（Legal related - copyright notice）
Copyright ©2018-2028 XIAO Shide. All rights reserved.
XIAO Shide owns intellectual property such as copyright, including but not limited to the entire content of the product or service that is issued or jointly issued with a partner company, and is protected by law.
Without the written permission of the owner, no unitor individual may use, copy, modify, copy or transmit any part of the aboveproducts, services, information, or materials in any way or for any reason.
All those who infringe upon their copyright andother intellectual property rights, I must pursue their legal responsibilitiesaccording to law.
If you have any questions, please contact email@example.com
Copyright ©2018-2028 XIAO Shide. All rights reserved.
XIAO Shide regards user information security and privacy protection as his "lifeline." We adhere to the "everything based on user value" philosophy, and strive to improve the transparency of information processing, enhance your convenience of information management, and protect your information and communication security.
XIAO Shide strictly abides by laws and regulations and follows the following privacy protection principles to provide you with safer and more reliable services:
Safe and reliable: We make every effort to prevent your information from being leaked, damaged or lost through reasonable and effective information security technology and management processes.
Self-selection: We provide you with convenient information management options so you can make the right choices and manage your personal information.
Protecting communication secrets: We strictly abide by laws and regulations, protect your communication secrets, and provide you with secure communication services.
Reasonable: In order to provide better service to you and other users, we only collect the necessary information.
Incorporate privacy protection into product design: We integrate various concepts such as law, product and design into all aspects of product or service development, and incorporate the concept of privacy protection.
What information we collect;
The purpose of our collection of information;
By using XIAO Shide's services, you are agreeing to what we have described in this policy. Terms used in this policy have the same meanings as in the User Agreement unless otherwise agreed.
If you have any questions, please contact us.
First, the information we collect
We collect only the information necessary to achieve product functionality based on legal, justified, and necessary principles.
Information that you provide when you use our services
1.1.1 Information you fill out when you register your account.
For example, the nickname and mobile number you filled in when you signed up for an account.
1.1.2 Information that you upload when you use the service.
For example, when you use an app, upload an avatar, shared photo.
1.1.3 Information submitted by you through our customer service or attending our events.
For example, a questionnaire you fill out when participating in our online event may include your name, phone number, home address, and more.
Some of our services may require you to provide specific personally sensitive information to achieve specific functions. If you choose not to provide this type of information, you may not be able to use certain features in the service, but it will not affect your use of other features in the service. By providing your personally sensitive information, you consent to the processing of your personally sensitive information in accordance with the purposes and methods described in this policy.
Information we get when you use the service
1.2.1 Log information. When you use our services, we may automatically collect relevant information and store it as service log information.
(1) Equipment information. For example, device model, operating system version, unique device identifier, battery, signal strength, and more.
(2) Software information. For example, the version number of the software, the browser type. To ensure the security of the operating environment or to provide services, we collect information about the mobile apps and other software you use.
(3) IP address.
(4) Service log information. For example, information you search, view, service failure information, referral URLs, etc. when you use our services.
(5) Communication log information. For example, the account, communication time, and duration that you used to communicate when using our services.
1.2.2 Location information. When you use location-related services, we may record the location of your device to provide you with relevant services.
(1) When you use the service, we may obtain your geographic location information through IP address, GPS, WiFi or base station;
(2) The information provided by you or other users when using the service may include information about your location, such as the information about your area that may be included in the account information you provided, and the geo-tagging information contained in photos shared by you or others. ;
1.2.3 Other relevant information. To help you make better use of our products or services, we collect relevant information. For example, we collect buddy lists, group list information, and voiceprint feature value information. To ensure that you can use our services to reach people you know, if you choose to enable the Import Contacts feature, we may encrypt your contact's name and phone number and collect only the encrypted information.
Information shared by other users contains your information
For example, photos posted by other users or shared videos may contain your information.
Information obtained from third-party partners
Second, how do we use the information we collect?
We strictly abide by the laws and regulations and the agreement with the users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain it to you again and obtain your consent.
Provide services to you.
Meet your individual needs. For example, language settings, location settings, personalized help services.
