Fanbook Privacy Policy
Update Time: August 27, 2024
Release Date: August 27, 2024
Effective Date: August 27, 2024
Welcome to choose the online services provided by Shenzhen FunPlay Technology Co., Ltd. (hereinafter referred to as "the Company" or "we"). We hereby formulate this "Fanbook Personal Information Protection Policy" (hereinafter referred to as "this Policy") to enable you to understand how we collect, store, use, share, transfer, publicly disclose, and delete your personal information, as well as the relevant rights you enjoy. We attach great importance to the protection of your personal information and fully respect your user rights. Please read this Policy carefully and make the choices you deem appropriate in accordance with the guidance of this Policy. Before using our products and services, please be sure to read this Policy carefully, especially the clauses marked in bold, which you should focus on. You should start using our products and services only after fully understanding and agreeing to this Policy. If you do not agree to any content of this Policy, you should immediately stop using our products and services.
This Policy is an integral part of the "Fanbook Software License and User Agreement". Matters not covered in this Policy shall be governed by the provisions of the "Fanbook Software License and User Agreement".
Table of Contents
- How we collect and use your personal information
- How We Use Cookies and Similar Technologies
- How We Store Personal Information
- How We Protect Your Personal Information
- How we share, transfer, and publicly disclose your personal information
- Your Rights
- Reminder regarding Juveniles' Use of the Service
- Scope of Application and Changes to This Policy
- Contact Information
Abstract
This summary mainly explains to you how we collect and process your personal information, as well as the rights you have regarding your personal information. If you would like to learn more about the details of your personal information processing and all the rules for our processing of your personal information, please read the full version of the Fanbook Personal Information Protection Policy.
1. How We Collect and Use Your Personal Information
According to the "Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Application Programs", this product belongs to the category of online community APPs, with its basic business functions including topic discussions, information sharing, and follow-up interactions on blogs, forums, communities, etc. To use the basic functional services, users need to provide their mobile phone numbers.
1.1 Situations where you must authorize us to collect and use your personal information
To provide you with the core functions of our company's products and services, we will collect and use the following personal information. If you refuse to provide the relevant information, you will not be able to enjoy the basic business functions of our company's products or services, which include:
1.1.1 Registration and Login
- When you use the account registration or login function, you may voluntarily provide us with your basic personal information, including your mobile phone number and SMS verification code, during registration or login. The above information is necessary personal information. If you refuse to provide it, you may not be able to complete registration or login and thus use this product or service.
- When you download or purchase our company's products or services through the Apple App Store or major Android app stores, the information we obtain from such app stores about you may include your mobile phone number and account information. The above information is necessary personal information, and if you refuse to provide it, you may not be able to download or purchase this product or service through such third parties.
- When you authorize to log in and use our services with a third-party account, including Weibo, WeChat, QQ, or user accounts of various mobile phone brands, we will obtain the relevant information under the third-party account that you have authorized to share, including the avatar, nickname, and identity verification information, specifically subject to the content you have authorized, and will bind your third-party account to our service account so that you can directly log in and use our services through the third-party account. If you refuse to authorize such information, you will not be able to log in and use this product or service through a third-party account, but it will not affect your ability to log in and use this product or service through other means.
- To complete your account profile, you may voluntarily provide us with additional basic personal information during registration, including nickname, avatar, and gender.
- To determine whether you have installed WeChat to assist you in logging in to and using this software via WeChat and using the WeChat sharing function, we will obtain the list of installed programs on your device.
- When you log in to use this software, we will read the content of your clipboard to determine if there is relevant invitation code information, to help you enter the corresponding community. Only when the clipboard contains the aforementioned invitation code information will we collect the invitation code to provide you with the software service. We will not store other information from your clipboard, and the clipboard information alone cannot identify your specific identity.
- To implement the one-click login feature, we need to obtain the phone permission of the Android system to read the device's phone number and acquire your mobile phone number. If you refuse to provide this permission, it will only prevent you from logging in with one click using your mobile phone number, but it will not affect your ability to log in and use this product or service through other means.
1.1.2 Ensure the normal operation of software and operational security
- To safeguard the security of your account, prevent the loss of user account data after account changes, ensure the normal operation of the software, and conduct statistics and analysis on your use of our services, we will collect information related to mobile devices, including: basic device information (device brand, model, operating system version, language, system configuration, memory, mobile carrier, device platform), device identification information (for Android devices: Android ID, OAID; for iOS devices: IDFA, IDFV, GAID; for HarmonyOS devices: OAID; general identifiers: UUID, MAC address), network and system information (SSID, WiFi name WIFI_NAME, system application processes, running processes, installed application list APP_LIST), system permissions (for HarmonyOS: Internet network permission, permission to allow applications to obtain data network information, permission to allow applications to control vibration, permission to allow applications to access notifications), and clipboard information.
- To enable you to view your historical records on the Client, and for our operational statistical analysis, customer complaint handling, and service experience analysis, we will collect your log information, including login logs, records of creating or joining communities, information and click records of searches and browsing during your use of this software, URLs of social media pages you visited, and other information and content details you browsed or requested during your use of this software. Among them, browsing and click records are personal sensitive information, and collecting the above information is necessary to retain your historical records. If you refuse to provide it, you will not be able to view your historical records on the Client.
