Can apply privacy policy

Update time:2025-12-30 11:21

· amount of reading:227

This application respects and protects the personal privacy of all users who use the service. In order to provide you with more accurate services, this application will use and disclose your personal information in accordance with the provisions of this privacy policy. However, this application will treat such information with a high degree of diligence and due diligence. Except as otherwise provided in this Privacy Policy, this application will not disclose or provide such information to third parties without your prior permission. This app will update this Privacy Policy from time to time. When you agree to this application service use agreement, you are deemed to have agreed to the entire content of this privacy policy. This privacy policy is an integral part of this application service usage agreement.

1. application information

  1. Application Name: Nengtong

  2. Application Version: Applicable to versions above 17.0.0

  3. Application Description: Nengtong Application is mainly used for charging pile installation service business. The middle station will send work orders to the installation master. Users can view the charging pile installation work order information, return the installation process information and completion information.

2. Developer Information

Developer Name: Anhui Nengtong New Energy Technology Co., Ltd.

Developer's address: No.1 Factory Building, Donggang Industrial Park, Huagang Town, Feixi County, Hefei City, Anwei Province

We value your feedback and comments. If you have any questions or suggestions regarding the use of this Privacy Agreement or the App, please contact us:

Email address: zhanghaiyue.austeu.com

Contact number: 400-800-2400

Phone number: 18355190354

3. scope of application

(a) the personal registration information you provide in accordance with the application requirements when you register the application account;

(B) When you use this application service, the application automatically receives and records your information, including but not limited to your IP address, location, language used, access date and time, hardware and software characteristics information and records of your needs and other data;

(c) User personal data obtained by the App from business partners through lawful means. You understand and agree that the following information does not apply to this Privacy Policy:

(A) the keyword information you enter when using the search service provided by this application platform;

(B) The relevant information and data collected by this application, including but not limited to contact information, survey information, completion sheet information, picture information, etc;

(c) Violation of the law or violation of the rules of this application and the measures this application has taken against you.

Use of 4. information

(a) This application will not provide, sell, rent, share or trade your personal information to any unrelated third party, unless your permission is obtained in advance, or the third party and this application (including this application affiliate) individually or jointly Provide services to you, and after the service ends, it will be prohibited from accessing all such materials, including all such materials that it was able to access before.

(B) This application does not allow any third party to collect, edit, sell or distribute your personal information for free by any means. If any user of the application platform engages in the above activities, once discovered, the application has the right to immediately terminate the service agreement with the user.

  1. Register

    When you register, we need to obtain your ID card information, mobile phone number, ID card photo and ID photo information to confirm your true identity information.

  2. Fill in work order information

    When you process ticket information, we need to obtain your location information to compare your location with the ticket location. We need to get your file information, fill out the ticket need to use your camera or save the file, used to upload photos.

  3. face recognition

    When the application returns to the background to run, open the application again, you will be asked to perform face recognition, and you need to obtain your camera for face recognition. It is used to confirm whether the user is consistent with the registered account number.

5. information disclosure

In the following cases, this application will disclose your personal information in whole or in part according to your personal wishes or legal provisions:

(a) disclosure to third parties with your prior consent;

(B) to share your personal information with third parties in order to provide the products and services you request;

(c) Disclosure to third parties or administrative or judicial bodies in accordance with the relevant provisions of the law or at the request of an administrative or judicial body;

(d) If you violate the relevant laws and regulations of China or this application service agreement or relevant rules, you need to disclose it to a third party;

(e) In a transaction created on the application platform, if any party to the transaction performs or partially performs the transaction obligations and makes a request for information disclosure, the application has the right to decide to provide the user with the necessary information such as the contact information of the counterparty to the transaction in order to facilitate the completion of the transaction or the settlement of disputes.

(f) Other disclosures that the App deems appropriate in accordance with laws, regulations or website policies.

6. information storage and exchange

(a) The information and data collected by this application about you will be stored on the server of this application and (or) its affiliated companies. These information and data may be transmitted to your country, region or the place where this application collects information and data. Outside and be accessed, stored and displayed abroad.

Use of 7. cookies

(a) In the case that you do not refuse to accept the cookies, the application will set or access the cookies on your device so that you can log in or use the application platform services or functions that depend on the cookies.

(B) You have the right to choose to accept or refuse to accept the cookies. You can refuse to accept the cookies. However, if you choose to decline to accept cookies, you may not be able to log in or use the App's network services or features that depend on cookies.

(c) Relevant information obtained through the cookies established by this application will apply this policy.

