Privacy Matters

Our Commitment to Clients

We respect your privacy and are committed to protecting your personal information. Our privacy policy clearly explains how we collect, use and maintain your data. Please rest assured that all information we collect is only used to provide better services and will strictly comply with laws and regulations.

Privacy Policy

This version was published on : November 8 , 2024​​​​​​

Effective date : November 8 , 2024​​​​​​

[Beijing Oriental Green Culture Media Co., Ltd.] (hereinafter referred to as “we” or “the Company” ) is fully aware of the importance of personal information security. We will follow the provisions of laws and regulations, follow the principles of legality, legitimacy and necessity, and adopt security protection measures to protect your personal information and privacy.

We have formulated this Privacy Policy (hereinafter referred to as “this Policy”) and remind you that this Policy is closely related to your use of our services. When you download, install, open, browse, register, log in, use (hereinafter collectively referred to as “use”) the Engineering Machinery CCM software and related services (hereinafter referred to as ” this Software “), we will collect, save, use, share, disclose and protect your personal information in accordance with this Policy. Therefore, before you use this Software , please be sure to read and fully understand this Policy, and use related products and services only after you fully understand and agree to it.

This policy is formulated in accordance with relevant laws and regulations on data protection in China. The “personal information” referred to in this policy refers to various information related to identified or identifiable natural persons recorded electronically or otherwise, including name, ID number, mailing address, address, account information, property status, whereabouts, etc. Personal information includes sensitive personal information as stipulated in relevant laws and regulations in China. Sensitive personal information includes information such as biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts, and personal information of minors under the age of fourteen .

We recommend that you carefully read and understand the entire content of this policy and make the choices you deem appropriate. We strive to express it in plain, concise and concise language, and use bold fonts to mark the clauses and sensitive personal information in this policy that are of great relevance to your rights and interests to remind you to pay attention. If we change this policy, we will promptly publish the latest version of this policy in this software and prompt you to read the changes. If you agree and continue to use this software , it means that you agree to the content of this policy (including updated versions) and agree that we collect, save, use, share, disclose and protect your relevant information in accordance with this policy .

This policy does not apply to:

Information collected by other third-party products or services (including any third-party websites) accessed through our services, which may include products or services and advertising content displayed to you in personalized recommendations or other products or services linked to in the Software ;

Information collected by other third parties for advertising services related to the Software; and

Information collected by other companies or organizations that conduct advertising activities in this software .

Your use of these third-party services (including any personal information you provide to these third parties) will be subject to the service terms and privacy policies of these third parties (not this Policy). Please carefully read the third-party terms provided in the form of links in this Privacy Policy or displayed separately when you use related functions for specific provisions. Please properly protect your personal information and provide it to third parties only when necessary.

Please understand that the client and related services described in this policy may vary depending on factors such as the model, system version, software application version, etc. of the device on which you load the client. The final products and services are subject to the software client you use.

We will explain the relevant matters to you through this policy , the key points of which are as follows:

i . We will explain the types of your personal information we collect and their corresponding purposes one by one, so that you can understand the specific categories of personal information we collect for a specific function, the reasons for use and the collection method.

  1. When you use some functions, we will collect some of your sensitive information after obtaining your consent, for example, we will collect your location information when you open this software. Unless the collection is required by relevant laws and regulations, refusing to provide this information will only make you unable to use the relevant specific functions, but will not affect your normal use of other functions.

iii. At present, this software will not actively share or transfer your personal information to third parties outside of our company. If there are other situations in which your personal information is shared or transferred or you need us to share or transfer your personal information to a third party outside of our company, we will directly or confirm that the third party obtains your explicit consent to the above actions.

  1. At present, this software will not actively obtain your personal information from third parties outside the company. If we need to obtain your personal information indirectly from a third party for business development in the future, we will clearly inform you of the source, type and scope of use of your personal information before obtaining it. If the personal information processing activities required by this software to carry out business exceed the scope of your original authorization and consent when providing personal information to a third party, we will obtain your explicit consent before processing your personal information; in addition, we will strictly abide by the provisions of relevant laws and regulations and require third parties to ensure the legality of the information they provide.
  2. You can access, correct, and delete your personal information through the methods listed in this policy . You can also withdraw your consent, cancel your account, and report it.

