Privacy Policy
Privacy Policy
(hereinafter referred to as "the company") and its affiliated companies (hereinafter collectively referred to as "us") We attach great importance to the protection of users’ personal information and privacy, so we have formulated a plan covering how to collect, store, use, share and protect user information and how we are you as a user (hereinafter referred to as "user" or "you") Provides a privacy policy on how to access, update, delete and protect this information. We hope to adopt the " Privacy Policy" (hereinafter referred to as "this privacy policy") Introduce you clearly how we handle your personal information and other information.
This privacy policy is closely related to your use of products and/or services. Please read and thoroughly understand this privacy before using all products and/or services of policy( Especially the content with bold lines) and make sure that you have understood our processing rules for your personal information (see below for definitions) and other information, and make the choices you think are appropriate accordingly. When you use any product and/or service of , It means that you agree and fully understand the entire content of this privacy policy.
Introduction
This policy contains the following:
1. How do we collect and use your personal information and other information
2. How do we use cookies and similar technologies
3. Circumstances in which your personal information is legally shared, transferred, and publicly disclosed
Fourth, how do we safely protect and store the information you provide
5. How do you access and control the information provided by yourself
Sixth, notice and revision
7. Applicable law and dispute resolution
8. How to contact us
Special tips
1. Thank you for your use and trust in . We will continue to strive to provide you with more secure and reliable services.
2. All products and/or services of platform (including all products and/or services of and products and/or products of affiliated companies of Or services) are applicable to this privacy policy, but certain specific products and/or services will also be applicable to specific privacy policies.
3. The aforementioned privacy policies of specific products and/or services constitute part of this privacy policy. If there is any inconsistency with this privacy policy, the privacy policies of specific products and/or services shall prevail.
4. Unless specifically stated otherwise in this privacy policy, this privacy policy does not apply to products and/or services independently provided to you by third parties that are accessed through our products and/or services, such as in search results Products or websites shown to you in, websites that may contain third-party services, or other websites linked to in our services. Please note that if you provide your personal information and other information to a third party when you use a third party’s products and/or services, your information should be subject to the third party’s privacy statement or similar policies. We improperly use or disclose to any third party No legal responsibility is assumed for the information provided by you.
5. This privacy policy is only applicable to users over the age of 18. If you are a child under 18, or you are the guardian of the account that you intend to register for a child, please stop commenting on this privacy policy immediately Reading and any other operations. does not provide products and/or services to children under the age of 18, and does not allow anyone to register an account on behalf of a child or provide it to children after registering an account. If we find that you or a related party have the foregoing The company has the right to take relevant measures as appropriate, including but not limited to restrictions on use, cancellation of accounts, etc. At the same time, the company will delete the collected personal information of children.
Definition
1. [Personal Information] Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.
2. [Personal Sensitive Information] Personally sensitive information refers to personal information that, once leaked, illegally provided or misused, may endanger personal and property safety, and easily lead to personal reputation, physical and mental health damage, or discriminatory treatment, including ID number, Personal biometric information, personal health and physiological information, bank account numbers, credit information, transaction and consumption records, whereabouts, accommodation information, transaction information, communication records and content, etc.
1. How we collect and use your personal information and other information
We will only collect and use your personal information and other information for the following legitimate purposes:
(1) When you use products and/or services, you need to authorize us to collect and use your personal information and other information. Our products and/or services include some specific business functions and additional functions, which include the realization of free network communications Such as functions necessary for the services provided by , functions necessary for improving our products and/or services, and functions necessary for ensuring communication security. We may collect, save and use the following information about you to achieve the aforementioned functions. If you do not provide relevant information, you may not be able to enjoy the products and/or services we provide.
Therefore, in order to provide you with better and safer products and/or services, you agree that we collect the following information:
1. Information that may be collected during your use of the product and/or service.
We may collect information about your use of products and/or services (including usage methods). Such information includes:
1) [Device Information] In order to ensure your normal use of this product and/or service, as well as the security of your account, we will collect device attribute information (such as your hardware model, operating system version, unique device identifier IMEI, network device Hardware address, MAC, etc.), device connection information (telecommunications operator, language used).
