Privacy Policy
Summary
Welcome to choose the network services provided by Chengdu Light Fox Technology Co., Ltd. (hereinafter referred to as "our company" or "we"). We hereby formulate this "Game User Personal Information and Privacy Protection Policy" (hereinafter referred to as "this policy") to inform you how we collect, store, use, share, transfer, publicly disclose, and delete your personal information, as well as your related rights. We attach great importance to the protection of your personal information and fully respect your user rights. Please read this policy carefully and make appropriate choices according to the guidance of this policy. Before using our products and services, please read this policy carefully, especially the clauses marked in bold.You should focus on reading and start using our products and services only after fully understanding and agreeing to this policy. If you disagree with any content of this policy, you should immediately stop using our products and services.
The key points of this policy are as follows:
- In order to provide you with products and services, we need to collect your personal basic information, personal identity information, device information, and log information, and obtain related permissions related to personal information.
- We will store the collected personal information in the territory of the People's Republic of China and take multiple security measures to ensure the security of your personal information.
- We attach great importance to the protection of minors. If you are a minor or its legal guardian, please read the provisions on minors in Chapter 8 of this policy carefully. If you are a minor under 14 years old (inclusive) or its legal guardian, please visit the "Children's Privacy Protection Policy."
- You can view the collection and sharing of your personal information in this policy.
- You can manage your personal information and related authorizations according to the guidance of this policy.
-
1. Personal information we collect
When you use our company's products and services, we will collect personal information that you actively provide or generate due to using the services in the following ways. You have the right to choose which personal information to provide to us, but in some cases, if you choose not to provide it, you may not be able to obtain certain services you need or your problems may not be responded to or solved.
-
1.1 Information you may actively provide
-
1.1.1 When you use the account registration or login function, we will obtain the personal basic information you provide to us during registration or login, including mobile phone number and SMS verification code. If you choose not to provide it, you may not be able to use our products or services through registration or login.
-
1.1.2 To meet the requirements of relevant laws, regulations, policies, and relevant competent authorities, you need to undergo real-name authentication when you start or continue to use our game services.We will collect your real-name identity information, including your name and ID number, with your consent or actively provided. Personal identity information belongs to personal sensitive information. If you refuse to provide personal identity information, you may not be able to use our game services or be subject to corresponding restrictions during the use of game services. To achieve the purpose of real-name authentication, you agree that we can provide, query, and verify your aforementioned identity information to relevant agencies by ourselves or entrust third parties.
-
1.1.3 If you are willing to participate in related activities or surveys organized by our company, you may need to provide additional personal basic information and personal education and work information, including your gender, occupation, industry, personal interests, game usage behavior and habits. This information will help us understand the operation of our products and improve our service design based on feedback. We will obtain your authorization before inviting you to participate in relevant activities. If you choose not to provide this information, you may not be able to participate in the activity, but it will not affect your use of basic service functions.
-
1.1.4 If you use the information production, publication, sharing, communication, and interaction functions in our products or services, you may actively provide related graphic, video, sharing, and interactive behavior information. We will collect and record your above information, display your nickname, avatar, and published information content to provide social functions for you and save historical records.Please note that the information you upload or publish in public areas may be collected and used by others, and these information may include personal sensitive information. To protect your personal and property safety, please provide it carefully. If you do not agree to our collection of the above information, you will not be able to use our social functions, but it will not affect your use of other functions in our products or services.
-
1.1.5 When you interact with our customer service or use the user response function, including online submission of feedback, communication with online/human customer service, for the security of your account and system, we may need you to provide account information first, and match it with the personal information you previously provided to verify your user identity. When you use the customer service or user response function, we may also need to collect your contact information (phone number and email address you use to contact us) and communication records with us, as well as necessary information related to your needs, among which communication records and content belong to personal sensitive information. We collect this information to investigate facts and help you solve problems. If you refuse to provide it, you may not be able to use our user response mechanism.
