Privacy Policy

Version number: V4.1.0
Release date: June 2023, 6 Effective date of this version: June 14,
2023

preface

Brighhsun Corporation (collectively, "2U" or "we") is committed to protecting the privacy of users of Tongyou's products and services (collectively, "2U Services"). When you use Tongyou Services, we may collect and use your relevant information. Please read this Privacy Policy carefully before using our products or services, especially the content in bold, to understand our principles and protection measures for the disposal of your personal information.
This Privacy Policy applies to the [2U] products and services we provide. Users under the age of 2 shall be subject to both this Policy and the products and services. For users under the age of <>, this Policy and the Rules for the Protection of Children's Personal Information and Instructions for Guardians shall apply Please note that we regularly check and update this policy, so the relevant measures will change accordingly. We kindly ask you to visit this page periodically to ensure that you are always aware of the latest version of our Privacy Policy 。 After reading this Policy, if you have any questions about this Privacy Policy or matters related to this Privacy Policy, please contact: support@<>u.chat.

directory

I. How We Collect and Use Personal Information
II. Personal Information We May Share, Transfer and Disclose III. How We Use Cookies and Similar Technologies
IV. How We Store and Protect Personal Information
V. How to Manage Your Personal Information
VI
. Third-Party Services
7. Third-party SDK

VIII. Age Limit
IX. Notices and Amendments
X. How to Contact Us

We collect your personal information so that you and other users can use this product more easily and satisfactorily. Our goal is to provide the best possible service to all users. And this information helps us achieve this goal.

I. How We Collect and Use Personal Information
Personal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.
We will collect and use your personal information for the following purposes:
The business functions of this product are divided into core business functions and additional business functions, of which the core business functions are instant messaging.

(1) Circumstances
under which you must authorize us to collect and use your personal information You must provide us with necessary personal information and permissions to achieve the core business functions of this product. Personal information includes: facial feature information, mobile phone number, user logs, device information, when you register an account, you need to provide basic personal registration information including: mobile phone number, and create your username and password, we will send an SMS verification code to verify whether your identity is valid, if you fail to provide the above information, you will not be able to register an account. After the account registration is completed, you can modify and supplement your nickname, gender, birthday, and region related information, which belong to your "account information", if you do not provide these supplementary information, it will not affect your use of the core business functions of this product.

(2) The personal information collected and used by each business function in the product is listed as follows: If you do not authorize the necessary information for the core business function, you will not be able to use the product.
Business Classification Business
Involved Information Type Specific
Information
Core Business
Functions
Instant Messaging Basic personal information, personal Internet records,
personal common device information Mobile phone number, user log, device information
Read
the call status
Mobile network information Friend list
Contact information Mobile phone contact list
We collect your contacts and friends list. The collection of contact list is your on-device contact list and your 2U list of group chats and friends list. Legal Basis (Relevant Jurisdictions only): Necessary to perform our contract with you to provide 2U and connect you with your friends.
- To connect you with other 2U users;
- (in relation to your list of group chats and friends list) to develop and improve tools we use to detect account violations and enhance the safety and quality of 2U accounts The retention period lasts until you request removal or amendment of the Personal Information or your account is deleted, whichever is earlier.

Time personal location information, personal Internet access records
Precise positioning information


(user active authorization),
browsing history

Tongyou Mall
Personal basic information, personal Internet records, personal property information, personal location information Mobile phone number, bank card information, ID card information, transaction records, delivery address, logistics information
, browsing records Additional business functions
Information
Personal Internet records

Browsing history, click history
,
real-name authentication,
basic information, personal identity information, personal name, ID card, mobile phone number

,
information push,

personal Internet records, Personal common device information Browsing history, shopping history, device information, device identifiers (IMEI, MAC) Customer

Service Basic
personal information
Phone
number, mobile phone number

Use other software to
open the file
Device status information A
list of device app installations

Read and write pictures and files on your device When
you actively use Moments, Channels account, status and other functions to send pictures and videos, WeChat will collect your pictures and videos as part of the information. The purpose is to enrich the user's communication and social experience, such as posting pictures in Moments and Channels.

Clipboard is used to obtain invitation codes when
you actively use user registration

(III) You can choose whether to authorize us to collect and use your personal information

1. Our personal information may be collected and used in our additional business functions. If you do not provide this personal information, you can continue to use the core business functions, but you may not be able to use the following additional business functions. These functions include: (1) Functions based on contact list information:
we will collect your contact list information and automatically push you friends with registered accounts in your contact list;
(2) Function based on location information: we will collect your location information and send your location to your friends in the product; Increase positioning when posting moments;
(3) Function based on online transaction: We need to collect your bank card number, ID card number, bank reserved mobile phone number, and mobile phone verification code. The payment functions involved in the transaction service are provided by third-party payment institutions. In order to provide you with online trading services or goods, we need to collect your transaction records, delivery address, logistics information, order information, if you refuse to provide such information, we will not be able to complete the relevant delivery services;
(4) Camera-based function: directly complete video shooting, photo shooting and send to your friends in the product; Directly complete video shooting and photo shooting in the product to participate in the interactive module; Used to scan QR code; Directly complete the photo shooting in the product and set it as the account avatar; Video chat with friends;
(5) Image-based upload function: upload pictures and send them to your friends; Upload images to participate in the interactive module in the product; Upload an image and set it as an account avatar;
(6) Functions based on voice technology: send voice messages to your friends; Add voice when posting time; Make web calls with friends;

2. The above functions require you to open your geographic location (location information), camera, storage, microphone, contact list, and device attribute information permissions to us in your device to realize the collection and use of the information involved in these functions. You can check the status of your above permissions on your device and decide to turn them on or off at any time. When you turn on these permissions, you authorize us to collect and use these personal information to achieve the above functions, and when you turn off the permissions, it means that you cancel the authorization, we will no longer continue to collect and use your personal information, and we cannot provide you with the above functions corresponding to these authorizations. Your decision to close your authority will not affect the processing of personal information previously carried out based on your authorization.