1.2 Situations where you can choose whether to authorize us to collect and use your personal information
If you use other business functions of our company's products and services, we will collect and use the following personal information to provide you with extended business functions of our company's products or services:
1.2.1 Identity Authentication
To meet the requirements of relevant laws, regulations, policies, and relevant competent authorities, you need to undergo real-name authentication when using certain functions, and we will prompt you when you choose to use these functions. If you choose to use these functions, we will collect your basic personal information and personal identity information, including your name, ID number. Moreover, when you create a community, we also need to call your camera permission to use the device camera to obtain your facial recognition features, and verify them against your personal identity information to improve the accuracy of real-name authentication and prevent identity theft to the greatest extent. Among them, personal identity information and facial recognition features are personal sensitive information. If you refuse to provide such information, it may result in your inability to use these functions or corresponding restrictions during the use of this software. For the purpose of real-name authentication, you agree that we may provide, query, and verify your aforementioned personal information to relevant institutions either by ourselves or by entrusting a third party.
1.2.2 Information Browsing, Publishing, and Interaction
- When you use the information browsing, creation, publishing, sharing, and interactive communication functions of this software, including browsing/publishing/replying to topics, sharing, favoriting, and rewarding, we need to collect the text, image, and video information you post, and use your nickname, avatar, and posted content for display, in order to provide you with social functions and save corresponding historical records, or collect the list of installed applications to help you share the content of this product to other applications. Please note that the information you upload or post in public areas may be collected and used by others, and such information may include personal sensitive information. To protect your personal and property safety, please provide such information with caution. If you do not agree to our collection of the above information, you will not be able to use the social functions of this software, but it will not affect your use of the basic business functions of this software.
- When you use this business function, in order to upload, download, send pictures, videos, and files, we need to obtain the storage permission of the Android system to read and write to the external storage, obtain relevant pictures, videos, and files, or need to obtain the photo permission of the iOS system to read and write to the user's photo library, obtain photos and videos, or need the permission of the HarmonyOS system to allow the application to read and write media file information in the user's external storage, and the permission to allow modification of pictures or video files in the user's public directory, to save, back up, or synchronize picture and video files. These information may include personal sensitive information. To protect your personal and property safety, please provide them with caution. If you refuse to provide them, it will only prevent you from using the corresponding functions, but will not affect your use of the basic functions of this software.
- When you use the functions of taking photos, videos, or scanning QR codes, we need to obtain camera permission to use the device's camera to access the photo and video information you capture. This information may include personal sensitive information. To safeguard your personal and property safety, please provide it with caution. If you refuse to provide it, it will only prevent you from using the corresponding functions, but will not affect your use of the basic business functions of this software.
- When you use the voice function, we need to obtain microphone permission to use the microphone to capture your voice data. This information may include personal sensitive information. To safeguard your personal and property safety, please provide it with caution. If you refuse to provide it, you will only be unable to use the corresponding function, but it will not affect your use of the basic business functions of this software.
- When you browse information in this software, in order to automatically rotate the device screen according to your device orientation so that you can view the content of this software in portrait or landscape mode, we need to obtain information from the device's gravity sensor and acceleration sensor.
- When you browse information in this software, in order to allow this software to overlay and display on other programs, we need to obtain the floating window permission of the Android system to implement the functions of small window, floating, and desktop display. If you refuse to provide this permission, it will only prevent you from using the corresponding functions, but will not affect your use of the basic business functions of this software.
1.2.3 Consumption and Payment
- When you use the payment or withdrawal function, we will collect your payment information, recharge records, and consumption records to complete the payment or withdrawal function and save your transaction records, while maximizing the protection of your property safety and providing the aforementioned information to customer service staff as a basis for dispute resolution in case of transaction disputes. Please note that recharge records and consumption records are personal sensitive information, and collecting the above information is necessary to implement the consumption function in this software. If you do not provide it, you will not be able to complete the transaction, but it will not affect your use of the basic business functions of this software.
- When you use the red envelope function, you need to bind your Alipay account and complete the payment. We will collect your Alipay account information, including nickname, avatar, UserID, region, gender, ID card information, and your transaction counterpart can view your Alipay nickname and avatar, personal identity information is personal sensitive information, please provide it with caution, if you refuse to provide it, it may result in your inability to use this part of the function, but it will not affect your use of the basic business functions of this software.
- When you use the withdrawal function, you need to provide your bank card information, name, ID card number, and mobile phone number registered with the bank so that we can verify the aforementioned information with the issuing bank and assist you in completing the withdrawal of your account balance. Bank account information and personal identity information are personal sensitive information. Collecting the above information is necessary to implement the withdrawal function. If you do not provide it, you will not be able to use the withdrawal function, but it will not affect your use of the basic business functions of this software.
1.2.4 Questionnaire Survey
If you are willing to participate in the questionnaire survey organized by our company, you may need to provide additional basic personal information and personal education and work information, including your gender, occupation, industry, personal interests, software usage behavior and habits. This information will help us understand the operation of our software and improve our software service design based on feedback. We will obtain your authorization before inviting you to participate in relevant activities. If you choose not to provide this information, you may not be able to participate in the activity, but it will not affect your use of the basic business functions of our software.