This policy will help you understand the following:

  1. Scope and Methods of Personal Information Collection
  2. How Personal Information is Used

III. Entrusted Processing, Sharing, Transfer and Public Disclosure of Personal Information

  1. Storage of Personal Information
  2. Personal Information Security Protection
  3. Management of Personal Information

VII. Our special protection of personal information of minors and children

  1. Updates to this Policy
  2. Contact Us
  3. Scope and Methods of Personal Information Collection

When you use this software , we need to collect, store and use your information, which will be used to provide you with services. If you do not provide relevant information, you may not be able to register as our user or enjoy certain services we provide, or achieve the intended effects of related services. If you terminate the use of this software , we will stop collecting and using your personal information, unless otherwise provided by laws and regulations .

In accordance with the relevant laws and regulations of the People’s Republic of China, when you use some services of this software , you should provide your real identity information through your account. We will assist you in choosing an appropriate method to complete real-name verification based on your identity attributes.

  1. Information you provide to us for using this software

1.1 You choose to log in to this software using your mobile phone number and password . Collecting your mobile phone number is necessary to create an account for you .

1.2 If you use other third-party accounts (WeChat, Apple ID (iOS only)) to log in to this software , we will obtain your mobile phone number with your consent, and may obtain the account name, account nickname , email address and account avatar that you authorize to share from the third party, and bind your third-party account with your account of this software after you agree to this policy , so that you can log in and use this software directly through the third-party account . We will use your above personal information in accordance with the agreement with the third party and after confirming the legitimacy of the source of personal information, subject to the relevant laws and regulations. If you refuse to agree to us obtaining your mobile phone number, you will not be able to complete the login of this software using other third-party accounts , but you can still use other functions of this software .

1.3 After you log in to this software , you can click “Edit Information” in the ” Personal Center ” interface to enter “Information Editing” to change your avatar. You can also freely choose whether to edit your nickname and gender, and fill in your birthday and personal profile . Please note that this information belongs to your personal information and will be displayed in this software . It is recommended that you fill it out carefully. You can set your avatar and nickname according to your own preferences. In order to make you use this software better , you can select your subdivision in the “User Tag” interface when you register. We will recommend different information, articles and activities to users in different subdivisions .

1.4 You can use the ” Personal Center – Feedback” interface to provide us with feedback on problems you encounter while using this software , select the type of feedback, and provide your opinions and suggestions . You can upload photos in the feedback content (take photos or select from the gallery), and we will ask for access to your “Camera” or “Album” through pop-up windows. If you do not agree to our obtaining these permissions, you will not be able to add pictures to the feedback content. In order to provide you with immediate feedback on our processing results, we need to collect your mobile phone number .

Edit Profile on the ” Personal Center ” interface to enter ” Profile Edit ” and change your profile picture by taking a photo or selecting a photo from the gallery. We will ask for access to your “Camera” or “Album” through a pop-up window. If you do not agree to us obtaining these permissions, you will not be able to change your profile picture.

Information we automatically collect from your use of this software

2.1 Log Information. When you use this software , we will automatically collect your use of our services and save them as relevant network logs, including your user UID, search query content, IP address, browser type, language used, date and time of access to the service, and personal online records (including web browsing records, click records, favorite records, and attention information, etc.). Log information is collected to improve product services and user experience, and to discover and prevent security risks.

During your use of this software , we will also use cookies and similar technologies to collect your information to understand your preferences, conduct consultation or data analysis, improve product services and user experience, improve advertising effectiveness, promptly detect and prevent security risks, and provide better services to users and partners.

We may use this information to extract features related to your search preferences and behavioral habits, and recommend information articles to you through this software based on feature tags . You can customize the information type through “My Column” .

2.2 Device Information. When you use and run this software in the background , in order to ensure the safe operation of the service and control external risks, this software may record the personal commonly used device information provided by your mobile device, browser or other programs you use to access this software , including hardware model, network device hardware address (device MAC address), operating system type, operating system version number, software list, unique device identification code, including IMEI/android ID/IDFA/OPENUDID/GUID, SIM card, IMSI card information, etc., describing the basic situation of personal commonly used terminal devices. Depending on the device you use, even with your authorization, we may not be able to collect some of the aforementioned device information. If this causes you to be unable to use our services normally, you may need to contact your device supplier.