2) [Log information] In order to ensure your safe use of this product and/or service, when you use , access our web content and interface services, the system may automatically use "cookies" or other methods Collect corresponding technical information, including but not limited to your IP address, browser type and language, system type, access time, uniform resource locator of the referenced website, etc. . Please note that the above information does not include any of your personal information and other information, nor does it include content that you may send or share through the use of related applications, services or websites. At the same time, we will also encrypt the information to ensure the security of the information.
3) [Location Information] When you turn on the device positioning function, we may collect and process information about your actual location at the time, so that you can get personalized recommendations based on geographic location in time without manually entering your geographic coordinates Services, such as recommendations of nearby people and other information, related products or preferential push services. We use various technologies for positioning, including IP address positioning, GPS positioning, and other sensors that can provide relevant information. You can stop the collection of your geographic location information by turning off the positioning function, but you may not be able to obtain related services or functions, or you may not be able to achieve the intended effects of related services.
4) [Modify/delete SD card content; Obtain access rights to storage space] When you use , will obtain access rights and use The receipts generated during the process will be stored on your device’s own storage space/SD card. You can modify or delete the data stored in your own storage space/SD card on your device by modifying or deleting the corresponding information in . During your subsequent use, will read the corresponding data stored on your device’s own storage space/SD card according to your operation request, so that you can use it normally various functions.
The above information is collected and stored anonymously. At the same time, we will also encrypt or desensitize sensitive information to ensure the security of the information.
2. Information you may need to provide us when using specific products and/or services
If you use the specific products and/or services provided by , in order to meet your product and/or service needs, based on the products and/or services you choose, you must agree to provide us with the corresponding information. Please note that if you do not choose to use a specific product and/or service, you do not need to provide the corresponding information, and it will not affect your use of other specific products and/or services that you have selected.
1) You must provide your account name and mobile phone number when you register and log in to your account. Mobile phone numbers are sensitive information, and this type of information is collected to meet the network real-name system requirements of relevant laws and regulations for corresponding services. If you do not provide such information, you may not be able to use our services normally.
2) If you use the specific products or services provided on the platform, in order to meet your product and service needs, provide relevant information after obtaining your consent, according to the products and services you choose :
(1) [SMS] When you register or [Log in with your phone number] log in to your account, we will send you an SMS verification code. When you receive an SMS verification code, will automatically read your short message and synchronize the verification code to the registration or login interface. You can directly click the verification code to complete it. will not read your other text messages. If you decide to no longer use , you can ignore this type of text message or unsubscribe from the text message as prompted by the content of the message. After receiving your unsubscribe request, we will no longer send you this Class SMS.
(2) Since you may log in to multiple accounts in the installed on your device, will use your device’s own storage space or SD card The form of the management account list stores the account information you have logged in. will read the account information when you log in and remind you to select the account you want to log in to.
(3) When you are logged in, , as a group chat social software, allows you to communicate with other users in For interactive information sending and receiving, will continue to read the user information you have provided in the background so that you can immediately complete the information sending and receiving operations.
Please note that if you do not choose to use a particular product and/or service, you do not need to provide relevant information.
3. Functions necessary to ensure communication services and safety
In order to improve the security of the system when you use our products and/or services, more accurately prevent phishing software fraud and protect your account or transaction security, provide security services including but not limited to communication security checks; we will also collect you Analyze the usage of , recommend high-quality services to you through network traffic monitoring, etc. and troubleshoot possible risks. Please note that the above data information does not include any of your personal sensitive information, nor does it include content that you may send or share through the use of other applications, services or websites.
(2) You can choose whether to authorize us to collect and use your personal information and other information
1. In order to make your use of more convenient or better, our following additional functions may collect and use your personal information and other information. If you do not provide this personal information and other information, you can still use , but you may not be able to use these additional features that can bring you a better experience or need to use certain services Fill in some information repeatedly. These additional features include:
(1) Additional functions based on the camera (camera): You can use this additional function to complete the functions of taking pictures and scanning codes.
(2) Additional function based on image upload: You can upload your photo as an avatar in .
