Quakemap-Privacy Policy

Update time: May 1, 2025

Effective date: May 1, 2025

 

[introduction]

Welcome to use the "【Quakemap】" products (hereinafter referred to as "this software" or "we") and services developed and operated by [STRAXALLIANCE Technology Co., LTD]! We are fully aware of the importance of personal information to you. Your trust is very important to us. We will strictly abide by laws and regulations to take corresponding security protection measures and are committed to protecting your personal information. We also attach great importance to user privacy and personal information protection. When you use our products and/or services, we will only collect and use user information in a legal manner (in accordance with the Internet Information Service Management Measures and other laws and regulations on data protection). Based on this, we have formulated this "Software Privacy Policy" (hereinafter referred to as "this Policy"/"Privacy Policy") to help you fully understand how we collect, use, share, transfer, store, and protect your personal information and how you can manage your personal information during your use of our products and services, as well as the methods we provide for you to access, update, delete and protect this information, so that you can make better choices.

Before you start using our products and services, please be sure to read and understand this policy carefully, especially those marked in bold/bold underlined, to ensure that you fully understand and agree before you start using them. We will try our best to explain the professional terms involved in this policy in simple and popular terms to facilitate your understanding. If you have any questions, comments or suggestions about the contents of this policy, you can contact us using the contact information at the end of this policy.

Your agreement to the privacy policy indicates that you have understood the functions provided by the App and the necessary personal information required for the operation of these functions, and have given the corresponding authorization for collection and use. However, it does not mean that you have separately agreed to enable additional functions and process non-essential personal information. We will separately seek your consent for enabling relevant additional functions, processing non-essential personal information, and processing sensitive personal information based on your actual usage.

 

[Important Tips]

In order to collect your information under this guideline, or to provide you with services, optimize our services, and protect the security of your account, we will need to ask you for relevant permissions; sensitive permissions such as location, photo albums, etc. will not be enabled by default, and we will only call or use them within the scope of your consent after you explicitly agree.

It should be noted that our acquisition of a specific sensitive permission does not necessarily mean that we will collect your relevant information; even if we have obtained sensitive permissions, we will only collect your relevant information within the necessary scope and in accordance with these guidelines during your use of the relevant services or functions.

 

[Private principle]

We respect and protect the privacy of all users who use the service. In order to provide you with better services, this application will use and disclose your personal information in accordance with this privacy policy. However, this application will treat this information with a high degree of diligence and prudence. Except as otherwise provided in this Privacy Policy, this application will not disclose or provide this information to third parties without your prior permission. This application will update this privacy policy from time to time. When you agree to the application service use agreement, you are deemed to have agreed to the entire content of this privacy policy. This privacy policy is an integral part of the agreement to use The app service. 

 

This Privacy Policy mainly consists of the following contents:

  1. Scope of application
  2. How we collect and use your personal information
  3. How do we share, transfer, and publicly disclose your personal information?
  4. Related information of third-party SDK
  5. Permissions that may need to be enabled
  6. How do we store and protect your information?
  7. Your Rights
  8. Use of Cookies
  9. Protection of Minors
  10. How to update this policy
  11. Contact Us

 

Statement and overview of other possible situations

  1. If we obtain your information indirectly from a third party, we will clearly require the third party in writing to collect the information only after obtaining your consent in accordance with the law before collection, and inform you of the content of the shared information. Sensitive information must be clearly confirmed by you before it is provided to us for use. We require the third party to make a commitment to the legality and compliance of the source of personal information. If the third party violates the regulations, we will clearly require the other party to bear the corresponding legal liability. At the same time, we will provide security protection for personal information (including classification of sensitive information, access control of sensitive information, encrypted storage of sensitive information, etc.). We will protect the personal information obtained indirectly using protection means and measures that are no less stringent than those we use to protect our own users’ personal information.
  2. Statement on Third-Party Responsibility: [Third-Party Services] Please note that your transaction counterparty, the operators of third-party websites you visit, and third parties connected through us (such as third parties providing services in this software) may have their own privacy protection policies; when you view web pages created by third parties or use applications developed by third parties, these third parties may place their own cookies or pixel tags, which are not under our control and their use is not subject to this policy. We will make commercially reasonable efforts to require these entities to take protective measures for your personal information, but we cannot guarantee that these entities will take protective measures in accordance with our requirements. Please contact them directly to obtain details about their privacy policies. If you find that these third-party created web pages or third-party developed applications involve risks, it is recommended that you terminate the relevant operations to protect your legal rights and interests. It is recommended that you carefully review the privacy statements of such third-party websites or service providers to understand how they handle your personal information so that you can make prudent decisions.

