ChronoMark Pro Privacy Policy
Effective Date: 7/03/2024
We respect and protect the personal privacy and information security of all users who use this application (hereinafter referred to as "you"). In view of this, the company has formulated the "Privacy Information Protection Policy" (hereinafter referred to as "this policy") to confirm with you that we will collect, store, use, manage and protect your personal information during your use of this application . Before using this application, please be sure to carefully read and thoroughly understand this policy, especially the terms marked in bold/bold underline, you should read them carefully, and start using them after confirming your full understanding and agreement. During this process, if you have any questions, comments or suggestions, you can contact the data controller by email at zonghong_global@163.com, and we will answer you as soon as possible.
1. How to collect your personal information
When you use our products or services, we need/may need to collect and use your relevant personal information; to provide you with services, optimize our services and protect your account security.
(1) Information collected by this application
① . Service content display/browse/play/download functions
Purpose of collection: To ensure your normal use of our service content display/browse/play/download functions, maintain the normal operation of our services, understand the adaptability of products to different hardware devices, ensure the security of the operating environment, and identify abnormal status of accounts.
Collection method and scope: We collect the information necessary to realize product functions according to the principles of legality, legitimacy and necessity. After you agree to the authorized privacy policy during software installation or use, your device serial number, device model, operating system, unique device identifier, IP address, and operation logs will be collected. Among them, the device running process information and application list are only used locally on the device to prevent malicious programs and anti-cheating, and will not be uploaded to the server.
The frequency and timing for our client to collect your device information is only once when you start the client, and when the client is running in the background, your device information will not be collected again.
We collect this information to provide you with our core service content display/play/download services. If you refuse to provide the above information or permission, you may not be able to use our products and services. Please be aware that separate device information and log information cannot identify your identity information.
② . Log information
When you use products or services provided by our website or clients, we will automatically collect your detailed usage of our services and save them as relevant web logs to help us optimize our products and services. Including your search and browsing history, follow, play history, visits, play time, IP address, WiFi network, language used, visit date and time.
③ . To provide you with VIP membership or subscription services
In order to complete the payment of VIP membership fees, we will record your payment method and fund account number to realize the refund of the original path, cancellation of continuous subscription membership service, and after-sales service. According to the payment method you choose, we will pass your order payment-related information, order security-related device information and other necessary information required by anti-money laundering laws through other third-party payment software tool development kits (SDK) embedded in the application. The method is shared with third-party payment companies. At the same time, we will record and show you the order information of your account, including purchasing membership information.
④ . Customer Service and Dispute Resolution
In order to provide you with customer service, we will record the contact information and communication/call records and content you provide to contact you and help you solve problems, or record the solutions and results of related problems.
In order to confirm the transaction status and provide you with member VIP after-sales and dispute resolution services, we will collect your transaction and payment information related to the transaction through the payment institution and payment method you choose based on the transaction (such as the transaction certificate of IAP payment on the iOS side) and fee receipt).
⑤ . Security function
We need to collect some of your information to protect your account and system security when using our products or services, and to help improve the security and reliability of our products and services, so as to prevent any behavior that endangers users and society, including you The following personal information: Personal common device information (including: hardware model, device MAC address, IMEI, IMSI), login IP address, product version number, browsing history, service failure information, and personal sensitive information: mobile phone number, transaction information. Based on the above information, we will comprehensively judge your account and transaction risks, conduct identity verification, customer service, detection and prevention of security incidents, fraud monitoring, archiving and backup purposes, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law. Once we detect that there is or is suspected to be an account security risk, we will use relevant information for security verification and risk elimination to ensure the security of the products and services we provide to you, so as to protect your rights and interests from infringement. At the same time, when account or system security issues occur, we will collect this information to optimize our products and services.
(2) Information collected by third-party SDKs
You authorize and agree that we may entrust authorized partners to provide you with certain services or perform functions on our behalf. We will only share your information for the legal, legitimate, necessary, specific, and clear purposes stated in this privacy information protection policy. Partners will only have access to the information necessary to perform their duties and will not use this information for any other purpose.
Our products implement the following service types by integrating SDK:
① Advertising display service
Our products integrate Pangolin SDK to provide open screen ads, rewarded video ads, etc. It is necessary to read your device's unique identification code (IMEI/IDFA/OPENUDID/GUID, SIM card IMSI information), network status information, and geographic location to analyze your use of our services and optimize advertising delivery.
③ . Crash and failure information statistics service
Our products integrate Firebase SDK, which needs to read your device identifier, WiFi address, and carrier information to provide crash log reporting and version update push services.
