of such personal information is legitimate. In the process of registering as a JINYU user and using JINYU, you can choose to supplement your nickname (including real name), gender, avatar (including real avatar), birthday, constellation, location and personal introduction information (" Supplementary information "), which will help us to provide you with personalized and better JINYU user services. You are aware that we collect mobile phone number information to meet the requirements of the network real name system of relevant laws and regulations. If you do not provide such information, you may not be able to use our registered user services normally. However, your failure to provide your mobile phone number, third-party account information and supplementary information will not affect your enjoyment of the basic core business function of video browsing.
2, to provide you with JINYU user authentication services When we provide you with authentication services so that we can provide authentication services for authentication users in accordance with the law, you need to provide us and the third party certification body providing authentication services with your ID card (front and back) photos, (static or dynamic) identification information, which is personally sensitive information. You are aware that we may convert this type of identification information into text personal information (name, gender, ethnicity, ID number, address) for storage. If you do not provide such personal information, you will not be able to enjoy the certified user services provided by us, but it will not affect your enjoyment of basic core business functions such as video browsing and registered user services.
3, to achieve personalized audio and video information functions or services In order to recommend personalized audio and video information to you, we will collect and use the following information: following, search, browsing preferences and other information about your operation and use behavior; Feedback, Posting, liking, tipping and other information provided by you; Location information obtained with your express consent. We will combine the above information with information from our other services to do characteristic and preference analysis through algorithms to personalized recommend, display or push specific audio and video information that you may be interested in, or push specific functions or services that are more suitable for you: show, recommend or push audio and video that are more relevant to you; Recommend audio and video information of relevant cities and regions; Recommend programmatic ads that are more relevant to you. When we collect and use the above information, we carry out de-identification processing, and the data analysis only corresponds to a specific code that cannot be directly associated with the user's identity, and cannot be associated with your real identity. To achieve this basic business function, We collect and rely on your device information (including device model, operating system version, device Settings, unique device identifier, network device hardware address MAC and other software and hardware characteristics), device location related information (including IP address, GPS location, and sensors such as WLAN access points, Bluetooth and base stations that can provide relevant information Information) and personal Internet records (including browsing and search records, software usage records, click records, interaction records), and based on the characteristics of your group to do not identify your personal identity of the indirect population portrait, so as to provide you with personalized content display and push. In order to provide you with personalized content display, push and video release services for "nearby" on JINYU Platform, you need to explicitly provide us with information related to the location of the device, so that we can recommend you dynamic content for "nearby" users based on your geographical location. The "nearby" service is a non-core business function. Refusing to provide the location information and permission of the device will affect our accurate positioning of your location and the realization of this function, but it will not affect your normal use of other functions of the JINYU Platform. In addition, you can also turn on or off access to geolocation information at any time by using the "Settings - Privacy Settings - Hide Location Information" control switch.
4, to provide you with audio and video, picture text and other content release 1) When you post your own audio and video content, we will ask you to authorize camera, photo, microphone and device location information (location information is sensitive information). In this process, you can choose whether to provide to us. If you refuse to authorize the provision, you will not be able to use this additional function, but it will not affect your normal use of other functions of JINYU. 2) We will access your storage (including SD card) permissions when you post comments on your device, or when you shoot/produce audio, video, pictures, text and other content using our products. In order to upload your local storage content to JINYU Dynamic, and store the audio and video, pictures and text and other content shot/produced by our products to your device, if you do not agree to our access to your storage rights, you can refuse when we request authorization from you or close the corresponding authorization through your device.
5, help you buy virtual goods services When you inquire about or purchase virtual items (such as diamonds) through Jinyu, we will collect and record your top-up, transaction, and balance information. After registration, you will be able to access the purchased virtual items (such as diamonds) from any supported device. If we entrust a third party to deliver them to you, we will obtain your consent and share the above information with the third party. Refusing to provide this information will only prevent you from using the corresponding additional features mentioned above, but will not affect your normal use of other Jinyu features.
6, to provide you with security In order to improve the security of your use of our services, protect the personal and property safety of you, other users or the public from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion and other security risks, and more accurately identify violations of laws and regulations or relevant protocol rules of JINYU Platform, We may use or integrate your registration information, device information, web logs, as well as information about the applications you have installed, the processes you are running, the overall operation of the application, how often the application is used, crash data, overall installation usage, performance data, and the origin of the application, To comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, audit, analysis and disposal measures in accordance with the law. For example, we will comprehensively analyze user account activity anomalies, multi-terminal logins, traffic anomalies, etc., to protect your account security.
