Fanbook Privacy Policy

Update Time: August 27, 2024

Release Date: August 27, 2024

Effective Date: August 27, 2024

Welcome to choose the online services provided by Shenzhen FunPlay Technology Co., Ltd. (hereinafter referred to as "the Company" or "we"). We hereby formulate this "Fanbook Personal Information Protection Policy" (hereinafter referred to as "this Policy") to enable you to understand how we collect, store, use, share, transfer, publicly disclose, and delete your personal information, as well as the relevant rights you enjoy. We attach great importance to the protection of your personal information and fully respect your user rights. Please read this Policy carefully and make the choices you deem appropriate in accordance with the guidance of this Policy. Before using our products and services, please be sure to read this Policy carefully, especially the clauses marked in bold, which you should focus on. You should start using our products and services only after fully understanding and agreeing to this Policy. If you do not agree to any content of this Policy, you should immediately stop using our products and services.

This Policy is an integral part of the "Fanbook Software License and User Agreement". Matters not covered in this Policy shall be governed by the provisions of the "Fanbook Software License and User Agreement".

Table of Contents

  1. How we collect and use your personal information
  2. How We Use Cookies and Similar Technologies
  3. How We Store Personal Information
  4. How We Protect Your Personal Information
  5. How we share, transfer, and publicly disclose your personal information
  6. Your Rights
  7. Reminder regarding Juveniles' Use of the Service
  8. Scope of Application and Changes to This Policy
  9. Contact Information

Abstract

This summary mainly explains to you how we collect and process your personal information, as well as the rights you have regarding your personal information. If you would like to learn more about the details of your personal information processing and all the rules for our processing of your personal information, please read the full version of the Fanbook Personal Information Protection Policy.

1. How We Collect and Use Your Personal Information

According to the "Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Application Programs", this product belongs to the category of online community APPs, with its basic business functions including topic discussions, information sharing, and follow-up interactions on blogs, forums, communities, etc. To use the basic functional services, users need to provide their mobile phone numbers.

1.1 Situations where you must authorize us to collect and use your personal information

To provide you with the core functions of our company's products and services, we will collect and use the following personal information. If you refuse to provide the relevant information, you will not be able to enjoy the basic business functions of our company's products or services, which include:

1.1.1 Registration and Login

1.1.2 Ensure the normal operation of software and operational security

1.2 Situations where you can choose whether to authorize us to collect and use your personal information

If you use other business functions of our company's products and services, we will collect and use the following personal information to provide you with extended business functions of our company's products or services:

1.2.1 Identity Authentication

To meet the requirements of relevant laws, regulations, policies, and relevant competent authorities, you need to undergo real-name authentication when using certain functions, and we will prompt you when you choose to use these functions. If you choose to use these functions, we will collect your basic personal information and personal identity information, including your name, ID number. Moreover, when you create a community, we also need to call your camera permission to use the device camera to obtain your facial recognition features, and verify them against your personal identity information to improve the accuracy of real-name authentication and prevent identity theft to the greatest extent. Among them, personal identity information and facial recognition features are personal sensitive information. If you refuse to provide such information, it may result in your inability to use these functions or corresponding restrictions during the use of this software. For the purpose of real-name authentication, you agree that we may provide, query, and verify your aforementioned personal information to relevant institutions either by ourselves or by entrusting a third party.

1.2.2 Information Browsing, Publishing, and Interaction

1.2.3 Consumption and Payment

1.2.4 Questionnaire Survey

If you are willing to participate in the questionnaire survey organized by our company, you may need to provide additional basic personal information and personal education and work information, including your gender, occupation, industry, personal interests, software usage behavior and habits. This information will help us understand the operation of our software and improve our software service design based on feedback. We will obtain your authorization before inviting you to participate in relevant activities. If you choose not to provide this information, you may not be able to participate in the activity, but it will not affect your use of the basic business functions of our software.

1.2.5 Customer Service

When you interact with our customer service or use the user response function, including submitting feedback online, communicating with online/human customer service, for the security of your account and system, we may need you to provide account information first and match it with the personal information you provided previously to verify your user identity. When you use the customer service or user response function, we may also need to collect your contact information (phone number, email address) and your communication records and content, software usage materials you provided to us to resolve customer service needs, among which communication records and content are personal sensitive information. We collect this information to investigate facts and help you solve problems. If you refuse to provide it, it may result in your inability to use the user response mechanism of this software, but it will not affect your use of the basic business functions of this software.

