Privacy Policy

Explicit list of personal information on tracksense APP mobile phone
Business scene Collection purpose collection method Personal information fields
register log in Used to register a login account user input Mobile phone number, MAC, androidId, mobile phone model, network status, oaid, IMEI
Background process Check whether the user has enabled the APP Data upload Mobile phone number, MAC, androidId, mobile phone model, network status, oaid, IMEI
Explicit list of tracksense APP mobile phone permission information
Collection purpose collection method Personal information fields
Information used to identify users Get phone status permission Including mobile phone number, IMEI, IMSI permissions
Read local file data Read external memory Allow users to read folder file data
Get user phone status Modify phone status Allow users to modify phone status
Used for taking pictures of daily life functions Photo permission Allow access to camera to take pictures
Used for taking pictures of daily life functions Use flash Allow access to flash
Used for users to write data locally Write to external memory Allow users to write to folder files
For users to use the positioning function Location permissions Used to access GPS positioning, used to access wifi network information, wifi information will be used for network positioning
Get the current network wifi connection status Get wifi status Get the current WiFi access status and WLAN hotspot information
Get the current network connection status Change WiFi status Change WiFi status
Get the current network connection status access network Access network connections, which may generate GPRS traffic
Used to determine whether the current network is valid Get network status Get network information status, such as whether the current network connection is valid
tracksense APP third party shared information list
third party name purpose of usage Function type Involving personal information Third party official website link
Google Provide positioning, map and trajectory technical services google sdk Device information, location information and network information https://cloud.google.com/maps-platform/
Shenzhen Hexunhuagu Information Technology Co., Ltd. Provide push technology services Aurora SDK Location information and network information (such as IP address, WIFI information, etc.) https://www.jiguang.cn/
[This product's function of locating others/protecting others requires both parties to download and agree to authorize it before it can be used normally. It does not involve infringement of personal privacy. Obtaining geographical information must be done with the knowledge and consent of both users. This application is only for use among family/relatives/acquaintances/friends. In case of illegal use, the platform has the right to forcefully cancel/close the account once discovered. ]
Preface

Shenzhen Vodafu Technology Co., Ltd. and its affiliated companies (hereinafter collectively referred to as "we") attach great importance to the privacy of users and the protection of personal information. When you use our products and services, we may collect and use your relevant information. We hope to use this Privacy Policy (hereinafter referred to as "this policy" or "this privacy policy") to explain to you how we collect, use, store, share and transfer this information when you accept our products and services, and The ways we provide you to access, update, control and protect this information.

We are fully aware of the importance of personal information to you and will do our best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the least sufficient principle, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. . At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry.

Please read and understand this policy carefully before using our services, especially the clauses on exemption or limitation of liability, applicable laws and dispute resolution clauses. If you do not agree with the contents of this policy, we will be unable to provide you with complete services, and we also ask you to stop using our products and services immediately. Your use or continued use of the products and/or services we provide means that you agree to our collection, use, storage and sharing, disclosure and protection of your personal information in accordance with this policy. If you have any questions, comments or suggestions about the content of this policy, please contact us through the method at the end of the article.

When you click to confirm and agree to this policy, it means that you have fully read, understood and accepted all the contents of this policy, and have reached an agreement with us. This policy is legally binding on you and us.

This "User Privacy Protection Policy" will help you understand the following content

