Privacy Policy

Date: [2023] [12], [18]

Effective date: [2023] year [12] month [19] day

 

Welcome you to choose by Hangzhou XianGeYayi Cultural Technology Co., Ltd (registered in Hangzhou, Zhejiang province, Xihu street, Hupao road No.36, the relevant person in charge of personal information protection contact for: xiangeyayi2024@163.com) provides the 3D Maze Escape game software (hereinafter referred to as "software" or "product"), we need to get some of your personal information, including the information you offer to provide us and we read the equipment access information, in order to provide you with better service. We know the importance of personal information to you, and we will do our best to protect your personal information safe and reliable. To this end, we have formulated this User Privacy Policy in accordance with relevant regulations, which will help you understand the following:

 

1. How do we collect and use your personal information

 

2. How do we store your information

 

3. How do we share, transfer, and publicly disclose your personal information

 

4. How do we protect your personal information

 

5. Your rights

 

6. Special provisions on the personal information of minors

 

7. Revision of this Privacy Policy

 

8. How to contact us

 

9. Complaint feedback channel

 

10. Other

 

This policy is a part of the Software User Agreement. Before using our software, please be careful to read the terms of the privacy policy and choose to accept or not.

 

 I. How do we collect and use your personal information

 

 Personal information refers to any information recorded electronically or by other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person.

 

(I) We follow the principles of legitimacy, legality and necessity, for the following purposes described in this policy, collect and use the personal information generated by you during the process or the use of the Services. If we want to use your personal information for other purposes not specified in this policy, or to use the information collected for a specific purpose or beyond the scope of authorized consent, we will inform you in a suitable manner within a reasonable period and obtain your consent again before use.

 

1.1 Ensure the normal operation of the software and service

 

When you use software and related services, in order to ensure the normal operation of software and services, we will collect the following information: hardware model, operating system version number, international mobile device identification code (IMEI), device unique ID (OAID, international mobile user ID) (IMSI), network equipment hardware address (MAC), IP address, application installation list, software version number, network access mode and type, location information, storage album, external storage. Some partners may collect your contact person, call records, calendar, SMS, local phone numbers, pictures, cameras and other information, see article 1.9 of this Agreement. Please understand that this information is the basic information that we must collect to provide services and ensure the normal operation of the products.

 

1.2 Business function 1: registration, authentication and login

 

1.2.1 when you register, log in this software and related services, you can create accounts through the phone number, or we will send SMS verification code to verify your identity is valid, and you can improve the relevant network identification information (avatar, nickname and password), collect the information to help you complete the registration. You can also choose to fill in the gender, birthday, region, and introduce your personal information according to your own needs. In the registration process, we will obtain the information according to your filling, and the information is used for your account login. If you refuse to provide it, you will not be able to use the mobile phone number to complete the account registration, but it will not affect you to complete the registration process in other ways.

 

1.2.2 You can also use the third party account (Facebook, telegram, YouTube, WeChat, QQ, weibo account) login into the software, you will authorize us to register your public information in the third party platform (avatar, nickname), and after you agree to this privacy policy to your third party account and your product account, you can directly through the third party account login and use the software and related services.

 

1.2.3 In accordance with the relevant laws and regulations of the People's Republic of China, you may need to provide your real identity information (real name, ID card number and telephone number) to complete the real-name verification. The information belongs to sensitive information, in the registration process or when you use the need of identity authentication function or service, we will set obvious logo to remind you and with your express consent, according to your fill in the information, if you do not provide the information, you will not be able to complete the account registration or use some functions (such as prepaid phone), but you can continue to use other services of the software. The above information you provide will be continuously authorized to our use during your use of the software. When you cancel your account, we will stop collecting, using and delete the above information.

 

1.3 Business function 2: Payment and consumption

 

 When you use the software prepaid phone and consumption function, in the process of payment, we need to get your equipment on the corresponding payment tools, collect your third-party payment account account information (alipay to account, WeChat account or other forms of payment account information), at the same time collect your purchase records, consumption record information, so that the follow-up service in the process of your transactions, we will do our best to protect the security of your virtual goods. This information is sensitive information, and we will obtain your express consent before obtaining the above information. Collecting the above information is necessary to realize the consumption function of the software, otherwise it will not be able to complete the transaction.