(3) Additional functional services based on system permissions
We may collect and use your personal information and apply for device permissions in the following additional services provided to you. If you do not provide this information, it will not affect your browsing, searching, and purchasing basic services using our client, but you may not be able to obtain the user experience brought to you by these additional services. This information can only be obtained with your cooperation in enabling the corresponding device permissions, so you can manage it through the corresponding permissions on the device settings page. These additional services include:
Functional services based on system permissions in the iOS version
Additional services based on photo album permissions: When you use in-app functions, this app will request photo album permissions. You understand and agree that the above additional services may require you to open your photo album (picture library) in your device. You can set it on your device. If you cannot find the option to turn off the address book permission in the above path of your app due to the problem of the updated version, you need to go to your device setting to turn off the permission for this app. Please note that if you enable any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, it means that you cancel the authorization, and we will no longer continue to collect based on the corresponding permission And use relevant personal information, and cannot provide you with the services corresponding to this permission. However, your decision to close the permission will not affect the previous collection and use of information based on your authorization.
(4) Others
① If the information you provide contains personal information of other users, you must ensure that you have obtained legal authorization before providing such personal information to us. If it involves children's personal information, you need to obtain the consent of the corresponding child's guardian before posting. In the aforementioned circumstances, the guardian has the right to contact us through the channels in Article 9 of this policy to request correction or deletion of the content involving children's personal information.
② If we use information for other purposes not specified in this policy, or use information collected based on specific purposes for other purposes, or we actively obtain your personal information from third parties, we will obtain your consent in advance .
If we obtain your information indirectly from a third party, we will explicitly request the third party to collect personal information after obtaining your consent in accordance with the law before collection, and inform you of the content of the shared information, which involves sensitive information Before it is provided to us for use, it needs to be clearly confirmed by you, and the third party is required to make a commitment to the legality and compliance of the source of personal information. If the third party violates the law, we will clearly require the other party to bear the corresponding legal responsibility; at the same time , our professional security team will strengthen the security of personal information (including sensitive information reporting, encrypted storage of sensitive information, access control). We will use no less than the same protection means and measures as we use for our own users' personal information to protect indirectly obtained personal information.
The circumstances involving the embedding of third-party codes and the transmission of personal information by plug-ins on our platform are listed one by one, see Annex 1 of this policy for details.
③ Exceptions to Authorized Consent
You fully understand and agree that we do not need your authorization and consent to collect and use your personal information under the following circumstances, and we may not respond to your request for correction/modification, deletion, cancellation, withdrawal of consent, or information request:
a. Related to national security and national defense security;
b. Related to public security, public health, and major public interests;
c. Related to criminal investigation, prosecution, trial and judgment execution of judicial or administrative law enforcement;
d. It is difficult to obtain the consent of the person for the purpose of safeguarding your or other individuals' life and major legal rights and interests of property;
e. Personal information that you disclose to the public by yourself;
f. Personal information is collected from legally disclosed information, such as legal news reports and government information disclosure channels.
g. Necessary to sign and perform relevant agreements or other written documents with you;
h. Necessary for maintaining the safe and stable operation of the provided products and/or services, such as discovering and handling product and/or service failures;
i. Necessary for legitimate news reporting;
j. It is necessary for an academic research institution to carry out statistical or academic research based on public interests, and when providing academic research or description results to the outside world, de-identify the personal information contained in the results;
k. Other circumstances stipulated by laws and regulations.
2. How the application company uses, transfers and discloses your personal information
(1) Sharing and disclosure
Except for the following circumstances, we will not share your personal information with any other third parties.
① Sharing with your explicit consent or authorization or your active choice. After obtaining your express authorization or consent, we will share your personal information with other companies, organizations and individuals. For example, if we entrust a third party to provide you with products or services (such as product delivery, user activities, gift giving), we will share the above information with the third party after obtaining your express consent. information, we will not be able to complete the relevant delivery services. We will only share your sensitive personal information if you choose to agree. With your explicit consent or based on your active choice, we may publicly disclose your personal information.
② Sharing and disclosure under statutory circumstances. We may share your personal information externally in accordance with the provisions of laws and regulations, the needs of litigation dispute resolution, or the legal requirements of administrative and judicial authorities. For example, if we determine that you have violated laws and regulations or seriously violated our relevant agreement rules, or to protect the personal and property safety of our clients and users or the public from infringement, we may, in accordance with laws and regulations or our clients Relevant agreement rules, disclosing your personal information with your consent, including relevant violations and the measures our platform has taken against you. For example, if you or the account you use publishes illegal remarks, seriously violates our rules, violates laws and regulations, and/or violates public order and good customs, causing significant social impact and causing damage to our reputation, we may disclose your information and punish you Condition.