1.2.5 Customer Service
When you interact with our customer service or use the user response function, including submitting feedback online, communicating with online/human customer service, for the security of your account and system, we may need you to provide account information first and match it with the personal information you provided previously to verify your user identity. When you use the customer service or user response function, we may also need to collect your contact information (phone number, email address) and your communication records and content, software usage materials you provided to us to resolve customer service needs, among which communication records and content are personal sensitive information. We collect this information to investigate facts and help you solve problems. If you refuse to provide it, it may result in your inability to use the user response mechanism of this software, but it will not affect your use of the basic business functions of this software.
1.2.6 Push and Announcement
- We may send you advertising and marketing information (without targeted ops push functionality) via your contact information (including email address and mobile phone number) to provide or promote our company's or third-party products and services. You can find relevant instructions in the received information, and you can choose to unsubscribe or cancel your subscription according to the instructions.
- We may send you service-related announcements when our services change. You may not be able to cancel or restrict these service-related announcements that are not promotional in nature.
- To ensure that this software can receive broadcast messages pushed by the Client normally when it is closed or running in the background, this software must use self-starting capabilities, which will involve a certain frequency of waking up the software through system broadcasts for self-starting or associated starting, which is necessary for the implementation of functions and services. When you open content-related push messages of this software, after obtaining your explicit consent, it will jump to open the relevant content. Without your consent, there will be no associated starting. When you open files downloaded within this software, it will trigger the associated starting of third-party apps.
1.3 Exceptions to obtaining authorization and consent
According to relevant laws, regulations, and national standards, we may collect and use your personal information without seeking your authorization and consent in the following circumstances:
- Necessary for concluding or performing the contract between you and us;
- is necessary for the Company to fulfill its legal duties or obligations;
- Necessary for responding to public health emergencies or protecting the life, health, and property safety of natural persons in emergency situations;
- Processing personal information within a reasonable scope for activities such as news reporting and public opinion supervision carried out for the public interest;
- Directly related to national security and national defense security;
- Directly related to public safety, public health, public cyber security, cyber environment governance, and major public interests;
- Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
- When it is necessary to protect your or other individuals' major legitimate rights and interests such as life and property, but it is difficult to obtain your consent;
- The personal information involved is publicly disclosed by you to the general public on your own initiative;
- Collecting personal information from legally publicly disclosed information;
- Other circumstances stipulated by laws and regulations.
2. How We Use Cookies and Similar Technologies
To analyze and understand the operation of this software, we use several automated data collection tools, currently including cookies and web beacons. These technologies help us remember your identity, recognize your software usage, and prevent fraud. We promise not to use the above technologies for any purpose other than those described in this policy. If your device or relevant programs allow, you can turn off or delete the above technologies by changing settings, but this may affect your user experience, and some functions may not work properly.
3. How We Store Personal Information
We will, in accordance with the requirements of relevant laws and regulations, adhere to the principle of minimizing the retention period of personal information, and reasonably retain your personal information.
3.1 Storage Method and Duration
We will store your information through AES and RSA encryption methods, including local storage (such as using the APP for data caching), databases, and server logs, etc.
During your use of this product or service, we will continuously retain your personal information. If you cancel your account or this product ceases operation, we will retain your personal information for 3 years from the date of cancellation or cessation of operation. If laws and regulations stipulate a longer retention period for relevant personal information, we will retain your personal information within the shortest period stipulated by laws and regulations. After the expiration of the above period, we will delete or anonymize your personal information.
3.2 Storage Region
Personal information collected and generated within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.
3.3 How Your Personal Information Is Transferred Globally
Currently, we do not engage in the cross-border transfer of your personal information.
4. How We Protect Your Personal Information
We attach great importance to the protection of your personal information and have adopted AES and RSA encryption technologies to ensure the security of your personal information.
4.1 Security Measures
We have used security measures that meet industry standards to protect the personal information you provided, preventing the data from unauthorized access, public disclosure, use, modification, damage, or loss. We have used the following various security technologies and procedures to protect your personal information:
- We have enabled the SSL protocol to provide encryption protection when exchanging data (such as credit card information) between your application software and the server;
- We have adopted encryption technologies such as Transport Layer Security (TLS) protocol and provided browsing services through means such as HTTPS to ensure the security of your data during transmission;
- We ensure that third parties can only access the API interfaces we share via HTTPS. We only provide account verification functionality, so third parties are unable to retrieve your personal information. Meanwhile, we have adopted comprehensive anti-SQL injection measures to prevent the Database System from being attacked by external sources;
- We use encryption technology to encrypt and store your personal information. Your password is encrypted using technologies such as secondary MD5 and is encrypted information;
- In certain services, we may also remind you to change your password via phone, SMS, etc.
4.2 Information Security Certification
We have obtained the following certifications in the field of information security:
Information Security Technology - Network Security Level Protection - Level 3
4.3 Access Control
We only allow employees, partners of the company and its affiliated parties who have a legitimate need to know this information to access your personal information, and have established strict access control and monitoring mechanisms for this purpose. We also require all personnel who may come into contact with your personal information to fulfill their corresponding confidentiality obligations.
