Privacy Policy
[Updated March 14, 2024]
[Effective March 14, 2024]
Introduction
This Privacy Policy ("Policy") applies to all products and services provided by Shenzhen TIZE Technology Co., Ltd. (hereinafter the same, and referred to as "TIZE" or "we" for short). Where a specific product/service has a separate privacy policy that conflicts with this Policy, the former shall prevail.
We value the protection of our users' personal information, and we may use information about you with your permission when you use our products and services. We would like to explain to you through this policy what information you provide, how you provide it, the scope of the provision, the purposes for which you provide such information, and how we and you can keep such information secure. Please read this policy (especially the bolded text) carefully and make sure you understand our rules for handling your personal information before using all of our products and services. If you have any questions about this Privacy Policy, you may contact us for advice. If you do not agree with any of the terms of this Privacy Policy, you should immediately stop using our products and services. If you choose to use or continue to use our products and services after we have updated this Privacy Policy, you are deemed to have consented to our use, retention and sharing of your relevant information in accordance with this Policy.
I. Personal Information You May Be Required to Provide
II. Purpose and rules of use of your personal information
III. Sharing, transfer and disclosure of personal information
IV. Cookies and similar technologies
V. Our information security protection
VI. Management of your personal information
VII. Protection of minors' information
VIII. Where and for how long personal information is stored
IX. Scope of application of this policy
X. Revision of this policy and application of law
XI. Definition of keywords
I. Personal Information You May Be Required to Provide
The content of this policy on personal information and personal sensitive information is from the provisions of GB/T35273 "Personal Information Security Specification", and the definitions are consistent with the definitions of GB/T35273 "Personal Information Security Specification". For sensitive personal information, we use "bold" writing to provide special reminders, and we hope that you pay special attention when you read it.
The main sources of personal information you provide are: information you provide to us voluntarily, information you provide in the course of using our products or services, and information about you shared by third parties. We will use your personal information for the purpose of the following product functions, if you do not provide the relevant information or do not agree to our use of the relevant information, you may not be able to register as our users or enjoy some of the services we provide, or not achieve good service results.
1. Information provided directly by you
1.1 In order to provide you with account registration, login functions and services, you may be required to provide the following account registration information:
SMS Verification Login: If you choose this way to login, you need to enter your cell phone number and the corresponding verification code, and you can login only after you have passed the verification. We will use your cell phone number for account management and login verification.
Account Login: You need to enter your username, email or cell phone number and password to verify your identity and then login. If you don't have a Tlife APP account, you can register your account by email or cell phone number and create a password. When you use email to register, we will verify your identity through email; when you use cell phone number to register, we will send SMS verification code to your cell phone number, you need to provide us with SMS verification code to verify your identity before you can register successfully.
Third Party Login: You can use third party accounts to login, mainly including Google, Apple, WeChat. When you authorize the use of the aforementioned third party accounts to login, we will use avatars, nicknames, and other information shared from the third party accounts that you agree to grant in the third party authorization login screen.
The purpose of using the aforementioned account information is: (1) to better provide you with services through account management, by logging in to your account, you can view some of the information you use our products or services; after you change your device, by logging in to your account, you can continue to view and use the relevant information you have synchronized, and will not lose data due to the change of device. (2) If you provide a real and effective cell phone number, WeChat account or other third-party account for binding, when you’ve lost your registered account, forgot the password, you can conveniently retrieve the account and password. (3) In order to comply with the relevant laws and regulations of real-name registration requirements, we need you through the cell phone number or ID card number real-name authentication before you can use some of the services.
1.2 Information you upload when using our products and services or information you provide to us when attending events organized by us.
It mainly includes: personal contact, contact address and contact information that you provide to us for the purpose of sending you products when you use our products to purchase goods; and other information uploaded by you when you use our products and services, subject to the privacy policy of the specific product or service. The purpose of the use of the aforementioned information is for the realization of the corresponding specific functions, if you do not provide the relevant information, the corresponding functions may not be realized.