(3) Service quality improvement function based on the various types of information you provide: We may obtain other information about you for reasonable needs to provide services and improve service quality, including relevant information you provide when you contact customer service, and you participate in the questionnaire Questionnaire response information sent to us when conducting surveys or business needs such as creative advertising needs, as well as relevant information we obtain when you interact with our affiliates, suppliers and other partners.
2. The above additional functions may require you to open your camera (camera) and photo album (picture library) to us in your device to realize the collection and use of the information involved in these functions. You can also decide to turn these permissions on or off at any time. Please note that when you turn on these permissions, you authorize us to collect and use this personal information and other information to achieve the above functions. If you turn off the permissions, you cancel these authorizations, and we will no longer continue to collect and use you. This personal information and other information of, also cannot provide you with the above-mentioned functions corresponding to these authorizations. Your decision to close the authority will not affect the previous processing of personal information and other information based on your authorization.
(3) You are fully aware that we do not need your authorization and consent to collect and use personal information and other information in the following situations:
1. Related to our fulfillment of obligations stipulated by laws and regulations;
2, directly related to national security and national defense security;
3. Directly related to public safety, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial and execution of judgments;
5. To protect your or other individuals’ life, property, and other major legal rights, but it is difficult to obtain your consent;
6. The personal information and other information involved are disclosed to the public by you yourself;
7. Necessary for signing a contract according to your requirements;
8. Collect your personal information and other information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
9. Necessary for maintaining the safe and stable operation of the products and/or services provided, such as detecting and disposing of product and/or service failures;
10. Other circumstances stipulated by laws and regulations.
(4) The circumstances under which we obtain your personal information and other information from third parties
[Third Party Information] In order to jointly provide you with products/services or improve the quality and personalization of products and services, or for reasonable needs such as considering the safety of products and/or services, we will follow laws and regulations or based on you Authorizes to receive your personal information and other information from affiliates, alliance members, partners and other trusted third-party suppliers, service providers and agents. We will confirm the legality of the source of third-party personal information. And use your personal information within the scope of your authorization to the third party. If the products and/or functions we provide are beyond the scope of your authorized use, we or we will require the above-mentioned third parties to obtain your consent again. You understand and agree that we do not need to bear legal responsibility for the collection and provision of such third parties.
(5) Rules for the use of your personal information and other information
1. We will legally use the collected personal information and other information in accordance with legal provisions and the provisions of this privacy policy and in order to realize the functions of our products and/or services.
2. After collecting your personal information and other information, we may use technical means to de-identify or anonymize such information in accordance with the law according to the situation. The de-identified information will not be able to identify the user subject, but It may be combined with other information to identify the user subject; The anonymized information will not be able to identify the user subject, and the processed information cannot be restored.
3. [Authorization of Use] Please note that all personal information and other information you provide when using our products and/or services, unless you delete it or refuse to collect it through the system settings, you will use our products And/or continue to authorize us to use it during the service period.
4. We will make statistics on the usage of our products and/or services, and may contact the public or third parties (including but not limited to communication service providers who send emails or push notifications on our behalf, and those who provide us with location data). Map service providers, financial service providers, etc.) share these statistics to show the overall usage trend of our products and/or services, or to maintain and improve our services, but these statistics do not contain any of your identity Identification information.
5. We will only share your personal information and other information for legitimate purposes. At the same time, we will desensitize your information including content replacement and anonymization to protect the security of your personal information and other information.
2. How do we use cookies and similar technologies
(1) Use of Cookies
1. In order to achieve your personalized needs for online experience, so that you can get a more relaxed access experience. We will send one or more small data files called Cookies on your computer or mobile device. The Cookies assigned to you are unique and can only be read by the web server in the domain that issued the Cookies to you. We send you Cookies to simplify your repeated login steps, store your shopping preferences or the products in your shopping cart and other data to provide you with shopping preferences, help you optimize your choice and interaction with ads, and help you judge you Login status and account or data security.