 

  1. Scope of application

This policy applies to all of our services.

  1. Please note that this policy does not apply to services provided by other companies or individuals.
  2. Your use of such third-party services is subject to their privacy policies (not this Policy), and you need to read their policies carefully.
  3. We will only collect sensitive information, such as microphone, after your explicit authorization.

 

  1. How we collect and use your personal information

When you use our products/services, we need/may need to collect and use the following two types of your personal information:

  1. In order to realize the basic function of providing you with our products and/or services, you must authorize us to collect and use the necessary information. If you refuse to provide the relevant information, you will not be able to use our products and/or services normally;
  2. In order to provide you with additional functions of our products and/or services, you can choose to individually agree or disagree to the information we collect and use. If you refuse to provide it, you will not be able to use the relevant additional functions normally or achieve the functional effects we intend to achieve, but it will not affect your use of our basic functions.

We would like to remind you that we are committed to creating a variety of products and services to meet your needs. Because we provide you with a wide variety of products and services, and different users choose to use different specific product/service ranges, the basic/additional functions and the corresponding types and scopes of personal information collected and used will be different. Please refer to the specific product/service functions.

Personal information as referred to in this policy refers to various information recorded electronically or otherwise that can identify the personal identity of a natural person user alone or in combination with other information. The personal sensitive information referred to in this policy refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, and may easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. It specifically includes identity document numbers, personal biometric information, bank account numbers, property information, whereabouts and transaction information. Individual device information, log information, and other information or data that cannot be directly linked to a specific individual are not personal information or sensitive personal information. We will only collect and use your personal information for the following purposes:

(I) Situations where you must authorize us to collect and use your personal information

Our products and/or services include some core functions, which include the functions necessary to realize the product and the functions necessary to ensure transaction security. We may collect and use the following information about you to achieve the above functions. If you do not provide relevant information, you will not be able to enjoy the products or services we provide. These features include:

- Positioning function

In order to help you realize the positioning function, our software will use your GPS\WIFI\network\base station and other location information. Of course, you can also refuse it and it will not affect your use of other functions.

-Maintain the normal operation of basic functions

During your use of our services, in order to identify abnormal account status, understand product adaptability, provide you with basic services such as browsing and use, maintain the normal operation of basic functions, and count bugs, we may automatically collect, store and associate information about the services you use and how you use them. This information includes:

(1) Log information: When you use our services, we may automatically collect detailed information about your use of our services and save it as relevant network logs. Log information includes your login account, IP address, browser type, telecom operator, network environment, language used, access date and time, and your browsing history of web pages, crash records, duration of stay, and refresh records.

(2) Device information: When you launch, log in, register or use the App, we may receive and record information about the device you are using (including IDFA, UUID, device model, operating system and version, client version, device resolution, package name, device settings, unique device identifier, software and hardware feature information) and information about the location of the device (including IP address, GPS location, and WLAN access points, Bluetooth and base station sensor information that can provide relevant information) based on the specific permissions you grant during software installation and use.

At the same time, in order to collect the above basic personal device information, we will apply for permission to access your device information. We collect this information in order to provide you with our basic services and basic functions. If you refuse to provide the above permissions, you may not be able to use our products and services.

Please note that individual device information and log information cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information will be deemed as personal information during the period of combined use. We will anonymize and de-identify such personal information unless we obtain your authorization or otherwise required by laws and regulations. During the period of combined use, such information will be treated and protected as your personal information in accordance with this Privacy Policy. (The "Third-party SDK used" will be elaborated in detail in the "Third-party SDK related information" section below)