1.3 Information you submit through our customer service.
You may provide us with feedback, complaints, grievances or inquiries about our products or services through the feedback channels within our specific products or services. For the sake of your account and system security, we may need you to provide your account number when you register/login in order to verify your user identity. During the verification process, you may also be required to provide us with appropriate supporting materials, your contact information, so that we can contact you and help you to solve the problem, or record the handling of the relevant issues and results. In addition, the system may record the communication between you and the customer service record, in order to better help you solve the problem and improve the quality of customer service. If you do not provide the above information, we may not be able to provide you with timely feedback on the results of the consultation, but does not affect your normal use of our products or services.
If we need to use certain personal and sensitive information provided by you (including address book, friend list, personal biometric information, whereabouts, precise location information, health and physiological information, personal information of children under 14 years of age (including), etc.), we will notify you in a conspicuous manner and obtain your consent.
We will not use Personal Information or ask for permission to use Personal Information without your consent. If you choose not to provide such information, you may not be able to use the corresponding features properly, but it will not affect your ability to use other features of the Services. After you have indicated that you do not agree, we cannot frequently prompt you to provide it, or turn on permissions without your permission. After you refuse, you will no longer be prompted for authorization when you do not use the relevant function. If you voluntarily provide us with your personal sensitive information, you consent to our handling of your personal sensitive information for the purposes and in the manner described in this Policy. If we use the personal information of minors under the age of 14, we will seek the consent of their guardians.
2. information we obtain when you use the service
2.1 Equipment information
Device Information. In order to ensure that the location, pedometer and other basic functional services and devices to carry out the necessary adaptation and provide security services, you are using our products or services, we may use you to provide the necessary types of information. These include device name, device model, device identification code (mainly including the International Mobile Equipment Identity Code IMEI, Android ID, open ID, network device hardware MAC address, operating system and application version, language settings, resolution, service provider network ID (PLMN) related information.
The purpose of using this information is to provide you with products and/or services and to ensure our compliance with applicable laws. We use this information to ensure network security or operational safety, to help us with bug analysis, to ensure your normal use of our products and services, to improve and optimize our product experience, and to ensure the security of your account. This information will be used as such:
● Communicate with you about your device, the Service, or any general inquiries (e.g., updates, customer inquiry support, message notifications), etc.
● Analyze and develop statistical information relating to the use of our products and services in order to better improve our products and services.
● Store and maintain information about you for the purposes of operating our business or complying with legal obligations.
More detailed information about how we use your information, which may contain personal information, is provided below:
● Verify device uniqueness. When you bind another hardware for the first time, the device unique identifier, firmware version of that hardware will be used to verify device uniqueness. The above information will also be used in cases such as updating the system or software, restoring factory settings, and so on.
● Determining whether a mobile terminal can run with our app: Currently, mobile terminal applications can only run on specific operating systems and specific mobile terminals. For this reason, we need to detect your mobile terminal information.
● Provision of Location-Based Services: When you use location-based program services or features, we use the geolocation information you provide on your device and/or phone to enable online or real-time (reported every 20 seconds) viewing of your current location and footprints; you can view the distance between your current location and the location of your device; and the geolocation information can be used to show you the current weather on your device. The geolocation information can also be used to show you the current weather on your device. We will send you a notification when your device enters or leaves a secure area that you have set up. The Wi-Fi information you provide will also be used to improve the location accuracy of your device.
● Pedometer: You provide pedometer information to show you details of your and your device's exercise, which you can view in a daily or weekly view; you can also view your device's rank in terms of the number of steps it has taken. To do this, you may need to provide pedometer information, the height and weight of the device user (for calorie calculation), and location information.
● Aggregate User Feedback: The feedback you choose to provide is extremely valuable in helping to improve our services. In order to follow up on the feedback you provide, we may use the personal information you provide to contact you and keep a record of it.
Please note that this product comes with an auto-answer function and we only recommend that you use this function if you are guarding the user of the device. Please make sure that you respect and do not violate the rights of others when using this feature and that you are aware of the possible legal consequences of using it in other scenarios.