2.3 Terminal application information. In order to improve the user experience, when you enable a specific service function of this software , we will collect your relevant terminal application information. We will only collect your information within the necessary permissions to achieve the service purpose, and use and store your information within the framework of this policy. You can choose to turn off some or all permissions in the settings function of the device. The way to turn on and off the above permissions may be different on different devices. If you refuse to authorize or provide information, we will not be able to provide you with this service, but you can still use other functions of this software normally .

2.4 Keyword Information. When you use the search service of this software , in order to provide efficient search services, we may collect your keyword information, some of which will be temporarily stored in your local storage device. Here, you need to note that your keyword information cannot identify your personal identity alone, and it does not belong to your personal information, so we have the right to use it for other purposes; only when your search keyword information is linked to your other information and can identify your personal identity, then during the combined use, we will treat your search keyword information as your personal information, and process and protect it together with your search history in accordance with this policy.

2.5 When you participate in conference activities related to this software , we may collect your name, mailing address, and contact information according to the needs of the activity , and we will also push relevant conference information to you through this software. If you refuse to authorize or provide information, we will not be able to provide you with this service, but you can still use other functions of this software normally .

  1. Your information we obtain from third parties

In addition to providing you with third-party account login services, if we need to obtain your personal information from a third party in order to provide you with services , we will ask the third party to explain the source of the information and require the third party to ensure the legality of the information it provides. If the personal information processing activities we need to carry out our business exceed the scope of your original authorization when providing personal information to a third party, we will obtain your explicit consent.

  1. Device permission call

In order to provide you with convenient and high-quality services, we may invoke some permissions on your device. When you use the corresponding function, you will see a pop-up reminder asking you to authorize. You have the right to refuse or choose to close the authorization of the following permissions at any time, but it may affect your normal use of some or all functions of our products or services.

4.1 Location. You need to authorize us to use location permissions so that we can provide you with location-based information display and push based on location. You can stop informing this software of your location information by turning off the positioning function (most mobile devices allow you to turn off positioning services. If the device does not support turning it off, it is recommended that you contact the service provider or manufacturer of your mobile device) or turn off the positioning function through “Personal Center-Privacy Settings” . You can choose to refuse authorization or withdraw authorization after authorization. If you refuse or withdraw authorization, you can continue to use this software , but the functions based on location permissions may not be available .

4.2 Notification . You need to authorize us to use notification permissions in order to use all functions based on this permission, such as pushing information, meeting messages, system messages and notifications that may be of interest to you. You can stop receiving messages pushed to you by this software through the notification permission function (most mobile devices allow you to use the notification permission function . If the device does not support turning it off, it is recommended that you contact the service provider or manufacturer of your mobile device). You can choose to refuse authorization or withdraw authorization after authorization. If you refuse or withdraw authorization, you may not be able to receive reminders of such messages normally. We may send you service-related announcements when necessary (for example, when we suspend a service due to system maintenance). You may not be able to cancel these service-related announcements that are not promotional in nature.

4.3 Cellular Data and WLAN . You need to authorize us to use cellular data and/or WLAN permissions so that our client can connect to the network and provide you with services. You can choose to refuse authorization or withdraw authorization after authorization. If you refuse or withdraw authorization, you may not be able to use the client normally.

4.4 Storage . When you use functions such as commenting, collecting, and sharing , you need to authorize us to use storage permissions. You can choose to refuse authorization or withdraw authorization after authorization. If you refuse or withdraw authorization, you may not be able to use the function normally, but you can still use other functions of this software normally .

4.5 Camera . When you need to upload photos in the “Feedback” content (take a photo or select from the gallery), we will ask for access to your “Camera” or “Album” through a pop-up window. We will also require these permissions in other scenarios involving your uploading pictures (such as changing your avatar). You can choose to refuse authorization or withdraw authorization after authorization. If you do not agree to us obtaining these permissions or withdraw your consent, you will not be able to add pictures or change your avatar in the feedback content.

4.6 Read/write calendar . When you sign up for a meeting , we will apply for permission to read/write your calendar so that we can record the meeting time and remind you before the meeting . You can choose to refuse authorization or withdraw authorization after authorization. If you do not agree to us obtaining calendar permissions or withdraw your consent, you will not be able to use the meeting reminder function.

