Privacy Policy
We, Alphant (hereinafter referred to as "the Company" or "We"), are fully aware of the importance of personal information to you and will do our utmost to ensure the security of your personal information. In view of this, we have formulated this Privacy Policy (hereinafter referred to as "this Policy") and wish to remind you of the following:
This Policy does not apply to the services provided to you by other third parties, nor does it apply to the products or services in this software that have set up a separate privacy policy.
Before using the various functions or services of this software, please be sure to carefully read and thoroughly understand this Policy. Once you start using the various functions or services of this software, it indicates that you have fully understood and agreed to this Policy. If you have any questions, comments or suggestions regarding the content of this Policy, you can contact us through the contact information provided by this software.
In accordance with the requirements of relevant laws, regulations and regulatory policies, and also to better provide you with services, we may revise this Policy from time to time. The revised Privacy Policy will be published in this software. If you continue to use the services of this software after the revision of this Policy, it indicates that you have fully read, understood and accepted the updated Privacy Policy.
This Privacy Policy will help you understand the following:
I. How We Collect and Use Your Information
II. Cookies and Other Similar Technologies
III. How We Share Your Information
IV. How We Protect Your Information
V. How You Manage Your Information
VI. How We Handle the Information of Minors
VII. Information Storage
VIII. How to Contact Us
I. How We Collect and Use Your Information
(A) Interpretation of Terms
1. In the process of registering an account or using the services provided by this software, you may need to fill in or submit some necessary information, such as the identity information required to be filled in according to laws and regulations; in order to provide better services and ensure the normal operation of certain functions, our application needs to access the following permissions:
Camera Permission: We request access to the camera of your device for the following purposes:
Scan QR Codes: To enable the function that requires scanning QR codes for various functions in the application.
Take Photos: To allow you to take and upload photos, such as setting or updating your personal profile picture.
Album Permission: We request access to the album of your device for the following purposes:
Modify User Avatar: To enable you to select and upload images from the album to set or update your personal profile picture.
2. Alphant products or services refer to: the client applications marked with the name "Alphant" and the official website of Alphant, legally owned or operated by us and our affiliates, and the products and services provided to you, including but not limited to live streaming, audio and video publishing, graphic and text publishing, corresponding browsing, recommendation, interactive rewards, and other functions.
3. Personal information refers to: various information recorded in electronic or other forms that can either alone or in combination with other information identify a specific natural person's identity or reflect the activities of a specific natural person. The personal information in this Policy includes name, date of birth, ID number, personal biometric information, address, communication and correspondence, contact information, communication records and content, account password, property information, credit information, whereabouts trajectory, accommodation information, health and physiological information, network identity information, commonly used device information, transaction information, etc.
4. Sensitive personal information refers to: personal information that, once leaked, illegally provided or abused, may endanger the safety of personal and property, and easily lead to damage to an individual's reputation, physical and mental health, or discriminatory treatment, etc. The sensitive personal information in this Policy includes ID number, email address, various passwords (passwords, protection answers, digital certificates), personal biometric information, communication records and content, personal health and physiological information, personal property information, bank account, credit information, whereabouts trajectory, accommodation information, transaction information, personal information of minors, etc.
5. Identity elements refer to: the information elements used by the product to identify your identity, such as your login name, password, SMS verification code, telephone number, mobile phone number, certificate number, and personal biometric information (such as fingerprint information, facial information).
6. Non-personal information: Through the technical processing of personal information (including anonymization, de-identification, etc.), the processed information cannot identify your personal identity alone or in combination with other information, and the processed information cannot be restored. The processed information does not belong to your personal information in the legal sense. However, when personal information is used in combination with non-personal information, this combined information will be treated and protected as your personal information in accordance with this Policy.
(B) Purposes of Collecting and Using Personal Information
We will only collect and use your personal information for the following purposes stated in this Policy:
(1) To ensure the normal operation of the product and service;
(2) To ensure the security of the product and service and the user's use;
(3) To meet the personalized product functions or service requirements;
(4) To recommend advertisements, information, activities, etc. that you may be interested in to you;
(5) To evaluate and improve the effect of advertising placement and other promotional and promotional activities;
(6) To manage the software, such as software authentication, software upgrades, etc.;
(7) To comply with laws, regulations and national standards.
