Privacy Policy

According to the《Network Security Law of the People's Republic of China》,《Provisions on the scope of necessary personal information for common types of mobile Internet programs》and other laws and regulations, and refer to national standards such as《Information security technology personal information security specification》(GB/T35273-2020). Formulated the《Tracker - Find Family & Friend Privacy Policy》(Hereinafter referred to as "This Privacy Policy")to help you understand what information we collect, why we collect it, what we can do with it, how to protect it, and your rights as the subject of personal information, Key points include:

※The scope, purpose and method of specific functions that may collect and use personal information, as well as the possible impact of refusing to provide personal information.

※SDK collects and uses personal information, and accesses the scope, purpose, and method of device permissions.

※The device permissions that the app (and SDK) may need to call, the call purpose and its corresponding business functions, whether to ask before calling, and the way the user closes the corresponding permissions.

※How do we share and protect your personal information.

※Your rights as the subject of personal information.

Please read This Privacy Policy carefully before registering, logging in and using our services and fully understand all contents of This Privacy Policy:

※According to the 《Provisions on the scope of necessary personal information for common types of mobile Internet programs》, Tracker - Find Family & Friend App belongs to "instant messaging" App, The basic function service is "providing text, picture, voice, video and other network instant messaging services", The necessary personal information under this function is: Your mobile phone number and your account information(Account, Instant messaging contact list). You agree that This Privacy Policy only means that you have understood the functions provided by the application and the necessary personal information required for the operation of the functions, but does not mean that you have agreed that we can collect non essential personal information, which will be separately approved by you according to your authorization during your use.

※The corresponding device permissions will not be enabled by default. When you use the corresponding business functions, we will pop up a window and ask your permission again. After the permission is turned on, you can also turn off the permission at any time through device settings. If you do not agree to open the permission, it will not affect the normal use of other non related business functions. For personal sensitive information, we will deal with it with your consent alone.

一.Collection and use of personal information

(一)Specific functions and personal information to be processed

1.User registration and login

(1)Cope of necessary information and non essential information

When you use the registration and login function, we need to collect your own mobile phone number. We will verify whether your identity is valid by sending a SMS verification code to the mobile phone number. This kind of information is necessary for this function. If you do not agree to collect this kind of information, you will not be able to use the registration and login function.

(2)Third party services used

The SMS verification function needs to be realized through Netease Yunxin SMS service. Netease Yunxin will collect your mobile phone number. This kind of information is necessary for SMS verification. If you don't agree to collect this kind of information, SMS verification registration and login will not be realized. For further information, please refer to《Netease Yunxin SMS service terms》.

2.Push Notifications

(1)Cope of necessary information and non essential information

When you use the Push Notifications, we will push the following information to your mobile desktop: chat message.

When you use the Push Notifications, we will collect your network information, device model and system version information, which are necessary information for this function. If you do not agree to collect this kind of information, you will not be able to use the push function. You can manage and control the push of this part of information according to this privacy policy, including turning off the system push.

(2)Invoked sensitive permissions

The Push Notifications needs to obtain the push permission of your device. If you refuse the relevant system permission, you will not be able to use the push function.

(3)Third party services used

The Push Notifications needs to be realized through Tencent cloud im SDK, which needs to collect your network information, device model and system version information. For further information, please refer to《Tencent cloud instant messaging IM SDK Privacy Policy》.

3.Instant messaging

(1)Cope of necessary information and non essential information

When you use the instant messaging function, we need to collect your network information, device model and system version information. This kind of information is necessary for the instant messaging function. If you don't agree to collect this kind of information, you will not be able to use the instant messaging function.

In the process of using the instant messaging function, when you add friends, we will collect your friend list and your friend's personal information (Avatar, Account Number, Nickname, Gender, Personal signature). This kind of information is necessary for this function. If you do not agree to collect this kind of information, you will not be able to use this function.

In the process of using the instant messaging function, when you chat with your friends, we will collect your chat records. This kind of information is necessary for this function. If you do not agree to collect this kind of information, you will not be able to use this function.

In the process of using the instant messaging function, when you fill in your account information (avatar, nickname, gender, personal signature), we will collect your account information (Avatar, Nickname, Gender, Personal signature). This kind of information belongs to the non essential information of this function, and you can choose not to fill in it. Please know that you can still chat with your friends using the instant messaging function even if you don't fill in it.

(2)Invoked sensitive permissions

When you use the instant messaging function: if you need to send voice, you need to call the microphone permission of your device. These system permissions are unnecessary permissions of the instant messaging function, which are triggered when you use a specific function point. If you refuse the relevant system permissions, the corresponding functions will not be realized, but it will not affect you to enter text for instant messaging.

(3)Third party services used

The instant messaging function needs to be realized through Tencent cloud instant messaging IM SDK, which needs to collect your network information, device model and system version information. For further information, please refer to《Tencent cloud instant messaging IM SDK Privacy Policy》.

4.Location sharing function

(1)Cope of necessary information and non essential information

When you use the location sharing function, we need to collect your location information, which is necessary for this function. If you do not agree to collect this kind of information, you will not be able to use the location sharing function.

(2)Invoked sensitive permissions

The location sharing function requires the location permission of your device. These system permissions are necessary to realize the location sharing function and are triggered when you use specific function points. If you refuse the relevant system permissions, the corresponding functions will not be realized.

5.Region monitoring

(1)Cope of necessary information and non essential information

When you use the region monitoring, we need to collect your location information, which is necessary for this function. If you do not agree to collect this kind of information, you will not be able to use the location notification function.

(2)Invoked sensitive permissions

The region monitoring needs to obtain the location permission of your device. These system permissions are necessary to realize the position monitoring function, and are triggered when you use specific function points. If you refuse the relevant system permissions, the corresponding functions will not be realized.