4.4 User Reminder
The Internet is not an absolutely secure environment, and communication methods with other users such as email, instant messaging, and social software cannot guarantee complete encryption. We recommend that when using such tools, you use complex passwords or change your account password regularly, and pay attention to protecting the security of your personal information.
4.5 Liability for Security Incidents
We will make every effort to ensure the security of the information you send to us. If our physical, technical, or administrative safeguards are maliciously breached, resulting in unauthorized access, public disclosure, alteration, or destruction of information, and causing damage to your legitimate rights and interests, we will assume the corresponding legal liability.
4.6 Notification of Security Incidents
In the unfortunate event of a personal information security incident, we will promptly notify you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or will take to address it, suggestions for you to independently prevent and reduce risks, remedial measures for you, etc. We will promptly inform you of the relevant situation of the incident by means of email, letter, phone call, push notification, etc. When it is difficult to notify each personal information subject individually, we will take reasonable and effective measures to issue an announcement. At the same time, we will also, as required by the regulatory authorities, proactively report the handling of the personal information security incident.
5. How we share, transfer, and publicly disclose your personal information
5.1 Sharing
To implement business functions, we may share your personal information with third parties to provide the services or specific functions you need. If we need to share your personal sensitive information, we will seek your authorization and consent again. We will only share your personal information for legitimate, proper, necessary, specific, and explicit purposes, and only share the necessary personal information. We will strictly restrict the third parties' use of your personal information by signing agreements to ensure that they process personal information in accordance with our requirements, this Policy, and any other relevant confidentiality and security measures. At the same time, we will also take effective technical protection measures to ensure the security of your personal information during the sharing process. We will try our best to anonymize the personal information in the shared content. You understand and agree that the information after anonymization cannot be identified or associated with you and no longer falls within the scope of personal information in the legal sense, so its processing, use, sharing, and transfer do not require your authorization and consent.
Currently, we need to share your personal information in the following situations:
- To facilitate our provision of consistent services to you based on the company's unified account system, to enable you to conduct unified management, and to ensure the security of the system and accounts, your personal information may be shared as necessary within the company's products.
- To ensure the implementation, secure and stable operation of our product-related functions, some services will be provided by third parties. We need to share your personal information with third parties when you use the corresponding functions, including through software development kits (SDKs) or other similar applications. When you use such services provided by third parties in our products, you agree that they will directly collect and process your personal information. We will strive to review the business access qualifications of such third parties and require their legal compliance and security. To maximize the protection of your information security, we strongly recommend that you review the privacy policies of third-party service providers before using their services. To safeguard your legitimate rights and interests, if you find any risks in the services provided by third-party service providers, we recommend that you immediately terminate the relevant operations and contact us in a timely manner. Currently, please refer to the Third-Party Information Sharing List for information on the sharing of personal information between our products and third parties. The in-product access path is Me - About Us - Third-Party Information Sharing List.
Third-Party Information Sharing List
| Third-party services or SDKs | Usage Scenarios and Objectives | Information Type | Collection/Sharing Method | Company Name | Official Website Link |
|---|---|---|---|---|---|
| Jpush SDK for Jiguang Push | Push and Announcement: By identifying device information, the App is empowered with push capabilities for message pushing; geographical location and network information are used to create intelligent tags to implement regional and segmented push functions | Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), location information, network information (including IP Address, WiFi information, base station information) | SDK Native Collection | Shenzhen Hexun Huagu Information Technology Co., Ltd. | https://www.jiguang.cn/license/privacy |
| Aurora One-Click Login | Registration and Login: Aurora Authentication integrates the number authentication capabilities of the three major telecom operators, providing a function to quickly verify the consistency between the mobile phone number entered by the user and the number of the local SIM card, thereby enhancing user experience and security | Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), network information (including IP Address, WiFi information, base station information), location information, mobile phone number | SDK Native Collection | Shenzhen Hexun Huagu Information Technology Co., Ltd. | https://www.jiguang.cn/license/privacy |
| China Mobile Authentication SDK | Registration and Login: Used for one-click login | Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), network information (including IP Address, WiFi information, base station information), location information, mobile phone number | SDK Native Collection | China Mobile Internet Co., Ltd. | https://wap.cmpassport.com/resources/html/contract.html |
| China Unicom Authentication SDK | Registration and Login: Used for one-click login | Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), network information (including IP Address, WiFi information, base station information), location information, mobile phone number | SDK Native Collection | China United Network Communications Joint Stock Company | https://opencloud.wostore.cn/authz/resource/html/disclaimer.html?fromsdk=true |
| China Telecom Authentication SDK | Registration and Login: Used for one-click login | Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), network information (including IP Address, WiFi information, base station information), location information, mobile phone number | SDK Native Collection | China Telecom Joint Stock Company | https://e.189.cn/sdk/agreement/detail.do |