1.2.6 Push and Announcement

1.3 Exceptions to obtaining authorization and consent

According to relevant laws, regulations, and national standards, we may collect and use your personal information without seeking your authorization and consent in the following circumstances:

  1. Necessary for concluding or performing the contract between you and us;
  2. is necessary for the Company to fulfill its legal duties or obligations;
  3. Necessary for responding to public health emergencies or protecting the life, health, and property safety of natural persons in emergency situations;
  4. Processing personal information within a reasonable scope for activities such as news reporting and public opinion supervision carried out for the public interest;
  5. Directly related to national security and national defense security;
  6. Directly related to public safety, public health, public cyber security, cyber environment governance, and major public interests;
  7. Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
  8. When it is necessary to protect your or other individuals' major legitimate rights and interests such as life and property, but it is difficult to obtain your consent;
  9. The personal information involved is publicly disclosed by you to the general public on your own initiative;
  10. Collecting personal information from legally publicly disclosed information;
  11. Other circumstances stipulated by laws and regulations.

2. How We Use Cookies and Similar Technologies

To analyze and understand the operation of this software, we use several automated data collection tools, currently including cookies and web beacons. These technologies help us remember your identity, recognize your software usage, and prevent fraud. We promise not to use the above technologies for any purpose other than those described in this policy. If your device or relevant programs allow, you can turn off or delete the above technologies by changing settings, but this may affect your user experience, and some functions may not work properly.

3. How We Store Personal Information

We will, in accordance with the requirements of relevant laws and regulations, adhere to the principle of minimizing the retention period of personal information, and reasonably retain your personal information.

3.1 Storage Method and Duration

We will store your information through AES and RSA encryption methods, including local storage (such as using the APP for data caching), databases, and server logs, etc.

During your use of this product or service, we will continuously retain your personal information. If you cancel your account or this product ceases operation, we will retain your personal information for 3 years from the date of cancellation or cessation of operation. If laws and regulations stipulate a longer retention period for relevant personal information, we will retain your personal information within the shortest period stipulated by laws and regulations. After the expiration of the above period, we will delete or anonymize your personal information.

3.2 Storage Region

Personal information collected and generated within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.

3.3 How Your Personal Information Is Transferred Globally

Currently, we do not engage in the cross-border transfer of your personal information.

4. How We Protect Your Personal Information

We attach great importance to the protection of your personal information and have adopted AES and RSA encryption technologies to ensure the security of your personal information.

4.1 Security Measures

We have used security measures that meet industry standards to protect the personal information you provided, preventing the data from unauthorized access, public disclosure, use, modification, damage, or loss. We have used the following various security technologies and procedures to protect your personal information:

  1. We have enabled the SSL protocol to provide encryption protection when exchanging data (such as credit card information) between your application software and the server;
  2. We have adopted encryption technologies such as Transport Layer Security (TLS) protocol and provided browsing services through means such as HTTPS to ensure the security of your data during transmission;
  3. We ensure that third parties can only access the API interfaces we share via HTTPS. We only provide account verification functionality, so third parties are unable to retrieve your personal information. Meanwhile, we have adopted comprehensive anti-SQL injection measures to prevent the Database System from being attacked by external sources;
  4. We use encryption technology to encrypt and store your personal information. Your password is encrypted using technologies such as secondary MD5 and is encrypted information;
  5. In certain services, we may also remind you to change your password via phone, SMS, etc.

4.2 Information Security Certification

We have obtained the following certifications in the field of information security:

Information Security Technology - Network Security Level Protection - Level 3

4.3 Access Control

We only allow employees, partners of the company and its affiliated parties who have a legitimate need to know this information to access your personal information, and have established strict access control and monitoring mechanisms for this purpose. We also require all personnel who may come into contact with your personal information to fulfill their corresponding confidentiality obligations.

4.4 User Reminder

The Internet is not an absolutely secure environment, and communication methods with other users such as email, instant messaging, and social software cannot guarantee complete encryption. We recommend that when using such tools, you use complex passwords or change your account password regularly, and pay attention to protecting the security of your personal information.