(II) Other rules for collecting and using personal information

  1. If the information you provide contains the personal information of other users, you must ensure that you have obtained legal authorization before providing such personal information.
  2. If we use information for other purposes not specified in this policy, or use information collected for specific purposes for other purposes, we will obtain your prior consent.
  3. To ensure the security of the service and help us better understand the operation of our applications, we may record relevant information, such as the frequency of your use of the application, crash data, overall usage, performance data, and the source of the application. We do not merge the information we store in the analytics software with any personally identifiable information you provide in the application.
  4. If we use your personal information beyond the purpose you have authorized and the scope of direct or reasonable connection, we will inform you again and obtain your express consent before using your personal information.
  5. When you open our app and minimize it (background state), you are still running our app. We will collect your unique device identifier so that we can continue to provide you with stable services when you maximize our app (see "Related Information about Third-Party SDKs" in the section below for details)
  6. You should be fully aware that we do not need your authorization or consent to collect and use personal information in the following circumstances:
  7. Related to national security and national defense security;
  8. Related to public safety, public health, and major public interests;
  9. Related to criminal investigation, prosecution, trial and execution of judgment;
  10. For the purpose of protecting the life, property and other major legitimate rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the consent of the individual;
  11. The personal information involved is disclosed to the public by the subject of personal information or the guardian on his/her own initiative;
  12. Your personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
  13. Necessary for signing and performing a contract according to your requirements;
  14. Necessary for maintaining the safe and stable operation of the products and/or services provided, such as discovering and handling product and/or service failures;
  15. Necessary for legitimate news reporting;
  16. When academic research institutions conduct statistical or academic research based on public interests and provide the results of academic research or descriptions to the public, they shall de-identify the personal information contained in the results;
  17. Other circumstances prescribed by laws and regulations.

(III) Circumstances in which we obtain your personal information from third parties

  1. [Third-party information] In order to jointly provide you with products/services or improve the quality of products and services or out of reasonable needs such as considerations for the safety of products and services, we will receive your personal information and other information from affiliated companies, alliance members, partners and other trusted third-party suppliers, service providers and agents in accordance with the provisions of laws and regulations or based on your authorization, and you understand and agree that we do not need to bear legal responsibility for the collection and provision of such third parties (see "Related information about third-party SDKs" in the section below for details).

(IV) Rules for the use of your personal information

  1. We will use the collected personal information in accordance with the provisions of this Privacy Policy to realize the functions of our products and/or services.
  2. After collecting your personal information, we will de-identify the information through technical means, and the de-identified information will not be able to identify the subject. Please understand and agree that we have the right to use de-identified information in this case; and without disclosing your personal information, we have the right to analyze and commercially exploit the user database.
  3. Please understand and agree that all personal information you provide when using our products and/or services will be deemed to be your continued authorization for us to use during the period you use our products and/or services, unless you delete it or refuse our collection through system settings.
  4. We will collect statistics on the use of our products and/or services, and may share these statistics with the public or third parties to demonstrate the overall usage trends of our products and/or services. However, these statistics do not contain any personally identifiable information about you.
  5. When we display your personal information, we will desensitize your information by using methods including content replacement and anonymization to protect the security of your information.
  6. When we want to use your personal information for other purposes not specified in this Privacy Policy, or use personal information collected for specific purposes for other purposes, we will seek your explicit consent in advance. Please understand that the products and/or services we provide to you will be constantly updated and changed. If you choose to use other products and/or services not listed in this Privacy Policy, we will explain the purpose, method, and scope of information collection to you in detail and seek your consent through agreements, page prompts, etc. before collecting your personal information. If you do not agree to provide the foregoing information, you may not be able to use the product and/or service, but this will not affect your use of existing products and/or services.
  7. How do we share, transfer, and publicly disclose your personal information?

(I) Sharing

  1. We will not share your personal information with any company, organization or individual other than ourselves, except in the following circumstances:

(1) Obtain your explicit consent or authorization in advance;

(2) We may share your personal information in accordance with laws and regulations, litigation, dispute resolution, or requirements made by administrative or judicial authorities in accordance with the law, as well as other legal obligations.

(3) To the extent permitted by laws and regulations, it is necessary to provide the information in order to protect the interests, property or safety of us, our affiliates or partners, you or other our users or the general public from damage;

(4) Only by sharing your personal information can we realize the core functions of our products and/or services or provide the services you need;

(5) Resolve disputes or controversies between you and others upon your request;

(6) Comply with the relevant agreements signed with you (including online electronic agreements and corresponding platform rules) or other legal documents;

(7) Use based on academic research;

(8) Use based on social public interests in accordance with laws and regulations.

