Leading Bird Culture™ Privacy Policy
Last Updated: July 29, 2022Leading Bird Culture™ and its affiliated companies (hereinafter collectively referred to as "Leading Bird Culture™" or "we") are committed to protecting the personal information and privacy of users (hereinafter referred to as "users") who use Leading Bird Culture™'s products and services (hereinafter collectively referred to as "System Services"). When users use the System Services, we may collect and use relevant personal information. We hope to explain the processing rules and related matters when we collect and use users' relevant personal information through the "Leading Bird Culture™ Privacy Policy" (hereinafter referred to as "this Policy") to better protect users' rights.
Special Reminder: This Policy applies to all System Services we provide. When users use any individual service, they agree to be protected by this Policy and the specific privacy information policy terms set in that individual service (hereinafter referred to as "Specific Terms"). In this case, the Specific Terms and this Policy will both apply to users. If there are inconsistencies between the Specific Terms and this Policy, the Specific Terms shall prevail within the scope of the Specific Terms. If a particular service we provide does not apply to this Policy, it will be explicitly excluded in an appropriate manner in that service.
Before using the System Services, users must carefully read and thoroughly understand this Policy, especially the terms marked in bold, which users should focus on reading. Users should start using the services only after fully understanding and agreeing to this Policy. If users do not agree with the content of this Policy, it may result in the inability to operate the System Services normally or achieve the intended service effects, and users should immediately stop accessing/using the System Services.
After reading this Policy, if users have any questions about this Policy or related matters, they can contact us through the feedback channels listed in the "Contact Us" section of this Policy and we will respond as soon as possible.
This Policy will help users understand the following:
I. How We Collect and Use Personal Information
II. How We Use COOKIES or Similar Technologies
III. Personal Information We May Share, Transfer, and Disclose
IV. How We Store and Protect Personal Information
V. How to Manage Users' Personal Information
VIII. Revisions and Notifications
I. How We Collect and Use Personal Information
We collect users' personal information mainly to make it easier and more satisfying for users and other users to use the System Services. Our goal is to provide all internet users with a safe, fun, and educational online experience, and this information helps us achieve this goal.
1.We will collect and obtain users' personal information through the following ways:
(1) Information provided by users. For example:
- Information users provide to us when registering for a System Services account or using the System Services;
- Information users share with third parties through the System Services and information stored by users when using the System Services.
Please note that if users upload or publish information in public areas visible to other users within the System Services, or disclose users' information in responses to other people's uploads or publications, such information may be collected and used by others. If users find that others improperly collect or use users' information, they can contact us through the feedback channels listed in the "Contact Us" section of this Policy.
(2) Information shared by third parties about users. That is, information shared by third parties when using the System Services.
(3)Information we obtain about users. Information we collect, aggregate, and record when users use the System Services, such as log information, location information, and device information.
2. We will collect and use users' personal information for the following purposes:
We need to remind users that due to the variety of our products and services, the content provided to users is different, so the relevant business functions (including the types of personal information collected) will also vary depending on the content of the products/services chosen by users. Users should refer to the actual products/services they use. In addition, users understand and agree that we aim to provide users with comprehensive products and services, so we will continuously improve our products and services. This means that with the iteration, expansion, and upgrade of products and services, we may frequently launch new services or business functions or redefine business functions, and may need to collect new personal information or change the purpose or method of using personal information. If we need to use users' personal information for purposes not specified in this Policy or collect additional personal information not mentioned, we will obtain users' consent separately through page prompts, interactive processes, website announcements, or other means. During this process, users can contact us through the feedback channels listed in the "Contact Us" section of this Policy and we will respond as soon as possible.
(1) Helping Users Complete Registration and Login
To provide users with continuous and stable services and ensure the security of users' use of the System Services, we need users to provide basic registration or login information, including phone numbers, email addresses, and create a system account, username, and password. In some individual services, if users only need to use basic functions such as browsing and searching, they do not need to register as system users or provide the above information.
Users can also fill in or supplement additional information (such as nickname, avatar, gender, place of origin, occupation, education, date of birth, interests) during registration, login, or subsequent use. This will help us provide users with personalized and better service experiences, but if users do not provide this information, it will not affect the basic functions of the System Services.