4.5 Liability for Security Incidents

We will make every effort to ensure the security of the information you send to us. If our physical, technical, or administrative safeguards are maliciously breached, resulting in unauthorized access, public disclosure, alteration, or destruction of information, and causing damage to your legitimate rights and interests, we will assume the corresponding legal liability.

4.6 Notification of Security Incidents

In the unfortunate event of a personal information security incident, we will promptly notify you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or will take to address it, suggestions for you to independently prevent and reduce risks, remedial measures for you, etc. We will promptly inform you of the relevant situation of the incident by means of email, letter, phone call, push notification, etc. When it is difficult to notify each personal information subject individually, we will take reasonable and effective measures to issue an announcement. At the same time, we will also, as required by the regulatory authorities, proactively report the handling of the personal information security incident.

5. How we share, transfer, and publicly disclose your personal information

5.1 Sharing

To implement business functions, we may share your personal information with third parties to provide the services or specific functions you need. If we need to share your personal sensitive information, we will seek your authorization and consent again. We will only share your personal information for legitimate, proper, necessary, specific, and explicit purposes, and only share the necessary personal information. We will strictly restrict the third parties' use of your personal information by signing agreements to ensure that they process personal information in accordance with our requirements, this Policy, and any other relevant confidentiality and security measures. At the same time, we will also take effective technical protection measures to ensure the security of your personal information during the sharing process. We will try our best to anonymize the personal information in the shared content. You understand and agree that the information after anonymization cannot be identified or associated with you and no longer falls within the scope of personal information in the legal sense, so its processing, use, sharing, and transfer do not require your authorization and consent.

Currently, we need to share your personal information in the following situations:

  1. To facilitate our provision of consistent services to you based on the company's unified account system, to enable you to conduct unified management, and to ensure the security of the system and accounts, your personal information may be shared as necessary within the company's products.
  2. To ensure the implementation, secure and stable operation of our product-related functions, some services will be provided by third parties. We need to share your personal information with third parties when you use the corresponding functions, including through software development kits (SDKs) or other similar applications. When you use such services provided by third parties in our products, you agree that they will directly collect and process your personal information. We will strive to review the business access qualifications of such third parties and require their legal compliance and security. To maximize the protection of your information security, we strongly recommend that you review the privacy policies of third-party service providers before using their services. To safeguard your legitimate rights and interests, if you find any risks in the services provided by third-party service providers, we recommend that you immediately terminate the relevant operations and contact us in a timely manner. Currently, please refer to the Third-Party Information Sharing List for information on the sharing of personal information between our products and third parties. The in-product access path is Me - About Us - Third-Party Information Sharing List.

