Privacy Policy and User Agreement

I would like to remind you (the user) to read this privacy agreement (hereinafter referred to as "the agreement") carefully before registering as a user to ensure that you fully understand the terms in this agreement. Please read it carefully and choose to accept or not accept this agreement.

Your registration, login, use, etc. Will be deemed to accept this agreement and you agree to be bound by the terms of this agreement.

This agreement stipulates the rights and obligations between Qinmi (Shenzhen) Technology Co., Ltd. (hereinafter referred to as "we" or "our company") and the users regarding the software or services. "User" refers to the subject who registers, logs in and uses our products or services. For the development of business and technology and the purpose of providing better service, we will revise the privacy agreement in time. After the newly revised privacy agreement is released, it will completely replace the previous version of privacy agreement. Please check the relevant contents in time without prior notice. If you can't accept the revised privacy agreement, please stop using the products and services provided by our company immediately, and users' continued use of our products or services will be regarded as accepting the revised agreement.

This privacy agreement will help you understand:

We collect and use your limited information in full accordance with the privacy agreement to help you get better service.

When you use or open related functions or accept services, we will collect necessary information to ensure that these functions and services are implemented. In most cases, it is not necessary to provide this information unless it is absolutely necessary.

You can choose the account registration method to log in to the application. If you are not logged in, the application itself will use the device identifier information to establish an account association with you, thus providing corresponding services in time.

Unless you allow it, the application will not open unnecessary permissions. You can stop authorization in this application or device operating system at any time, even if you have opened the unnecessary rights you authorized.

Our company strives to provide safe, green and stable applications. If you have any questions about this privacy policy, you can also contact us at any time to get a timely answer.

Next, we will comprehensively introduce how we collect and process personal information that may be involved in this application:

1 Collection and use of personal information

2 the use of equipment information identifiers

3 * * * Enjoy, transfer or disclose personal information

4 storage of personal information

5 protection of personal information

6 Personal information management

7 Revision and Notice of Privacy Policy

1 Collection and use of personal information

1. 1 Registration and login

You can use your mobile phone number to create an account through in-app account registration, and all the information needed in this process is to help you complete the registration. You can choose not to submit or modify unnecessary information, such as avatar and nickname.

You can also log in with a third-party account and use Tik Tok in your application. After obtaining your authorization, the application will bind your authorized information with this application, so that you can directly log in and use this product and service.

In some products, due to functional requirements, the device information identifier may be used as a basis to help you establish a default account. You have the right to modify, delete or re-edit this part, or you can completely delete this information at any time through "account cancellation".

1.2 information submission and release

During the use of our application, you may need to submit or publish information, including but not limited to pictures, videos, audio, etc. Before that, we will apply to you for permission to read and write cameras, photos, microphones, cameras and memory cards. If you refuse to authorize this clause, you will not be able to use this function, but this will not affect your normal use of other functions in Tik Tok.

1.3 Audio and video recording

In some application environments, you may need to submit your personally recorded audio and video content. Before you officially start recording, we will apply to you for permission to record audio and video. You cannot submit any audio and video content in the application unless you agree and authorize it. After obtaining your consent and authorization, you need to take full responsibility for any audio and video content submitted by you personally. Please do not include any personal sensitive information or content that violates national laws and regulations in the submitted audio and video content. All losses or illegal acts caused by personal reasons are borne by individuals and have nothing to do with our company.

1.4 device and log information

Please understand that in the process of using our products, for the purpose of continuous improvement of products and services, we may collect the equipment and log information you use.

The following are some or all of the information that may be collected:

Hardware model, operating system version number, international mobile equipment identification code, unique equipment identifier, network equipment hardware address, IP address, WLAN access point, Bluetooth, base station, software version number, network access mode, type, status, network quality data, operation, use, service log, etc.

At the same time, in order to ensure the normal operation of the product, we may also collect some or all of the following information:

Process information, overall operation, use and frequency of application, application crash, overall installation and use, performance data and application source.

Without your consent and authorization, we will not use this information outside the above application scope.

1.5 Other information that may be collected.

In the process of application use, with the product update and business development, the following are some permissions that may need to be applied for. Please know that in any case, we will apply for permission from you in advance, and you can refuse this permission application, which will not affect your use of other functions of the product.

In order to further provide convenient login service and support application usage analysis and statistics, we may need to apply for phone ID permission from you.

In view of the data backup requirements of some models, we may apply to users for permission to install other applications in the application.

In order to provide the task memo function with dates, we can apply to users for permission to read and write calendars.

1.6 changes in the collection and use of personal information

Please understand that with the update of our products and the development of our business, the above personal information and permission requirements may change. We will update this part in time for your timely understanding and reference.

