Version number: V4.1.0
Release date: June 2023, 6 Effective date of this version: June 14,
2023
preface
Brighhsun Corporation (collectively, "2U" or "we") is committed to
protecting the privacy of users of Tongyou's products and services
(collectively, "2U Services"). When you use Tongyou Services, we may
collect and use your relevant information. Please read this Privacy Policy
carefully before using our products or services, especially the content in
bold, to understand our principles and protection measures for the
disposal of your personal information.
This Privacy Policy applies to the [2U] products and services we provide.
Users under the age of 2 shall be subject to both this Policy and the
products and services. For users under the age of <>, this Policy
and the Rules for the Protection of Children's Personal Information and
Instructions for Guardians shall apply Please note that we regularly check
and update this policy, so the relevant measures will change accordingly.
We kindly ask you to visit this page periodically to ensure that you are
always aware of the latest version of our Privacy Policy 。 After reading
this Policy, if you have any questions about this Privacy Policy or
matters related to this Privacy Policy, please contact:
support@<>u.chat.
directory
I. How We Collect and Use Personal Information
II. Personal Information We May Share, Transfer and Disclose III. How We
Use Cookies and Similar Technologies
IV. How We Store and Protect Personal Information
V. How to Manage Your Personal Information
VI
. Third-Party Services
7. Third-party SDK
VIII. Age Limit
IX. Notices and Amendments
X. How to Contact Us
We collect your personal information so that you and other users can use this product more easily and satisfactorily. Our goal is to provide the best possible service to all users. And this information helps us achieve this goal.
I. How We Collect and Use Personal Information
Personal information refers to all kinds of information recorded
electronically or otherwise that can identify a specific natural person
alone or in combination with other information or reflect the activities
of a specific natural person.
We will collect and use your personal information for the following
purposes:
The business functions of this product are divided into core business
functions and additional business functions, of which the core business
functions are instant messaging.
(1) Circumstances
under which you must authorize us to collect and use your personal
information You must provide us with necessary personal information and
permissions to achieve the core business functions of this product.
Personal information includes: facial feature information, mobile phone
number, user logs, device information, when you register an account, you
need to provide basic personal registration information including: mobile
phone number, and create your username and password, we will send an SMS
verification code to verify whether your identity is valid, if you fail to
provide the above information, you will not be able to register an
account. After the account registration is completed, you can modify and
supplement your nickname, gender, birthday, and region related
information, which belong to your "account information", if you do not
provide these supplementary information, it will not affect your use of
the core business functions of this product.
(2) The personal information collected and used by each business
function in the product is listed as follows: If you do not authorize
the necessary information for the core business function, you will not
be able to use the product.
Business Classification Business
Involved Information Type Specific
Information
Core Business
Functions
Instant Messaging Basic personal information, personal Internet
records,
personal common device information Mobile phone number, user log, device
information
Read
the call status
Mobile network information Friend list
Contact information Mobile phone contact list
We collect your contacts and friends list. The collection of contact list is your on-device contact list and your 2U list of group chats and friends list. Legal Basis (Relevant Jurisdictions only): Necessary to perform our contract with you to provide 2U and connect you with your friends.
- To connect you with other 2U users;
- (in relation to your list of group chats and friends list) to develop and improve tools we use to detect account violations and enhance the safety and quality of 2U accounts
The retention period lasts until you request removal or amendment of the Personal Information or your account is deleted, whichever is earlier.
Time personal location information, personal Internet access records
Precise positioning information
(user active authorization),
browsing history
Tongyou Mall
Personal basic information, personal Internet records, personal property
information, personal location information Mobile phone number, bank
card information, ID card information, transaction records, delivery
address, logistics information
,
browsing records Additional business functions
Information
Personal Internet records
Browsing history, click history
,
real-name authentication,
basic information, personal identity information, personal name, ID
card, mobile phone number
,
information push,
personal Internet records, Personal common device information Browsing
history, shopping history, device information, device identifiers (IMEI,
MAC) Customer
Service Basic
personal information
Phone
number, mobile phone number
Use other software to
open the
file
Device status information A
list of device app installations
Read and write pictures and files on your device When
you actively use Moments, Channels account, status and other functions to
send pictures and videos, WeChat will collect your pictures and videos as
part of the information. The purpose is to enrich the user's communication
and social experience, such as posting pictures in Moments and Channels.
Clipboard is used to obtain invitation codes when
you actively use user registration
(III) You can choose whether to authorize us to collect and use your personal information
1. Our personal information may be collected and used in our additional
business functions. If you do not provide this personal information, you
can continue to use the core business functions, but you may not be able
to use the following additional business functions. These functions
include: (1) Functions based on contact list information:
we will collect your contact list information and automatically push you
friends with registered accounts in your contact list;
(2) Function based on location information: we will collect your
location information and send your location to your friends in the
product; Increase positioning when posting moments;
(3) Function based on online transaction: We need to collect your bank
card number, ID card number, bank reserved mobile phone number, and
mobile phone verification code. The payment functions involved in the
transaction service are provided by third-party payment institutions. In
order to provide you with online trading services or goods, we need to
collect your transaction records, delivery address, logistics
information, order information, if you refuse to provide such
information, we will not be able to complete the relevant delivery
services;
(4) Camera-based function: directly complete video shooting, photo
shooting and send to your friends in the product; Directly complete
video shooting and photo shooting in the product to participate in the
interactive module; Used to scan QR code; Directly complete the photo
shooting in the product and set it as the account avatar; Video chat
with friends;
(5) Image-based upload function: upload pictures and send them to your
friends; Upload images to participate in the interactive module in the
product; Upload an image and set it as an account avatar;
(6) Functions based on voice technology: send voice messages to your
friends; Add voice when posting time; Make web calls with friends;
2. The above functions require you to open your geographic location (location information), camera, storage, microphone, contact list, and device attribute information permissions to us in your device to realize the collection and use of the information involved in these functions. You can check the status of your above permissions on your device and decide to turn them on or off at any time. When you turn on these permissions, you authorize us to collect and use these personal information to achieve the above functions, and when you turn off the permissions, it means that you cancel the authorization, we will no longer continue to collect and use your personal information, and we cannot provide you with the above functions corresponding to these authorizations. Your decision to close your authority will not affect the processing of personal information previously carried out based on your authorization.
3. You can modify the unified management of permissions in the mobile
phone system settings.