Third-Party Information Sharing List

Third-party services or SDKs Usage Scenarios and Objectives Information Type Collection/Sharing Method Company Name Official Website Link
Jpush SDK for Jiguang Push Push and Announcement: By identifying device information, the App is empowered with push capabilities for message pushing; geographical location and network information are used to create intelligent tags to implement regional and segmented push functions Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), location information, network information (including IP Address, WiFi information, base station information) SDK Native Collection Shenzhen Hexun Huagu Information Technology Co., Ltd. https://www.jiguang.cn/license/privacy
Aurora One-Click Login Registration and Login: Aurora Authentication integrates the number authentication capabilities of the three major telecom operators, providing a function to quickly verify the consistency between the mobile phone number entered by the user and the number of the local SIM card, thereby enhancing user experience and security Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), network information (including IP Address, WiFi information, base station information), location information, mobile phone number SDK Native Collection Shenzhen Hexun Huagu Information Technology Co., Ltd. https://www.jiguang.cn/license/privacy
China Mobile Authentication SDK Registration and Login: Used for one-click login Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), network information (including IP Address, WiFi information, base station information), location information, mobile phone number SDK Native Collection China Mobile Internet Co., Ltd. https://wap.cmpassport.com/resources/html/contract.html
China Unicom Authentication SDK Registration and Login: Used for one-click login Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), network information (including IP Address, WiFi information, base station information), location information, mobile phone number SDK Native Collection China United Network Communications Joint Stock Company https://opencloud.wostore.cn/authz/resource/html/disclaimer.html?fromsdk=true
China Telecom Authentication SDK Registration and Login: Used for one-click login Device information (including IMEI, IDFA, Android ID, IMSI, MAC, OAID, device model, operating system, app crash information, software list, notification switch status), network information (including IP Address, WiFi information, base station information), location information, mobile phone number SDK Native Collection China Telecom Joint Stock Company https://e.189.cn/sdk/agreement/detail.do
OPPO Push SDK Push and Announcement: Used to push messages on OPPO devices Device Information: IMEI Number, Serial Number, IMSI, User ID, Android ID, Google Advertising ID, Phone Region Settings, Device Model, Phone Battery Level, Phone Operating System Version and Language), App Information: APP Package Name and Version Number, Running Status, Network Information: IP Address or Domain Name Connection Result, Current Network Type, Message Sending Result, Notification Bar Status, Lock Screen Status SDK Native Collection OPPO Guangdong Mobile Communications Co., Ltd. https://open.oppomobile.com/wiki/doc#id=10445
Huawei Push SDK Push and Announcement: Used to push messages on Huawei devices Device Information: IMEI, IDFA, Android ID, IMSI, MAC, OAID SDK Native Collection Huawei Technologies Co., Ltd. https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/privacy-statement-0000001050
Meizu Push SDK Push and Announcement: Used to push messages on Meizu devices Device information (including device name, model, operating system version, region and language settings, IMEI, IP Address, MAC address), location information, application usage information (including version number, download/install/update/delete status, application settings), and log information SDK Native Collection Zhuhai Meiwang Technology Co., Ltd. https://open.flyme.cn/open-web/views/push.html
VIVO Push SDK Push and Announcement: Used to push messages on VIVO devices Device Information, Network Status Information SDK Native Collection Guangdong Tianchen Network Technology Co., Ltd. https://dev.vivo.com.cn/documentCenter/doc/366
Xiaomi Push SDK Push and Announcement: Used to push messages on Xiaomi devices Device information (including IMEI, OAID, IMEI MD5/MEID MD5, Android ID, VAID, AAID, MID, device model, storage, and settings information), application usage information (including version number, installation and update time, and application settings) SDK Native Collection Beijing Xiaomi Mobile Software Co., Ltd. https://dev.mi.com/console/doc/detail?pId=1822
Openinstall Ensure the normal operation of software and operational security: Provide channel statistics, data statistics, and analysis services for games Device Information (including device brand, model, version, Mac Address, IP Address, GET_TASK retrieval application, Android ID, running process information, clipboard information, sensor information, device serial number) SDK Native Collection Shenzhen Fenmiao Network Technology Co., Ltd. https://www.openinstall.io/privacy.html
TBS Tencent Browser Service Information browsing, publishing, and interaction: preview files in formats such as pdf, xls, doc, etc. Device Information (GET_TASK Retrieval Application) SDK Native Collection Shenzhen Tencent Computer Systems Co., Ltd. https://x5.tencent.com/tbs/index.html
alipaySDK Consumption and Payment: Bind Alipay account, send and receive red envelopes function Device Information (used for risk control and network optimization) - (IMEI, IMSI, Android ID, MAC Address, hardware serial number, ICCID, SSID BSSID, sensor information, network type, carrier information, WIFI status/parameters/list, system settings, system properties, device brand, device model, operating system, IP Address). Identity Authentication Information - (Camera: device permissions, facial information) SDK Native Collection Alipay (China) Network Technology Co., Ltd. https://opendocs.alipay.com/open/54/01g6qm
Tencent Cloud Face Identity Verification Identity Verification: Used for real-name authentication when applying to create a community User's real name, ID card number Backend Interface Transmission Tencent Technology (Shenzhen) Co., Ltd. https://cloud.tencent.com/document/product/1007/31322
WeChatSDK Registration and Login: WeChat Login; Information Browsing, Publishing, and Interaction: WeChat Sharing WeChat sharing content, app installation list, IMEI, Mac address SDK Native Collection Tencent Technology (Shenzhen) Co., Ltd. https://open.weixin.qq.com/cgi-bin/frame?t=news/protocol_developer_tmpl
flutter Ensure the normal operation of software and operational security: Software Development Clipboard information, sensor information, Android ID SDK Native Collection Google Inc. https://policies.google.com/privacy
MyBatis-Plus Ensure the normal operation of software and operational security: Software Development Android ID SDK Native Collection baomidou https://github.com/baomidou/mybatis-plus
Oaid Provide a supplementary device identification system for mobile intelligent terminals oaid, Application List SDK Native Collection China Academy of Information and Communications Technology http://www.msa-alliance.cn/
Volcengine Ensure the normal operation of software and operational security: Data Analysis, Abnormal Data Collection, Log Collection, Data Statistics Access phone state, read/write storage, access network, obtain network information status, obtain WIFI network information status, read system low-level logs; SDK version, application version, application package name, IP Address (used for geolocation), MAC address, device information (including IMEI, OAID, IMEI, MD5/MEIDMD5, Android ID, VAID, AAID, MID, device model, brand, version, storage, setting information) SDK Native Collection Beijing Volcengine Technology Co., Ltd. https://www.volcengine.com/docs/6256/64902
Meishe SDK Information Browsing, Publishing, and Interaction: Provide users with the ability to edit and process videos and images, and users can post this content in the circle Camera, Microphone, Album, Storage, Network Permissions SDK Native Collection Beijing Meishe Network Technology Co., Ltd. https://www.meishesdk.com/privacy.html
Geetest SDK Ensure the normal operation of software and operational security: Provide end-user risk identification services Mobile Phone Number, IP Address API Interface Wuhan Jiyi Network Technology Co., Ltd. https://www.geetest.com/Private
RCE SDK Ensure the normal operation of software and operational security: Verify whether the device has risks App Installation List, IMEI, IMSI, Android ID SDK Native Collection Tencent Technology (Shenzhen) Co., Ltd. https://privacy.qq.com/document/preview/5331f064a91a47eb93993fdacb91c8f7
Weibo SDK Information Browsing, Publishing, and Interaction: Weibo Sharing App Installation List, IMEI, Mac Address SDK Native Collection Beijing Weimeng Chuangke Network Technology Co., Ltd. https://weibo.com/signup/v5/privacy