  1. We may share your personal information with our affiliates. However, we will only share necessary personal information subject to the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will seek your authorization and consent again.
  2. You fully understand and agree that we may share your information with our partners or other third parties to ensure the smooth completion of the services provided to you. However, we will only share your information for legitimate, lawful, necessary, specific and clear purposes, and only share personal information necessary to provide services. We will agree on strict data protection measures with our partners and other third parties to require them to process personal information in accordance with this policy and any other relevant confidentiality and security measures. Such third parties have no right to use the shared personal information for any other purpose. (We will elaborate on the "third-party SDK used" in the subsequent chapter "Related information about third-party SDKs")

Currently, our partners include the following types: Providers of goods or technical services. We may share your personal information with vendors who support our functions. These supports include providing us with infrastructure technical services, payment services, login services, customer service services, etc. The purpose of our sharing of this information is to achieve the core functions of our products and/or services. For example, we must share your mobile phone number with the operator to obtain the mobile phone verification code; when the service you place an order for is provided by us, we need to share the order information in your order with the third-party payment institution and provide the service after the payment is confirmed.

(II) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

  1. Obtain your explicit consent or authorization in advance;
  2. Provide as required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;
  3. Comply with the relevant agreements signed with you (including online electronic agreements and corresponding platform rules) or other legal documents;
  4. In the event of a merger, acquisition, asset transfer or similar transaction, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy. Otherwise, we will require the company or organization to re-solicit your authorization and consent.

(III) Public Disclosure

We will only disclose your personal information in the following circumstances and only after taking security measures that meet industry standards:

  1. Disclose the personal information you specify in accordance with your needs and in the manner you explicitly agree to;
  2. When your personal information must be provided in accordance with the requirements of laws and regulations, mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information based on the required type of personal information and disclosure method. Subject to compliance with laws and regulations, when we receive a request to disclose the above information, we will require the production of corresponding legal documents, such as a subpoena or investigation letter. We believe in being as transparent as possible about the information we are asked to provide, within the limits of the law. We carefully review all requests to ensure they have a legal basis and are limited to data that law enforcement has a legitimate right to obtain for specific investigative purposes. Subject to the permission of laws and regulations, the documents we disclose are protected by encryption keys.
  3. Related information of third-party SDK

In order to ensure the implementation of our related functions and the safe and stable operation of our applications, we will access the software development kit (SDK) provided by a third party to achieve this goal. We will conduct strict security monitoring on the SDKs that our partners use to obtain personal information to protect the security of your information. Currently, the third-party service providers we access include the following types:

 

Third-party SDK name Third Party Company Name Description of usage scenarios Types of Personal Information Shared
STRAXALLIANCE STRAXALLIANCE Technology Co., LTD For user data storage, basic functions, etc. App package name, app name, app version number, IP, device brand, device model, network type, operating system, resolution, UUID, IDFA, feedback (content, images)
Alibaba Cloud Alibaba Cloud For image and file storage Device information (IP), photos, files
View Privacy Policy>>>
https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud201802111644_32057.html
csjplatform-CSJ Beijing Bytedance Network Advertising cooperation, advertising attribution, anti-fraud Device information (device brand, model, software system version, screen density, screen resolution, device language, device time zone, SIM card information, CPU information, basic information such as available storage space, phone system restart time, total disk space, total system memory space, IDFV) Network information (IP address, carrier information, Wi-Fi status, network signal strength) Sensor information (accelerometer, gyroscope) Advertising information (interaction data such as ad display, clicks, and conversions) Performance data (such as crash data, performance data) Sensor information (accelerometer, gyroscope)
View Privacy Policy>>>
https://www.csjplatform.com/privacy
csjplatform-GroMore Beijing Bytedance Network Advertising cooperation, advertising attribution, anti-fraud Device information: Basic information such as device brand, model, operating system version information, device identifiers (such as IMEI, AndroidID, OAID, IMSI, ICCID, GAID, MEID, IDFV, IDFA; specific fields vary depending on software and hardware versions) Application information: developer application name, application package name, version number, etc. Other information: carrier information, device time zone, device geographic location, network device hardware address (MAC address), IP Address, WLAN access point (such as SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, use, and service logs.
View Privacy Policy>>>
https://www.csjplatform.com/supportcenter/5879
Volcano Engine Beijing Volcano Engine Technology Co., Ltd. Provide end-user risk identification services IP
View Privacy Policy>>>
https://www.volcengine.com/docs/6256/64902
  • Permissions that may need to be enabled
  • In order to ensure that the corresponding services are provided to you normally, you may need to enable the following (partial) permissions when using the product (in accordance with the principle of least sufficient use and the principle of tiered authorization, requests for relevant permissions will only be made to you when you use specific services. Rejecting some permissions will not affect the normal use of other functions not related to the permissions)

    You can check the status of the above permissions item by item in "This Software-Settings-Privacy-System Permissions" in your device's "Settings", and you can decide to turn these permissions on or off at any time.