When we want to use personal information for other purposes not stated in this Policy, we will obtain your prior consent. When we want to use the information collected for a specific purpose for other purposes, we will obtain your prior consent. If you do not want this software to collect and use your personal information, you have the right to turn off the relevant permissions in the settings of this software.
(C) Personal Information Collected and Used Directly by Us
1. To Ensure the Normal Operation of the Product
When you use our products, in order to ensure the normal operation of the basic functions and services of the product, you need to agree to our collection of the following information about your device (that is, the necessary mobile device information for the normal operation of the product): hardware model, operating system version number, International Mobile Equipment Identity (IMEI), network device hardware address (MAC), IP address, WLAN access point, Bluetooth, base station, software version number, operation log, network access mode, network access type, status, network quality data, operation, usage, service log, and other information.
2. Register a Product Account
(1) When you register a product account through a mobile phone number, in order to complete the registration, you need to provide a complete, receivable SMS or telephone mobile phone number. We will verify your identity by sending an SMS verification code or voice verification code. After verification and your reading and agreeing to this Policy and the "Service Agreement", the account registration is completed.
(2) When you log in to the product through a third-party account (such as Google, etc.), you need to authorize us to obtain the public information of the third-party account you use to log in (such as avatar, nickname, gender, and other information you authorize), and bind the account to your platform account. If you do not agree to authorize or refuse us to obtain the above information, you will not be able to log in to the product through a third-party account, but it will not affect your normal use of other functions of the product.
(3) After completing the product account registration, you can decide whether to complete your avatar, nickname, password, gender, personal profile, personal preferences and other network identity information. If you complete the above additional information, it will help us provide you with better services and experiences; if you do not provide the above information, it will not affect the use of the basic functions of the product.
(4) Based on our cooperation with the communication operator, when you use the "One-Click Login" function, with your express consent, the operator will send your mobile phone number to us to facilitate our provision of a quick login service. The mobile phone number is sensitive personal information. If you refuse to provide it, you will not be able to register and log in to the product by the "One-Click Login" method, but it will not affect your registration and login by other methods, nor will it affect the normal use of the functions of the product.
3. To Realize the Functions or Services of Live Streaming, Audio and Video, and Graphic and Text Publishing
When you actively conduct live streaming, publish audio and video, comment information, graphics and text, etc., we will collect the corresponding information of audio and video, graphics and text, etc., and display your nickname, avatar, and the content of the published information.
(1) When you publish audio and video, pictures, and other content or make comments, we will collect the information you publish and display your nickname, avatar, and the published content.
(2) When you use the functions of publishing pictures, live streaming, or audio and video, we will request your authorization for the camera, photos, and microphone permissions. If you refuse to authorize the provision, you will not be able to use this function, but it will not affect your normal use of other functions.
(3) When you publish audio and video, graphics and text, and other information and choose to display the geographical location, view the live streaming hot list by region, or use the "Nearby" function, we will request your authorization for the geolocation (which is sensitive personal information) permission and collect the positioning information related to the above functions. The technologies we use to collect positioning information include IP address, GPS, WLAN sensor technology, etc. If you do not agree or refuse to authorize the provision, you will not be able to use this function, but it will not affect your normal use of other functions of the product.
(4) When you use the functions or services that require identity authentication, such as publishing live streaming, making live streaming comments, or other functions that require identity authentication, according to the relevant local laws and regulations, you need to provide real identity information or conduct real-name authentication through "face recognition" and other methods to verify your identity. In the process of real-name authentication, we or the third-party authentication institution that provides authentication services to us may require you to provide real name, mobile phone number, ID number, and facial feature value information. This information is sensitive personal information and will only be used for real-name authentication and the purposes stipulated by laws and regulations. Without your explicit authorization, it will not be used for other purposes. If you refuse to provide this information, you will not be able to use the relevant functions, but it will not affect your normal use of other functions of the product.
(5) You are aware and understand that we may rely on other information (such as IP address, Wi-Fi access point, location of the mobile signal base station, GPS, WLAN sensor technology, etc.) to determine your approximate location or provide you with information and services based on such locations.