(2) Achieving Identity Verification
According to relevant laws and regulations and regulatory requirements, or to meet the needs of real identity verification, system and service security, and other specific service functions, we may need users to provide real identity information (such as name, ID card, passport), biometric information (static or dynamic), and other identity information to complete identity verification. If users do not provide the above information, we will not be able to provide users with related functions and services.
To achieve the purpose of identity verification, users agree and authorize us to provide, query, and verify the aforementioned identity information to relevant identity verification agencies (such as personal credit agencies, government departments) either by ourselves or by entrusting third parties.。
Please note that users' identity information and biometric information are sensitive personal information. Users should provide them cautiously. If users refuse to provide them, they may not be able to obtain related services, but it will not affect the normal use of other functions and services.
(3) Maintaining the Normal Operation of Basic Functions
During users' use of our services, to provide users with basic functions such as browsing and searching, and to identify abnormal account status, understand product compatibility, ensure the network and operational security of the System Services, and maintain the normal operation of the aforementioned basic functions, we may directly or indirectly collect and store information about users' use of the services and usage methods and associate this information. This information includes:
- Log Information: When users use our services (including background running status), we may automatically collect detailed usage information of users' use of our services as network log storage. For example: users' login account, search query content, IP address, browser type, telecom operator, network environment, language used, access date and time, and users' webpage browsing records, stay duration, refresh records, publication records, attention, subscription, collection, and sharing.
- Device Information: When users use our services (including background running status), we may receive and record information related to the devices used by users. For example: device model, operating system and version, client version, device resolution, package name, device settings, process and software list, device identifier (MAC address/IMEI/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information), software and hardware feature information, device location-related information (such as IP address, GPS location, and WLAN access points, Bluetooth, and base station sensor information that can provide relevant information). To collect the above basic personal device information, we will apply for permission to access users' device information. We collect this information to provide users with our basic services and basic functions. If users refuse to provide the above permissions, it may result in users being unable to use the System Services.
Please note that individual device information and log information cannot identify specific natural persons. If we combine this type of non-personal information with other information to identify specific natural persons, or use it in combination with personal information, this type of non-personal information will be regarded as personal information during the combined use period. Unless authorized by users or otherwise provided by laws and regulations, we will anonymize and de-identify such personal information. This information will be treated and protected as users' personal information according to this Policy during the combined use period.
(4) Providing Users with Interaction and Publishing Services When users use the System Services, upload and/or publish information, and engage in related interactive behaviors (such as publishing, replying, sharing, collecting), we will collect the information uploaded, published, or formed by users and use users' nicknames, avatars, and published content for display.
Please note that the information users publicly publish may contain users' personal information or sensitive personal information. Users should carefully consider before publishing. If the information published by users involves others' personal information, users should obtain their consent before publishing.
(5) Helping Users Complete Orders, Payments, and Deliver Goods or Services
- When users order specific goods and/or services in the System Services, we will generate an order for users to purchase the goods and/or services through the system. During the ordering process, users need to provide at least the recipient's personal identity information, name, delivery address, postal code, recipient, contact phone number, and payment status information. If users refuse to provide such information, we will not be able to complete the related delivery services. If users order goods or services for others through the System Services, users need to provide the aforementioned information of the actual recipient. Before providing us with the aforementioned information of the actual recipient, users need to ensure that they have obtained their authorized consent;
- To display users' account transaction information and ensure transaction security, we will collect information generated during users' use of the System Services (such as the goods or services purchased by users, specific order numbers, order creation time, transaction amounts) to display to users and facilitate users' management of orders;
- To complete order payments, deliver goods or services, confirm transaction status, and provide users with after-sales and dispute resolution services, we will collect users' account, order, transaction, payment, and logistics information related to the transaction progress based on the transaction objects, payment institutions, logistics companies chosen by users, or share users' transaction information with the aforementioned service providers.