    Please note that when you enable any permission, it means that you authorize us to collect and use relevant personal information to provide you with the corresponding services. Once you close any permission, it means that you cancel the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, and we will not be able to continue to provide you with the services corresponding to the permission. Your decision to close permissions will not affect the previous collection and use of information based on your authorization.

    - Location permission (please select Always allow): After you agree to enable the device location service, we will continue to collect your geographic location information through GPS or WiFi, etc., which will be used to record your location information. You can stop us from collecting your geographic location information by turning off the mobile phone positioning service, but this will not affect your use of other services.

    -Storage permission: Use file storage permission to save information locally. If you do not enable this permission, you will not be able to use functions related to storage card reading or caching, but it will not affect your use of other services.

    -Device information: used to provide different functions and experiences based on different devices and system versions, obtain product usage and bug information, and help us continuously improve product functions and experience. To ensure that you can use our services normally, we will collect your device model, operating system, unique device identifier, login IP address, version number, network access method, type and status. This type of information is the basic information that must be collected to provide services.

    -Network permissions: When the user opens the app, check whether the user can use the network normally, and whether the user is in wifi status or using data traffic.

    -Switch WLAN permission: used to turn wifi on or off, allowing the app to turn WLAN on or off. If you do not enable this permission, you will not be able to use wifi-related functions, but it will not affect your use of other services.

    You can choose whether to authorize or not. If you do not allow the relevant authorization, we will not obtain your relevant information, but you may not be able to enjoy the permission-related services provided by this software. After obtaining your authorization, we will use the relevant information reasonably and properly for the services of this software.

    1. How do we store and protect your information?

    (I) Technologies and measures for protecting information security

    1. We have used security measures that meet industry standards to protect the personal information you provide and prevent your data from being accessed, disclosed, used, modified, damaged or lost without authorization. We will take all reasonable and feasible measures to protect your personal information. We will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
    2. We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless the retention period needs to be extended or as permitted or required by laws and regulations. If you cancel your account with us or we terminate our services or operations, we will delete or anonymize your personal information in accordance with the regulations.
    3. The Internet is not an absolutely safe environment. We strongly recommend that you do not use any communication methods other than ours to send personal information when using our services.
    4. We will use various security technologies, procedures and systems to prevent the loss, improper use, unauthorized viewing or disclosure of users’ personal information. However, you fully understand and agree that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information.
    5. In the unfortunate event of a personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you, etc. We will inform you of the relevant information of the incident through letters, phone calls, etc. When it is difficult to inform the personal information subject one by one, we will issue an announcement in a reasonable and effective way. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities. If you find that your personal information has been leaked, please contact us immediately through the contact information agreed in this statement so that we can take corresponding measures in a timely manner.
    6. If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations by individual delivery or announcement, and destroy or anonymize the personal information we hold.

    (II) Storage of Personal Information

    1. Where the information is stored

    We will store user personal information collected within the country within China in accordance with laws and regulations. If the storage location of your personal information is transferred from within China to outside China, we will strictly comply with the law.

    1. Duration of Information Storage

    Generally speaking, we only retain your personal information for the time necessary to achieve the purpose and the retention period prescribed by laws and administrative regulations. We need to keep your data all the time to ensure that you can use the service normally.

    1. During your use of our products and services, your personal information will be retained for the period necessary to achieve the purposes stated in this policy, and will also be determined in accordance with the mandatory retention requirements of the law. After the retention period expires, we will delete your personal information or anonymize it in accordance with applicable laws.
    2. Your Rights

    We attach great importance to your concern about personal information and do our best to protect your rights to access, correct, delete and withdraw consent to your personal information so that you have sufficient ability to protect your privacy and security. Your rights include:

    1. Delete your personal information

    You may request us to delete your personal information in the following circumstances:

    - If our handling of personal information violates laws and regulations;

    - If we collect and use your personal information without your consent;

    - If our processing of personal information violates our agreement with you;

    - If you no longer use our products or services, or you cancel your account;

    - If we no longer provide products or services to you.

