Privacy Policy
Date of publication of this edition:June 24th,2025
Effective date:June 24th,2025
This Privacy Policy applies to the Edmodo Academy product (the "Product") service. This Privacy Policy endeavors to provide you with an easy-to-understand and concise explanation of the Edmodo Academy's policies and practices regarding the collection, use, management and protection of your personal information, and the manner in which we provide you with access to, and the ability to update, delete, and safeguard, such information. This Privacy Policy applies to the services provided to you by this product, and the specific content of the services you receive may vary depending on the version of the product you are using.
Fujian Huayu Education Technology Co., Ltd. and its affiliates (hereinafter referred to as "we"), the operator of this product, will protect your personal information in accordance with laws and regulations. In order to ensure that you can better use the services we provide, we recommend that you carefully read this Privacy Policy (especially the bolded clauses that are directly related to your rights and interests and involve your sensitive personal information) and confirm that you fully understand it before deciding whether or not to use the services we provide you with this product, and if you have any questions, please contact us before agreeing to this policy through the contact information provided in this policy.
The key elements of this Privacy Policy are summarized below:
I. Collection of personal information
1.1 Information provided by you or collected by us
When you register for an account or use the various business functions provided by this product, this product will collect the relevant personal information provided by you and, under the conditions of the current level of technology, will be used to provide you with services, improve the quality of our services, safeguard the security of your account, and comply with national laws and regulations and regulatory requirements:
(1) User registration
You will first need to register for a product account in order to become a user of this product. When you register, you will need to provide us with a real-name cell phone number or Email Address in your own name, and we will assist in verifying your identity by sending an verification code.
For your convenience, the Product allows you to register and log in using third party accounts. If you choose to register and log in using a third party account (for which you must ensure that such third party account is owned by you and that you have full dispositive rights to the information contained in such account), you will authorize us to obtain and verify the information that you have registered with such third party account.
When you use the third-party subject WeChat or QQ to log in, based on your explicit consent, we will wake up your WeChat or QQ, and you can use your WeChat or QQ account to log in at your own discretion; if you refuse, you will not be able to use WeChat or QQ to log in, but it will not affect your use of other functions of the product.
(2) Functions necessary for the use and improvement of our products and services
In order to better provide you with product services, we will collect your login status, service usage data, service operation data during your use of the Services; and may display the aforementioned information to you or other users. In order to better improve our services, we will collect your log information (including the information you posted to report errors, feedback and comments, and information on the time you used the services), usage record information, information you shared with other parties through the product, your comments and suggestions on our services, and the information you submitted or gave back to us on your own initiative; and use it for the purpose of statistical analysis of the product's operation, and for the purpose of product improvement plans. Improvement plan.
(3) Functions necessary to protect the security of your account
In order to protect your system security when you use the Product, we will collect your device model, MAC address, IP address, device software version information, Android ID, device identification code, device identifier, IDFA, location, network usage habits, product crash information, and will record some link information that we think is risky; in order to further analyze and troubleshoot possible system anomalies, system risks, and for combating behaviors that damage the fair environment of the product or interfere with or disrupt the normal conduct of the product service.
(4) Interactive functions
When you interact with other users of our products or actively post information, we will collect and store the content of the information you send and the content of the information you receive. We will filter inappropriate content in accordance with laws, regulations, policies and the requirements of the relevant authorities.
(5) Account identification information
When you register to use the Product, we collect your avatar and nickname, which are used to identify you as a user of the Product.
(6) Feedback Function
When you use the product to provide feedback, we will collect the information you submit, including your phone number or email address, the content of the feedback, screenshots of the feedback (if you choose to provide them), and the category of the feedback. This is to better understand your needs and issues and to ensure that we can respond to your feedback promptly and effectively.
(7) Personalized Services
When you avail personalized services, we will collect and save your interests and hobbies, courses browsed, keywords searched set within the product and record the courses you have studied in the product. This is used to push relevant courses to you.