(6) Providing Customer Service or Other User Response Functions
When users contact our customer service or use other user response functions (such as submitting pre-sale and after-sale requests, personal information protection complaints or suggestions, other customer complaints and needs), we may need users to provide necessary personal information to match and verify users' identities to ensure the security of users' accounts and systems. We may also save users' contact information (the contact information used by users when contacting us or other contact information actively provided by users), communication/call records and content between users and us, and other necessary information related to users' needs to contact users or help users solve problems, or record the handling solutions and results of related issues.
(7) Personal Information Collected Indirectly
Based on the System Services chosen by users, we may obtain relevant information shared by users from affiliates and third-party partners. For example, when users log in to the System Services using a third-party platform account, we will obtain relevant information under the third-party account (including username, nickname, avatar, specific to the content authorized by users) according to users' authorization and bind users' third-party account with users' System Services account after users agree to this Policy, allowing users to log in and use the System Services directly through the third-party account. We will collect and use users' information in compliance with relevant laws and regulations and based on agreements with affiliates or third-party partners, ensuring the legality of the information sources provided by them.
(1) Providing Users with Information Display and Push of Goods or Services
Based on the information provided by users, the information we may collect, and the information we collect indirectly (such as users' browsing and search records, device information, location information, order information), we may combine one or more of the above information to conduct recommendation algorithm modeling, programmatic advertising recommendation algorithm modeling, user behavior analysis, and user profiling to extract users' browsing, search preferences, behavior habits, and location-related characteristics to provide users with more relevant page displays and personalized content recommendations. We may also send marketing information and user surveys to users via email, SMS, or other means based on feature tags to help us improve the System Services and provide or promote the following goods and services of ours/third parties:
- Our goods and services, including but not limited to: application software and services, data management and services, online advertising services, internet finance, and other social media, e-commerce, information, and communication software and services;
-Third-party goods and services, including but not limited to: internet services, live performances and other arts and entertainment, books, magazines, and other publications, electronics, transportation and travel, banking, insurance, and financial services, points and reward programs, and other goods and services we believe may be related to users.
If users want to manage our personalized services, they can follow the guidelines provided by the individual services they use.
(9) Providing Security for Users
To improve the security of users' use of our and our partners' services, protect the personal and property safety of users or other users or the public from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, and other security risks, and more accurately identify violations of laws and regulations or the relevant agreement rules of the System Services, we may collect, use, or integrate users' account information, transaction information, device information, log information, and information shared by our affiliates and partners authorized by users or in accordance with the law to comprehensively judge users' account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.
(10) Users understand and agree that some individual services may require users to enable specific access permissions on their devices to collect and use the information involved in these permissions. For example
- After users enable storage permissions, we are allowed to access users' storage space so that users can download and save content or use caching to achieve corresponding service functions;
- After users enable device information permissions, we are allowed to obtain users' device information as a unique identifier of the user's device to provide users with more relevant page displays and personalized content recommendations, understand product compatibility, identify abnormal states, and ensure the network and operational security of the System Services;
- After users enable album and/or camera (camera) permissions, they can upload, take photos/pictures/videos, achieve information and comment publishing, live video streaming, or provide proof when communicating with customer service;
- After users enable contact permissions, we can obtain users' contact information to provide users with friend status queries, invite users' friends to use the System Services, and share content/products with people users know;
- After users enable microphone and related voice permissions, they can use voice functions to interact with our products, others, or contact customer service;
- After users enable location permissions, we can obtain users' location information to allow users to interact with nearby friends or push personalized content to users;
- After users enable permissions to read/write calendars, we can obtain users' schedule times to provide users with recording, appointment, and reminder functions.
When users need to disable these function permissions, most mobile devices support users' needs. Please refer to or contact the service provider or manufacturer of the mobile device for specific methods. Please note that enabling any permission means that users authorize us to collect and use relevant information to provide corresponding services. Once users disable any permission, it means that users cancel the authorization, and we will no longer collect and use relevant information based on the corresponding permission and will not be able to provide the services corresponding to that permission. However, users' decision to disable permissions will not affect the information collection and use previously conducted based on users' authorization.
