Your trust is of great importance to 52Phone (hereinafter also referred to as "we"). We are fully aware of the significance of your personal information to you. We will collect, use and share your personal information in accordance with the requirements of laws and regulations and take corresponding security protection measures to make every effort to ensure that your personal information is secure and controllable.
This policy applies to all products or services provided by 52Phone. When you download, install, start, browse, register, log in and use our products/services (hereinafter collectively referred to as "using our products/services" or "using the products/services"), we will handle and protect your personal information in accordance with the stipulations of this "Privacy Policy" (hereinafter also referred to as "this policy"). Therefore, we hope that you can read carefully and fully understand the full text of this policy and make the choices you think are appropriate according to the guidance of this policy when necessary. You should choose whether to agree to the content of this policy and whether to agree to use our products/services after carefully reading and fully understanding this policy. If you or your guardian does not agree to any content of this privacy policy, you should immediately stop using the products or services of 52Phone. When you use any product/service provided by 52Phone, it means that you fully understand and agree to all the contents of this policy (including updated versions).
It should be noted in particular that this "Privacy Policy" does not apply to those services provided by third parties that display on, link to or repackage our services and are subject to other privacy policies. Although third parties display on, link to or repackage our services, we do not understand or control their behaviors, and therefore are not responsible for their behaviors. Please use their services with caution before you have viewed and accepted their privacy policies. If you allow us to share information with third-party websites, such information will also be subject to the service terms and privacy policies of the third-party websites at the same time.
I. Scope of Application and Definitions of Terms in the “Privacy Policy”
II. How We Collect and Use Your Personal Information
III. How We Use Cookies and Similar Technologies
IV. How We Share, Transfer, and Disclose Your Personal Information
Ⅴ. How We Store Your Personal Information
Ⅵ. How We Protect Your Personal Information
Ⅶ. How to Exercise Your Rights Related to Personal Information
Ⅷ. Privacy Protection
Ⅸ. Protection of Minors
Ⅹ. How to Contact Us
Ⅺ. Revisions to The Policy
Ⅻ. Jurisdiction Over Disputes
The “Privacy Policy” serves as the general privacy framework for all our products and services. When you use any of our products or services, this policy applies. However, if a specific product or service has its own privacy terms or agreement, those specific terms will take precedence. For any aspects not covered in the specific terms, this general policy will apply. Please note that this policy does not apply in the following situations:
The data collection or processing practices of third parties providing advertising services for our products or services. Our products or services may contain or link to information or services provided by third parties (including third-party applications, websites, products, services, etc.) that are operated by those third parties. Your use of such information or services is unrelated to us;
We kindly remind you to carefully read and review the user agreements and privacy policies presented by such third parties when using their information or services, and to safeguard and cautiously provide your personal information;
The “Privacy Policy” only applies to personal information collected by us. It does not cover any third party's collection of your personal information, the services provided by third parties, or their rules for using your information. Within the limits permitted by law, we are not responsible for the collection, storage, or use of your personal information by any third party. Additionally, this policy does not apply to content provided by products or services not offered by “52Phone”.
Our Products/Services: This includes, but is not limited to, the software, websites, and services we provide (including off-site services such as our advertising services and plugins like "apply or share via our services"), as well as the related features or functionalities of such products or services.
We would like to emphasize that due to the variety of our products and services, the content provided may differ. The Privacy Policy serves as the general privacy framework uniformly applicable to all 52Phone products and services. The user rights and information security protection measures stipulated in this policy apply to all our products and services. However, the specific definitions of "our products/services" as well as the types of personal information we collect, and the corresponding rules for its use and processing, may vary depending on the specific product or service you use (including the type of client, software version, etc.). The actual details depend on the specific product or service you are using. For certain products or services, we may issue specific privacy terms or agreements to clarify our privacy practices and protection measures in greater detail.
Personal Information (As defined in GB/T 35273-2017 Information Security Technology - Personal Information Security Specification): This refers to any information, recorded electronically or otherwise, that can identify a specific natural person individually or in combination with other information, or reflect the activities of a specific natural person. The personal information referred to in this policy includes, basic personal information (name, date of birth, gender, address, personal phone number, email address), identity information (identification card details), biometric information (fingerprints, facial features) , online identity identifiers (system account, IP address, email address), and related credentials (passwords, passphrases, security answers, user digital certificates), financial information (bank account details, authentication credentials (passwords), fund information (amounts, income, balances), transaction and consumption records, account statements, virtual assets (e.g., virtual currency, coupons, redemption codes), contacts information, online activity data (browsing history, software usage records, click records), device information (hardware serial number, hardware model, MAC address, operating system type, software list, unique device identifiers (e.g., IMEI/Android ID/IDFA/OPENUDID/GUID, SIM card IMSI), location information (approximate geographic location, precise location). The specific types of personal information we collect are detailed below in this policy.