-
-
1.2 Information we collect during your use of the service
-
1.2.1 In order to maintain basic business functions and ensure your normal use of our service, we will collect the following information during your use of our company's service:
-
To ensure the security of your account, we will collect information about the device you use to prevent loss of user account data after user account changes, including the brand, model, version, configuration (including storage memory), external storage, device MAC address, OAID (Android system), AndroidID (Android system), platform, language, IP address, and UUID (iOS system) of your mobile device;
-
In order for you to view your history records in the client, and for our operational statistics analysis, customer complaint handling, and service experience analysis, we will collect your log information, including login logs, item logs, friend records, browsing and clicking records, and product or service log information. Browsing and clicking records are personal sensitive information, and collecting the above information is necessary to retain your history records. If you refuse to provide it, you will not be able to view your history records in the client.
-
When you use the consumption function, we will collect your recharge records and consumption records, so that you can query your transaction records and protect your property safety to the greatest extent possible.Please note that recharge records and consumption records are personal sensitive information, and collecting the above information is necessary to realize the consumption function. If you refuse to provide it, you will not be able to complete the transaction.
-
When you access specific feature pages of the product, we will read your clipboard content to determine whether there is relevant password code information (including invitation codes and redemption codes). We will only collect the password code if the clipboard contains the aforementioned information to provide you with the content you need. We will not store any other information in your clipboard. Redemption codes are personal sensitive information, so please provide them with caution. If you refuse to provide it, you will only be unable to use this feature, but it will not affect your normal use of other functions of the product or service.
-
-
1.2.2 When you use our product or service, we will apply for system permissions related to personal information. If you do not agree to authorize, it may result in the inability to use related services. You can choose whether to authorize us to collect relevant information through the settings of your mobile device. By enabling the corresponding permissions, you authorize us to access, obtain, collect, and use personal information related to that permission. When you cancel this authorization, we will no longer collect this information and will not be able to provide you with corresponding functions.
-
-
1.3 Information obtained from third parties
In order to facilitate your login and use of the services we provide, we may obtain relevant information authorized by you to be shared from third-party partners. We will collect your information reasonably in accordance with relevant laws and regulations, based on the premise that the information provided by affiliates or third-party partners is legal and authorized, including the following situations:
-
1.3.1 When you download or purchase company products or services through the Apple App Store or major Android app stores, we obtain your information from such app stores, which may include your phone number and account information.
-
1.3.2 If you authorize the use of third-party accounts including Weibo, WeChat, QQ, or various mobile brand user accounts to log in and use our services, we will obtain relevant information authorized by you to be shared under that third-party account, including your profile picture, nickname, and authentication information. The specific content is subject to your authorized content. We will bind your third-party account with our service account so that you can log in and use our services directly through your third-party account.If you refuse to authorize such information, you will not be able to log in and use our services through third-party accounts. If you want to invite you and your friends to use our products or services or share with your friends, after your authorization, we will obtain your third-party authorized login account's friends list so that you can interact with your friends. The friends list is personal sensitive information, so please provide it carefully. If you refuse to provide the list, you will not be able to add friends to our products or services through the friends list of the third-party authorized login account, but it will not affect your use of other functions of our products or services.
-
-
1.4 Exceptions to obtaining authorization and consent.According to relevant laws, regulations, and national standards, we may collect and use your personal information without your authorization and consent in the following situations:
-
1.4.1 Related to the obligations stipulated by laws and regulations that our company needs to fulfill;
-
1.4.2 Directly related to national security, national defense security, public security, public health, public network security, network environment governance, and major public interests;
-
1.4.3 Directly related to criminal investigation, prosecution, trial, and execution of judgments;
-
1.4.4 Difficult to obtain your personal consent but necessary to protect your or other individuals' major legitimate rights and interests;
-
1.4.5 The personal information involved is voluntarily disclosed by you to the public;
-
1.4.6 Necessary for signing and performing contracts at your request;
-
1.4.7 Your personal information collected from legally publicized information, such as legal news reports, government information disclosure, and necessary for conducting legal news reports;
-
1.4.8 Necessary to maintain the security, quality, and stable operation of the products or services provided and prevent harmful operational security behaviors;
-
1.4.9 Necessary for public interest statistical or academic research, and when providing academic research or description results to the public, de-identification processing is conducted on the personal information contained in the results;