(11) Exceptions to Obtaining Authorized Consent
According to relevant laws and regulations, the following situations do not require users' authorized consent to collect users' information:
- Directly related to national security and national defense security;
- Directly related to public safety, public health, and significant public interests;
- Directly related to criminal investigation, prosecution, trial, and judgment execution;
- For the purpose of safeguarding users' or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain the individual's consent;
- The personal information collected is disclosed to the public by users themselves;
- Necessary for signing and performing contracts according to users' requirements;
- Collected from legally publicly disclosed information, such as legal news reports, government information disclosure, etc.;
- Necessary for conducting legitimate news reports;;
- Other situations stipulated by laws and regulations.
(12) Notice Regarding Sensitive Personal Information
Sensitive personal information refers to personal information that, if leaked or illegally used, is likely to infringe on the personal dignity of natural persons or endanger personal and property safety. The information provided by users or collected by us may contain users' sensitive personal information, such as ID numbers, personal biometric information (static or dynamic), bank account numbers, communication records and content, property information, travel trajectories, and transaction information. Users should carefully and cautiously provide sensitive personal information and agree that we can process users' sensitive personal information for the purposes and methods described in this Policy.
II. How We Use COOKIES or Similar Technologies
We or our partners may obtain and use users' information through COOKIES or similar technologies and store such information as log information.
By using COOKIES, we provide users with a simple and personalized web experience. A COOKIE is a small amount of data sent from a web server to users' browsers and stored on the computer's hard drive. We use COOKIES to benefit our users. For example, to make the system login process faster, users can choose to store their usernames in a COOKIE. This makes it more convenient and quicker to log in to the System Services next time. COOKIES help us determine the pages and content users connect to, the time users spend on specific services, and the services users choose.
COOKIES enable us to serve users better and faster and make users' experiences on the System Services more personalized. However, users should be able to control whether and how COOKIES are accepted by their browsers. Please refer to the files attached to the browser for more information on this aspect.
We and third-party partners may collect and use users' information through COOKIES or similar technologies and store such information.
We use our own COOKIES or similar technologies for the following purposes:
1.Remember users' identities. For example, COOKIES or similar technologies help us identify users as our registered users or save users' preferences or other information provided to us;
2.Analyze users' usage of our services. We can use COOKIES or similar technologies to understand what activities users perform on the System Services or which services are most popular;
3.Advertising optimization. COOKIES or similar technologies help us provide users with relevant advertisements based on users' information rather than general advertising.
There may be COOKIES or similar technologies placed by advertisers and other partners on the System Services. These COOKIES or similar technologies may collect non-personally identifiable information related to users to analyze how users use these services, send users advertisements that may interest them, or evaluate the effectiveness of advertising services. The collection and use of such information by these third-party COOKIES or similar technologies are not governed by this Policy but by their own information protection statements. We are not responsible for third-party COOKIES or similar technologies.
Users can refuse or manage COOKIES or similar technologies through their browsers or user selection mechanisms. However, please note that if COOKIES or similar technologies are disabled, we may not be able to provide the best service experience, and some services may not function properly. Users will still receive advertisements, but the relevance of these advertisements to users will be reduced.
III. Personal Information We May Share, Transfer, or Disclose
1. Sharing
We highly value the protection of users' personal information. Except for the following circumstances, we will not share users' personal information with any third party without users' separate consent:
(1) Sharing necessary to achieve our services/functions. In some cases, we need to share users' information with third parties to achieve the functions of our products and/or services and allow users to use the services they need normally, including: (A) sharing corresponding transaction order information and payment amount information with third-party payment institutions providing payment services; (B) sharing order information with third-party merchants and logistics service providers on the system platform; (C) sharing the necessary materials for real-name authentication with real-name authentication service providers; (D) other necessary sharing with suppliers, service providers, and business partners related to our services/functions.
(2) Necessary sharing with some of our partners. For the smooth conduct of necessary/reasonable business, to meet users' requirements, fulfill our obligations in relevant user agreements or this Policy, exercise our rights, or comply with legal provisions, we may need to share users' information with some partners, including: (A) sharing log information and device information with partners providing data services (including online advertising monitoring, data statistics, data analysis, etc.); (B) sharing statistical data on users' product usage (such as crashes, flashbacks) with partners providing product analysis services (including application crash analysis, network performance analysis, domain name resolution optimization); (C) sharing users' relevant information (including device information) with partners providing marketing services (including advertising placement, marketing); (D) sharing statistical information that cannot identify personal identity with partners who entrust us to promote, such as how many people viewed their promotional information or purchased goods after seeing the information, to help them understand their audience or customers; (E) other necessary sharing with some of our partners.