5.2 Transfer

We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

  1. In case of special circumstances, after obtaining your explicit authorization and consent, we will transfer your personal information to other parties;
  2. When it comes to mergers, acquisitions, or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your information to continue to be bound by this policy; otherwise, we will require the company or organization to seek your authorization and consent again.

5.3 Public Disclosure

We will only publicly disclose your personal information in the following circumstances:

  1. After obtaining your explicit authorization and consent;
  2. Based on disclosures in prize-winning activities: For example, when announcing the list of winners, we will desensitize and display the winners' mobile phone numbers or usernames;
  3. Legal-based disclosure: We may publicly disclose your personal information when required by law, legal proceedings, litigation, or mandatory requirements of government authorities;

5.4 Social Network

Our social networking service is specifically designed to enable you to communicate with users worldwide, allowing you to transmit communication information in real-time and extensively. When you use the social networking features in our service, you may share some personal information. We provide you with the ability to independently control the user scope of personal information sharing in certain services, and you can also request us to delete your relevant personal information.

  1. Personal information you may share through social features: including information you upload, post, or authorize to be made public in the community, information you share and disseminate through LIVE or recorded broadcasts, your responses to information uploaded or posted by others, as well as location data and log information related to such information;
  2. Other users may share information related to you through social features;
  3. Regarding the deletion of shared information: As long as you do not delete the shared information, the relevant information will remain in the public domain; even if you delete the shared information, the relevant information may still be independently cached, copied, or stored by other users or non-affiliated third parties not under the control of this company, or retained in the public domain by other users or such third parties;
  4. Protection of Information You Share Through Social Features: In some cases, you can control the scope of users who have access to view your shared information through our privacy settings; you can also request the deletion of your relevant information from our services. Please contact us through the contact information described in Chapter 9 of this Policy.