Personally Sensitive Information (from GB/T 35273-2017 "Information Security Technology - Personal Information Security Specification"): It refers to personal information that, once leaked, illegally provided or misused, may endanger personal and property safety and is highly likely to cause damage to personal reputation, physical and mental health or result in discriminatory treatment. The personally sensitive information involved in this privacy policy includes your property information (including bank account numbers, authentication information (passwords), financial information (including the amount of funds, earnings, balances), transaction and consumption records, flow records, virtual currency (such as coupons, etc.), virtual transactions, redemption code and other virtual property information), personal biometric information (including fingerprints, facial features), personal identity information (including ID card information), online identity identification information (including system accounts, email addresses and related passwords, passphrases, password protection answers, personal digital certificates of users), other information (including address book information, personal phone numbers, precise location information, delivery addresses, web browsing records), and children's personal information. You agree that your personally sensitive information will be processed according to the purposes and methods described in this "Privacy Policy". The specific types of personally sensitive information that we actually collect shall be subject to the description below. Compared with other personal information, personally sensitive information may have a greater impact on your personal rights and interests. We hereby kindly remind you to carefully consider before providing us with your personally sensitive information.
Child: Refers to a minor under the age of fourteen. (Derived from the "Provisions on the Network Protection of Children's Personal Information")
Anonymization: Refers to the process of making it impossible to identify the subject of personal information through technical processing of personal information, and ensuring that the processed information cannot be restored. (Derived from GB/T 35273-2017 "Information Security Technology - Personal Information Security Specification")
De-identification: Refers to the process of making it impossible to identify the subject of personal information without the aid of additional information through technical processing of personal information. (Derived from GB/T 35273-2017 "Information Security Technology - Personal Information Security Specification")
Deletion: Refers to the act of removing personal information from the systems involved in realizing daily business functions, so as to keep it in a state where it cannot be retrieved or accessed. (Derived from GB/T 35273-2017 "Information Security Technology - Personal Information Security Specification")
When you are using our products/services, we may need to collect and use some of your personal information. The types of your personal information that we collect and use fall into two categories:
The first category: Information essential for the core business functions of our products/services. Such information is necessary for the normal operation of the products/services, and you must authorize us to collect it. If you refuse to provide it, you will not be able to use our products/services normally.
The second category: Information that may need to be collected for the additional business functions of our products/services. This information is not required for the core business functions. You can choose whether to authorize us to collect it. If you refuse to provide it, the additional business functions will not be realized or will not achieve the intended effects, but it will not affect your normal use of the core business functions.
We would like to specifically remind you that since we offer a wide variety of products and services and the content provided to you varies, the core business functions (including the types of your personal information collected) will also differ depending on the content of the products/services. The specific details shall be subject to what is actually provided by the products/services. In addition, you understand and agree that we aim to provide you with comprehensive products and services. Therefore, we will continuously improve our products and services, including technology. This means that we may frequently introduce new business functions, which may require the collection of new personal information or the alteration of the purposes or methods of using personal information. If a function or product/service that requires the collection of your personal information is not described in this "Privacy Policy", we will separately explain to you the purpose, content, usage methods and scope of such information collection through means such as updating this policy, page prompts, pop-up windows, and website announcements. We will also provide you with a way to make a voluntary choice and consent and collect the information only after obtaining your explicit consent. During this process, if you have any doubts about relevant matters, you can contact us through the means provided at the end of this document, and we will respond to you as soon as possible.
Specific business function scenarios include:
Search Function
When you use the search function, we need to collect some of your information, including the following personal information: the words searched (including voice information), browsing history and time, the time of the search, and the number of interactions with them.
Account Registration Function
When you use the account registration function, you need to complete a series of registration procedures according to our instructions. After you become a registered user, we will provide you with products/services exclusive to registered users. During this process, you need to provide us with some information that can identify your user identity, either individually or in combination, including mobile phone number, verification code matching result, and create a password. We collect this information to complete the registration procedures, continuously and stably provide services for you, and protect the security of your account. You should be aware that the mobile phone number and verification code matching result belong to your personal sensitive information. We collect such information to meet the requirements of relevant laws and regulations. If you refuse to provide them, it may result in your inability to use this function of ours. Please consider carefully before providing them. Meanwhile, you can also fill in or supplement your gender, nickname, profile picture, birthday, and personal signature information during registration or in the subsequent use process. It should be noted that some of our platforms support you to log in using accounts of third-party platforms (for example: WeChat/QQ). If you log in using an account of a third-party platform, we will obtain relevant information under that third-party account according to your authorization (including nickname, profile picture, specific details shall be subject to the content of your authorization) as well as identity verification information (personal sensitive information). We collect this information to provide you with account login services and ensure the security of your account and prevent security risks. If you refuse to authorize such information, you will not be able to use the account of the third-party platform to log in to our platform, but it will not affect the normal use of other products and services we provide for you. You are aware of and agree that for one or more contact methods (such as: email address, contact phone number, fax number, contact address) provided by you during the process of using our products/services, we may send various types of notices to one or more of them during our operation for purposes such as user message notification, identity verification, and security verification.
Additional Business Functions Based on Device Storage Permissions
When it comes to business functions such as allowing users to read, modify or delete the contents in the SD card, we will need to obtain the storage permission of your device. When you need to use functions related to uploading files (applications), it is recommended that you allow the device to obtain this permission to facilitate your subsequent operations. If you refuse to provide it, you will only be unable to use this function, but it will not affect your normal use of other functions of the products/services. The storage permission is a setting on your device, and you can manage it through the device settings page.
Additional Business Functions Based on Device Photo Album Permissions
When you use business functions such as commenting and giving feedback, we will need to obtain the photo album permission of your device and collect the information (personal information) of the pictures, texts and video content provided by you. If you refuse to provide it, you will only be unable to use this function, but it will not affect your normal use of other functions of the products/services. The photo album permission is a setting on your device, and you can manage it through the device settings page.