 

The above permissions and information you provide will continuously authorize us to use during your use of the Software. When you cancel your account, we will stop collecting, using and delete the above information.

 

1.4 Business function 3: Game log

 

 When you use the software and related services, we will collect your game log information, including login log, operation log, log, game game information, dating records, so that you can view your game history in the client, at the same time for game operation statistical analysis, account recovery, customer service complaints and other game security analysis.

 

To improve your user experience, we may synchronize the aforementioned information to subsequent versions of the software or to other products that you are using.

 

1.5 Business function 4: distribute physical prizes

 

 When you participate in various activities held by the software and get physical prizes, we will require you to fill in your name, mobile phone number, nickname and address to give you physical prizes. If you refuse to provide them, you will not be able to give you the corresponding physical prizes, but you can continue to use other services of the software.

 

The above information you provide will be continuously authorized to our use during your use of the software. When you cancel your account, we will stop collecting, using and delete the above information.

 

1.6 Business function 5: Positioning

 

 If you want to view the regional leaderboard, we need you to authorize us to location in your mobile device when you get the regional leaderboard. Geographic location information is sensitive information, and we will obtain your express consent before obtaining the geographical location information. If you refuse to authorize it, you will not be able to use this function, but it will not affect your normal use of other functions of the software.

 

The above permissions you provide will continue to authorize us during your use of the Software. When you turn it off, we will stop using it.

 

1.7 Service function 6: Voice chat

 

If you want to interact with other users of the software through voice, after your authorization, the software will access the microphone permission in your mobile device, providing you with voice chat interaction and other functions. If you refuse the authorization, you will not be able to use this feature, but it will not affect your normal use of the software. The above permissions you provide will continue to authorize us during your use of the Software. When you turn it off, we will stop using it.

 

1.8 Business Function 7: Improve the game environment

 

 When you are using this software and related services through text, pictures, voice, video and other ways to interact with other users, we may collect and save the information content you send for filtering pornography, violence, political, abuse, malicious advertising and other improper content, in order to improve the game environment, maintain healthy Internet environment.

 

 In order to create a fair, healthy and safe game environment, we will collect your software identification information, hardware and operating system information, process and game crash record, application installation list to combat piracy, plug-ins, cheating and other behaviors that destroy the fair environment of the game or interfere with or disrupt the normal operation of the game services.

 

 In addition, we need to collect device information and system log information for your use of the software, which will be collected when the game is initiated to improve your game experience and push messages.

 

In order to jointly provide services to you or improve the quality of your services or for reasonable reasons for the safety of your services, we may receive your personal information and other information from our affiliates, partners or other trusted third parties in accordance with the requirements of relevant laws, regulations and regulatory policies.

 

1.9 Business function 8: Third-party SDK information collection

 

 When you use the functions or services of the software, in some specific scenarios, we may use the corresponding service qualifications and ability of the third party service provider to provide software service kit ("SDK") to provide services for you, the SDK may collect and use your personal information, we will obtain after your authorized consent. The software will conduct strict security testing on the SDK or other similar applications, and require third-party service vendors to take strict data protection measures to effectively protect your legal rights. For details of these SDKs

 

Description of SDK Third Party SDK.

 

(Ii) In order to provide you with our other specific services, we will obtain your separate authorization through pop-up boxes before providing the specific services:

 

2.1 For the normal operation of the software (such as downloading update patches, saving large pictures of fish, and sharing pictures), we will obtain the storage permission of your mobile phone terminal after your authorization. If this permission is not authorized, the functions related to disk interaction may not be used properly.

 

Note that if the information cannot identify your personal identity alone or in combination with other information, it is not your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information or we cannot be associated with any particular personal information and other your personal information, such information will be processed and protected as your personal information in accordance with this Privacy Policy.