-
1.4.10 Other situations stipulated by laws and regulations.
-
-
-
2. How we use Cookies and similar technologies
In order to analyze and improve the operation of our network products and services, we use several automatic data collection tools, including Cookies and Web beacons. With these technologies, we can identify your product usage and prevent fraud. We promise not to use the above technologies for any purposes other than those described in this policy. If your device or related program allows it, you may disable or delete these technologies by changing your settings or visiting the provider's website. However, this may affect your service experience, and some services may not function properly.
-
3. How we store personal information
We will follow the principle of minimizing personal information storage time in accordance with relevant laws and regulations to reasonably store your personal information.
-
3.1 Storage method and duration
We will store your information, including local storage (such as using the APP for data caching), databases, and server logs, through AES and RSA encryption methods.
During your use of our services, we will continue to store your personal information. If you cancel your account or our product is discontinued, we will keep network logs for three years from the date of cancellation or discontinuation. For other data retention periods, we promise to keep them for the shortest period necessary to provide services. After exceeding the above period, we will delete or anonymize your relevant information.
-
3.2 Storage location
The personal information we collect and generate in the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.
-
3.3 How your personal information is transferred globally
As we provide products or services through resources and servers around the world, this means that, with your authorized consent, your personal information may be transferred to overseas jurisdictions where you use the product or service, or may be accessed by jurisdictions outside of these locations. Such jurisdictions may have different data protection laws, or may not even have relevant laws. In such cases, we will ensure that your personal information is adequately protected within the People's Republic of China. For example, we will request your consent for the cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.
-
-
4. How We Protect Your Personal Information
We highly value the protection of your personal information and have adopted AES and RSA technologies to ensure the security of your personal information.
-
4.1 We have used security measures that comply with industry standards to protect the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage or loss of data. We use a variety of security technologies and procedures to protect your personal information:
-
4.1.1 We enable SSL protocol to provide encryption protection when exchanging data (such as credit card information) between your browser or application and the server;
- 4.1.2 We use encryption technologies such as transport layer security protocol to provide browsing services through HTTPS, ensuring the security of your data during transmission;
-
4.1.3 We ensure that third parties can only access our shared API interface through HTTPS, and we only provide account authentication functions, so third parties cannot access your personal information. At the same time, we have adopted comprehensive measures to prevent SQL injection attacks on the database system;
-
4.1.4 We use encryption technology to encrypt and store your personal information, and your password is encrypted using techniques such as double MD5, making it ciphertext information;
-
4.1.5 In some services, we may also remind you to change your password by phone, SMS, etc.
-
-
4.2 We only allow employees of companies and affiliates who need to know this information, as well as partners who have a business need to access your personal information, and have set strict access control and monitoring mechanisms for this purpose. We also require all personnel who may come into contact with your personal information to fulfill corresponding confidentiality obligations.
-
4.3 The Internet is not an absolutely secure environment, and communication methods such as email, instant messaging, and social software with other users cannot be determined to be fully encrypted. We suggest that you use complex passwords or change your account password regularly when using such tools, and pay attention to protecting your personal information security.
-
4.4 We will do our best to ensure the security of the information you send to us. If our physical, technical, or managerial protection facilities are maliciously destroyed, resulting in unauthorized access, disclosure, tampering, or destruction of information, and causing damage to your legitimate rights and interests, we will assume corresponding legal responsibility.