4. To Realize the Interactive Communication Function or Service
(1) When you actively follow the user accounts you are interested in and communicate and interact with other accounts, make comments, or share content, we will collect the accounts you follow and display the content published by the accounts you follow to you.
(2) When you actively like, comment, or share the audio and video, graphics and text, and other information you are interested in, we will collect the content you like, comment, or share and display or push notifications to the users you like or comment on.
(3) When you actively use virtual property to reward other users, we will collect your avatar, nickname, and reward data and display them to other users.
5. To Realize the Search Service
When you use the search service of the product, we will collect your search keyword information, log records, etc. In order to provide an efficient search service, some of the aforementioned information will be temporarily stored in your device and can show you the search results content and search history records. You can choose whether to clear the above search history records.
6. To Ensure the Security of the Product, Service, and User's Use
To help us better understand the operation of the product, determine the security of the account, conduct identity verification, detect and prevent security incidents, we may record network log information, application information, running process information, the overall operation, usage frequency, application crash situation, overall installation and usage situation, performance data, and application source of the application, etc.
7. Identity Authentication
According to laws, regulations, and regulatory requirements, when you use functions or related services such as identity authentication and withdrawal in the product, you need to provide valid identity document information (prompting you to provide valid identity document information or color photocopies or photos for our verification and retention in a timely manner), contact information, address, and other personal information to complete the multiple cross-verification of basic identity information. This information is sensitive personal information, and you can refuse to provide it. If you do not provide the aforementioned information, you will not be able to use this function, but it will not affect your normal use of other functions of the product.
(D) Personal Information Obtained from Third Parties
1. Information about you collected by us because other users use our products, such as some of your personal information contained in the information published by other users (such as information related to you in comments, messages, live streaming, published graphics and text, audio and video).
2. When you use the identity authentication function provided by the product, we will, in accordance with the relevant laws, regulations, and the necessity of the identity authentication function (such as Sesame Credit), adopt the prevailing methods in the industry and make the greatest commercial efforts to protect the security of your sensitive personal information. If you do not provide this information, you may not be able to obtain the relevant services, but it will not affect your normal use of other functions.
3. When you log in with a third-party account, you can choose to authorize the product to read and obtain the public information you have registered, published, and recorded on the third-party platform within the scope permitted by laws and regulations (including nickname, avatar). We need your authorization to obtain the above information from a third party to remember your login identity as a user, so as to provide you with better product services. We will only collect and use your personal information within the scope of your authorization.
Please note that this Policy only describes the circumstances of information collection, and the actual scope of personal information we indirectly obtain from third parties is subject to the page display. This Policy cannot serve as the privacy policy terms of third-party services. We strongly recommend that you read and understand the specific content of the service agreement and privacy policy of the third-party service before using the third-party service to understand the rules for the third-party service to collect and use your personal information, the protection it can provide, and the personal information rights you can enjoy.
(E) Changes in the Purpose of Collecting and Using Personal Information
We may make adjustments to the product as the business develops. When new functions or services are related to registration, live streaming, audio and video recommendation, advertising push, graphic and text publishing, account recommendation, interactive communication, search, query, authentication, virtual property, and other scenarios, the purpose of collecting and using personal information is the same as or related to the original purpose. In scenarios that are different from or unrelated to the original purpose, we will collect and use your personal information only after obtaining your consent again.
(F) Circumstances Where Collection and Use of Personal Information Do Not Require Consent
According to laws, regulations, and relevant national standards, we may collect and use your personal information without obtaining your authorization in any of the following circumstances:
(1) Directly related to national security and national defense security;
(2) Directly related to public safety, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and judgment execution;
(4) For the purpose of protecting the life, property, and other significant legal rights and interests of the individual information subject or other individuals;
(5) The personal information you collected is publicly disclosed by yourself to the public;
(6) Collected from legally publicly disclosed information, such as through legal news reports, government information disclosure, and other channels;
(7) Necessary for the performance of a contract signed or fulfilled at your request;
(8) Necessary for maintaining the safe and stable operation of the product, such as discovering and handling product failures;
(9) Necessary for legitimate news reporting;
(10) Academic research institutions conduct de-identification processing of personal information contained in the results when conducting statistics or academic research based on the public interest, and when providing the results of academic research or descriptions to the outside world;
(11) Other circumstances stipulated by laws, regulations, and relevant national standards.