(<>) The relevant business functions of this product will open
your device access rights, which are listed as follows:
Business scenario
Scenario description
Access and use permissions Add friends
Add friends in the product
Access contact list permissions
Avatar modification
Upload or take a photo in your account information to modify your
avatar
Access storage permissions Access camera permissions Send images Send
pictures to friends
in the product Access camera permissions
Access storage permissions
Upload images
Upload images
in the product interaction module Access camera permissions Access
storage permissions Voice chat
Implement network calls and send voice functions Access microphone
permissions
Access
storage permissions
Video chat
Implement video functions of both parties Access
camera permissions
Scan Call the mobile phone camera to scan barcode/QR code or select a
picture
from the album when
scanning the code Access camera permission, access storage permission
Time When the
user uses the time function, You need to select an image from the album
or save the image to the local Access Storage Permissions When using the
Time function, users need to add voice functions Access microphone
permissions
When using the Time function, users need to use the
positioning function to display positioning
Access
rough status information
Access precise status information Send location
User sends location to friends Access
rough status information Access precise status information
Outgoing calls
Click the phone number in the chat history to make a call
directly Call permission
Access camera permissions Product Interaction Module
Interactive module Users can upload pictures and download and save
pictures
Access storage permissions
Access camera permissions
Determine product usage status
View status information about
the WLAN
View WLAN status permissions
Determine product usage status Check
if and what kind of
network your device is connected to View network connection permissions
Change network connection permissions
Check for updates Install
the downloaded app
now Access in-app installation of additional app permissions
Minimize the web call interface During the use of network call chat, you
can minimize the call interface as a floating window, so that you can
continue to use other functions of this product while chatting Using
floating window permissions
Product Installation
Allows this product to add shortcuts to the home screen of
the device for easy use
Use the Create desktop shortcut permission
Audio and video calls and voice message playback Toggle handset playback
and speaker playback
during
audio and video calls and voice messages Change audio permissions
Message notification Accept unread message notifications
in a more timely manner Voice call When
a voice call comes in, remind the user by vibrating Control vibration
permissions
Product Installation
Avoid repeated installation of shortcuts (shortcuts will be uninstalled
before installing) Uninstall
shortcut permissions Used
by the
app
Keep the application process turned on, continuously provide message
reminders, push services Run
foreground service permissions SMS Voice messages
Implement the read and write permissions
for sending and getting voice messages
(5) Exceptions to obtaining authorization and consent According to
relevant laws and regulations, your authorization and consent are not
required
to collect your information in the following circumstances:
(1) Related to national security and national defense security;
(2) Related to public safety, public health, and major public interests;
(3) Related to criminal investigation, prosecution, trial and execution
of judgments;
(4) For the purpose of safeguarding the life, property and other major
legitimate rights and interests of the information subject or other
individuals, but it is difficult to obtain your consent;
(5) The information collected is disclosed to the public by yourself;
(6) Collecting information from legally publicly disclosed information,
such as legal news reports, government information disclosure and other
channels;
(7) Necessary for signing a contract according to your requirements;
(8) Necessary for maintaining the safe and stable operation of products,
such as discovering and disposing of product or service failures;
(9) Necessary for legal news reporting;
(10) When it is necessary for academic research institutions to carry
out statistical or academic research based on the public interest, and
when the results of academic research or description are provided to the
outside world, the information contained in the results is
de-identified;
(11) Other circumstances stipulated by laws and regulations.
(6) Information we will collect during your use of this product
In order to understand product adaptability, identify abnormal account
status, and ensure network security or operational security, we will
collect information about the services you use and how you use them, and
associate this information, including:
Log information: When you use this product, we will automatically collect
your detailed use of our services and save it as relevant network logs.
Including your login account, search query content, IP address, network
environment, date and time of access and browsing records of the web pages
you visit, Push open records, length of stay, refresh records, follow,
save and share.
Device information: According to the specific permissions granted by you
during the installation and use of the software, we will receive and
record the information about the device you use (including: IMEI, MAC,
device model, operating system version, device settings), device status
information (including: device application installation list), and device
location information (including: IP) during the use of the software in the
foreground or background operation Address, GPS location, WLAN access
points, Bluetooth, and base stations that can provide relevant
information) Please note that separate device information and log
information are information that cannot identify a specific natural
person. If we combine such non-personal information with other information
to identify a specific natural person, or combine it with personal
information, such non-personal information will be regarded as personal
information during the period of combined use, and we will anonymize and
de-identify such personal information unless authorized by you or
otherwise provided by laws and regulations.
Third-party SDK name | The name of the third-party SDK developer | Official website of third-party SDK developers | Feature type | Purpose of Use | Permissions that may be invoked | Permission authorization method | Types of Personal Information Processed | Link to Privacy Policy |
---|---|---|---|---|---|---|---|---|
Google Positioning SDK | Google Inc | https://developers.google.com/maps | In order to provide you with the location services required for the function of [ask the APP developer to fill in the function description corresponding to the specific application scenario]. To provide you with location services | Troubleshooting, diagnosing services and conducting data statistics to ensure the normal operation of products and services To provide you with location services, we will collect your Wi-Fi status information and location information, and we will process your device information. In order to return your location information to the developer, for the developer to provide you with corresponding services based on your bit information: | Access W1-FI status Get the location Device information Location information | It is determined by the device system developer and the developer application, and turned on when the end user agrees to grant this permission to the developer Get the connection WIFI information, ask back to Baidu location service as an auxiliary positioning basis, and then return to the developer for more accurate location information | Obtain location information (may include GNSS information, W1FI address and signal strength information, base station 1D data information, sensor information, mobile phone signal strength information ), which can return the location information of the end user to the developer without the end user manually entering its own geographic must Fanlian device information (including AndroidID, operating system version, device brand and model, device configuration, application information (application name)), in order to provide positioning services, improve the accuracy and success rate of positioning services, provide continuous positioning services for specific continuous positioning scenarios, and provide problem tracking, troubleshooting, diagnosis services and data statistics to ensure the normal operation of products and services. | https://developers.google.com/maps/terms-20180207 |
(7) Rules for the use of your personal information
1. We will use the personal information collected in accordance with
the provisions of this Privacy Policy and to realize the functions of
this product.
2. After collecting your personal information, we will de-identify the
data through technical means, and the de-identified information will not
be able to identify the subject. Please understand and agree that in
this case, we have the right to use the information that has been
de-identified; And without disclosing your personal information, we have
the right to analyze the user database and use it commercially.
3. Please note that all personal information you provide when using this
product, unless you delete it or refuse us to collect it through system
settings, you will continue to authorize us to use it during your use of
the product. When you cancel your account, we will stop using and delete
your personal information.
4. We will make statistics on the use of products and may share these
statistical information with the public or third parties to show the
overall usage trend of products. However, these statistics do not
contain any identifying information about you.
5. When we display your personal information, we will use methods
including content replacement and anonymous processing to desensitize
your information to protect your information security.
6. Please note that if we want to use your information for other
purposes not specified in this Privacy Policy or collect additional
information not mentioned, we will ask for your consent in advance. Once
you have consented, such additional uses will be considered part of this
Privacy Policy and such additional information will also be subject to
this Privacy Policy.
7. The application scenarios of the use of personal information and the
possible impact on you are listed as follows:
Application scenarios
Business functions and impact
Advertising Show you
matching advertising products or marketing activities
according to user shopping, browsing, attention records, mobile phone
systems, and regional information Activity push
Push matching product activities to you based on user browsing history,
purchase information, and virtual property information
(8) Reminders Regarding Sensitive Personal Information Sensitive
personal information refers to personal information that, once leaked or
illegally used, is likely to cause infringement of the personal dignity of
natural persons or harm to personal or property safety, and may endanger
personal and property safety, and is very likely to lead to damage to
personal reputation, physical and mental health, or discriminatory
treatment. The above information provided by you or collected by us may
contain your sensitive personal sensitive personal information, such as ID
card number, personal biometric information (including facial recognition
features, voiceprints and other static or dynamic), bank account number,
communication records and content, property information, credit
information, whereabouts, accommodation information, health and
physiological information, transaction information. Please be cautious and
pay attention to sensitive personal information, and you agree that we can
handle your sensitive personal information in the purposes and methods
described in this Policy.