2. We will not use Cookies for any purpose other than those stated in this privacy policy. You can manage or delete cookies according to your preferences. You can clear all the cookies saved on the relevant terminal. Most web browsers will automatically accept cookies, but you can usually modify the browser settings to reject cookies according to your needs; in addition, you can also clear the saved cookies in the software All cookies. But if you do this, you may need to personally change the user settings every time you visit our website, and the corresponding information you have recorded before will also be deleted, and it may have a certain impact on the security of the services you use.
(2) Use of network Beacon and similar technologies
In addition to Cookies, we also use Web Beacon and other similar technologies on the website. Our web pages often contain some electronic images (called "single pixel" GIF files or "web beacons"). The ways we use network beacon are:
1. Calculate the number of user visits by using network beacons on our website, and identify registered users by visiting Cookies.
2. Provide you with personalized services through the cookies information obtained.
3. Circumstances in which your personal information is legally shared, transferred, and publicly disclosed
(1) Sharing
1. We will not share your personal information with any company, organization or individual other than and its affiliates, except in the following cases:
(1) Obtain your explicit consent or authorization in advance through this privacy policy or other reasonable methods, such as emails, phone calls, pop-up notifications, etc., and only for legal, legitimate, necessary, specific, and clear purposes;
(2) Provided in accordance with applicable laws and regulations, legal procedures, administrative or judicial organ requirements.
2. You understand and agree that we may associate your personal information with our affiliates for the purposes of improving user experience, optimizing products, providing you with better services based on linked accounts, providing personalized services, identifying abnormalities in linked accounts, etc. shared. We will only share necessary personal information and are bound by the purpose stated in this privacy policy. If we share your personal sensitive information or our affiliated companies change the purpose of processing personal information, we will ask for your authorization again.
3. You understand and agree that we may share with our advertisements, licensors, suppliers and other partners to provide better customer service and user experience, including but not limited to sharing with advertisements or information service providers, and Help them improve the effective reach rate of the pushed content without identifying you personally, and analyze the usage of our products and services. We will only share necessary personal information and are bound by the purpose stated in this privacy policy. If our affiliates want to change the purpose of processing personal information, they will again seek your authorization and consent. Our affiliates include our affiliates, as well as partners such as advertising, licensors, and suppliers.
4. In order to better handle your complaints and improve the consumer protection mechanism, or when we plan to merge with other companies, be acquired by other companies, or conduct other capital market activities (including but not limited to IPO, bond issuance, etc.) and therefore need When accepting due diligence from other entities, we may hire external professional intermediaries (such as law firms, accounting firms) to provide personal identification information, account information, and transaction information related to your complaint and prosecution to these agencies , But we will require them to take reasonable and necessary confidentiality measures for your personal information by signing confidentiality agreements with these entities, and require them to delete your information within a reasonable period of time after completing the necessary work.
5. You understand and agree that our products and/or services may include third-party software tool development kits (SDKs), and collect and use your personal information in the form of embedded codes, plug-ins, etc. Please rest assured that we will conduct security inspections on the software tool development kit (SDK) for the above-mentioned third-party software to obtain relevant information, and require them to comply with our service purpose, service description, this privacy policy and any other related confidentiality and security Measures to handle personal information. To protect your legitimate rights and interests, if you find that such SDKs or other similar applications are at risk, please immediately terminate the relevant operations and get in touch with us in time.
(2) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following cases:
1. Obtain your consent or authorization in advance;
2. Provide information as required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;
3. Provided in accordance with the relevant agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents;
4. When it comes to mergers, acquisitions, asset transfers or similar transactions, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy, otherwise, we will require The company or organization asks you for authorization again.
(3) Public disclosure
We will only publicly disclose your personal information under the following circumstances and under the premise of adopting industry-standard safety protection measures:
1. According to your needs, disclose your designated personal information in a disclosure method that you explicitly agree to;
2. In cases where your personal information must be provided in accordance with the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information based on the required personal information types and disclosure methods. Under the premise of complying with laws and regulations, when we receive the above-mentioned request for information disclosure, we will require the corresponding legal documents, such as subpoenas or investigation letters, to be issued. We firmly believe that the information requested from us should be as transparent as possible to the extent permitted by law. We have carefully redived all requests to ensure that they have a legal basis and are limited to data obtained by law enforcement agencies for specific investigation purposes and have legal rights. As permitted by laws and regulations, the documents we disclose are protected by encryption keys.
