Terms & Conditions

This client respects and protects the personal privacy rights of all users who use this client. In order to provide you with better services, this client will use your personal information in accordance with the provisions of this privacy policy. But this client will approach this information with a high degree of rigor and prudence. We have established this Privacy Policy and hope that you carefully read and understand it before using this client and related services, in order to make voluntary and appropriate choices. If you agree to this privacy policy, it means that you have fully understood and understood the content of this privacy policy.

 

 

 

1、 Applicable scope:

 

We will use user information in accordance with our privacy policy, but will not collect information through mandatory bundling solely based on our agreement to this privacy policy.

 

 

 

When you use or enable related functions or services, we will collect and use relevant information necessary to achieve the functions and services. Unless it is necessary information to achieve basic business functions or in accordance with legal and regulatory requirements, you may refuse to provide it without affecting other functions or services.

 

 

 

When browsing only, to ensure necessary service, we will read the user's device status and identity for information push;

 

 

 

If you have not logged into your account, we will ensure the basic function of information push through the identifier information corresponding to the device. If you log in to your account, we will push information based on the account information.

 

 

 

Address book, GPS precise geographic location, camera, microphone, and album permissions will not be enabled by default. Only with your explicit authorization can they be used for specific functions or services, and you can also revoke your authorization. After authorization, we will not collect your information when the relevant functions or services are not needed.

 

 

 

The system will send you verification codes and other text messages based on your registration and other operations. This is only to ensure that you complete your registration smoothly and use this client without infringing on your privacy.

 

 

 

2、 Information usage

 

This client will not provide, sell, rent, share or trade your personal information to any unrelated third party, unless you have obtained your permission in advance, or unless such third party and this client (including its affiliated companies) provide services to you individually or jointly, and after the service is completed, it will be prohibited from accessing all such information, including those that it has previously been able to access.

 

 

 

◆ Registration and login

 

a. When you register and log in to this client and related services, you can create an account through your phone number, and you can complete the relevant network identification information (avatar, nickname, password). Collecting this information is to help you complete your registration. You can also choose to fill in gender, birthday, region, and personal information according to your own needs to improve your information. When registering on your phone, the program will send you a SMS verification code to facilitate your smooth registration.

 

 

 

b. You can also log in and use a third-party account, and you will authorize us to obtain public information (such as avatars, nicknames, and other authorized information) registered on the third-party platform for binding with this client account, allowing you to directly log in and use this product and related services.

 

 

 

◆ Certification

 

When you use the identity authentication function or service, according to relevant laws and regulations, you may need to provide your real identity information (real name, ID card number, phone number) to complete the real name verification. These information belong to personal sensitive information, and you may refuse to provide them, but you may not be able to access the relevant services, but it does not affect the normal use of other functions and services.

 

 

 

◆ Browsing

 

a. This client may recommend news or service information to you, and to achieve this function, we may collect necessary log information.

 

 

 

b. The log information used for information display includes:

 

 

 

Operation behavior information: click, follow, bookmark, search, browse, share

 

 

 

The information you proactively provide: feedback, post, like, comment

 

 

 

Geographic location information: GPS information, WLAN access points, Bluetooth and base station sensor information, etc

 

 

 

c. GPS geographic location is sensitive personal information. If you refuse to provide it, we will not recommend information to you based on GPS information, and it will not affect the normal use of other functions of this client, but it will affect the use of related functions that require support from this information.

 

 

 

◆ Information release

 

a. When you post content, comments, questions or answers, we will collect the information you post and display your nickname, profile picture, and post content.

 

 

 

b. When you use the upload images and publish audio and video functions, we will request your authorization for camera, photo, and microphone permissions. If you refuse authorization, you will not be able to use this feature, but it does not affect your normal use of other functions of this client.

 

 

 

c. When you publish information and choose a display location, we will request your authorization for geographic location permissions and collect location information related to this service. If you refuse authorization to provide precise geographic location information, you will not be able to use this feature, but it does not affect your normal use of other functions of this client.

 

 

 

d. The information collected by us due to the use of our products or services by users, such as information posted by other users that may contain some of your information (such as information related to you in comments, messages, post images, audio and video).

 

 

 

◆ Interactive communication

 

a. When you take the initiative to browse, comment, bookmark, like, or share content using "random photos", "topics", etc., we will collect the accounts you follow and show you the content posted by your following accounts.

 

 

 

◆ Search

 

When you use the search service of this client, we will collect your search keyword information and log records. In order to provide efficient search services, some of the aforementioned information will be temporarily stored on your local storage device and can display search result content and search history to you.

 

 

 

◆ Equipment and log information

 

a. To ensure the safe operation of software and services, we will collect your hardware model, operating system version number, international mobile device identification code, unique device identifier, network device hardware address, IP address, WLAN access point, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, and service logs.

 

 

 

b. In order to prevent malicious programs and ensure secure operation, we collect information on installed applications or running processes, overall operation, usage and frequency of applications, application crashes, overall installation and usage, performance data, and application sources.

 

 

 

Changes in information collection

 

With the development of our business, there may be adjustments and changes to the functions and services provided by this client. In principle, when a new feature or service is related to the one we are currently providing, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios where there is no direct or reasonable correlation with the original processing purpose, we will collect and use your personal information and inform you again and obtain your consent.