2. Personal information that we may share, transfer or disclose
(1) Sharing
Except in the following circumstances, we will not share your information
with any third party without your consent: 1.
To provide you with goods or services, that is, only by sharing your
information with a third party can we achieve the core functions you need
or provide the services you need.
2. To achieve your service needs, we need to share your information with
partners and other third parties to provide you with more targeted and
perfect services,
such as: providing corresponding order information to logistics service
providers;
3. Achieve the purposes described in the first section of this Privacy
Policy "How We Collect and Use Information";
4. Fulfill our obligations and exercise our rights in this Privacy Policy
or other agreements we have reached with you;
5. Sharing with partners who entrust us to promote for the purpose of
enabling such entrusting parties to understand the coverage and
effectiveness of promotion. For example, we can tell the client how many
people have seen their promotion or purchased the client's products after
seeing it, or provide them with non-personally identifiable statistics to
help them understand their audience or customers.
6. To the extent permitted by laws and regulations, in order to comply
with the law, protect us and our affiliates or partners, you or other
product users or the public interest, property or safety from damage, such
as to prevent fraud and other illegal activities and reduce credit risks,
we may exchange information with other companies and organizations.
However, this does not include information sold, rented, shared or
otherwise disclosed for profit in violation of the commitments made in
this Privacy Policy.
7. Assist in handling disputes or disputes between you and others
according to your legitimate needs;
8. Provide your information at the legal request of your guardian;
9. Provided in accordance with the service agreement signed with you
(including the electronic agreement signed online and the corresponding
platform rules) or other legal documents;
10. Provided based on academic research;
11. Provide based on social public interests in accordance with laws and
regulations.
We will only share your information for lawful, legitimate, necessary,
specific and clear purposes. For companies, organizations and individuals
with whom we share information, we will sign strict confidentiality
agreements with them, requiring them to process information in accordance
with our instructions, this Privacy Policy and any other relevant
confidentiality and security measures.
We will not share the facial features information you provided during login and registration.
(2) Transfer
1. We will not transfer your personal information to any company,
organization or individual, except in the following circumstances:
1) Transfer your information to other parties after obtaining your
explicit consent or authorization;
2) Provide in accordance with applicable laws and regulations, legal
procedures, mandatory administrative or judicial requirements;
3) As our business continues to develop, we may enter into mergers,
acquisitions, asset transfers or similar transactions, and your
information may be transferred as part of such transactions. We will
require the new company or organization holding your information to
continue to be bound by this Privacy Policy, otherwise, we will require
the company or organization to seek authorization and consent from you
again.
(3) Disclosure
We will only disclose your information under the following circumstances
and on the premise of taking security protection measures that meet
industry standards: 1.
According to your needs, disclose the information you specify under the
disclosure method you expressly agree;
2. If it is necessary to provide your information according to the
requirements of laws and regulations, mandatory administrative law
enforcement or judicial requirements, we may disclose your information
according to the type of information required and the method of
disclosure. Under the premise of complying with laws and regulations,
when we receive the above request for disclosure of information, we will
require the recipient to issue corresponding legal documents, such as
summons or investigation letters. We strongly believe that the
information requested from us should be as transparent as possible to
the extent permitted by law. All requests are carefully reviewed to
ensure that they have a lawful basis and are limited to data that law
enforcement has a legitimate interest in for specific investigative
purposes.
(1) Exceptions to obtaining prior authorization and consent when
sharing, transferring, or disclosing information In the
following circumstances, you do not need to obtain your prior
authorization and consent for sharing, transferring, or disclosing your
information: 2.
Related to national security and national defense security;
3. Related to public safety, public health, and major public interests;
4. Related to judicial or administrative law enforcement such as
criminal investigation, prosecution, trial and judgment enforcement;
5. In order to protect the life, property and other major legitimate
rights and interests of you or other individuals, but it is difficult to
obtain the consent of the person;
6. Information disclosed to the public by yourself;
7. Collecting information from legally publicly disclosed information,
such as legal news reports, government information disclosure and other
channels.
<>. Related to our performance of obligations under laws and
regulations.
According to the law, the sharing or transfer of de-identified
information and ensuring that the data recipient cannot recover and
re-identify the information subject is not an act of external sharing,
transfer and public disclosure of information, and the storage and
processing of such data will not require separate notice to you and your
consent.
3. How we use cookies and similar technologies
WE OR OUR THIRD-PARTY PARTNERS MAY OBTAIN AND USE YOUR INFORMATION THROUGH
COOKIES OR SIMILAR TECHNOLOGIES AND STORE SUCH INFORMATION AS LOG
INFORMATION.
THROUGH THE USE OF COOKIES, WE PROVIDE OUR USERS WITH A SIMPLE AND EASY
WEB EXPERIENCE. A COOKIE IS A SMALL AMOUNT OF DATA THAT IS SENT TO YOUR
BROWSER FROM A WEB SERVER AND STORED ON YOUR COMPUTER'S HARD DRIVE. WE USE
COOKIES FOR THE BENEFIT OF ITS USERS. FOR EXAMPLE, TO MAKE THE LOGIN
PROCESS OF THE PRODUCT'S VIRTUAL COMMUNITY FASTER, YOU CAN CHOOSE TO STORE
YOUR USERNAME IN A COOKIE. This makes it easier and faster the next time
you want to sign in to the product. COOKIES HELP US DETERMINE THE PAGES
AND CONTENT YOU ARE CONNECTED TO, THE TIME YOU SPEND ON PRODUCT-SPECIFIC
SERVICES AND THE SERVICES YOU SELECT.
COOKIES ALLOW US TO SERVE YOU BETTER, FASTER AND MAKE YOUR EXPERIENCE WITH
OUR PRODUCTS MORE CONVENIENT. HOWEVER, YOU SHOULD BE ABLE TO CONTROL
WHETHER AND HOW COOKIES ARE ACCEPTED BY YOUR BROWSER. Please consult the
files that came with your browser for more information on this.
WE AND THIRD-PARTY PARTNERS MAY COLLECT AND USE YOUR INFORMATION THROUGH
COOKIES OR SIMILAR TECHNOLOGIES AND STORE SUCH INFORMATION.
WE USE OUR OWN COOKIES OR SIMILAR TECHNOLOGIES, WHICH MAY BE USED FOR THE
FOLLOWING PURPOSES:
(1) TO REMEMBER YOUR IDENTITY. FOR EXAMPLE, COOKIES OR SIMILAR
TECHNOLOGIES HELP US IDENTIFY YOU AS OUR REGISTERED USER, OR SAVE
INFORMATION ABOUT YOUR PREFERENCES OR OTHER INFORMATION THAT YOU PROVIDE
TO US;
(2) Analyze your use of our products. WE MAY USE COOKIES OR SIMILAR
TECHNOLOGIES TO UNDERSTAND WHAT ACTIVITIES YOU USE THE PRODUCTS FOR OR
WHICH SERVICES OR SERVICES ARE MOST POPULAR;
(3) Advertising optimization. COOKIES OR SIMILAR TECHNOLOGIES HELP US TO
PROVIDE YOU WITH ADVERTISING THAT IS RELEVANT TO YOU BASED ON YOUR
INFORMATION RATHER THAN ADVERTISING IN GENERAL.