7. Other purposes and uses In the following circumstances, we will separately seek your consent in advance according to the provisions of laws and regulations: 1) We use the information for other purposes and purposes not specified in this User Privacy Statement; 2) We will use the information collected for a specific purpose of use for other purposes.
8. Exceptions to authorized consent According to relevant laws and regulations, the collection of your personal information in the following circumstances does not require your authorization and consent: 1) Related to national security and national defense security; 2) related to public safety, public health and major public interests; 3) related to criminal investigation, prosecution, trial and execution of judgments; 4) In order to protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to get your consent; 5) The personal information collected is disclosed to the public by you; 6) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure channels; 7) Necessary to sign a contract according to your requirements; 8) Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and disposing of faults of the products or services; 9) necessary for legitimate journalism; 10) When an academic research institution carries out statistics or academic research in the public interest and provides the results of academic research or description to the outside world, it de-identifies the personal information contained in the results; 11) Other circumstances stipulated by laws and regulations.
3.How do we use cookies and similar technologies
To make your experience easier, when you use our products, we may identify you through small data files, which may save you the need to re-enter registration information or help determine the security status of your account. These data files may be cookies. Cookies typically contain an identifier, a site name, and some numbers and characters. In addition to cookies, we also use other similar technologies such as website beacons and pixel tags. For example, with cookies, websites and clients can store data such as your registered account number, passwords (encrypted) and preferences, and cookies can also help us to count traffic information and analyze the effectiveness of page design and advertising. We do not use cookies for any purpose other than those described in this User Privacy Statement. You can manage or delete cookies according to your preferences.
4.Self-start and associated boot description
1. In order to ensure that the application can normally receive broadcast information pushed by the client when it is closed or running in the background, the application must use the (self-start) capability. There will be a certain frequency of broadcasting through the system to wake up the self-start or associated startup behavior of the application, which is necessary for realizing functions and services.
2. When you open JINYUAPP content push message, after obtaining your explicit consent, it will jump to other apps to open relevant content. There will be no associated startup without your consent.
3. When you upgrade the file downloaded from the third-party app, the third-party APP will be associated with the launch.
5.How do we share, transfer, and publicly disclose Personal information
1. Sharing and disclosure
JINYU will not share your personal information with any company, organization or individual outside of JINYU, except in the following cases:
1) Share with your (and guardian's) express consent or authorization or with your active choice.
2) Sharing under legal circumstances. We may share your personal information in accordance with laws and regulations, litigation dispute resolution needs, or as required by administrative and judicial authorities in accordance with the law. For example, if we determine that you have violated laws and regulations or seriously violated the rules of JINYU related agreements, or to protect the personal and property safety of JINYU and its affiliated users or the public from infringement, we may disclose your personal information in accordance with laws and regulations or platform related agreement rules. Including related violations and measures that the JINYU Platform has taken against you. For example, if you or your account upload illegal videos, illegal videos and seriously violate the rules of our platform, violate laws and regulations and/or violate public order and good customs, causing significant social impact and reputation loss to our platform, we may publicly disclose your information and punishment.
3) Share your personal information with JINYU's affiliates. In such cases, we will only share necessary personal information, subject to the purposes stated in this Privacy Statement. If our affiliates want to change the purpose of processing personal information, they will again seek your authorized consent.
2, How to transfer Personal information We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1) Transfer with express consent: After obtaining your express consent, we will transfer your personal information to other parties;
2) When a merger, acquisition, asset transfer or bankruptcy liquidation is involved, such as the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this statement, and will continue to protect or require the successor of personal information to continue to protect your personal information in accordance with laws and regulations and no less than the security standards required by this statement. Otherwise, we will require the company or organization to seek authorization from you again.
3、How to disclose Personal information
We will only publicly disclose your personal information in the following circumstances and under the premise of adopting industry-standard security measures:
1) According to your needs, disclose your specified personal information in the manner of disclosure that you expressly agree to;
2) When it is necessary to provide your personal information according to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information according to the type and disclosure method of personal information requested.
4. Personal information that is shared, transferred and publicly disclosed is exempt
According to laws and regulations and national standards, we do not need to obtain your authorization and consent to share, transfer and publicly disclose your personal information in the following circumstances:
1) Directly related to national security and national defense security;
2) Directly related to public safety, public health and major public interests;
3) Directly related to criminal investigation, prosecution, trial and execution of sentences;
4) To protect the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to get your consent;
5) The personal information collected is disclosed to the public by the personal information subject;
6) Other circumstances stipulated by laws and regulations.