| OPPO Push SDK | Push and Announcement: Used to push messages on OPPO devices | Device Information: IMEI Number, Serial Number, IMSI, User ID, Android ID, Google Advertising ID, Phone Region Settings, Device Model, Phone Battery Level, Phone Operating System Version and Language), App Information: APP Package Name and Version Number, Running Status, Network Information: IP Address or Domain Name Connection Result, Current Network Type, Message Sending Result, Notification Bar Status, Lock Screen Status | SDK Native Collection | OPPO Guangdong Mobile Communications Co., Ltd. | https://open.oppomobile.com/wiki/doc#id=10445 |
| Huawei Push SDK | Push and Announcement: Used to push messages on Huawei devices | Device Information: IMEI, IDFA, Android ID, IMSI, MAC, OAID | SDK Native Collection | Huawei Technologies Co., Ltd. | https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/privacy-statement-0000001050 |
| Meizu Push SDK | Push and Announcement: Used to push messages on Meizu devices | Device information (including device name, model, operating system version, region and language settings, IMEI, IP Address, MAC address), location information, application usage information (including version number, download/install/update/delete status, application settings), and log information | SDK Native Collection | Zhuhai Meiwang Technology Co., Ltd. | https://open.flyme.cn/open-web/views/push.html |
| VIVO Push SDK | Push and Announcement: Used to push messages on VIVO devices | Device Information, Network Status Information | SDK Native Collection | Guangdong Tianchen Network Technology Co., Ltd. | https://dev.vivo.com.cn/documentCenter/doc/366 |
| Xiaomi Push SDK | Push and Announcement: Used to push messages on Xiaomi devices | Device information (including IMEI, OAID, IMEI MD5/MEID MD5, Android ID, VAID, AAID, MID, device model, storage, and settings information), application usage information (including version number, installation and update time, and application settings) | SDK Native Collection | Beijing Xiaomi Mobile Software Co., Ltd. | https://dev.mi.com/console/doc/detail?pId=1822 |
| Openinstall | Ensure the normal operation of software and operational security: Provide channel statistics, data statistics, and analysis services for games | Device Information (including device brand, model, version, Mac Address, IP Address, GET_TASK retrieval application, Android ID, running process information, clipboard information, sensor information, device serial number) | SDK Native Collection | Shenzhen Fenmiao Network Technology Co., Ltd. | https://www.openinstall.io/privacy.html |
| TBS Tencent Browser Service | Information browsing, publishing, and interaction: preview files in formats such as pdf, xls, doc, etc. | Device Information (GET_TASK Retrieval Application) | SDK Native Collection | Shenzhen Tencent Computer Systems Co., Ltd. | https://x5.tencent.com/tbs/index.html |
| alipaySDK | Consumption and Payment: Bind Alipay account, send and receive red envelopes function | Device Information (used for risk control and network optimization) - (IMEI, IMSI, Android ID, MAC Address, hardware serial number, ICCID, SSID BSSID, sensor information, network type, carrier information, WIFI status/parameters/list, system settings, system properties, device brand, device model, operating system, IP Address). Identity Authentication Information - (Camera: device permissions, facial information) | SDK Native Collection | Alipay (China) Network Technology Co., Ltd. | https://opendocs.alipay.com/open/54/01g6qm |
| Tencent Cloud Face Identity Verification | Identity Verification: Used for real-name authentication when applying to create a community | User's real name, ID card number | Backend Interface Transmission | Tencent Technology (Shenzhen) Co., Ltd. | https://cloud.tencent.com/document/product/1007/31322 |
| WeChatSDK | Registration and Login: WeChat Login; Information Browsing, Publishing, and Interaction: WeChat Sharing | WeChat sharing content, app installation list, IMEI, Mac address | SDK Native Collection | Tencent Technology (Shenzhen) Co., Ltd. | https://open.weixin.qq.com/cgi-bin/frame?t=news/protocol_developer_tmpl |
| flutter | Ensure the normal operation of software and operational security: Software Development | Clipboard information, sensor information, Android ID | SDK Native Collection | Google Inc. | https://policies.google.com/privacy |
| MyBatis-Plus | Ensure the normal operation of software and operational security: Software Development | Android ID | SDK Native Collection | baomidou | https://github.com/baomidou/mybatis-plus |
| Oaid | Provide a supplementary device identification system for mobile intelligent terminals | oaid, Application List | SDK Native Collection | China Academy of Information and Communications Technology | http://www.msa-alliance.cn/ |
| Volcengine | Ensure the normal operation of software and operational security: Data Analysis, Abnormal Data Collection, Log Collection, Data Statistics | Access phone state, read/write storage, access network, obtain network information status, obtain WIFI network information status, read system low-level logs; SDK version, application version, application package name, IP Address (used for geolocation), MAC address, device information (including IMEI, OAID, IMEI, MD5/MEIDMD5, Android ID, VAID, AAID, MID, device model, brand, version, storage, setting information) | SDK Native Collection | Beijing Volcengine Technology Co., Ltd. | https://www.volcengine.com/docs/6256/64902 |
| Meishe SDK | Information Browsing, Publishing, and Interaction: Provide users with the ability to edit and process videos and images, and users can post this content in the circle | Camera, Microphone, Album, Storage, Network Permissions | SDK Native Collection | Beijing Meishe Network Technology Co., Ltd. | https://www.meishesdk.com/privacy.html |
| Geetest SDK | Ensure the normal operation of software and operational security: Provide end-user risk identification services | Mobile Phone Number, IP Address | API Interface | Wuhan Jiyi Network Technology Co., Ltd. | https://www.geetest.com/Private |
| RCE SDK | Ensure the normal operation of software and operational security: Verify whether the device has risks | App Installation List, IMEI, IMSI, Android ID | SDK Native Collection | Tencent Technology (Shenzhen) Co., Ltd. | https://privacy.qq.com/document/preview/5331f064a91a47eb93993fdacb91c8f7 |
| Weibo SDK | Information Browsing, Publishing, and Interaction: Weibo Sharing | App Installation List, IMEI, Mac Address | SDK Native Collection | Beijing Weimeng Chuangke Network Technology Co., Ltd. | https://weibo.com/signup/v5/privacy |
5.2 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
- In case of special circumstances, after obtaining your explicit authorization and consent, we will transfer your personal information to other parties;
- When it comes to mergers, acquisitions, or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your information to continue to be bound by this policy; otherwise, we will require the company or organization to seek your authorization and consent again.