(4) Statement on the responsibility of third parties
[Third-party service] Please note that your counterparty to the transaction, the operator of the third-party website you visit, and the third party accessed through us (such as the third party providing services in the APP) may We have our own privacy protection policy, and we will make it clear to you that related services are provided by a third party; when you div a webpage created by a third party or use an application developed by a third party, recommend that you be careful Check the "Privacy Statement" and "Service Agreement" of these third-party websites or service providers to understand how they handle your personal information so that you can make prudent decisions about whether to use their services.
4. How do we protect and store your personal information safely
(1) Information storage
1. Storage location
The personal information we collect and generate within the territory of the People's Republic of China is stored in the territory of the People's Republic of China.
will not provide or store personal information outside the People's Republic of China.
2. Storage period
We only retain your personal information for the time necessary to achieve the purpose of the service, unless otherwise provided by laws and regulations,
We will store your information for the following period:
(1) We will collect your personal information to meet our legitimate business needs, such as providing services to you or meeting corresponding laws, taxation, and Financial requirements.
(2) When we do not have these legitimate business needs that require the use of your personal information, at your request, we will delete your personal data or perform Anonymization, or if anonymization or deletion is impossible (for example, your personal information has been stored in a backup), we will safely store your personal information and separate it from other data processing Open.
(2) Our technologies and measures to protect your personal information
We attach great importance to the security of personal information and take all reasonable and feasible measures to protect your personal information:
1. [Data Security Technical Measures] We promise that we will make information security protection reach a reasonable level of security. In order to protect your information security, we are committed to using various security technologies and supporting management systems to prevent your information from being leaked, damaged or lost, including establishing reasonable systems, regulations, and security technologies to prevent your personal information from being unauthorized. Authorized access, use and modification to avoid data damage or loss. ’s network service adopts encryption technologies such as the transport layer security protocol, and provides security services through HTTPS and message body encryption to ensure the safety of data during transmission. adopts a variety of encryption technologies to encrypt and save user personal information, and isolate storage media or information systems containing user personal information by logical or physical isolation. When using personal information, such as personal information display and personal information association calculations, we will use a variety of data desensitization technologies to desensitize sensitive fields to enhance the security of personal information in use.
2. [ Other security measures taken to protect personal information] regulate personal information by establishing an information classification and grading system, user information security management system, security development specifications, etc. Security behaviors in various aspects such as internal storage, use, and sharing. conducts comprehensive security control of data through information contact confidentiality agreements, monitoring and auditing mechanisms. monitors the staff’s handling of your information, continuously promotes staff training related laws and regulations, privacy and security guidelines and security awareness, and organizes all staff to participate in security exams, and hold Security and privacy protection training courses strengthen employees’ awareness of the importance of protecting personal information.
3. Please understand that due to technical limitations and various malicious methods that may exist, problems may occur due to factors beyond our control. In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and what you can independently prevent and reduce risks Suggestions, remedies for you, etc. We will promptly inform you about the incident by email, letter, telephone or push notification. When it is difficult to inform the subject of personal information one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
4. If we cease operations, we will promptly stop continuing to collect your personal information, notify you of the suspension of operations in the form of one-by-one delivery or announcement, and destroy or anonymize the personal information we hold.
5. How do you access and control the personal information provided by yourself
1. Your rights to your personal information:
(1) Access your personal information
(1) You can log in to your account via , check your online feedback in "My-About " and via "Help and Feedback-Contact Us" All personal information, modify or delete the above personal information, or carry out related privacy and security settings.
(2) You can also request us to access personal information through customer service or the contact information shown in the "How to Contact Us" section.
(2) Correct your personal information
(1) You can modify your mobile phone number through "My-Settings-Account and Security-Change Mobile Number", and modify your nickname, avatar, gender and other information through "My-Personal Information".
(2) When you find that the personal information we process about you is wrong, you have the right to request us to make corrections. You can apply for correction through the methods listed in "(1) Access to your personal information".