Product development and service optimization. For example, when our system fails, we record and analyze the information generated by the system failure to optimize our services.
Security. For example, we use your information for authentication, security, anti-fraud monitoring, archive backup, customer security services, and more. For example, security software that you download or install detects malware or viruses or identifies fraudulent information for you.
Recommend ads, news, and more that may be of interest to you.
Assess and improve the effectiveness of our advertising and other promotions and promotions.
Management software. For example, perform software certification, software upgrades, and the like.
Invite you to participate in a survey about our services.
In order to give you a better experience, improve our services or other uses that you agree to, we may use the information collected through certain services for our other services, subject to relevant laws and regulations. For example, use information about one of our services for another service to show you personalized content or ads, for user research analysis and statistics.
To ensure the security of our services and to help us better understand how our applications are performing, we may record information such as how often you use the application, fault information, overall usage, performance data, and the source of the application. We do not combine the information we store in the analysis software with the personally identifiable information you provide in the application.
We or our third-party partners may collect your information by placing secure cookies and related technologies in order to provide you with a more personalized user experience and service. We will strictly require third-party partners to comply with the relevant provisions of this policy.
Fourth, the information you share
You can share your information with your friends, family and other users through our services. For example, the text and photos you share publicly on the WeChat circle of friends. Please note that this may include sensitive information such as your personally identifiable information, personal property information. Please carefully consider disclosing your relevant personal sensitive information.
You can control the scope of your shared information through the privacy settings in our services, or you can delete your publicly shared information through the settings in the service or the guidelines we provide. However, please note that this information may still be stored independently by other users or non-associated third parties not under our control.
How do you manage your information?
You may access, modify and delete the registration information and other personal information you provide while using our services, or you may follow the notice guidelines to contact us. The scope and manner in which you access, modify, and delete personal information will depend on the specific service you use. For example, if you want to stop sharing your location information when using location-related services, you can stop sharing by using the mobile phone location shutdown feature, software and hardware service provider and communication service provider shutdown. I suggest you read the relevant guidelines carefully. .
We will collect and use your information only as described in this policy for the functionality of our products or services. If you find that we have violated laws, administrative regulations or the agreement of both parties to collect and use your personal information, you can ask us to delete it. If you find that your personal information collected and stored by us is incorrect, you can also ask us to correct it. Please contact us through the contact details listed in this policy.
When you access, modify, and delete information, we may ask you to authenticate to keep your account secure.
Please understand that due to technical limitations, legal or regulatory requirements, we may not be able to meet all of your requirements and we will respond to your request within a reasonable timeframe.
6. Information we share
We strictly restrict the sharing of information in accordance with laws and regulations, such as:
We may share your personal information with third parties with your prior consent;
For the sole purpose of external processing, we may work with third party partners (third party service providers, contractors, agents, advertising partners, app developers, etc., for example, to provide email or push notifications on our behalf. Providers, map service providers that provide us with location services) (they may not be in your jurisdiction) share your personal information and let them follow our instructions, privacy policies and other relevant confidentiality and security measures. Process the above information and use it for the following purposes:
6.2.1 provide you with our services;
6.2.2 achieve the stated purpose of the “How we use the information collected” section;
6.2.3 fulfill our obligations under the User Agreement or this Policy and exercise our rights;
6.2.4 Understand, maintain and improve our services.
If we share your information with the above-mentioned third parties, we will use encryption, anonymization and other means to protect your information.
As our business continues to develop, when mergers, acquisitions, asset transfers, etc. result in the sharing of your personal information with third parties, we will inform you of the relevant situation by means of push notifications, announcements, etc., in accordance with laws and regulations and not less than The standards required by this policy continue to protect or require new administrators to continue to protect your personal information.
We will use the information we collect for big data analysis. For example, we use the information we collect to analyze urban thermograms or industry insight reports that do not contain any personal information. We may disclose and share with our partners information that is processed without post-identification content to understand how users use our services or to inform the public about the overall usage trends of our services.