5.3 Public Disclosure
We will only publicly disclose your personal information in the following circumstances:
- After obtaining your explicit authorization and consent;
- Based on disclosures in prize-winning activities: For example, when announcing the list of winners, we will desensitize and display the winners' mobile phone numbers or usernames;
- Legal-based disclosure: We may publicly disclose your personal information when required by law, legal proceedings, litigation, or mandatory requirements of government authorities;
5.4 Social Network
Our social networking service is specifically designed to enable you to communicate with users worldwide, allowing you to transmit communication information in real-time and extensively. When you use the social networking features in our service, you may share some personal information. We provide you with the ability to independently control the user scope of personal information sharing in certain services, and you can also request us to delete your relevant personal information.
- Personal information you may share through social features: including information you upload, post, or authorize to be made public in the community, information you share and disseminate through LIVE or recorded broadcasts, your responses to information uploaded or posted by others, as well as location data and log information related to such information;
- Other users may share information related to you through social features;
- Regarding the deletion of shared information: As long as you do not delete the shared information, the relevant information will remain in the public domain; even if you delete the shared information, the relevant information may still be independently cached, copied, or stored by other users or non-affiliated third parties not under the control of this company, or retained in the public domain by other users or such third parties;
- Protection of Information You Share Through Social Features: In some cases, you can control the scope of users who have access to view your shared information through our privacy settings; you can also request the deletion of your relevant information from our services. Please contact us through the contact information described in Chapter 9 of this Policy.
5.5 Exceptions to prior authorization and consent when sharing, transferring, or publicly disclosing personal information
According to relevant laws and regulations, in the following circumstances, we do not need to obtain your prior authorization and consent when sharing, transferring, or publicly disclosing personal information:
- Directly related to national security or national defense security;
- Directly related to public safety, public health, or major public interests;
- Directly related to criminal investigation, prosecution, trial, and execution of judgment, etc.;
- When it is necessary to protect your or other individuals' major legitimate rights and interests such as life and property, but it is difficult to obtain your authorization and consent;
- Personal information that you publicly disclose to the general public on your own initiative;
- Related to the company's fulfillment of obligations stipulated by laws and regulations;
- When collecting personal information from legally publicly disclosed information, such as through channels like legal news reports and government information disclosure.
6. Your Rights
During your use of this software, we may provide you with corresponding operational settings based on the specific circumstances of the software service, so that you can access, query, correct, or delete your relevant personal information, cancel your user account, revoke the authorized consent, and obtain a copy of your personal information. In accordance with relevant laws and regulations, we ensure that you can exercise the following rights regarding your personal information. Additionally, we have established complaint and reporting channels, and you can contact us through the contact information described in Chapter 9, and your feedback will be promptly addressed.
6.1 You have the right to access your personal information
You can log in to your personal account through this software and access the network identity information in your account at any time. The specific path is: Me - View User Account, Nickname, or Avatar. You can also view a summary of the personal information we collect from you in the Personal Information Collection List. The in-product access path is: Me - About Us - Personal Information Collection List.
If you are unable to access your personal information through the aforementioned methods, or if you need to obtain personal information content that cannot be known through the aforementioned methods, you may contact us through the contact information provided in Article 9 of this Policy, and we will respond to you within 15 working days.
6.2 You have the right to correct your personal information
You can log in to your personal account through this software and correct the network identity information in your account at any time. The specific path is: Me - Change Nickname or Avatar.
If you are unable to correct your personal information through the aforementioned methods, you may contact us via the contact information provided in Article 9 of this Policy, and we will respond to you within 15 working days.
6.3 You have the right to delete your personal information
You may submit a request to us to delete personal information in the following situations:
- If our handling of personal information violates laws and regulations;
- If we collect and use your personal information without obtaining your consent;
- If our handling of personal information violates the agreement with you;
- If you no longer use our products or services, or if you have cancelled your account;
- If we no longer provide products or services to you.
You may contact us through the contact information provided in Article 9 of this Policy to request the deletion of your personal information. If we decide to respond to your deletion request, we will delete it within 15 working days. We will also notify the entities that have obtained your personal information from us to delete it promptly, unless otherwise required by laws and regulations or these entities have obtained your independent authorization. After you delete information from our services, we may not immediately delete the corresponding information from the backup system, but will delete it when the backup is updated.