1. The scope of application of this policy and the meaning of related words

2. How we collect, store and use your personal information

3. How we use cookies and similar technologies

4. How we share, transfer and publicly disclose your personal information

5. How we protect your personal information

6.Your rights

7. How we process children’s personal information

8. How your personal information is transferred globally

9. How to update this policy

10.How to contact us

1. The scope of application of this policy and the meaning of related words
1.1 Scope of application of this policy
This policy applies when you use any of our products and services, regardless of whether the products and services have separate privacy terms, and whether you are a browsing user (guest) or a registered and logged-in user. Please note that this policy does not apply to the following situations: Information collected by third-party services (including any third-party websites) accessed through our services; Information collected by other companies and institutions that provide advertising services on our services information.
1.2 Meaning of related words
Personal information: refers to various information recorded electronically or by other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. The personal information involved in this privacy policy includes basic information of natural persons (including name, birthday, gender, address, phone number, email address), personally identifiable information (including ID number), personal biometric information (including fingerprints, facial features) ), network identity information (including system account number, IP address, email address, and passwords, passwords, and password protection answers related to the foregoing), personal property information (including bank account number, password, transaction and consumption records, virtual currency, and virtual transactions , redemption codes and other virtual property information), address book information, personal Internet access records (including website browsing records, software usage records), personal commonly used equipment information (including hardware serial number, hardware model, device MAC address, operating system type, software list , unique device identifier), personal location information (including approximate geographical location, precise positioning information). The actual specific types of personal information we collect are as described below. Device: means a device that can be used to access our products and/or services, such as a desktop computer, laptop, tablet or smartphone. Unique device identifier (unique ID or UUID): refers to a string of characters programmed into the device by the device manufacturer, which can be used to uniquely identify the corresponding device (such as the IMEI number of a mobile phone). Unique device identifiers are used for several purposes, including serving ads when cookies cannot be used (such as in mobile applications). IP address: Every device that connects to the Internet is assigned a number called an Internet Protocol (IP) address. These numbers are usually assigned based on geographic areas. IP addresses can often be used to identify the location of a device when it connects to the Internet. SSL: SSL (Secure Socket Layer), also known as Secure Socket Layer, is a security protocol implemented on the Transport Communication Protocol (TCP/IP). SSL supports various types of networks and provides three basic security services, all of which achieve information confidentiality through the use of public key and symmetric key technology. Cookie: Cookie is a small file containing a string of characters that is sent and stored on your computer, mobile device or other device (usually encrypted) when you log in and use the website or other online content. Cookie-like technologies are other technologies that can be used for similar purposes to Cookies, such as: Web Beacon, Proxy, embedded scripts, etc. Account: When you register an account and provide us with some personal information, you can better use our services. When you use our services, the system will use this account information to authenticate you to prevent unauthorized persons from accessing your account. De-identification/anonymization: refers to the process of technical processing of personal information so that the subject of personal information cannot be identified without the help of additional information, and the processed information cannot be restored. Server logs: Typically, our servers automatically log web page requests you make when visiting the website. These "server logs" typically include your web request, Internet protocol address, browser type, browser language, date and time of the request, and one or more cookies that can uniquely identify your browser. Shared information: refers to the information about you that you voluntarily share publicly with your social network and all users who use the service in our service, or the information about you shared by other parties, such as information they upload or publish. Contains information about you and information about you contained in communications they send to you and other users of our Services. Non-personally identifiable information: refers to any information about you that does not actually identify you, directly or indirectly, including personal information provided in an aggregated, anonymous or pseudonymous manner. You acknowledge and agree that information that does not personally identify you is not personal information.
2. How we collect, store and use your personal information
2.1 Information we collect

2.1.1 The information you provide When
registering
and creating an account, you need to provide your mobile phone number (personal sensitive information, used to accept the verification code to match your personal identity). Only by providing true and accurate information above can you successfully register an account and use the core functions of products and/or services. If you choose not to provide the above necessary information to implement core product functions, it may result in us being unable to provide you with the core product functions. After you voluntarily cancel your account, we will delete or anonymize your personal information in accordance with legal requirements. Our products do not support your use of third-party platform accounts (Weibo account/QQ account/WeChat account/Baidu account) to log in. At the same time, you need to understand that the matching result of mobile phone number and verification code is your personal sensitive information. We collect this type of information based on the relevant requirements of laws and regulations. If you refuse to provide it, you may not be able to register an account and use related product functions. Please Please consider carefully before choosing whether to provide it. Information Release
When you actively evaluate our products/services or post other content (such as comment information), we will collect the information you post and display your nickname, avatar and posted content. After-sales
When you use the after-sales functions of our customer service, products or services, in order to ensure the security of your account and system, we may need you to provide us with your account information first and match it with your previous personal information to verify your User ID. At the same time, in order to easily contact you or help you solve your problem, we may also need you to provide personal information (personal sensitive information) such as your name, mobile phone number, email and other contact information. In addition, we will also collect communication information between you and us (including text/pictures/audio and video/call records) and other necessary information related to your needs. We collect this information to help you solve your problem. If you refuse to provide the above information, we may not be able to provide you with the results of your complaint, appeal or consultation in a timely manner.

