Privacy Policy

Introduction
User information security and privacy protection as their “lifeline”. Adhering to the concept of “everything depends on user value”, we are committed to enhancing the transparency of information processing, enhancing your information management convenience, and ensuring the security of your information and communication.
We strictly abide by laws and regulations, and follow the following privacy protection principles to provide you with more secure and reliable services:
1. Safe and reliable: We try our best to prevent your information disclosure, damage and loss through reasonable and effective information security technology and management process.
2. Independent Choice: We provide you with convenient information management options so that you can make appropriate choices and manage your personal information.
3. Protection of communication secrets: We strictly comply with laws and regulations to protect your communication secrets and provide you with secure communication services.
4. Reasonable Necessity: We may or may only collect necessary information in order to provide you and other users with better services.
5. Clarity and Transparency: We strive to present our privacy policy to you in terms that are easy to understand so that you have a clear understanding of how we process our information.
6. Integrating privacy protection into product design: We integrate the concept of privacy protection into all aspects of product or service development, including law, product, design and other factors.
This Privacy Policy mainly explains to you:
What information we collect;
The purpose for which we collect information;
Your rights.

We hope that you can read the Privacy Policy (hereinafter referred to as “this Policy”) carefully to learn more about how we collect and use information so that you can better understand our services and make appropriate choices.
If you have any questions, please contact us.

I. The information we collect

We collect only what is necessary to realize the function of the product according to the principle of legality, legality and necessity.

1.1 The information we obtain when you use the Service

1.2.1 Log information.When you use our services, we may automatically store the relevant information and store it as service log information.

(1) Equipment information.For example, the version number of the software, the type of browser.We collect information about the mobile applications and other software you use to secure your operating environment or to provide services.

(2) Service log information.For example, the information you search for and view when using our services, service failure information, referral sites, and so on.

1.2.2 Location information.When you use location-related services, we may record the location information of your device in order to provide relevant services to you.

(1) The information provided by you or other users when using the Service may contain the information of your geographical location, such as the information of your local area contained in the account information provided by you and the geo-tagged information contained in the photos Shared by you or others;

1.3 Information Shared by other users may contain information about you. For example, photos or videos Shared by other users may contain information about you.

How do we use the information collected
We strictly comply with the provisions of laws and regulations and agreements with users to use the information collected for the following purposes. If we use your information for any purpose other than the following, we will explain to you again and obtain your consent.
2.1 Services provided to you.
2.2 Meet your personalized needs. For example, language Settings, location Settings, personalized help services.
2.3 Product development and service optimization. For example, when our system fails, we will record and analyze the information generated during the system failure to optimize our services.
2.4 Security protection. For example, we will use your information for authentication, security prevention, anti-fraud monitoring, archive backup, customer security services, and more. For example, the security software you download or install will detect malicious programs or viruses, or identify fraudulent information for you.
2.5 Recommend advertisements and information that you may be interested in.
2.6 Evaluate and improve the effectiveness of our advertising and other promotional and promotional activities.
2.7 Management software. For example, software certification, software upgrades, etc.
2.8 You are invited to participate in a survey about our services.
In order to provide you with a better experience, improve our services or otherwise use our services as you agree, we may use the information collected through certain services for our other services, subject to compliance with relevant laws and regulations. For example, use your information when you use one of our services to show you personalized content or advertisements in another service, for user research analysis and statistics, etc.

In order to provide you with a better experience, improve our services or otherwise use our services as you agree, we may use the information collected through certain services for our other services, subject to compliance with relevant laws and regulations. For example, use your information when you use one of our services to show you personalized content or advertisements in another service, for user research analysis and statistics, etc.
To secure our services and help us better understand how our application is performing, we may record information such as how often you use the application, fault information, overall usage, performance data, and where the application came from. We do not combine the information we store in our analytics software with the personally identifiable information you provide in your application.

3. Information you share
You may or may share your information with your friends, family and other users through our services. For example, the words and photos you share publicly in your WeChat moments. Please note that this may contain sensitive information such as your personally identifiable information, personal property information, etc. Please carefully consider disclosing your relevant personal sensitive information.
You can control the extent of the information you share through the privacy Settings in our Services, or delete the information you publicly share through the Settings in the Services or the guidelines provided by us. Please note, however, that such information may still be stored independently by other users or by unaffiliated third parties that are not under our control.

