Privacy Policy

Introduction

    Welcome to use the products and services provided by KECHUANG INFORMATION CO. LIMITED and its related companies (hereinafter referred to as "KECHUANG" or "us"). When you use our products, we may collect and use your relevant information. We promise to do our utmost to protect the privacy of users who use KECHUANG products and services (hereinafter referred to as "users" or "you").

We will update and check this privacy policy from time to time, so the relevant measures will change accordingly. We kindly ask you to check this page regularly to ensure that you are always aware of our "Privacy Policy".

This "Privacy Policy" mainly explains the following information to you:

What information we collect;

The purposes for which we collect information;

Your rights.

This "Privacy Policy" applies to all products and services under KECHUANG. When you use any of our products and services, it means that you agree with our content in this policy.

1. Information we collect

  1. Non-identifying information

When you use KECHUANG products and services, we may collect information such as the source of users and the order of access. For example, record the source of each user, browser information, etc.

  2. Registration Information

When you use the KECHUANG registration service, we may collect your personal registration information, such as: personal identification (including ID card, passport, driving license, etc.), hometown, gender, personal mobile phone number, network identity (including Account number, IP address, e-mail address and the aforementioned password, password protection information, password, password protection information, etc.).

  3. Use product equipment information

When you use KECHUANG products, we may collect your device information (including device model, device MAC address, operating system type, device settings, etc.), software list unique device identification code (such as IMEI/android ID/IDFA /OPENUDID/GUID, SIM card IMSI information, etc. that describe the basic information of personal commonly used equipment).

  4. Product related information

When you use KECHUANG products, we may collect and aggregate your game virtual currency, game balance, game type, game record and other information.

2. How we collect and use information

  1. Information provided by you

a. The information you provide to us when you register for an account of KECHUANG products and services or when you use KECHUANG products and services;

b. The shared information you provide to other parties through the KECHUANG product, and the information stored when you use the KECHUANG product;

c. Your information shared by other parties;

d. We obtain information about your use of KECHUANG products or services. Such as: log information, equipment information, network information, etc.

  2. Cookies, logs

We may obtain and use your information through cookies, and store the information as log information.

We provide users with a better web experience through the use of cookies. We use cookies for the benefit of users. For example, the login process is faster when using Zhuoxun Interactive products and services. Cookies can help us determine the pages and content you are connected to, enable us to serve you better and faster, and enable you to enjoy the services you enjoy in Zhuoxun Interactive. Richer.

You can control whether cookies are accepted by your device. Please refer to the documentation that came with your device for more information on this.

  3. We use cookies for the following purposes

a. Remember your identity. Cookies help us recognize your identity as our registered user, or save your preferences or other information you provide to us;

b. Analyze your use of our services. We can use cookies to understand which activities or services you like when using KECHUANG products.

The non-personally identifiable information collected by us using cookies for the above-mentioned purposes may be provided to other partners to analyze how you and other users use KECHUANG products and services.

Cookies may be placed on our products or services. These cookies may collect non-personally identifiable information related to you to analyze how users use our products and services. You can control cookies through user selection mechanisms or user management. If you stop using cookies, we may not be able to provide you with the best service, and some services may not be used normally.

3. We collect and use your information for the following purposes:

  1. Help you quickly complete the registration

In order for us to provide services to you, you need to provide basic registration information, such as personal identification, mobile phone number, etc., and create your user name and password.

  2. Provide you with prizes and services

a. In some service items, in order to provide you with prizes or services, you need to provide personal identification information, name, shipping address, postal code, consignee, contact phone and other information. If you refuse to provide such information, We will not be able to complete the provision of prizes or services;

b. When you contact us, we may save your communication/call records and the contact information you left, so that we can contact you or help you solve the problem;

c. In order to provide you with prizes or services, we may collect information such as logistics information and prize information of your choice, and may share it with the above-mentioned service providers.