(8) Personal Information Settings
When you enter the "My - Personal Information" page to make settings, we will collect your real name,Gender,age group,education level,occupation. Used for identity verification, product and service provision and maintenance, personalized recommendationsUsed for identity verification, product and service provision and maintenance, personalized recommendations, evaluation and improvement, transaction processing, technical support, usage analysis, opinion solicitation, notification alerts, violation management,marketing content provision (such as user selection), personalized customization, security enhancement, and research and development of new services.
1.2 Personal information you authorize us to collect and use
(1) Equipment authority
If you need to use a particular service of the Product, or to have a better experience with the Product, you will also need to provide us with the information necessary for a particular business function and allow us to invoke the necessary device permissions. Since the specific permissions for Android and iOS systems are different, we will explain them to you as follows:
The device permissions called by Android are as follows:
stockpile
(1) Avatar: Upload a local avatar; take an avatar and save it.
(2) Scan: Select a QR code from your album to scan.
(3) Feedback: Upload images of your feedback.
Modify system settings
(1) Video Shooting: Called to increase the video brightness when shooting video and restore it after shooting.
(2) Application Framework: Called to modify desktop shortcuts.
Camera
(1) Avatar Upload: Take an avatar.
(2) Scan: Open the camera to scan a QR code.
(3) Feedback: Take a photo while uploading feedback images.
The device permissions called by iOS are as follows:
Album
(1) Avatar: Upload a local avatar; take an avatar and save it.
(2) Scan: Select a QR code from your album to scan.
(3) Feedback: Upload images of your feedback.
Camera
(1) Avatar Upload: Take an avatar.
(2) Scan: Open the camera to scan a QR code.
(3) Feedback: Take a photo while uploading feedback images.
Notifications
(1) Notification Alert: Support users can normally receive their own related messages.
Your decision to disable access will not affect the processing of personal data that was previously carried out on the basis of your authorization. If you refuse to authorize us to access your data as described above, will result in us not being able to provide you with a service without obtaining your data ; when the data in question is necessary for the provision of the corresponding service, it will result in us not being able to provide you with the corresponding service without obtaining your data.
(2) Third party information
In order to provide you with better service, we will collect information directly related to the transaction through the person you choose to deal with and the third party organizations directly involved in the transaction, so as to ensure the smooth completion of the service and provide you with better follow-up services.
1.3 Information for which your prior authorized consent is not required
According to relevant laws and regulations and national standards, we will collect and use your personal information without asking for your authorization in the following cases:
(1) Those directly related to national security, national defense security and other national interests; and those directly related to public safety, public health, public information and other significant public interests;
(2) Those directly related to the investigation, prosecution, trial and enforcement of sentences for crimes;
(3) For the purpose of safeguarding your or other individuals' life, property, reputation and other significant legal rights and interests but it is difficult to obtain my consent;
(4) The personal information collected is disclosed by you to the public on your own initiative;
(5) Collecting personal information from lawful publicly disclosed information, such as lawful news reports, government information disclosure and other channels;
(6) Necessary to provide you with products and services at your request or to fulfill the contract;
(7) Necessary for maintaining the safe and stable operation of the product or service provided, such as detecting and disposing of malfunctions of the product or service;
(8) Necessary for the conduct of legitimate journalism;
(9) If it is necessary to carry out statistical or academic research in the public interest, and if it provides the results of academic research or description to the public, it de-identifies the personal information contained in the results;
(10) Other cases stipulated by laws and regulations.
1.4 Additional information to be collected as a result of service updates
Due to the nature of our services, please know and understand that our services will be constantly updated and improved, and various business functions will be added and changed. If we need to collect additional information about you as a result of service updates and improvements, we will obtain your consent by amending this Policy, obtaining your authorization, notifying you on the page, or making a public announcement, depending on the actual situation.
II. Use and management of personal information
2.1 Use of Personal Information
In order to provide you with better services or products, this product will use your personal information in the following circumstances:
(1) Based on legal requirements and service needs
We use your personal information in accordance with relevant laws, regulations and legal procedures; as well as in accordance with the terms of service of this product, application license agreement or other similar documents; based on the need to provide various business functions and services.