3. You can modify the unified management of permissions in the mobile phone system settings.
(<>) The relevant business functions of this product will open your device access rights, which are listed as follows:
Business scenario
Scenario description
Access and use permissions Add friends

Add friends in the product
Access contact list permissions

Avatar modification
Upload or take a photo in your account information to modify your avatar
Access storage permissions Access camera permissions Send images Send pictures to friends

in the product Access camera permissions

Access storage permissions


Upload images
Upload images
in the product interaction module Access camera permissions Access storage permissions Voice chat
Implement network calls and send voice functions Access microphone permissions

Access
storage permissions


Video chat
Implement video functions of both parties Access
camera permissions
Scan Call the mobile phone camera to scan barcode/QR code or select a picture
from the album when
scanning the code Access camera permission, access storage permission
Time When the
user uses the time function, You need to select an image from the album or save the image to the local Access Storage Permissions When using the Time function, users need to add voice functions Access microphone permissions
When using the Time function, users need to use the
positioning function to display positioning
Access
rough status information

Access precise status information Send location
User sends location to friends Access
rough status information Access precise status information


Outgoing calls
Click the phone number in the chat history to make a call
directly Call permission
Access camera permissions Product Interaction Module
Interactive module Users can upload pictures and download and save pictures
Access storage permissions
Access camera permissions

Determine product usage status

View status information about the WLAN
View WLAN status permissions
Determine product usage status Check
if and what kind of
network your device is connected to View network connection permissions Change network connection permissions

Check for updates Install
the downloaded app
now Access in-app installation of additional app permissions
Minimize the web call interface During the use of network call chat, you can minimize the call interface as a floating window, so that you can continue to use other functions of this product while chatting Using
floating window permissions
Product Installation
Allows this product to add shortcuts to the home screen of
the device for easy use
Use the Create desktop shortcut permission
Audio and video calls and voice message playback Toggle handset playback and speaker playback
during
audio and video calls and voice messages Change audio permissions
Message notification Accept unread message notifications

in a more timely manner Voice call When
a voice call comes in, remind the user by vibrating Control vibration permissions
Product Installation
Avoid repeated installation of shortcuts (shortcuts will be uninstalled before installing) Uninstall
shortcut permissions Used
by the
app
Keep the application process turned on, continuously provide message reminders, push services Run
foreground service permissions SMS Voice messages
Implement the read and write permissions

for sending and getting voice messages

(5) Exceptions to obtaining authorization and consent According to relevant laws and regulations, your authorization and consent are not required
to collect your information in the following circumstances:

(1) Related to national security and national defense security;
(2) Related to public safety, public health, and major public interests;
(3) Related to criminal investigation, prosecution, trial and execution of judgments;
(4) For the purpose of safeguarding the life, property and other major legitimate rights and interests of the information subject or other individuals, but it is difficult to obtain your consent;
(5) The information collected is disclosed to the public by yourself;
(6) Collecting information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(7) Necessary for signing a contract according to your requirements;
(8) Necessary for maintaining the safe and stable operation of products, such as discovering and disposing of product or service failures;
(9) Necessary for legal news reporting;
(10) When it is necessary for academic research institutions to carry out statistical or academic research based on the public interest, and when the results of academic research or description are provided to the outside world, the information contained in the results is de-identified;
(11) Other circumstances stipulated by laws and regulations.

(6) Information we will collect during your use of this product
In order to understand product adaptability, identify abnormal account status, and ensure network security or operational security, we will collect information about the services you use and how you use them, and associate this information, including:
Log information: When you use this product, we will automatically collect your detailed use of our services and save it as relevant network logs. Including your login account, search query content, IP address, network environment, date and time of access and browsing records of the web pages you visit, Push open records, length of stay, refresh records, follow, save and share.
Device information: According to the specific permissions granted by you during the installation and use of the software, we will receive and record the information about the device you use (including: IMEI, MAC, device model, operating system version, device settings), device status information (including: device application installation list), and device location information (including: IP) during the use of the software in the foreground or background operation Address, GPS location, WLAN access points, Bluetooth, and base stations that can provide relevant information) Please note that separate device information and log information are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, such non-personal information will be regarded as personal information during the period of combined use, and we will anonymize and de-identify such personal information unless authorized by you or otherwise provided by laws and regulations.

Third-party SDK name The name of the third-party SDK developer Official website of third-party SDK developers Feature type Purpose of Use Permissions that may be invoked Permission authorization method Types of Personal Information Processed Link to Privacy Policy
Google Positioning SDK Google Inc https://developers.google.com/maps In order to provide you with the location services required for the function of [ask the APP developer to fill in the function description corresponding to the specific application scenario]. To provide you with location services Troubleshooting, diagnosing services and conducting data statistics to ensure the normal operation of products and services To provide you with location services, we will collect your Wi-Fi status information and location information, and we will process your device information. In order to return your location information to the developer, for the developer to provide you with corresponding services based on your bit information: Access W1-FI status Get the location Device information Location information It is determined by the device system developer and the developer application, and turned on when the end user agrees to grant this permission to the developer Get the connection WIFI information, ask back to Baidu location service as an auxiliary positioning basis, and then return to the developer for more accurate location information Obtain location information (may include GNSS information, W1FI address and signal strength information, base station 1D data information, sensor information, mobile phone signal strength information ), which can return the location information of the end user to the developer without the end user manually entering its own geographic must Fanlian device information (including AndroidID, operating system version, device brand and model, device configuration, application information (application name)), in order to provide positioning services, improve the accuracy and success rate of positioning services, provide continuous positioning services for specific continuous positioning scenarios, and provide problem tracking, troubleshooting, diagnosis services and data statistics to ensure the normal operation of products and services. https://developers.google.com/maps/terms-20180207

(7) Rules for the use of your personal information

1. We will use the personal information collected in accordance with the provisions of this Privacy Policy and to realize the functions of this product.
2. After collecting your personal information, we will de-identify the data through technical means, and the de-identified information will not be able to identify the subject. Please understand and agree that in this case, we have the right to use the information that has been de-identified; And without disclosing your personal information, we have the right to analyze the user database and use it commercially.
3. Please note that all personal information you provide when using this product, unless you delete it or refuse us to collect it through system settings, you will continue to authorize us to use it during your use of the product. When you cancel your account, we will stop using and delete your personal information.
4. We will make statistics on the use of products and may share these statistical information with the public or third parties to show the overall usage trend of products. However, these statistics do not contain any identifying information about you.
5. When we display your personal information, we will use methods including content replacement and anonymous processing to desensitize your information to protect your information security.
6. Please note that if we want to use your information for other purposes not specified in this Privacy Policy or collect additional information not mentioned, we will ask for your consent in advance. Once you have consented, such additional uses will be considered part of this Privacy Policy and such additional information will also be subject to this Privacy Policy.
7. The application scenarios of the use of personal information and the possible impact on you are listed as follows:
Application scenarios
Business functions and impact
Advertising Show you
matching advertising products or marketing activities
according to user shopping, browsing, attention records, mobile phone systems, and regional information Activity push
Push matching product activities to you based on user browsing history, purchase information, and virtual property information

(8) Reminders Regarding Sensitive Personal Information Sensitive
personal information refers to personal information that, once leaked or illegally used, is likely to cause infringement of the personal dignity of natural persons or harm to personal or property safety, and may endanger personal and property safety, and is very likely to lead to damage to personal reputation, physical and mental health, or discriminatory treatment. The above information provided by you or collected by us may contain your sensitive personal sensitive personal information, such as ID card number, personal biometric information (including facial recognition features, voiceprints and other static or dynamic), bank account number, communication records and content, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information. Please be cautious and pay attention to sensitive personal information, and you agree that we can handle your sensitive personal information in the purposes and methods described in this Policy.