(3) Delete your personal information
In the following situations, you can request us to delete your personal information through the method described in "(1) Access to your personal information":
(1) If you find that our collection and use of your personal information violates laws, administrative regulations, or violates the agreement with you or does not obtain your consent;
(2) If you no longer use our products and/or services, or you cancel your account;
(3) If we no longer provide you with products and/or services
Please note: When you delete information from our service, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.
(4) Cancel your account
You have the right to cancel your registered account. You can apply to cancel your account through "My-Settings-Account and Security-Cancel Account". After your account is cancelled, we will stop providing products and/or services to you, and delete your personal information in a timely manner or de-identify your personal information in accordance with laws and regulations.
(5) Change the scope of your authorization
1. Each business function requires some basic personal information to be completed (see this privacy policy " 1. How do we collect and use your personal information and other information"). For the collection and use of additional pe rsonal information, you can give or withdraw your authorization and consent at any time.
You can do it yourself in the following ways: You can find in your device's system settings-application management and manage, modify or delete related permissions. After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.
2. If you find that your personal information has been leaked, especially your account, please contact us immediately through the contact information agreed at the bottom of this policy [How to Contact Us] so that we can take corresponding measures.
3. Before responding to some of your requirements under paragraphs (2) and (3) above, in order to ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask to verify your identity before processing your request. We promise to verify and process your request within [15] working days from the date of receipt of your request under paragraph 1 above.
4. In the following situations, in accordance with the requirements of laws and regulations, we will not be able to respond to your request:
(1) Related to our fulfillment of the obligations stipulated by laws and regulations;
(2) Directly related to national security and national defense security;
(3) Directly related to public safety, public health, and major public interests;
(4) Directly related to criminal investigation, prosecution, and execution of judgments;
(5) We have sufficient evidence to show that you have subjective malice or abuse of rights;
(6) To protect your or other personal life, property and other major legal rights, but it is difficult to obtain your consent;
(7) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(8) Infringement of trade secrets.
6.Notice and revision
1. In order to provide you with better services and with the development of business, this privacy policy will also be updated from time to time. However, without your explicit consent, we will not reduce your rights under this privacy policy. We will issue an updated version on the mobile terminal of and notify you through website announcements or other appropriate methods before it becomes effective. Please also visit for Keep up to date with the latest privacy policy.
2. In case of major changes, we will adopt a more prompt way to inform you, including but not limited to sending emails, letters, phone calls, push notifications, etc. The major changes referred to in this privacy policy include but are not limited to:
(1) Significant changes have taken place in our service model, such as the purpose of processing personal information, the type of personal information processed, and the way in which personal information is used;
(2) Significant changes have taken place in our ownership structure and organizational structure. Such as business adjustment, bankruptcy mergers and acquisitions caused by owner changes, etc.;
(3) The main objects of personal information sharing, transfer or public disclosure have changed;
(4) Your right to participate in the processing of personal information and how to exercise it has undergone major changes;
(5) When the department responsible for handling personal information security, contact information and complaint channels change;
(6) When the personal information security impact assessment report shows that there is a high risk.
We will also archive the old version of this policy for your rediv.
3. [Revision of privacy policy] The revisions we may make to this privacy policy form part of this privacy policy and are retroactive. If you continue to use our products and/or services, you agree to be bound by this revised privacy policy.
7. Applicable law and dispute resolution
1. [Applicable law] The implementation, interpretation and dispute resolution of this privacy policy shall be governed by the laws of the People's Republic of China, and no conflict of laws shall be considered.
2. [Dispute Resolution] If there is any dispute between you and over the content of this privacy policy or its implementation, both parties shall negotiate and resolve it amicably. If the two parties cannot resolve the dispute through negotiation, both parties agree to submit the dispute to the court with jurisdiction in the company's place for litigation.
8. How to contact us
1. If you have any questions, comments or suggestions about this privacy policy or your personal information related matters, you can send an email to
or online feedback and other ways to contact us.
2. We have established a dedicated department for personal information protection (or personal information protection specialist), you can send an email to
or online feedback and other ways to contact us.
3. Under normal circumstances, we will reply within [15 working days].