We may disclose your personal information for the following purposes:
6.5.1 Comply with applicable laws and regulations and other relevant regulations;
6.5.2 comply with the provisions of court decisions, rulings or other legal procedures;
6.5.3 comply with the requirements of relevant government agencies or other legally authorized organizations;
6.5.4 We have reason to believe that we need to comply with relevant laws and regulations;
6.5.5 Reasonable and necessary use for the protection of the personal and property safety or other legal rights of our customers, us or our affiliates, other users or employees for the purpose of implementing the relevant service agreements or this policy, safeguarding the public interest.
7. Information we may send you
We may send you emails, text messages, news or push notifications when you use our services. You can choose to unsubscribe on your device by following our tips.
Service related announcement
We may issue service-related announcements to you when necessary (for example, when a service is suspended due to system maintenance). You may not be able to cancel these announcements that are related to the service and that are not advertising.
Eight, the location and duration of the stored information
Location where information is stored
We comply with the laws and regulations and store the personal information collected by users in China.
Term of information stored
In general, we retain your personal information for the shortest period of time necessary to achieve its purpose. However, in the following cases, we may change the storage time of personal information due to legal requirements:
8.2.1 To comply with applicable laws and regulations and other relevant regulations;
8.2.2 to comply with court decisions, rulings or other legal procedures;
8.2.3 in order to comply with the requirements of relevant government agencies or statutory authorized organizations;
8.2.4 We have reason to believe that we need to comply with relevant laws and regulations;
8.2.5 The purpose reasonably necessary to protect the personal and property safety or other legal rights of our customers, us or our affiliates, other users or employees for the purpose of implementing the relevant service agreements or this policy, safeguarding the public interest.
In the event that our products or services cease to operate, we will notify you by, for example, push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time.
Nine, information security
We provide appropriate security for your information to prevent loss, misuse, unauthorized access or disclosure.
We strictly abide by laws and regulations to protect users' communication secrets.
We will use various security measures to ensure the security of information within a reasonable level of security. For example, we use encryption (eg, TLS, SSL), anonymization, and other means to protect your personal information.
We establish specialized management systems, processes and organizations to ensure information security. For example, we strictly limit the range of people accessing information and require them to comply with confidentiality obligations and conduct reviews.
In the event of a security incident such as a personal information disclosure, we will initiate an emergency plan to prevent the expansion of security incidents and inform you by push notifications, announcements, etc.
We may use your relevant information to provide you with ads that are more relevant to you on relevant websites, apps and other channels. You can learn more about the ad page.
Eleven, protection of minors
We attach great importance to the protection of personal information of minors. In accordance with the relevant laws and regulations, if you are a minor under the age of 18, you should obtain the consent of your parent or legal guardian before using Tencent's services. If you are a guardian of a minor, please contact us through the contact details in Section 13 when you have questions about the personal information of the minor you are monitoring.
Twelve, the scope of application
This policy applies to all of our services. However, some services have their own specific privacy guidelines/statements that more specifically describe how we process your information in the service. In the event of any inconsistency between this policy and the privacy guidelines/claims for a particular service, please refer to that particular privacy guide/declaration.
Please note that this policy does not apply to services provided by other companies or individuals. For example, you can use a WeChat account to log in to other companies or individuals.
Thirteen, contact us
If you have any questions about this policy or other related matters, please contact us through the contact information indicated at the bottom of the official website.
We will review the issue as soon as possible and respond within 30 days of verifying your user status.
We may revise this policy in due course. If such changes result in a substantial derogation of your rights under this Policy, we will notify you by prompting you at the prominent location on the page, by sending you an email, etc., before the change takes effect. In such a case, if you continue to use our services, you agree to be bound by the revised policy.
Part I important hints
This <Online Game End User Use License Agreement> (hereinafter referred to as" "Agreement") is a user (individual or a single entity, below, or referred to as" User ") The online network games (including any modifications, updates, all previous versions and subsequent versions of the online games) between Mr. Shoshod, hereinafter referred to as" Network game") a legal agreement to be used.
1. Protocol content
1.1 main elements:
The first part is important hint; the second part is the statement of rights; the third part is the essential clause; the fourth part is the main provision; the fifth part is the user code;
For all of the above contents, Shawsted reserves the right to make all changes according to the operational requirements, and the updated content will take effect immediately after the end of the dissenting period specified by Shawstone;
Other rules issued by Mr Shawstad on a regular or irregular basis according to operational requirements, including, but not limited to, other official information such as forum codes, codes of conduct, activity rules, definitions and interpretations of games forums.