2.1.2 Your information shared by other parties
You understand and know that we cannot obtain the personal information you provide to external third parties (this company is not limited to this), or your personal information collected by external third parties, let alone Use unconventional methods (such as maliciously interfering with other party's APP data) to obtain your personal information through software programs without authorization. In order to provide you with better services, confirm the status of the transaction and provide you with after-sales and dispute resolution services, with your authorization, we will use the transaction object you selected and the third-party information system and payment institution directly involved in the transaction. etc. to collect your transaction and payment-related information related to the transaction progress so that we can process your order and ensure the smooth completion of the service, or better prevent malicious behaviors such as fraud and bill manipulation. In accordance with the requirements of laws and regulations and agreements with third parties, we will obtain your relevant information from our affiliates and partners through pop-up windows with your authorization, and use your information after confirming the legality of the source of the information. these messages. If you authorize the use of a third-party account to log in, the platform will obtain your shared account information (such as avatar, nickname) from the third party, and after you agree to this privacy policy, when you use relevant functions, your third-party account information will be obtained. The account is bound to our account.
Our professional security team will perform security reinforcement on personal information (including sensitive information reporting, encrypted storage of sensitive information, access permission control, etc.). We will use no less protective means and measures than we use for our own users' personal information to protect indirectly obtained personal information.

2.1.3 Your information we automatically obtain
improves personalized user experience
. With your prior consent, we will automatically collect your information or for the purpose of analyzing your use of our products and/or services and advertising optimization. Obtaining system permissions may include the following information:
Log information: refers to technical information that the system may automatically collect through cookies, web beacons or other means when you use our services, including: Device or software information, such as your mobile device, web page Configuration information provided by the browser or other programs you use to access our services, your IP address and the version and device identification code used by your mobile device; Information you search and browse when using our services, such as The web search terms you use, the URL addresses of social media pages you visit, and other information and content details you browse or request when using our services; information about mobile applications (APPs) and other software you have used, and Information about your past use of such mobile applications and software; Information about your communications through our services, such as the accounts you have communicated with, as well as communication time, data and duration; Information (element) contained in the content you share through our services Data), such as the date, time, or location where a shared photo or video was taken or uploaded. Network information, such as the network data information of the mobile network operator used, WIFI signal information, and broadband data information. Please note that individual device information, log information, etc. are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, such non-personal information will be treated as personal information during the period of combined use, unless we obtain your authorization. Unless otherwise provided by laws and regulations, we will anonymize and de-identify such personal information. Location information: refers to the information we collect about your location when you turn on the device positioning function and use the related services we provide based on location, including: When you use our services through a mobile device with positioning function, we use GPS or WiFi Your geographical location information collected through other methods; You can stop our collection of your geographical location information at any time by turning off the positioning function. Audio, video, and photo information: refers to the information we collect after obtaining your authorization when you use our specific functions (such as voice search, scanning QR codes, taking photos, etc.). Refusing to provide this information will only prevent you from using the above functions, but it will not affect your normal use of other functions of our services. Additionally, you can turn off related features at any time. Others: We hope that the services we provide you are perfect, so we will continue to improve our services, including technology. This means that our services may frequently launch new features and may require the collection of new information. If there are material changes or adjustments to the personal data we collect or use, we will notify you through appropriate means and may revise this policy. You need to know that we will enable the above functions with your consent. You can choose not to provide us with personal information related to the implementation of the above functions, or refuse to open the corresponding system permissions, in which case you will not be able to experience it. The above services. At the same time, you can manage, refuse or close relevant permissions at any time through the system settings. When you close the permissions, you cancel these authorizations. We will no longer continue to collect and use your personal information, and we will not be able to provide you with the above authorization. For the corresponding services and/or functions, if you continue to use these functions, you need to re-enable access rights. Your decision to turn off permission will not affect the previous processing of personal information based on your authorization. We hereby guarantee that your failure to select the above services or functions will not affect your normal use of other basic functions we provide you.