(3) Necessary sharing with our affiliates. To facilitate us in providing users with consistent services based on a unified account system and to facilitate users' unified management, personalized recommendations, and ensure system and account security, users' personal information may be shared between us and our affiliates, including: (A) to help users save time and simplify the operation process, users do not need to register repeatedly after registering our mobile account/email account to log in to some individual services, and users' account-related information will be shared within our and our affiliates' products; (B) to provide users with consistent and personalized browsing, advertising, and other service experiences in our and our affiliates' products and/or services, users acknowledge and agree that users' account information, device information, and relevant browsing data reflecting users' usage habits and preferences may be shared with our affiliates.
(4) Achieving other purposes described in the first section of this Policy, "How We Collect and Use Personal Information."
(5) Fulfilling our obligations and exercising our rights in this Policy or other agreements reached with users.
(6) Within the scope permitted by laws and regulations, to comply with the law, protect the interests, property, or safety of us and our affiliates or partners, users, or other system users or the public from harm, such as to prevent fraud and other illegal activities and reduce credit risks, we may exchange information with other companies and organizations. However, this does not include selling, renting, sharing, or otherwise disclosing information for profit in violation of the commitments made in this Policy.
(7) Providing users' information upon users' legal requests or with users' authorized consent.
(8) Providing users' information upon the legal request of users' guardians.
(9) Providing information based on the individual service agreement signed with users (including online signed electronic agreements and corresponding platform rules) or other legal documents.
(10) Providing information based on academic research.
(11) Providing information based on the public interest in compliance with laws and regulations.
We will only share users' personal information for legitimate, proper, necessary, specific, and clear purposes. We will sign strict confidentiality agreements with companies, organizations, and individuals with whom we share personal information, requiring them to handle information according to our instructions, this Policy, and any other relevant confidentiality and security measures.
2. Transfer
(1) As our business continues to develop, we may engage in mergers, acquisitions, asset transfers, or similar transactions, and users' information may be transferred as part of such transactions. We will require the new company or organization holding users' personal information to continue to be bound by this Policy; otherwise, we will require the company or organization to seek users' authorization and consent again.
(2) With users' explicit consent, we will transfer users' personal information to third parties.
3. Disclosure
We will only disclose users' personal information under the following circumstances and with industry-standard security measures:
(1) Disclosing information specified by users in the manner explicitly agreed upon by users.
(2) Disclosing users' information as required by laws, regulations, mandatory administrative enforcement, or judicial requirements. Under the premise of complying with laws and regulations, when we receive the above disclosure requests, we will require the recipient to provide corresponding legal documents, such as subpoenas or investigation letters. We believe that the information requested should be as transparent as possible within the legal scope. We carefully review all requests to ensure they have a legal basis and are limited to data that law enforcement agencies have a legal right to obtain for specific investigative purposes.
4. Exceptions to Obtaining Authorized Consent for Sharing, Transferring, and Disclosing Information
The following situations do not require users' authorized consent to share, transfer, or disclose users' information:
(1) Directly related to national security and national defense security;
(2) Directly related to public safety, public health, and significant public interests;
(3) Directly related to criminal investigation, prosecution, trial, and judgment execution;
(4) For the purpose of safeguarding users' or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain the individual's consent;
(5) Users disclose information to the public themselves;
(6) Information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, etc.;
(7) Related to our performance of legal obligations.
According to legal provisions, sharing, transferring, and disclosing de-identified personal information, ensuring that data recipients cannot re-identify the information subject, is not considered external sharing, transferring, and public disclosure of personal information. The storage and processing of such data do not require separate notification and consent from users.
IV. How We Store and Protect Personal Information
1. Storage of Personal Information
Except as otherwise provided by laws, regulations, or regulatory authorities, we will only store users' personal information for the shortest period necessary to achieve the purposes described in this Policy. 。If we terminate services or operations, we will promptly stop collecting users' personal information and comply with relevant legal requirements to notify users in advance. After terminating services or operations, we will delete or anonymize users' personal information, except as otherwise provided by laws, regulations, or regulatory authorities.
