This policy will help you understand the following:

1. How we collect and use your personal information

2. How we use cookies and similar technologies

3. How we share, transfer and publicly disclose your personal information

4. How do we protect your personal information

5. Your rights

6. How do we handle the personal information of minors/children

7. This policy may change

8. Independent Third Party

9. How to contact us

1. How we collect and use your personal information

Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. This platform collects and uses your personal information based on the following purposes described in this policy. If you need to use your information beyond the following purposes, this platform will obtain your consent separately:

(1) Provide you with the products and services provided by this platform on its and/or its affiliates’ mobile game platforms

1. Register as a user

Information filled in to complete account creation. Including: your name, mobile phone number, ID number, and created username. and other information you provide. According to the current product supervision policies of the industry and administrative departments, all online game users must use valid identity information to register a game account. Therefore, in order for you to register a game account normally and enjoy our services, we need to obtain your ID number and real name for real-name authentication, but we will not use this information for other purposes.

2. Payment and settlement

In order to facilitate you to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents when you pay for relevant orders, we may collect your virtual property-related information during the transaction process (only transaction records, Virtual currency, virtual transactions, game redemption codes, etc.).

3. Security

We will use some of your personal commonly used device information for identity verification, security prevention, fraud monitoring, archive backup and other purposes. For example, device identification codes are used for security prevention and user identification, and personal Internet access records are used for security prevention and fraud monitoring.

When you use our customer service, we may save your communication/call records and content or the contact information you left, in order to contact you or help you solve your problem, or record the handling of related problems. Plans and results.

4. Product development and service optimization

For example, in order to repair system failures and optimize our services, we may need to record and analyze the information generated when the system fails.

5. You understand and agree that when users use the game products and services provided by this platform, some individual services may require you to open specific access permissions in your device to realize the information involved in these permissions. Collect and use. For example:

(1) In order to verify the user's identity, realize the login function of the mobile phone number, and ensure the network and account security of the game service, after the user reconfirms the permission to turn on the phone device, the platform will have the right to obtain the user's device information (Android-id/hardware Serial number/IMEI/Mobile phone number/OAID/MAC address information/IDFA/IDFV, etc.) as the unique identifier of the user's device, in order to provide users with a more convenient login function, provide a page display that better meets the user's needs, and understand the product. Adaptability and identification of abnormal conditions.

(2) In order to facilitate users to share game screens with other users, some game products on this platform have built-in screenshot saving and sharing functions. After the user confirms that the storage permission is turned on again, the platform will have the right to access the user's photos and media Content and files, this function is only used by users to share their own game screens.

(3) In order to facilitate users to find other nearby users playing the same game, some game products on this platform have built-in positioning functions. After the user confirms to turn on the positioning permission again, he will have the right to use the network to obtain the user's approximate location or use GPS to obtain the user's precise location. Location.

(4) In order to facilitate users to upload their real avatars into the game, some game products on this platform have built-in camera functions. After the user reconfirms the permission to turn on the camera, he or she will have the right to use the camera of the user's mobile device to take pictures or record videos.

Users can refuse to provide the above permissions and use the game products provided by this platform. However, in this case, users may not be able to use some functions of the products, complete certain tasks of the products, and interact with other players. Certain interactions lag behind other users in gaming experience and revenue.

2. How we use cookies and similar technologies

To ensure that the website functions properly, we store small data files called cookies on your computer or mobile device. Cookies usually contain an identifier, the site name, and some numbers and characters. Cookies help us identify you as our registered user, or save the information you provide us about your preferences or other information that helps us identify you as our registered user, or save the information you provide us about yourself. Preferences or other information to understand what activities you use the services for, or which services or services are the most popular; and help us provide you with advertisements that are relevant to you based on your information instead of general advertising.

We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete cookies through browser or other means according to your preferences.

