User Privacy tkesj Our company (i.e. tkesj Network Services Co., Ltd., hereinafter referred to as "we") is well aware of the importance of personal information to you and will do our best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and abide by the following principles , to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of least sufficiency, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information based on mature security solutions in the industry. In view of this, we have formulated this "User Privacy Policy" (hereinafter referred to as "this policy/this privacy policy") and remind you: This policy applies to tkesj products or services. It should be noted that this policy does not apply to services provided to you by other third parties, nor does it apply to products or services in tkesj that have independently set privacy policies. Before using tkesj's products or services, please be sure to carefully read and thoroughly understand this policy, and use relevant products or services after confirming that you fully understand and agree. Once you start using tkesj's products or services, it means that you have fully understood and agreed to this policy. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the various contact methods provided by tkesj. This privacy policy section will help you understand the following: 1. How we collect and use your personal information 2. How we share, transfer and publicly disclose your personal information 3. How we protect your personal information 4. How do you manage your personal information? 5. How we handle minors’ personal information 6. How your personal information is transferred globally 7. How to update this privacy policy 8. How to contact us 1. How we collect and use your personal information Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or combined with other information or reflect the activities of a specific natural person. We will collect and use your information for the following purposes described in this policy. personal information: (1) Help you become our user To complete creating an account so that we can provide you with services, you need to provide the following information: your nickname, avatar, gender, mobile phone number, and create a username and password. The above information you provide will continue to be authorized for use by us during your use of this service. When you actively cancel your account, we will make it anonymous or delete your personal information as soon as possible in accordance with the requirements of applicable laws and regulations. 1. Information you provide to us Relevant personal information you provide to us when registering an account or using our services, such as phone number, etc.; Shared information you provide to other parties through our services, and information stored when you use our services. Before providing the aforementioned personal information of other parties to tkesj, you need to ensure that you have obtained their authorization and consent. 2. Information we collect when you use the service To ensure the authentication and security of account information, we will ask you to provide user device information (specifically, device model, operating system, unique device identifier (IMEI/AndroidID/IDFA/DEVICE_ID/OpenUDID/GUID/SIM card IMSI information), Network device hardware address (MAC), login IP address, software version number, network access method, type and status, network quality data, device accelerator (such as gravity sensing device), operation log information) permissions, used to uniquely identify and interface encryption. In order to provide you with page display and search results that better suit your needs, understand product suitability, and identify abnormal account status, we will collect information about the services you use and how you use them, and associate this information. This information includes: Device information: We will receive and record information related to the device you use based on the specific permissions you grant during software installation and use, including device MAC address, device ID, unique device identification code (such as IMEI, IDFA), and mobile phone number. Basic configuration information (such as CPU, memory, screen, mobile phone model, operating system, etc.), network information (such as WIFI and cellular network information, IP address, etc.), etc. The above information you provide will continue to be used by us during your use of the service. When you no longer use the relevant services, we will stop using and delete the above information. The above information will be stored within the territory of the People's Republic of China. If cross-border transmission is required, we will obtain your authorization separately. Please note that individual device information, log information, etc. are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, such non-personal information will be treated as personal information during the period of combined use, unless we obtain your authorization. Unless otherwise provided by laws and regulations, we will anonymize and de-identify such personal information. When you contact us, we may save your communication/call records and content or the contact information you left and other information in order to contact you or help you solve the problem, or record the solutions and results of related problems. (II) Instructions for calling tkesj device permissions 1. Read phone status permission: When you run tkesj, we will apply to you for this permission in order to normally identify your local identification code in order to complete security risk control, statistics and message push. If you do not want to receive relevant push information, you can turn off the corresponding push in "My-Notification and Sound" of tkesj. 2. Read and write external storage permission: When you use the services such as scanning, avatar settings, sending pictures or videos in chat, downloading files to local or opening and using local files in tkesj, you can use or save pictures, videos or files by turning on storage permissions. If you do not turn on this permission, you will not be able to use functions related to memory card reading or caching, but it will not affect your use of other services. 3. Album permission: When you use the services such as scanning, avatar settings, chatting or sending pictures or videos in Moments in tkesj, you can turn on album permissions to upload pictures or videos in the device. If you do not turn on this permission, you will not be able to use functions related to uploading pictures or videos, but it will not affect your use of other services. 4. Camera permissions: When you use the services such as scanning, avatar setting, chatting or sending pictures or videos in tkesj, you can enable camera permissions to take real-time photos and upload pictures or videos for sharing, set avatars, etc. If you do not enable this permission, you will not be able to use the functions related to picture or video shooting, but it will not affect your use of other services. 5. Location permissions: When you use the chat and friend circle in tkesj to send location, you can enable location permissions to share your current location. If you do not enable this permission, you will not be able to share your current location, but it will not affect your use of other services. 6. Microphone permissions: When you use voice chat in tkesj, you can enable microphone permissions to send voice to your contacts. If you do not enable this permission, you will not be able to use voice chat related functions, but it will not affect your use of other services. 