8. About System Function Use

1. Instructions on obtaining user SD card information

Purpose:Our application needs to be able to upload image information, so we need to be able to access your SD card information in order to read or write files, such as photos and videos. These operations may include, but are not limited to, file backup, file sharing, file editing, and other functions.

Way:We will get access to the SD card through the rights management mechanism provided by the Android system. When you install or update an app for the first time, you are prompted to authorize the app to access the SD card. If you agree to the authorization, our app will be able to access the files on the SD card.

Scope of use:We will only access and process files related to application functions, and strictly abide by relevant laws and regulations to protect your personal privacy and data security. We will not read or write files unrelated to the functionality of the app, nor will we use your files for any illegal or non-consensual purpose.

2. Description on calling camera function

Purpose:Our app needs to call your camera device so that you can use the camera to take photos, videos, and more, as well as for face recognition. These photos and videos can be used to capture and upload directly to our platform to participate in user-generated content (UGC) related functions, as well as other scenes that you are clearly aware.

Way:When you need to use the camera function, our app will ask you to authorize the camera permission. If you agree to the authorization, we will be able to call your camera device.

Scope of use:We will only call the camera device in the scenario that you explicitly agree to and use, and strictly abide by relevant laws and regulations to protect your personal privacy and data security. We will not use your photos and videos for any illegal purpose or without your consent.

3. Description of positioning function

Purpose:Our apps need access to your device's location information to provide you with location-based services and personalized experiences.

Way:We will use GPS to get your device location information. When you install or update an app for the first time, you are prompted to authorize the app to access location information. If you agree to the authorization, our application will be able to obtain and use your location information.

Scope of use:We only use your location information to the extent that you have expressly agreed to it, and only to provide you with relevant services and functions. We will not use your location information for any illegal purpose or without your consent.

(1) Protection of location information

Information Security: We will take all reasonable and necessary security measures to protect your location information from unauthorized access, use or disclosure.

Information storage: Your location information will only be stored on our secure servers and will only be used internally to provide the services and features you request.

Information sharing: We will not share your location information with any third-party organization or individual, unless you expressly consent or legal requirements.

(2) Your rights

Access and modification: You have the right to access and modify your location settings at any time. You can find the relevant option in the settings menu of your device and turn off or adjust the authorization of the positioning function.

Delete: If you want us to delete your location information, please contact us through our customer service channel and provide the corresponding authentication information. Under the premise of complying with laws and regulations, we will process your request as soon as possible.

4. Description of calling mobile phone to make calls

Purpose:Our application needs to call your mobile phone's call function, in order to provide telephone-related services, a key call function. These features will help you operate your business more easily.

Way:When you need to use the call function, our app will ask you to authorize access to the phone. Once you agree to the authorization, we will be able to call up your phone functions and automatically complete the input and dialing of the phone number.

Scope of use:We only use the call function in situations where you have expressly agreed to it, and only to provide the service you have requested. We will not use your phone number for any illegal purpose or without your consent.

(1) Protection of user information

Information Security: We will take all reasonable and necessary security measures to protect your phone number and other related information to prevent unauthorized access, use or disclosure.

Information storage: Your phone number and other related information will only be stored on our secure servers and will only be used internally to provide the services and features you request.

Information sharing: We will not share your phone number and other related information with any third-party organization or individual, unless you expressly consent or are required by laws and regulations.

(2) Your rights

Access and modification: You have the right to access and modify your phone number and other related information at any time. You can find the relevant options in the app's settings menu and modify them accordingly.

Rejection and withdrawal: You can at any time refuse our request to access the phone call function of the mobile phone, or withdraw the previous authorization if it has been authorized. You can find the relevant option in the settings menu of your device and turn off or adjust the authorization of phone permissions.

Delete: If you want us to delete your phone number and other related information, please contact us through our customer service channel and provide the appropriate authentication information. Under the premise of complying with laws and regulations, we will process your request as soon as possible.

5. Overview of Glide functions

Glide is an efficient, open source media management framework for Android devices, mainly for loading and displaying images. Our app uses the Glide library to optimize the image loading experience, including loading images from the network, local files, or app resources, and to ensure that images display smoothly when scrolling.

(1) Use of Glide functions

Image loading: When you view an image in our app, Glide automatically loads the image from a specified source (such as a network URL, local file path, or app resource) and displays it in the corresponding ImageView component.

Cache management: Glide has a powerful caching mechanism that can automatically cache loaded images locally so that they can be loaded faster in subsequent use. This helps reduce network traffic and improve the responsiveness of the application.