2. Personal information that we may share, transfer or disclose

(1) Sharing

Except in the following circumstances, we will not share your information with any third party without your consent: 1.
To provide you with goods or services, that is, only by sharing your information with a third party can we achieve the core functions you need or provide the services you need.
2. To achieve your service needs, we need to share your information with partners and other third parties to provide you with more targeted and perfect services,
such as: providing corresponding order information to logistics service providers;
3. Achieve the purposes described in the first section of this Privacy Policy "How We Collect and Use Information";
4. Fulfill our obligations and exercise our rights in this Privacy Policy or other agreements we have reached with you;
5. Sharing with partners who entrust us to promote for the purpose of enabling such entrusting parties to understand the coverage and effectiveness of promotion. For example, we can tell the client how many people have seen their promotion or purchased the client's products after seeing it, or provide them with non-personally identifiable statistics to help them understand their audience or customers.
6. To the extent permitted by laws and regulations, in order to comply with the law, protect us and our affiliates or partners, you or other product users or the public interest, property or safety from damage, such as to prevent fraud and other illegal activities and reduce credit risks, we may exchange information with other companies and organizations. However, this does not include information sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this Privacy Policy.
7. Assist in handling disputes or disputes between you and others according to your legitimate needs;
8. Provide your information at the legal request of your guardian;
9. Provided in accordance with the service agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents;
10. Provided based on academic research;
11. Provide based on social public interests in accordance with laws and regulations.
We will only share your information for lawful, legitimate, necessary, specific and clear purposes. For companies, organizations and individuals with whom we share information, we will sign strict confidentiality agreements with them, requiring them to process information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

We will not share the facial features information you provided during login and registration.

(2) Transfer

1. We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1) Transfer your information to other parties after obtaining your explicit consent or authorization;
2) Provide in accordance with applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;
3) As our business continues to develop, we may enter into mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization holding your information to continue to be bound by this Privacy Policy, otherwise, we will require the company or organization to seek authorization and consent from you again.

(3) Disclosure

We will only disclose your information under the following circumstances and on the premise of taking security protection measures that meet industry standards: 1.
According to your needs, disclose the information you specify under the disclosure method you expressly agree;
2. If it is necessary to provide your information according to the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may disclose your information according to the type of information required and the method of disclosure. Under the premise of complying with laws and regulations, when we receive the above request for disclosure of information, we will require the recipient to issue corresponding legal documents, such as summons or investigation letters. We strongly believe that the information requested from us should be as transparent as possible to the extent permitted by law. All requests are carefully reviewed to ensure that they have a lawful basis and are limited to data that law enforcement has a legitimate interest in for specific investigative purposes.


(1) Exceptions to obtaining prior authorization and consent when sharing, transferring, or disclosing information In the
following circumstances, you do not need to obtain your prior authorization and consent for sharing, transferring, or disclosing your information: 2.
Related to national security and national defense security;
3. Related to public safety, public health, and major public interests;
4. Related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and judgment enforcement;
5. In order to protect the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the person;
6. Information disclosed to the public by yourself;
7. Collecting information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
<>. Related to our performance of obligations under laws and regulations.
According to the law, the sharing or transfer of de-identified information and ensuring that the data recipient cannot recover and re-identify the information subject is not an act of external sharing, transfer and public disclosure of information, and the storage and processing of such data will not require separate notice to you and your consent.

3. How we use cookies and similar technologies

WE OR OUR THIRD-PARTY PARTNERS MAY OBTAIN AND USE YOUR INFORMATION THROUGH COOKIES OR SIMILAR TECHNOLOGIES AND STORE SUCH INFORMATION AS LOG INFORMATION.
THROUGH THE USE OF COOKIES, WE PROVIDE OUR USERS WITH A SIMPLE AND EASY WEB EXPERIENCE. A COOKIE IS A SMALL AMOUNT OF DATA THAT IS SENT TO YOUR BROWSER FROM A WEB SERVER AND STORED ON YOUR COMPUTER'S HARD DRIVE. WE USE COOKIES FOR THE BENEFIT OF ITS USERS. FOR EXAMPLE, TO MAKE THE LOGIN PROCESS OF THE PRODUCT'S VIRTUAL COMMUNITY FASTER, YOU CAN CHOOSE TO STORE YOUR USERNAME IN A COOKIE. This makes it easier and faster the next time you want to sign in to the product. COOKIES HELP US DETERMINE THE PAGES AND CONTENT YOU ARE CONNECTED TO, THE TIME YOU SPEND ON PRODUCT-SPECIFIC SERVICES AND THE SERVICES YOU SELECT.
COOKIES ALLOW US TO SERVE YOU BETTER, FASTER AND MAKE YOUR EXPERIENCE WITH OUR PRODUCTS MORE CONVENIENT. HOWEVER, YOU SHOULD BE ABLE TO CONTROL WHETHER AND HOW COOKIES ARE ACCEPTED BY YOUR BROWSER. Please consult the files that came with your browser for more information on this.
WE AND THIRD-PARTY PARTNERS MAY COLLECT AND USE YOUR INFORMATION THROUGH COOKIES OR SIMILAR TECHNOLOGIES AND STORE SUCH INFORMATION.
WE USE OUR OWN COOKIES OR SIMILAR TECHNOLOGIES, WHICH MAY BE USED FOR THE FOLLOWING PURPOSES:
(1) TO REMEMBER YOUR IDENTITY. FOR EXAMPLE, COOKIES OR SIMILAR TECHNOLOGIES HELP US IDENTIFY YOU AS OUR REGISTERED USER, OR SAVE INFORMATION ABOUT YOUR PREFERENCES OR OTHER INFORMATION THAT YOU PROVIDE TO US;
(2) Analyze your use of our products. WE MAY USE COOKIES OR SIMILAR TECHNOLOGIES TO UNDERSTAND WHAT ACTIVITIES YOU USE THE PRODUCTS FOR OR WHICH SERVICES OR SERVICES ARE MOST POPULAR;
(3) Advertising optimization. COOKIES OR SIMILAR TECHNOLOGIES HELP US TO PROVIDE YOU WITH ADVERTISING THAT IS RELEVANT TO YOU BASED ON YOUR INFORMATION RATHER THAN ADVERTISING IN GENERAL.
WHEN WE USE COOKIES OR SIMILAR TECHNOLOGIES FOR THE PURPOSES DESCRIBED ABOVE, WE MAY AGGREGATE NON-PERSONALLY IDENTIFIABLE INFORMATION COLLECTED THROUGH COOKIES OR SIMILAR TECHNOLOGIES TO ADVERTISERS AND OTHER PARTNERS FOR THE PURPOSE OF ANALYZING HOW YOU AND OTHER USERS USE THE PRODUCTS AND FOR ADVERTISING PURPOSES.
THERE MAY BE COOKIES OR SIMILAR TECHNOLOGIES PLACED BY ADVERTISERS AND OTHER PARTNERS ON THIS PRODUCT. THESE COOKIES OR SIMILAR TECHNOLOGIES MAY COLLECT NON-PERSONALLY IDENTIFIABLE INFORMATION ABOUT YOU TO ANALYZE HOW USERS USE THE SERVICES OR TO EVALUATE THE EFFECTIVENESS OF ADVERTISING SERVICES. THESE THIRD-PARTY COOKIES OR SIMILAR TECHNOLOGIES COLLECT AND USE SUCH INFORMATION WITHOUT BEING GOVERNED BY THIS PRIVACY POLICY, BUT BY THEIR OWN PERSONAL INFORMATION PROTECTION STATEMENT.
YOU CAN REJECT OR MANAGE COOKIES OR SIMILAR TECHNOLOGIES THROUGH YOUR BROWSER OR USER SELECTION MECHANISM, AND THE REJECTION PATH: [TONGYOU-ME-SETTINGS-GENERAL-CLEAR CACHE]. HOWEVER, PLEASE NOTE THAT IF YOU DISABLE COOKIES OR SIMILAR TECHNOLOGIES, SOME SERVICES MAY NOT WORK PROPERLY.