-
4.5 In the event of a personal information security incident, we will promptly inform you in accordance with legal and regulatory requirements: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to take measures to prevent and reduce risks, and remedial measures for you, etc. We will inform you of the relevant situation of the incident in a timely manner through email, letter, phone call, push notification, etc. When it is difficult to inform the individual information subject one by one, we will adopt reasonable and effective methods to release announcements. At the same time, we will actively report the disposal of personal information security incidents to regulatory authorities as required.
-
-
5. How We Use Your Personal Information
We will reasonably use your personal information within the scope covered by this clause and fully respect your user's autonomous choice. If we use your personal information beyond the scope of the stated purpose at the time of collection, we will inform you before use and obtain your authorization again.
-
5.1 We may use the collected information for the following purposes:
-
5.1.1 Provide various functions and services within the product to you;
-
5.1.2 Use for identity verification, customer service, security prevention, fraud monitoring, archiving and backup when we provide services to you, ensuring the security of the products and services we provide to you;
-
5.1.3 Statistics on your use of our services to show the overall usage trend of our services, but these statistics do not include any identification information about you;
-
5.1.4 Evaluate the effectiveness of advertising, promotions, and promotional activities in our services and improve them;
-
5.1.5 Software authentication or management software upgrade;
-
5.1.6 Invite you to participate in surveys related to our products and services.
-
-
5.2 We may send you advertising and marketing information through your email, mobile phone text messages, or contact information to provide or promote products and services of our company or third parties. You can find relevant prompts in the information you receive, and you can choose to unsubscribe or cancel subscription according to the prompts.
-
5.3 We may issue announcements related to services to you when our services change. You may not be able to cancel or restrict these announcements that are related to services and do not belong to promotions.
-
5.4 We will use the collected information within the scope covered by this policy. If we use your personal information beyond the scope of the stated purpose at the time of collection and within the scope of direct or reasonable relevance, we will inform you again and obtain your express consent before using your personal information.
-
-
6. How we share, transfer, and disclose your personal information
-
6.1 Sharing
In order to achieve business functions, we may share your personal information with third parties to provide you with the services or specific functions you need. If we need to share your personal sensitive information, we will request your authorization and consent again. We will only share your personal information for legitimate, lawful, necessary, specific, and clear purposes, and only share necessary personal information. We will strictly limit the behavior of third parties using your personal information through agreements, ensuring that third parties handle personal information according to our requirements, this policy, and any other relevant confidentiality and security measures. At the same time, we will take effective technical protection measures to ensure the security of your personal information during sharing. We will try to anonymize personal information in shared content. You understand and agree that information anonymized in this way cannot be identified or linked to you, is no longer personal information in the legal sense, and its processing, use, sharing, and transfer do not require your authorization and consent.
Currently, we need to share your personal information in the following situations:
-
6.1.1 For the convenience of providing consistent services to you based on the company's unified account system and for the convenience of unified management, and to ensure system and account security, your personal information may be shared within our company's products.
-
6.1.2 In order to ensure the implementation and stable operation of the product-related functions, some services will be provided by third parties. When you use the corresponding functions, we will share your personal information with third parties, including through software development kits (SDKs) or other similar applications. When you use such third-party services in our products, you agree to let them directly collect and process your personal information. We will strive to review the business access qualifications of the third party and strive to require their legality, compliance, and security. To maximize the security of your information, we strongly recommend that you review the privacy terms of the third-party service provider before using their services. To protect your legitimate rights and interests, if you find that the third-party service provider's services have risks, we suggest that you terminate the relevant operations immediately and contact us in time.
-
-
6.2 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following cases:
-
6.2.1 In special circumstances, with your explicit authorization and consent, we will transfer your personal information to other parties.
-
6.2.1 In special circumstances, with your explicit authorization and consent, we will transfer your personal information to other parties.
-
-
6.3 Public disclosure
We will only disclose your personal information in the following situations:
-
6.3.1 With your explicit authorization and consent.
-
6.3.2 Disclosure based on prize-winning activities: when announcing the list of winners, we will display the winner's phone number or login name in a desensitized manner.