5.5 Exceptions to prior authorization and consent when sharing, transferring, or publicly disclosing personal information

According to relevant laws and regulations, in the following circumstances, we do not need to obtain your prior authorization and consent when sharing, transferring, or publicly disclosing personal information:

  1. Directly related to national security or national defense security;
  2. Directly related to public safety, public health, or major public interests;
  3. Directly related to criminal investigation, prosecution, trial, and execution of judgment, etc.;
  4. When it is necessary to protect your or other individuals' major legitimate rights and interests such as life and property, but it is difficult to obtain your authorization and consent;
  5. Personal information that you publicly disclose to the general public on your own initiative;
  6. Related to the company's fulfillment of obligations stipulated by laws and regulations;
  7. When collecting personal information from legally publicly disclosed information, such as through channels like legal news reports and government information disclosure.

6. Your Rights

During your use of this software, we may provide you with corresponding operational settings based on the specific circumstances of the software service, so that you can access, query, correct, or delete your relevant personal information, cancel your user account, revoke the authorized consent, and obtain a copy of your personal information. In accordance with relevant laws and regulations, we ensure that you can exercise the following rights regarding your personal information. Additionally, we have established complaint and reporting channels, and you can contact us through the contact information described in Chapter 9, and your feedback will be promptly addressed.

6.1 You have the right to access your personal information

You can log in to your personal account through this software and access the network identity information in your account at any time. The specific path is: Me - View User Account, Nickname, or Avatar. You can also view a summary of the personal information we collect from you in the Personal Information Collection List. The in-product access path is: Me - About Us - Personal Information Collection List.

If you are unable to access your personal information through the aforementioned methods, or if you need to obtain personal information content that cannot be known through the aforementioned methods, you may contact us through the contact information provided in Article 9 of this Policy, and we will respond to you within 15 working days.

6.2 You have the right to correct your personal information

You can log in to your personal account through this software and correct the network identity information in your account at any time. The specific path is: Me - Change Nickname or Avatar.

If you are unable to correct your personal information through the aforementioned methods, you may contact us via the contact information provided in Article 9 of this Policy, and we will respond to you within 15 working days.

6.3 You have the right to delete your personal information

You may submit a request to us to delete personal information in the following situations:

  1. If our handling of personal information violates laws and regulations;
  2. If we collect and use your personal information without obtaining your consent;
  3. If our handling of personal information violates the agreement with you;
  4. If you no longer use our products or services, or if you have cancelled your account;
  5. If we no longer provide products or services to you.

You may contact us through the contact information provided in Article 9 of this Policy to request the deletion of your personal information. If we decide to respond to your deletion request, we will delete it within 15 working days. We will also notify the entities that have obtained your personal information from us to delete it promptly, unless otherwise required by laws and regulations or these entities have obtained your independent authorization. After you delete information from our services, we may not immediately delete the corresponding information from the backup system, but will delete it when the backup is updated.

6.4 You have the right to change the scope of your authorized consent

Each business function we provide to you requires some of your basic personal information to be completed. You can view the application and usage of personal information permissions for our products in the "Personal Information Permission List" or "Privacy Permission Settings". If you wish to withdraw your authorization consent, you can make changes on the device you are using, with the specific operation path being: Settings - Applications - Permission Management, or Settings - Privacy, or in our product, you can view the application and usage of personal information permissions through Privacy Permission Management and revoke the consent for permission usage, with the access path being Me - About Us - Privacy Permission Settings.

If you are unable to change the scope of your authorized consent through the aforementioned methods, you may also submit an application to us via the contact information provided in Article 9 of this Policy, and we will respond to your request within 15 working days. If you need to withdraw your consent to the collection of necessary personal information or withdraw your consent to the collection of all personal information, it will result in our inability to provide you with the basic business functions of this product or service. In this case, if you still wish to withdraw the relevant consent, you can achieve this by canceling your user account, and the cancellation path is: Me - Settings - Account and Security - Cancel Account.

6.5 You have the right to cancel your user account

You may cancel your previously registered account at any time. You can submit a cancellation application to us on the relevant function settings page of our products or services, and we will cancel your account within 15 working days. The specific cancellation path is: Me - Settings - Account & Security - Cancel Account.

If you are unable to cancel your account through the aforementioned methods, you may also submit an application to us via the contact information provided in Article 9 of this Policy. After canceling your account, we will cease providing you with products or services and, in accordance with your request, delete your personal information, except as otherwise provided by laws and regulations.