Additional Business Functions Based on Device Camera Permissions
When you use business functions like problem feedback, we will need to obtain the camera permission of your device and collect the picture and video information (personal information) provided by you. If you refuse to provide it, you will only be unable to use this function, but it will not affect your normal use of other functions of the products/services. The camera permission is a setting on your device, and you can manage it through the device settings page.
Additional Business Functions Based on Device Calendar Permissions
When you use business functions such as appointment reminders, we will need to obtain the calendar permission of your device and collect your calendar information (personal information). If you refuse to provide it, you will only be unable to use this function, but it will not affect your normal use of other functions of the products/services. The calendar permission is a setting on your device, and you can manage it through the device settings page.
When you purchase services in our products, we need to collect some or all of the following personal information according to the types of products or services, including: information on the traded services, consignee information (the consignee's name, delivery address and contact phone number) (personal sensitive information), transaction amount, order placement time, order merchant, order number, order status, payment method, payment account, payment status (personal sensitive information). We collect this information to help you complete the transactions smoothly, ensure the security of your transactions, query order information, provide customer service, etc. It should be particularly noted that if you purchase products or services by paying phone bills, we need to obtain the relevant SMS permissions to help you complete the payment for the transactions smoothly.
After you place an order successfully, if the products are provided by third-party sellers or need to be delivered by third-party delivery companies, in order to complete the delivery and distribution of the products to you smoothly, safely and accurately, the merchants and third-party delivery companies will inevitably obtain your relevant delivery information (personal information) during the shipping and delivery process. We promise you that we will ensure the security of your personal information. We will strictly require merchants and third-party delivery companies to keep your personal information confidential, only acquire and use it for the purpose of delivery, and must not disclose it to the outside or use it for any other purposes.
Identity Verification Function
When you use the identity verification function or service in our products/services, in order to meet relevant legal provisions and regulatory requirements, ensure the authenticity of user identities, achieve risk control such as anti-fraud, safeguard the security of systems and services, or meet the needs of providing services, we will need to collect your real identity information (which may include your name, ID card-related information, facial feature information (static or dynamic), mobile phone number) (personal sensitive information) to complete real-name authentication. Relevant business scenarios may include: when registering products, when using information release and other services, when applying to use the "52Phone Account" service, when online game users conduct real-name registration and transactions. You agree that we can, on our own or entrust a third party to provide, inquire about, and check the aforementioned identity information to relevant institutions (such as personal credit reporting institutions, government institutions, etc.). After your real-name authentication is successful, without legitimate reasons, the real-name information cannot be modified. If it is truly necessary to modify it, please contact us to solve the problem. Meanwhile, to assist you in quickly completing real-name authentication, risk control verification, etc., regarding the relevant real-name authentication information (including your name, ID card-related information, mobile phone number) (personal sensitive information) that you have provided in our products/services, you agree that we can automatically pre-fill all or part of the aforementioned information on other pages that require your real-name authentication. You are aware of and acknowledge that we are only assisting with the filling, and there is no direct transmission. Only after you click the "Next" button will you provide it to the corresponding service system on your own.
When you contact our customer service or use other user response functions (including filing after-sales applications for our products/services, exercising your relevant personal information control rights, and other customer complaints and demands), for the security of your account and system, we may require you to provide your account information first and match it with your previous personal information to verify your user identity. When you use the customer service or other user response functions, we may also need to collect the following personal sensitive information from you: contact information (the phone number/email address you use when contacting us or other contact methods you voluntarily provide to us), your communication information with us (including in the forms of text, pictures, audio and video, and call records), and other necessary information associated with your needs. We collect this information to investigate the facts and help you solve problems. If you refuse to provide it, it may result in your inability to use our customer service and other user response mechanisms.
We need to collect some of your information to safeguard the security of your accounts and systems when you use our products/services and to assist in enhancing the security and reliability of our products and/or services, so as to prevent any behaviors that may harm users, 52Phone, or society. This includes the following personal information: the location where you log in to your account, information on your commonly used personal devices, the login IP address, the product version number, the language mode, browsing records, network usage habits, service failure information, as well as personal sensitive information: transaction information and member real-name authentication information. We will make comprehensive judgments based on the above information regarding the risks of your accounts, transactions, conduct identity verification, provide customer service, detect and prevent security incidents, monitor fraud, and use it for archiving and backup purposes. Moreover, we will take necessary recording, auditing, analyzing, and handling measures in accordance with the law. Once we detect that there are or are suspected to be risks to account security, we will use the relevant information for security verification and risk elimination to ensure the security of the products and services we provide to you and safeguard your rights and interests from being infringed. Meanwhile, when there are issues regarding account or system security, we will collect such information to optimize our products and services.
Cookies are small files containing strings that are sent and stored (usually encrypted) in your computer, mobile device or other devices when you log in and use websites or other online content. Cookie-like technologies are other technologies that can be used for purposes similar to those of cookies, such as Web Beacons, Proxies, embedded scripts, etc. Currently, we mainly use cookies to collect your personal information. You are aware of and agree that with the development of technology and the further improvement of our products and services, we may also use cookie-like technologies.
When you use our products/services, we may use cookies and similar technologies to collect some of your personal information, including your website visiting habits, your browsing information, and your login information. The collection of such information by cookies and similar technologies is for the necessity of your using our products/services, simplifying the steps of your repeated operations (such as registration and login), facilitating you to view your usage history (such as video viewing history), providing you with service content that better meets your personal needs and content that you may be more interested in, protecting the security of your information and accounts, and improving our products and services. We promise to use cookies and similar technologies only within the scope of the purposes described in this “Privacy Policy ". If your browser allows, you can manage and (partially/fully) reject cookies/similar technologies through your browser settings; or delete the cookies/similar technologies already stored in your computer, mobile device or other devices, so that we cannot track all or part of your personal information. If you want to know in detail how to change the browser settings, please check the relevant settings page of the browser you are using. You understand and are aware that some of our products/services can only be realized by using cookies or similar technologies. If you refuse to use or delete them, you may not be able to use our relevant products/services normally or obtain the best service experience through our products/services. Meanwhile, it may also have a certain impact on the protection of your information and the security of your accounts.
We attach great importance to the protection of your personal information. Your personal information is an important basis and component for us to provide you with products/services. For your personal information, we will only collect and use it within the purposes and scopes described in this "Privacy Policy" or in accordance with the requirements of laws and regulations, and keep it strictly confidential. We will not share your personal information with third-party companies, organizations and individuals other than 52Phone, unless one or more of the following situations exist: You request it on your own initiative; We have obtained your explicit authorized consent in advance; Necessary and reasonable sharing within 52Phone, including:
To facilitate our provision of consistent services to you based on the unified account system of the 52Phone, recommend content that you may be more interested in to you, ensure and enhance the security and reliability of our services and systems, protect the personal and property safety of the 52Phone, users or the public from being infringed, and facilitate your unified management, you are aware of and agree that your relevant personal information may be shared necessarily within the 52Phone products. However, please rest assured that we will only share information within the necessary and reasonable scope and process it only within the scope of the aforementioned purposes. If we need to share your personal sensitive information or affiliated companies need to change the purposes of using and processing personal information, we will seek your authorized consent again; Necessary sharing with some business partners;
You understand and agree that for the purposes of smoothly carrying out necessary/reasonable business, meeting your requirements, fulfilling our obligations in relevant user agreements or this privacy policy, exercising our rights or complying with legal provisions, etc., we may need to share some of your information with some business partners. However, we promise that we will only share your necessary personal information. If we share your personal sensitive information or change the purposes of using and processing personal information, we will seek your authorized consent again. Our business partners include:
(1) Service providers that provide functional support for our products/services: including payment institutions that provide payment services, operators that provide one-click login services, third-party delivery companies and other service providers. The purpose of our information sharing is to enable the functions of our products/services and allow you to use them normally;
(2) Third-party merchants on our platform: To meet your needs for purchasing products or services (including enjoying after-sales services), we will share your order information and transaction-related information with third-party merchants on our platform;
(3) Partners that provide data services (including online advertising monitoring, data statistics, and data analysis): To maintain/improve our products/services and provide you with better content, we may share your relevant information with designated partners that provide such services. For the security of your information, currently, we only cooperate with partners who have signed strict data security and confidentiality agreements, and these companies must comply with our data privacy and security requirements. Unless we obtain your consent, we will not share your personal identity information with them;
(4) Third-party SDK Service Providers: Our products may contain third-party SDKs or other similar applications. When you use such services provided by third parties on our platform, you agree that they will directly collect and process your information (such as in the form of embedded codes, plugins, etc.). For example, if you are using a Huawei mobile phone, the Huawei Push SDK needs to read your IMEI information for pushing/sending out notification bar messages; when you use your Xiaomi account to log in to our products, the Xiaomi SDK needs to collect your Xiaomi account information; if you use Alipay for payment, in order to enable you to complete transactions in a secure transaction environment and achieve the transaction purpose, the Alipay SDK needs to read your IMEI information. The collection and processing of information and other behaviors of the aforementioned service providers comply with their own privacy terms and are not applicable to this policy. However, we will also make efforts to review the business access qualifications of such third parties and strive to require the legality, compliance and security of these service providers. To safeguard your information security to the greatest extent, we highly recommend that you check their privacy terms before using any third-party SDK services. To protect your legitimate rights and interests, if you find that such SDKs or other similar applications pose risks, we suggest that you immediately terminate the relevant operations and get in touch with us in a timely manner;
(5) Partners who entrust us with information promotion and advertisement: You authorize us to have the right to share with partners who entrust us with information promotion and advertisement placement the indirect user profiles formed by our use of your relevant information sets, as well as the analyzed/statistical information after de-identification or anonymization treatment, so as to help them with advertising or making decision suggestions, improve the effective reach rate of advertisements, and further understand user needs. When the aforementioned partners are financial institutions (including banks, lending institutions, insurance companies, fund and securities companies, etc.) that provide services such as lending and deposits to you, we will obtain your separate authorization and, after obtaining your authorization, synchronize your relevant information (including name, ID card information, address book information, specifically subject to the content of your authorization) to these partners to assist you in quickly completing identity verification, entering emergency contact information, conducting risk control verification, etc. Meanwhile, you authorize us to share with the aforementioned financial institutions the indirect user profiles formed by our use of your relevant information sets, as well as the analyzed/statistical information after de-identification or anonymization treatment, to help them judge your creditworthiness, reduce the bad debt rate, safeguard commercial security and prevent fraud, etc. We promise that without your consent, we will not share personal information that can identify you with them;
(6) Partners who jointly provide a certain service with us. For example, when we jointly conduct marketing activities with partners, in order to be able to provide you with normal services and meet your service needs, we will obtain your separate authorization and, after obtaining your authorization, synchronize your relevant information (specifically subject to the content of your authorization) to the partners. The shared information is de-identified, and the third parties receiving the information sharing are unable to re-identify the identity of the information subject. Sharing with third parties to protect you, our other users or employees, the 52Phone, or the social public interest, property or security (such as fraud or credit risk, etc.) from being damaged; In some cases, only by sharing your personal information can we realize the core functions of our products/services or provide the services you need, or handle disputes or controversies between you and others; Sharing based on relevant agreements (such as online agreements, platform rules, etc.) or legal documents signed by you with us; Conforming to the relevant agreements between you and other third parties; Sharing based on reasonable business practices. For example, sharing information about winners in joint marketing activities with third parties so that they can distribute prizes/gifts to you in a timely manner; when we are undergoing due diligence, etc.; Use based on academic research. For example, sharing with academic institutions the indirect user profiles formed by our use of your relevant information sets, as well as the analyzed/statistical information after de-identification or anonymization treatment for the purpose of academic research (without your consent, we will not share personal information that can identify you with them); when it is necessary for academic research institutions to conduct statistics or academic research based on the public interest and anonymize the personal information contained in the results when providing the results of academic research or descriptions to the outside world; Requests from competent authorities, requirements for litigation disputes, and other circumstances requiring sharing as stipulated by laws and regulations, etc. You can share your personal information or other information with third parties (including unspecified objects) based on the platform of the 52Phone.
However, in the event of information leakage, use, etc. caused by your sharing behavior, it has nothing to do with the 52Phone, and you need to bear the corresponding legal responsibilities on your own. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share the necessary personal information. When we share information with business partners, we will protect your personal information in multiple ways, including but not limited to:
(1) If there are the above reasonable reasons and your authorized consent is required, we will inform you of the purpose and type of the information to be shared before sharing (if it involves your personal sensitive information, we will also inform you of the content of the involved sensitive information), and will conduct the sharing only after obtaining your authorized consent;
(2) At the level of cooperation agreements, we will strictly require partners to fulfill their information protection obligations and responsibilities. To this end, our legal department requires business partners to sign a data security protection agreement with the 52Phone before cooperation. The agreement strictly stipulates the confidentiality obligations of business partners regarding user information, including that the storage, use and transfer of information should all meet our management and control requirements and be subject to our review and supervision. In case of any violation, they will have to bear corresponding legal responsibilities;
(3) In addition, our security team will conduct security assessments and processing on the output forms, circulation and use of information data. Please be aware that even if we have obtained your authorized consent, we will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will try our best to anonymize the personal information in the shared content. You understand and are aware that the anonymized information cannot point to or identify you and no longer belongs to personal information in the legal sense. Its processing, use, sharing and transfer do not require obtaining your authorized consent.
Transfer refers to the process of transferring the control right of personal information to other companies, organizations or individuals. In principle, we will not transfer your personal information, except in the following circumstances:
You request it on your own initiative;
We have obtained your explicit authorized consent in advance;
If we are involved in mergers, acquisitions, reorganizations, spin-offs, bankruptcies, asset transfers or similar transactions, and your personal information may be transferred as part of such transactions, we will require the new holder to continue to comply with and fulfill all the contents of this "Privacy Policy" (including the purpose of use, usage rules, security protection measures, etc.). Otherwise, we will require them to obtain your explicit authorized consent again;
Other circumstances stipulated by laws and regulations, etc.
If there is a genuine need for transfer due to the above reasons, we will inform you of the purpose and type of the information to be transferred before the transfer (if it involves your personal sensitive information, we will also inform you of the content of the involved sensitive information), and will conduct the transfer only after obtaining your authorized consent, except as otherwise provided by laws and regulations or agreed in this policy.
Public disclosure refers to the act of releasing information to society or an unspecified group of people. Except for necessary disclosures for essential matters such as issuing penalty announcements for violating accounts, fraud behaviors, etc., and desensitizing and displaying relevant information when publishing lists of winners, etc., we will not publicly disclose your personal information. If there is a reasonable reason that truly requires public disclosure, we will inform you of the purpose and type of the information to be publicly disclosed before the public disclosure (if it involves your personal sensitive information, we will also inform you of the content of the involved sensitive information), and will conduct the public disclosure only after obtaining your authorized consent, except as otherwise provided by laws and regulations or agreed in this policy.
Regarding your personal information that is publicly disclosed, we will attach great importance to risks. We will carefully examine its justifiability, rationality and legality at the first time upon receiving the application for public disclosure and will protect it by adopting personal information security protection measures and means that are no less than those stipulated in this "Privacy Policy" during and after the public disclosure.
Please be aware that even if we have obtained your authorized consent, we will only publicly disclose your personal information for legal, legitimate, necessary, specific and clear purposes, and will try our best to anonymize the personal information in the publicly disclosed content.
Exceptional Circumstances:
According to the provisions of laws and regulations, etc., in the following circumstances, sharing, transferring or publicly disclosing your personal information does not require obtaining your authorized consent in advance:
Directly related to national security and national defense security;
Directly related to public safety, public health and major public interests;
Directly related to criminal investigation, prosecution, trial and execution of judgments, etc., or as required by laws and regulations, administrative organs or competent authorities such as the public security organs, procuratorial organs and judicial organs;
For the purpose of safeguarding significant legitimate rights and interests such as your life and property or those of other individuals, but it is difficult to obtain your consent;
The personal information is publicly disclosed by you to the society on your own or collected from legally public channels (such as legal news reports, government information disclosure channels, etc.);
Necessary for signing and fulfilling relevant agreements or other written documents with you;
Other circumstances stipulated by laws and regulations, etc.
We will strictly conduct operations on sharing, transferring and publicly disclosing personal information in accordance with the agreements in this Privacy Policy and the requirements of relevant laws and regulations. If your legitimate rights and interests are damaged due to our faults, we are willing to assume corresponding liability for compensation for damages within the scope stipulated by law for our faults.
The personal information collected and generated during our operations within the territory of the People's Republic of China shall, in principle, be stored within China and stored for the storage period stipulated by the laws, regulations and departmental rules of the People's Republic of China.
1. We attach great importance to the security of your personal information. We strive to adopt various reasonable physical, electronic and managerial security measures to protect your personal information and make every reasonable effort to ensure that your personal information will not be leaked, damaged or lost, including but not limited to SSL, encrypted storage of information, and access control of data centers. We have also adopted strict management measures for employees or outsourced personnel who may have access to your personal information, including but not limited to implementing information access permission control, signing confidentiality agreements with personnel who have access to personal information, and monitoring the operation of such personnel.
2. Despite the agreement in Paragraph 1 above, please understand and be aware that due to various malicious means that are unpredictable or cannot be defended against by existing technologies, even though we have tried our best to take necessary protective measures, your information may still be leaked, damaged or lost. If you find that your account or password has been or is about to be leaked for any reason, you should contact us immediately so that we can take timely countermeasures to prevent or reduce your relevant losses.
3. In the event of corporate mergers, spin-offs or other circumstances, your information will continue to be protected by the surviving corporate entity at that time, and we will notify you by means of announcements, text messages or other written forms. If our products or services cease to operate, we will promptly stop collecting your information and notify you by means of announcements, text messages, etc. At that time, we will delete or anonymize your information.
In accordance with relevant laws, regulations and standards in China, as well as common practices in other countries and regions, we guarantee that you can exercise the following rights regarding your personal information:
1. Right of Access. You have the right to access your personal information, except in circumstances stipulated by laws and regulations. You can log in to your personal account at any time through relevant product pages to access personal information such as your personal profile in your account.
2. Right of Correction. When you find that there are errors in the personal information we process about you, you can modify the information through the query path.
3. Right of Deletion. In the following circumstances, you can submit a request to us to delete your personal information:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect and use your personal information without obtaining your consent;
(3) If our processing of personal information violates the agreement with you;
(4) If you no longer use our products or services, or you cancel your account;
(5) If we no longer provide products or services for you.
4. Right of Request. If you need a copy of your personal data, you can contact us. After verifying your identity, we will provide you with a copy of your personal information in our services (including basic profile and identity information), except as otherwise provided by laws and regulations or agreed in this policy.
5. Right of Revocation.
(1) For the information you actively provided on your own, you can choose to revoke your personal information.
(2) For the information you authorized us to use, you can revoke it in "52Phone". Please note that the path may vary on different devices. Please refer specifically to the instructions and guidelines of your device and system developer.
6. Right of Cancellation. If you decide to stop using the 52Phone, you can cancel your account. You can cancel it by yourself within the software or contact customer service to cancel the account.
Once the account is cancelled, the data in this account cannot be recovered, including but not limited to the asset information in the account such as the cloud phone device package, etc., and all the account information content will also be completely cleared. This cancellation operation cannot be undone, so please apply with caution.
7. Right to Be Informed in Advance of the Suspension of Product/Service Operations. We will continue to provide you with high-quality services. If due to special reasons, some or all of our products/services are forced to suspend operations, we will notify you in advance by posting announcements in prominent positions, sending push messages or through other means. Meanwhile, we will stop collecting your personal information. And after exceeding the necessary period stipulated by laws and regulations, we will delete or anonymize the personal information we hold.
8. Right to Feedback and Seek Help. We have provided you with multiple feedback channels. For specific details, please refer to the "How to Contact Us" section of the Privacy Policy.
9. In the following circumstances, in accordance with the requirements of laws and regulations, we will be unable to respond to your requests regarding the right of access, the right of correction, the right of deletion, the right of revocation, the right of cancellation, and the right of request:
(1) Those related to the fulfillment of obligations stipulated by laws and regulations by the personal information controller;
(2) Those directly related to national security and national defense security;
(3) Those directly related to public safety, public health, and major public interests;
(4) Those directly related to criminal investigation, prosecution, trial, and the execution of judgments, etc.;
(5) Where the personal information controller has sufficient evidence indicating that the personal information subject has subjective malice or abuses rights;
(6) When it is for the purpose of safeguarding the significant legitimate rights and interests such as the life and property of the personal information subject or other individuals, but it is difficult to obtain the authorization and consent of the person concerned;
(7) Where responding to the request of the personal information subject will lead to serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;
(8) Those involving trade secrets.
