Privacy Policy

Date updated: July 17, 2022

Effective date: July 17, 2022

Software Name: Emotional Agents

Software developer: Shanghai Xiaowuyi Technology Co., Ltd.

Emotional Agents (hereinafter referred to as the software) and Emotional Agents developer Shanghai Xiaowuyi Technology Co., Ltd. (hereinafter referred to as us) respect and protect the personal privacy of all users who use the service. In order to provide you with more accurate and personalized services, we will use and disclose your personal information in accordance with the provisions of this Privacy Policy. However, we will treat this information with a high degree of diligence and prudence. Except as otherwise provided in this Privacy Policy, we will not disclose or provide this information to third parties without your prior permission. We will update this Privacy Policy from time to time. When you accept the contract for using the app service, you are deemed to have accepted the entire content of this privacy policy. This privacy policy is an integral part of the agreement to use.

This Privacy Policy will help you understand the following key policies:

1) In order to ensure the normal operation of the core functions and other functions of the product, we will collect some of your necessary information;

2) We will not share, provide, transfer or obtain your personal information from third parties, unless with your consent;

3) We will strive to take reasonable security measures to protect your personal information. In particular, we will adopt common methods in the industry and do our utmost commercial efforts to protect the security of your sensitive personal information;

4) How you access, correct, delete your personal information, withdraw your consent authorization, and make complaints and reports.

5) Precise geographic location, camera, and photo album permissions will not be enabled by default. They will only be used to implement specific functions or services with your express authorization, and you can also withdraw the authorization. In particular, it should be pointed out that even if we have obtained these sensitive permissions with your authorization, we will not collect your information when the relevant functions or services are not needed. Instructions for Permission Application and Usage

If you do not agree to this privacy policy and start using it, we will only collect information necessary to maintain the basic functions of this software, which will cause us to be unable to provide you with complete products and services, but we will also use de-identification , encryption and other measures to protect this information. When you use it again, it will be deemed as your acceptance and approval for us to process your relevant information in accordance with this policy, which is necessary for the fulfillment of contracts and services.

We attach great importance to the protection of users' personal information, and will treat such information with diligence and prudence. When you download, install, open, browse, and use (hereinafter collectively referred to as "use") this software and related services, we will collect, store, use, share, disclose and protect your personal information in accordance with this Privacy Policy. We hope to introduce to you how we handle your personal information through this Privacy Policy, so we recommend that you read all the terms of this Privacy Policy carefully and completely. Among them, the content related to your information and rights will remind you to pay attention in bold form, please read the following content mainly:

1. How we collect and use personal information

II. Our use of cookies and similar technologies

3. How do we store personal information

4. How do we share, transfer and publicly disclose personal information

5. How do we protect the security of personal information

6. Your rights

7. Terms of Use for Minors

VIII. Revision and notice of privacy policy

9. Scope of application

10. How to contact us

Eleven, others

1. How we collect and use personal information

During your use of the software and services, we will collect information in accordance with the principles of legality, legitimacy and necessity. The information we collect or ask you to provide will be used to:

1. Guarantee the basic normal operation of the product;

2. Realize various functions and services;

3. Optimize and improve products and services;

4. Ensure the safety of products, services and users;

(1) Personal information we actively collect and use

We will collect the information that you actively provide when using the service, and the information that you generate during the use of functions or acceptance of the service in the following ways:

1. Guarantee the normal operation of the software and services

When you use this software and related services, in order to ensure the normal operation of the software and services, we will collect your hardware model, operating system version number, network device hardware address (MAC), IP address, software version number, Network access method and type, operation logs and other information. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of products.

2. Registration, login and logout

Before registering, users should read this agreement carefully and agree to abide by this agreement before becoming a registered user. Once the registration is successful, an agreement relationship will be automatically formed between the user and the platform, and the user shall be bound by this agreement. Users must fully agree to all terms of service and complete the registration process in order to become official users of the platform.

(1) Users who have completed the registration process and passed the identity authentication through the registration system of this website become official users, and can obtain all the rights that designated users of this website should enjoy; certain membership rights. The platform reserves the right to change the design of membership rights. If the registration information provided by the user is illegal, untrue, incorrect or incomplete, the user shall bear corresponding responsibilities and consequences, and the platform reserves the right to terminate the user's use of platform services

(2) Users are obliged to ensure the security of passwords and accounts. The user shall be solely responsible for any loss or damage caused by all activities performed by the user using the password and account, and this website shall not be liable. If the user finds that the account has been unauthorized or any other security issues occur, the user should immediately modify the password of the account and keep it in a safe place. If necessary, please notify this website. This website is not responsible for illegal use of accounts due to hacking or user storage negligence.

(3) If the user finds any illegal use of user accounts or security breaches, please notify the platform immediately.

Account cancellation: Before you officially start the next step of the account cancellation process, we will make the following special instructions for you:

(1) You will no longer be able to log in and use our products and services with this account, as well as the content of services that cooperate with third parties in products and services (hereinafter referred to as "products and services").