6.6 You have the right to apply for a copy of your personal information

If you need to obtain a copy of your personal information, you may submit an application to us through the contact information provided in Article 9 of this Policy, and we will respond to your application within 15 working days.

6.7 Transfer of Personal Information

If you need to transfer your personal information to a specified third party, you may submit an application to us through the contact information provided in Article 9 of this Policy, and we will respond to your application within 15 working days. Where technically feasible and in compliance with the conditions stipulated by the national cyber information department, we may transfer your personal information to the third party you specify as requested.

6.8 Constraints on Automatic Decision-Making by Information Systems

If the information system we use makes decisions based on automated decision-making mechanisms, and these decisions have a significant impact on your legitimate rights and interests, you have the right to provide feedback or lodge a complaint with us through the contact information provided in Article 9 of this Policy. We will conduct a manual review of the automated decision-making results or provide other appropriate remedies.

6.9 Respond to your request

You may submit requests related to personal information to us through the contact information provided in Article 9 of this Policy, and we will respond within 15 working days. To ensure security, you may be required to provide a written request or otherwise prove your identity. We may first ask you to verify your identity before processing your request.

For your reasonable requests, we will not charge fees in principle. However, for requests that are repeatedly made and exceed reasonable limits, we hope you will understand that we may charge certain costs depending on the circumstances. For requests that are made without cause, require excessive technical means, pose risks to the legitimate rights and interests of others, or are unrealistic, we apologize that we may decline them.

6.10 Special Circumstances

According to the requirements of laws and regulations, we regret that we will not be able to respond to your request in the following situations:

  1. Related to the Company's fulfillment of obligations stipulated by laws and regulations
  2. Directly related to national security or national defense security;
  3. Directly related to public safety, public health, or major public interests;
  4. Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
  5. There is sufficient evidence to show that you have subjective malice or abuse of rights;
  6. When it is necessary to safeguard your or other individuals' major legitimate rights and interests, such as life and property, but it is difficult to obtain your consent;
  7. Responding to your request will cause serious harm to the legitimate rights and interests of you or other individuals or organizations;
  8. Involving trade secrets.

7. Reminder regarding Juveniles' Use of the Service

The Company attaches great importance to the protection of personal information of juveniles. Juveniles under the age of 18 shall not use this software without the consent of their legal guardians. If you are the legal guardian of a juvenile under the age of 18, you shall supervise and control the juvenile's use of our services, and the juvenile's account creation shall be subject to your prior consent. If you are the legal guardian of a juvenile under the age of 14 (inclusive), please visit "Fanbook Children's Personal Information Protection Policy".

  1. In the case of collecting personal information of juveniles with the consent of their legal guardians, we will only use or publicly disclose such information when permitted by law, explicitly consented to by the legal guardians, or necessary for the protection of juveniles.
  2. If a Juvenile uses our services without the consent of their legal guardian, the legal guardian of the Juvenile has the right to contact us and request us to delete the Juvenile's personal information, and we will delete it immediately after verification.
  3. If we discover that the Company has collected personal information of Juveniles without obtaining prior verifiable consent from their legal guardians, we will endeavor to delete the relevant data as soon as possible.

8. Scope of Application and Changes to This Policy

8.1 Scope of Application

This policy applies to the Fanbook software services provided by our company.

This software may include links that help you access third parties, including: the Company provides you with links through advertising or other means to facilitate your direct access to third-party services or websites. We ask you to pay special attention, such third-party services are provided by relevant third parties. To protect your legitimate rights and interests, please carefully read the privacy policy guidelines of the relevant third parties before deciding whether to use the services provided by such third parties.

8.2 Changes to the Personal Information Protection Policy

We may revise this Policy in accordance with adjustments to the company's business or relevant policies. To safeguard your right to be informed as a user, we will publish any changes made to this Policy on this page, prompt you to read them via in-app pop-ups, and re-obtain your authorization and consent. For significant changes, we will also provide a clear notice at the top of this page. Significant changes referred to in this Policy include but are not limited to:

  1. When there are significant changes to our service model, such as the purpose of processing personal information, the types of personal information processed, the methods of using personal information, etc.;
  2. When we undergo significant changes in aspects such as ownership structure, organizational structure, etc., such as changes in ownership caused by business adjustments, bankruptcy, mergers and acquisitions, etc.;
  3. When there are changes to the main recipients of personal information sharing, transfer, or public disclosure;
  4. When there are significant changes to your rights regarding personal information processing and the ways of exercising them;
  5. When the department responsible for handling personal information security, contact information, and complaint channels change;
  6. When our personal information security impact assessment report indicates the existence of high risks.