6.4 You have the right to change the scope of your authorized consent
Each business function we provide to you requires some of your basic personal information to be completed. You can view the application and usage of personal information permissions for our products in the "Personal Information Permission List" or "Privacy Permission Settings". If you wish to withdraw your authorization consent, you can make changes on the device you are using, with the specific operation path being: Settings - Applications - Permission Management, or Settings - Privacy, or in our product, you can view the application and usage of personal information permissions through Privacy Permission Management and revoke the consent for permission usage, with the access path being Me - About Us - Privacy Permission Settings.
If you are unable to change the scope of your authorized consent through the aforementioned methods, you may also submit an application to us via the contact information provided in Article 9 of this Policy, and we will respond to your request within 15 working days. If you need to withdraw your consent to the collection of necessary personal information or withdraw your consent to the collection of all personal information, it will result in our inability to provide you with the basic business functions of this product or service. In this case, if you still wish to withdraw the relevant consent, you can achieve this by canceling your user account, and the cancellation path is: Me - Settings - Account and Security - Cancel Account.
6.5 You have the right to cancel your user account
You may cancel your previously registered account at any time. You can submit a cancellation application to us on the relevant function settings page of our products or services, and we will cancel your account within 15 working days. The specific cancellation path is: Me - Settings - Account & Security - Cancel Account.
If you are unable to cancel your account through the aforementioned methods, you may also submit an application to us via the contact information provided in Article 9 of this Policy. After canceling your account, we will cease providing you with products or services and, in accordance with your request, delete your personal information, except as otherwise provided by laws and regulations.
6.6 You have the right to apply for a copy of your personal information
If you need to obtain a copy of your personal information, you may submit an application to us through the contact information provided in Article 9 of this Policy, and we will respond to your application within 15 working days.
6.7 Transfer of Personal Information
If you need to transfer your personal information to a specified third party, you may submit an application to us through the contact information provided in Article 9 of this Policy, and we will respond to your application within 15 working days. Where technically feasible and in compliance with the conditions stipulated by the national cyber information department, we may transfer your personal information to the third party you specify as requested.
6.8 Constraints on Automatic Decision-Making by Information Systems
If the information system we use makes decisions based on automated decision-making mechanisms, and these decisions have a significant impact on your legitimate rights and interests, you have the right to provide feedback or lodge a complaint with us through the contact information provided in Article 9 of this Policy. We will conduct a manual review of the automated decision-making results or provide other appropriate remedies.
6.9 Respond to your request
You may submit requests related to personal information to us through the contact information provided in Article 9 of this Policy, and we will respond within 15 working days. To ensure security, you may be required to provide a written request or otherwise prove your identity. We may first ask you to verify your identity before processing your request.
For your reasonable requests, we will not charge fees in principle. However, for requests that are repeatedly made and exceed reasonable limits, we hope you will understand that we may charge certain costs depending on the circumstances. For requests that are made without cause, require excessive technical means, pose risks to the legitimate rights and interests of others, or are unrealistic, we apologize that we may decline them.
6.10 Special Circumstances
According to the requirements of laws and regulations, we regret that we will not be able to respond to your request in the following situations:
- Related to the Company's fulfillment of obligations stipulated by laws and regulations
- Directly related to national security or national defense security;
- Directly related to public safety, public health, or major public interests;
- Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
- There is sufficient evidence to show that you have subjective malice or abuse of rights;
- When it is necessary to safeguard your or other individuals' major legitimate rights and interests, such as life and property, but it is difficult to obtain your consent;
- Responding to your request will cause serious harm to the legitimate rights and interests of you or other individuals or organizations;
- Involving trade secrets.
7. Reminder regarding Juveniles' Use of the Service
The Company attaches great importance to the protection of personal information of juveniles. Juveniles under the age of 18 shall not use this software without the consent of their legal guardians. If you are the legal guardian of a juvenile under the age of 18, you shall supervise and control the juvenile's use of our services, and the juvenile's account creation shall be subject to your prior consent. If you are the legal guardian of a juvenile under the age of 14 (inclusive), please visit "Fanbook Children's Personal Information Protection Policy".
- In the case of collecting personal information of juveniles with the consent of their legal guardians, we will only use or publicly disclose such information when permitted by law, explicitly consented to by the legal guardians, or necessary for the protection of juveniles.
- If a Juvenile uses our services without the consent of their legal guardian, the legal guardian of the Juvenile has the right to contact us and request us to delete the Juvenile's personal information, and we will delete it immediately after verification.
- If we discover that the Company has collected personal information of Juveniles without obtaining prior verifiable consent from their legal guardians, we will endeavor to delete the relevant data as soon as possible.
8. Scope of Application and Changes to This Policy
8.1 Scope of Application
This policy applies to the Fanbook software services provided by our company.
This software may include links that help you access third parties, including: the Company provides you with links through advertising or other means to facilitate your direct access to third-party services or websites. We ask you to pay special attention, such third-party services are provided by relevant third parties. To protect your legitimate rights and interests, please carefully read the privacy policy guidelines of the relevant third parties before deciding whether to use the services provided by such third parties.