The personal information collected and generated during our operations within the People's Republic of China is stored in China, except for the following circumstances:
(1) Explicit provisions in laws and regulations;
(2) Obtaining users' authorized consent;
(3) Users' use of system services involves cross-border, and we need to provide users' personal information abroad.
For the above circumstances, we will ensure compliance with national laws, regulations, and relevant regulatory requirements and provide sufficient protection for users' personal information.
2. Protection of Personal Information
We highly value information security, have established a dedicated security team, and take all reasonable and feasible measures to protect users' personal information:
(1) Data Security Technical Measures
- We adopt industry-standard security measures, including establishing reasonable institutional norms and security technologies, to prevent unauthorized access, use, modification, and damage or loss of users' personal information.
- Our services use various encryption technologies, such as SSL, to encrypt and store users' personal information and isolate it through isolation technology to protect users' personal information
- When using personal information, such as information display and information association calculation, we use various data desensitization technologies to enhance the security of information in use.
- We also use strict data access control and multiple identity
(2) Other Security Measures We Take to Protect Personal Information
We have an industry-leading data security management system centered around data and covering the data lifecycle, enhancing the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We manage and regulate the storage and use of personal information by establishing data classification and grading systems, data security management norms, and data security development norms.
We conduct comprehensive security control over data through confidentiality agreements with information contacts, monitoring, and auditing mechanisms.
We also hold security and privacy protection training courses to enhance employees' security awareness and understanding of personal information protection policies and related procedures.
(3) We only allow employees and partners who need to know this information to access users' personal information and have set strict access permission controls and monitoring mechanisms for this purpose. We also require all personnel who may come into contact with users' personal information to fulfill corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or termination of the cooperation relationship.
(4) The internet is not an absolutely secure environment, and we recommend that users use complex passwords and pay attention to protecting their information security. When communicating with third parties or purchasing goods and services through the System Services, users inevitably need to disclose their information to the transaction counterpart or potential transaction counterpart, such as contact information or postal addresses. Please protect your information properly and only provide it to others when necessary.
(5) The internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of users' personal information sent to us. If our physical, technical, or management protective facilities are damaged, leading to unauthorized access, public disclosure, tampering, or destruction of personal information, resulting in damage to users' legitimate rights and interests, we will bear corresponding legal responsibilities.
(6) Handling Security Incidents
To address possible risks such as personal information leakage, damage, and loss, we have formulated multiple systems that clarify the classification and grading standards and corresponding handling procedures for security incidents and security vulnerabilities. We have also established an emergency response team for security incidents, which, according to the requirements of security incident handling norms, initiates security plans for different security incidents, conducts loss prevention, analysis, positioning, formulates remedial measures, and cooperates with relevant departments for tracing and combating. We also regularly organize internal training and emergency drills to ensure that our relevant staff master corresponding emergency handling strategies and procedures.
In the unfortunate event of an information security incident, we will promptly inform users according to the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions for users to prevent and reduce risks independently, and remedial measures for users. We will also promptly inform users of the relevant situation of the incident by email, letter, phone, push notification, etc. When it is difficult to inform the information subjects one by one, we will take reasonable and effective ways to publish announcements. At the same time, we will proactively report the handling of information security incidents to regulatory authorities as required.
Please understand that due to technical limitations and risk prevention limitations, even if we have tried to strengthen security measures, we cannot always guarantee 100% information security. Users need to understand that the systems and communication networks used to access the System Services may have problems due to circumstances beyond our control.
Please properly keep your account, password, and other identity elements. When using the System Services, we will identify users through their account, password, and other identity elements. If users disclose the aforementioned information, they may suffer losses and may be adversely affected. If users find that their account, password, and/or other identity elements may or have been disclosed, please contact us immediately so that we can take corresponding measures in time to avoid or reduce related losses.
V. How to Manage Users' Personal Information
1. Access, Update, and Deletion
We encourage users to update and modify personal information to make it more accurate and effective.