2.2 Communication, call related information:
With your permission we use your device's network operator, SIM card number (watch number), mobile signal value, cell phone call status, cell phone caller ID, address book ("family members list" including nicknames of friends, watch number, friends list), call log, call whitelist switch, chat messages (voice of communication between cell phone and device), SMS whitelist switch. communication between the phone and the device), and SMS whitelist switch. For example, you can make a call by dialing the SIM card number of your device; you can also set up a call whitelist to protect the safety of using your device; we use your communication information, address book information, nicknames, and avatars to provide you with the service of communication between your device and your cell phone; and you can listen to your device in one way through the App's Auto Answer function to hear your device's surroundings at any time. Please rest assured that your communication information will be encrypted and stored in the server; we will not read the content of your communication information.
When it comes to version changes or changes in privacy permissions, the user will be prompted again at runtime. Except as expressly provided in this policy, we will not provide your device information to any third party. However, we cannot guarantee that other third parties will not obtain your device information through other means and combine it with other information to identify you personally, and you shall recover any damages caused by this from the third party. The above equipment information is the basic information used for the provision of services. If you do not want the equipment information to be used by us, we may not be able to provide you with the corresponding services.
2.3 Location information (to determine that the actual use of the app is not out of range)
Location information means information about your location that is used when you turn on your device's location function and use our location-based services. For example, when you turn on the positioning function of your device and use our map services, geo-location synchronization services and other services related to location information, you may need to allow us to aggregate and process information about your location through GPS, WiFi or other technical means. Tracking and pinpointing information is sensitive personal information and will not be used by our products or services except as necessary for specific product or service features related to location.
If you do not want to be accessed, you can choose to turn off the relevant features in your device or product/service, but this may affect our ability to provide you with the relevant services.
2.4 Log messages
As necessary for the security of the service, your use of our products and services may require that you allow the system to use certain information via cookies or other means and store it in server logs. Such information may include:
(1) Details of the use of our products and services, which may include the search terms you use, click history, the addresses of the pages you visit and your browsing history when using our services; statistical data on user habits, information on the settings used when using our products, the number of times some of the buttons have been used, which are anonymous and which make it impossible to locate a specific user on the basis of the above data.
(2) Device or software information. In addition to the device information described in Section 2.1, you may be required to provide the version number and browser type of the software you use. To ensure the security of your operating environment or as necessary to provide the Services, you may need to provide information about mobile applications and other software you use.
(3) Device event information, including crashes, system activity information, and other related information.
(4) IP address.
3. Information shared or used by other third parties
There are two main scenarios:
In order to provide you with more convenient life services, our products or services may access some third-party services, and the information generated or shared by you when you use the third-party services may mainly involve the following scenarios, and the information shared or used by the third party in the specific product or service shall be subject to the privacy policy of the specific product or service.
(1) Sharing function
When you use the sharing function in our products or services, you need to use the third-party SDK to share information, and the third party will verify your account information in the third party to realize the sharing function. If you do not want the third party to obtain your information, please do not use the sharing function.
(2) Push Notification Service
If we need to provide you with information push notification service through a third party channel, the third party channel needs to obtain your device information beforehand. If you do not want to use the push service, you can turn off the corresponding notification function through the notification center management in "My" settings, but it may affect your access to the push service. The third-party push SDK includes the following
(3) Aurora Push, Aurora Statistics Service
SDK Name: Aurora Push SDK
Service type: used to realize message push (or other push) function
SDK collects personal information Type:
Device identifier (including Android ID, GAID, OAID, UAID, IDFA, AAID), device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name, device storage space), operating system information (including operating system version, system name, system language), network information (including network type, operator information, IP address, WIFI status information), push information logs: necessary personal information for generating desensitized end-user device uniqueness identifiers in the basic business function scenarios of the push service to ensure compatibility and accurate identification of the service on different devices, as well as to understand the situation of the delivery of push information. Device identifier (including IMEI, MAC, IMSI): optional personal information, which is used to generate end-user device uniqueness identifiers in the basic business function scenarios of push services to supplement and improve the accuracy of the unique device identifiers, which in turn improves the accuracy and reach of the pushes; Network information (including SSID, BSSID, WIFI list information, base station information): optional personal information that It is used to determine the fuzzy location information in the basic business function scenario of push service, select the nearest push service node to provide push service, and improve the push reach rate. Location-related information: personal information necessary for geo-fencing and user grouping push extension functions, used to provide refined push in offline scenarios, recommending push content that better meets your needs based on location information; software list information (including software list and software running list information): personal information necessary for user grouping, application self-start and link regulator extension functions: helps you gain insight into the interests and preferences of your end-users, helping you to provide more effective push services for your end-users. It helps you understand your end-users' interests and preferences, and help you provide more suitable push content for your users, and at the same time, optimize the stability of SDK long connection, improve the push delivery rate and application activity, and through the merging of links, to achieve the purpose of power saving and traffic saving for the users.