  3. Notify you

We may issue service-related notices to you when necessary (such as suspension, maintenance, etc.) so that you can better understand the status of our services.

  4. Improve our services

We may use the information collected through a KECHUANG product for our other products. We may ask you to participate in surveys about KECHUANG products to help us improve our existing products and services or design new products and services.

  5. Provide you with security

In order to ensure the authenticity of your identity and provide you with better security, you can provide us with sensitive personal information such as identity certificates to complete real-name authentication.

In addition to identity verification, we may use your information for customer service, security prevention, fraud monitoring, archiving, and backup purposes to ensure the security of the services we provide to you; we may use or integrate your collected information. Information, as well as information that our partners have obtained your authorization or shared in accordance with the law, to comprehensively determine your account, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

4. Sharing and disclosure

  1. Share

Without your explicit consent, we will not share your information with any third party outside of KECHUANG

a. To provide you with services, we may share your information with partners or third parties, such as logistics services;

b. To achieve the purpose described in the section "How do we collect and use information" in Article 2 of this "Privacy Policy";

c. Maintain and improve our services. We may share your information with partners and other third parties to help us provide you with more targeted and improved services, such as communication service providers that send emails or push notifications on our behalf;

d. Fulfill our obligations and exercise our rights in this "Privacy Policy" or other agreements we have reached with you;

e. Sharing with third parties such as partners who entrust us to promote, but we will only provide these entrusting parties with information about the coverage and effectiveness of the promotion, and will not provide information that can identify you, such as your name, phone number or electronic Email; or we aggregate this information so that it will not identify you personally;

f. To the extent permitted by laws and regulations, in order to comply with the law, to protect the interests, property or safety of us and our affiliates or partners, you or other KECHUANG users or the public, from damage, such as to prevent fraud, etc. For illegal activities and reduce credit risk, we may exchange information with other companies or organizations;

g. Assist in handling disputes or disputes between you and others in response to your legal needs;

h. Provide your information at the legal request of your guardian;

i. Provided according to a single service agreement signed with you (including an electronic agreement signed online and corresponding platform rules) or other legal documents;

j. Provided based on academic research;

k. Provided based on the public interest in compliance with laws and regulations.

We will only share your information for legal, legitimate, necessary, specific and clear purposes. For companies, organizations and individuals with whom we share information, we will sign strict confidentiality agreements with them, requiring them to process information in accordance with our instructions, this "Privacy Policy" and any other relevant confidentiality and security measures.

  2. Disclosure

We will only disclose your information in the following situations:

a. Prerequisites for safety protection measures in compliance with industry standards;

b. With your explicit consent, disclose the information you specify according to your needs;

c. In cases where your information must be provided in accordance with the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may disclose your information based on the required information types and disclosure methods. Under the premise of complying with laws and regulations, when we receive the above request for information disclosure, we will require the recipient to issue corresponding legal documents, such as subpoenas or investigation letters.

5. Our protection and processing of your information

  1. Data security technical measures

a. We will adopt security protection measures that comply with industry standards, including establishing reasonable system specifications and security technologies to prevent unauthorized access, use, and modification of your information, and to avoid data damage or loss;

b. The network service adopts a variety of encryption technologies, such as SSL, TLS and other encryption technologies to protect your information;

c. Isolate through isolation technology;

d. When using information, such as information display and information association calculations, we will use a variety of data desensitization technologies to enhance the security of information in use. Strict data access control and multi-identity authentication technology are adopted to protect information and prevent data from being used in violation of regulations.

  2. Other security measures taken to protect information

a. Manage the storage and use of standardized information by establishing a data classification and grading system, data security management specifications, and data security development specifications;

b. Comprehensive security control of data through information contact confidentiality agreement, monitoring and audit mechanism;

c. Strengthen safety awareness. We will also organize security and privacy protection training courses to strengthen employees’ awareness of the importance of information protection.