-
6.3.3 Disclosure based on legal requirements: in the case of legal, legal procedures, litigation, or mandatory requirements from government authorities, we may publicly disclose your personal information.
-
-
6.4 Social network
Our social network service is designed to allow you to communicate with users from all over the world, and you can make real-time communication information widely spread. When you use the social network function in our service, you may share some personal information. We provide you with user scope control over personal information sharing in some services, and you can also request that we delete your relevant personal information.
-
6.4.1 Personal information you may share through social networks: including the information you upload or publish in our service (including your public personal information), your responses to information uploaded or published by others, your achievements, rankings, and location data and log information related to these information. If you do not agree to disclose the aforementioned personal information in the product, you can close it according to the product's guidance.
-
6.4.2 Other users may share information related to you through social networks.
-
6.4.3 About sharing information deletion: As long as you do not delete shared information, the information will remain in the public domain. Even if you delete shared information, the information may still be independently cached, copied, or stored by other users or non-affiliated third parties that are not under our control, or saved by other users or such third parties in the public domain.
-
6.4.4 Our protection of your shared information on social networks: In some cases, you can control the user range authorized to browse your shared information through the privacy settings of some of our services. You can also request that we delete your relevant information from our service. Please contact us through the contact information described in Chapter 10.
-
-
6.5 Exceptions to obtaining authorization and consent before sharing, transferring, and disclosing personal information.According to relevant laws and regulations, we do not need to obtain your authorization and consent before sharing, transferring, and disclosing personal information in the following situations:
-
6.5.1 Related to the company fulfilling its legal obligations.
-
6.5.2 Directly related to national security and national defense.
-
6.5.3 Directly related to public safety, public health, and significant public interests.
-
6.5.4 Directly related to criminal investigation, prosecution, trial, and execution of judgments.;
-
6.5.5 Difficult to obtain your personal authorization and consent for the protection of your or other individuals' significant legitimate rights and interests.;
-
6.5.6 Personal information that you voluntarily disclose to the public.;
-
6.5.7 Personal information collected from legally publicized information, such as legal news reports and government information disclosure channels.
-
-
-
7. Scope, Changes, and Exceptions of this Policy
-
7.1 Scope
This policy applies to the network services provided by our company. When you use any individual product or service we provide, if that product or service has a specific privacy policy, we will provide more specific information on how we use your personal information in the corresponding privacy policy ("Specific Policy"). The Specific Policy is part of this policy and has the same effect as this policy. If there is any inconsistency between the Specific Policy and this policy regarding the same terms, the Specific Policy shall prevail within its scope.
Our products may include links to third-party services to help you access third-party services or websites. Please be aware that these third-party services are provided by the relevant third-party operators. To protect your legitimate rights and interests, please read the privacy policy guidance of the relevant third party carefully.
-
7.2 Changes to this Policy
We may revise this policy based on our company's business or policy adjustments. To ensure your right to know as a user, we will prompt you to read and reauthorize us through in-app pop-up windows before the revised policy takes effect. If we make significant changes to this policy, we will also provide more prominent notices. Significant changes referred to in this policy include but are not limited to:
-
7.2.1 When there are significant changes to our service model, such as the purpose of processing personal information, the types of personal information processed, and the ways personal information is used;
-
7.2.2 When there are significant changes to our ownership structure, organizational structure, and other aspects, such as business adjustments, bankruptcy mergers, and changes in ownership caused by other factors;
-
7.2.3 When there are significant changes to the main objects of personal information sharing, transfer, or public disclosure;
-
7.2.4 When there are significant changes to your rights and ways of exercising them in personal information processing;
-
7.2.5 When there are significant changes to the department responsible for personal information security, contact methods, and complaint channels;
-
7.2.6 When our personal information security impact assessment report shows high risks.
-
-