(2) Improvement of services
According to your use of our products, product operation, service safety and security needs, under the premise of not disclosing your personal information, to enhance and improve the services of this product.
2.2 Sharing of personal information
(1) Types of partners
We will share your necessary information with our partners only for the purposes stated in this Privacy Policy, which are necessary, lawful, legitimate, and specific, and we will require those partners to use your information only in the context of providing services to you.
Current partners for this product include:
Service Providers, Vendors: In order to better realize the functionality of our Services so that we can give you a better product experience, we will provide your necessary information related to the Services to vendors, service providers who provide business support to us (including technical infrastructure services, data analytics services, customer service, or conducting academic research and surveys).
Advertisements, Analytics Service Providers: We do not share your personal information directly with advertisements or analytics service providers. In order to help advertisers increase the effective reach of their advertisements without identifying your personal information, or/and to improve the effectiveness of analytics results from analytics providers, we may provide information in aggregate form so that it does not directly identify you personally.
Necessary subjects for the provision of products and services: Necessary subjects to whom we should disclose your personal information in order to fulfill legal or contractual obligations, prevent technical or security problems.
Government Agencies: When it comes to complaints and disputes between you and others, we will provide the content of the complaints and disputes, your contact information, and necessary information specified by the government agency to facilitate the timely resolution of the complaints and disputes, unless such provision is expressly prohibited by law or regulation.
Companies, organizations and individuals with whom we share personal information are required to comply with confidentiality covenants and are required to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
(2) Special instructions on embedding third-party code and plug-ins
We will list below the cases in which third-party codes and plug-ins are currently embedded in our products:
Android Collection End's Privacy Policy SDK Basic Information Publicity:
SDK Name: Tencent Bugly
Affiliated Institution: Tencent Technology (Shenzhen) Co., Ltd.
Usage Scenario: Crash log capture
Usage Purpose: Capture when an exception occurs
Types of Personal Information Collected: Access to external storage, reading the currently running application process
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Official Privacy Policy Link: https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56
SDK Name: QQ Interconnect SDK
Affiliated Institution: Shenzhen Tencent Computer System Co., Ltd.
Usage Scenario: Log in with QQ
Usage Purpose: Users log in to the product directly using their QQ numbers as accounts
Types of Personal Information Collected: Access to external storage, reading the list of installed applications
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Official Privacy Policy Link: https://wiki.connect.qq.com/qq互联 sdk隐私保护声明
SDK Name: WeChat Open Platform SDK
Affiliated Institution: Shenzhen Tencent Computer System Co., Ltd.
Usage Scenario: Log in with WeChat
Usage Purpose: Users log in to the product directly using their WeChat IDs as accounts
Types of Personal Information Collected: Access to external storage, WIFI's BSSID, WIFI's SSID, WLAN MAC address, reading the sensor list, reading the currently running application process
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Official Privacy Policy Link: https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8
SDK Name: Sensors Data Analytics SDK
Affiliated Institution: Sensors Data Network Technology (Beijing) Co., Ltd.
Usage Scenario: When users use the product, report behavior data to the server
Usage Purpose: Collect user behavior data for big data analysis
Types of Personal Information Collected: Android ID, IDFA, IDFV, device model, OAID, WLAN MAC address
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Official Privacy Policy Link: https://www.sensorsdata.cn/market/privacy_policy.html
SDK Name: Tencent Browsing Service SDK
Affiliated Institution: Shenzhen Tencent Computer System Co., Ltd.
Usage Scenario: Browser compatibility
Usage Purpose: Used for browser compatibility
Types of Personal Information Collected: Access to external storage, WIFI's BSSID, IP address, International Mobile Subscriber Identity (IMSI), information of installed apps
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Official Privacy Policy Link: https://rule.tencent.com/rule/preview/1c4e2b4b-d0f6-4a75-a5c6-1cfce00a390d
SDK Name: Tencent Mobile Analysis
Affiliated Institution: Tencent Technology (Shenzhen) Co., Ltd.