9. Contact Information

If you have any questions, comments, or suggestions regarding this policy, or if you have any complaints or appeals regarding our personal information processing practices, you may contact us through the following means, and we will respond with our handling opinions or results within 15 working days.

To better protect your personal information, the company has appointed a personal information protection officer to handle your personal information protection work. The specific contact person is: Zhang Wei, contact phone number: 0755-86685111, contact email: fbmark.zhang@fanbook.cn

If a dispute or conflict arises between you and us regarding personal information processing activities and cannot be resolved through negotiation, you may file a lawsuit with the People's Court of Nanshan.

User Permission Collection List

Serial Number Collect Content Business Function Sensitive Information Belonging Platform
1 Allow network usage Network Communication No Android、HarmonyOS
2 Access Network State Permission Network requests used in the business No Android、HarmonyOS
3 Permission to change network connection status Network requests used in the business No Android、HarmonyOS
4 Allows the program to modify sound setting information Voice Call No Android、HarmonyOS
5 Read and write memory card Read and save application data on the mobile phone No Android、HarmonyOS
6 Connect to paired Bluetooth devices Voice calls support Bluetooth headsets No Android、iOS、HarmonyOS
7 Wake Lock Receive message push No Android、HarmonyOS
8 Record Sound Send voice message No Android、HarmonyOS
9 Allows discovery and pairing of Bluetooth devices Voice calls support Bluetooth headsets No Android、iOS、HarmonyOS
10 Camera Permission Set Avatar No Android、iOS、HarmonyOS
11 Album Permission Send image messages, set avatar No Android、iOS、HarmonyOS
12 Microphone Permission Voice call, send voice messages No iOS
13 Modify audio permissions Voice call, send voice messages No Android、HarmonyOS
14 Request to install the application App Installation No Android
15 Read phone state permission Jiguang Push: Permission to obtain machine code, used to create a unique User Identification Yes Android、HarmonyOS
16 Allows the program to mount and unmount external file systems Jiguang Push: Used for external configuration file loading No Android、HarmonyOS
17 Push Service Jiguang Push: Permission to wake up the device, used for long connection heartbeat No Android、HarmonyOS
18 Jiguang Push Permission JPush: Used to verify whether it is a JPush application No Android、HarmonyOS
19 Read mobile phone number Jiguang Push: One-click Login to Read Mobile Phone Number Yes Android、HarmonyOS
20 Huawei Manufacturer Channel Permissions Huawei Manufacturer Channel: Custom permissions for the Huawei Manufacturer Channel, used for push notifications on Huawei mobile phones No Android、HarmonyOS
21 Xiaomi Manufacturer Channel Permissions Xiaomi Manufacturer Channel: Custom permissions for the Xiaomi Manufacturer Channel, used for push notifications on Xiaomi phones No Android
22 Meizu Manufacturer Channel Permissions Meizu Manufacturer Channel: Custom permissions for the Meizu Manufacturer Channel, used for push notifications on Meizu phones No Android
23 OPPO Manufacturer Channel Permission OPPO Manufacturer Channel: Custom permissions for the OPPO Manufacturer Channel, used for push notifications on OPPO phones No Android
24 Allows access to information about all running applications Allows access to information about all running applications No Android、HarmonyOS

Remarks:

The abovementioned personal information is only collected and used as necessary for the services provided by the company. If you use mobile phones of brands such as Xiaomi, Meizu, Huawei, Apple, etc., or download the product from other app markets, the abovementioned mobile phone manufacturers or app market service providers may duplicate or additionally collect your personal information for providing the services of the corresponding mobile phone manufacturers or app market service providers. For specific information collection details, please refer to the privacy policies or relevant statements of the abovementioned mobile phone manufacturers or app market service providers.