③ Share your personal information with our affiliates. Sharing with affiliated companies: In order to facilitate us to provide services to you based on the associated account, recommend information that you may be interested in, or protect the personal and property safety of our affiliated companies or other users or the public from infringement, after your authorization and consent Afterwards, your personal information may be shared with our affiliated companies. We will only share necessary personal information (for example, in order to facilitate you to log in with our account and use our affiliated company's products or services, we will share your necessary personal information with affiliated companies), and it is subject to the statement in this Privacy Information Protection Policy purpose constraints. If we share your personal sensitive information or affiliated companies change the use and processing purpose of personal information, we will ask for your express authorization and consent again.
④ Sharing with Authorized Partners. You authorize and agree that we may entrust authorized partners to provide you with certain services or perform functions on our behalf. We will only share your information for the legal, legitimate, necessary, specific, and clear purposes stated in this privacy information protection policy. Partners will only have access to the information necessary to perform their duties and will not use this information for any other purpose.
Currently, our authorized partners include the following types:
a. Authorized partners for advertising monitoring, data statistics, and data analysis services. In order to maintain/improve our products/services and provide you with better content, we may access designated partners who provide this service, Youmeng, Youlianghui, and Pangolin to read your device identification number and networking-related information, It is used to analyze your use of our services and optimize advertisement delivery.
Our products integrate Firebase SDK, Firebase SDK needs to collect your device Mac address, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to provide statistical analysis services, and through The geographic location calibrates the accuracy of report data and provides basic anti-cheating capabilities.
Except for the above circumstances with your permission, we will not use your personally identifiable information (referring to information that can identify you, such as your name or mobile phone number, through which you can be contacted or identified) with advertising , Partner sharing of analysis services. We will commission these partners to process information related to the coverage and effectiveness of advertising, but will not provide your personally identifiable information, or we will de-identify this information so that it does not personally identify you. Such partners may combine the above information with other data obtained legally by them to carry out advertising services or decision-making recommendations entrusted by us.
Please understand that separate device information, log information and other information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, during the combined use, such non-personal information will be regarded as personal information, unless authorized by you Or unless otherwise stipulated by laws and regulations, we will anonymize and de-identify such personal information.
b. Suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business, including technical infrastructure services we commission, analyzing how our services are used, measuring the effectiveness of advertising and services, payment facilitation or Conduct academic research and surveys, conduct bug or crash statistics, improve login experience, and realize gateway number retrieval. In order to provide customer service, we will provide customer service providers and service providers with your user nickname and device identification number, so as to support us in relevant customer service, after-sales service, and improve service experience.
We will conduct strict security inspections on the application program interface (API) and software tool development kit (SDK) for authorized partners to obtain relevant information, and agree with authorized partners on strict data protection measures to make them comply with our entrusted purpose, Service description, this privacy information protection policy and any other relevant confidentiality and security measures to process personal information.
A third-party SDK provider that provides technical services. For the identity of the provider, the purpose, method and scope of collecting personal information, please refer to Annexes 1 and 2 of this policy for details.
⑤ 5. Assist in dispute resolution. If you are a qualified intellectual property complainant and have filed a complaint, you should disclose it to the respondent at the request of the respondent so that both parties can handle possible rights disputes. Only by sharing your information can we provide the services you need, or handle your disputes or disputes with others. If any complaining party to the transaction, a judiciary or an administrative law enforcement agency requests information disclosure, we will provide the above-mentioned agency with the contact information and personal information necessary to facilitate the settlement of the transaction dispute. Our platform only assumes the corresponding legal responsibility under the circumstances clearly stipulated by the law.
⑥ To provide and improve products and services. In order to further improve the product or service and provide a better user experience, Sweetheart Watermark Camera will use the information you provide to conduct statistics and analysis on its own or provide it to data service providers to evaluate, maintain and improve the performance of this product or service. This information will be anonymized before use and will not contain any identifying information about you.
⑦ Data Transfer. In the event of reorganization, merger, division, liquidation or asset sale of the application company, your information will be transferred to the new subject as the subject of the transaction. Before this policy is changed, your personal information will still be protected by this personal information protection policy.
(2) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following cases:
① Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
② In the event of a merger, acquisition, or bankruptcy liquidation of our service provider, or other circumstances involving mergers, acquisitions, or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization that holds your personal information to Continue to be bound by this policy, otherwise we will require the company, organization and individual to seek your authorization and consent again.