2.2 Storage of personal information

2.2.1 Storage location: We store your personal information in the territory of the People's Republic of China (including Hong Kong, Macao and Taiwan) in accordance with laws and regulations. If cross-border storage is required, we will separately obtain your authorization and consent;

2.2.2 Storage period: Unless otherwise agreed by laws or relevant regulations (for example, the "Electronic Commerce Law of the People's Republic of China" requires that product and service information and transaction information be stored for no less than three years from the date of completion of the transaction; user behavior logs Must be retained for more than 1 year), we retain your personal information for the shortest period necessary to provide our services. Beyond this retention period, the personal information will be deleted or anonymized (if you are a minor) After your personal information exceeds the retention period, we will process your personal information accordingly in accordance with relevant laws and regulations). We do not need to obtain your authorization or notification for the storage period and processing of anonymized information. Our criteria for judging the aforementioned period include:
(1) Complete the transaction purpose related to you, maintain corresponding transaction and business records, and respond to your possible inquiries or complaints;
(2) Ensure the safety and quality of the services we provide you;
(3) ) Whether you agree to a longer retention period;
(4) Whether there are other special agreements on the retention period.

2.3 How we use your information The
purpose of collecting your information is to provide you with services and improve service quality. To achieve this purpose, your information will be used for the following purposes. If we need to use the relevant information collected for new purposes If the purpose, scope or actual transmission method is inconsistent with this agreement, we will notify you through a pop-up window in the application and obtain your express consent: for data analysis to provide you
with better services; When serving, it is used for identity verification, customer service, security prevention, fraud monitoring, archiving and backup purposes to ensure the security of the products and services we provide you; to help us
design new services and improve our existing services;
to make us more Understand how you access and use our services, so as to respond to your personalized needs, such as language settings, location settings, personalized help services and instructions, or make comments to you and other users of our services. Responses from other aspects;
allowing you to participate in surveys about our products and services or initiated through our products and services. Whether to participate in the survey will be your sole decision, and it is up to you to choose what information to provide; for
security, legal investigation, etc. purposes;
We may use your data for data aggregation, analysis, and mining (including commercial utilization), but this information is anonymous and cannot identify you; please note that
unless you delete or withdraw your consent (that is, through system settings Refuse our collection and use), all personal information you provide when using our services will continue to be authorized by us to be used within the scope of this policy during your use of our services. After you cancel your account, we will delete or anonymize your personal information according to your request, unless otherwise provided by laws and regulations.
2.4 Exceptions to Obtaining Authorized Consent
According to relevant laws, regulations and national standards, in the following circumstances, we may collect and use your personal information in accordance with the law without obtaining your consent:

(1) Directly related to national security and national defense security;

(2) Directly related to public safety, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and judgment execution;

(4) To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

(5) The personal information collected is disclosed to the public by you yourself;

(6) Collect personal information from legally publicly disclosed information, such as: legal news reports, government information disclosure and other channels;

(7) Necessary to sign and perform the contract according to your requirements;

(8) Necessary to maintain the safe and stable operation of the products or services provided, such as discovering or handling product or service failures;

(9) When it is necessary for news units or academic research institutions to carry out statistics or academic research based on news reports and public interests, and provide externally the results of academic research or descriptions, the personal information contained in the results will be de-identified. And the data recipient is unable to recover and re-identify the personal information;

(10) Other situations stipulated by laws and regulations.