8.2 Changes to the Personal Information Protection Policy
We may revise this Policy in accordance with adjustments to the company's business or relevant policies. To safeguard your right to be informed as a user, we will publish any changes made to this Policy on this page, prompt you to read them via in-app pop-ups, and re-obtain your authorization and consent. For significant changes, we will also provide a clear notice at the top of this page. Significant changes referred to in this Policy include but are not limited to:
- When there are significant changes to our service model, such as the purpose of processing personal information, the types of personal information processed, the methods of using personal information, etc.;
- When we undergo significant changes in aspects such as ownership structure, organizational structure, etc., such as changes in ownership caused by business adjustments, bankruptcy, mergers and acquisitions, etc.;
- When there are changes to the main recipients of personal information sharing, transfer, or public disclosure;
- When there are significant changes to your rights regarding personal information processing and the ways of exercising them;
- When the department responsible for handling personal information security, contact information, and complaint channels change;
- When our personal information security impact assessment report indicates the existence of high risks.
9. Contact Information
If you have any questions, comments, or suggestions regarding this policy, or if you have any complaints or appeals regarding our personal information processing practices, you may contact us through the following means, and we will respond with our handling opinions or results within 15 working days.
- Company Name: Shenzhen FunPlay Technology Co., Ltd.
- Customer Service Hotline: 4008400188
- Email address: fbkf@fanbook.cn
- Registered Address: 16th Floor, Unit A3, Kexing Science Park, North Keyuan Road, Nanshan District, Shenzhen City
- Postal Code: 518057
To better protect your personal information, the company has appointed a personal information protection officer to handle your personal information protection work. The specific contact person is: Zhang Wei, contact phone number: 0755-86685111, contact email: fbmark.zhang@fanbook.cn
If a dispute or conflict arises between you and us regarding personal information processing activities and cannot be resolved through negotiation, you may file a lawsuit with the People's Court of Nanshan.
User Permission Collection List
| Serial Number | Collect Content | Business Function | Sensitive Information | Belonging Platform |
|---|---|---|---|---|
| 1 | Allow network usage | Network Communication | No | Android、HarmonyOS |
| 2 | Access Network State Permission | Network requests used in the business | No | Android、HarmonyOS |
| 3 | Permission to change network connection status | Network requests used in the business | No | Android、HarmonyOS |
| 4 | Allows the program to modify sound setting information | Voice Call | No | Android、HarmonyOS |
| 5 | Read and write memory card | Read and save application data on the mobile phone | No | Android、HarmonyOS |
| 6 | Connect to paired Bluetooth devices | Voice calls support Bluetooth headsets | No | Android、iOS、HarmonyOS |
| 7 | Wake Lock | Receive message push | No | Android、HarmonyOS |
| 8 | Record Sound | Send voice message | No | Android、HarmonyOS |
| 9 | Allows discovery and pairing of Bluetooth devices | Voice calls support Bluetooth headsets | No | Android、iOS、HarmonyOS |
| 10 | Camera Permission | Set Avatar | No | Android、iOS、HarmonyOS |
| 11 | Album Permission | Send image messages, set avatar | No | Android、iOS、HarmonyOS |
| 12 | Microphone Permission | Voice call, send voice messages | No | iOS |
| 13 | Modify audio permissions | Voice call, send voice messages | No | Android、HarmonyOS |
| 14 | Request to install the application | App Installation | No | Android |
| 15 | Read phone state permission | Jiguang Push: Permission to obtain machine code, used to create a unique User Identification | Yes | Android、HarmonyOS |
| 16 | Allows the program to mount and unmount external file systems | Jiguang Push: Used for external configuration file loading | No | Android、HarmonyOS |
| 17 | Push Service | Jiguang Push: Permission to wake up the device, used for long connection heartbeat | No | Android、HarmonyOS |
| 18 | Jiguang Push Permission | JPush: Used to verify whether it is a JPush application | No | Android、HarmonyOS |
| 19 | Read mobile phone number | Jiguang Push: One-click Login to Read Mobile Phone Number | Yes | Android、HarmonyOS |
| 20 | Huawei Manufacturer Channel Permissions | Huawei Manufacturer Channel: Custom permissions for the Huawei Manufacturer Channel, used for push notifications on Huawei mobile phones | No | Android、HarmonyOS |
| 21 | Xiaomi Manufacturer Channel Permissions | Xiaomi Manufacturer Channel: Custom permissions for the Xiaomi Manufacturer Channel, used for push notifications on Xiaomi phones | No | Android |
| 22 | Meizu Manufacturer Channel Permissions | Meizu Manufacturer Channel: Custom permissions for the Meizu Manufacturer Channel, used for push notifications on Meizu phones | No | Android |
| 23 | OPPO Manufacturer Channel Permission | OPPO Manufacturer Channel: Custom permissions for the OPPO Manufacturer Channel, used for push notifications on OPPO phones | No | Android |
| 24 | Allows access to information about all running applications | Allows access to information about all running applications | No | Android、HarmonyOS |
Remarks:
The abovementioned personal information is only collected and used as necessary for the services provided by the company. If you use mobile phones of brands such as Xiaomi, Meizu, Huawei, Apple, etc., or download the product from other app markets, the abovementioned mobile phone manufacturers or app market service providers may duplicate or additionally collect your personal information for providing the services of the corresponding mobile phone manufacturers or app market service providers. For specific information collection details, please refer to the privacy policies or relevant statements of the abovementioned mobile phone manufacturers or app market service providers.