4. How We Store and Protect Personal Information

(1) Storage of personal information
Unless otherwise provided by laws, regulations or regulatory authorities, we will only store your personal information within the shortest period of time necessary for the purposes described in this Policy. If we terminate the service or operation, we will stop collecting your personal information in a timely manner, and at the same time comply with relevant laws and regulations to notify you in advance, and delete or anonymize your personal information after the termination of the service or operation, unless otherwise provided by laws, regulations or regulatory authorities.
The personal information collected and generated by us in the course of our operations in the People's Republic of China is stored in the territory of China, except in the following circumstances: 2.
There are clear provisions in laws and regulations;
<>. Obtain your authorization and consent;
In response to the above circumstances, we will ensure that it is implemented in accordance with national laws and regulations and the provisions of relevant regulatory authorities, and provide adequate protection for your personal information.

The maximum storage duration for facial feature information is 1 year.
1. The old facial feature information will be deleted and updated with new facial feature information after each successful login.
2. All pertinent facial feature information will be expunged following the termination of the account.
3. The facial feature information of users who haven't used for over 1 year will be expunged.

(<>) Protection of personal information
We attach great importance to information security, set up a special security team, and take all reasonable and feasible measures to protect your personal information:

1. Data security technical measures
We will adopt security protection measures that meet industry standards, including the establishment of reasonable systems and security technologies to prevent unauthorized access, use, and modification of your information and avoid data damage or loss. Our services adopt a variety of encryption technologies, for example, in some services, we will use encryption technology (such as SSL) to protect your personal information, use encryption technology to encrypt and store your personal information, and isolate it through isolation technology.
When using personal information, such as information display and information association calculation, we will use a variety of data masking technologies to enhance the security of information in use. We will also use strict data access control and multi-factor authentication technology to protect information from illegal use.
2. Other security measures we take to protect personal information
We have an industry-leading data security management system centered on the data life cycle, which improves the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We manage the storage and use of standardized information by establishing a data classification and grading system, data security management specifications, and data security development specifications.
We have full security control over data through contact confidentiality agreements, monitoring and auditing mechanisms.
We also conduct security and privacy protection training courses to enhance employees' security awareness and awareness of the importance of protecting information.
3. We only allow employees and partners who need to know this information to access your personal information, and set up a strict access control and monitoring mechanism for this. We also require all persons who may have access to your personal information to fulfill corresponding confidentiality obligations. Failure to meet these obligations may result in legal liability or suspension of the relationship with us.
4. The Internet is not an absolutely secure environment, and the communication methods with other users such as email, instant messaging, social software or other service software cannot determine whether it is completely encrypted, we recommend that you use complex passwords when using such tools, and pay attention to protect your information security. When communicating with a third party or purchasing services through this product and service, you will inevitably disclose your own information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your information properly and only provide it to others when necessary.
5. The Internet environment is not 100% secure, and we will try our best to ensure or guarantee the security of the personal information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
6. Handling
of security incidents When communicating with third parties through this product, purchasing or exchanging goods and services, you will inevitably disclose your own information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your information properly and only provide it to others when necessary.
In order to deal with possible risks such as leakage, damage and loss of personal information, we have established a number of systems to clarify the classification and grading standards for security incidents and security vulnerabilities and the corresponding handling procedures. We have also established a special emergency response team for security incidents, in accordance with the requirements of security incident handling specifications, initiate security plans for different security incidents, carry out stop loss, analysis, positioning, formulate remedial measures, and cooperate with relevant departments to trace and crack down.
After the unfortunate occurrence of an information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, remedial measures for you, etc. At the same time, we will promptly inform you of the relevant circumstances of the incident by email, letter, telephone or push notification, and when it is difficult to inform the information subject one by one, we will take reasonable and effective measures to issue an announcement. At the same time, we will also take the initiative to report the handling of information security incidents in accordance with the requirements of regulatory authorities.
Please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the system and communication network you use to access the Tongyou Service may have problems due to circumstances beyond our control.
Please be sure to keep your account number, password and other identity elements safe. When you use this product, we will identify you through your account number, password and other identity elements. Once you disclose the foregoing information, you may suffer losses and may be detrimental to you. If you find that your account number, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take corresponding measures in time to avoid or reduce related losses.

V. How to manage your personal information

We encourage you to update and amend your personal information to make it more accurate and effective. You can access your personal information through this product, and when you find that the information is incorrect, you can complete it yourself or ask us to modify and supplement it according to the management method of the corresponding information. We will take appropriate technical measures to ensure that you can access, update and correct your personal information or other information provided when using this product as much as possible.