3. How we use cookies and similar technologies
3.1 Cookies
To ensure the normal operation of the website, we will store small data files called Cookies on your computer or mobile device. Cookies usually contain an identifier, the site name, and some numbers and characters. Cookies allow websites to store data such as your preferences or the items in your shopping basket. We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. See AboutCookies.org for details. You can clear all cookies saved on your computer, and most web browsers have the function to block cookies. However, if you do this, you will need to change your user settings yourself each time you visit our website.
3.2 Web beacons and pixel tags
In addition to Cookies, we will also use other similar technologies such as web beacons and pixel tags on our website. For example, emails we sent you may contain click URLs linked to content on our website. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service.
4. How we share, transfer and publicly disclose your personal information
4.1 Sharing
You agree that we may share your necessary personal information with our affiliated companies to provide and develop our products and services. Except for the following situations, we and our affiliated companies will not share your personal information with any third party without your consent: In the following situations, you can make a request to us to delete your personal information:

(1) Obtain your explicit consent or authorization in advance;

(2) Providing it to external parties when necessary in accordance with the requirements of laws, regulations, legal procedures, mandatory administrative or judicial requirements;

(3) Comply with the relevant agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;

(4) We and our affiliated companies may share your personal information with our affiliated companies, partners and third-party service providers, contractors and agents (such as communications service providers who send emails or push notifications on our behalf, and mapping service providers that provide us with location data) for the purposes listed below, but we will only share necessary personal information and are subject to the purposes stated in this Privacy Policy. If our affiliates, partners and third-party service providers, contractors and agents want to change the purpose of processing personal information, they will ask for your authorization and consent again, and they have no right to use the shared personal information for any other purpose:
to You provide our services;
achieve the purposes described in the "How We Use Your Information" section;
perform our obligations and exercise our rights in the "User Terms of Service" or this "Privacy Protection Policy";
understand, maintain and improve our services;

(5) Handle disputes or controversies between you and others at your request.

Our partners include the following types:
(1) Suppliers of goods or technical services. We may share your personal information with third parties that support our features. This support includes providing us with payment services, data processing, etc. Our purpose of sharing this information is to realize the core functions of our products and/or services;
(2) Third-party SDK service providers. Our products may contain third-party SDKs or other similar applications. When you use such services provided by third parties on our platform, you agree that your information will be collected and processed directly by them (such as embedded code , plug-ins, etc.). The relevant third-party SDKs we access are listed below:

Aurora SDK: Push technology services are provided by Shenzhen Hexun Huagu Information Technology Co., Ltd. We may use your device information, location information and network information (such as IP address , WIFI information, etc.) are provided to Shenzhen Hexunhuagu Information Technology Co., Ltd. to provide you with push technology services (for the privacy policy terms of this product, please refer to the Aurora SDK Privacy Policy);

Google sdk: push technology provided by Google Services, we may provide your device information, location information and network information (such as IP address, WIFI information, etc.) to Google to provide you with positioning, map, and trajectory technology services (the privacy policy terms of this product, Please refer to Google SDK Privacy Policy);

as our business continues to develop, we may conduct mergers, acquisitions, asset transfers or similar transactions, and your personal information may be transferred as part of such transactions, we will New holders are required to continue to comply with this policy, otherwise we will require them to re-obtain your authorization.

We may also need to retain, preserve or disclose your personal information for the following situations:
(1) Directly related to national security, national defense security, public safety, public health, and public interests;
(2) Collected from legally publicly disclosed information Personal information, such as legal news reports, government information disclosure and other channels;
(3) We believe that it is necessary to comply with applicable laws and regulations, safeguard social public interests, or protect the personal and property safety of us, our customers, other users or employees or reasonably necessary for legitimate rights and interests;
(4) Other circumstances stipulated by laws and regulations.

4.2 Transfer
We will not transfer your personal information to any company, organization or individual, except
in the following circumstances: Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties ;
When involving mergers, acquisitions or bankruptcy liquidations, if personal information transfer is involved, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to re- Ask for your authorization and consent.
4.3 Public Disclosure
We will only publicly disclose your personal information under the following circumstances and under the premise of adopting security protection measures that comply with industry standards:
Based on your needs, we will disclose your personal information in a disclosure method that you have explicitly agreed to. Personal information;
when it is necessary to provide your personal information in accordance with the requirements of laws, regulations, mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information based on the required type of personal information and disclosure method.
4.4 Exceptions to obtaining prior authorization and consent when sharing, transferring, and publicly disclosing personal information
. In the following circumstances, we do not need to obtain your prior authorization and consent when sharing, transferring, or publicly disclosing your information:

(1) Directly related to national security and national defense security;

(2) Directly related to public security, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and judgment execution;

(4) To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

(5) Personal information that you disclose to the public on your own;

(6) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
We are responsible for sharing, transferring, and publicly disclosing your personal information externally and bear corresponding legal responsibilities.