Please note: in view of the user's habit of using online game services, users are obliged to reread the full contents of this end-user license agreement on their own initiative every month from the date of use of Xiao Shi's service, and in view of the above agreement, The user is not entitled to challenge the legal effect of the relevant terms without being informed of the above-mentioned content because of his laziness in fulfilling these obligations.
2. The obligation of Xiao Shi de
2.1 the statutory obligation of Shawstad to bring to the attention of the user in a reasonable manner will be fulfilled by:
In this Agreement, Shawsted reminds the user of the relevant provisions in a reasonable manner, such as a clear underline and a red mark sufficient to attract the attention of the user (it should be stressed that, It also includes, but is not limited to, that the user should pay particular attention to any "non-liability" or "exemption" that is not clearly marked, "shall not" refuse "or other terms in similar forms), which shall apply to this Agreement to the maximum extent permitted by the laws of China. Users shall not be entitled to install, copy, access, recharge, run client software or otherwise use online games unless they accept the full terms of this agreement.
3. Rights of users
If there is any objection to the above terms and conditions and any content of this Agreement, the user shall have the right to refuse to click on the agreement or to renew, change, and send a telegram to Shawsted within 30 days after the amendment.
Any of the following actions of the user will be regarded as a complete acceptance of the agreement by the user. This user agreement will immediately take effect and will have full legal binding on Shawsted and the user: (1) click "consent" in any link of registration, download, use, etc.; (2) using the online game products and services provided by Shawsted in any way that may or has been interacted with the online game; (3) not being updated, changed, etc., in the agreement, rules, etc., Within 30 days after the amendment by calling or sending mail to express objection to Shaoside.
4. User approval
In view of the fact that Xiao Shide has complied with the obligations of the author of the form clause in accordance with the law, The above actions of the user shall be and shall be deemed to be the legality and validity of all terms and conditions of this Agreement, in particular those to the attention of the user, which have been and shall be deemed to have been fully taken into account by the user. The user shall not claim or require the court or any other third party to confirm that the relevant terms are illegal or invalid on the grounds that Shawsted did not reasonably remind the user of his obligation to comply with the requirements of the form.
5. Minor care clause
Minors shall be accompanied by legal guardians to review and accept this Agreement. For minors under the age of 14, the legal guardian must apply for registration in the name of the legal guardian. Minor users should use "online games" and online games to a reasonable extent, and Xiao Shide has the right to restrict them according to law.
Part II Declaration of Rights
1. Intellectual property rights
This product and instructions are protected by copyright Law. All programs and graphics and texts shall not be reproduced, reproduced or modified in whole or in part without the written permission of the Licensee and the operator. All relevant product names, trademarks, brands and pictures in this product and packaging manual are owned by the licensor or Shawsted, and are the property of their respective owners.
The full content of online games (including, but not limited to, any computer code, game character names, game character information, story background, plot language, place name settings, task design, economic systems, trading systems, etc.), Production systems, social systems, confrontation functions, character images, sound effects, map props, action presentation, team systems, game concepts, art works, sound effects, music, audio and video, The intellectual property rights of the documents and game client and server software shall be owned by the Licensee, and the operator shall be entitled to the full rights of this Agreement in accordance with the law.
2. Game account
The ownership of the online game user account is owned by Xiao Shide. After the user has successfully registered, he has obtained the right to use the online game user account. Accordingly, ownership of any data information (including but not limited to account data information, character data information, etc.) generated from the game account and stored in the Shaw database belongs to Mr Shawsted. Under the premise of complying with the agreement, the user has the right to use the data information which belongs to his user account in the process of normal use of online games.
3. Virtual object
Virtual items in online game products and services, including, but not limited to, Yuanbao, gold coins, gold, game coins, virtual equipment, virtual props, etc. Ownership of any data information (including, but not limited to, virtual item data information, grade item data information, etc.) generated and stored in the Shaw database based on the virtual object shall be vested in Mr. Shaw Under the premise of complying with the agreement, users enjoy the right to use the data and information that belong to their virtual objects in the process of normal use of online games.