 

2. How do we store your information

 

2.1 The way that the information is stored

 

We will store your information in a secure way, including local storage (such as data caching with software), databases, and server logs.

 

2.2 Location of information storage

 

We will store the personal information of users collected in China in accordance with the provisions of laws and regulations.

 

2.3 Period of information storage

 

Generally speaking, we store your personal information only within the time necessary to achieve the service purpose or under the conditions specified by laws and regulations. We promise that your personal information will always be stored within a reasonable and necessary period, and for personal information beyond the deadline, we will immediately delete or anonymize it.

 

2.4 Processing after the cessation of operation

 

When our products or services to stop operations, we will timely stop continue to collect personal information, and take the form to push notification, announcement, and within a reasonable time to delete or anonymous processing your personal information, but according to the relevant laws and regulations must keep a certain period of content.

 

2.5 Information security

 

2.5.1 Safety and protection measures.

 

(1) We strive to guarantee the security of your personal information to prevent the loss, disclosure, improper use, unauthorized access or disclosure of the information.

 

(2) We will use various security protection measures within a reasonable safety level to ensure the security of information. For example, use encryption technology (such as SSL), anonymity, and so on to protect your personal information.

 

(3) We will enhance the security capability of the software installed on your device side through increasing technical means to prevent your personal information leakage. For example, we partially encrypt information locally on your device to secure viruses, Trojan, or other malicious programs, websites, and learn information about applications installed by your device or running processes.

 

(4) We establish special management systems, processes and organizations to ensure the security of information. For example, we strictly restrict the scope of people who can access information, require them to comply with confidentiality obligations, and conduct an audit.

 

2.5.2 Handling measures for safety incidents.

 

 In case of security incidents such as personal information leakage, we will take the following measures:

 

(1) Start the emergency plan to prevent the expansion of security incidents, and inform you in the form of push notification and announcement.

 

(2) Assess the possible impact of the event, and take necessary measures to control the situation and eliminate the hidden dangers

 

(3) in accordance with the national network security event emergency plan and other relevant provisions of the timely report, report content including but not limited to: involves the type of the personal information subject, quantity, content, nature, the event, has taken or will take disposal measures, incident disposal of relevant personnel contact, etc

 

3.How do we share, transfer and publicly disclose your personal information

 

3.1 Sharing

 

We will carry out the impact assessment of personal information security in advance, and take effective measures to protect the subject of personal information according to the results of the assessment. We will keep your information confidential and will not share any of your information, except if:

 

(1) Sharing with explicit consent: We will inform you of the purpose of sharing personal information, the type of data recipient and the possible consequences in advance, and after obtaining your explicit consent, we will share your personal information with other parties;

 

(2) We will share your personal information in accordance with the provisions of laws and regulations or the mandatory requirements of the competent government authorities; if your personal information is sensitive, we will inform you of the type of the sensitive personal information involved, the identity of the data receiver and data security capability, and obtain your express consent before sharing the information.

 

(3) It is necessary to safeguard the legitimate rights and interests, public interests, property or safety of us and our partners and other users;

 

(4) Sharing with trusted authorized partners: In order to provide you with more perfect and high-quality products and services, as well as the needs of software operation services themselves, our third-party account registration, sharing, push, crash collection, live video and other services will be provided by authorized partners. We may share your personal information with our partners to provide a better customer service and user experience, but the use of such shared personal information will be limited to the specific circumstances of the software. Our partners will keep this information confidential under our instructions and this Privacy Policy, and our partners are not authorized to use the shared personal information for any other use. If you refuse our partners to collect personal information necessary to provide the services, you may be unable to use the services in the Software; currently, our authorized partners include the following types:

 

 A. Authorized partners for advertising and analysis services. Unless with your consent, we will not share your personally identifiable information (information that can identify you, such as name or email address, to which to contact you or identify you) with partners providing advertising and analysis services. We will provide these partners with information about their advertising coverage and effectiveness, but will not provide your personally identifiable information, or we will de-identify this information so that it does not identify you personally.

