Privacy Policy
The agreement came into effect on May 20
This policy is intended to help you understand the following matters that may be involved in the use of this product:
- 1. Collection and use of personal information
- 2. Rules for Sharing, Transferring and Public Disclosure of Personal Information
- 3. Personal information protection measures
- 4. User Rights Description
- 5. Regulations on the processing of personal information of minors
- 6. Mechanism for cross-border transmission of personal information
- 7. Applicable Law and Jurisdiction of Disputes
- 8. Policy update mechanism
- 9. Application permission function description
- 10. Contact Us
This product attaches great importance to the security of personal information, and promises to strictly abide by the principles of consistency of rights and responsibilities, clear purpose, voluntary consent, minimum sufficiency, ensuring security, subject participation and openness and transparency, and adopts security measures that meet industry standards to protect your personal information. Please read and fully understand this Privacy Policy before using this product (or service).
1. Collection and use of personal information
Personal information refers to data recorded in electronic or other form that can identify the identity or activities of a specific natural person alone or in combination with other information.
We only collect and use your personal information for the following explicit purposes:
1. Description of business function permissions
- 1. To provide corresponding services, you may need to authorize the following system permissions:
(1) Device information acquisition: used for account security, transaction risk control and system operation security. According to laws, regulations and agreement requirements, we may collect device attributes, connection status (such as device model, FA/OPENUDID/GUID/0AID, SIM card IMSI/ICCID), device MAC address, software installation list and other hardware and software information with your authorization to identify abnormal login behavior. To improve security, we may integrate information authorized by affiliates or partners to comprehensively determine user identity and prevent risks such as fraud and virus attacks.
(2) Camera access: used to upload pictures or icons in custom formula settings.
(3) Permission management: You can adjust the permission authorization status at any time through the system "Settings-Application Management or Application Permissions".
If you refuse authorization, only the corresponding function will be affected, and other functions can still operate normally.
2. Other business functions
- 1. To optimize service experience, troubleshoot and ensure account security, we may collect device model, operating system, unique device identifier (such as IMSI, OAID IMEI, Android ID), IP address, network access method, software installation list, operation log, language and time zone information.
- 2. When you provide feedback, consultation or complaint, we may need you to provide name, mobile phone number, email address and other contact information in order to handle the problem in a timely manner. If you refuse to provide it, it may affect the efficiency of problem solving.
2. Rules for Sharing, Transferring and Public Disclosure of Personal Information
1. Sharing
In principle, we will not share your personal information with third parties, except in the following circumstances:
- 1. Sharing with your explicit consent;
- 2. Compulsory sharing in accordance with laws, regulations, litigation or government authorities;
- 3. Necessary sharing within the scope permitted by law in order to safeguard the public interest or user rights.
2. Transfer
In principle, we will not transfer your personal information, except in the following circumstances:
- 1. Transfer with your explicit consent;
- 2. When the transfer is required due to merger, acquisition or bankruptcy liquidation, the recipient must continue to be bound by this policy, otherwise your authorization must be obtained again.
3. Public Disclosure
Your personal information will only be disclosed publicly in the following circumstances:
- 1. With your explicit consent;
- 2. Based on legal procedures or mandatory government requirements.
4. Exceptions
According to relevant laws and regulations, the following situations do not require authorization and consent:
- 1. Involving national security and national defense security;
- 2. Involving public safety, public health or major public interests;
- 3. Directly related to criminal investigation and trial execution;
- 4. To protect major rights and interests such as life and property, and it is difficult to obtain the consent of the person concerned;
- 5. Necessary for performance of the contract;
- 6. Maintain safe and stable operation of products;
- 7. Academic research or statistics that have been de-identified;
- 8. Information obtained through legal and public channels;
- 9. Other statutory circumstances.
3. Personal information protection measures
- 1. Adopt industry standard technologies such as SSL encryption, HTTPS access, and access control to ensure data security, and conduct regular employee privacy protection training.
- 2. The information shall be retained only for the shortest period necessary to achieve its function and shall be deleted or anonymized immediately after the expiration of the period.
- 3. It is recommended to avoid transmitting sensitive information through non-encrypted channels (such as email) and to set complex passwords to strengthen account protection.
- 4. We make every effort to ensure the security of information transmission, but we cannot guarantee that the Internet environment is absolutely secure.
- 5. When a security incident occurs, the details of the incident, response measures and remedial suggestions will be notified by email, telephone or announcement in accordance with the law, and the regulatory authorities will be reported for record.
4. User Rights Description
According to relevant laws, you have the following rights:
1. Access and Correction
View or modify your account personal information through the product settings page.
2. Deletion Request
You may contact us to delete your information in the following circumstances:
- The processing behavior violates the law;
- Collection or use without consent;
- Violation of the agreement with you;
- Stop using the product or cancel your account;
- Termination of Services by Us.
After receiving the request, we will notify the related parties to delete it simultaneously (unless otherwise provided by laws and regulations), and the information in the backup system will be cleared during the update.
3. Withdrawal of Authorization
You may apply for withdrawal of authorization through the contact information in this policy, but withdrawal may make some functions unavailable and will not affect the personal information that has been processed before.
4. Account Cancellation
After applying for cancellation, the service will be stopped and the information will be deleted (unless otherwise provided by law). Cancellation is irreversible, so please back up your data in advance.
5. Rights Response
- 1. Identity verification is required and a reply will be given within 15 days;
- 2. Reasonable requests are free of charge, but repeated or complex requests may be charged a fee;
- 3. We may not be able to respond when situations involve national security, public safety, criminal investigation, etc.
5. Regulations on the processing of personal information of minors
- 1. Mainly for adult users, minors must use the service with the consent of their guardians. Users under the age of 14 must be accompanied by their guardians to read this policy and obtain explicit authorization.
- 2. Use the information of minors only when permitted by law or necessary to protect minors.
- 3. If your guardian disagrees, please stop using the Service immediately and contact us.
6. Mechanism for cross-border transmission of personal information
In principle, information is stored in China. Due to the needs of global services, information may be transferred overseas with your authorization. We will ensure that it receives the same protection as in China through measures such as data de-identification and agreement constraints.
7. Applicable Law and Jurisdiction of Disputes
This policy is governed by the laws of mainland China, and any dispute shall be under the jurisdiction of the court where the defendant resides.
8. Policy update mechanism
- 1. Changes will be notified via page updates, and major changes will be notified via email or phone.
- 2. Major changes include: changes in processing purpose/type/method adjustments to the way users exercise their rights, security risk assessment results, etc.
9. Application permission function description
- 1. The permissions required for the service are as follows:
(1) Storage permissions: used for file download and data storage;
(2) Device identification information (IMEI, IMSI, etc.): Create a unique user ID for easy login;
(3) Software installation list: used for third-party login, advertising and anti-cheating;
(4) Accelerometer: supports advertising interaction;
(5) Clipboard reading: quickly import custom formulas;
(6) Camera permissions: used to upload pictures or icons;
(7) All permissions can be managed independently through the system "Settings-Application Management or Application Permissions".
Denying authorization only affects the corresponding function, while other functions are still available.
10. Contact Us
If you have any questions, suggestions or complaints, please contact us at:
Email address:jeff@oakbournecc.us