(2) Once the account is cancelled, it cannot be recovered. If you still insist on canceling the account after careful consideration, please send an email (title: Application for account cancellation content: Please fill in the information of your registered account username, and a screenshot of your APP personal center) to lazyid@gmail.com to contact us, we will handle it for you within three working days.

3. To provide you with the permissions required for functions or services

(1) Storage permission to save cache files to improve software running smoothness

(2) Device information permissions are used to provide different functions and experiences according to different devices and system versions, obtain product usage and bug information, and help us continuously improve product functions and experiences

4. Use other third-party codes to count your information

(1) In the process of using our products, we will upload behavior information and crash logs to Google Firebase in order to reduce the impact of bugs on your use, and to change the interaction according to your behavior habits to improve the user experience Platform for statistical detailed crash logs and behavioral analysis.

(2) When you use our products, we will show you third-party advertisements, information, etc.

You can access the third-party platform privacy policy through the following link:

FireBase Privacy Policy: https://firebase.google.com/support/privacy

(3) Our products are integrated with Umeng+SDK, Umeng+SDK needs to collect your device Mac address, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information ) to provide statistical analysis services, and calibrate the accuracy of report data through geographic location to provide basic anti-cheating capabilities.

5. Guarantee the safety of products, services and users

In order to help us better understand the operation of this software and related services, so as to ensure the safety of operation and service provision, we use third-party statistical tools to record network log information, as well as the frequency of using software and related services, crash data , overall installation, usage, performance data, and other information.

Please understand that when we collect and use the above information, we have de-identified/anonymized it, and data analysis only corresponds to specific codes that cannot be directly associated with user identities.

(1) Handling of changes in the purpose of collecting and using personal information

Please understand that with the development of our business, there may be adjustments and changes to the functions and services provided by this software. In principle, when new functions or services are related to original functions and services, the personal information collected and used will be directly or reasonably related to the original purpose of processing. In scenarios that are not directly or reasonably related to the original purpose, we will notify you again and obtain your consent when we collect and use your personal information.

(2) Personal information that is legally exempt from consent collection and use

Please understand that in the following situations, in accordance with laws and regulations and/or relevant national standards, we do not need your authorization and consent to collect and use your personal information:

(1) Directly related to national security and national defense security;

(2) Directly related to public safety, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and judgment execution;

(4) In order to protect the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the consent of the individual;

(5) Your personal information collected is disclosed to the public by yourself;

(6) Your personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;

(7) It is necessary to sign and perform the contract according to your request;

(8) Other circumstances stipulated by laws and regulations.

Specially remind you that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information When or when we combine data that cannot be associated with any specific personal information with other your personal information, during the combined use, such information will be treated and protected as your personal information in accordance with this Privacy Policy.

2. Use of cookies and similar technologies

Cookies and similar technologies are commonly used technologies on the Internet. When you use the software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We may set cookies or anonymous identifiers for authentication and security to ensure the safe and efficient operation of products and services, help us improve service efficiency, and increase login and response speed. Using such technologies can also save you from repeating the steps and processes of selecting settings, and help you have an easier access experience.

3. How do we store personal information

(1) Where the information is stored

In accordance with laws and regulations, we store your personal information collected and generated during domestic operations in legal and compliant locations.

(2) Storage period

We only retain your personal information for the period necessary for the purpose of providing this software and services. After the necessary period is exceeded, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations exception.

4. How do we share, transfer and publicly disclose personal information

(1) Sharing

Respect for user privacy is one of our basic principles. Except for the following circumstances, we will not share your personal information with any company, organization or individual:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information externally in accordance with the requirements of judicial or administrative agencies.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. Disclose the personal information you specify in the disclosure method you have explicitly agreed to

2. When your personal information must be provided in accordance with the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information according to the required personal information type and disclosure method. Under the premise of complying with laws and regulations, when we receive the above request for information disclosure, we will require to issue corresponding legal documents, such as subpoenas or investigation letters.

3. Please understand that in the following situations, in accordance with laws and regulations and/or relevant national standards, we do not need your authorization to share, transfer, or publicly disclose your personal information

(1) Directly related to national security and national defense security;

(2) Directly related to public safety, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and judgment execution;

(4) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain your consent;

(5) Personal information that you disclose to the public;

(6) Personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.

5. How do we protect the security of personal information

(1) We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or without authorization access, public disclosure, use, modification, damage, loss or disclosure.

(2) We will protect your personal information with reasonable and feasible means such as encryption technology and anonymization processing that are not inferior to those of industry peers, and use security protection mechanisms to prevent malicious attacks on your personal information.

(3) We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in due course.

(4) Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if you do your best to It is impossible to strengthen security measures, and it is impossible to always guarantee 100% security of information. We will try our best to ensure the security of the personal information you provide to us. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information.