Usage Scenario: Query and analysis of crash logs
Usage Purpose: Used for querying App crash logs
Types of Personal Information Collected: Access to external storage, WLAN MAC address, WIFI's BSSID, WIFI's SSID, sensor list
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Name: UniversalImageLoader
Affiliated Institution: Individual developer
Usage Scenario: Image loading and display
Usage Purpose: Used for loading images
Types of Personal Information Collected: Access to external storage
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: None
Collection End: Android
SDK Name: image_picker
Affiliated Institution: Individual developer
Usage Scenario: Image loading and display
Usage Purpose: Used for loading images
Types of Personal Information Collected: Information of installed apps
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: None
SDK Name: image_gallery_saver
Affiliated Institution: Individual developer
Usage Scenario: Image loading and display
Usage Purpose: Used for loading images
Types of Personal Information Collected: Access to external storage
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: None
SDK Name: Android Jetpack WorkManager
Affiliated Institution: Android
Usage Scenario: Buffered loading of video streams
Usage Purpose: Used for buffering streams during playback to save traffic
Types of Personal Information Collected: Access to external storage
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: android.intent.action.BOOT_COMPLETED
SDK Name: Huawei Push SDK (Android version)
Affiliated Institution: Huawei Software Technology Co., Ltd.
Usage Scenario: Notify users when new courses or tasks are released in daily operations
Usage Purpose: Used for message pushing
Types of Personal Information Collected: Application information, device information (device hardware information, system basic information, and system settings)
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Network status acquisition permission, network access permission
SDK Official Privacy Policy Link: https://developer.huawei.com/consumer/cn/doc/HMSCore-Guides/sdk-data-security-0000001050042177
SDK Name: Honor Push SDK
Affiliated Institution: Shenzhen Honor Software Technology Co., Ltd. or related company
Usage Scenario: Notify users when new courses or tasks are released in daily operations
Usage Purpose: Provide message notification function
Types of Personal Information Collected: Device information, application information
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: None
SDK Official Privacy Policy Link: https://developer.honor.com/cn/docs/11002/guides/sdk-data-security
SDK Name: OPUSH SDK
Affiliated Institution: Guangdong Huntkey Technology Co., Ltd.
Usage Scenario: Notify users when new courses or tasks are released in daily operations
Usage Purpose: Provide message notification function
Types of Personal Information Collected: Basic application information (MCS application package name, application version number, OPUSH SDK version number), in-application device identifier (RegistraterID, appKey, appSecret)
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Network status access
SDK Official Privacy Policy Link: https://open.oppomobile.com/new/developmentDoc/info?id=10288
SDK Name: vivo Push SDK
Affiliated Institution: Vivo Mobile Communication Co., Ltd.
Usage Scenario: Notify users when new courses or tasks are released in daily operations
Usage Purpose: Provide push message service
Types of Personal Information Collected: Basic application information, in-application device identifier, device hardware information, system basic information
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Network status access
SDK Official Privacy Policy Link: https://dev.vivo.com.cn/documentCenter/doc/706
SDK Name: Xiaomi Push SDK
Affiliated Institution: Beijing Xiaomi Mobile Software Co., Ltd.
Usage Scenario: Notify users when new courses or tasks are released in daily operations
Usage Purpose: Provide message notification function
Types of Personal Information Collected: Device identification (OAID, encrypted Android ID), push message content, device information (device manufacturer, model, location, operator name, etc.), notification bar settings
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Network status access, device information acquisition, write to device storage
SDK Official Privacy Policy Link: https://dev.mi.com/xiaomihyperos/documentation/detail?pId=1534
SDK Name: NetEase Yidun SDK
Affiliated Institution: NetEase Inc.