If users want to inquire, modify, or delete some information, please log in to the system account and the relevant function pages of each individual service. We provide users with relevant operation guides and settings. For information collected through COOKIES or similar technologies, we also provide a choice mechanism for users as explained in the second section of this Policy, "How We Use COOKIES or Similar Technologies."
Users can also contact us through the feedback channels listed in the "Contact Us" section of this Policy . We will take appropriate technical means or contact channels to enable users to access, update, and delete their personal information or other information provided when using the System Services, except as otherwise provided by laws and regulations.
Except as otherwise provided by laws and regulations, when users correct or delete personal information, we may not immediately correct or delete the corresponding information from the backup system but will correct or delete this information during the backup update.
2. Public Disclosure and Sharing
Many of our services allow users to publicly share their relevant information not only with their social networks but also with all users using the service, such as information uploaded or published by users in the System Services, responses to information uploaded or published by others, information uploaded or published by users in public areas visible to unspecified users through email or the System Services, and location data and log information related to such information. As long as users do not delete the publicly disclosed or shared information, the relevant information may remain in the public domain; even if the shared information is deleted, the relevant information may still be independently cached, copied, or stored by other users or third parties not under our control, or kept in the public domain by other users or such third parties. If users disclose or share information through the above channels, resulting in the leakage of users' information, we are not responsible. Therefore, we remind and ask users to carefully consider whether to disclose or share their information through the above channels.
3. Account Cancellation
We currently do not provide a public user account cancellation method.
Users can contact us through the feedback channels listed in the "Contact Us" section of this Policy . After verifying users' identities and explaining the necessity of account cancellation, combined with the data generated in the System Services, we will complete the cancellation operation after verifying that the cancellation conditions are met.
After users' accounts are canceled, we will stop providing all or part of the System Services to users and, according to users' requirements, delete users' personal information or anonymize it, except as otherwise provided by laws and regulations.
4.Changing the Scope of Users' Authorized
Users can always choose whether to disclose personal information to us. Some personal information is necessary to use the System Services, but most other information is provided at users' discretion. Users can change the scope of their authorization for us to continue collecting information or withdraw their authorization by deleting information, turning off device functions, etc.
After withdrawing authorization, we cannot continue to provide users with the services corresponding to the withdrawn authorization and will no longer process users' corresponding information. However, users' decision to withdraw authorization will not affect the information processing previously conducted based on users' authorization.
5. Obtaining Copies of Personal Information
If users need a copy of their personal information, they can contact us through the feedback channels listed in the "Contact Us" section of this Policy . After verifying users' identities, we will provide users with a copy of their personal information in our services (including basic information and identity information), except as otherwise provided by laws and regulations or this Policy.
6. Responding to Users' Requests
To ensure security, users may need to provide a written request or prove their identity in other ways. We may first require users to verify their identity before processing users' requests. For reasonable requests from users, we generally do not charge fees, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee as appropriate. For those requests that are unreasonably repetitive, require excessive technical means (for example, need to develop new systems or fundamentally change current practices), bring risks to others' legitimate rights and interests, or are very impractical (for example, involving information stored on backup tapes), we may refuse them.
In the following situations, we will not be able to respond to users' requests:
(1)Related to our performance of legal obligations;
(2)Directly related to national security and national defense security;
(3)Directly related to public safety, public health, and significant public interests;
(4)Directly related to criminal investigation, prosecution, trial, and judgment execution;
(5) We have sufficient evidence to show that users have subjective malice or abuse of rights;
(6) For the purpose of safeguarding users' or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain the individual's consent;
(7)Responding to users' requests will cause serious damage to users' or other individuals' or organizations' legitimate rights and interests;
(8) Involving trade secrets.