 

And b, suppliers, service providers, and other partners. We send information to providers, service providers, and other partners that support our business worldwide, including but not limited to providing technical infrastructure services, analyzing how we use our services, measuring the effectiveness of advertising and services, providing customer service, facilitating payments, or conducting academic research and surveys. Follow-up according to the needs of our business development, may access to other third party services, in access to the third party services need to share your information, we will clear in this privacy policy the third party need to collect your information, for what purpose, will prompt you to read, when you continue to use our software, as you agree to the third party to collect your relevant information. If the third party provides additional functions, then when you use the function, you will pop up and get your authorization to collect your information. When you refuse, you cannot use the function, but it does not affect your use of other functions of the software.

 

(5) It is necessary to deal with the disputes or disputes between you and others;

 

(6) If you violate the relevant laws and regulations or the relevant agreements and rules of the Software, you need to disclose them to a third party.

 

3.2 Transfer

 

 We will not transfer your personal information to any company, organization or individual unless with your express consent.

 

In addition, in the event of a merger, acquisition or bankruptcy liquidation, the transfer of personal information may be involved. In this case, we will require the new company or organization holding your personal information to continue to be subject to this Privacy Policy, otherwise we will require the company or organization to ask you for authorization again. If it is bankrupt and there is no recipient, we will delete the data.

 

3.3 Public disclosure

 

 We will not publicly disclose your personal information unless you obtain your express consent.

 

In addition, we may disclose your personal information to the competent authority based on laws, legal procedures, litigation, or mandatory requirements imposed by the competent government authorities. However, we guarantee that in the event of the above circumstances, we will verify the authenticity of the disclosure requesting party and the disclosure request, and require the disclosure requesting party to issue the corresponding valid legal documents when necessary, and take security protection measures for the disclosed information in accordance with legal and industry standards.

 

3.4 Exception to authorization for sharing, transfer and public disclosure of personal information

 

3.4.1 Please be fully aware that in the following circumstances, we must share, transfer or publicly disclose your personal information.

 

(1) Those directly related to national security and national defense security;

 

(2) Those directly related to public safety, public health and major public interests;

 

(3) directly related to crime investigation, prosecution, trial and execution of judgment;

 

(4) In order to safeguard the major legitimate rights and interests such as the life and property of the subject of personal information or other individuals, but it is difficult to obtain the consent;

 

(5) Personal information disclosed by the subject to the public;

 

(6) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

 

(7) The violation of legal regulations or the user agreement or use of the Software rules causes us to take necessary measures against you;

 

(8) It is necessary for signing and performing the contract according to the requirements of the personal information subject;

 

(9) necessary for maintaining the safe and stable operation of the products or service provided, such as the discovery and disposal of faults of the product or service;

 

(10) The personal information controller is a news unit and it is necessary to carry out legal news reports;

 

(11) The personal information controller is an academic research institution, which is necessary to carry out statistics or academic research for public interest, and provides the results of academic research or description, and identifies the personal information contained in the results;

 

(12) Other circumstances stipulated by laws, regulations and national standards.

 

3.4.2 In addition, according to the relevant standards, sharing, transfer to the identification of personal information, and ensure that the data receiver cannot recover and identify the personal information subject, does not belong to the personal information sharing, transfer and public disclosure behavior, the kind of such data preservation and processing will not be separately to inform you and obtain your consent.

 

4. How can we protect your personal information

 

4.1 We use industry-standard security safeguards to protect your personal information against unauthorized access, public disclosure, use, modification, or loss of the data. We will take all reasonable and feasible measures to protect your personal information. For example, we are protected by SSL encryption when exchanging data between your mobile device and software; we provide https secure browsing of websites, we use encryption technology to ensure the confidentiality of data; we use trusted protection mechanisms to prevent malicious attacks; we deploy access control mechanisms to ensure that only authorized people have access to personal information; and we hold security and privacy training courses to enhance employee awareness of the importance of protecting personal information.

 

4.2 We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the required period to meet the purpose stated in the cost policy, unless the retention period is extended or granted by law.