WHEN WE USE COOKIES OR SIMILAR TECHNOLOGIES FOR THE PURPOSES DESCRIBED
ABOVE, WE MAY AGGREGATE NON-PERSONALLY IDENTIFIABLE INFORMATION COLLECTED
THROUGH COOKIES OR SIMILAR TECHNOLOGIES TO ADVERTISERS AND OTHER PARTNERS
FOR THE PURPOSE OF ANALYZING HOW YOU AND OTHER USERS USE THE PRODUCTS AND
FOR ADVERTISING PURPOSES.
THERE MAY BE COOKIES OR SIMILAR TECHNOLOGIES PLACED BY ADVERTISERS AND
OTHER PARTNERS ON THIS PRODUCT. THESE COOKIES OR SIMILAR TECHNOLOGIES MAY
COLLECT NON-PERSONALLY IDENTIFIABLE INFORMATION ABOUT YOU TO ANALYZE HOW
USERS USE THE SERVICES OR TO EVALUATE THE EFFECTIVENESS OF ADVERTISING
SERVICES. THESE THIRD-PARTY COOKIES OR SIMILAR TECHNOLOGIES COLLECT AND
USE SUCH INFORMATION WITHOUT BEING GOVERNED BY THIS PRIVACY POLICY, BUT BY
THEIR OWN PERSONAL INFORMATION PROTECTION STATEMENT.
YOU CAN REJECT OR MANAGE COOKIES OR SIMILAR TECHNOLOGIES THROUGH YOUR
BROWSER OR USER SELECTION MECHANISM, AND THE REJECTION PATH:
[TONGYOU-ME-SETTINGS-GENERAL-CLEAR CACHE]. HOWEVER, PLEASE NOTE THAT IF
YOU DISABLE COOKIES OR SIMILAR TECHNOLOGIES, SOME SERVICES MAY NOT WORK
PROPERLY.
4. How We Store and Protect Personal Information
(1) Storage of personal information
Unless otherwise provided by laws, regulations or regulatory authorities,
we will only store your personal information within the shortest period of
time necessary for the purposes described in this Policy. If we terminate
the service or operation, we will stop collecting your personal
information in a timely manner, and at the same time comply with relevant
laws and regulations to notify you in advance, and delete or anonymize
your personal information after the termination of the service or
operation, unless otherwise provided by laws, regulations or regulatory
authorities.
The personal information collected and generated by us in the course of
our operations in the People's Republic of China is stored in the
territory of China, except in the following circumstances: 2.
There are clear provisions in laws and regulations;
<>. Obtain your authorization and consent;
In response to the above circumstances, we will ensure that it is
implemented in accordance with national laws and regulations and the
provisions of relevant regulatory authorities, and provide adequate
protection for your personal information.
The maximum storage duration for facial feature information is 1
year.
1. The old facial feature information will be deleted and updated with new
facial feature information after each successful login.
2. All pertinent facial feature information will be expunged following the
termination of the account.
3. The facial feature information of users who haven't used for over 1
year will be expunged.
(<>) Protection of personal information
We attach great importance to information security, set up a special
security team, and take all reasonable and feasible measures to protect
your personal information:
1. Data security technical measures
We will adopt security protection measures that meet industry standards,
including the establishment of reasonable systems and security
technologies to prevent unauthorized access, use, and modification of your
information and avoid data damage or loss. Our services adopt a variety of
encryption technologies, for example, in some services, we will use
encryption technology (such as SSL) to protect your personal information,
use encryption technology to encrypt and store your personal information,
and isolate it through isolation technology.
When using personal information, such as information display and
information association calculation, we will use a variety of data masking
technologies to enhance the security of information in use. We will also
use strict data access control and multi-factor authentication technology
to protect information from illegal use.
2. Other security measures we take to protect personal information
We have an industry-leading data security management system centered on
the data life cycle, which improves the security of the entire system from
multiple dimensions such as organizational construction, system design,
personnel management, and product technology. We manage the storage and
use of standardized information by establishing a data classification and
grading system, data security management specifications, and data security
development specifications.
We have full security control over data through contact confidentiality
agreements, monitoring and auditing mechanisms.
We also conduct security and privacy protection training courses to
enhance employees' security awareness and awareness of the importance of
protecting information.
3. We only allow employees and partners who need to know this information
to access your personal information, and set up a strict access control
and monitoring mechanism for this. We also require all persons who may
have access to your personal information to fulfill corresponding
confidentiality obligations. Failure to meet these obligations may result
in legal liability or suspension of the relationship with us.
4. The Internet is not an absolutely secure environment, and the
communication methods with other users such as email, instant messaging,
social software or other service software cannot determine whether it is
completely encrypted, we recommend that you use complex passwords when
using such tools, and pay attention to protect your information security.
When communicating with a third party or purchasing services through this
product and service, you will inevitably disclose your own information,
such as contact information or postal address, to the counterparty or
potential counterparty. Please protect your information properly and only
provide it to others when necessary.
5. The Internet environment is not 100% secure, and we will try our best
to ensure or guarantee the security of the personal information you send
to us. If our physical, technical, or management protection facilities are
damaged, resulting in unauthorized access, public disclosure, tampering,
or destruction of personal information, resulting in damage to your
legitimate rights and interests, we will bear the corresponding legal
responsibility.
6. Handling
of security incidents When communicating with third parties through this
product, purchasing or exchanging goods and services, you will inevitably
disclose your own information, such as contact information or postal
address, to the counterparty or potential counterparty. Please protect
your information properly and only provide it to others when necessary.
In order to deal with possible risks such as leakage, damage and loss of
personal information, we have established a number of systems to clarify
the classification and grading standards for security incidents and
security vulnerabilities and the corresponding handling procedures. We
have also established a special emergency response team for security
incidents, in accordance with the requirements of security incident
handling specifications, initiate security plans for different security
incidents, carry out stop loss, analysis, positioning, formulate remedial
measures, and cooperate with relevant departments to trace and crack down.
After the unfortunate occurrence of an information security incident, we
will promptly inform you in accordance with the requirements of laws and
regulations: the basic situation and possible impact of the security
incident, the disposal measures we have taken or will take, suggestions
for you to prevent and reduce risks on your own, remedial measures for
you, etc. At the same time, we will promptly inform you of the relevant
circumstances of the incident by email, letter, telephone or push
notification, and when it is difficult to inform the information subject
one by one, we will take reasonable and effective measures to issue an
announcement. At the same time, we will also take the initiative to report
the handling of information security incidents in accordance with the
requirements of regulatory authorities.
Please understand that due to technical limitations and risk prevention
limitations, even if we have tried our best to strengthen security
measures, we cannot always guarantee 100% security of information. You
need to understand that the system and communication network you use to
access the Tongyou Service may have problems due to circumstances beyond
our control.
Please be sure to keep your account number, password and other identity
elements safe. When you use this product, we will identify you through
your account number, password and other identity elements. Once you
disclose the foregoing information, you may suffer losses and may be
detrimental to you. If you find that your account number, password and/or
other identity elements may or have been leaked, please contact us
immediately so that we can take corresponding measures in time to avoid or
reduce related losses.
V. How to manage your personal information
We encourage you to update and amend your personal information to make it more accurate and effective. You can access your personal information through this product, and when you find that the information is incorrect, you can complete it yourself or ask us to modify and supplement it according to the management method of the corresponding information. We will take appropriate technical measures to ensure that you can access, update and correct your personal information or other information provided when using this product as much as possible.
(I) Modification and update
Except as provided by laws and regulations, you have the right to access
and correct your personal information at any time. Specific path: 1.
Client operation path:
Log in to the software client on your mobile phone, enter the [Me] page on
the home page, click your avatar or [Settings] page to check your
identity, account information, or modify your personal information, but
for security and identification considerations or according to mandatory
provisions of laws and regulations, you may not be able to modify the
initial authentication information provided during registration.
(2) Delete
1. Client operation path: Log in to the software client on your mobile
phone, enter the [Me] page on the home page, click your avatar or
[Settings] page to delete your personal information, but for security and
identification considerations or according to mandatory provisions of laws
and regulations, you may not be able to modify the initial authentication
information provided during registration.
(3) Cancellation 1. You can cancel your account through the following
path: (
1) Client operation path:
Log in to the product client on your mobile phone, log in to the
[I-Settings-Account and Security-Cancel Account] and follow the prompts to
cancel the account.
(2) Customer service telephone path: Please call the customer service
telephone provided at the end of the article to contact us, after
verifying the account information, we will complete the cancellation for
you within 5 working days.
When you choose to cancel your account, all information in your account
will be erased and cannot be recovered. We will no longer collect, use or
share personal information related to the account, but the previous
information still needs to be stored with strong encryption in accordance
with national regulatory requirements, and during the period of legal
retention, it is instructed by the competent authority to provide the
competent authority to inquire, the retention period and the disposal
method beyond the expiration datePlease read the "How We Retain, Store and
Protect Information" section.
(4) Disclosure and sharing
Please note that many services in our products allow you to publicly share
your relevant information not only with your social networks, but also
with all users of the service, such as information you upload or post in
the Products, your responses to information uploaded or posted by others,
or upload or publish your personal information in public areas in the
Products that are not visible to specific users. and including location
data and log information related to that information. As long as you do
not delete the information you have made public, the information may
remain in the public domain; Even if you delete publicly available
information, it may still be cached, copied or stored independently by
other users or third parties not under our control, or stored in the
public domain by other users or such third parties. Therefore, we remind
and ask you to carefully consider whether to share your information
publicly through the above channels. When you find that other users
improperly collect or use your or others' information, please contact us
in time.
(5) Change the scope of your authorization and consent You
can choose whether to disclose information. Some information is necessary
to use this product, but the provision of most other information is
determined by you. You can change the scope of your authorization for us
to continue to collect information or withdraw your authorization by
deleting information, turning off device functions, etc.
After you withdraw your authorization, we cannot continue to provide you
with the services corresponding to the withdrawal of authorization, and we
will no longer process your corresponding information. However, your
decision to withdraw your consent will not affect the processing
previously carried out on the basis of your authorization.
(6) Acquisition of copies of personal information
If you need a copy of your personal information, you can contact us
through the feedback channels listed in the "How to Contact Us" section of
this Policy, and after verifying your identity, we will provide you with a
copy of your personal information (including basic information and
identity information) in our services, except as otherwise provided by
laws and regulations or otherwise agreed in this Policy.
(7) Respond to your above requests
For security, you may need to provide a written request or prove your
identity in other ways. We may ask you to verify your identity before
processing your request. For your reasonable request, we do not charge
fees in principle, but for repeated requests that exceed reasonable
limits, we will charge a certain cost as appropriate. We may reject
requests that are unreasonably repetitive, require excessive technical
means (for example, need to develop new systems or fundamentally change
current practices), pose risks to the legitimate rights and interests of
others, or are very impractical (for example, involving information stored
on backup tapes).
We will not be able to respond to your request in the following
circumstances:
1. Related to our performance of obligations under laws and regulations;
2. Directly related to national security and national defense security;
3. Directly related to public safety, public health, and major public
interests;
4. Directly related to criminal investigation, prosecution, trial and
enforcement of judgments;
5. We have sufficient evidence to show that you have subjective malice or
abuse of rights;
6. In order to protect the life, property and other major legitimate
rights and interests of you or other individuals, but it is difficult to
obtain the consent of the person;
7. Responding to your request will cause serious damage to the legitimate
rights and interests of you or other individuals or organizations;
8. Involving trade secrets.
6. Third-Party Services
This product may be linked to social media or other services (including
websites or other forms of services) provided by third parties. For
example:
(1) You can use the "Share" button to share certain content to other
social media. THESE FUNCTIONS MAY COLLECT YOUR INFORMATION (INCLUDING YOUR
DEVICE INFORMATION, LOG INFORMATION) AND MAY INSTALL COOKIES ON YOUR
MOBILE DEVICE TO PROPERLY OPERATE THE ABOVE FUNCTIONS;
(2) we provide you with links through advertisements or other means of our
services, enabling you to link to the services or websites of third
parties;
(3) Other situations where third-party services are accessed. For example,
in order to achieve the purposes stated in this policy, we may access SDKs
or other similar applications (such as in the form of embed codes,
plug-ins, etc.) provided by third-party service providers in order to
provide you with better customer service and user experience. At present,
the third-party service providers we access mainly include the following
types:
(1) Used for advertising-related services, including advertising display,
advertising data monitoring/statistics, etc.;
(2) Used for message push functions, including push push by mobile phone
manufacturers, reminders of specific events, etc.;
(3) Used for payment-related services, including order payment,
transaction verification, revenue settlement, payment information summary
statistics, etc.;
(4) Used to obtain device location permissions, collect device information
and log information, etc. with your consent;
(5) For third-party authorized services, including third-party account
login, sharing relevant content to third-party products, etc.;
(6) Used to support product function modules, including the realization of
audio and video communication;
(7) Used for
account security and product reinforcement related services, including
network monitoring, domain name resolution, anti-hijacking, anti-spam and
anti-cheating, encryption and decryption services, etc.
(8) For facial verification services, including
choosing the facial option during login and registration;
Some third-party SDKs or similar applications that we access may collect
your personal information, such as when you use such services provided by
third parties in our services, you agree that their information will be
collected and processed directly. We will assess the legality, legitimacy
and necessity of collecting personal information by such third-party
services, require such third parties to take protective measures for your
personal information, and strictly abide by relevant laws, regulations and
regulatory requirements. In order to adapt to the use of Tongyou and
third-party platform services on non-mobile phone devices, and realize the
receiving information push, geographic location sharing and payment
security of mobile devices, Tongyou has access to third-party SDKs,
including Umeng SDK, Umeng product integration Umeng + SDK and push
channel SDK (such as Xiaomi, Huawei, OPPO, vivo, Meizu, etc.), and the
push channel SDK needs to collect the device identifier
(IMEI/MAC/ANDROID). ID/IDFA/OpenUDID/GUID/SIM card IMSI information,
etc.), used to uniquely identify the device in order to push messages to
the user's device. Collect geographic location to identify push channels
and improve the regional coverage of message push. You may also choose to
contact us through the feedback channels listed in the "How to Contact Us"
section of this Policy and we will answer you as soon as possible.
Such third-party social media or other services are operated by the
relevant third party. Your use of such third party's social media services
or other services (including any information you provide to such third
parties) is subject to the third party's own terms of service and
information protection statement (not this Privacy Policy), and you need
to read its terms carefully. This Privacy Policy only applies to the
personal information we collect, and does not apply to the services
provided by any third party or the information use rules of the third
party. If you find that these third-party services are risky, it is
recommended that you terminate the relevant operations to protect your
legitimate rights and interests and contact us in time.
7. Third-party SDKs
Login Class Third-party company name: Google company SDK name: Google login Purpose8. Age Restrictions
We recommend that any minor's participation in online activities should obtain the prior consent of parents or other guardians (hereinafter referred to as "guardians"). We will protect the relevant information of minors in accordance with relevant national laws and regulations. We encourage guardians to guide minors to use this product. If you are a minor under the age of 14, please inform your guardian to read and accept our Children's Personal Information Protection Rules and Guardian Notice, and seek their consent and guidance before you use Tongyou Services and submit personal information.
IX. Notices and Amendments
In order to provide you with better services, we may modify the terms of
this Privacy Policy in a timely manner according to the update of products
or services and the relevant requirements of laws and regulations. We will
post any changes to this Policy on this page. For major changes, we will
also provide more prominent notices (including website announcements, push
notifications, pop-up prompts or other methods), including but not limited
to the major changes referred to in this policy: 1.
Our service model has undergone major changes. Such as the purpose of
processing personal information, the types of personal information
processed, the way personal information is used, etc.;
2. We have undergone significant changes in our ownership structure. Such
as changes of owners caused by business adjustments, bankruptcy mergers
and acquisitions, etc.;
3. Major changes in the main objects of personal information sharing,
transfer or public disclosure;
4. Major changes in your rights to participate in the processing of
personal information and the way in which you exercise them;
5. Major changes have occurred in our responsible department, contact
information and complaint channels responsible for handling personal
information security;
6. Other important or potentially serious circumstances of your personal
rights and interests.
Any modifications we make will put your satisfaction first. We encourage
you to review our Privacy Policy each time you use the product.
We will provide an entry to the old version of the Privacy Policy for your
review.
10. How to contact us
1. If you have complaints and reports about personal information security,
or if you have any questions, comments or suggestions about this Privacy
Policy and your information, please contact our personal information
protection officer, [Tel]: 057188687921 ; [Online feedback customer
service path]: Tongyou team (online time: 8:45-20:45); [Personal
Information Protection Responsible Person Email]:
support@2u.chat;[Hangzhou Tongyou Intelligent Communication Co., Ltd.]:
Building 26, Internet Village, Dream Town, Yuhang District, Hangzhou,
Zhejiang Province Person in charge of personal information protection
(receipt).
2. Under normal circumstances, we will reply within five working days, and
under special circumstances, we will reply within no more than seven days
or the time limit stipulated by laws and regulations. If you are not
satisfied with our response, especially if our personal information
processing behavior harms your legitimate rights and interests, you can
communicate with us again or report to the competent authority.
Tongyou Company (hereinafter collectively referred to as "Tongyou" or
"we") is well aware of the importance of the personal information and
privacy security of children (referring to minors under the age of 14, the
same below). We hope to explain the handling rules and other related
matters when we collect and use children's personal information through
the "Tongyou Children's Personal Information Protection Rules and Guardian
Notice" (hereinafter referred to as "this Policy"). Before using our
products and services (hereinafter collectively referred to as "Tongyou
Services"), please be sure to carefully read and thoroughly understand
this Policy, especially the terms marked in bold, and confirm that you
fully understand and agree to all the terms before starting to use.
Special instructions for guardians:
If we learn that your child is under the age of 14, we will take special
measures to protect your child's personal information obtained by us in
accordance with this policy. Please help us protect your child's personal
information and privacy, require them to read and accept this policy
together under your supervision, and should use Tongyou services and
submit personal information under your consent and guidance. If you do not
agree with the content of this policy, it may cause the Tongyou service to
fail to operate normally, or it will not be able to achieve the service
effect we intend to achieve, and you should ask your child to stop
accessing/using the Tongyou service immediately. By clicking to agree to
this Policy online, or your child's use/continued use of Tongyou Services
or submitting personal information, you agree that we collect, use, store,
share, transfer and disclose your child's personal information in
accordance with this Policy (including updated versions).
Special Note for Children:
We recommend that any child participating in online activities should
obtain the prior consent of a guardian. If you are a child, please notify
your guardian to read this Policy together and seek the consent and
guidance of your guardian before you use the Tongyou service and submit
personal information. By clicking online to agree to this Policy, or your
use/continued use of Tongyou services or submitting personal information,
it means that you have obtained the permission of your guardian, and your
guardian consents to our collection, use, storage, sharing, transfer and
disclosure of your personal information in accordance with this Policy
(including updated versions).
This Policy applies to our activities such as collecting, using, storing,
sharing, transferring and disclosing children's personal information
through the Internet in the People's Republic of China. When a child uses
any Tongyou service, the guardian agrees to accept the protection of this
Policy and the specific children's personal information protection rules
and provisions issued by us in the single service (if any, hereinafter
referred to as "specific terms"), in which case the specific terms and the
terms of this policy are effective for both the guardian and the child. If
there is any inconsistency between the specific terms and the terms of
this policy, the specific terms shall prevail to the extent that the
specific terms are bound. If a single service provided by us does not
apply to this Policy, the service will expressly exclude the application
of this Policy in an appropriate manner. In terms of children's personal
information protection rules, if there is any inconsistency between this
Policy and the text of the Privacy Policy, this Policy shall take
precedence, and if not mentioned in this Policy, the Privacy Policy shall
prevail.
After reading this policy, if you have any questions about this policy or
matters related to this policy, you can contact us through the feedback
channels listed in the "How to Contact Us" section of this policy, and we
will answer as soon as possible.
This policy will help you understand the following:
I. How We Collect and Use Children's Personal Information
II. Children's Personal Information We May Share, Transfer or Disclose
III. How We Store and Protect Children's Personal Information
IV. How to Manage Children's Personal Information
V. Third-Party Services
VI. Revision of this Policy
VII. How to contact us
I. How We Collect and Use Children's Personal Information
(1) We will strictly perform the obligations and responsibilities for the
protection of children's personal information provided by laws and
regulations, follow the principles of legitimate necessity, informed
consent, clear purpose, security guarantee, and lawful use, and collect
and use children's personal information after obtaining the consent of
guardians
1. In some individual services, we may require users to fill in personal
birthday information or identify whether the user is a child according to
the identity information filled in by the user, and in accordance with
laws and regulations, only after obtaining the consent of the guardian
will the child continue to use the relevant Tongyou service.
2. When we identify a user as a child, we may collect the contact
information of the guardian (such as mobile phone number, email address)
and contact the guardian to verify the guardianship relationship with the
child. In order to better protect the rights and interests of children, we
may also collect more information from guardians (such as name, ID card,
household registration book or other proof of guardianship relationship)
in order to further verify the guardianship relationship between guardians
and children.
3. In the process of children's use of Tongyou services, we may also
collect and use other children's personal information, please refer to the
"How We Collect and Use Personal Information" section of the Privacy
Policy for details. If we need to collect and use children's personal
information beyond the above scope, we will obtain the consent of the
guardian again.
(2) Exceptions to obtaining authorization and consent According to
relevant laws and regulations, the authorization and consent of children
and/or guardians is not required
to collect children's information in the following circumstances:
(1) Directly related to national security, national defense security,
public safety, public health, and major public interests;
(2) Directly related to criminal investigation, prosecution, trial and
execution of judgments;
(3) For the purpose of safeguarding the life, property and other major
lawful rights and interests of the information subject or other
individuals, but it is difficult to obtain the consent of the guardian
himself/herself;
(4) The information collected is disclosed to the public by the child or
guardian on his or her own;
(5) Collecting information from legally publicly disclosed information,
such as legal news reports, government information disclosure and other
channels;
(6) Necessary for signing a contract at the request of the guardian;
(7) Necessary for maintaining the safe and stable operation of Tongyou
Service, such as discovering and handling faults of Tongyou Service;
(8) Where information is automatically retained and processed through a
computer information system and it cannot be recognized that the
information retained and processed is children's personal information;
(9) When it is necessary to carry out statistical or academic research in
the public interest, and the results of academic research or description
are provided to the outside world, the information contained in the
results is de-identified;
(10) Other circumstances stipulated by laws and regulations.
(3) Reminders about sensitive personal information
Children's personal information is sensitive personal information.
Guardians and children are requested to be cautious and pay attention to
children's sensitive personal information, and guardians agree that we can
handle sensitive personal information related to children in the purposes
and methods described in this Policy.
II. Children's personal information that we may share, transfer or
disclose
(1) Sharing
Except in the following circumstances, we will not share children's
personal information with any third party without the consent of the
guardian:
1. Provide our services to children. We may share children's information
with partners and other third parties to realize the functions of Tongyou
services and allow children to use the services they need normally, such
as: payment institutions that provide payment services, merchants who
enter the Tongyou platform, partners who provide data services (including
online advertising monitoring, data statistics, data analysis),
third-party logistics companies and other service providers;
2. Necessary sharing with related parties. In order to facilitate us to
provide children with consistent services based on a unified account
system, facilitate their unified management, ensure system and account
security, etc., children's personal information may be shared between us
and our affiliates as necessary;
3. Achieve the purposes described in the first section of this policy "How
We Collect and Use Children's Personal Information";
4. Fulfill our obligations and exercise our rights in this Policy or other
agreements we have reached with children and guardians;
5. Sharing with third parties such as partners who entrust us with
promotion, for the purpose of enabling such entrusting parties to
understand the coverage and effectiveness of promotion. For example, we
can tell the client how many people have seen their promotion or purchased
the client's products after seeing the information, or provide them with
statistical information that does not personally identify the child to
help them understand their audience or customers;
6. To the extent permitted by laws and regulations, in order to comply
with the law, protect us and our affiliates or partners, children,
guardians or other friends users or the public interest, property or
safety from damage, such as to prevent fraud and other illegal activities
and reduce credit risks, we may exchange information with other companies
and organizations. However, this does not include information sold,
rented, shared or otherwise disclosed for profit in violation of the
commitments made in this Policy;
7. In response to the lawful needs of children or with the authorization
and consent of guardians;
8. At the legal request of the guardian;
9. Provided in accordance with a single service agreement (including
electronic agreements signed online and corresponding platform rules) or
other legal documents;
10. Provided based on social public interests in accordance with laws and
regulations.
We will only share children's personal information for lawful, legitimate,
necessary, specific and clear purposes. For companies, organizations and
individuals with whom we share personal information, we will conduct
security assessments and sign strict confidentiality agreements with them,
requiring them to process information in accordance with our instructions,
this Policy and any other relevant confidentiality and security measures.
(2) Transfer
1. As our business continues to develop, we may enter into mergers,
acquisitions, asset transfers or similar transactions, and children's
information may be transferred as part of such transactions. We will
conduct a security assessment and require new companies and organizations
that hold children's personal information to continue to be bound by this
Policy, otherwise, we will require the company or organization to seek
authorization and consent from guardians again.
2. After obtaining the consent of the guardian, we will transfer the
child's personal information to other parties.
(III) Disclosure
We will only disclose children's personal information under the following
circumstances and on the premise of adopting security protection measures
that meet industry standards: 1.
According to the needs of the child or guardian, disclose the information
specified by the guardian in the disclosure method agreed by the guardian;
2. If it is necessary to provide children's information according to the
requirements of laws and regulations, mandatory administrative law
enforcement or judicial requirements, we may disclose children's
information according to the type of information required and the method
of disclosure. Under the premise of complying with laws and regulations,
when we receive the above request for disclosure of information, we will
require the recipient to issue corresponding legal documents, such as
summons or investigation letters. We strongly believe that the information
requested from us should be as transparent as possible to the extent
permitted by law. All requests are carefully reviewed to ensure that they
have a lawful basis and are limited to data that law enforcement has a
legitimate interest in for specific investigative purposes.
(4) Exceptions to obtaining prior authorization and consent when sharing,
transferring, or disclosing information In
the following circumstances, the sharing, transfer, or disclosure of
children's information does not require prior authorization and consent
from guardians: 1.
Directly related to national security and national defense security;
2. Directly related to public safety, public health, and major public
interests;
3. Directly related to judicial or administrative law enforcement such as
criminal investigation, prosecution, trial and judgment enforcement;
4. For the purpose of safeguarding the life, property and other major
lawful rights and interests of children or other individuals, but it is
difficult to obtain the consent of guardians;
5. Information disclosed to the public by children or guardians on their
own;
6. Collecting information from legally publicly disclosed information,
such as legal news reports, government information disclosure and other
channels;
7. Related to our performance of obligations under laws and regulations.
According to the law, the sharing, transfer or disclosure of de-identified
personal information and ensuring that the data recipient cannot recover
and re-identify the information subject is not an act of external sharing,
transfer and public disclosure of personal information, and the storage
and processing of such data will not require separate notification to the
guardian and the consent of the guardian.
III. How We Store and Protect Children's Personal Information
(1) Unless otherwise provided by laws, regulations or regulatory
authorities, we only store children's personal information within the
shortest period of time necessary for the purposes described in this
Policy. If we terminate the service or operation, we will promptly stop
the activities of continuing to collect children's personal information,
and at the same time comply with relevant laws and regulations to notify
the guardian in advance, and delete or anonymize the child's personal
information after the termination of the service or operation, unless
otherwise provided by laws, regulations or regulatory authorities.