7. The permissions we apply for will be consistent with the service functions provided. If the business functions we provide are adjusted, the device permissions we apply for will also be adjusted accordingly. We will separately prompt whether to enable or not when we call the device permissions for the first time, and you can set these functions independently in the device settings. Please note that when you enable these permissions, you authorize us to collect and use these personal information to achieve the above functions. When you disable permissions, you cancel these authorizations, and we will no longer collect your personal information and will not be able to provide you with the above functions corresponding to these authorizations. Your decision to disable permissions will not affect the processing of personal information previously performed based on your authorization. (III) Exceptions to obtaining authorization and consent According to relevant laws and regulations, your authorization and consent is not required for collecting your personal information in the following circumstances: 1. Related to national security and national defense security; 2. Related to public security, public health, and major public interests; 3. Related to criminal investigation, prosecution, trial, and execution of judgments; 4. For the purpose of safeguarding the major legitimate rights and interests of the subject of personal information or other individuals, such as life and property, but it is difficult to obtain your consent; 5. The personal information collected is disclosed to the public by you on your own; 6. Personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels; 7. Necessary for signing a contract according to your requirements; 8. Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and handling product or service failures; 9. Necessary for legal news reports; 10. Necessary for academic research institutions to conduct statistical or academic research based on public interests, and when providing the results of academic research or descriptions to the outside world, the personal information contained in the results is de-identified; 11. Other circumstances stipulated by laws and regulations. If we cease operating tkesj products or services, we will promptly stop collecting your personal information, notify you of the cessation of operations by individual delivery or announcement, and delete or anonymize the personal information we hold. II. How do we share, transfer, and publicly disclose your personal information? (I) Sharing We will not share your personal information with companies, organizations and individuals other than tkesj service providers, except in the following circumstances: 1. Sharing with explicit consent: We will share your personal information with other parties after obtaining your explicit consent. 2. Sharing under legal circumstances: We may share your personal information externally in accordance with the provisions of laws and regulations, the needs of litigation dispute resolution, or the requirements of administrative and judicial authorities in accordance with the law. 3. Sharing with affiliated companies: In order to facilitate us to jointly provide you with services based on associated accounts, recommend information that may be of interest to you, or protect the personal and property safety of tkesj affiliated companies or other users or the public from infringement, your personal information may be shared with our affiliated companies. We will only share necessary personal information (for example, in order to facilitate you to use our affiliated company products or services using tkesj accounts, we will share your necessary account information with affiliated companies). If we share your personal sensitive information or the affiliated company changes the use and processing purpose of personal information, we will ask for your authorization and consent again. 4. Sharing with authorized partners: For the purpose of achieving the purposes stated in this privacy policy, some of our services will be provided jointly by us and authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, we may arrange for partners to provide services. We will only share your personal information for legitimate, proper, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for other purposes unrelated to products or services. 5. We may link to social media or other services (including websites or other service forms) provided by third parties. Including: (1) You can use the "Share" button to share some of our content to third parties. These features may collect your information (including your log information) and may install COOKIES in your device to operate the above features normally; (2) We provide you with links through advertisements or other means of our services so that you can access third-party services or websites; and (3) Other situations of accessing third-party services. For example, to achieve the purposes stated in this Privacy Policy, we may access third-party SDK services and share some of your information collected by us in accordance with this policy with such third-party service providers in order to provide better customer service and user experience. At present, the third-party service providers we access mainly include the following types: 2. Used for mobile phone manufacturers' Push 3. Used for audio and video content storage services 6. Used to obtain your location information with your consent (II) Transfer We will not transfer your personal information to any company, organization or individual, except in the following cases: 1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties; 2. In the case of mergers, acquisitions or bankruptcy liquidation, or other mergers, acquisitions or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this policy, otherwise we will require the company, organization and individual to re-ask your authorization consent. (III) Public Disclosure We will only publicly disclose your personal information in the following circumstances: 1. We may publicly disclose your personal information with your explicit consent or based on your active choice; 2. If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of tkesj, or to protect the personal and property safety of tkesj and its affiliated companies, users or the public from infringement, we may disclose your personal information with your consent in accordance with laws and regulations or relevant agreement rules of tkesj, including relevant violations and measures that tkesj has taken against you. (IV) Exceptions to obtaining prior authorization and consent when sharing, transferring, and publicly disclosing personal information In the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent: 1. Related to national security and national defense security; 2. Related to public security, public health, and major public interests; 3. Related to criminal investigation, prosecution, trial, and execution of judgments; 4. For the purpose of safeguarding your or other individuals’ major legal rights and interests such as life and property, but it is difficult to obtain the consent of the person concerned; 5. Personal information that you disclose to the public on your own; 6. Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure, and other channels. According to legal provisions, sharing and transferring de-identified personal information and ensuring that the data recipient cannot restore and re-identify the subject of the personal information does not constitute external sharing, transfer, and public disclosure of personal information, and the preservation and processing of such data will not require separate notification to you and your consent. III. How do we protect your personal information security? (I) We have adopted reasonable and feasible security measures that are in line with the industry's general solutions to protect the security of the personal information you provide and prevent personal information from being accessed, disclosed, used, modified, damaged or lost without authorization. (II) We have an industry-leading data security management system that focuses on data and revolves around the data life cycle, which improves the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. (III) We will take reasonable and feasible measures to try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period required to achieve the purposes stated in this policy, unless the retention period needs to be extended or permitted by law. (IV) The Internet is not an absolutely safe environment. We strongly recommend that you do not use communication methods not recommended by tkesj to send personal information. You can establish connections and share with each other through our services. If you find that your personal information, especially your account or password, has been leaked, please contact tkesj customer service immediately so that we can take corresponding measures based on your application. Please note that the information you voluntarily share or even publicly share when using our services may involve your or others' personal information or even personal sensitive information, such as when you post dynamics or choose to upload pictures containing personal information in public places such as group chats and circles. Please consider more carefully whether to share or even publicly share relevant information when using our services. Please use a complex password to help us ensure the security of your account. We will do our best to ensure the security of any information you send to us. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities. IV. How do you manage your personal information? You can access and manage your personal information in the following ways: (I) Access your personal information You have the right to access your personal information, except for exceptions stipulated by laws and regulations. You can access your personal information by yourself through the methods provided by the application: If you cannot access your personal information, you can contact us at any time through tkesj customer service. We will respond to your access request within 30 days. (II) Correct or supplement your personal information When you find that there is an error in the personal information we process about you, you have the right to ask us to make corrections or supplements. You can apply for corrections or supplements in the ways listed in "(I) Access your personal information" of this article. (III) Delete your personal information You can delete some of your personal information in the ways listed in "(I) Access your personal information" of this article. In the following circumstances, you can ask us to delete personal information: 1. If our processing of personal information violates laws and regulations; 2. If we collect and use your personal information without your explicit consent; 3. If our processing of personal information seriously violates the agreement with you; 4. If you no longer use our products or services, or you actively cancel your account; 5. If we no longer provide products or services to you permanently. If we decide to respond to your deletion request, we will also notify the subject that obtained your personal information from us as much as possible and request it to delete it in a timely manner, unless otherwise provided by laws and regulations, or these subjects obtain your independent authorization. When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated. If you need to cancel your account, you can choose to cancel your account in "My-Account and Security-Destroy Account" of tkesj. The cancellation will take effect immediately, and the account will be automatically destroyed (including offline message records, contacts and all other account information will be deleted). If you log in with the account again, it will be a new account. (IV) Constraining information system automatic decision-making In some business functions, we may make decisions only based on non-manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legal rights and interests, you have the right to ask us for an explanation, and we will also provide a complaint method without infringing on tkesj's trade secrets or other user rights and interests and social public interests. (V) Responding to your above request To ensure security, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. We will respond within 30 days. If you are not satisfied, you can also file a complaint through tkesj customer service. In principle, we do not charge any fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee as appropriate. We may reject requests that are repeated without reason, require too many technical means (for example, the need to develop new systems or fundamentally change current practices), pose risks to the legitimate rights and interests of others, or are very impractical. In the following circumstances, in accordance with the requirements of laws and regulations, we will not be able to respond to your request: 1. Related to national security and national defense security; 2. Related to public security, public health, and major public interests; 3. Related to criminal investigation, prosecution, trial and execution of judgments; 4. There is sufficient evidence that the subject of personal information has subjective malice or abuses rights; 5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations; 6. Involving commercial secrets. V. How do we handle personal information of minors? Without the consent of their parents or guardians, minors are not allowed to create their own user accounts. If you are a minor, we recommend that you ask your parents or guardians to read this privacy policy carefully and use our services or provide us with information with the consent of your parents or guardians. For the collection of personal information of minors through the use of our products or services with the consent of their parents or guardians, we will only use this information when permitted by laws and regulations, with the explicit consent of parents or guardians, or when it is necessary to protect minors. VI. How your personal information is transferred globally The personal information we collect and generate during operations is stored in the cloud data center, except in the following circumstances: 1. Clearly stipulated by laws and regulations; 2. Obtain your explicit authorization; For the above circumstances, we will ensure that your personal information is adequately protected in accordance with this privacy policy. VII. How to update this privacy policy Our privacy policy may change. We will not limit your rights under this Privacy Policy without your explicit consent. For major changes, we will provide prominent notifications (including notifications through tkesj announcements and even pop-up prompts to you). Major changes referred to in this policy include but are not limited to: 1. Our service model has undergone major changes. Such as the purpose of processing personal information, types of personal information processed, how personal information is used, etc.; 2. We have major changes in control and other aspects. Such as changes in owners caused by mergers, acquisitions, reorganizations, etc.; 3. Significant changes in your rights to participate in the processing of personal information and how you exercise them; 4. When our responsible department, contact information and complaint channels for handling personal information security change; 5. When the personal information security impact assessment report indicates that there is a high risk.