4.8 Read phone status. In order to ensure the normal operation of the software, you need to authorize us to use the permission to read phone status so that we can obtain your IMEI, IMSI and other device information. You can choose to refuse authorization or withdraw authorization after authorization. If you do not agree to us obtaining the aforementioned permissions or withdraw consent, it may affect the normal operation of this software and account security .

  1. How Personal Information is Used
  2. We will use your information for the following purposes:
  • According to the provisions of this policy and to realize the relevant functions of this software ;
  • To further understand how you access and use our services, so as to respond to your personalized needs in a targeted manner and provide you with the most personalized services possible. For example, we may use the information collected when you use one of our services to provide you with specific content in another service, or to show you information related to you that is not generally pushed. If we provide corresponding options in the relevant services, you can also authorize us to use the information provided and stored by the service for our other services. You are free to choose to customize your personal column . If you choose to close the personal column , we will not be able to provide you with this service, but you can still use other functions of this software normally .

Provide you with more relevant advertising as an alternative to general advertising;

To ensure the security of our products and services for identity verification, customer service, security prevention, fraud monitoring, archiving and backup purposes;

In order to prevent malicious programs and ensure operational quality and efficiency, we will record and analyze the frequency of your use of the software , crash data, overall usage, performance data, etc. We will not combine the information we store in the analysis software with any personally identifiable information you provide in the software .

  1. Please note that unless you refuse us to collect personal information, during your use of this software , we will continue to use all personal information you provide when using this software within the scope of this policy . After you cancel your account, we will stop providing you with this software service , delete your personal information in a timely manner, or anonymize it, except as otherwise provided by laws and regulations.
  2. If we cease operating this software , we will promptly stop collecting your personal information, notify you of the cessation of operation by individual delivery or announcement, and delete your personal information held.

III. Entrusted Processing, Sharing, Transfer and Public Disclosure of Personal Information

  1. In order to improve the efficiency of information processing, we may entrust a third party to process your personal information on our behalf. We will sign a strict confidentiality agreement with the third party we entrust to process personal information, requiring it to process personal information in accordance with our requirements, this policy, and the confidentiality and security measures required by laws and regulations.
  2. We will currently only share your personal information with third parties in the following scenarios :

To implement programmatic advertising, we may share de-identified or anonymized information (such as indirect user portraits) with advertising partners to help them improve the effective reach of advertising without identifying you personally. We will not share your personally identifiable information (information that can be used to contact you or identify you) with advertising partners without your authorization .

  • Share with relevant law enforcement agencies, regulators, governments, courts or other third parties where we deem it necessary to (1) comply with an applicable law or regulation; (2) exercise, establish or defend our legal rights; or (3) protect the vital rights of user representatives or any other person; and
  • Share with any other person with your authorization.

We will only share with third parties the information necessary to achieve the purpose. We will sign a confidentiality agreement with the third party with whom we share your personal information. At the same time, we will evaluate their data security capabilities and environment, and require the third party to handle this information with confidentiality and security measures no less stringent than those required by this policy. If a third party needs to use your personal information beyond the scope of the aforementioned authorization due to business needs, the third party will need to seek your consent again.

  1. Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

With your explicit consent, we will transfer your personal information to other parties; and

In the event of a merger, division, acquisition or bankruptcy liquidation, or other circumstances involving a merger, division, acquisition or bankruptcy liquidation, if personal information is transferred, we will inform you of the name or name and contact information of the recipient and require the new company or organization holding your personal information to continue to be bound by this Policy. Otherwise, we will require the company or organization to re-solicit your authorization and consent.

Before the transfer, we will conduct a personal information protection impact assessment and accurately record and preserve the transferred personal information.

  1. Public Disclosure

We will not disclose your information publicly unless required by applicable laws and regulations or with your consent.

  1. Exceptions to prior authorization and consent for sharing, transferring, and publicly disclosing personal information

Please understand that in the following circumstances, in accordance with applicable laws, regulations and national standards, we do not need to obtain your authorization or consent to share, transfer or publicly disclose your personal information:

Related to our performance of obligations under applicable laws and regulations;

  • It is necessary to respond to public health emergencies or to protect the life, health and property safety of natural persons in emergency situations;
  • Directly related to national security and national defense security;
  • Directly related to public safety, public health, and major public interests;
  • Directly related to criminal investigation, prosecution, trial and execution of judgment;

To protect your or other individuals’ life, property and other major legal rights and interests, but it is difficult to obtain your consent;

  • Personal information that you disclose to the public on your own initiative; and

Your personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.