VI. Third-Party Services
The System Services may access or link to social media or other services (including websites or other service forms) provided by third parties. Including:
1. Users can use the "Share" button to share certain content from the System Services to third-party services. These functions may collect users' information (including users' log information) and may install COOKIES on users' devices to function properly;
2. We provide links to third-party services or websites through advertisements or other ways in our services;
Other situations where third-party services are accessed. For example,to achieve the purposes stated in this Policy, we may access SDKs or other similar applications (such as embedded code, plugins, etc.) provided by third-party service providers to provide users with better customer service and user experience. Currently, the main types of third-party service providers we access include:
(1) For advertising-related services, including ad display, ad data monitoring/statistics, etc.;
(2) For message push functions, including mobile phone manufacturer push notifications, specific event reminders, personalized content recommendations, etc.;
(3) For payment-related services, including order payment, transaction behavior verification, income settlement, payment information summary statistics, etc.;
(4) For obtaining device location permissions, collecting device information and log information with users' consent;
(5) For third-party authorization services, including third-party account login, sharing relevant content to third-party products, etc.;
(6) For supporting product function modules, including online live streaming, video playback, voice recognition, AR, intelligent customer service, bullet screen playback, content storage, etc.;
(7) For optimizing product performance, including improving hardware network capabilities, reducing server costs, hotfixing functions, etc.;
(8) For account security and product reinforcement-related services, including network monitoring, domain name resolution, anti-hijacking, anti-spam and anti-cheating, encryption and decryption services, etc
Some third-party SDKs or similar applications we access may collect users' personal information. If users use such services provided by third parties in our services, users agree that they will directly collect and process users' information. We will evaluate the legality, legitimacy, and necessity of such third-party services collecting personal information, require these third parties to take protective measures for users' personal information, and strictly comply with relevant laws, regulations, and regulatory requirements. Users can click on the "Third-Party SDK Directory" ,to understand the basic situation of the main third-party SDKs we access. The situation of third-party SDKs accessed by each individual service may be different. If users need to know the detailed situation of third-party SDKs accessed by specific individual services, please go to the corresponding service page and check the specific terms and related pages of our individual services. Users can also choose to "Contact Us" section of this Policy , and we will respond as soon as possible.
The above third-party social media or other services are operated by the relevant third parties. Users' use of such third-party social media services or other services (including any information provided by users to such third parties) is subject to the third parties' own service terms and information protection statements (not this Policy), and users need to read their terms carefully. This Policy only applies to the personal information we collect and does not apply to any services provided by third parties or third parties' information usage rules. If users find that these third-party social media or other services are risky, it is recommended that users terminate related operations to protect their legitimate rights and interests and contact us in time.
VII. Protection of Minors
We recommend that any minors participating in online activities obtain prior consent from their parents or other guardians (hereinafter referred to as "guardians"). We will protect the relevant information of minors according to the provisions of relevant national laws and regulations.
We encourage guardians to guide minors in using the System Services.If users are minors under the age of fourteen, please notify your guardians to read and accept our Policy together and seek their consent and guidance before using the System Services and submitting personal information.
VIII. Revisions and Notifications
To provide users with better services, we may modify the terms of this Policy in a timely manner according to the updates of the System Services and relevant legal requirements. Such modifications constitute part of this Policy. We will publish any changes to this Policy on this page. For major changes, we will also provide more prominent notifications (including website announcements, push notifications, pop-up prompts, or other methods). Major changes referred to in this Policy include but are not limited to:
1. Significant changes in our service model, such as the purpose of processing personal information, the type of personal information processed, and the way personal information is used;
2. Significant changes in our ownership structure, such as changes caused by business adjustments, bankruptcy mergers, etc.;
3. Major changes in the main objects of personal information sharing, transfer, or public disclosure;
4. Significant changes in users' rights to participate in personal information processing and how they exercise them;
5. Significant changes in the department responsible for handling personal information security, contact methods, and complaint channels;
6. Other important or potentially serious situations that affect users' personal rights and interests.
Any modifications we make will prioritize users' satisfaction. We encourage users to review our privacy policy each time they use the System Services.
IX. How to Contact Us
We have established a dedicated personal information protection department that will protect users' personal information according to this Policy. If users have any complaints and reports about network information security or any questions, opinions, or suggestions about this Policy, privacy measures, or users' information-related matters, please contact our personal information protection officer by sending an email to cuckoo@lingxn.com.
Generally, we will process users' questions, opinions, or suggestions within fifteen working days after receiving them and verifying users' identities. If users are not satisfied with our handling, they can also complain or report to the department responsible for personal information protection.tacts, monitoring, and auditing mechanisms.