(5) We will formulate an emergency response plan, and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (disclosure, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can independently Suggestions for preventing and reducing risks, remedial measures for you, etc. We will promptly display the event-related information in the app. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

(6) We would like to remind you that the personal information protection measures provided in this Privacy Policy only apply to this software and related services. Once you leave this software and related services, browse or use other websites, services and content resources, we have no ability and obligation to protect any personal information you submit on software and websites other than this software and related services, no matter you log in, Browsing or using the above software, whether the website is based on the link or guidance of this software.

6. Your rights

We attach great importance to the management of your personal information, and do our best to protect your rights to access, modify (update or correct), delete and withdraw authorization and consent to your personal information, so that you have sufficient ability to protect your personal information. Privacy and Security.

(1) Manage and revoke authorization of your information

You can withdraw your consent, change the scope of your authorization to continue collecting personal information or withdraw your authorization by turning off functions, changing application permissions in device settings, etc. Please understand that specific business functions and services will require your information to be completed. After you withdraw your consent or authorization, we will not be able to continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.

(2) Access Privacy Policy

You can view the entire content of this privacy policy on the client's official website https://mood.xiao51.com/.

(3) Stop operations and inform you of your rights

If we stop operating, we will stop collecting your personal information in a timely manner, notify you of the notice of cessation of operation in the form of delivery or announcement one by one, and delete or anonymize your personal information held deal with.

VII. Terms for Minors

If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using this software and related services.

We protect the personal information of minors in accordance with relevant national laws and regulations, and will only collect, use, share or disclose minors when the law permits, the explicit consent of parents or other guardians or necessary to protect minors If we find that we have collected personal information of minors without prior verifiable parental consent, we will try to delete the relevant information as soon as possible.

If you are the guardian of a minor, when you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information published in this privacy policy.

VIII. Revision and notice of privacy policy

(1) In order to provide you with better services, this software and related services will be updated and changed from time to time, and we will revise this privacy policy in due course, which constitutes a part of this privacy policy and has the same meaning as this privacy policy effectiveness. However, without your explicit consent, we will not reduce your rights under the currently effective Privacy Policy.

(2) After this privacy policy is updated, we will remind you of the updated content in an appropriate way on the client side of this application before the updated terms take effect, so that you can keep abreast of the latest version of this privacy policy. If you continue to use our services, you agree to accept the revised content of this policy. However, if the updated content requires the collection of sensitive personal information such as audio and video, contact information, and geographic location, your consent will still be sought in a prominent manner.

(3) For major changes, we will also provide more prominent notices (we will use methods including but not limited to emails, text messages, private messages, or special reminders on browsing pages to indicate that there are changes to the privacy policy, please re-read carefully).

Major changes referred to in this Privacy Policy include but are not limited to:

1. Major changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;

2. We have undergone significant changes in ownership structure, organizational structure, etc. Such as business adjustments, bankruptcy mergers and other ownership changes;

3. The main objects of personal information sharing, transfer or public disclosure have changed;

4. Significant changes have occurred in your right to participate in the processing of personal information and how to exercise it;

5. When there is a change in our responsible department, contact information and complaint channels responsible for handling personal information security.

9. Scope of application

This privacy policy applies to all services provided by us and its affiliates, including this client, website, etc., and does not apply to third-party products or services that have separate privacy policies that are not included in this privacy policy. Serve.

This Privacy Policy does not apply to:

1. Other third-party products or services, which may include products or websites and advertising content displayed to you in the content provision, or other products or websites linked to in this software service;

2. Other third parties who advertise for this software service.

Your use of these third-party services (including any personal information you provide to these third parties) will be governed by the terms of service and privacy policies of these third parties (not this Privacy Policy), please read carefully the specific provisions Tripartite terms. Please properly protect your personal information and only provide it to third parties when necessary.

The software and related services described in this privacy policy may vary according to the mobile phone model, system version, software application version and other factors you use. The final products and services are subject to the software and related services you use.

10. How to contact us

1. If you have any questions, comments or suggestions about the content of this privacy policy, you can send an email to lazyid@gmail.com to contact us.

2. If you think that we have violated laws and regulations or agreed with you to collect and use your personal information, you can also send emails (if you have any questions, comments or suggestions about the content of this privacy policy, you can send Email to lazyid@gmail.com) to get in touch with us and request to delete your relevant personal information. We will confirm the problems involved as soon as possible, and reply and deal with them in a timely manner after verifying your user identity.

Eleven, others

(1) The titles in this "Privacy Policy" are for convenience and reading only, and do not affect the meaning or interpretation of any provision in this Privacy Policy.

(2) Definition of related terms in this "Privacy Policy":

1. Affiliated parties refer to any companies, institutions and legal representatives of the above-mentioned companies or institutions that are currently or in the future controlled, controlled, or under common control by a party. "Control" means the possession, directly or indirectly, of the ability to affect the management of the company in question, whether through ownership, voting shares, contracts, or otherwise as legally determined.

2. De-identification refers to the process of technically processing personal information to make it impossible to identify the subject of personal information without additional information.

3. Anonymization refers to the process of technically processing personal information so that the subject of personal information cannot be identified and the processed information cannot be restored.