Link to Aurora Privacy Policy: Aurora Privacy Policy
(4) Glory Vendor Push Service
SDK Name: Honor Vendor Push
Service type: used to realize message push (or other push) function
Type of personal information collected by SDK: device information, basic information of apps
Link to Glory Privacy Policy: Glory Privacy Policy
(5) Huawei Push Service
SDK Name: Huawei Push SDK
Service type: used to implement message push (or other push) functions
Types of personal information collected by the SDK: basic information about the application, device identifiers within the application, hardware information about the device, basic information about the system, and information about system settings.
Link to Huawei Push Privacy Policy: Huawei Push Privacy Policy
(6) OPPO Push Service
SDK Name: OPPO Push SDK
Service type: used to realize message push (or other push) function
Types of personal information collected by SDK: device-related information, information of apps using push service, push SDK version number, network-related information, message sending result, notification bar status, lock screen status.
Link to OPPO Push Privacy Policy: The OPPO Push Privacy Policy
(7) VIVO Push Service
SDK Name: VIVO Push SDK
Service type: used to implement message push (or other push) functions
Types of personal information collected by the SDK: OS version number, application information, device identifiers (such as IMEI number, SIM and IMSI, mobile country code, and mobile network number of Vivo Android devices, etc.), MAC address, mobile operator, language, system settings, and other system, device, and application data.
Link to VIVO Push Privacy Policy: The VIVO Push Privacy Policy
(8) Xiaomi Push Service
SDK Name: Xiaomi Push SDK
Service type: used to realize message push (or other push) function
Type of personal information collected by SDK: device identification (OAID, encrypted Android ID), push message content, device information (device manufacturer, model, attribution, carrier name, etc.), notification bar settings
Link to Xiaomi Push Privacy Policy: The Xiaomi Push Privacy Policy
(9) Meizu Push Service
SDK Name: Meizu Push SDK
Service type: used to realize the function of message push (or other push).
Types of personal information collected by SDK: phone brand, phone model, system version, system language, network status, application package name, application name, application version, application access, and application access.
Link to Meizu Push Privacy Policy: The Meizu Push Privacy Policy
(10) Gaode Map
We introduce AutoNavi Maps to show you your family's footprints on the map and do not use AutoNavi Maps to collect your personal information. In order to realize the basic service functions, it may be necessary to collect relevant personal information from developers on the Gaode Maps open platform. AutoNavi will display the privacy policy to users separately and implement the collection and use of information in accordance with the agreement of the privacy policy. The privacy policy of AutoNavi can be found at "AutoNavi Privacy Policy".
(11) Tencent Bugly Service
SDK Name: Tencent Bugly SDK
Service type: provide users with professional exception reporting and operation statistics
Types of personal information collected by SDK: device information (device model, brand, system version, api level, vendor system version, cpu architecture type), network type
Link to Tencent Bugly Privacy Policy: Tencent Bugly Privacy Policy
(12) Mob SDK Service
SDK Name: MobSDK
Service Type: Send SMS verification code to users
Type of Personal Information Collected by SDK: Obtain one or more of the following device identifiers: iOS Advertising Identifier (IDFA), International Mobile Equipment Identifier (IMEI), Anonymous Equipment Identifier (OAID), International Mobile Subscriber Identifier (IMSI), SIM Card Identifier (ICCID) (collected only in Second Check products), SIM Card Serial Number (collected only for versions prior to March 2022), Android ID (collected only for versions prior to March 2022), device Serial Number Serial Number (only collected for versions prior to March 2022), Android ID (only collected for versions prior to March 2022), device serial number Serial Number
Link to Mob SDK Privacy Policy: Mob SDK Privacy Policy
(13) WeChat Open Platform SDK Service
SDK Name: WeChat Open Platform SDK
Service type: realize WeChat authorization login
SDK collects device identification information
Link to WeChat Open Platform SDK Privacy Policy: WeChat Open Platform SDK Privacy Policy
4. Device privilege invocation
In the process of providing services, in order to ensure that you can normally use the product or service functions, we will apply to the system for some of your equipment rights, you can choose to allow or prohibit the application of the relevant rights. You can also cancel the authorization at any time in the system settings, you cancel the authorization will lead to your inability to use the relevant business functions, but will not lead to your inability to use other functions.