1.7 Personal information collected and used with consent shall be exempted according to law.

Please understand that under the following circumstances, according to laws and regulations and relevant national standards, we do not need your authorization to collect and use your personal information:

Directly related to national security and national defense security;

Directly related to public safety, public health and major public interests;

Directly related to criminal investigation, prosecution, trial and judgment execution;

It is difficult to obtain personal consent in order to safeguard the major legitimate rights and interests of personal information subjects or other individuals' lives and property;

The personal information you collect is disclosed to the public by yourself;

Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

Necessary for signing or performing a contract according to your requirements;

Necessary to maintain the safe and stable operation of software and related services, such as finding and handling the faults of software and related services;

Necessary for legal news reporting;

When it is necessary for academic research institutions to conduct statistical or academic research based on public interests and provide academic research results or explanations to the outside world, they will identify the personal information contained in the results;

Other circumstances stipulated by laws and regulations.

2 the use of equipment information identifiers

Device information identifier can be used as the identification of mobile devices, which is a widely used technology on the Internet. When you use a company application and are not logged in, the application may set up an account for you with the help of the device information identifier. The purpose of establishing this account is to make it convenient for you to access, use and record your orders and consumption, and it is also the key information for you to obtain follow-up services.

The company hereby promises that it will not use the information obtained through the equipment information recognizer for any other purposes except the above purposes.

In order to further explain the application of equipment information identifier technology, please read the following instructions carefully:

2. 1 Help you get a better service experience.

The traditional login method will require you to fill in your personal information actively, and you don't need to fill in any information when logging in with device information, which improves the response speed of login and service. Even so, you can still choose to edit, modify and delete the information that is automatically completed by using the device information identifier technology.

2.2 provide information records for the service process

After automatically logging in with the device information logo, your orders, consumption and membership information will be automatically recorded under this account, so that you can browse and inquire at any time, and take it as the main qualification for obtaining corresponding services. Colleagues can also effectively avoid the risk of account theft.

2.3 How to exit or delete the device information identifier

By default, when logging in with the device information identifier, you can still choose to log out of the account. Please note that unless we get your consent and authorization, we will not use the technology using the equipment information identifier and the obtained information for any other purpose except our company's application. If you want to further delete the account, you can close the account through the account closing process.

3 * * * Enjoy, transfer or disclose personal information

3. 1 ***

3. 1. 1 * * enjoyment principle

Unless your consent and authorization are obtained, our company will not enjoy your personal information. Our company promises that under any circumstances, we will not * * * enjoy your personal information in any way without your consent and authorization. Even with your consent and authorization, before we officially enjoy your personal information, we will carefully and rigorously evaluate the personal information enjoyed by * * * to ensure that sensitive information will not be leaked.

With your consent and authorization, your personal information will be enjoyed on the premise of rationality, legality and fairness. At the same time, if necessary, sensitive parts of your personal information will be completely deleted or reprocessed.

In some cases, in order to better provide user services or improve existing services, the sensitive parts of your personal information will be completely deleted or reprocessed, so as to achieve the purpose of being unable to recover and identify the natural person of the information. In addition, the enjoyment of any personal information requires your consent and authorization.

We will conduct a long-term, prudent and rigorous evaluation of the third parties who will abide by the regulations to ensure that this information can be enjoyed in full compliance with laws and regulations. We will strictly and comprehensively test and evaluate the software tool development kit (SDK) and application program interface (API) provided by third parties to protect the safety of users' personal information.

3. 1.2 *** Enjoy the function of information realization.

A. In the process of using our products, our company, third-party function providers and system service providers jointly provide corresponding services for you. In order to better provide user services or improve existing services, we may * * * share some necessary information, but it is not a sensitive part of personal information. These * * * enjoyment information are only used for comprehensive statistics of product use and preference analysis of user behavior, so as to better provide a basis for improving products, enhancing user experience and recommending corresponding content.

B. When you log in to our company's application with a third-party account, we will get personal information provided by the third party, including the user's nickname, avatar and other information that you authorize us to use. Besides, we won't get any more information.

C. Unless necessary, you don't need to provide the permission of corresponding geographical location for our company's application. Our company promises to ask for your consent and authorization in advance when you need your geographical location permission, and you can refuse to provide this permission at any time. Refusing to provide this permission will not affect the use of other application functions other than this function.

D. Consumption and payment function: the payment function is to provide services to you by a third-party payment institution that cooperates with our company. Third-party payment institutions may collect your name, bank card type, card number, expiration date and mobile phone number when providing this service. These sensitive information are necessary in the payment process, and refusing to provide this information will make you unable to use the corresponding payment function.