Part III essential provisions
1. Account registration
1.1 the user undertakes to register as Xiao Sid's user with his true identity and to guarantee that the personal identity information provided is true, complete and effective, and shall bear corresponding legal liability for the information provided in accordance with the provisions of the law and the necessary provisions.
1.2 if a user is registered as a Xiao Sid user with his true identity and needs to modify the personal identity information provided, he shall provide the service in a timely and effective manner.
2. User account usage and custody
2.1 according to the agreement of the necessary clauses, Xiao Shide has the right to examine whether the identity information provided by the user registration is true and effective, and should actively take reasonable measures such as technology and management to ensure the security and effectiveness of the user account; Users have the obligation to properly maintain their accounts and passwords, and correctly and safely use their accounts and passwords. If any party fails to fulfill the above obligations and causes the loss of the password of the account, the theft of the account, and so on, thereby causing damage to the civil rights of the user and others, he shall bear the legal liability arising therefrom.
2.2 the user has the right and responsibility for the behavior caused by the account holder after login.
2.3 if a user discovers that his account or password has been illegally used or has abnormal use, he shall promptly notify the account according to the manner of handling published by Shawsted, and shall have the right to notify him to take measures to suspend the login and use of the account.
2.4 if Shawstad takes measures to suspend the login and use of the user's account on the basis of the notice of the user, he shall require the user to provide and verify the valid personal identity information consistent with his or her registered identity information.
2.4.1 if Shawsted verifies that the valid personal identity information provided by the user is consistent with the registered identity information, he shall take timely measures to suspend the login and use of the user's account.
2.4.2 if Shawstad violates the agreement of 2.4.1 and fails to take timely measures to suspend the login and use of the user's account, thereby causing losses to the user, he shall bear the corresponding legal liability.
2.4.3 if a user fails to provide his or her personal valid identity document or the personal valid identity document provided by the user is inconsistent with the registered identity information, Shawstad has the right to reject the user's above request.
2.5 in order to safeguard their legitimate rights and interests and to provide Xiao Side with valid personal identity information consistent with the registered identity information, BobWalker shall provide the user with the necessary assistance and support, such as the account registrant's certificate, the original registration information, etc., And provide relevant evidential information to relevant administrative organs and judicial organs as necessary.
3. Termination and termination of service
3.1 users who publish illegal information, seriously violate social morality, and other acts that violate the prohibition of law, shall immediately terminate the provision of services to users.
3.2 if a user acts improperly in accepting Shawsted's service, he shall have the right to terminate the service to the user. The circumstances of the misconduct shall be expressly agreed upon in this Agreement or shall be prohibited by the termination of the service as expressly notified in advance by Shawstad, otherwise he shall not terminate the service to the customer.
3.3 if the user provides false registration identity information or commits a violation of this Agreement, Shawsland shall have the right to discontinue all or part of his services to the user; he shall notify the user of the suspension and inform him of the duration of the suspension, Suspension period should be reasonable, the termination of the expiry of Shaoside should be timely restoration of customer services.
3.4 in the event of the termination or termination of some or all of the services provided to the customer under this Article, the burden of proof shall be upon him.
4. User information protection
4.1 when requesting users to provide information related to their personal identity, Shawstad should disclose his privacy protection policy and personal information utilization policy to the user in a clear and visible manner in advance, And take necessary measures to protect the user's personal information data security.
4.2 without the user's permission, Shawsted shall not provide to any third party, disclose or share the personal identity information in the user's registration information, the number of the personal valid identity document, the contact information, the home address, etc., except in the following cases:
4.2.1 the disclosure is authorized by the user or guardian of the user;
4.2.2 where the relevant law requires the disclosure of Shawstad;
4.2.3 the judicial or administrative authorities require Shawstad to provide them on the basis of due process;
4.2.4 when Shawstad brings an action or arbitration against the user in order to safeguard his legitimate rights and interests;
4.2.5 when the user's personal identity information is provided at the legal request of the user's guardian.