5, Sharing with authorized partners:We may entrust authorized partners to provide you with certain services or perform functions on our behalf,
we will only share your information for the legal, legitimate, necessary, specific and clear purposes stated in this Privacy Policy, authorized partners can only access to the information needed to perform their duties, and shall not use this information for any other purpose.
Currently, our authorized partners include the following types:
(1) Authorized partners for advertising and analysis services. Unless we have your permission, we will not share your personally identifiable information with our partners who provide advertising and analytics services. We entrust these partners with information related to the reach and effectiveness of our ads, but do not provide you with personally identifiable information, or we de-identify this information so that it does not identify you personally. Such partners may combine the above information with other data lawfully obtained by them to carry out advertising services or decision-making recommendations commissioned by us.
(2) Suppliers, service providers and other partners. We send information to vendors, service providers, and other partners who support our business by providing technology infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, facilitating payments, or conducting academic research and surveys.
6. In order to enable you to use the following services and functions, our application will access third-party SDKS:
|
SDK service |
Purpose of use |
Get information |
Third party privacy policy links |
|
Friends push SDK |
Message push |
Device information (including mac information) |
https://www.ume ng.com/policy |
|
Tencent bugly (Shenzhen Tencent Computer System Co., LTD.) |
Equipment serial number |
Monitor app flash crash, easy to repair and improve the app |
https://bugly.qq.com/v2/contract |
|
NetEase easy shield SDK |
Types of personal information collected: device information, location information, network information, SDK authentication related request results, and mobile phone number Device information: Equipment serial number, Device identifier (IMEI, IDFA, Android) ID, MAC address, OAID, ICCID, IMSI, BSSID, SSID, subId and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device model, operating system and hardware related information) |
Mobile phone number one-click login service, content security audit |
https://dun.163.com |
|
SDK(Beijing Digital Alliance Network Technology Co., LTD.) |
Specific information collected iOS system: device manufacturer, device model, device system version, application version, IDFA(for children applications, IDFA is not collected), IDFV, device network status information, and other device physical environment information. Android: Software installation list, device manufacturer, device model, device system version, application version, software list, MAC address, device serial number, device network status, and other device physical environment information. |
Detect equipment fraud and cheating behavior, identify the authenticity of feedback equipment |
https://www.shuzilm.cn/main/privacy.html |
|
Tencent X5 Browser SDK (Shenzhen Tencent Computer System Co., LTD.) |
Mobile phone model |
A complete solution to optimize the mobile webview experience |
https://render.alipay.com/p/c/k2cx0tg8 |
|
Tencent Mobile pushes TPNS SDK |
After obtaining your consent, your device serial number and network device hardware address (device MAC information) data will be automatically obtained and recorded in the running and background state for risk control and anti-fraud to ensure account and transaction security |
Message push |
https://privacy.qq.com/document/priview/bdf936b2477a45ff86da57e3d988bc2b |
|
APNs SDK |
Device information |
Apple brand mobile phone message push |
https://www.apple.com/legal/privacy/en-ww/ |
|
China Telecom Tianyi SDK |
Types of personal information collected: device information, location information, network information, SDK authentication related request results, and mobile phone number Device information: Device serial number, device identifier (IMEI, IDFA, Android) ID, MAC address, OAID, ICCID, IMSI, subId and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device model, operating system and hardware related information) |
Mobile phone number one click login |
https://login.189.cn/agreement/userPrivacy.html |
6. How do we protect Personal information
1. Technical protection:
In order to ensure the security of your information, we strive to take a variety of reasonable physical, electronic and management security measures in line with industry standards to protect your information, so that your information will not be leaked, damaged or lost, including but not limited to SSL, encrypted information storage, data center access control. We use encryption technology to enhance the security of personal information; We use trusted protection mechanisms to protect personal information from malicious attacks; We deploy access control mechanisms to ensure that only authorized personnel have access to personal information.
2. Security system guarantee:
We have the industry's advanced data as the core, around the data life cycle of the data security management system, from the organizational construction, system design, personnel management, product technology, personal information security impact assessment and other aspects to enhance the security of the entire system. At present, we have passed the information security level protection level three certification.