    If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations or these entities obtain your independent authorization. When you delete information from our services, we may not immediately delete the corresponding information from our backup system, but we will delete it when the backup is updated.

    1. Change the scope of your authorization or withdraw your authorization

    You can revoke your consent through the following ways:

    - Partial Authorization You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting information, turning off device functions, making settings in the software, etc.

    -You may also contact us to withdraw all authorizations for us to continue collecting your personal information.

    Please understand that each business function requires some basic personal information to be completed. Once you withdraw your consent or authorization, we will no longer be able to provide you with the services corresponding to the withdrawal of consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the processing of personal information previously carried out based on your authorization.

    1. Obtaining a copy of your personal information

    You have the right to obtain a copy of your personal information. If you need a copy of the personal information we have collected about you. Please contact us in compliance with relevant laws and regulations and where technically feasible, and we will provide you with a copy of your personal information within the relevant time period in accordance with laws and regulations.

    1. Respond to your above requests

    If you or your possible guardian, close relative or other authorized person makes the above request to us, as well as your relevant personal information rights stipulated by the laws of the People's Republic of China and other applicable laws, you may contact us to initiate a complaint and we will respond within 15 days. To protect the security of your account and your personal information, when you make the above request to us, we may first verify your identity (such as adding account verification, requiring you to provide a written request or other reasonable methods) before processing your request.

    In principle, we do not charge any fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain fee at our discretion. We may reject requests for information that is not directly related to your identity, for information that is repeatedly requested without reasonable grounds, or that require excessive technical measures (such as developing new systems or fundamentally changing existing practices), pose risks to the legitimate rights and interests of others, or are impractical.

    In the following circumstances, we will be unable to respond to your request in accordance with laws and regulations:

    1. Directly related to national security and national defense security;
    2. Directly related to public safety, public health, and major public interests;
    3. Directly related to criminal investigation, prosecution, trial and execution of judgment;
    4. There is sufficient evidence that you have subjective malice or abuse of rights;
    5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
    6. Involving trade secrets.
    7. Use of Cookies
    8. You understand and agree that in order to provide you with an easier access experience, we may use various technologies to collect and store relevant information when you visit our platform or use our services, including using small data files to identify you, understand your usage habits, save you the step of repeatedly entering registration information, or help determine the security of your account. These data files may be cookies, Flash cookies, or other local storage provided by your browser or associated applications (collectively referred to as "Cookies"). Please understand that some of our services are only available through the use of Cookies. If your browser or browser plug-in permits, you can adjust the extent to which you accept cookies or reject cookies from this software. The "Help" portion of the toolbar on most browsers will tell you how to prevent your browser from accepting new Cookies, how to have your browser notify you when you receive a new Cookie, or how to disable Cookies completely. In addition, you can disable or delete Flash Cookies and similar data used by browser add-ons by changing the settings of the browser add-on or by visiting the provider's website. However, this action may affect your secure access to this software and use of the services provided by this software under certain circumstances.
    9. If you use services provided by a third party rather than this software through this software, we may use dedicated network protocols and proxy technology (hereinafter referred to as "Proxy Technology") to ensure the security of your account and provide you with a safer access experience. Using proxy technology can help you identify high-risk sites we know of, reduce the risks of phishing and account leakage caused by them, and at the same time be more conducive to protecting the common interests of you and third parties, and preventing criminals from tampering with the normal service content between you and the third party you want to visit, including: injection caused by unsafe routers and illegal base stations, and illegal content tampering. During this process, we may also obtain and save your device's IP address, hardware ID, and the location of the pages you visit.
    10. We will not use Cookie for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your mobile device (path: Settings-Clear Cache), but if you do this, you may need to change your user settings yourself every time you use our services and products. You can also choose not to be tracked by deleting cookies and restoring (clearing) mobile terminal settings (content and data).
    11. Protection of Minors

    Our products, websites and services are intended primarily for adults. If you are a minor under the age of 18, you should read this policy in the presence of your guardian before using our products and/or services, and should ensure that you have obtained your guardian's consent before using our services and providing us with your information. If your guardian does not agree with your use of our services or provision of information to us in accordance with this Policy, please immediately terminate your use of our services and notify us in a timely manner.