(I) Modification and update
Except as provided by laws and regulations, you have the right to access and correct your personal information at any time. Specific path: 1. Client operation path:
Log in to the software client on your mobile phone, enter the [Me] page on the home page, click your avatar or [Settings] page to check your identity, account information, or modify your personal information, but for security and identification considerations or according to mandatory provisions of laws and regulations, you may not be able to modify the initial authentication information provided during registration.
(2) Delete
1. Client operation path: Log in to the software client on your mobile phone, enter the [Me] page on the home page, click your avatar or [Settings] page to delete your personal information, but for security and identification considerations or according to mandatory provisions of laws and regulations, you may not be able to modify the initial authentication information provided during registration.
(3) Cancellation 1. You can cancel your account through the following path: (
1) Client operation path:
Log in to the product client on your mobile phone, log in to the [I-Settings-Account and Security-Cancel Account] and follow the prompts to cancel the account.
(2) Customer service telephone path: Please call the customer service telephone provided at the end of the article to contact us, after verifying the account information, we will complete the cancellation for you within 5 working days.
When you choose to cancel your account, all information in your account will be erased and cannot be recovered. We will no longer collect, use or share personal information related to the account, but the previous information still needs to be stored with strong encryption in accordance with national regulatory requirements, and during the period of legal retention, it is instructed by the competent authority to provide the competent authority to inquire, the retention period and the disposal method beyond the expiration datePlease read the "How We Retain, Store and Protect Information" section.
(4) Disclosure and sharing
Please note that many services in our products allow you to publicly share your relevant information not only with your social networks, but also with all users of the service, such as information you upload or post in the Products, your responses to information uploaded or posted by others, or upload or publish your personal information in public areas in the Products that are not visible to specific users. and including location data and log information related to that information. As long as you do not delete the information you have made public, the information may remain in the public domain; Even if you delete publicly available information, it may still be cached, copied or stored independently by other users or third parties not under our control, or stored in the public domain by other users or such third parties. Therefore, we remind and ask you to carefully consider whether to share your information publicly through the above channels. When you find that other users improperly collect or use your or others' information, please contact us in time.
(5) Change the scope of your authorization and consent You
can choose whether to disclose information. Some information is necessary to use this product, but the provision of most other information is determined by you. You can change the scope of your authorization for us to continue to collect information or withdraw your authorization by deleting information, turning off device functions, etc.
After you withdraw your authorization, we cannot continue to provide you with the services corresponding to the withdrawal of authorization, and we will no longer process your corresponding information. However, your decision to withdraw your consent will not affect the processing previously carried out on the basis of your authorization.
(6) Acquisition of copies of personal information
If you need a copy of your personal information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and after verifying your identity, we will provide you with a copy of your personal information (including basic information and identity information) in our services, except as otherwise provided by laws and regulations or otherwise agreed in this Policy.
(7) Respond to your above requests
For security, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. We may reject requests that are unreasonably repetitive, require excessive technical means (for example, need to develop new systems or fundamentally change current practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes).
We will not be able to respond to your request in the following circumstances:
1. Related to our performance of obligations under laws and regulations;
2. Directly related to national security and national defense security;
3. Directly related to public safety, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial and enforcement of judgments;
5. We have sufficient evidence to show that you have subjective malice or abuse of rights;
6. In order to protect the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the person;
7. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
8. Involving trade secrets.

6. Third-Party Services

This product may be linked to social media or other services (including websites or other forms of services) provided by third parties. For example:
(1) You can use the "Share" button to share certain content to other social media. THESE FUNCTIONS MAY COLLECT YOUR INFORMATION (INCLUDING YOUR DEVICE INFORMATION, LOG INFORMATION) AND MAY INSTALL COOKIES ON YOUR MOBILE DEVICE TO PROPERLY OPERATE THE ABOVE FUNCTIONS;
(2) we provide you with links through advertisements or other means of our services, enabling you to link to the services or websites of third parties;
(3) Other situations where third-party services are accessed. For example, in order to achieve the purposes stated in this policy, we may access SDKs or other similar applications (such as in the form of embed codes, plug-ins, etc.) provided by third-party service providers in order to provide you with better customer service and user experience. At present, the third-party service providers we access mainly include the following types:
(1) Used for advertising-related services, including advertising display, advertising data monitoring/statistics, etc.;
(2) Used for message push functions, including push push by mobile phone manufacturers, reminders of specific events, etc.;
(3) Used for payment-related services, including order payment, transaction verification, revenue settlement, payment information summary statistics, etc.;
(4) Used to obtain device location permissions, collect device information and log information, etc. with your consent;
(5) For third-party authorized services, including third-party account login, sharing relevant content to third-party products, etc.;
(6) Used to support product function modules, including the realization of audio and video communication;
(7) Used for account security and product reinforcement related services, including network monitoring, domain name resolution, anti-hijacking, anti-spam and anti-cheating, encryption and decryption services, etc.
(8) For facial verification services, including choosing the facial option during login and registration;
Some third-party SDKs or similar applications that we access may collect your personal information, such as when you use such services provided by third parties in our services, you agree that their information will be collected and processed directly. We will assess the legality, legitimacy and necessity of collecting personal information by such third-party services, require such third parties to take protective measures for your personal information, and strictly abide by relevant laws, regulations and regulatory requirements. In order to adapt to the use of Tongyou and third-party platform services on non-mobile phone devices, and realize the receiving information push, geographic location sharing and payment security of mobile devices, Tongyou has access to third-party SDKs, including Umeng SDK, Umeng product integration Umeng + SDK and push channel SDK (such as Xiaomi, Huawei, OPPO, vivo, Meizu, etc.), and the push channel SDK needs to collect the device identifier (IMEI/MAC/ANDROID). ID/IDFA/OpenUDID/GUID/SIM card IMSI information, etc.), used to uniquely identify the device in order to push messages to the user's device. Collect geographic location to identify push channels and improve the regional coverage of message push. You may also choose to contact us through the feedback channels listed in the "How to Contact Us" section of this Policy and we will answer you as soon as possible.
Such third-party social media or other services are operated by the relevant third party. Your use of such third party's social media services or other services (including any information you provide to such third parties) is subject to the third party's own terms of service and information protection statement (not this Privacy Policy), and you need to read its terms carefully. This Privacy Policy only applies to the personal information we collect, and does not apply to the services provided by any third party or the information use rules of the third party. If you find that these third-party services are risky, it is recommended that you terminate the relevant operations to protect your legitimate rights and interests and contact us in time.