II. Cookies and Other Similar Technologies
(A) Cookies
To ensure the normal operation of the platform, provide you with a more relaxed access experience, and recommend content that you may be interested in, we will store data files named Cookies on your computer or mobile device. With the help of Cookies, the website can store your preferences and other data.
(B) Other Similar Technologies
In addition to Cookies, we also use other similar technologies such as website beacons and pixel tags on the website. For example, the emails we send to you may contain links to the content on our website. If you click on this link, we will track this click to help us understand your preferences for our products or services so that we can proactively improve the customer service experience. Website beacons are usually transparent images embedded in websites or emails. With the help of pixel tags in emails, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
III. How We Share, Transfer, and Disclose Your Information
(A) Sharing
In the following circumstances, we will share your information with third parties or allow third parties to collect your information in our products and services:
1. Sharing in Circumstances: We may share your personal information externally in accordance with the provisions of laws and regulations, the needs of litigation dispute resolution, or the requirements of administrative or judicial organs. At the same time, if we have sufficient reasons to believe that the disclosure and sharing of information is necessary to achieve the following purposes, we will also share your information: to detect, prevent, and resolve fraud, violations of our terms or policies, or other harmful or illegal activities; to protect ourselves (including our rights, assets, or products), you, or others (including individuals involved in investigations or regulatory inquiries); or to prevent death or imminent personal injury.
2. Sharing with Affiliated Companies: To facilitate our provision of services to you based on affiliated accounts and recommend information that you may be interested in or protect the personal and property safety of our affiliated companies, other users, or the public from infringement, your personal information may be shared with our affiliated companies. We will seek your authorization for the sharing of personal information. If we need to share your personal information with affiliated companies, we will carefully evaluate the purpose of sharing the information, provide the least amount of data under the premise of achieving the purpose
3. Sharing with Third-Party Partners: We will integrate software development kits (SDKs) provided by third-party partners to help us provide and improve our products and services to provide high-quality services to users. If we need to share your personal information with such third-party partners, we will share your personal information with them under the necessary and reasonable principle. At the same time, we will exercise due diligence and strictly monitor the SDKs used by our partners to obtain information to ensure the security of the data. The types of third-party partners with whom we may share information include:
Partners using our analytics services: We provide aggregated statistical data and analysis to help users and merchants understand the usage of our services by users.
Advertisers: We provide advertisers with rich and detailed reports related to their advertising 投放 to explain which types of users have viewed their advertisements and the effectiveness of their advertisements. However, without your permission, we will not share personal information that can identify you (such as your name or email address that can be used to contact you or identify you). For example, we provide advertisers with general demographic data and interest information (such as women aged between 25 and 34, living in Chengdu, and interested in software engineering who have viewed their advertisements), to help them better understand the audience of their advertisements.
Effect measurement partners: We share information about you with companies that aggregate user information to provide analysis and effect measurement reports to our partners.
Research institutions and academic institutions: We also provide information and content to research partners and academic institutions to conduct research, promote academic achievements and innovations that can support our business or mission, and facilitate exploration and innovation focused on the well-being of the whole society, technological progress, public interests, health, and welfare.
Suppliers and service providers and other partners: We provide information and content to suppliers and service providers who support our business, including those providing technical infrastructure services, analyzing the usage of our products, providing customer service, facilitating payments, or conducting surveys.
The list of third-party SDKs we integrate is as follows:
1. [SDK Name 1]
Company Name: [Company Name 1]
Types of Data Collected by the SDK: [Data Types 1]
Purpose of the SDK: [SDK Purpose 1]
2. Firebase
Company Name: Google Inc.
Types of Data Collected by the SDK: IMEI, device model, basic device information
Purpose of the SDK: data statistics and analysis, push notifications; monitoring the performance and crash situation of users, obtaining the Android ID is an autonomous behavior of Firebase, and it will be executed after the APP is started, and we cannot intervene.
3. Jigou Technology
Company Name: Shenzhen Jigou Technology Co., Ltd.