Usage Scenario: Strengthen/Reinforce the released Android packages
Usage Purpose: Protect code security
Types of Personal Information Collected: Operating system version number, CPU architecture, operating system setting information, current application package name, current application signature
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Device information, application information,Storage Permission
SDK Official Privacy Policy Link: https://dun.163.com/clause/privacy
iOS Collection End's Privacy Policy SDK Basic Information Publicity:
SDK Name: Tencent Bugly
Affiliated Institution: Tencent Technology (Shenzhen) Co., Ltd.
Usage Scenario: Crash log capture
Usage Purpose: Capture when an exception occurs
Types of Personal Information Collected: Access to external storage, reading the currently running application process
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Official Privacy Policy Link: https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56
SDK Name: QQ Interconnect SDK
Affiliated Institution: Shenzhen Tencent Computer System Co., Ltd.
Usage Scenario: Log in with QQ
Usage Purpose: Users log in to the product directly using their QQ numbers as accounts
Types of Personal Information Collected: Access to external storage, reading the list of installed applications
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Official Privacy Policy Link: https://wiki.connect.qq.com/qq互联 sdk隐私保护声明 (English version link: https://wiki.connect.qq.com/qq_interconnect_sdk_privacy_protection_statement)
SDK Name: WeChat Open Platform SDK
Affiliated Institution: Shenzhen Tencent Computer System Co., Ltd.
Usage Scenario: Log in with WeChat
Usage Purpose: Users log in to the product directly using their WeChat IDs as accounts
Types of Personal Information Collected: Access to external storage, WIFI's BSSID, WIFI's SSID, WLAN MAC address, reading the sensor list, reading the currently running application process
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Official Privacy Policy Link: https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8
SDK Name: Sensors Data Analytics SDK
Affiliated Institution: Sensors Data Network Technology (Beijing) Co., Ltd.
Usage Scenario: When users use the product, report behavior data to the server
Usage Purpose: Collect user behavior data for big data analysis
Types of Personal Information Collected: Android ID, IDFA, IDFV, device model, OAID, WLAN MAC address
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Official Privacy Policy Link: https://www.sensorsdata.cn/market/privacy_policy.html
SDK Name: Tencent Mobile Analysis
Affiliated Institution: Tencent Technology (Shenzhen) Co., Ltd.
Usage Scenario: Query and analysis of crash logs
Usage Purpose: Used for querying App crash logs
Types of Personal Information Collected: Access to external storage, WLAN MAC address, WIFI's BSSID, WIFI's SSID, sensor list
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: Storage permission
SDK Name: Alibaba AlivcConan SDK
Affiliated Institution: Alibaba Cloud
Usage Purpose: Play videos, used for video buffering during video playback.
Types of Personal Information Collected: IDFV
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: None
SDK Official Privacy Policy Link: https://help.aliyun.com/document_detail/57314.htm
SDK Name: device_info_plus
Affiliated Institution: Individual developer
Usage Scenario: Obtain local device information
Usage Purpose: Used for obtaining local device information
Types of Personal Information Collected: IDFV
Sharing Method: Collected by the SDK on the device, no data sharing involved
Sensitive Permissions: None
2.3 Transfer and public disclosure of personal information
We will not transfer or publicly disclose your personal information to any company, organization or individual except as provided in Section 2.4 of this Privacy Policy.
In the event of a merger, acquisition, asset transfer or similar transaction involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy, or else we will require that company or organization to seek authorized consent from you again.
2.4 Exceptions
In accordance with relevant laws and regulations and national standards, we will share, transfer, and publicly disclose personal information without your prior authorized consent in the following cases:
(1) Directly related to national security and national defense security;
(2) Directly related to public safety, public health, and significant public interest;
(3) Those directly related to the investigation, prosecution, trial and enforcement of sentences for crimes;
(4) When it is difficult to obtain the consent of the subject of the personal information or other individuals for the purpose of safeguarding their important legitimate rights and interests, such as the life or property of the subject of the personal information or other individuals;
(5) If you disclose your personal information to the public on your own, or if you have obtained your explicit consent or authorization in advance;
(6) Collecting personal information from lawful publicly disclosed information, such as lawful news reports, government information disclosure and other channels.