    1. We attach great importance to the protection of personal information of minors. If you are a minor under the age of 18, you should obtain the consent of your guardian before using our products and/or services. We protect the personal information of minors in accordance with relevant national laws and regulations.
    2. We will not actively collect personal information directly from minors. When collecting personal information of minors with the consent of their guardians, we will only use, share, transfer or disclose this information when permitted by law, with the consent of their guardians or when necessary to protect minors.
    3. If there is evidence that a minor has registered and used our products and/or services without the consent of their guardian, we will consult with the relevant guardian and try to delete the relevant personal information as soon as possible.
    4. With regard to the personal information of children under the age of 14 that may be involved, we further take the following measures to protect it:

    1) For the collected children’s personal information, in addition to complying with the provisions of this Privacy Policy regarding user personal information, we will also adhere to the principles of legitimacy, necessity, informed consent, clear purpose, security, and legal use, and strictly follow the requirements of the "Regulations on the Protection of Children's Personal Information Online" and other laws and regulations to store, use, and disclose the information, and will not exceed the period necessary to achieve the purpose of collection and use. After the expiration of the period, we will delete or anonymize the children's personal information.

    2) When you, as a guardian, choose to use our services on behalf of your child, we may need to collect the child’s personal information from you as necessary to provide you with the services. If it is necessary to collect children’s personal information from you in specific services, we will obtain your authorization and consent in advance and inform you of the purpose and use of the collection. If you do not provide the above information, you will not be able to enjoy the relevant services we provide. In addition, when you use the order posting, review and question-and-answer functions to share product-related information, you may actively provide us with children’s personal information. Please be aware of this and choose carefully. As a guardian, you should correctly perform your guardianship duties and protect the security of children’s personal information. If the child himself needs to register or use our products and/or services, you should provide correct guidance and supervision.

    3) Children or their guardians have the right to access and correct their personal information at any time, and may also request us to correct or delete such information. If you have any comments, suggestions, complaints or reports regarding children’s personal information, please contact us. We're here to help.

    1. How to update this policy
    2. Review
    3. You can view this Privacy Policy on the [Me]-[More Settings]-[Privacy Policy] page.
    4. Please understand that in order to meet operational needs, we may develop different versions based on factors such as the mobile phone model, system version, mobile client, etc. that you are using. Therefore, when you use a specific version, the functions of this software may be different from those described in this Privacy Policy, but it will not affect the purpose, method and scope of data processing. The specific available functions are subject to your actual use.

    (II) Updates and Notifications

    1. In order to provide you with better services and as our business develops, this privacy policy will be updated accordingly. However, without your explicit consent, we will not reduce your rights under this Privacy Policy. We will issue updated versions on our website and our software and remind you of updates to relevant content through website announcements or other appropriate means before they take effect. Please visit us to keep up to date with the latest privacy policy.
    2. For major changes, we will also provide more prominent notices (we will explain the specific changes to the privacy policy through methods including but not limited to email, text messages or special reminders on the browsing page).

    Major changes referred to in this Privacy Policy include but are not limited to:

    (1) Our service model has undergone significant changes. Such as the purpose of processing personal information, the type of personal information processed, and how personal information is used;

    (2) We have experienced significant changes in our ownership structure, organizational structure, etc. Such as changes in ownership caused by business adjustments, bankruptcy and mergers and acquisitions, etc.;

    (3) The main objects of sharing, transfer or public disclosure of personal information have changed;

    (4) There are significant changes in your rights to participate in the processing of personal information and how you exercise them;

    (5) When our responsible department for handling personal information security, contact information and complaint channels change;

    (6) When the personal information security impact assessment report indicates that there is a high risk.

    1. Contact Us

    If you have any questions, comments or suggestions about this Privacy Policy or your personal information, please contact us at [starxalliance@163.com]. Generally, we will respond within 15 working days after verifying your user identity. If you are not satisfied with our response, especially if our processing of personal information has harmed your legitimate rights and interests, you may also seek a solution by filing a lawsuit in a court with jurisdiction over the defendant's place of residence.