Image processing: Glide supports various processing of loaded images, such as scaling, cropping, rotation, etc. These processing operations can be carried out in the process of loading the picture to meet your different display needs.

Captive Bitmap and Error Map: Glide allows you to set the Captive Bitmap and Error Map during the loading of the image. When the picture is loading, the accounting bitmap will be displayed; if the picture fails to load, the error map will be displayed. This helps to improve the user experience and avoid user dissatisfaction due to waiting or loading failures.

(2) Protection of user information

Although Glide is mainly used for image loading and display, we still attach great importance to the protection of user information in the process of using Glide. The following is our commitment to the protection of user information:

No collection of sensitive information: When using Glide to load images, we do not collect any sensitive information related to your identity or privacy.

Compliance with laws and regulations: We will strictly comply with relevant laws and regulations to ensure that your legal rights will not be violated in the process of using Glide.

Secure transmission: If Glide needs to load pictures from the network, we will use a secure transmission protocol (such as HTTPS) to ensure the security of the picture data during transmission.

(3) Your rights

Understand usage: You have the right to know how we use the Glide library to load and display images in our app.

Refuse to use: If you don't want us to use the Glide library to load and display images, you can opt out of the app or uninstall the app.

Contact us: If you have any questions or suggestions regarding our use of the Glide library, please feel free to contact us through our customer service channel. We will reply to your question and deal with your suggestion as soon as possible.

6. Overview of PictureSelector functions

PictureSelector is an image selection library for Android platforms that allows users to easily select images from the device's media library and process them. Our application integrates PictureSelector libraries to provide better and easier image selection and processing.

(1) Use of PictureSelector functions

Picture selection: Users can browse and select pictures on the device through the interface provided by the PictureSelector within the application. These pictures may come from your device's albums, folders, or other media libraries.

Picture preview: After selecting a picture, the PictureSelector supports the picture preview function, and users can preview the effect of the picture before selecting it.

Image processing: In addition to the basic image selection function, the PictureSelector also supports various processing of the selected image, such as cropping, rotation, scaling, etc. These processing operations can be performed immediately after the picture is selected to meet the personalized needs of the user.

(2) Protection of user information

No collection of sensitive information: The PictureSelector is only used to process images selected by the user and does not collect any sensitive information related to the user's identity or privacy.

Secure storage: The images selected by the user are stored in the app's private directory, ensuring that only the app itself can access them. We will not share the user's picture with any third-party organization or individual, unless you expressly consent or legal requirements.

Compliance: We will strictly abide by relevant laws and regulations to ensure that the use of PictureSelector functions will not infringe the legitimate rights and interests of users.

(3) Your rights

Understand usage: You have the right to know how we use PictureSelector libraries in our app to work with your images.

Refuse to use: If you do not want us to use the PictureSelector library to process your images, you can choose not to use the related features or exit the application.

Contact us: If you have any questions or suggestions regarding our use of the PictureSelector library, please feel free to contact us through our customer service channel. We will reply to your question and deal with your suggestion as soon as possible.

7. Functional Description of Using CameraX

(1) Overview of CameraX

CameraX is part of the Android Jetpack library, designed to help developers develop camera applications more easily and efficiently. It provides a consistent and easy-to-use API, supports most Android devices, and is backward compatible up to Android 5.0(API level 21). CameraX simplifies the integration of camera functions, allowing developers to focus more on the business logic of their applications without worrying about device compatibility and complex camera API calls.

(2) Use of CameraX functions

Camera access: CameraX allows apps to access the device's camera hardware to capture photos, record videos, and more. Developers can use simple API calls to implement functions such as camera preview, photo taking, and video recording.

Function extension: CameraX supports the extension of native camera functions through Extensions plug-ins, such as portrait mode, night mode, HDR, filters, beauty, etc. These functions can improve the camera experience of the application and meet the diverse needs of users.

Lifecycle management: The CameraX is closely integrated with the Android Lifecycle library to facilitate developers to manage the camera lifecycle. When the life cycle of the application changes, the CameraX can automatically handle the release and reconnection of the camera to ensure the stability and performance of the application.

(3) Protection of user information

When using CameraX functions, we attach great importance to the protection of user information. The following is our commitment to the protection of user information:

Privacy protection: The CameraX is only used to access and process media content captured by the camera (such as photos and videos) and does not collect any sensitive information related to the user's identity or privacy.