(3) Exceptions to obtaining prior authorization and consent when sharing, transferring, and disclosing personal information
In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:
① Related to national security and national defense security;
② Related to public security, public health, and major public interests;
③ Related to criminal investigation, prosecution, trial and execution of judgments;
④ It is difficult to obtain the consent of the person for the purpose of safeguarding your or other individuals' life and major legal rights and interests of property;
⑤ Personal information that you disclose to the public by yourself;
⑥ Collecting personal information from legally disclosed information, such as legal news reports and government information disclosure channels.
According to the law, sharing and transferring personal information that has been de-identified and ensuring that the data recipient cannot restore and re-identify the subject of personal information is not an act of external sharing, transfer and public disclosure of personal information. Storage and processing will not require further notice to you and your consent.
If you do not agree that we provide your personal information to third parties in accordance with the above terms, please stop using our client services immediately.
3. How to store information
(1) Where the information is stored
The personal information we collect and generate during our operations in the People's Republic of China will be stored in China, except for the following circumstances:
① There are clear provisions in laws and regulations;
② Obtain your explicit authorization;
In view of the above situations, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.
(2) Information storage period
We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless there is a mandatory retention requirement by law. Our criteria for judging the aforementioned deadlines include:
① Complete the service purpose related to you, maintain corresponding service and business records, and respond to your possible inquiries or complaints;
② To ensure the safety and quality of the services we provide to you;
③ Do you agree to a longer retention period;
④ Whether there are other special agreements on the retention period.
After your personal information exceeds the retention period, we will delete your personal information or make it anonymized in accordance with the requirements of applicable laws.
(3) Information deletion and anonymization
If the company's services decide to stop operating, we will stop collecting your personal information after the relevant services stop operating. We will notify you of the suspension of operations in the form of an announcement. Your personal information already held will be deleted or anonymized. If children's personal information is involved, we will promptly notify the children's guardians of the notice of cessation of operations.
4. How does the application company protect the security of your personal information
In order to ensure the security of your personal information collected by us, we promise to strive to achieve a reasonable level of security. The specific security measures and security capabilities are stated as follows:
(1) Technical security protection
In order to protect your information security, we strive to take various reasonable physical, electronic and management security measures in line with industry standards to protect your information so that your information will not be leaked, damaged or lost, including but not limited to SSL, information encryption storage, data center access control. We will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent malicious attacks on personal information; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information.
(2) Security System Guarantee
We have an industry-leading data security management system centered on data and centered around the data life cycle, which improves the security of the entire system from multiple dimensions in terms of organizational construction, system design, personnel management, and product technology. At present, in order to improve the security of your use of the services provided by us, our affiliated companies and partners, protect the personal and property safety of you or other users or the public from infringement, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, Network attacks, network intrusion security risks, and more accurate identification of violations of laws and regulations or our client-related protocol rules, our platform has implemented hierarchical protection for the system.
(3) Personnel safety management
We have also taken strict management on employees or outsourcers who may have access to information, including but not limited to taking different authority controls according to different positions, signing confidentiality agreements with them, monitoring their operations and other measures. We will provide corresponding security measures according to the existing technology to protect your information and provide reasonable security protection. We will try our best to prevent your information from being leaked, damaged or lost. We will organize security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(4) Sensitive information and protection tips
① Personal sensitive information protection Note: The information you share voluntarily or even publicly when using our services may involve personal information or even sensitive personal information of you or others, such as your avatar picture upload, for example, when you choose to upload when commenting contain personal information. Please consider more carefully whether to share or even publicly share relevant information when using our services.
② Your account has security protection function, please keep your account information properly. We will back up to other servers, encrypt user passwords and other security measures to ensure that your information is not lost, misused and altered. Despite the aforementioned security measures, please also understand that there are no "perfect security measures" on the information network.
(5) Information Disclosure Tips and Password Leakage Handling
Please be aware that the Internet is not a completely secure environment. Please properly protect your personal information and only provide it to others when necessary. If you find that your personal information is leaked, especially your account number and password, please contact our customer service immediately so that we can take corresponding measures.
(6) Handling of information security incidents
After an unfortunate personal information security incident occurs, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks independently, Remedy for you. We will inform you of the event-related situation by email, telephone, push notification, and short message. When it is difficult to inform the personal information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
(7) Children's personal information security
We strictly set the access rights of children's personal information, adopt the principle of minimum sufficient authorization for staff who may have access to children's personal information, and take technical measures to record and control the behavior of staff handling children's personal information to avoid illegal copying and downloading Children's Personal Information.