 

4.3 The Internet is not an absolutely secure environment, and E-mail, instant messaging, and other ways of communication with users are not encrypted. We strongly recommend that you do not send personal information in this way. Please use complex passwords to help us keep your account safe. We will also do our best to ensure the information you send to us.

 

4.4 After the unfortunate occurrence of a personal information security event, we will inform you in accordance with the requirements of laws and regulations of the basic situation and possible impact of the security event, the disposal measures we have taken or will take, suggestions you can independently prevent and reduce risks, and remedial measures for you, etc. We will timely inform you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will issue the announcement in a reasonable and effective way. At the same time, we will also take the initiative to report the handling of personal information security incidents according to the requirements of the regulatory authorities.

 

5.Five your rights

 

In accordance with the relevant laws and regulations, as well as the common practices in other countries and regions, we guarantee that you will exercise the following rights to your personal information:

 

5.1 Query of your personal information

 

 You have the right to inquire your personal information, except for exceptions stipulated by laws and regulations.

 

If you want to exercise data access, you can query, edit your personal information, payment information, change your password, add security information and so on through the personal data page. If you need to query other personal information that you are using the software, we will provide you upon reasonable request. You can contact us through our open customer service contact information, and we will reply within 15 days after verifying your user identity.

 

5.2 Correct your personal information

 

 If you find that your personal information is wrong or incomplete, you have the right to ask us to make corrections. You can contact us through our open customer service contact information, and we will reply within 15 days after verifying your user identity.

 

Please note: if you complete the real identity authentication through the identity authentication function, your real identity is bound to the authentication account, and can not be changed again.

 

5.3 Change the scope of your authorized consent

 

 Each business function requires some basic personal information to complete (see Part 1 of this policy). For the collection and use of the collection of additional personal information. You can find the "cancel account" function in the setting function of the software, or give or withdraw notification, location information, camera, album, file storage and access, and recording authorization consent in the personal device system; generally speaking, you can find the button to withdraw authorization in the device according to the operation logic of "Device setting —— application —— permission management". In different devices, the permission display and closing mode may be different, please refer to the instructions or guidelines of the equipment and system developer.

 

Special note: When you withdraw the relevant authorization, we will not process the corresponding personal information, but please understand that when you withdraw your consent or authorization, we cannot continue to provide you with the corresponding functions and / or services. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

 

5.4 Delete your personal information

 

In the following cases, you can request us to delete your personal information, you can contact us through our public customer service contact information, and we will reply within 15 days after verifying your user identity:

 

1. If we handle our personal information against laws and regulations;

 

2. If we collect and use your personal information without obtaining your consent;

 

3. If we violate our agreement by handling our personal information;

 

4. If you believe that we violate laws and regulations or violate or agree to share, transfer or publicly disclose your personal information to a third party.

 

 If we decide to respond to your deletion request, we will also notify the entities that obtain your personal information from us to promptly delete it, unless otherwise provided by laws and regulations, or those entities receive your independent authorization.

 

 When you delete the information from our service, we may not immediately delete the corresponding information from the backup system, but will delete the information when the backup is updated.

 

Special note: The deletion of some personal information may prevent you to use the software or some functions / services of the software. If you plan to delete your personal information, you will not continue to use the software, and you may start the account registration cancellation program.

 

5.5 Cancel your account number

 

If you need to cancel your account registered on the official channels, you can take the following steps:

 

(1) You can apply for cancellation through the "Account cancellation" section in the customer service feedback;

 

(2) You can directly contact the customer service to apply for cancellation through the email: xiangeyayi2024@163.com;

 

 If you choose any of the above ways to submit the application, our customer service will assist you to complete the account cancellation.

 

 If you need to cancel your account registered with the channel party, then you need to apply to the channel party for account cancellation or cancel the authorization to log in to our software. Unregistering the account means that we will stop providing services to you through the channel account, and the channel account that you use by logging in our service cannot be restored, once it is cancelled. Please back up all relevant information and data before operation.

 

 In order to provide you with a more convenient way to log off, we will continue to optimize our products and inform you through the page announcement.

 

After canceling the account, we will stop providing you with products or services, and permanently delete your account, your registration information, all data in your account, and traces of your use, except the content that must be retained for a certain period of time according to relevant laws and regulations.