5. How we protect your personal information
We attach great importance to information security and use various security technologies and procedures to prevent the loss, improper use, unauthorized reading or disclosure of information. For example, in some services, we will utilize encryption technology (such as SSL) to protect the personal information you provide to us. However, please understand that due to technical limitations and risk prevention limitations, even if we have strengthened security measures as much as possible, we cannot always guarantee 100% information security. You need to understand that the systems and communication networks you use to access our services may have problems due to circumstances beyond our control.

We have established a dedicated team to develop and apply a variety of security technologies and procedures. We will conduct security assessments for those in charge of security management and key security positions. We have established a complete information security management system and internal security incident handling mechanism. , we will adopt appropriate security measures and technical means that comply with industry standards to store and protect your personal information to prevent your information from being lost, received, accessed, used, damaged or leaked without authorization. According to our security management system, personal information leakage, damage or loss is classified as a major security incident. Once it occurs, the company's emergency plan will be activated, consisting of the Network Operations Department, Information Management Department, Customer Service Department, Legal Department and other departments. Joint emergency response team processing;

we will conduct data security awareness training and security capability training and assessment for employees, conduct identity authentication and authority control for employees who handle personal information, and communicate with employees and partners who come into contact with your personal information Sign a confidentiality agreement to clarify job responsibilities and codes of conduct. If there is any violation of the confidentiality agreement, your labor or cooperative relationship with us will be immediately terminated, and you will be held accountable for relevant legal responsibilities. Personnel who have access to personal information will also be asked when they leave their jobs. required confidentiality.

After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the steps you can take to prevent and reduce risks on your own. Suggestions, remedies for you, etc. We will promptly notify you of the incident-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner.

At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

We also ask you to understand that due to technological limitations and rapid development in the Internet industry, as well as various possible malicious attack methods, even if our company does its best to strengthen security measures, it is impossible to always guarantee 100% security of information. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing your passwords regularly, and not disclosing your account password and other personal information to others.