Types of Data Collected by the SDK: IMEI, device model, basic device information, recording permission, camera permission
Purpose of the SDK: formulating strategies, voice live streaming, video live streaming
These external suppliers or third-party SDKs will collect your personal information according to the functions of the product. We will only authorize your corresponding personal information to the above external suppliers or third-party SDKs when you authorize and agree to open the relevant functions or when you actively use the relevant functions and we give sufficient prompts. For these suppliers and the companies, organizations, or individuals entrusted by us to process personal information, we will require them to process personal information in accordance with our requirements, this Privacy Protection Policy, and any other relevant confidentiality and security measures.
(B) Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
1. Transfer with Explicit Consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
2. Transfer in Case of Merger, Acquisition, or Bankruptcy Liquidation: In the event of a merger, acquisition, or bankruptcy liquidation, or other circumstances involving a merger, acquisition, or bankruptcy liquidation, we may transfer your information to the new owner, controller, or acquirer. If personal information is transferred, we will require the new company, organization that holds your personal information to continue to be bound by this Privacy Policy; otherwise, we will require the company or organization to obtain your authorization again;
3. Circumstances stipulated by relevant laws, regulations, or other circumstances agreed upon with you.
(C) Public Disclosure
We will only publicly disclose your personal information in the following circumstances:
1. After obtaining your explicit consent;
2. Disclosure Based on the Law: In the case of legal, legal proceedings, litigation, or mandatory requirements of government authorities, we may publicly disclose your personal information.
(D) Application Permissions
App Permissions
• Android:
android.permission.ACCESS_WIFI_STATE, android.permission.ACCESS_NETWORK_STATE: Allows the app to view the network/Wi-Fi status. View the network/Wi-Fi status to determine if the network is connected.
android.permission.INTERNET: Allows access to the network. Used for network communication between the App and the server.
android.permission.POST_NOTIFICATIONS: Allows access to the network. Allows the App to send notifications to the user.
android.permission.READ_MEDIA_IMAGES: Allows reading image files from the phone's storage space. Provides the function of reading images from the phone's storage space. Allows the App to read image files stored in the storage for functions such as uploading avatars (applicable to Android 13 and above systems).
android.permission.RECORD_AUDIO: Allows recording audio from the phone. Allows the App to record audio for functions such as live streaming and microphone input.
android.permission.READ_EXTERNAL_STORAGE, android.permission.WRITE_EXTERNAL_STORAGE: Write/delete the content in the SD card (write/delete/storage space/photo permission). Allows the App to write/download/save/modify/delete/view images, files, and other information, mainly used to save and view attached files.
android.permission.CAMERA: Take photos and videos. Used to help you complete functions that require this permission, such as uploading personal avatars and room avatars.
android.permission.BLUETOOTH_ADMIN: Allows the program to connect to paired Bluetooth devices. Used for live streaming audio playback.
android.permission.WAKE_LOCK: Allows the program to run in the background even after the phone screen is turned off.
• IOS:
Privacy - Camera Usage Description: Take photos and videos. Used to help you complete functions that require this permission, such as uploading personal avatars and room avatars.
Privacy - Microphone Usage Description: Allows recording audio from the phone. Allows the App to record audio for functions such as live streaming and microphone input.
Photo Library Usage Description: Allows reading image files from the phone's storage space. Provides the function of reading images from the phone's storage space. Allows the App to read image files stored in the storage for functions such as uploading avatars.
IV. How We Protect Your Information
(A) Our Protection of User Information
We will take reasonable and feasible security precautions that comply with industry-standard solutions to protect the security of the personal information you provide and prevent unauthorized access, public disclosure, use, modification, damage, or loss of personal information.
1. We have used security precautions that meet industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonable and feasible measures to protect the information you provide.
2. We have set up network request verification, md5 password storage, and enabled the firewall to detect suspicious behavior, prevent malicious attempts to obtain access permissions or damage the service (such as DDOS attacks), and set up security access policies, audit logs, and confidentiality agreements.
3. We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this Policy.
4. The Internet is not an absolutely secure environment, and email, instant messaging, and communication with other non-platform users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to assist us in ensuring the security of your account.
5. We will do our best to ensure the security of any information you send to us, but the Internet environment is not 100% secure, and we cannot guarantee the absolute security of relevant information.