Our products or services may require you to authorize the system permissions mainly involves the following categories, specific to the content of the privacy policy of each product or service:
Device Authority Business
Function Whether the authorization can be turned off
stockpile Browse search history, download files Yes
Read device information Make the necessary adaptations to the equipment to ensure the safety of the product or service used. Yes
placement Location services, weather services, geo-synchronization Yes
at the opportune moment Upload avatar Yes
microphones voice input Yes
II. Purpose of Personal Information and Rules of Use
(i) We mainly use the information for the following purposes:
1. Security: For authentication, customer service, security, archiving and backup purposes when we provide products and services to ensure the security of the products and services we provide to you.
2. Software certification or management software upgrade.
3. According to laws and regulations, your information will be used in the following cases, in which case your authorization is not required:
(1) Related to national security and national defense security;
(2) Related to public safety, public health, and significant public interest;
(3) In connection with the investigation, prosecution, trial and enforcement of sentences for crimes;
(4) When it is difficult to obtain the consent of the subject of the personal information or other individuals for the purpose of safeguarding their important legitimate rights and interests, such as the life or property of the subject of the personal information or other individuals;
(5) Necessary for maintaining the safe and stable operation of the products and/or services provided, including the detection and disposal of malfunctions of the products and/or services;
(6) Necessary for legitimate news reporting;
(7) When an academic research organization carries out statistical or academic research necessary for the public interest and provides the results of academic research or descriptions to the public, it de-identifies the personal information contained in the results;
(8) Other cases stipulated by laws and regulations.
4. Other uses as agreed by you.
(ii) Rules for the use of your personal information
1. We may use the information you provide in accordance with this Privacy Policy and to fulfill the functionality of our products and/or services.
2. The personal information you provide will be de-identified by technical means, and the de-identified information will not be able to identify the subject. Please understand and agree that in this case we have the right to use the de-identified information and the right to analyze and commercially exploit the user database without disclosing your personal information.
3. Please note that all personal information you provide when using our products and/or services will continue to be licensed to us for the duration of your use of our products and/or services, unless you delete it or reject it through your system settings. When you cancel your account, we will permanently stop using and delete your personal information. Your account will not be recoverable once canceled, so please exercise caution.
4. We may compile statistics on the use of our products and/or services and may share these statistics with the public or third parties to show trends in the overall use of our products and/or services. However, these statistics do not contain any identifying information about you.
5. When we display your personal information, we will desensitize your information to protect the security of your information using methods including content replacement and anonymous processing.
6. When we are going to use your personal information for purposes other than those stated in this policy, or for other purposes based on a specific purpose, we will ask for your prior consent before using it.
(iii) Information we may send you
1. Information push
When you use our Services, we will send you push notifications related to your smart device. You can also choose to turn off message notifications on your phone by following our relevant instructions.
III. Sharing, transfer and disclosure of personal information
(i) Sharing of information
1. We will not share your personal information with any companies, organizations and individuals outside of us, except in the following cases:
(1) Obtain your prior express consent or authorization;
(2) Provided in accordance with applicable laws and regulations, the requirements of legal proceedings, and where necessary for mandatory administrative or judicial requirements;
(3) To the extent permitted by law or regulation, necessary to protect us or our partners, you or other our users or the public from harm to their interests, property or safety;
(4) Only by sharing your information can we realize the core functionality of our products and/or services or provide the services you need;
(5) Handling disputes or controversies between you and others for you at your request;
(6) Used on the basis of academic research;
(7) Use in the public interest in accordance with laws and regulations.