3. Personnel safety management:
We also take strict management of employees or outsourcing personnel who may have access to your information, including but not limited to taking different permission control according to different positions, signing confidentiality agreements with them, monitoring their operations and other measures. We will provide appropriate security measures in accordance with existing technology to protect your information, provide reasonable security, we will do our best to ensure that your information is not leaked, damaged or lost. We will conduct security and privacy training courses to enhance employees' awareness of the importance of protecting personal information.
4, sensitive information and password protection tips:
1) Protection of sensitive personal information: The information you voluntarily share or even publicly share when using our services may involve your or others' personal information or even personal sensitive information, such as your profile picture upload, for example, you choose to upload pictures containing personal information when commenting, Posting, or sending a bullet screen. Please consider more carefully whether you share or even publicly share relevant information when using our services.
2) Please use a complex password to help us keep your account safe. We will do our best to ensure the security of any information you send us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access to information, public disclosure, tampering or destruction, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibilities.
3) Your account has security protection function, please keep your account and password information properly. We will backup to other servers, encrypt user passwords and other security measures to ensure that your information is not lost, not abused and altered. Despite the aforementioned security measures, please understand that there is no such thing as "perfect security measures" on the information network.
4) Information disclosure tips and password disclosure: Please note that the Internet is not an absolutely secure environment. When using certain services on our platform, you will inevitably disclose your personal information, such as bank account information, contact information or postal address, to counterparties or potential counterparties. Please protect your personal information properly and only provide it to others when necessary. If you find that your personal information is leaked, especially your account and password, please contact our customer service immediately so that we can take appropriate measures.
5. Information security incident handling
In the event of an unfortunate personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you. We will inform you of the relevant events by means of push notifications, etc. When it is difficult to inform the personal information subject one by one, we will make announcements in a reasonable and effective way. At the same time, we will also report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.
6. How we store your Personal information:
1) Storage location: Personal information collected and generated in the course of domestic operations will be stored in the People's Republic of China in accordance with laws and regulations, and such information will not be transmitted abroad. If it is necessary to transmit abroad due to business development, we will clearly inform you and obtain your consent.
2)Storage period: We will take reasonable and practicable measures to avoid collecting irrelevant personal information. We will only retain your personal information for the shortest period necessary to achieve the purposes described in our User Privacy Statement, unless you agree to an extended retention period or are permitted by law. After the retention period is exceeded, JINYU will delete your personal information or take technical measures to anonymize it, except as otherwise provided by laws and regulations.
7. Your Rights
In accordance with the relevant laws, regulations, national standards and industry practices of the People's Republic of China, we guarantee that you exercise the following rights to your personal information, and the scope and manner of your access, modification and deletion of personal information will depend on the specific services you use:
1. Access your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise your data access rights, you can do so yourself in the following ways: Account information. If you want to access or edit personal information in your account, change your password, add security information, etc., you can click "Me" at the lower right corner of the product client application, and click "Edit Personal Information" or "Settings" at the upper right corner to perform corresponding operations. If you are unable to access the above personal information in the above ways, you can contact us using the customer service phone, email or online customer service. We will respond to your request for access within 15 days.
2. Correct your personal information
Under normal circumstances, you can directly delete the content you post, and browse, modify, and delete the information you submit at any time. However, for security and identity reasons, you may not be able to independently modify some of the initial registration information submitted during registration (information after real-name authentication); If you really need to modify such information, you can use the customer service phone, email or online customer service to make a correction application, we will review the problem as soon as possible, and have your user identity verified by a person to reply in a timely manner.
3. Delete your personal information
In the following cases, you can make a request to us to delete personal information:
1) If we process personal information in violation of laws and regulations;
2) If we collect and use your personal information without your consent;
3) If our processing of personal information violates our agreement with you;
4) If you no longer use our products or services;
5) If we no longer provide you with products or services.
If we decide to respond to your request for deletion, we will also notify the entities that have obtained your personal information from us to delete it in a timely manner, unless otherwise required by law or regulation, or if these entities have your independent authorization. When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete it when the backup is updated
4. Manage and withdraw your consent
You can withdraw your consent by modifying the mobile application and mobile terminal device function management. Specifically, you can log in to third-party accounts in the app through Settings - Account and Security, bind or unbind third-party accounts, enable or disable message notifications through Settings - Notification Settings, and enable or disable geolocation rights through Settings - Privacy Settings - Hide Location Information. Mobile device functionality To withdraw or manage your authorization may vary depending on the mobile device. Please understand that each business function requires some basic personal information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with the corresponding service for withdrawing your consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the processing of personal information previously carried out on the basis of your authorization.