3. How we share, transfer and publicly disclose your personal information

(1) Sharing

You understand and agree that the de-identified information will not be able to identify you. In this case, we will use the de-identified information for the purpose of this privacy policy and ensure that the data recipient cannot re-identify the individual. Provided to third parties through sharing and transfer on the premise that the information is subject. We may share your personal information with any company, organization and individual outside this platform under the following circumstances:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.

In accordance with the current product supervision policies of the industry and administrative departments, after we obtain your ID number and real name, we will entrust a third party for real-name authentication. For the organizations or companies we entrust to process personal information, we will require them to follow our requirements, this Privacy Policy and other relevant confidentiality and security measures to process personal information.

3. Sharing with our affiliated companies: Your personal information may be shared with the affiliated companies of this platform. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy. If affiliated companies want to change the purpose of processing personal information, they will ask for your authorization and consent again.

4. Sharing with authorized partners: Only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and we will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose. Among them, for the purpose of providing customer service, we will share your created username and virtual property related information (only transaction records, virtual currency, virtual transactions) to authorized partners who provide customer service. Authorized partners providing customer service will use the above information solely for the purpose of providing customer service.

5. Sharing with user value-added service providers: When your account meets certain conditions, you may be invited to join user value-added services provided by third parties. User value-added services, that is, depending on your use of the service, you may obtain different membership levels and enjoy different additional benefits. You don't have to pay any extra for these extra benefits. When you receive an invitation, you may refuse to accept the above value-added services. If you choose to accept the invitation, you agree that we will share the user name and virtual property-related information you created (only transaction records, virtual currency, virtual transactions) with user value-added service providers. User value-added service providers only use the above information for the purpose of confirming your membership level and issuing benefits to you.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

2. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will separately inform you of the relevant situation through push notifications, announcements or other means, and continue to protect or require new information in accordance with the standards required by laws and regulations. The administrator will continue to protect your personal information in accordance with this policy.

3. In some scenarios, you can use the same account and password to log in and use other third-party platforms to obtain a better gaming experience. In order to provide this service, we may need to transfer your personal information and game information to third parties. We will continue to protect your personal information in accordance with the standards required by laws and regulations or require new managers to continue to protect your personal information in accordance with this policy.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. After obtaining your explicit consent;

2. Related to national security and national defense security;

3. Related to public security, public health, and major public interests;

4. Related to criminal investigation, prosecution, trial and judgment execution;

5. To protect the life, property and other major legitimate rights and interests of the information subject or other individuals but it is difficult to obtain your consent;

6. The information collected is disclosed to the public by you yourself;

7. Collect information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

8. Necessary to sign a contract according to your requirements;

9. Necessary to maintain the safe and stable operation of this platform service, such as discovering and handling product or service failures;

10. Necessary for legal news reporting;

11. When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing the results of academic research or description to the outside world, the information contained in the results will be de-identified;

12. Other situations stipulated by laws and regulations.

4. How we protect your personal information

(1) We will take all reasonable and feasible measures to protect your personal information. For example, we use SSL/hash to encrypt and protect your data; if we share your information with a third party, we will use encryption, desensitization and other de-identification methods to ensure the security of your information.

(2) Other security measures we take to protect information

We manage the storage and use of standardized information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

We implement comprehensive security controls on data through information contact confidentiality agreements, monitoring and auditing mechanisms.

(3) We only allow the platform staff and partners who need to know this information to access your information, and require all persons who may have access to your information to fulfill corresponding confidentiality obligations. If you fail to fulfill these obligations, you may be held legally responsible or your partnership with this platform may be suspended.

(4) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information when you first use our products or services, agree to the collection of personal information by our products or services, and before canceling your account, unless laws and regulations explicitly require us to retain it for a longer period.

(5) The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other users of this platform are not encrypted. Unless we explicitly request it, we strongly recommend that you do not send personal information through such methods. Please use a complex password to help us keep your account secure. If we explicitly require you to send personal information by email or other means when submitting specific service requirements, we will take reasonable and feasible measures to protect the personal information you send in accordance with the requirements of this Privacy Policy.

(6) The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability.