Privacy Policy

This policy applies only to the products or services of Beijing Yijiahui Technology Co., Ltd. Last updated on: January 10, 2025

This policy will help you understand the following content:

We deeply understand the importance of your user information and will do our utmost to protect the security and reliability of your user information. We are committed to maintaining your trust in us and adhere to the following principles to protect your user information: principle of unity of power and responsibility, principle of clear purpose, principle of choice and consent, principle of minimum adequacy, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your user information in accordance with the industry's mature security standards.

Please read and understand this privacy policy carefully before using our products (or services).

1. How we collect and use your personal information

We will explain in detail the types of personal information we collect and their corresponding purposes so that you can understand the specific categories of personal information we collect for a particular function, the reasons for use, and the methods of collection and sale.

(1) Collection of personal information

When you use certain functions, we will collect some of your sensitive information after obtaining your consent. For example, when you use our registration function, we will collect your personal information; when you use the recommended contacts function, we will collect your mobile contacts information; when you use the nearby function, we will collect your location information. Unless required by relevant laws and regulations, refusing to provide this information will only prevent you from using the relevant specific functions, but will not affect your normal use of our other functions.

Third-party SDKs we integrate

1. Jiguang Security Authentication SDK

Third-party entity: Shenzhen Hexun Huagu Information Technology Co., Ltd.

Cooperation purpose: To provide one-click verification, security risk control, and self-starting services for App users

Types of personal information processed and purposes:

Data processing method: Through de-identification, encrypted transmission, and other security methods

Official website link: https://www.jiguang.cn

Privacy policy link: https://www.jiguang.cn/license/privacy

(The rest of the content has been omitted for brevity. Please refer to the original text for the complete version.)

2. How we use cookies and similar technologies

(1) Cookies

To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, the website can store your access preference data.

We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, as most web browsers have the function to block cookies. But if you do this, you need to manually change the user settings every time you visit our website.

(2) Web beacons and pixel tags

In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on the website. For example, the emails we send to you may contain click URLs linked to the content of our website.

If you click the link, we will track this click to help us understand your product or service preferences and improve customer service. Web beacons are usually transparent images embedded in websites or emails. With the help of pixel tags in emails, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

(3) Do Not Track

Many web browsers have a Do Not Track function, which can send a Do Not Track request to the website. At present, the major Internet standards organizations have not yet established policies to regulate how websites should respond to such requests. But if your browser has enabled Do Not Track, all our websites will respect your choice.

3. How we share, transfer, and publicly disclose your user information

(1) Sharing

We will not share your user information with any other company, organization, or individual, except in the following cases:

(The rest of the content has been omitted for brevity. Please refer to the original text for the complete version.)

4. How we protect your user information

(1) We have used industry-standard security protection measures to protect the user information you provide, preventing data from being accessed, publicly disclosed, used, modified, damaged, or lost without authorization. We will take all reasonably feasible measures to protect your user information. For example, data exchanged between your browser and the "service" is protected by SSL encryption; we also provide https secure browsing for the website; we will use encryption technology to ensure data confidentiality; we will use trusted protection mechanisms to prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access user information; and we will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting user information.

(2) We will take all reasonably feasible measures to ensure that no unrelated user information is collected. We will only retain your user information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.

(3) The Internet is not an absolutely secure environment, and emails, instant messaging, and other forms of communication with other users are not encrypted. We strongly recommend that you do not send user information through such methods.

(4) The Internet environment is not 100% secure, and we will do our best to ensure the security of any information you send to us. Even if we have made great efforts and taken all reasonable and necessary measures, there is still a possibility that your user information may be illegally accessed, stolen, tampered with, or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of the information network and voluntarily assume them.

(5) In the unfortunate event of a user information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation of the security incident and the possible impact, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the event by email, letter, phone, push notification, etc. When it is difficult to inform each user information subject individually, we will take a reasonable and effective way to publish a notice. At the same time, we will also, in accordance with the requirements of the regulatory authorities, proactively report the handling of the user information security incident.

5. Your rights

In accordance with the relevant laws, regulations, standards of China, and common practices in other countries and regions, we guarantee that you have the following rights to exercise over your user information:

(1) Access to your user information

You have the right to access your user information, except as otherwise provided by law. If you wish to exercise your right to data access, you can access the official website of our company through the following methods.

If you cannot access these user information through the above link, you can always contact us using our web form or send an email. We will respond to your access request within 30 days.

For other user information generated during your use of our products or services, we will provide it to you as long as we do not need to invest too much. If you wish to exercise your right to data access, please send an email.

(2) Correction of your user information

When you find that the user information we process about you is incorrect, you have the right to ask us to make corrections. You can submit a correction request through the methods listed in "(1) Access to your user information".

If you cannot correct these user information through the above link, you can always contact us using our web form or send an email. We will respond to your correction request within 30 days.

(3) Deletion of your user information

In the following situations, you can request us to delete your user information:

We will evaluate your deletion request and, if the relevant regulations are met, we will take the appropriate steps to process it. When you make a deletion request to us, we may ask you to verify your identity to ensure the security of your account. When you delete information from our services, due to the application of law and security technology, we may not immediately delete the corresponding information from the backup system. We will securely store your information until the backup can be cleared or anonymized.

(4) Change the scope of your authorized consent

Each business function requires some basic user information to be completed (see the "First Part" of this policy). For the collection and use of user information, you can give or withdraw your authorized consent at any time. You can view the official website of our company or send an email.

After you withdraw your consent, we will no longer process the corresponding user information. Please also note that withdrawing your authorized consent may lead to certain consequences, such as we may not be able to continue to provide you with the corresponding service or specific functions, but your decision to withdraw consent will not affect the user information processing based on your previous authorization.

(5) User information subject cancellation of account

You can cancel the account you previously registered at any time. You can operate it yourself by sending an email to our company or mailing a paper letter to our company. After applying for cancellation of the account to our company, we will cancel it within 72 hours. We will stop providing you with products or services and, in accordance with your request, delete or anonymize your information, except as otherwise provided by law. This may also result in you losing access to the data in your account, so please operate with caution.

For your reasonable requests, we do not charge a fee in principle, but for repeated, excessive requests, we will charge a certain cost depending on the situation. For those requests that are groundless and repeated, require too much technical means (for example, need to develop a new system or fundamentally change current practices), pose a risk to the legitimate rights and interests of others, or are very unrealistic, we may refuse. Please also understand that for security reasons, requirements of relevant laws and regulations, or technical limitations, we may not be able to respond to certain requests from you, for example, the following situations:

6. How we handle children's personal information

We attach great importance to the protection of children's personal information. Our products, websites, and services are mainly aimed at adults. Without the consent of a parent or guardian, children should not create their own user accounts. Although the definition of children varies according to local laws and customs, we consider anyone under the age of 14 as a child.

For cases where children's user information is collected with the consent of a parent or guardian, we will only store, use, or publicly disclose this information if it is permitted by law, the parent or guardian has explicitly consented, or it is necessary to protect the child. Otherwise, we will try to delete the relevant data as soon as possible.

Given the limitations of existing technologies and business models, it is difficult for us to proactively identify children's personal information. If you find that we have collected children's personal information without our knowledge or without the verifiable consent of a guardian, you can contact us promptly. We will try to delete it as soon as we find out, and if we find out ourselves, we will also delete it, unless law requires us to retain it.

7. How your user information is stored and transferred globally

In principle, the user information we collect and generate within the People's Republic of China will be stored within the People's Republic of China. We will only retain your user information for the period necessary to achieve the purposes and uses described in this policy and the minimum period required by laws and regulations. After the above retention period, we will delete your user information or anonymize it in accordance with the requirements of applicable laws and regulations. Unless otherwise provided by law, or for purposes of public interest, scientific and historical research, or your separate authorization and consent, we may need to retain relevant data for a longer period of time.

Because we provide products or services through resources and servers around the world, this means that, after obtaining your authorization and consent, your user information may be transferred to jurisdictions outside the country/region where you use the product or service, or be accessed by these jurisdictions.

Such jurisdictions may have different data protection laws, or may not have relevant laws at all. In such cases, we will ensure that your user information is protected in the People's Republic of China with sufficient equivalence. For example, we will request your consent for the cross-border transfer of user information, or implement data de-identification and other security measures before cross-border data transfer.

8. How this policy is updated

Our privacy policy may change. Without your explicit consent, we will not reduce the rights you should enjoy under this privacy policy. We will publish any changes to this policy on this page.

For major changes, we will also provide more prominent notice. The major changes referred to in this policy include, but are not limited to:

We will also archive the old version of the policy for your reference.

9. Contact us

When you have other complaints, suggestions, or issues related to minors' personal information, or need to delete all access records, please contact us. You can also send your questions to bjyjhkjyxgs@163.com or mail to the following address:

Email: bjyjhkjyxgs@163.com