Secure storage: Photos and videos captured by users through the CameraX are stored in the app's private directory, ensuring that only the app itself can access the media content. We will not share the user's media content with any third-party organizations or individuals, unless you expressly consent or legal requirements.

Compliance: We will strictly abide by relevant laws and regulations and privacy policies to ensure that the use of CameraX features will not infringe the legitimate rights and interests of users.

(4) Your rights

Understand usage: You have the right to know how we use CameraX libraries in our apps for your media content.

Refuse to use: If you do not want us to use the CameraX library to process your media content, you can choose not to use the relevant features or exit the application.

Contact us: If you have any questions or suggestions regarding our use of the CameraX library, please feel free to contact us through our customer service channel. We will reply to your question and deal with your suggestion as soon as possible.

8. Use of Gaud SDK

In order to provide you with more accurate and convenient location services, we have integrated the Gaud SDK. These services include, but are not limited to, location query, navigation, path planning, etc.

(1) Information collected

When you use a product or service that integrates with the Gaudard SDK, we may collect the following information:

Location information: including latitude and longitude, precise location, rough location, etc. Such information may be obtained by means of IP address, GNSS information, WiFi status, WiFi parameters, Bluetooth information, sensor information, etc.

Device identification information: such as IMEI, IDFA, IDFV, Android ID, MEID, MAC address, etc.

Current application information, such as the application name and application version number.

Device parameters and system information: such as system properties, device model, operating system, and carrier information.

(2) Use of information

The information we collect is mainly used to provide you with location services, including but not limited to location query, navigation, route planning, etc. In addition, we may use this information to optimize our services, improve the user experience, or for other purposes that comply with legal and regulatory requirements.

(3) Storage and protection of information

We take reasonable technical and administrative measures to protect your personal information from unauthorized access, use or disclosure. At the same time, we will store your personal information on a secure server within the scope permitted by laws and regulations.

(4) Your rights

You can refuse our collection and use of your personal information. However, please note that this may prevent you from using some or all of our services.

You have the right to access and correct your personal information. If you find that the information we collect is incorrect, or if you wish to correct your personal information, please contact us.

Under the premise of complying with the requirements of laws and regulations, you have the right to ask us to delete your personal information. However, please note that deleting personal information may affect your use of our services.

9. information security

This application account has security protection function, please keep your user name and password information properly. This application will be through the user password encryption and other security measures to ensure that your information is not lost, not abused and altered. Despite the aforementioned security measures, please note that there is no "perfect security measures" on the information network ".

10. how we protect your personal information

(a) We strive to ensure the security of users' information to prevent leakage, loss, improper use, unauthorized access and disclosure of information. We use multi-faceted security protection measures to ensure that the user's personal information protection is at a reasonable level of security, including technical protection means, management system control, security system protection and many other aspects.

(B) In order to protect the security of your personal information, we will strive to take various security measures in accordance with industry standards to protect your personal information to minimize the risk of loss, destruction, misappropriation, disclosure, unauthorized access, use, disclosure and alteration of your personal information.We will use a variety of security measures within a reasonable level of security to protect the security of information, including:(1) the use of encryption technology (such as TLS), anonymization, etc. to ensure that your data remains private during transmission;(2) provide a variety of security features to help you protect your account security;(3) Review our practices in collecting, storing and processing information (including physical security measures) to prevent unauthorized personnel from accessing our systems;(4) All employees, contractors and agents who must contact personal information due to the provision of services are required to comply with the strict confidentiality obligations stipulated in the contract, otherwise they may be disposed of or terminated;(5) We establish a data classification and grading system, data security management practices, and data security development practices to manage and regulate the storage and use of personal information to ensure that no personal information unrelated to the services we provide is collected.

(c) Your account has security features to ensure that your information is not lost, abused and altered. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we try our best to strengthen security measures, it is impossible to always guarantee 100% security of information. We will try our best to ensure the security of personal information you provide to us. You acknowledge and understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. Therefore, in order to prevent the occurrence of safety accidents, we have formulated a proper early warning mechanism and emergency plan in accordance with the provisions of laws and regulations. If a security incident does occur, we will promptly inform you of the relevant information by email, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will issue an announcement in a reasonable and effective way.At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities, and closely cooperate with the work of government agencies. At the same time, we strongly recommend that you pay full attention to the protection of personal information when using products and services, and take active measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing personal information such as your account passwords. To others. We also provide a variety of security features to help you protect your personal information.