 

5.6 Get a copy of your personal information

 

You have the right to obtain a copy of your personal information. You can contact us through our public customer service contact information, and we will reply within 15 days after verifying your user identity.

 

5.7 Automatic decision of the constraint information system

 

In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms, such as information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you can contact us through our public customer service contact information, and we will provide appropriate relief methods.

 

5.8 In response to your above request

 

To be safe, you may need to provide a written request, or otherwise prove your identity. We may ask you to verify your identity before you process your request. We will respond within 15 days after receiving your request.

 

We will not be able to respond to your request as required by laws and regulations and national standards if:

 

(1) Related to your performance of the obligations stipulated by laws and regulations;

 

(2) Those directly related to national security and national defense security;

 

(3) Those directly related to public safety, public health and major public interests;

 

(4) directly related to criminal investigation, prosecution, trial and execution of judgment;

 

(5) In order to protect your major legitimate rights and interests of life, property or other individuals, but it is difficult to obtain your consent;

 

(6) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;

 

(7) Trade secrets are involved;

 

(8) We have sufficient evidence that you have any subjective malice or abuse of your rights.

 

5.9 Access to the Privacy Policy

 

You can view all the contents of this privacy policy in the "Set an Account Information-View the Privacy Policy" in the game.

 

6. Special provisions on the personal information of minors

 

 Our software and services are mainly aimed at adults and are not recommended for users under the age of 18. If you are under the age of 14, please read the Children's Privacy Protection Policy accompanied by your guardian. If you use our software, you must obtain the consent of your guardian, provide your personal information and register as a software user after the consent. Teenagers aged 14 to 18 should read and agree, and should inform their guardian to read this Privacy Policy, and contact us when withdrawing the service or asking questions.

 

If your guardian does not agree with your use of the software, services or with our information in accordance with this policy, please terminate your use of our services and notify us immediately, and we will try to delete the relevant data as soon as possible.

 

7. The Revision of the Privacy Policy

 

 We may duly revise this privacy Policy, which forms part of this policy. We will not reduce your rights under this policy without your express consent. We will publish any changes made to this policy on this page.

 

For major changes in privacy policy, we will next when you start the software to notify you, you only when accepting such changes can continue to use the software, if you do not agree to the revised privacy policy, you have the right and should immediately stop using the software, if you continue to use the software, said you agree to accept the revised privacy policy.

 

Significant changes referred to in this policy include, but are not limited to:

 

(1) Our service mode has undergone major changes, such as the purpose of processing personal information, the type of personal information processed, and the way of using personal information;

 

(2) We have undergone major changes in the ownership structure and organizational structure, such as business adjustment, bankruptcy and merger;

 

(3) The main objects of personal information sharing, transfer or public disclosure change;

 

(4) Your rights to participate in the processing of personal information and its exercise mode have changed significantly;

 

(5) We are responsible for handling the changes in the responsible departments, contact methods and complaint channels of personal information security;

 

(6) When the personal information security impact assessment report indicates that there is a high risk. We will also file the old version of this policy for your review.

 

8.How to contact us

 

 If you have any questions, comments or suggestions on this Privacy Policy, please email xiangeyayi2024@163.com and contact our customer service staff.

 

 To ensure security, we may ask you to verify your identity before you process your request. You may need to provide a written request, or otherwise prove your identity.

 

We will review the questions as soon as possible, and normally, we will reply within 15 days after verifying your user identity.

 

9.Complaint feedback channel

 

 Service supervisor email: xiangeyayi2024@163.com (9:30-17:00)

 

In case of any dispute with us due to the implementation of this privacy policy, both parties shall negotiate icably; if otherwise, they shall have the right to file a lawsuit with the Intermediate People's Court of Hangzhou, Zhejiang Province.

 

 10.Others

 

This Privacy Policy is a part of the Software User Agreement, and other outstanding matters shall be subject to the User Agreement.

 

 

Hangzhou XianGeYayi Cultural Technology Co., Ltd