(7) In accordance with the relevant agreements signed with you (including the user agreement signed online) or other legal documents.
(8) In accordance with laws and regulations or mandatory administrative or judicial requirements.
III. Use of cookies and similar technologies
In order to ensure the proper functioning of our products, we may store on your computer or mobile device a small data file called a cookie, which usually contains an identifier, the name of the site, and some numbers and characters. Cookies help us to identify registered users, count users, analyze the effectiveness of page design and advertisements, and eliminate the need for you to enter repetitive information. You can manage and delete cookies by, for example, configuring your browser (most web browsers automatically accept cookies, but you can usually modify your browser settings to refuse cookies if you wish). If you manage or delete cookies, it will affect your access to this product or prevent you from obtaining the full services of this product.
In addition to cookies, we may use similar technologies in accordance with the actual needs of our products. Our research and use of cookies and similar technologies are mainly for the purpose of improving the quality of our services/products and optimizing the user experience, and will not go beyond the purposes described in this Privacy Policy.
IV. Protection of personal information
4.1 Storage
This product will retain your personal information for the period necessary for the purposes described in this Privacy Policy and for the time period required by laws and regulations. In order to facilitate your understanding, we would like to explain to you below some of the major data retention time frames that are currently required by laws and regulations:
(1) User log information: Retention period of six months.
(2) Information on goods and services, transaction information: the retention period is not less than three years from the date of completion of the transaction.
(3) Backup of records of technical measures for Internet security protection: the retention period is at least sixty days.
In the event of termination of the operation of our products, we will make an announcement to notify you in advance. We will delete or anonymize your personal information after the retention period has expired, unless otherwise required by national laws, regulations, normative documents, or governmental policies or orders, or in order to fulfill our compliance obligations to retain your personal information.
In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China. If your personal information is to be transported across borders, we will separately and individually obtain your authorized consent stating the purpose, type and recipient of the outbound transfer of personal information. With your authorized consent, your personal information will be transferred to, or accessed from, jurisdictions outside the country where you use the product or service. Such jurisdictions may have different data protection laws or may not even have such laws. In such cases, your personal information will receive sufficiently equivalent protection within the People's Republic of China. Prior to cross-border data transfers, we will implement security measures such as data de-identification.
4.2 Safeguards
This product will make every reasonable effort to protect the personal information it obtains about you, subject to the state of the art. In order to prevent your personal information in the accidental, unauthorized circumstances of illegal access, copy, modify, transmit, loss, destruction, processing or use. We use multi-faceted security measures (including technical protection means, management system measures, etc.) to ensure that your personal information is handled with a reasonable level of security.
This product will adopt technical means such as encryption technology (e.g. SSL), firewalls, restriction of unauthorized access, de-identification or anonymization processing to protect your personal information. We will also continue to strengthen our software security capabilities, such as completing some of the information encryption work locally on the device to consolidate secure transmission, and understanding information about the applications installed and processes running on your device to prevent viruses, Trojans and other malicious programs.
We will continue to improve the relevant management system and establish relevant processes and organizations simultaneously to further protect your personal information and prevent your personal information from being accessed, used or disclosed by unauthorized personnel. We will strictly limit the scope of people who can access the information and sign confidentiality agreements with the aforementioned people, and those who violate the confidentiality obligations will be punished according to the provisions of the management system.
We will take all reasonably practicable steps to ensure that we do not collect irrelevant personal information. We will only retain your personal information for as long as is necessary to fulfill the purposes set out in this policy, unless an extended retention period is required or permitted by law.
4.3 Security incident handling
In the event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, inform you of the basic situation of the security incident, the handling process and other information in a timely manner through public announcements, push notifications, and one or more of the measures in the contact information you have reserved, in order to minimize your losses or to remedy your losses. Meanwhile, we will also take the initiative to report the disposition of personal information security incidents in accordance with the requirements of the regulatory authorities.