(d) We strictly limit the scope of access to information, require them to comply with the obligation of confidentiality and audit, and personnel who violate the obligation will be punished in accordance with the provisions. We also review the management system, process and organization to prevent unauthorized access, use or disclosure of user information. We recommend that you pay full attention to the protection of personal information when using products and services. We also provide a variety of security features to help you protect your personal information.

11 What can you do?

(a) You may not disclose your login password or account information to anyone (unless this person is duly authorized by you), and at any time, please do not disclose the verification code you receive to anyone. Whenever you log in as an account user of this product, especially when you log in on someone else's computer, mobile phone or public Internet terminal, you should always log out at the end of use.

(B) This product is not responsible for security omissions caused by third parties accessing your personal information due to your failure to maintain the privacy of your personal information. Notwithstanding the foregoing, you should notify us immediately of any unauthorized use of your account by any other Internet user or any other security breach.

(c) Your assistance will help us to protect the privacy of your personal information.

12. How we share, transfer and publicly disclose your personal information

(a) We do not sell any personal information to third parties. We may sometimes share your personal information with third parties in order to provide or improve our products or services, including providing products or services at your request.

(B) The name of the third-party SDK and the method, purpose and scope of use. In order to smoothly engage in business operations and provide you with all the functions of the product or service, the list of third-party SDKs we are using and will use is as follows. third-party sdk name company information acquisition purpose privacy agreement link or sdk url

bugly Tencent system unique identifier, SIM card serial number

At present, the third-party service providers we access mainly include the following types:

  1. Used to obtain device location permissions, collect device information and log information, etc. with your consent;

  2. Used to optimize product performance, including improving hardware distribution network capabilities, reducing server costs, and functional hot repairs;

  3. It is used for services related to account security and product reinforcement, including network monitoring, domain name resolution, anti-hijacking, anti-spam and anti-cheating, encryption and decryption services, etc.

We will only share your information for legitimate, necessary and specific purposes. For third-party service providers with whom we share information, we will require them to perform relevant confidentiality obligations and take appropriate security measures.

Third party social media or other services are operated by the relevant third party. Your use of such third party's social media services or other services (including any information you provide to such third parties) is subject to the third party's own terms of service and information protection statement (not this policy), which you need to read carefully. This policy applies only to the personal information we collect and does not apply to the services provided by any third party or to the third party's information usage rules. If you find that these third-party social media or other services are at risk, we recommend that you terminate the relevant operations to protect your legitimate rights and interests.

XIII. Instructions for Correction, Deletion and Account Cancellation of Personal Information

In order to protect your personal information rights and interests, in accordance with the requirements of relevant laws and regulations such as the the People's Republic of China Cyber Security Law, the the People's Republic of China Personal Information Protection Law, and the Method for Determining the Illegal Collection and Use of Personal Information by APP, we hereby add this to the privacy policy. This chapter explains in detail how you correct, delete personal information and cancel your account to ensure that you can easily exercise your personal information management rights.

1. Correction of personal information

(I) correction scope

You can correct the personal information that is provided voluntarily during the use of this APP and is not necessary to realize the core functions, including but not limited to: name, contact number, ID card information, electrics certificate code, validity period, ID card photo, etc. The correction of key information related to identity verification (such as information related to real-name authentication) must comply with relevant national regulatory regulations and the APP security management requirements.

(II) Operation Path

Open this APP, log in to your account, and enter the [My] page;

In the [My] page, find and click the [Personal Information] option. After entering the [Personal Information] page, you can see the list of personal information that has been filled in. Click Change Information to enter the editing page and modify information such as "name" and "contact number". Enter the corrected information according to the prompt on the page, and then submit the application.

(III) processing time limit and feedback

After the information correction application is submitted, the system will complete the review and processing within [3 working days] (if manual review is required in special circumstances, the processing time limit shall not exceed [7 working days]). After the processing is completed, you will view the correction results in the APP. If the correction application fails, we will explain the specific reasons in the notice (such as wrong information format, failed verification, etc.).

2. User Account Cancellation

(I) Write-off Impact Description

Account cancellation is an irreversible operation. Once the account is canceled successfully, the following consequences will occur. Please fully understand before applying:

The account will no longer be able to log in to this APP, and all personal information (including but not limited to avatars, nicknames, personal data, and historical operation records) in the account will be completely deleted or anonymized (except for those required by laws and regulations);

All the rights and interests (such as points, etc.) associated with the account will be invalid and cannot be restored or transferred;

The service agreement established between us and you based on this account will be terminated and we will no longer provide you with related services.