We have formulated an emergency plan for children's personal information security incidents, and regularly organize relevant internal personnel to conduct emergency response training and emergency drills, so that they can master job responsibilities and emergency response strategies and procedures. After the unfortunate occurrence of a child's personal information security incident, we will promptly inform the child and his guardian in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the children and their guardian Advice for self-prevention and risk reduction, remedies for children and their guardians. We will promptly inform the children and their guardians of the incident by means of app push notifications, emails/short messages. When it is difficult to notify one by one, we will take a reasonable and effective way to issue relevant warning information. At the same time, we will also actively report the handling of children's personal information security incidents in accordance with the requirements of the regulatory authorities. If the legitimate rights and interests of children and their guardians are damaged, we will bear corresponding legal responsibilities.
5. Protection of minors
We attach great importance to the protection of personal information of minors. If you are a minor, we ask you to ask your parents or other guardians to read this Privacy Information Protection Policy carefully, and use our services or provide information to us with the consent of your parents or other guardians.
If you are a parent or other guardian of a child, please pay attention to whether the child under your guardianship is using our services after obtaining your authorization and consent. If you have any questions about the personal information of the child under your guardianship, please contact us through the contact information in Chapter 9.
6. How do you manage your information
In accordance with the requirements of the "Network Security Law of the People's Republic of China", we provide convenient methods for you to access, correct and delete your account information or other personal information you provide when using our services.
delete your personal information
You can request us to delete your personal information under the following circumstances:
(1) If our handling of personal information violates laws and regulations;
(2) If we collect and use your personal information without your explicit consent;
(3) If our handling of personal information seriously violates the agreement with you;
(4) If you no longer use our products or services, or you voluntarily log out of your account;
(5) If we permanently cease to provide you with products or services
If we decide to respond to your deletion request, we will also notify the subjects who obtained your personal information from us as much as possible and request them to delete them in a timely manner, unless laws and regulations provide otherwise, or these subjects have obtained your independent authorization.
When you delete information from our service, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.
Change the scope of your authorization
Every business function requires some basic personal information to be completed. In addition, for the collection and use of additional personal information, you can contact our customer service to give or withdraw your authorization and consent.
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.
Constrained Information System Automatic Decision-Making
In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appeal methods on the premise of not infringing on our platform's trade secrets or other user rights and social public interests.
7. Unsubscribe
If you find that you have received content and product and service information pushes that do not belong to your active search and browsing, if you do not want to receive the above information, you can unsubscribe through the original path. Subscription Management" to cancel your continuous monthly subscription.
8. Respond to your above request
For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
9. Revision of Personal Information Protection Policy
The company may modify this policy from time to time. After the agreement is revised, we will announce the revised content on the relevant page or in other appropriate ways. If you do not agree to the modification of this agreement, please immediately stop using the platform or cancel the services you have obtained; if you choose to continue to access or use the platform or service after the modification of this policy, it is deemed that you have accepted the modification of this policy.
The terms listed in this policy signed by you and the company cannot fully cover all the rights and obligations between you and the company regarding personal information. Therefore, the company's announcement of other statements and various formal rules are regarded as supplementary terms of this policy, an integral part of this policy, and have the same legal effect as this agreement.
We will not limit your rights under this Privacy Policy without your explicit consent. We will post any changes and updates to our Privacy Policy on our dedicated link. For major changes, we will also provide more prominent notices (including we will notify you through our platform and even provide you with pop-up prompts).
Major changes referred to in this policy include, but are not limited to:
① Major changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, and the way the personal information is used;
② We have a significant change in control. Such as owner changes caused by mergers and acquisitions;
③ The main object of personal information sharing, transfer or public disclosure changes;
④ Your right to participate in the processing of personal information and how to exercise it has undergone major changes;
⑤ When there are changes in the responsible department, contact information and complaint channels that we are responsible for handling personal information security;
⑥ When the personal information security impact assessment report indicates that there is a high risk.
In order for you to receive notifications in a timely manner, it is recommended that you notify us in time when your contact information is updated. If you continue to use our services after the update of this policy takes effect, it means that you have fully read, understood and accepted the updated policy and are willing to be bound by the updated policy. We encourage you to review this policy each time you use our services. You can view this policy in "My-Privacy Policy" on the client side of this application.
Note: The update date of this policy version is July 03, 2024. If you think the updated policy is more beneficial to you, we agree that both parties will apply the new policy content.