4.4 Security recommendations
Although reasonable and effective measures have been taken as described above, and the standards required by relevant laws and regulations have been complied with, this product is still unable to guarantee the security of your personal information when it is exchanged through insecure channels or links not under our control, due to the limitations of the existing technology, etc. Therefore, we recommend that you take proactive measures to ensure the security of your personal information, such as setting up complex passwords, regularly revising your account password, and not disclosing your account password and other personal information to others. You should try to avoid providing personal sensitive information when submitting personal information to websites other than this product, and make your decision carefully. If you find that your personal information has been compromised, especially your account password, please contact us immediately according to the contact information provided in this Privacy Policy so that we can take appropriate measures.
V. Your rights to personal information
We will protect you from exercising the following rights with respect to your personal information in accordance with relevant Chinese laws and regulations:
5.1 Queries
You can check your personal information through "My - User Information", if you can not check through the above ways, you can contact us according to the contact information agreed in Article 9 (under normal circumstances, we will reply to your request within 15 working days).
5.2 Corrections
If you discover an error in your personal information, and after we have performed the necessary authentication of your identity, you have the right to correct or update the incorrect or incomplete information as follows: "My - User Information". However, for security and identification reasons (e.g., number appeal services), you will not be able to modify some of the initial registration information and authentication information provided during registration. If you are unable to make such corrections, you may contact us at the contact information provided in Article 9 ( In general, we will respond to your request within 15 business days ).
5.3 Delete
You may contact us in accordance with the contact information agreed in Article 9 to make a request for deletion of your personal information in accordance with laws and regulations in the event of the following circumstances (under normal circumstances, we will respond to your request within 15 business days).
(1) If our handling of personal information violates laws and regulations;
(2) If we collect or use your personal information without your consent;
(3) If we process personal information in breach of our agreement with you;
(4) If you no longer use our products or services, or if you cancel your account;
(5) If we no longer provide products or services to you.
If we decide to respond to your request for deletion, we will also promptly notify the entities that received your personal information from us and request that they promptly delete it, unless otherwise required by law or regulation, or if those entities have been independently authorized by you to do so.
When you delete information from our Services, we will not delete the corresponding information from our backup systems immediately, but will delete the information when the backup is updated.
5.4 Cancellation
You can cancel your registered account at any time through "My - Settings - Account Security - Account Cancellation", but once you cancel your account, you will not be able to use the products and services corresponding to your account and your information and account-related data will be deleted or anonymized, so please be careful. If you are unable to cancel your account in the above manner, you may contact us in accordance with the contact information as agreed in Article 9 to make a request to cancel your account (under normal circumstances, we will respond to your request within 15 working days). If you are authorized to log in to the Product through a third-party account, you may take measures to cancel your account by deleting any personal information other than your account for the Product and canceling the authorization of the third-party account for logging in to the Product or other measures to cut off the connection between the third-party account and the Product. (For details, please refer to the "User Cancellation Agreement")
5.5 Withdrawal of authorization
You can apply for the withdrawal of your authorization through the settings of this product (closing the corresponding permissions, closing some functional options or releasing the binding relationship of the third-party account) or in accordance with the provisions of laws and regulations. If you withdraw your authorization, it will not affect the processing of your personal information before you withdraw it, and we will not be able to continue to provide you with the corresponding service content after you withdraw it. If you are unable to withdraw your authorization in the above manner, you may contact us at (under normal circumstances, we will respond to your request within 15 working days) in accordance with the contact information agreed in Article 9.
5.6 Reminders of rights execution
In order to protect the security of your account, when you make the aforementioned corrections, deletions, cancellations, revocation of authorization and other decisions, we will ask you to verify your identity. In principle, we do not charge you for reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the actual situation. We will refuse requests that are unnecessarily repetitive, require excessive technical means, pose a risk to the legitimate rights and interests of others, or are highly impractical.