(II) write-off conditions

In order to protect the security and legal rights of your account, the following conditions must be met to apply for cancellation of your account:

The account is in a normal logon state, and there are no unprocessed security risks (such as account freezing and complaint of theft);

(III) Operation Path

After logging in to APP, enter the [My]-[Account Cancellation] page;

After clicking Cancel, the system will display the relevant instructions for account cancellation. If you confirm your application for cancellation, the system will check the conditions of your account. If the cancellation conditions are not met, the specific problems (such as "there are unfinished orders") will be listed and you will be guided to deal with them;

After the account meets the cancellation conditions, click [Submit Cancellation Application]];

After the cancellation request is submitted, the system will officially start the account cancellation operation. And will delete account-related information, including but not limited to account nicknames, avatars, operation records and other information.

(IV) processing time limit and result feedback

The cancellation application will take effect as soon as it is submitted. If there is a cancellation failure, please communicate with us in time, and we will solve the cancellation problem for you.

XIV Other

(a) It may be necessary for this product to disclose your personal information in accordance with the requirements of laws and regulations, legal proceedings, litigation and/or legal requirements of public bodies and government departments. We may also disclose information about you if we determine that disclosure is necessary or appropriate in relation to national security, law enforcement, or other matters of public importance.

(B) We may also disclose information about you if we determine that disclosure is reasonably necessary to enforce our terms or to protect our operations, rights, assets or products, or to protect users, or to detect, prevent and address fraud, unauthorized use of products, violations of our terms or policies, or other harmful or illegal activities. (For the avoidance of doubt, to the extent expressly permitted by local data protection laws and only in this case, this product will only collect, use or disclose your personal information without your consent.) This may include providing information to public or government agencies; and sharing information with third-party partners about the reliability of your account to prevent fraud, violations, and other harmful practices within or outside of our products.

XV. Transfer

(a) This product will not transfer your information to any entity except in the following cases: with your express consent;

(B) If this product is involved in a merger, acquisition or sale of all or part of its assets, we will notify you of any changes in the ownership and use of your personal information and any choices you may have about your personal information by email and/or by posting a prominent notice on our website.

16. Location of storage of information

(a) We store information obtained from the People's Republic of China in the People's Republic of China. In the event of cross-border data transmission, we will separately inform you of the purpose and recipient of the data in the form of an in-station letter or email, and obtain your authorization and consent. We will strictly abide by Chinese laws and regulations to ensure that the data recipient has sufficient data protection capabilities to protect your personal information.

(B) The duration of information storage, we undertake to always store your personal information for a reasonably necessary period in accordance with the provisions of the law. After the above period, we will delete your personal information.

XVII. Handling of Sensitive Information

  1. Definition of Sensitive Information

    Sensitive information includes, but is not limited to, the user's personal identification information (such as name, ID number, residential address, telephone number), financial information (such as bank account information), facial information, and other information that is considered sensitive by law.

  2. Collection of sensitive information

    We only collect sensitive information with the explicit consent and authorization of the user.

    We will clearly inform users of the purpose, method, and scope of collecting sensitive information, as well as the possible consequences of users refusing to provide sensitive information.

  3. Use of Sensitive Information

    We will only use users' sensitive information within the scope of the purpose clearly informed at the time of collection.

    We will not use the user's sensitive information for any other purpose that is inconsistent with the purpose of collection, unless we obtain the user's explicit consent.

  4. Sharing and Transfer of Sensitive Information

    We will not share users' sensitive information with any third party unless we obtain the user's explicit consent or based on legal requirements.

    In the case of the need to transfer the user's sensitive information to a third party, we will notify the user in advance and obtain the user's explicit consent.

  5. Storage and Protection of Sensitive Information

    We will take reasonable security measures, including but not limited to encryption technology, access control, security audit, etc., to protect the sensitive information of users.

    We will only retain sensitive information from users for as long as necessary to achieve the purpose for which it was collected, unless otherwise provided by law.

  6. User Rights

    Users have the right to view, modify, delete their sensitive information at any time, or ask us to stop using their sensitive information.

    Users have the right to ask us for specific ways to access, correct, delete or stop using their sensitive information.

    Users have the right to make complaints or suggestions to us regarding the handling of their sensitive information.

XVIII. Updates to this Policy

(a) We may modify and update this privacy policy from time to time. For updates to the privacy policy, we will publish them in the form of notice notice in this product. You can visit this product to inquire about the latest version of the privacy policy. We will give you a solemn notice of material changes (including, for some services, we will send a notice via email describing the changes to the Privacy Policy).