  3. Only necessary personnel are allowed to know this information, and the knowing personnel shall not record or keep it.

To this end, a strict access authority control and monitoring mechanism is set up. We also require all personnel who may have access to your information to perform corresponding confidentiality obligations. If you fail to fulfill these obligations, you will be held accountable.

  4. We will take all reasonable and feasible measures to ensure that irrelevant information is not collected.

  5. We will try our best to ensure or guarantee the security of any information you send to us.

If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.

  6. How to deal with security incidents

a. When communicating or providing services with other parties through KECHUANG, you will inevitably disclose your information, such as mobile phone number, email address, etc., to other parties. Please protect your information properly only when necessary Provide to others

b. In order to deal with the possible risks of information leakage, damage and loss, we have formulated a number of systems to clarify the classification and classification standards of security incidents and security vulnerabilities and the corresponding processing procedures. We have also established a special emergency response team for security incidents, in accordance with the requirements of security incident handling regulations, launching security plans for different security incidents, stopping losses, analyzing, positioning, formulating remedial measures, and cooperating with relevant departments to fight;

c. In the unfortunate event of a security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation of the incident, the disposal plan we have taken or will take, and the circumstances that may occur, and you can independently prevent and reduce risks Suggestions, remedies for you, etc. At the same time, we must proactively report information security incidents and handling conditions in accordance with the requirements of the regulatory authorities;

d. Due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% information security. So you need to be aware of situations and problems that may occur due to circumstances beyond our control

6. How do you manage your own information

  1. Access, update and delete

We encourage you to update and modify your information to make it more accurate and effective. You can access your information through KECHUANG and complete it yourself according to the management method of the corresponding information or reasonably request us to modify, supplement and delete it. We will take appropriate technical means to ensure that you can access, update and correct your own information or other information provided when using Zhuoxun interactive services as much as possible.

When accessing, updating, correcting and deleting the aforementioned information, we may require you to verify your identity to ensure information security.

  2. Open and share

When you use our services, you will share information about your use of the services (such as gender, nickname, etc.). Such information can be modified after you visit by yourself. We carefully remind you not to fill in your personal information in the public information area. (Such as a nickname). We are not responsible for the leakage of your information as a result.

  3. Logout

In compliance with the KECHUANG Service Agreement and relevant national laws and regulations, your account or related information may be cancelled or deleted. After your account or related information is cancelled or deleted, the information will be processed in accordance with the Zhuoxun Interactive Service Agreement.

  4. Change the scope of your authorization

You can choose whether your information is disclosed, and you can change the scope of your authorization to continue to collect information or withdraw your authorization by deleting the information, turning off the function of the device, etc.

  5. Sensitive information

Certain information may be considered sensitive information due to its particularity, such as your race, religion, personal health and medical information, etc., as well as identification documents, personal biometric information, property information, whereabouts, information about minors, etc. . Therefore, you need to carefully consider before using the products or services we provide you. You agree that these sensitive personal information will be processed in accordance with the relevant provisions of the "Privacy Policy".

You need to carefully consider the content and information you provide in our Services.

7. third-party services

We choose reputable third parties as our partners to provide users with information and services. However, each partner has a privacy policy different from that of KECHUANG. When you enter a third-party service, the terms of KECHUANG’ privacy policy will no longer be effective. We recommend that you review the privacy policy of the third party to ensure the security of your information.

8. Restrictions on minors

Any minors participating in online activities should obtain the consent of their parents or their legal guardians in advance. We will protect the relevant information of minors and implement relevant restrictions in accordance with relevant national laws and regulations.

9. update and revision

This "Privacy Policy" has been effective since its release. We will update and revise this "Privacy Policy" from time to time in accordance with national laws and regulations. After this "Privacy Policy" is changed, if you do not accept the revised terms, you should immediately stop using KECHUANG' products and services. If you continue to use the service seven days after this "Privacy Policy" is changed, you will be deemed to accept all the revised terms.