How do you manage your own information
1 You may access, modify and delete the registration information and other personal information provided by you in the course of using our Services, or contact us in accordance with the notice guidelines. The scope and manner in which you access, modify, and delete personal information will depend on the specific service you use. For example, if you want to stop sharing your geo-location information while using location-related services, you can stop sharing by using the location-location shutdown function of your mobile phone, or by turning off the software and hardware service providers and communication service providers. It is suggested that you read the relevant guidelines carefully.
2 We will collect and use your information only for the purpose of realizing the functions of our Products or services as set forth in this Policy. If you find that we collect or use your personal information in violation of laws, administrative regulations or agreements between the parties, you may request us to delete your personal information. If you find any errors in your personal information collected and stored by us, you may also request us to correct them. Please contact us through the contact information set out in this policy.
3 When you access, modify or delete relevant information, we may require you to authenticate to protect the security of your account.
4 Please understand that due to technical limitations, legal or regulatory requirements, we may not be able to meet all of your requirements and we will respond to your request within a reasonable period of time.

The information we share
We strictly limit the sharing of information in accordance with laws and regulations, such as:
1 With your prior consent, we may share your personal information with third parties;
2 with the sustainable development of our business, when a merger or acquisition, transfer of assets in the transaction share your personal information to third parties, we will inform you related through push notification, announcement and other forms, in accordance with the laws and regulations and not less than the standard required by this policy to continue or ask for new managers continue to protect your personal information.
3 We will use the information collected for big data analysis. For example, we use the information collected to analyze and form city heat maps or industry insight reports that do not contain any personal information. We may make publicly available and share with our partners statistically processed, non-identifying information to understand how users are using our services or to inform the public about overall usage trends of our services.
4 We may disclose your personal Information for the following purposes:
5.1 Comply with applicable laws and regulations and other relevant provisions;
5.2 Comply with the provisions of court judgments, rulings or other legal procedures;
5.3 Comply with the requirements of relevant government agencies or other legally authorized organizations;
5.4 We have reason to believe that we need to abide by laws, regulations and other relevant provisions;
5.5 For the purpose of implementing the relevant service Agreement or this Policy, safeguarding the public interest, protecting the personal and property safety of our customers, us or our affiliates, other users or employees, or other legitimate rights and interests, reasonable and necessary

We may send you information
1 Information Push When you use our services, we may send you E-mail, SMS, information or push notification. You can choose to unsubscribe on your device following our relevant tips.
2 Announcements relating to The Services We may issue announcements relating to the Services to you when necessary (for example, when a service is suspended due to system maintenance). You may not be able to cancel these announcements relating to the service that are not of an advertising nature.

Where and for what period information is stored
1 Location of Information Storage We shall store the personal information of users collected within China in accordance with laws and regulations.
8.2 Duration of Information Storage Generally, we retain your personal information only for the minimum time necessary for our purposes. However, we may change the storage time of personal information to comply with legal requirements in the following circumstances:
2.1 To comply with applicable laws and regulations and other relevant provisions;
2.2 To comply with court judgments, rulings or other legal procedures;
2.3 To comply with the requirements of relevant government agencies or statutory authorized organizations;
2.4 We have reason to believe that we need to abide by laws, regulations and other relevant provisions;
2.5 For purposes reasonably necessary for the execution of the relevant Service Agreement or this Policy, the maintenance of the public interest, the protection of the personal and property safety or other lawful rights and interests of our customers, us or our affiliates, other users or employees.
In the event that our products or services cease to operate, we will notify you in the form of push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time.

Information security
We provide appropriate security for your information to prevent information loss, improper use, unauthorized access or disclosure.
1 We shall strictly abide by laws and regulations to protect the communication secrets of users.
2 We establish special management system, process and organization to ensure information security. For example, we strictly limit the number of people who can access information, require them to observe confidentiality obligations, and conduct reviews.
3 In case of personal information leakage and other security incidents, we will start the emergency plan to prevent the expansion of security incidents, and inform you in the form of push notifications, announcements, etc.

Protection of Minors
We attach great importance to the protection of minors’ personal information. According to relevant laws and regulations, if you are a minor under the age of 18, you should obtain the consent of your parents or legal guardian before using Tencent’s services. If you are the guardian of a minor, if you have any questions about the personal information of a minor under your guardianship, please contact us through the contact information in Part xiII.

Scope of application
This policy applies to all of our services. However, certain services have specific privacy guidelines/statements that more specifically describe how we handle your information within the service. If there is any inconsistency between this Policy and the Privacy Guidelines/Statements of a particular Service, please refer to the specific Privacy Guidelines/Statements.

Change
We may revise this policy in due course. If such changes result in a material deroement of your rights under this Policy, we will notify you by way of a prominent prompt on the page, an email to you, etc., prior to the change taking effect. In such case, if you continue to use our services, you agree to be bound by the revised policy.