5. Cancel the account
You can cancel the previously registered account at any time, you can click [My] - [Set icon] - [Account security] click "Account cancellation", agree to give up the account assets and cancel the account, read the prompt content and click "OK" to cancel. You can also apply to us to cancel your account by phone or email, contact customer service, etc. Before you cancel your account, we will verify your personal identity, security status, device information, etc. The act of cancelling the account is irreversible. After cancelling the account, we will delete all information about your product account or anonymize the relevant information, except as otherwise provided by laws and regulations.
6. How do we respond to your request
For security purposes, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will give you a reply within 15 working days. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee according to the situation. We may reject requests that are unnecessarily repetitive, require too much technology (for example, the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate interests of others, or are highly impractical.
In the following circumstances, according to the requirements of laws and regulations, we will not be able to respond to your request:
1) Directly related to national security and national defense security;
2) Directly related to public safety, public health and major public interests;
3) Directly related to criminal investigation, prosecution, trial and execution of sentences;
4) There is sufficient evidence that you have subjective malice or abuse of rights;
5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;
6) Involving trade secrets.
7. Complaints and reports
You can make a complaint or report in accordance with our published system. If you think that your personal information rights may be infringed, or find clues of infringement of personal information rights, you can report through the following channels, we will check and feedback your complaint and report within 15 days:
1) Click the "avatar" of the infringing user to enter the report interface and contact us;
2) In the "Help and feedback" interface, click online customer service to contact us;
3) Contact us via email or customer service phone.
8. Access the Privacy Statement
You can view the entire contents of this Statement in the registration, login page, or after login by clicking "I" - "Settings" - "About Us" - "Privacy Statement".
9. Cease operation to inform you of your rights
If we cease operations, we will promptly stop the activities of collecting your personal information, notify you of the notice of cessation of operations in the form of one-by-one delivery or announcement, and delete or anonymize your personal information held by us.
8. How do we handle minors' personal information
We attach importance to the protection of minors' personal information, and in the process of your use of our services, we assume that you have the corresponding capacity for civil conduct. If you are a minor, before you use JINYU related services, you should carefully read this User Privacy Statement under the supervision and guidance of your parents or other guardians, and provide information to us with the consent of your parents or guardians. In cases where personal information of minors is collected with the consent of parents or guardians to use our products or services, we will only use, share, transfer or disclose this information as permitted by law or regulations, with the express consent of parents or guardians, or as necessary to protect minors. If we become aware that a minor's personal information has been collected without prior verifiable parental or guardian consent, we will seek to delete the information as soon as possible.
9. Terms of Use for Faces and Fingerprints
1. Where the face and fingerprint information will be used
In order to make it easier for you to use your Apple account login or in-app purchase, JINYU will apply for using your face or fingerprint for Apple account login or in-app purchase.
2, whether the face or fingerprint information will be stored
Your face or fingerprint information is only used for Apple account login or in-app purchase, JINYU will not store your face or fingerprint information.
3. Whether face or fingerprint information will be shared with third parties
JINYU only uses your face or fingerprint information for Apple account login or in-app purchase, and we will never share your face or fingerprint information with third parties without your authorization.
10. How do we update this Statement
In order to provide you with better service, we will revise this statement from time to time, such amendments form part of this statement and have the same effect as this statement. If such amendments result in a material derogation of your rights under this Notice, we will notify you before the changes become effective, including through a prominent notice on the page. In such cases, by continuing to use our Services, you agree to be bound by the revised Statement.
11. Scope of application
This user Privacy Statement only applies to all services provided by Tianjin Funqu One Media Co., Ltd. and its affiliates, including JINYU clients, websites, etc., and does not apply to third-party products or services that have a separate user privacy statement and are not included in this user privacy statement.
12. How to contact us
You can contact Tianjin Funfun Network Technology Co., Ltd. by the following means, Tianjin Funfun Network Technology Co., Ltd. will reply to you within 15 working days after receiving your information, calls, emails or letters:
(1) If you have any questions, comments or suggestions about the contents of this Privacy policy, you can contact JINYU's online customer service
(2) Tianjin Funfun Network Technology Co., Ltd. has also set up a personal information protection department, you can send emails or letters to contact Tianjin Funfun Network Technology Co., LTD. :
E-mail: 542100920@qq.com
Addressed to: Ministry of Justice
Special note: JINYU will review the issues involved as soon as possible and reply promptly after verifying your user identity. In general, we will respond to your request within 48 hours.