(9) Other circumstances stipulated by laws and regulations.
Users agree that personal privacy information refers to the information that can identify users personally or involves personal communications, including the following information: users' real names, ID numbers, mobile phone numbers, and IP addresses. While non-personal privacy information refers to the basic record information that clearly and objectively reflects users' operation status and usage habits on the server side of 52Phone., as well as other ordinary information outside the scope of all personal privacy information; and the above privacy information that users agree to disclose.
This software only provides cloud phone services. This software will not actively collect users' accounts and personal information when using third-party software and games within the cloud phone. However, since other third-party software and games you use will automatically save account passwords and personal privacy information in the hardware storage of the cloud phone, after your cloud phone service expires, the system will automatically clean up the information of the cloud phone you have used to fully ensure that your personal data and privacy information will not be used for other purposes.
Respecting the privacy of users' personal privacy information is a consistent policy of the 52Phone service provider. The 52Phone service provider will take reasonable measures to protect users' personal privacy information. Except for reasons such as requirements from legal or government departments with legal authorization or users' consent, the 52Phone service provider will not disclose or reveal users' personal privacy information to third parties other than cooperative units without users' consent. However, this does not apply if users choose to agree when registering an account or if there are other agreements between users and the 52Phone service provider and cooperative units regarding the disclosure or use of users' personal privacy information. Meanwhile, users shall bear any risks that may arise therefrom on their own, and the 52Phone service provider will not be responsible for this. Meanwhile, in order to operate and improve the technology and services of the 52Phone service provider, the 52Phone service provider may collect, use or provide third parties with users' non-personal privacy information on its own, which will help 52Phone provide users with a better user experience and improve the service quality of 52Phone.
To protect users' personal privacy information, the 52Phone service provider has formulated the following four privacy protection principles to guide the handling of issues related to users' privacy rights and user information in products:
1. Use the information we collect to provide users with valuable products and services.
2. Develop products that comply with privacy standards and privacy practices.
3. Make the collection of personal information transparent and supervised by an authoritative third party.
4. Make every effort to protect the information in our possession.
We recommend that any minor should obtain the prior consent of their parents or other guardians (hereinafter referred to as "guardians") before participating in online activities. We will protect the relevant information of minors in accordance with the provisions of relevant national laws and regulations.
We attach great importance to the protection of minors' personal information. If you are a minor under the age of eighteen, please read this privacy policy carefully under the guidance of your guardian and use our services and submit your personal information only with the consent of your guardian. If your guardian does not agree to this privacy policy, you should immediately stop using the services of the 52Phone and refuse to provide personal information.
If you are a minor under the age of fourteen, please notify your guardian to read and accept our "Privacy Policy for Child Users of the 52Phone" together and seek the consent and guidance of your guardian before you use the services of the 52Phone and submit personal information.
For the children's personal information collected with the consent of the guardians, we will only use or disclose such information within the scope permitted by laws and regulations, with the explicit consent of the guardians or for the protection of child users. For personal information provided by child users without the consent of their guardians, we will delete the relevant information as soon as possible upon receiving the notice from their guardians.
If you have any questions (including inquiries, complaints, etc.) regarding the implementation of this "Privacy Policy" or matters related to privacy protection when using our services, you can contact our staff at any time.
We may modify this privacy policy from time to time. The changed privacy policy will be notified to you through announcements on the 52Phone platform or in other appropriate ways before the revised version takes effect. In such cases, if you continue to use our services, it means that you agree to be bound by the revised privacy policy.
1. The signing, coming into effect, performance and settlement of disputes regarding this privacy policy shall all be governed by the laws of the People's Republic of China.
2. Disputes regarding this agreement shall be resolved through friendly consultations. If the consultations fail, the disputes shall be submitted to the court with jurisdiction in the location of the company for litigation.
Please read and abide by this privacy policy and disclaimer carefully when using this software.
The service provider of the 52Phone has the right to interpret and modify this agreement within the maximum scope permitted by law.
The 52Phone attaches great importance to the protection of minors and is committed to fulfilling corporate social responsibilities. “The Rules for Protecting Children's Personal Information on the 52Phone" (hereinafter also referred to as "the Rules") are intended to explain to guardians (hereinafter also referred to as "you") and children in more detail how we collect, use, store and process children's personal information, as well as the ways we provide for you and children to access, correct, delete and protect this information. If you are the guardian of a child user, please read the Rules carefully, fully understand them, and then decide whether to agree to the Rules and whether to allow you and the child under your guardianship to use our products/services.
The "Rules for Protecting Children's Personal Information on the 52Phone" (hereinafter also referred to as "the Rules") only apply to independent children's apps that are mainly targeted at the children's group and provide exclusive content for children (also referred to as "children's apps" in the Rules). The "Privacy Policy " demonstrates the general practices of the 52Phone in collecting, using, processing and protecting personal information. The Rules are part of the "Privacy Policy". In terms of the rules for protecting children's personal information, if there are inconsistencies between the Rules and the main text of the "Privacy Policy", the Rules shall prevail. If something is not mentioned in the Rules, the actual situation of the product shall be referred to for application, or the main text of the "Privacy Policy" shall be applied by reference, or it shall be subject to the separate explanations of the 52Phone. Unless otherwise stated in the Rules, the meanings of the terms involved in the Rules are the same as those in the main text of the "Privacy Policy".