2. For the purposes stated in this Policy only in advance, some of our services will be jointly provided by us and third-party partners working together through data interfaces. We may share certain information about you with our partners to provide better customer service and user experience. We will only share your personal information for purposes that are lawful, legitimate, necessary, specific, and unambiguous, and will only share personal information that is necessary to provide the service. Our partners are not authorized to use the personal information they share for purposes other than those related to their products or services. Currently, such third-party partners include: software service providers, smart device providers and system service providers, and partners related to product functionality.
3. Exchanging information with other companies and organizations in order to comply with the law, enforce or apply our conditions of use and other agreements, or to protect our rights, your rights, or the rights of other our customers and their property or safety, for example, in order to prevent unlawful activities such as fraud and to reduce credit risk. However, this does not include personal information that is sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this Privacy Policy.
4. Companies, organizations and individuals with whom we share personal information will be required to comply with confidentiality covenants requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
(ii) Transfer of information
We will not transfer your personal information to any company, organization, or individual, except in the following cases:
1. Obtain your prior express consent or authorization;
2. Provided in accordance with applicable laws and regulations, the requirements of legal proceedings, and where required by mandatory administrative or judicial requirements;
3. In line with the relevant agreements signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents provided;
4. In the event of a merger, acquisition, asset transfer or similar transaction involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy, or else we will require that company or organization to seek authorization from you again.
(iii) Disclosure of information
We will only publicly disclose your personal information under the following circumstances and with industry-standard security measures in place:
1. You use the sharing function;
2. If we are required to provide your personal information by law, regulation, mandatory administrative enforcement or judicial request, we may publicly disclose your personal information based on the type of personal information requested and the manner of disclosure. Subject to laws and regulations, when we receive a request for such disclosure, we will require that legal documentation must be produced. All requests are carefully scrutinized to ensure that they have a legitimate basis and are limited to data that law enforcement authorities have a legitimate right to obtain for specific investigative purposes;
3. In case of emergency, in order to protect the legitimate rights and interests of you, us and other users or public safety and interests;
4. comply with the provisions of the user agreements or other similar agreements for our relevant products and services.
IV. Cookies and similar technologies
1.What is Cookie
Cookie is a neutral technology that allows a web server to store or read data from a client.Cookie file is a file that stores information about a user's visit to a web site in the format of .tex.The content of the cookie is usually encrypted, and secure cookie technology will provide users with more convenient services when surfing the Internet.
2. The purpose of our use of cookies
Cookies are important to enhance the user's experience on the web and we generally use cookies for the following purposes:
(1) Authentication: Cookies may notify us when you access our services to enable us to verify your identity and ensure the security of your account.
(2) Security: Cookies help us safeguard the security of our data and services and detect cheating, hacking, fraud and other behaviors against our products and services.
(3) Improve efficiency: Cookies can avoid unnecessary server load, improve service efficiency and save resources.
(4) Analysis and research: Cookies can help us understand and improve our products and services, and provide reference data for the development of new functions or new products.
3. How to manage cookies
Most devices (e.g., using mobile applications) and browsers (e.g., using web applications and pages) allow you to change cookie settings. These settings are usually located in the Options or Preferences menu of your browser and can be managed by you. You can also use the "Help" option in your browser for more detailed information. Please note, however, that if cookies are deactivated, you may not be able to enjoy the best possible experience with the Services and some of the Services may not function properly.
V. Our information security protection
1. Data Security Technical Measures: We will adopt security measures in line with industry standards, including the establishment of a reasonable system of norms, security technology to prevent your personal information from unauthorized access to use, modify, to avoid damage or loss of data; we will use security technology and procedures to monitor and record the network operating status, network security events, and take the necessary technical measures to safeguard the security of the network, in order to prevent the loss, improper use, unauthorized access to or disclosure of information. We will use security technologies and procedures to monitor and record network operation status and network security events, and take necessary technical measures to safeguard network security to prevent loss, improper use, unauthorized access or disclosure of information. In some services, we will use encryption technology, anonymization and other means to protect the personal information you provide. However, please understand that due to technological limitations and the possibility of malicious means, in the Internet industry, even if every effort is made to enhance security measures, it is not always possible to ensure that information is 100% secure. You should be aware that the systems and communication networks you use to access our products and services may experience problems due to factors beyond our control.
2. We allow access to personal information only to those employees and partners who have a need to know such information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all persons who may have access to your personal information to fulfill the corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or suspension of the relationship with us.