(2) We attach great importance to the privacy and security of children,
set up a special security team, and take all reasonable and feasible
measuresProtection of children's personal information:
We will take technical measures such as encryption to store children's
personal information to ensure information security. At the same time, we
strictly set the access rights of information to control the scope of
children's personal information based on the principle of minimum
authorization for staff; Where staff access children's personal
information, they must go through the approval of the person in charge of
children's personal information protection or their authorized management
personnel, record the visit, and employ technical measures to avoid
illegal copying or downloading of children's personal information. If we
discover that children's personal information has occurred or may be
leaked, damaged or lost, we will immediately activate the emergency plan,
take remedial measures, and inform the affected guardians and children of
the relevant circumstances of the incident by email, letter, telephone,
push notification, announcement, etc.
If you would like to learn more, please refer to the "How We Store and
Protect Personal Information" section of the Privacy Policy to learn more
about how we store and protect children's personal information.
Due to technical limitations and the limitations of risk prevention, even
if we have tried our best to strengthen security measures, we cannot
always guarantee 100% security of information. Guardians need to
understand that the system and communication network used by the child's
access to the Friendship Service may have problems due to circumstances
beyond our control.
Guardians and children must keep their service accounts, passwords and
other identity elements safe. When children use the Tongyou Services, we
will identify them through account numbers, passwords and other
identifying elements. Once guardians and children disclose the
aforementioned information, they may suffer losses and may adversely
affect themselves. If guardians and children find that the account number,
password and/or other identity elements may be or have been leaked, please
contact us immediately so that we can take corresponding measures in time
to avoid or reduce related losses.
IV. How to manage children's personal information During
the use of children's services, we will take appropriate operations to
set, guide or provide the contact channels listed in the "How to Contact
Us" section of this policy in our individual services, so as far as
possible to ensure that guardians and children can access, correct, delete
children's personal information, and cancel children's registered
accounts. When accessing, correcting, deleting the aforementioned
information or applying for account cancellation, we may require guardians
and/or children to verify identity to ensure information security. Except
as otherwise provided by laws and regulations, when guardians and children
correct, delete children's personal information or apply for account
cancellation, we may not immediately correct or delete the corresponding
information from the backup system, but will correct or delete such
information when the backup is updated.
(1) Access to children's personal information
Guardians and children can view children's personal information provided
or generated in the use of Tongyou services, such as personal information
materials, some usage records, and published content.
(2) Correction of children's personal information
We encourage guardians and children to update and modify children's
personal information to make it more accurate and effective. Guardians and
children who find that there are errors in children's personal information
collected, used and processed by us, they can contact us to correct it.
Once we have completed identity verification and verification issues, we
will take timely steps to correct them.
(3) Delete children's personal information Depending
on the specific circumstances of children's choice of Tongyou services,
guardians and children may delete some of the children's personal
information on their own during the use of Tongyou services. In the
following circumstances, guardians and children can directly request us to
delete children's personal information, and we will promptly take measures
to delete it after completing identity verification and verification
issues, including: 1.
We collect, store, use, transfer or disclose children's personal
information in violation of laws and regulations or agreements with
guardians and children;
2. Collecting, storing, using, transferring or disclosing children's
personal information beyond the scope of the purpose or the necessary
period;
3. The guardian withdraws consent;
4. The guardian or child terminates the use of Tongyou services through
cancellation or other means.
However, please note that if guardians and children delete or request us
to delete specific children's personal information, it may not be possible
to continue to use all or part of the Tongyu services.
(4) Cancel account 1. We provide account cancellation function, guardians
and children can cancel accounts through the following paths: (
1) Client operation path: Log in to the product client with your mobile
phone, enter the [Me] tab [Settings] on the home page, click [Account and
Security], click [Cancel Account] and follow the prompts
to cancel the account.
(2) Customer service telephone path: Please call the customer service
telephone provided at the end of the article to contact us, after
verifying the account information, we will complete the account
cancellation for you within 5 working days.
When you choose to sign out of your account, all information in that
account will be erased and cannot be recovered. We will no longer collect,
use or share personal information in connection with the account.
(5) Change the scope of authorization and consent
Guardians and children can always choose whether or not to disclose
information. Some information is necessary to use the Tongyou Service, but
most other information is provided at your own discretion. Guardians and
children can change the scope of their authorization for us to continue
collecting information or withdraw their authorization by deleting
information, turning off device functions, etc.
When guardians and children withdraw their consent, we can no longer
provide the services corresponding to the withdrawal of authorization, nor
will we process the corresponding information. However, the decision to
withdraw the consent will not affect the processing previously carried out
on the basis of the consent of the guardian and the child.
(6) Acquisition of copies of personal information
If you need to obtain a copy of children's personal information, guardians
and children can contact us through the feedback channels listed in the
"How to Contact Us" section of this Policy, and after verifying identity,
we will provide a copy of the child's personal information (including
basic information and identity information) in our services, except as
otherwise provided by laws and regulations or otherwise agreed in this
Policy.
V. Third-Party Services Tongyou Services
may provide children with access to or link to social media or other
services (including websites or other forms of services) provided by third
parties. Please refer to the "Third-Party Services" section of the Privacy
Policy to learn more about the types of third-party services we access or
link to.
Such third-party social media or other services are operated by the
relevant third party. Children's use of such third parties' social media
services or other services (including any information provided by children
to such third parties) is subject to the third party's own terms of
service and information protection statement (not this Policy), and
guardians and children need to read their terms carefully. This Policy
only applies to the personal information we collect, and does not apply to
the services provided by any third party or the information use rules of
the third party. If guardians and children find that these third-party
social media or other services are risky, it is recommended to terminate
the relevant operations to protect the legitimate rights and interests of
children and contact us in time.
VI. Revision of this Policy
In order to provide better services, we may modify the terms of this
Policy in a timely manner in accordance with the update of Tongyou
services and the relevant requirements of laws and regulations, and such
modifications form part of this Policy. If such updates result in a
substantial reduction or significant change in the rights of guardians and
children under this Policy, we will notify them through website
announcements, push notifications, pop-up prompts or other means before
this Policy takes effect, and if the guardian does not agree to such
changes, he or she may choose to ask the child to stop using the Tongyou
Services.
Any of our modifications will put user satisfaction first. We encourage
guardians and children to consult our Children's Personal Information
Protection Rules and Guardian Instructions each time they use the Tongyou
Services.
VII. How to contact us
We have a dedicated department for personal information protection and
designated a special person in charge of children's personal information
protection, and will protect children's personal information in strict
accordance with this policy. If guardians and children have complaints and
reports about network information security, or have any questions,
comments or suggestions about this Policy, 2U's children's personal
information protection rules and measures, please feel free to contact us,
please contact our personal information protection officer, [Tel]:
06359510963633 ; [Online feedback customer service path]: 2U team (online
time: 8:45-20:45); 【Personal Information Protection Officer
E-mail】:support@2u.chat;【Brighhsun New EnergyPty LTD】Registered
Address: 319. Hallam North Road Lysterfield South 3156 VIC Australia
Person in charge of personal information protection (receipt).
Under normal circumstances, we will reply within five working days, and
under special circumstances, we will reply within a maximum of seven days
or within the period stipulated by laws and regulations. If you are not
satisfied with our response, especially if our personal information
processing behavior harms your legitimate rights and interests, you can
communicate with us again or report to the competent authority.