  1. Storage of Personal Information
  2. Storage location

We store your personal information collected in China within the territory of the People’s Republic of China in accordance with laws and regulations. At present, we will not use, store, share or disclose your personal information in cross-border business, or transfer your personal information abroad .

If future business changes require the transfer of your personal information overseas, we will inform you of the type, purpose, processing method, name or name of the recipient, contact information, security measures and security risks of the personal information transferred overseas in accordance with relevant laws and regulations, and obtain your explicit authorization and consent. At the same time, we will conduct a personal information protection impact assessment before the transfer and record the specific circumstances .

  1. Storage period

We will only retain your personal information for the shortest period necessary for the purposes described in this policy and for the time required by laws, regulations and regulatory requirements. We will retain your personal information for the period specified by the Cybersecurity Law and other relevant laws and regulations. After the statutory retention period, we will delete or anonymize your personal information .

  1. Personal Information Security Protection
  2. We attach great importance to information security. We strive to take various reasonable physical, electronic and management security measures to protect your personal information and prevent your information from being improperly used or from being accessed, used or disclosed without authorization.
  3. We will use encryption technology, anonymization processing and other means to protect your personal information; we will use trusted protection mechanisms to prevent personal information from malicious attacks.
  4. We have established a special management system, process and organization to ensure the security of information. We have adopted a strict data use and access system. We have formulated emergency response plans. For security incidents such as personal information leakage, we will immediately activate the emergency plan to prevent the security incident from expanding.
  5. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. You need to understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, you should take active measures to protect the security of your personal information, such as: using complex passwords, changing passwords regularly, and not disclosing your account password and other personal information to others.
  6. Once a user information security incident (leakage, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you. We will promptly inform you of the relevant situation of the incident in the form of push notifications, emails, text messages, etc. When it is difficult to inform the user information subject one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also report the disposal of the user information security incident in accordance with the requirements of the regulatory authorities.
  7. Please be aware that the personal information protection measures provided by the Company only apply to this software . Once you leave this software , we have no ability or obligation to protect any personal information you submit to other software or websites outside of this software , regardless of whether your login or browsing of the above-mentioned software or website is based on the link or guidance of this software .
  8. Management of Personal Information

We attach great importance to your management of personal information and do our best to protect your rights as a legal data subject under Chinese law, such as access, correction, deletion and withdrawal of consent to your personal information, so that you have sufficient ability to protect your privacy and security. You can contact us through the contact information provided in this policy to exercise your legal data subject rights, or complete them yourself in the relevant interface of this software if feasible.

  1. Access to your personal information

You can access the personal information you submitted to us through this software .

  1. Correct or update your personal information

You can correct or update the personal information you submitted to us through the client; for some personal information that is difficult to correct or update yourself, you can also submit a correction or update application to us through feedback and other channels. We will process your request in a timely manner after verifying your identity.

  1. Delete your personal information

You may request us to delete your personal information in the following circumstances:

If our handling of personal information violates laws and regulations;

If our handling of personal information violates our agreement with you;

If we terminate the operation and service of this software .

If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us as much as possible and request them to delete it in a timely manner, unless otherwise provided by laws and regulations or these entities have obtained independent authorization.

  1. Account cancellation

If you decide not to use this software anymore , you can submit an application to us through the contact information provided in this policy, and we will respond to you in a timely manner .

In order to prevent your account from being maliciously cancelled, we will verify the identity of the cancellation applicant. Please understand that account cancellation is an irreversible operation. Once you cancel your account for this software , we will delete all information about your account, except as otherwise provided by laws and regulations. You will also not be able to regain the relevant services of this software through a cancelled account .

  1. Report

If you believe that your personal information rights may be violated, or discover clues of violation of your personal information rights (for example, you believe that our collection of personal information violates the law or the agreement between the two parties), you can report it using the contact information provided in this Policy, and we will promptly provide you with feedback on the results of the investigation after verification.

  1. Access to Privacy Policy

You can view the full content of this policy in the Personal Center interface.

  1. For security reasons, we may ask you to verify your identity before processing your request. We will process your request promptly after verifying your identity.

