This software respects and protects the personal privacy of all users who use the service, and attaches great importance to the protection of user privacy and personal information. This privacy policy helps you understand what data we collect, why we collect these data, what we will use these data for and how protect this data.

We will use your personal information in accordance with the "Information Security Technology Personal Information Security Specifications" and other relevant laws and regulations, mature security standards in the industry, and this agreement. With prior permission, this software will not disclose or provide such information to third parties.

1. The scope of collection and use of personal information.

①. Registered account: When you register and log in to the software account, at least provide us with the account name, avatar, mobile phone number or email address, and create a password. After successful registration, the above information you provide will be continuously authorized for us to use during your use of the software platform and services. When you cancel your account, we will stop using and delete the above information or anonymize your personal information, unless otherwise stipulated by laws and regulations.

②. After successfully registering with a mobile phone number at the same time, we may collect the following information:

1. Device information: so that we can provide you with services on the device, we may associate your device information or phone number with your account, and collect device attribute information, device status information, and device link information.

2. Identity authentication service: This software provides identity authentication service. When you apply to become a user of this software to perform identity authentication for you, we need to collect your date of birth, time, place of birth and relevant identity information.

3. Information release function: After you successfully register, you can release information on this software platform. We will review the content of the information from time to time and save the content according to the law.

4. Browsing, following, and favorite functions: You can browse the published information that you have followed or added as friends, and we will review the record information of your browsing, following, and favorites, and automatically collect the details of your use of the software, and based on Storage of this content is required by law.

5. Display and push content: By using the collected information, we will provide you with services such as search results, personalized content, user research analysis and statistics.

6. Search function: When you use the search function provided by this software, we will collect the keyword information you query and other information and content details that you browse or request when using this software service. Such keyword information usually cannot individually identify your personal identity, does not belong to your personal information, and is not within the scope of this guideline. Only when your search keyword information is connected with your other information and can identify your personal identity, during the combined use, we will use your search keyword information as your personal information and combine it with your search history Records are processed and protected in accordance with this guideline.

7. Calendar permissions: used to allow users to see personalized fortunes in the calendar. We may also provide you with information you are interested in by providing personal information through your personal information.

8. Customer service: When you file a complaint, suggestion, consultation with this software or this software solves related complaints, in order to facilitate contact with you, we may use your name, mobile phone number, email address and other personal information provided by you . If you refuse to provide the above information, we may not be able to give you timely feedback on the results of complaints, appeals or consultations.

③. Provide you with additional business functions of this software product and/or service

In order to provide you with better products and services, we may need to collect the following information. If you refuse to provide the following information, it will not affect your normal use of the software business functions described in item 1.2 of this article, but we cannot provide you with certain specific functions and services.

1. Positioning function: GPS address and location information will be used to calculate constellation information more conveniently; when you turn on the device positioning function and use the location-based related services provided by this software, we will collect information about your location.

2. Microphone permissions, Bluetooth permissions, camera permissions: the main user listens to or uses voice services, facial recognition during the authentication process.

3. Album permissions: Users can use the default avatar of the app. If the user chooses the avatar independently, we will call the album permission to learn the user's avatar selection and replacement avatar.

④. We may obtain your personal information indirectly from third parties

Obtaining your personal information indirectly from a third party: When you log in to the software with a third-party account, you have authorized the software to obtain your registered and public information. The public information (including nicknames and avatars) that you register, publish, and record on the third-party platform.

⑤. Other purposes: When we want to use information for other purposes not specified in this privacy policy, we will ask for your consent in advance.

According to the requirements of laws and regulations, we will not be able to meet your above request in the following situations:

1. Related to national security and national interests;

2. Related to public security and public interests;

3. It is related to the major interests of you or a third party and may cause serious damage;

4. Directly related to crimes, judicial procedures, government procedures, etc.;

5. You have subjective malice or abuse of rights (such as your request will endanger public safety and the legitimate rights and interests of others, or your request is beyond the scope of general technical means and commercial costs);

6. Involving commercial secrets;

⑥. How do we protect your personal information

In order to prevent the loss of your information, access without your consent, public disclosure, leakage, transfer, etc., from damage to your personal information, this software platform will take all reasonable, reliable and feasible plans and measures to protect your personal information. information security.

Security measures:

1. We will collect, use, store and transmit user information in accordance with national security standards and laws and regulations, and inform you of the purpose and scope of use of the relevant information through the user agreement and privacy policy. At the same time, we will encrypt personal information to ensure data confidentiality and security.

2. Sign a confidentiality agreement for employees who come into contact with information, and conduct regular training on security capabilities and awareness. Only authorized employees can access personal information. If the confidentiality agreement is violated, the relevant legal responsibility of the employee will be investigated.

3. Strictly select partners, conduct background checks on them, and cooperate with well-known and reputable companies; sign confidentiality agreements with partners' information contacts, agree on breach of contract liabilities for leaks, and provide only necessary and reasonable information.

4. Establish a security team, which is responsible for developing and applying security technologies and procedures to ensure the security of the software platform and personal information. We will conduct background checks on the heads of the security team and information technology, sign a non-disclosure agreement, agree on legal responsibilities for leaks, and continue to train them on their security capabilities and awareness.

5. We have established a sound information security management system and an internal security incident handling mechanism.

⑦ Shelf life

1. During your use of this software product and service, we will continue to store your personal information for you. If you modify your personal information, we will save the modified information.

2. If you cancel your account, we will no longer use your personal information, and we will save and anonymize your information in accordance with laws and regulations such as the Cyber Security Law.