3. We will take all reasonably practicable steps to ensure that unrelated personal information is not used. We will only retain your personal information for as long as is necessary to achieve the purposes set out in this policy, unless an extension of the retention period is required or permitted by law.
4. The content and information you provide, upload or post when using our products and services may disclose your personal information. You need to carefully consider whether to disclose relevant personal information when using our products and services. In some cases, you may be able to control the range of users who are authorized to view the information you share through the privacy settings of some of our products and services.
5. The Internet is not an absolutely secure environment, and the way of communication with other users such as e-mail, instant messaging, social software, etc. can not be sure whether it is fully encrypted or not, we recommend that you use complex passwords when using such tools and pay attention to the protection of your personal information security. As you inform others of your user password, share your registered account with others or otherwise due to your personal custody is not good, which leads to any personal data leakage, loss, theft or tampering and other resulting liabilities and losses, you should bear the responsibility.
6. Security Incident Handling: In order to cope with the risks that may arise from the leakage, destruction and loss of personal information, we have set up a specialized emergency response team, which, in accordance with the requirements of the company's specifications for the handling of security incidents, will activate the security plan for different security incidents, carry out stop-loss, analyze, formulate remedial measures, and join hands with the relevant departments to trace back and combat the incidents. At the same time, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with the incident, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you, etc. We will also inform you in a timely manner of the incident related information. At the same time, we will promptly inform you of the situation related to the incident by email, letter, phone call, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to make a public announcement. At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
VI. Management of your personal information
1. You have the right to access, correct and delete your personal information; however, the deletion or modification of the relevant information may affect your use of the relevant products or services or result in the inability to realize some of the functions. The specific path for accessing, correcting and deleting is generally as follows: after entering a specific product, click on "Me" and log in to access, view, modify or delete the information in your account. The extent and manner in which you can access, correct or delete your personal information will depend primarily on the specific product or service you are using.
2. You have the right to change the scope of your authorization or withdraw your authorization; you can change the scope of your authorization for us to continue to use your personal information or withdraw your authorization by (1) deleting the information, (2) turning off the function of the device, or (3) setting privacy settings on the website of the specific product or in the "Settings" of the software. You may also revoke your authorization for us to continue to use your personal information by canceling your account. Please understand that each business function requires some basic personal information in order to be completed, and when you withdraw your consent or authorization, we will not be able to continue to provide you with the services for which you have withdrawn your consent or authorization. However, your decision to withdraw your consent or authorization will not affect the processing of personal information that was previously based on your authorization.
3. Account Cancellation: You can apply for cancellation of the relevant product account through the cancellation methods announced in the specific product or service setting interface or through the contact information listed in Article 9, and we will determine whether the cancellation conditions are met based on your account security status and product line information. After you cancel your account, we will stop providing you with product or service functions related to your account, and will delete or anonymize your personal information, unless otherwise provided by laws and regulations or requested by you.
4. We will take appropriate technical means to ensure that you can inquire, supplement, correct or delete your own personal data, or apply for us to supplement, correct or delete the relevant information through the feedback or complaint channels issued by us for the relevant products or services; we will deal with your application in accordance with the process (e.g., we may require you to provide relevant proof to confirm your identity) after receiving it. Please understand that due to technical limitations, legal or regulatory requirements, we may not be able to fulfill all of your requests, and we will respond to your request within a reasonable period of time.
5. If you are unable to access, correct or delete your personal information, or if you need to access, correct or delete other personal information generated by your use of our products and/or services, or if you believe that we have violated any laws or regulations or agreements with you regarding the use of your personal information, you may contact us through the methods listed in Article IX.
VII. Protection of minors' information
1. We protect the personal information security of minors in accordance with the requirements of our laws and regulations. If you are: (1) a child (please refer to the definition of keywords for details) user, your guardian must read and agree to all the contents of this Agreement and the "Guidelines for the Protection of Children's Privacy" before we provide you with our products or services; (2) a minor user who has reached 14 years of age must be accompanied by your guardian to read all the contents of this Agreement, and we will not provide you with our products or services unless your guardian or you agree to all the contents of this Agreement. We will provide you with our products or services only after the guardian or you agree to the entire contents of this Agreement. If we have evidence that you have violated the above agreement, we have the right to stop providing our products or services.