7. Third-party SDKs

Login Class Third-party company name: Google company SDK name: Google login Purpose
of use: Used
when the user logs in with a Google account Shared information name: user avatar, user nickname
Sharing method:
SDK local collection
Login class

Third-party company name: Facebook SDK name: Facebook login Purpose
of use: Used
when the user logs in with the Facebook account Share information name: user avatar, user nickname
Sharing method:
SDK native collection
Security detection class
Third-party company name: Hangzhou NetEase Intelligent Enterprise Technology Co., Ltd. SDK name: netease (Netease) Purpose
of use: Used for prohibited detection
of text, pictures, and videos sent by users Share information name: netease
Sharing mode:
SDK native collection
Message push class
Third-party company name: Google SDK name: Firebase Cloud Messaging (FCM) (Google)
Purpose of use: Push service for users' offline information Sharing
information name: jpush
Sharing method: SDK
native collection

map class
Third-party company name: Google SDK name: Google Maps Platform (Google Maps) Purpose of use: Used to send positioning and view location
during user chat Shared information name: Google Maps Platform

Sharing method: SDK
native collection

Acceleration class
Third-party company name: Google SDK name: (accelerometer)
Purpose of use: Used when the user shakes the function Share
information name: Accelerometer
Sharing method:
SDK local collection


8. Age Restrictions

We recommend that any minor's participation in online activities should obtain the prior consent of parents or other guardians (hereinafter referred to as "guardians"). We will protect the relevant information of minors in accordance with relevant national laws and regulations. We encourage guardians to guide minors to use this product. If you are a minor under the age of 14, please inform your guardian to read and accept our Children's Personal Information Protection Rules and Guardian Notice, and seek their consent and guidance before you use Tongyou Services and submit personal information.

IX. Notices and Amendments

In order to provide you with better services, we may modify the terms of this Privacy Policy in a timely manner according to the update of products or services and the relevant requirements of laws and regulations. We will post any changes to this Policy on this page. For major changes, we will also provide more prominent notices (including website announcements, push notifications, pop-up prompts or other methods), including but not limited to the major changes referred to in this policy: 1.
Our service model has undergone major changes. Such as the purpose of processing personal information, the types of personal information processed, the way personal information is used, etc.;
2. We have undergone significant changes in our ownership structure. Such as changes of owners caused by business adjustments, bankruptcy mergers and acquisitions, etc.;
3. Major changes in the main objects of personal information sharing, transfer or public disclosure;
4. Major changes in your rights to participate in the processing of personal information and the way in which you exercise them;
5. Major changes have occurred in our responsible department, contact information and complaint channels responsible for handling personal information security;
6. Other important or potentially serious circumstances of your personal rights and interests.
Any modifications we make will put your satisfaction first. We encourage you to review our Privacy Policy each time you use the product.
We will provide an entry to the old version of the Privacy Policy for your review.

10. How to contact us

1. If you have complaints and reports about personal information security, or if you have any questions, comments or suggestions about this Privacy Policy and your information, please contact our personal information protection officer, [Tel]: 057188687921 ; [Online feedback customer service path]: Tongyou team (online time: 8:45-20:45); [Personal Information Protection Responsible Person Email]: support@2u.chat;[Hangzhou Tongyou Intelligent Communication Co., Ltd.]: Building 26, Internet Village, Dream Town, Yuhang District, Hangzhou, Zhejiang Province Person in charge of personal information protection (receipt).
2. Under normal circumstances, we will reply within five working days, and under special circumstances, we will reply within no more than seven days or the time limit stipulated by laws and regulations. If you are not satisfied with our response, especially if our personal information processing behavior harms your legitimate rights and interests, you can communicate with us again or report to the competent authority.

Rules for the Protection of Children's Personal Information and Instructions for Guardians

Tongyou Company (hereinafter collectively referred to as "Tongyou" or "we") is well aware of the importance of the personal information and privacy security of children (referring to minors under the age of 14, the same below). We hope to explain the handling rules and other related matters when we collect and use children's personal information through the "Tongyou Children's Personal Information Protection Rules and Guardian Notice" (hereinafter referred to as "this Policy"). Before using our products and services (hereinafter collectively referred to as "Tongyou Services"), please be sure to carefully read and thoroughly understand this Policy, especially the terms marked in bold, and confirm that you fully understand and agree to all the terms before starting to use.
Special instructions for guardians:
If we learn that your child is under the age of 14, we will take special measures to protect your child's personal information obtained by us in accordance with this policy. Please help us protect your child's personal information and privacy, require them to read and accept this policy together under your supervision, and should use Tongyou services and submit personal information under your consent and guidance. If you do not agree with the content of this policy, it may cause the Tongyou service to fail to operate normally, or it will not be able to achieve the service effect we intend to achieve, and you should ask your child to stop accessing/using the Tongyou service immediately. By clicking to agree to this Policy online, or your child's use/continued use of Tongyou Services or submitting personal information, you agree that we collect, use, store, share, transfer and disclose your child's personal information in accordance with this Policy (including updated versions).
Special Note for Children:
We recommend that any child participating in online activities should obtain the prior consent of a guardian. If you are a child, please notify your guardian to read this Policy together and seek the consent and guidance of your guardian before you use the Tongyou service and submit personal information. By clicking online to agree to this Policy, or your use/continued use of Tongyou services or submitting personal information, it means that you have obtained the permission of your guardian, and your guardian consents to our collection, use, storage, sharing, transfer and disclosure of your personal information in accordance with this Policy (including updated versions).
This Policy applies to our activities such as collecting, using, storing, sharing, transferring and disclosing children's personal information through the Internet in the People's Republic of China. When a child uses any Tongyou service, the guardian agrees to accept the protection of this Policy and the specific children's personal information protection rules and provisions issued by us in the single service (if any, hereinafter referred to as "specific terms"), in which case the specific terms and the terms of this policy are effective for both the guardian and the child. If there is any inconsistency between the specific terms and the terms of this policy, the specific terms shall prevail to the extent that the specific terms are bound. If a single service provided by us does not apply to this Policy, the service will expressly exclude the application of this Policy in an appropriate manner. In terms of children's personal information protection rules, if there is any inconsistency between this Policy and the text of the Privacy Policy, this Policy shall take precedence, and if not mentioned in this Policy, the Privacy Policy shall prevail.
After reading this policy, if you have any questions about this policy or matters related to this policy, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will answer as soon as possible.