E. In order to better adapt to the terminal model you use, we may share the model, version and related equipment information with mobile phone manufacturers through technologies such as SDK.

3.2 Transfer

Our company will not transfer your personal information to any third party unless your consent and authorization are obtained. Under special circumstances, such as company merger, acquisition and asset transfer, your personal information may be transferred. In case of the above changes, we will ask the receiving party to protect your personal information according to laws and regulations and not less than the security standards specified in this privacy policy, otherwise we will ask the receiving party to obtain your consent and authorization again.

3.3 Public disclosure

Without your consent and authorization, we will not disclose your personal information publicly. After obtaining your consent and authorization, we will also show it in compliance with national laws and regulations, and the sensitive parts of your personal information will be deleted or reprocessed, so as to achieve the purpose of being unable to recover and identify the natural person of the information. The public disclosure of personal information will be handled with safety protection measures that meet industry standards.

3.4 Disclosure according to law

According to laws, regulations and national standards, we can enjoy, transfer and disclose your personal information without your consent and authorization under the following circumstances:

Directly related to national security and national defense security;

B directly related to public safety, public health and major public interests;

C directly related to criminal investigation, prosecution, trial and judgment execution;

D it is difficult to obtain the consent of the person subjected to execution in order to protect your life, property and other important legitimate rights and interests;

E. Personal information disclosed to the public by yourself;

F. Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.

4 storage of personal information

4. 1 storage location

According to national laws and regulations, we store personal information collected and generated during your operation in People's Republic of China (PRC). At present, we will not send the above information overseas. If we transmit it overseas, we will follow the relevant regulations of the country or get your consent.

4.2 Storage life

We will store personal information while using the features and services of this application. If the retention period is exceeded, your personal information may be deleted or anonymous unless otherwise stipulated by laws and regulations.

5 protection of personal information

A. On the premise of paying attention to information security, we try our best to take reasonable technical and management measures to protect your personal information. At the same time, we also have a professional technical leading group to constantly improve our information security measures, improve the level of technical management, and ensure that your personal information can be properly kept to the greatest extent.

B for the purpose of protecting information security, we will encrypt or anonymously process your personal information, or adopt common, reasonable and legal technical means in the industry for processing.

C under the leadership of the technical leading group, the company has provided a perfect information security supervision mechanism, including the use, access and enjoyment of data, which requires strict authorization.

D. Although the above reasonable and effective measures have been taken and the standards required by relevant laws have been observed, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee the 100% security of information.

E you accept and understand that unexpected and uncontrollable information security problems may occur during the use of our company's applications. We also suggest that you take active measures to protect the security of personal information, such as using complicated passwords, changing passwords regularly and not revealing personal information to third parties.

F. On the basis of the above reasonable and effective measures, we further establish an information security disposal plan to ensure that emergency plans are launched when information security problems occur, and strive to prevent the impact and consequences of these security incidents from expanding.

G. Information security problems caused by your personal reasons, especially those caused by being out of the application environment, are not within the scope of personal information security protection of our company.

6 Personal information management

6. 1 Self-management

Your personal information is completely owned by you, and the company completely protects your personal management authority over the personal information submitted to the company. You can modify your personal information at any time in this application. When modifying personal information, you should follow the requirements of national laws and regulations.

6.2 Authority authorization

Please note that in the process of using our company's application, we will clearly publicize the necessary permissions required for the application, and will also clearly inform all the contents of this privacy agreement. These permissions will not be opened unless authorized by you. At the same time, you can also turn off these permissions in the device operating system. For permissions, such as GPS geographic location, address book, camera, microphone, photo album, etc. If it is an unnecessary right in the application, turning off or refusing authorization will not affect the use of the application.

Please understand that the necessary permissions will affect the main purpose of the application. If you refuse to authorize the necessary permissions or turn off the necessary authorization in the device operating system, it will affect your use of the application.

When using this application, we will definitely apply to you for authorization of the necessary permissions, and only after your consent and authorization will we open this part of the permissions.

6.3 account cancellation

We provide a complete account cancellation function. Please note that before canceling your account, in order to avoid the possibility of account theft, we need to verify the ownership of your account, and you need to provide some supporting information, such as personal information, account status, history, etc. You can read the logout instructions provided in the application to understand the complete logout process.

Please know that account cancellation is an irreversible process. After you cancel your account, we will delete your relevant information or treat it anonymously, unless otherwise stipulated by laws and regulations.

7 Revision and Notice of Privacy Policy

For the development of business and technology and the purpose of providing better service, we will revise the privacy agreement in time. The newly revised privacy agreement will completely replace the previous version of the privacy agreement after its release. Please check the relevant contents in time without prior notice.