We will strictly fulfill our obligations and responsibilities for protecting children's personal information as stipulated by law and collect and use children's personal information in accordance with the principles of being legitimate, necessary, based on informed consent, having clear purposes, ensuring security and making legal use. We will not collect children's personal information that is irrelevant to the products/services we provide, nor will we collect or use children's personal information in violation of legal provisions and our agreements with you. The types of children's personal information we collect and use fall into two categories:
The first category: Information essential for the core business functions of children's apps. Such information is necessary for the normal operation of children's apps, and you must authorize us to collect it. If you refuse to provide it, you and the child will not be able to use our products/services normally.
The second category: Information that may need to be collected for the additional business functions of children's apps. This information is not required for the core business functions, and you can choose whether to authorize us to collect it. If you refuse to provide it, it will lead to the inability to realize the additional business functions or to achieve the intended service effects, but it will not affect your and the child's normal use of the core business functions.
For children's personal information, we will only share it within the purposes and scopes described in the Rules or in accordance with legal requirements, unless one or more of the following situations exist: Sharing with you as the guardian. Having obtained your explicit authorized consent in advance. For the purpose of smoothly carrying out necessary/reasonable business, meeting the requirements of you and children, fulfilling our obligations in relevant user agreements or the Rules, exercising our rights or complying with legal provisions, etc., necessary sharing with service providers that provide functional support for our children's apps. However, we promise that we will only share the necessary personal information of children. If we need to change the processing purposes of children's personal information, we will seek your authorized consent again. Please rest assured that we will conduct security assessments on service providers and their service behaviors, sign agreements, clarify responsibilities, processing matters, processing periods, processing natures and purposes, etc., and require that their processing behaviors shall not exceed our authorized scope. Requests from competent authorities and other situations stipulated by laws and regulations.
We will strictly fulfill our obligations and responsibilities for protecting children's personal information as stipulated by law, and transfer and publicly disclose children's personal information in accordance with the principles of being legitimate, necessary, based on informed consent, having clear purposes, ensuring security and making legal use. If you want to know more, please refer to Chapter IV of the main text of the "Privacy Policy".
We provide you and children with multiple functions to exercise control rights over children's personal information in children's app. You can manage children's personal information and children's online lives through these functions, including:
1. Right of Access
You or the child can query and access the relevant personal information of the child in the children's app, such as personal profile information, purchase records, search records, collection records.
2. Right of Correction/Modification
You can correct/modify the relevant personal information of the child in the children's app, such as personal profile information; or you can contact us to solve the problem. We will conduct corrections/modifications after verifying your identity and without affecting the objectivity and accuracy of the information. However, for the sake of security and identity recognition, you may not be able to modify certain initial registration information submitted during registration. Meanwhile, if you or the child discovers that there are errors in the children's personal information collected, stored, used or disclosed by us, you can contact us for correction. We will take timely measures to correct it after completing identity verification and verifying the problem.
3. Right of Deletion
You and the child can delete the relevant personal information of the child by yourselves in the children's app, such as search records, download records, collection records. Please note that if you and the child delete by yourselves or request us to delete specific children's personal information (such as registered accounts), it may lead to the inability to continue using all or part of our products/services. In the following situations, you or the child can directly submit a request to us to delete children's personal information. We will take timely measures to delete it after completing identity verification and verifying the problem, including: We violate the provisions of laws and regulations or our agreements with you in collecting, storing, using, transferring or disclosing children's personal information. We collect, store, use, transfer or disclose children's personal information beyond the purpose range or the necessary time limit. You withdraw your consent. You or the child terminates the use of our children's apps through cancellation or other means. Other situations stipulated by laws and regulations.
4. Right to Be Informed in Advance of the Suspension of Product/Service Operations
We will continue to provide you with high-quality services. If due to special reasons, some or all of our products/services are forced to suspend operations, we will notify you in advance by posting announcements in prominent positions, sending push messages or in other ways, and will stop collecting children's personal information and delete or anonymize the children's personal information held by us.
We store children's personal information within the territory of the People's Republic of China in accordance with the provisions of laws and regulations. We only retain children's personal information for the period that is necessary for the purpose of providing our products and services and is the shortest. After exceeding the above storage period, we will delete or anonymize children's personal information. We have adopted multi-level protection measures such as security technical measures that meet industry standards, as well as supporting organizational structures and management systems to protect children's personal information. Meanwhile, we follow the principle of minimum authorization, set strict information access rights for staff, control the scope of knowledge of children's personal information, and also take necessary technical measures to prevent illegal copying and downloading of children's personal information.
If you have any questions (including inquiries, complaints, etc.) regarding the implementation of the Rules or matters related to children's privacy protection when using children's apps, you can contact us. We have dedicated personnel responsible for handling this, and we will do our best to provide you with satisfactory solutions.
We may modify the Rules from time to time. The changed rules will be notified to you through announcements on the 52Phone platform or in other appropriate ways before the revised version takes effect. If you continue to use our services, it means that you agree to be bound by the revised rules.
1. The signing, coming into effect, performance and settlement of disputes regarding the Rules shall all be governed by the laws of the People's Republic of China.
2. Disputes regarding the Rules shall be resolved through friendly consultations. If the consultations fail, the disputes shall be submitted to the court with jurisdiction in the location of the company for litigation.