This policy will help you understand the following:
I. How We Collect and Use Children's Personal Information
II. Children's Personal Information We May Share, Transfer or Disclose III. How We Store and Protect Children's Personal Information
IV. How to Manage Children's Personal Information

V. Third-Party Services
VI. Revision of this Policy
VII. How to contact us

I. How We Collect and Use Children's Personal Information
(1) We will strictly perform the obligations and responsibilities for the protection of children's personal information provided by laws and regulations, follow the principles of legitimate necessity, informed consent, clear purpose, security guarantee, and lawful use, and collect and use children's personal information after obtaining the consent of guardians
1. In some individual services, we may require users to fill in personal birthday information or identify whether the user is a child according to the identity information filled in by the user, and in accordance with laws and regulations, only after obtaining the consent of the guardian will the child continue to use the relevant Tongyou service.
2. When we identify a user as a child, we may collect the contact information of the guardian (such as mobile phone number, email address) and contact the guardian to verify the guardianship relationship with the child. In order to better protect the rights and interests of children, we may also collect more information from guardians (such as name, ID card, household registration book or other proof of guardianship relationship) in order to further verify the guardianship relationship between guardians and children.
3. In the process of children's use of Tongyou services, we may also collect and use other children's personal information, please refer to the "How We Collect and Use Personal Information" section of the Privacy Policy for details. If we need to collect and use children's personal information beyond the above scope, we will obtain the consent of the guardian again.
(2) Exceptions to obtaining authorization and consent According to relevant laws and regulations, the authorization and consent of children and/or guardians is not required
to collect children's information in the following circumstances:
(1) Directly related to national security, national defense security, public safety, public health, and major public interests;
(2) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(3) For the purpose of safeguarding the life, property and other major lawful rights and interests of the information subject or other individuals, but it is difficult to obtain the consent of the guardian himself/herself;
(4) The information collected is disclosed to the public by the child or guardian on his or her own;
(5) Collecting information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(6) Necessary for signing a contract at the request of the guardian;
(7) Necessary for maintaining the safe and stable operation of Tongyou Service, such as discovering and handling faults of Tongyou Service;
(8) Where information is automatically retained and processed through a computer information system and it cannot be recognized that the information retained and processed is children's personal information;
(9) When it is necessary to carry out statistical or academic research in the public interest, and the results of academic research or description are provided to the outside world, the information contained in the results is de-identified;
(10) Other circumstances stipulated by laws and regulations.
(3) Reminders about sensitive personal information
Children's personal information is sensitive personal information. Guardians and children are requested to be cautious and pay attention to children's sensitive personal information, and guardians agree that we can handle sensitive personal information related to children in the purposes and methods described in this Policy.
II. Children's personal information that we may share, transfer or disclose
(1) Sharing
Except in the following circumstances, we will not share children's personal information with any third party without the consent of the guardian:
1. Provide our services to children. We may share children's information with partners and other third parties to realize the functions of Tongyou services and allow children to use the services they need normally, such as: payment institutions that provide payment services, merchants who enter the Tongyou platform, partners who provide data services (including online advertising monitoring, data statistics, data analysis), third-party logistics companies and other service providers;
2. Necessary sharing with related parties. In order to facilitate us to provide children with consistent services based on a unified account system, facilitate their unified management, ensure system and account security, etc., children's personal information may be shared between us and our affiliates as necessary;
3. Achieve the purposes described in the first section of this policy "How We Collect and Use Children's Personal Information";
4. Fulfill our obligations and exercise our rights in this Policy or other agreements we have reached with children and guardians;
5. Sharing with third parties such as partners who entrust us with promotion, for the purpose of enabling such entrusting parties to understand the coverage and effectiveness of promotion. For example, we can tell the client how many people have seen their promotion or purchased the client's products after seeing the information, or provide them with statistical information that does not personally identify the child to help them understand their audience or customers;
6. To the extent permitted by laws and regulations, in order to comply with the law, protect us and our affiliates or partners, children, guardians or other friends users or the public interest, property or safety from damage, such as to prevent fraud and other illegal activities and reduce credit risks, we may exchange information with other companies and organizations. However, this does not include information sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this Policy;
7. In response to the lawful needs of children or with the authorization and consent of guardians;
8. At the legal request of the guardian;
9. Provided in accordance with a single service agreement (including electronic agreements signed online and corresponding platform rules) or other legal documents;
10. Provided based on social public interests in accordance with laws and regulations.
We will only share children's personal information for lawful, legitimate, necessary, specific and clear purposes. For companies, organizations and individuals with whom we share personal information, we will conduct security assessments and sign strict confidentiality agreements with them, requiring them to process information in accordance with our instructions, this Policy and any other relevant confidentiality and security measures.
(2) Transfer
1. As our business continues to develop, we may enter into mergers, acquisitions, asset transfers or similar transactions, and children's information may be transferred as part of such transactions. We will conduct a security assessment and require new companies and organizations that hold children's personal information to continue to be bound by this Policy, otherwise, we will require the company or organization to seek authorization and consent from guardians again.
2. After obtaining the consent of the guardian, we will transfer the child's personal information to other parties.
(III) Disclosure
We will only disclose children's personal information under the following circumstances and on the premise of adopting security protection measures that meet industry standards: 1.
According to the needs of the child or guardian, disclose the information specified by the guardian in the disclosure method agreed by the guardian;
2. If it is necessary to provide children's information according to the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may disclose children's information according to the type of information required and the method of disclosure. Under the premise of complying with laws and regulations, when we receive the above request for disclosure of information, we will require the recipient to issue corresponding legal documents, such as summons or investigation letters. We strongly believe that the information requested from us should be as transparent as possible to the extent permitted by law. All requests are carefully reviewed to ensure that they have a lawful basis and are limited to data that law enforcement has a legitimate interest in for specific investigative purposes.
(4) Exceptions to obtaining prior authorization and consent when sharing, transferring, or disclosing information In
the following circumstances, the sharing, transfer, or disclosure of children's information does not require prior authorization and consent from guardians: 1.
Directly related to national security and national defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and judgment enforcement;
4. For the purpose of safeguarding the life, property and other major lawful rights and interests of children or other individuals, but it is difficult to obtain the consent of guardians;
5. Information disclosed to the public by children or guardians on their own;
6. Collecting information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
7. Related to our performance of obligations under laws and regulations.
According to the law, the sharing, transfer or disclosure of de-identified personal information and ensuring that the data recipient cannot recover and re-identify the information subject is not an act of external sharing, transfer and public disclosure of personal information, and the storage and processing of such data will not require separate notification to the guardian and the consent of the guardian.
III. How We Store and Protect Children's Personal Information
(1) Unless otherwise provided by laws, regulations or regulatory authorities, we only store children's personal information within the shortest period of time necessary for the purposes described in this Policy. If we terminate the service or operation, we will promptly stop the activities of continuing to collect children's personal information, and at the same time comply with relevant laws and regulations to notify the guardian in advance, and delete or anonymize the child's personal information after the termination of the service or operation, unless otherwise provided by laws, regulations or regulatory authorities.
(2) We attach great importance to the privacy and security of children, set up a special security team, and take all reasonable and feasible measuresProtection of children's personal information:
We will take technical measures such as encryption to store children's personal information to ensure information security. At the same time, we strictly set the access rights of information to control the scope of children's personal information based on the principle of minimum authorization for staff; Where staff access children's personal information, they must go through the approval of the person in charge of children's personal information protection or their authorized management personnel, record the visit, and employ technical measures to avoid illegal copying or downloading of children's personal information. If we discover that children's personal information has occurred or may be leaked, damaged or lost, we will immediately activate the emergency plan, take remedial measures, and inform the affected guardians and children of the relevant circumstances of the incident by email, letter, telephone, push notification, announcement, etc.
If you would like to learn more, please refer to the "How We Store and Protect Personal Information" section of the Privacy Policy to learn more about how we store and protect children's personal information.
Due to technical limitations and the limitations of risk prevention, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. Guardians need to understand that the system and communication network used by the child's access to the Friendship Service may have problems due to circumstances beyond our control.
Guardians and children must keep their service accounts, passwords and other identity elements safe. When children use the Tongyou Services, we will identify them through account numbers, passwords and other identifying elements. Once guardians and children disclose the aforementioned information, they may suffer losses and may adversely affect themselves. If guardians and children find that the account number, password and/or other identity elements may be or have been leaked, please contact us immediately so that we can take corresponding measures in time to avoid or reduce related losses.
IV. How to manage children's personal information During
the use of children's services, we will take appropriate operations to set, guide or provide the contact channels listed in the "How to Contact Us" section of this policy in our individual services, so as far as possible to ensure that guardians and children can access, correct, delete children's personal information, and cancel children's registered accounts. When accessing, correcting, deleting the aforementioned information or applying for account cancellation, we may require guardians and/or children to verify identity to ensure information security. Except as otherwise provided by laws and regulations, when guardians and children correct, delete children's personal information or apply for account cancellation, we may not immediately correct or delete the corresponding information from the backup system, but will correct or delete such information when the backup is updated.
(1) Access to children's personal information
Guardians and children can view children's personal information provided or generated in the use of Tongyou services, such as personal information materials, some usage records, and published content.
(2) Correction of children's personal information
We encourage guardians and children to update and modify children's personal information to make it more accurate and effective. Guardians and children who find that there are errors in children's personal information collected, used and processed by us, they can contact us to correct it. Once we have completed identity verification and verification issues, we will take timely steps to correct them.
(3) Delete children's personal information Depending
on the specific circumstances of children's choice of Tongyou services, guardians and children may delete some of the children's personal information on their own during the use of Tongyou services. In the following circumstances, guardians and children can directly request us to delete children's personal information, and we will promptly take measures to delete it after completing identity verification and verification issues, including: 1.
We collect, store, use, transfer or disclose children's personal information in violation of laws and regulations or agreements with guardians and children;
2. Collecting, storing, using, transferring or disclosing children's personal information beyond the scope of the purpose or the necessary period;
3. The guardian withdraws consent;
4. The guardian or child terminates the use of Tongyou services through cancellation or other means.
However, please note that if guardians and children delete or request us to delete specific children's personal information, it may not be possible to continue to use all or part of the Tongyu services.
(4) Cancel account 1. We provide account cancellation function, guardians and children can cancel accounts through the following paths: (
1) Client operation path: Log in to the product client with your mobile phone, enter the [Me] tab [Settings] on the home page, click [Account and Security], click [Cancel Account] and follow the prompts
to cancel the account.
(2) Customer service telephone path: Please call the customer service telephone provided at the end of the article to contact us, after verifying the account information, we will complete the account cancellation for you within 5 working days.
When you choose to sign out of your account, all information in that account will be erased and cannot be recovered. We will no longer collect, use or share personal information in connection with the account.