6. In the event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take to address it, suggestions for you to prevent and reduce risks, and remedies for you. We will promptly inform you of the relevant situation of the incident by email, letter, telephone, push notification, or other means. When it is difficult to inform individual information subjects one by one, we will issue a notice in a reasonable and effective manner.
At the same time, we will also actively report the handling of personal information security incidents to the regulatory authorities as required.
(B) User's Custody of Information
Despite the aforementioned security measures, please properly safeguard your account, password, and other information to avoid the leakage of your information. If you find that your account, password, or other information has been illegally used by others or there is an abnormal use situation, you should promptly notify us, and we will take corresponding security protection measures.
Please note that the information you voluntarily share or publicly share when using our services may involve your or others' personal information. For example, if you choose to upload text, pictures, etc. containing personal information when posting dynamics or using our services, please consider this more cautiously.
V. How You Manage Your Information
In accordance with relevant laws, regulations, national standards, etc., we guarantee your right to exercise the following rights over your personal information, and the scope and manner of your access, modification, and deletion of personal information will depend on the specific services you use:
(A) Access to Your Personal Information
You have the right to access your personal information, except in cases stipulated by laws and regulations. If you wish to exercise your data access right, you can access it yourself through the following methods:
Account Information: If you wish to access or edit your personal profile information in the account, change your password, add security information, etc., you can click on "My" in the product client application, and then click on the personal avatar or "Settings" to perform the corresponding operations.
If you are unable to access your personal information through the above methods, you can contact us online through customer service or by sending an email, and we will respond promptly.
(B) Correction of Your Personal Information
In general, you can directly delete the content you have posted and browse, modify, and delete the information you have submitted at any time. However, for considerations of security and identity verification, you may not be able to independently modify some initial registration information (such as real-name authentication information) submitted at the time of registration; if you really need to modify such information, you can contact customer service online or send an email to submit a correction request. We will review the issues involved as soon as possible, and a dedicated person will verify your user identity and respond promptly.
(C) Deletion of Your Personal Information
In the following circumstances, you can request the deletion of your personal information:
1. If our handling of personal information violates laws and regulations;
2. If we collect and use your personal information without your consent;
3. If our handling of personal information violates the agreement with you;
4. If you no longer use our products or services;
5. If we no longer provide you with products or services.
You can feedback your request for deleting personal information to us through online customer service or by sending an email. When you delete information from our services, we may not immediately delete the corresponding information in the backup system, but will delete it when the backup is updated.
(D) Management of Your Authorization Scope
Each business function requires some basic personal information to be completed. For the collection and use of additional personal information, you can give or withdraw your authorization at any time.
Specific business functions and services require your personal information to be completed. When you withdraw your consent, we will be unable to continue to provide you with the corresponding functions and services, and will no longer use your corresponding personal information. However, your decision to withdraw your consent will not affect our processing of your personal information based on your previous consent.
If you encounter difficulties in withdrawing your consent, you can contact us through online customer service, and we will respond to your request promptly. After you complete the withdrawal of consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of your personal information based on your previous authorization.
(E) Account Cancellation
You can cancel your account in the product client application by going to "My" - "Settings" - "Privacy Settings" - "Cancel Account". Please ensure that the account you apply to cancel is the account created by you in accordance with the "User Agreement" and provided to you by us. It is recommended that you back up all information related to the account before cancellation and confirm that all services related to the account have been properly handled.
Before canceling the account, we will verify your personal identity, security status, device information, etc. If your account is involved in dispute disputes, including but not limited to complaints, reports, lawsuits, arbitrations, investigations by state authorities, you understand and agree that we have the right to decide whether to cancel the account at our own discretion, and no additional consent from you is required.
Considering the possibility of users accidentally canceling their accounts, we will provide a 30-day account appeal period from the date the user submits the cancellation request. If the user does not cancel the cancellation request during the appeal period, the account will be automatically canceled after the expiration of the appeal period; after the expiration of the appeal period, the user can use the original mobile phone number or the original third-party account to register for the product account again. You are aware and understand that after canceling the account, you will no longer be able to use the previous account or retrieve any content or information you browsed, followed, added, or bound (even if you use the same mobile phone number to register and use the product again). The act of canceling the account is an irreversible and non-recoverable act. After canceling the account, we will delete all relevant information about your product account or anonymize the relevant information, except as otherwise stipulated by laws and regulations.