In principle, we do not charge any fees for your reasonable requests, but we will charge a certain amount of cost for repeated requests that exceed reasonable limits. We may reject requests that are unreasonably repeated, require too many technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are extremely impractical, and inform you of the reasons, while providing a way to complain.

  1. If any of the following circumstances exist, we may not be able to respond to your request in accordance with laws and regulations:

Related to our performance of obligations under applicable laws and regulations;

  • Directly related to national security and national defense security;
  • Directly related to public safety, public health, and major public interests;
  • Directly related to criminal investigation, prosecution, trial and execution of judgment;

We have sufficient evidence to show that you have subjective malice or abuse of rights;

To protect your or other individuals’ life, property and other major legal rights and interests, but it is difficult to obtain your consent;

  • responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations; and

Involving trade secrets.

VII. Our special protection of personal information of minors and children

  1. Protection of Personal Information of Minors

If you are a minor under the age of 18, before using this software , you should read and decide whether to agree to this policy under the supervision and guidance of your parents or other guardians. We protect the personal information of minors in accordance with relevant national laws and regulations.

  1. Protection of Children’s Personal Information

this software under the consent and guidance of your guardian .

2.2 We have taken the following special protection measures to protect children’s personal information:

  • General principles. This software strictly follows the principles of justification, necessity, informed consent, clear purpose, security, and legal use to collect and process children’s personal information.

Identification of child users. The term “children” in this policy refers to minors under the age of 14. You should understand that the personal information we collect through your account will be considered as child personal information only when and only when this software determines that you are a child user through the information you submit or your statement or representation.

How we collect and use children’s personal information. The purpose, method and scope of our collection and use of children’s personal information will not exceed the content listed in the “Scope and method of possible collection of personal information, and possible use of personal information” section of this policy. If the guardian refuses to provide a certain type of children’s personal information, the child will not be able to use the corresponding business functions of this software.

Storage of children’s personal information. This software ensures that children’s personal information will be stored in encrypted form.

Sharing, transfer, and disclosure of children’s personal information. We will not share, disclose, or transfer children’s personal information without authorization, unless required by laws and regulations or agreed with the guardian. If sharing, disclosure, or transfer is involved, we will obtain the guardian’s consent again.

  • Security assurance and dedicated protection. We have designated a dedicated person to be responsible for the protection of children’s personal information. If an information leak occurs and causes or may cause serious consequences, we will immediately inform the affected children and their guardians of the relevant circumstances of the incident, or take reasonable and effective measures to issue relevant warning information.

Reporting channels. If you have any questions, comments or suggestions regarding the protection of children’s personal information in this Policy, please contact us through the contact information provided in this Policy.

  • Query, correct, delete information and cancel account. Guardians or children themselves can query, correct, delete personal information or cancel account through the methods provided in the “Personal Information Management” section of this Policy; or contact us through the contact information provided in this Policy to submit an application for correction, deletion, withdrawal of consent, or account cancellation for children’s personal information. Once an account is cancelled, the Software will immediately delete all information related to the account, except for those that should be retained in accordance with relevant laws and regulations or those agreed to be retained with you.

Obtain consent again. When there are major changes to the above agreed matters, or when there are substantial changes to the matters we have informed the guardians of based on this policy, or when we need to use children’s personal information beyond the agreed purpose and scope, we will obtain the guardian’s consent again.

Termination of operation. If we terminate the service or operation, we will notify the guardian and the child at least thirty days in advance and delete or anonymize the child’s personal information after the termination of the service or operation.

  1. Updates to this Policy

We will update this Policy from time to time to meet applicable laws, regulations, technology and business changes. When we update this Policy, we will notify you by email, push notification, etc. depending on the importance of these changes. We will obtain your consent when making any major changes to this Policy in accordance with the requirements of applicable laws and regulations.

You can learn the release date and effective date of this policy through the homepage of this policy.

  1. Contact Us

If you have any questions about the content of this policy, you can contact us or submit documents to the official website . We will respond to you in a timely manner in accordance with the requirements of laws and regulations.

Regular office address: [ Room 603, Building A, Aocheng Rongfu Center – Beijing 100107, China ] ; Contact number : [ 84929092 ]

If you are not satisfied with our response, especially if you believe that our processing of personal information has damaged your legitimate rights and interests, you may seek a solution by filing an arbitration with the Beijing Arbitration Commission .