(5) Change the scope of authorization and consent
Guardians and children can always choose whether or not to disclose information. Some information is necessary to use the Tongyou Service, but most other information is provided at your own discretion. Guardians and children can change the scope of their authorization for us to continue collecting information or withdraw their authorization by deleting information, turning off device functions, etc.
When guardians and children withdraw their consent, we can no longer provide the services corresponding to the withdrawal of authorization, nor will we process the corresponding information. However, the decision to withdraw the consent will not affect the processing previously carried out on the basis of the consent of the guardian and the child.
(6) Acquisition of copies of personal information
If you need to obtain a copy of children's personal information, guardians and children can contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and after verifying identity, we will provide a copy of the child's personal information (including basic information and identity information) in our services, except as otherwise provided by laws and regulations or otherwise agreed in this Policy.
V. Third-Party Services Tongyou Services
may provide children with access to or link to social media or other services (including websites or other forms of services) provided by third parties. Please refer to the "Third-Party Services" section of the Privacy Policy to learn more about the types of third-party services we access or link to.
Such third-party social media or other services are operated by the relevant third party. Children's use of such third parties' social media services or other services (including any information provided by children to such third parties) is subject to the third party's own terms of service and information protection statement (not this Policy), and guardians and children need to read their terms carefully. This Policy only applies to the personal information we collect, and does not apply to the services provided by any third party or the information use rules of the third party. If guardians and children find that these third-party social media or other services are risky, it is recommended to terminate the relevant operations to protect the legitimate rights and interests of children and contact us in time.
VI. Revision of this Policy
In order to provide better services, we may modify the terms of this Policy in a timely manner in accordance with the update of Tongyou services and the relevant requirements of laws and regulations, and such modifications form part of this Policy. If such updates result in a substantial reduction or significant change in the rights of guardians and children under this Policy, we will notify them through website announcements, push notifications, pop-up prompts or other means before this Policy takes effect, and if the guardian does not agree to such changes, he or she may choose to ask the child to stop using the Tongyou Services.
Any of our modifications will put user satisfaction first. We encourage guardians and children to consult our Children's Personal Information Protection Rules and Guardian Instructions each time they use the Tongyou Services.
VII. How to contact us
We have a dedicated department for personal information protection and designated a special person in charge of children's personal information protection, and will protect children's personal information in strict accordance with this policy. If guardians and children have complaints and reports about network information security, or have any questions, comments or suggestions about this Policy, 2U's children's personal information protection rules and measures, please feel free to contact us, please contact our personal information protection officer, [Tel]: 06359510963633 ; [Online feedback customer service path]: 2U team (online time: 8:45-20:45); 【Personal Information Protection Officer E-mail】:support@2u.chat;【Brighhsun New EnergyPty LTD】Registered Address: 319. Hallam North Road Lysterfield South 3156 VIC Australia Person in charge of personal information protection (receipt).

Under normal circumstances, we will reply within five working days, and under special circumstances, we will reply within a maximum of seven days or within the period stipulated by laws and regulations. If you are not satisfied with our response, especially if our personal information processing behavior harms your legitimate rights and interests, you can communicate with us again or report to the competent authority.