To ensure security, you may be required to provide a written request or otherwise prove your identity. We may first require you to verify your identity before processing your request.
For reasonable requests, we will not charge a fee in principle, but for repeated requests that exceed a reasonable limit, we may charge a certain cost depending on the situation. For requests that are groundless, repetitive, require excessive technical means (such as the need to develop a new system or fundamentally change the current practice), pose a risk to the legitimate rights and interests of others, or are very impractical, we may refuse them.
In the following circumstances, in accordance with the requirements of laws and regulations, we will be unable to respond to your request:
1. Directly related to national security and national defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial, and judgment execution;
4. There is sufficient evidence to indicate that you have subjective malice or abuse of rights;
5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
6. Involving trade secrets.
(F) Complaint and Report
You can make a complaint or report according to the guidelines of our platform. If you believe that your rights to personal information may be infringed or discover clues to the infringement of personal information rights, you can report it through the following channels, and we will promptly feedback on your complaint and report after verification:
1. Click on the "Avatar" of the infringing user to enter the reporting interface and contact us;
2. Click on the online customer service to contact us;
3. Send an email to contact us.
(G) Access to the Privacy Policy
You can view the full content of this Policy on the registration, login page, or by clicking "My" - "Settings" - "About" - "Privacy Policy" after logging in.
(H) Notification of Rights in Case of Service Discontinuation
If we stop operating, we will promptly stop the activities of collecting your personal information, inform you of the cessation of operations by individual delivery or notification, and delete or anonymize the personal information we hold.
VI. How We Handle the Information of Minors
If you are a minor, it is recommended that your parents or guardians carefully read this Policy and use our services or provide us with information after obtaining their consent. If you are a minor, we will only use, share, transfer, or disclose your information in cases permitted by laws and regulations or necessary for the protection of minors.
We understand that the user personal information we collect and use may include the personal information of minors. We attach great importance to the protection of the personal information of minors and will strictly comply with relevant laws, regulations, and regulations to implement the responsibility for the protection of the personal information of minors, and make the following commitments:
1. Minors may not create their own user accounts without the consent of their parents or guardians;
2. Before collecting the personal information of minors, we will remind their parents or guardians to read this Privacy Policy and inform them of the relevant matters regarding our collection, storage, use, transfer, and disclosure of the personal information of minors in accordance with relevant laws, regulations, and regulations;
3. We will only collect and use the personal information of minors with the authorization of their parents or guardians and in strict accordance with relevant laws, regulations, and this Privacy Policy. We will not collect the personal information of minors that is irrelevant to the services provided;
4. We will store the personal information of minors in accordance with the methods and periods specified in Article IX of this Policy, and the storage of the personal information of minors will not exceed the period necessary to achieve the purpose of collection and use;
5. We will take measures such as encryption to store the personal information of minors to ensure information security;
6. We will not use the personal information of minors in violation of the purposes and scopes stipulated by relevant laws, regulations, or agreements. If it is necessary to use it beyond the agreed purposes and scopes due to service needs, we will obtain the consent of the parents or guardians of minors again;
7. We will follow the principle of minimal authorization, strictly set information access permissions, and control the scope of minors' personal information awareness;
8. Minors and their parents or guardians enjoy the same rights as stipulated in this Privacy Policy;
9. We will designate a person specifically responsible for the protection of the personal information of minors. If you have any questions, you can contact us through the methods specified in this Privacy Policy.
VII. Information Storage
We will take appropriate security measures and technical means to store and protect your personal information to prevent it from being lost, misused, accessed without authorization, disclosed, modified, or destroyed. Your personal information is stored on servers located in China with password control, and access is limited. We will store it in accordance with laws, regulations, and the actual needs of our company. If you terminate the use of this platform service, we will stop the collection and use of your information, except as otherwise provided by laws and regulations. If we stop operating, we will stop collecting and using your personal information.
VIII. How to Contact Us
If you have any questions, comments, suggestions, or complaints about this policy, you can contact us through online customer service.
Company Name: Alphant
Contact Address: 1606 PERWINKLE SANTA ROSA, CA 95403, US
Customer Service Email: help@alphant.ai