6. Your rights
Right of access
In principle, you can access your personal information through the following methods:
Account information: You can log in to your personal account at any time, access or edit the personal profile information in your account, change your password, add security information, and conduct account changes. Association or identity authentication, etc.;
Usage information: You can check order information, etc. on our website, client and other services. You can also contact us to delete this information through the method provided at the end of this policy. We will verify your identity after Provided, unless otherwise agreed by laws and regulations;
other information: If you encounter operational problems during this visit or need to obtain other personal information that cannot be obtained as mentioned above, you can contact us through the method provided at the end of this policy. , we will provide it after verifying your identity, unless otherwise agreed by laws and regulations.
Right to Correction:
You have the right to correct or update incorrect or incomplete information provided that your identity has been verified and the correction does not affect the objectivity and accuracy of the information. You can do so by yourself on our website or client Make corrections in the process, or under certain circumstances, especially when data is incorrect, submit your correction request to us through the contact information provided at the end of this policy and ask us to correct or update your data, unless otherwise provided by laws and regulations. . However, for security and identification reasons, you may not be able to modify some of the initial registration information submitted when registering.
Right to deletion
You can delete your personal information on our website or client (click "My" - click the logout button) or contact us at the end of the article. After providing relevant information, we will help you delete your personal information. If we cease operations or stop providing relevant services, we will promptly stop collecting your personal information, notify you of the cessation of operations by sending notices one by one or in the form of announcements, and delete or anonymize the personal information we hold. chemical treatment.
Right of Request
If you need a copy of your personal data, you can contact us through the method provided at the end of this policy. After verifying your identity, we will provide you with a copy of your personal information in our services (such as basic information , identity information), unless otherwise provided by laws and regulations.
Right to Withdraw Consent
If you want to change the authorization scope of related functions (such as location, address book, camera), you can modify your personal settings through your hardware device, or perform operations on the relevant function settings interface in our products or services. If you encounter operational problems during this process, you can contact us through the method provided at the end of this policy. When you cancel your authorization to collect relevant personal information, we will no longer collect that information and will no longer be able to provide you with the above-mentioned corresponding services; however, you know and agree that unless you exercise the aforementioned "right of deletion", your This behavior will not affect our processing and storage of personal information based on your previous authorization.
Right to cancel:
You can cancel your account by contacting our customer service or through other methods announced by us (unless otherwise provided by laws and regulations). Once you cancel your account, you will not be able to use the full range of user product services we provide, so please You proceed with caution. In order to protect your or others' legitimate rights and interests, we will determine whether to support your cancellation request based on your use of the products we provide. For example, if you have unused balance in your wallet and you still have courses to complete, we will Your request will not be supported immediately, but you will be prompted to handle it first. Unless otherwise provided by laws and regulations, after canceling your account, all information in your account will be cleared and your personal information will be deleted according to your request.
We are willing to accompany you to inform you in advance of the right to stop operations of products and services
. If some or all of our products and services are forced to stop operation due to special reasons, we will send you a letter or message on the main page of the product or service or within the site 15 days in advance. Notify you by email or other appropriate ways to reach you, and will stop collecting your personal information. At the same time, your personal information held will be deleted or anonymized in accordance with legal provisions, and other laws and regulations will also notify you. Except where specified.
Exceptions:
In the following circumstances, in accordance with the requirements of laws and regulations, we will not be able to respond to your request:
directly related to national security and national defense security;
directly related to public security, public health, and major public interests;
and criminal investigation, prosecution, Directly related to trial and judgment execution;
there is sufficient evidence to show that you have subjective malice or abuse of rights;
responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations. Involving trade secrets.
7. How we process children’s personal information
Minors may not create their own user accounts without the consent of a parent or guardian. If you are a minor under the age of 18, please be sure to ask your parents or guardians to read this Privacy Policy carefully, and use our services or provide us with information with the consent of your parents or guardians. .
For the collection of personal information of minors through the use of our products or services with the consent of their parents or guardians, we will only use, share, and transfer them when permitted by laws and regulations, with the explicit consent of their parents or guardians, or when necessary to protect the minors. or disclose this information.
If parents or guardians find that the relevant minor information was filled in by the minor and need to be modified or deleted, please feel free to contact us.
Contact email: vodofovip@163.com.
We will respond as soon as possible after receiving the notification.
8. How your personal information is transferred globally
The personal information we collect and generate during our operations in the People's Republic of China is stored in China, except for the following circumstances:

(1) Laws and regulations have clear provisions;

(2) Obtain your explicit authorization;

(3) Your personal initiative such as cross-border transactions through the Internet.


In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

9. How to update this policy
Our privacy policy may change.
We will not reduce your rights under this Privacy Policy without your explicit consent. We will post any changes to this policy on this page.
For major changes, we will also provide more prominent notices (including notifications through public announcements on our company website or even providing you with pop-up reminders).
Major changes referred to in this policy include but are not limited to:
(1) Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;
(2) We have major changes in ownership structure, organizational structure, etc., such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;
(3) The main recipients of personal information sharing, transfer or public disclosure change;
(4) There are significant changes in your rights to participate in the processing of personal information and how you exercise them;
(5) When our responsible department, contact information and complaint channels for handling personal information security change;
(6) When the personal information security impact assessment report indicates that there is a high risk.
10. How to contact us
You can contact us through the following methods and we will respond to your request within 30 days:

(1) If you have any questions, comments or suggestions about the content of this policy, you can contact us by calling: 86-755-86655035;
(2) If you find that your personal information may have been leaked, you can make a complaint by calling: 86-755-86655035;
(3) We have also set up a person responsible for personal information protection. You can contact us via email service@vodofo.com;
If you are not satisfied with our response, especially if you believe that our personal information processing has harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit with the court with jurisdiction over the defendant's domicile.

Company: Shenzhen vodofo technology Co., Ltd.

Address: Room 301, Tsinghua Information Port Complex Building, North District, Nanshan Science and Technology Park, Nanshan District, Shenzhen City, Guangdong Province,China.