5.7 Exceptions
We will not be able to respond to your decision to correct, delete, cancel, or revoke your authorization in the cases described below:
(1) Directly related to national security and national defense security;
(2) Directly related to public safety, public health, and significant public interest;
(3) Those directly related to the investigation, prosecution, trial and enforcement of sentences for crimes;
(4) We have sufficient evidence that you have subjective malice or are abusing your rights (e.g., your request will jeopardize public safety and the legitimate rights and interests of others, or your request is beyond the scope of what can be covered by ordinary technical means and commercial costs);
(5) Responding to a request from a subject of personal information will result in serious damage to the legitimate rights and interests of you or other individuals or organizations;
(6) Involving trade secrets.
VI. Special protection of personal information of minors (including children)
This product takes the protection of personal information of minors (including children) very seriously. Although the definition of a child varies by law and custom, we consider any person under the age of 14 to be a child. This product will protect the personal information of minors in accordance with relevant laws and regulations and the provisions of this Privacy Policy.
If you are a minor, please be sure to ask your guardian to read this Privacy Policy carefully before using the services of this product, and please ensure that you obtain the prior consent of your guardian before using this product. In the event that we collect personal information from a minor with the consent of the guardian, we will only use or publicly disclose this information when permitted by law, with the express consent of the guardian, or when it is necessary for the protection of the minor.
If you are a minor and have not obtained your guardian's consent, or if you are using this product and providing information to us without your guardian's consent, please stop using this product immediately and contact us promptly. If you have obtained your guardian's consent, please read the provisions on user data collection in this policy with your guardian and ensure that we have obtained your guardian's consent for the collection of your personal data. If we find out that your guardian's consent has not been obtained for the collection of the relevant data, we will temporarily suspend the relevant services of this product to you and will try to delete the relevant data as soon as possible.
VII. Application and Modification of this Privacy Policy
7.1 Application of this Privacy Policy
If the content of this Privacy Policy is inconsistent with the content of the User Agreement, Terms of Service, or the Privacy Policy for the particular service in question, or other similar documents that you have signed with us, the content of this Privacy Policy will prevail.
If you use the products and services of third parties through this product, the information you provide to such third parties will be subject to the privacy policies of such third parties.
7.2 Changes to this Privacy Policy
The content of this Privacy Policy will make modification due to changes in our business functions, changes in the purpose of use of personal information, changes in the contact information of the person in charge of the protection of personal information, etc., and we will not diminish the rights you are entitled to under this Privacy Policy without your consent. In the event of changes to the content of the Privacy Policy, we will post the revised Privacy Policy on the main exposure page of the product or on this page, or notify you through the means you have reserved, or notify you through pop-up windows and other appropriate means; the aforementioned posting and notification will be deemed to have notified you of the revised content.
If you do not agree with the changes we have made to the terms and conditions of this Privacy Policy, you have the right to stop using the product.
VIII. Application of law and settlement of disputes
This Privacy Policy is governed by the laws of the People's Republic of China (excluding the laws of Hong Kong, Macau and Taiwan for the purposes of these Terms and Conditions only), without giving effect to any principles of conflicts of laws. Any dispute between you and us shall be submitted to the People's Court where the operator of this product is registered for litigation resolution.
IX. Contact us
Our registered address is located in Dahe Village, Hunan Town, Changle District, Fuzhou City, China. If you have any comments or suggestions on this Privacy Policy, or have any comments, suggestions or complaints regarding access to, or correction of, your personal information, you may contact us in the following manner (in general, we will respond within 15 working days):
Our personal information protection officer can be reached at edacn@101.com.
In order to protect your personal information and your rights and interests, we will ask you to verify your identity in matters affecting your personal information or other rights and interests.
X. Keyword descriptions
10.1 Affiliated companies
Affiliated company means a company or other legal entity controlled by one party, or one party is controlled by it, or one party is jointly controlled with it by a third party, and control means the state in which one party controls the other party by means of control such as controlling, majority voting, agreement, etc. or other means determined by the People's Court.
10.2 Sensitive Personal Information
Including identity document numbers, personal biometric information, bank account numbers, communication records and contents, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, and personal information of children under the age of 14 (inclusive).