⑧. Security incident notification

1. We will formulate an early warning plan for Internet security incidents in advance, and deal with security risks such as system vulnerabilities, computer viruses, network attacks, and network intrusions in a timely manner. In the event of an incident that endangers network security, we will immediately activate the emergency plan and take corresponding remedial measures , and report to the relevant authorities in accordance with regulations.

2. If a personal information security incident occurs, we will promptly notify you through your reserved personal information (including mobile phone number, email, etc.), and inform you of the progress and impact of the case. We will cooperate with the security team, the legal department, and the technical department Take a proactive and effective approach together and take remedial measures to reduce the risk. At the same time, we will actively report security incidents in accordance with the requirements of relevant government departments and laws and regulations, and may take legal measures to resolve security incidents.

3. If we decide to change the privacy policy, we will publish these changes in this policy and where we think it is appropriate, so that you can understand how we collect and use your personal information, who can access this information, and under what circumstances we will disclose this information.

⑨. Your right to manage personal information

1. We attach great importance to your concern about personal information, and do our best to protect your rights to access, correct, delete and withdraw your consent to your personal information, so that you have sufficient ability to protect your privacy and security. Your rights include:

Access and Correct Your Personal Information

2. Except as required by laws and regulations, you have the right to access and correct your personal information at any time, specifically including: you can access or modify your email information, password, and user name through [me];

delete your personal information

3. We provide the following methods on the App to help you delete the information you posted on the App.

You can delete the information you display in the community through [Community→My Posts];

You can cancel your follow record through [My → Follow];

You can cancel the fortune reminder through [My → Settings];

You can cancel the private message switch through [My → Settings].

⑩. In the following situations, you can request us to delete personal information:

1. If our handling of personal information violates laws and regulations;

2. If we collect and use your personal information without your consent;

3. If our processing of personal information violates the agreement with you;

4. If you cancel the software account;

5. If we terminate the service and operation.

Once the above deletion request is responded to, we will also notify the third-party entities that obtain your personal information from this software (such as other Internet platforms that use this software account as a third-party login account), and request them to delete it in a timely manner, unless otherwise stipulated by laws and regulations stipulations, or these entities obtain your independent authorization. When you delete information from our service, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.

1. Legal liability and disclaimer:

1. The software platform will shut down the platform for maintenance, regular inspection, and update software and hardware. The software will not be responsible for the interruption or suspension of normal services caused by unexpected events, force majeure, computer viruses, system failures and other factors. Every effort will be made to avoid service interruption and to limit the interruption time to the shortest possible time.

2. The software shall not be responsible for any losses suffered by users due to communication line failures, technical problems, network and computer failures, system instability and other force majeure reasons of third parties such as telecommunications departments.

3. Any third-party claims against the software caused or generated by the user's violation of the provisions of this agreement or the relevant terms of service shall be borne by the user.

4. The opinions and positions expressed by users on this software platform do not represent the position of this software, and users should be responsible for the published content.

5. Customers are requested to properly keep personal information by themselves, provide adequate protection and backup of personal information, and take appropriate preventive measures to reduce the risk of computer viruses or other malicious and destructive actions.

6. Since your right to privacy is very important to this website, this software platform will not provide your personal information to unrelated third parties without reason, unless the competent authority obtains it according to law or stipulates in a third party, but it will not maliciously infringe upon the third party Responsible for the consequences of information leakage.

2. Intellectual property rights:

1. All intellectual property rights of this software, and all information related to the software, including but not limited to: text expressions and their combinations, icons, illustrations, images, charts, colors, interface design, layout framework, relevant data, Additional programs, printed materials or electronic documents, etc. are owned by this software and are protected by copyright laws, international copyright treaties and other intellectual property laws and regulations.

2. Without the written consent of the software, the user shall not implement, utilize, transfer or authorize any third party to implement, utilize, or transfer the above-mentioned intellectual property rights for any profit or non-profit purpose. When the above-mentioned unauthorized behavior occurs, the software reserves the right to pursue the legal responsibility of the relevant responsible person.

3. Amendment and interpretation rights:

According to the development of the Internet and changes in relevant laws, regulations and regulatory documents, or due to business development needs, this software has the right to modify or change the terms of this agreement. Once the content of this agreement changes, you can log on to the official website of this software. Check the terms of the latest version of the agreement, the announcement is deemed that the software has notified the user to modify the content, and the user will not be notified separately. After this software revises the terms of the agreement, if you do not accept the revised terms, please immediately stop using the services provided by this software, and your continued use of the services provided by this software will be deemed to have accepted the revised agreement.

3. Notice

1. When you register as a user of this software and accept the services of this software, you should provide real and effective contact information (including your email address, contact number, contact address, etc.) with this software. If the contact information changes, You are obliged to update relevant information in a timely manner and keep contactable.

2. This software will send you various notices to one or some of the above contact methods. After the platform information is successfully sent, it is deemed to have been delivered; for written notices issued on paper media, it is deemed to be delivered on the fifth natural day after posting to the contact address provided.

3. Applicable law, jurisdiction and others:

This software solemnly reminds users to pay attention to the possible clauses in this agreement that exempt the software from liability and aggravate user obligations. Users are requested to read carefully and consider risks independently.

4. The conclusion, entry into force, interpretation, revision, supplement, termination, execution and dispute resolution of this agreement shall be governed by the laws of the People's Republic of China; if there are no relevant provisions in the law, business practices or industry practices shall be referred to.

1. For any disputes or disputes arising from this agreement or the use of this software, the two parties should try their best to resolve it through friendly negotiation; if the negotiation fails, either party has the right to submit the dispute to the Beijing Haidian District People's Court for jurisdiction.

2. If any provision of this agreement is deemed to be abolished, invalid or unenforceable, that provision shall be deemed divisible and shall not affect the validity and enforceability of the remaining provisions of this agreement.