 

 

 

◆ Personal information that is exempted from collection and use by law with consent

 

According to laws, regulations, and relevant national standards, we do not require your authorization to collect and use your personal information:

 

 

 

a. Directly related to national security and national defense security;

 

 

 

b. Directly related to public safety, public health, and major public interests;

 

 

 

c. Personnel or lawyers commissioned by judicial organs or judicial agencies such as public security organs, procuratorial organs, courts, arbitration institutions, notary institutions, etc;

 

 

 

d. For the purpose of protecting the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain my consent;

 

 

 

e. The personal information collected by you is publicly disclosed to the public on your own;

 

 

 

f. Collect your personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;

 

 

 

g. Necessary for signing or fulfilling the contract according to your requirements;

 

 

 

h. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and dealing with software and related service failures;

 

 

 

i. Necessary for legitimate news reporting;

 

 

 

j. When academic research institutions conduct statistical or academic research based on the public interest and provide academic research or descriptive results to the public, they de identify the personal information contained in the results;

 

 

 

k. The comments you make on this client may infringe upon the legitimate rights and interests of third parties, and the third party requests to provide them;

 

 

 

l. Other situations stipulated by laws and regulations.

 

 

 

3、 The use of cookies

 

◆ Safety performance guarantee

 

We may set cookies or anonymous identifiers for authentication and security to confirm whether you are securely logging into the service, or whether you have encountered theft, fraud, and other illegal activities. These technologies will also help us improve service efficiency, enhance login and response speed.

 

 

 

◆ Information memory

 

Using this type of technology can help you avoid repeating the steps and processes of filling out personal information and entering search content (such as recording searches and filling out forms).

 

 

 

◆ Optimize services

 

a. We may use cookies and similar technologies to understand your preferences and usage habits, conduct data analysis to improve product services, recommend information or features that users are interested in, and optimize your choices.

 

 

 

b. In the sharing page of this client, we may use cookies to record browsing activities, which are used to recommend information to you, troubleshoot crashes, delays, and explore better service methods.

 

 

 

Clearing cookies

 

Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data clearing operations in the browser settings function. If you clear it, you may not be able to use services or corresponding features that rely on cookies provided by the company due to these modifications.

 

 

 

4、 Personal information

 

◆ Sharing principle

 

Sharing your personal information with our affiliates or third parties requires your authorization and consent, unless the shared personal information is deidentified and the third party is unable to re identify the natural person subject of such information. If the purpose of using information by related parties or third parties exceeds the scope of original authorization and consent, they need to obtain your consent again.

 

 

 

The data shared with related parties and third parties must have a legitimate and legitimate purpose, and the shared data must be limited to the extent necessary to achieve the purpose.

 

 

 

We will carefully evaluate the purpose of using shared information with related parties and third parties, comprehensively evaluate the security capabilities of these partners, and require them to comply with cooperation legal agreements. We will strictly monitor the security of software tool development kits (SDKs) and application program interfaces (APIs) used by our partners to obtain information, in order to protect data security.

 

 

 

◆ Sharing information

 

a. Login to third-party account: When you use this client account to log in to third-party products, with your consent, we may share your nickname, profile picture, and other authorized information with the third-party products you log in to.

 

 

 

b. Geographic Location Services: When you use location-related services, we will share GPS information with the location service provider (Baidu Maps) so that we can return location results to you. GPS information is sensitive personal information, and refusal to provide it will only affect the geographic location service function, but will not affect the normal use of other functions.

 

 

 

◆ Advertising

 

We may place advertisements on this application. If you don't like it, you can close the advertisement.

 

 

 

◆ Personal information that is exempt from consent to sharing and public disclosure in accordance with the law

 

According to laws, regulations, and national standards, we do not require your authorization to share or publicly disclose your personal information:

 

 

 

a. Directly related to national security and national defense security;

 

 

 

b. Directly related to public safety, public health, and major public interests;

 

 

 

c. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;

 

 

 

d. For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;

 

 

 

e. Personal information that you disclose to the public on your own;

 

 

 

f. Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels.

 

 

 

5、 Information storage and protection

 

◆ Storage location

 

We will store your personal information collected and generated during domestic operations within the territory of the People's Republic of China in accordance with laws and regulations. At present, we will not transmit the above information overseas. If we transmit it overseas, we will comply with relevant national regulations or seek your consent.

 

 

 

◆ Storage period

 

We will only retain your personal information for the period necessary for the purpose of providing this client and services: the information, comments, likes, and related information you post will be retained until you withdraw, delete, or cancel your account. After the necessary deadline, we will delete or anonymize your personal information, except as otherwise provided by laws and regulations.

 

 

 

◆ Security protection of personal information

 

We will use encryption technology, anonymization processing, and relevant reasonable and feasible means to protect your personal information, and use security protection mechanisms to prevent malicious attacks on your personal information.

 

 

 

We will establish measures to ensure the security of your personal information. We adopt strict data usage and access policies to ensure that only authorized personnel can access your personal information, and timely secure processing of data and technology.

 

 

 

The system and communication network you use to access our services may encounter issues due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing your account passwords and related personal information to others.

 

 

 

We will develop emergency response plans and immediately activate them in the event of user information security incidents, striving to prevent the impact and consequences of these security incidents from expanding. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

 

 

 

Once you leave this client and related services, browse or use other websites, services and content resources, we will not have the ability and direct obligation to protect any personal information submitted by you on software or websites outside of this client and related services, regardless of whether you log in, browse or use the above software or websites based on the links or guidance of this client.