2. In the case of the use of a minor's personal information with the consent of the guardian, we will only use or publicly disclose the information when permitted by law, with the express consent of the guardian, or when it is necessary for the protection of the minor. If we discover that has used the personal information of a minor under the guardian's custody without obtaining the guardian's prior consent, we will delete the information as soon as possible.
VIII. Where and for how long personal information is stored
1. Place of storage of personal information:
We will store the personal information of our domestic users in the People's Republic of China in accordance with laws and regulations.
2. Duration of storage of personal information:
We will retain your personal information only for the period necessary for the purposes described in this policy and for the time period required by laws and regulations. The specific period is detailed in the individual privacy policy of each product and service, if the specific product and service is not specifically listed, in general, unless otherwise required by laws and regulations, the storage period will be the same as the validity period of your account, if you belong to a non-registered account, the storage period will generally be 6 months. If you are a non-registered account, the storage period is generally 6 months. After the aforementioned storage period, we will delete or anonymize the information in an irrecoverable manner.
However, in the following cases, we may change the length of time personal information is stored due to the need to comply with legal requirements:
To comply with applicable laws and regulations, etc.; to comply with court judgments, rulings or other legal procedures; to comply with the requirements of relevant governmental authorities or legally authorized organizations; to comply with laws and regulations, etc. that we reasonably believe need to be complied with; to implement the relevant service agreements or this Policy, to safeguard the public interest, to protect the personal property safety or other legal rights and interests of our customers, us or our affiliated companies, other users or employees. personal property safety or other legitimate rights and interests of our customers or our affiliates, other users or employees.
In the event that our products or services cease to operate, we will notify you in the form of, including but not limited to, push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time.
IX. Scope of application of this policy
1. This policy applies to all of our products and services. Specific privacy policies for particular products and services will be specified in the usage agreements or separate privacy agreements for the relevant products and services. The privacy terms of those specific products and services form part of this Policy. In the event of any inconsistency between the privacy policy for a particular product or service and this Policy, the privacy policy for that particular product or service will apply.
2. This Policy applies only to information used by us and does not apply to products and services provided by any third party or to third party rules for the use of information, and does not apply to information used by third party products and services (including any third party websites) that you receive through our products and services. If you incur losses as a result of third party products and services, you may claim damages from the third party.
3. If you have any questions about this privacy policy in the use of our products and services, you can contact our specific product or service team through the official feedback channels announced by our related products or services, the contact information of the person in charge of personal information protection, or you can also contact us by dialing +86-136-6227-6543 or sending relevant documents to the registered address of Shenzhen TIZE Technology Co., Ltd. (Room 205, Building 18, Jiatiangang Industrial Zone, Huangtian Community, Hangcheng Sub-district, Bao'an District, Shenzhen).
X. Revision of this policy and application of law
1. We may revise the terms of this Policy from time to time and such revisions form part of this Policy. We will post the revised Policy in a timely manner. By continuing to use our products and services, you agree to be bound by the revised Privacy Policy.
2. The interpretation of this policy and dispute resolution shall be governed by the laws of the People's Republic of China. Any dispute related to this Policy shall be resolved through friendly consultation between the parties; if it cannot be resolved through consultation, you hereby agree to submit the dispute to the People's Court of Bao'an District, Shenzhen. If any court of competent jurisdiction determines or decides that any provision of this Policy is invalid, that provision will be removed from this Policy, and the invalidity of that provision will not affect the validity of the remaining provisions of this Policy. The remaining provisions of this Policy will continue to be enforced.
3. The headings of this policy are designed for ease of reading only and do not affect the meaning or interpretation of any provision of this policy.
XI. Keyword definitions
1. User or You: refers to the user who uses our products and/or services.
2. Minors: Minors up to the age of 18 years.
3. Child: A minor under the age of 14.
4. De-identification: refers to the process of technically processing personal information so that it cannot identify you without the aid of additional information.
5. Anonymization: refers to the process by which personal information is technically processed so that you cannot be identified and the processed information cannot be recovered.
6. Device: means a device that can be used to access our products or services.