(二)The collection and use of your personal information by a third-party SDK (or API)

We need to use third-party SDK (or API) technology when providing some functions and / or services. These third-party SDK (or API) may collect or use some of your personal information / device permissions. Please be aware that SDK will separately ask for consent in the form of device system pop-up when using relevant system permissions. We will carry out strict security testing on relevant SDKs (or APIs), and take technical measures to ensure that they handle personal information in accordance with this policy and any other relevant confidentiality and security measures. In addition, we will also sign agreements with companies, organizations and individuals with whom we share user information to regulate the use of user information.

We use the following third-party SDK (service)

(1)Service name: Netease Yunxin SMS service

Company: Hangzhou Netease cloud Technology Co., Ltd

Purpose: Realize SMS login verification function

Collect personal information: mobile phone number

For further information, please refer to《Netease Yunxin SMS service terms》.

(2)SDK name: Tencent cloud instant messaging IM SDK

Company: Tencent cloud computing (Beijing) Co., Ltd

Purpose: Realize online chat function

Collect personal information: Network link status, equipment model and system version.

For further information, please refer to《Tencent cloud instant messaging IM SDK Privacy Policy》.

(三)Situations requiring your authorization and consent to access system permissions

Please be aware that the system permission setting function can manage the authorization of each function module separately

When providing you with the above-mentioned basic functions, additional functions, functions to improve products / services, or the third-party SDK collects and uses your personal information, the implementation of some scenarios depends on your consent to the client (APP) and the third-party SDK to access the corresponding system permissions of the devices you use. Only when you log in and enter a specific usage scenario for the first time, the client (APP) will obtain your consent through pop-up application. You can check the opening status of various permissions one by one in your terminal device, and you can turn these permissions on or off at any time (depending on the terminal device and operating system, it may vary slightly).

Please understand that each business function requires some basic personal information to complete. When you open a certain permission, it means that you authorize us to process your corresponding personal information when necessary during the use of our services. When you close a certain permission, we cannot continue to provide you with the corresponding services, nor will we process your corresponding personal information. Your decision to close your permission will not affect the personal information processing previously carried out based on your authorization.

(四)Use of personal information after de identification / anonymization

After collecting your personal information, we can de identify or anonymize the data through technical means. You understand and agree that in this case, we have the right to use the above information to analyze the user database and make commercial use of it. For example, we will make statistics on the usage of our services, and may share these statistics with the public or third parties, but these statistics do not include any identification information of you.

二.Sharing, transfer and disclosure of personal information

(一) Share

We will not share your personal information with any third-party companies, organizations and individuals, except for the following cases:

(1)Sharing necessary for the performance of legal obligations: we may share your personal information in accordance with the provisions of laws and regulations, the necessity of litigation and dispute resolution, or the requirements of administrative and judicial organs according to law, as well as other legal obligations.

(2)Share with your consent: after obtaining your explicit consent, we will share your personal information with other parties.

Before sharing information, we will sign a strict data security and confidentiality agreement with the third party sharing personal information, requiring them to take relevant confidentiality and security measures to deal with personal information in accordance with our instructions and this privacy policy.

(二)Transfer

If we need to transfer personal information due to merger, division, dissolution or bankruptcy, we will inform you of the name or contact information of the recipient. The receiving party will continue to perform this policy and other legal obligations. If the receiving party changes the original processing purpose and processing method, it will obtain your consent again.

(三)Disclosure

We will publicly disclose your personal information only under the following circumstances:

(1)Based on your active choice and other separate consent, we may publicly disclose your personal information.

(2)If we determine that you have violated laws and regulations, or are necessary to protect the personal and property safety of other users or the public from infringement, we may disclose your personal information.

三.Protection of personal information

We attach great importance to the protection of personal information and take various measures as much as possible. In terms of information security management, it has reached the applicable level for operating this business.

(一) In terms of technical means

We have taken reasonable and feasible security measures in line with industry standards to protect your information and prevent unauthorized access, public disclosure, use, modification, damage or loss of personal information. For example, we will use encryption technology to improve the security of personal information; We will use trusted protection mechanisms to prevent malicious attacks on personal information; We will deploy access control mechanisms and try our best to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.

We have an advanced data security management system with data as the core and around the data life cycle, which improves the security of the whole system from the aspects of organization construction, system design, personnel management, product technology and so on.

However, due to technical limitations and possible malicious means, the platform does not promise the absolute security of your information. If a third party obtains the user's personal information by improper means, the platform will not bear additional responsibilities under the condition that the platform has fulfilled the obligations of the network operator in accordance with laws and regulations and this privacy policy.

(二) In terms of rules and regulations

1.Internal system

We have set up special departments and posts to be responsible for information security (posts and personnel may change with the development of the company, use technical means to monitor the operation of the platform in real time, and reasonably allocate and set the permissions of background systems for different staff; at the same time, each of our employees has signed a confidentiality agreement To ensure that there is a sound internal information security management system. In addition, we are also constantly improving the relevant systems and rules of information security, as well as strengthening the information security education for employees.

2.For other users of the platform or other third parties

If it involves the sharing, transfer and disclosure of users' personal information to other users of the platform or other third parties, we will also require them to abide by relevant rules, including the platform user agreement, this privacy policy, the confidentiality clauses in the signed relevant agreements, etc.

(三) Security incident

In order to deal with possible network attacks, security vulnerabilities, information leakage and other risk events, the platform has developed corresponding emergency plans for security events. Once a relevant incident occurs, we will deal with it quickly and report it to the relevant government departments in accordance with the requirements of laws and regulations; At the same time, we will also notify you in time in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you. Such notices will be presented by mail, letter, telephone, push notice, etc. if it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to publish the announcement.

If you find any potential security risks (such as system vulnerabilities) or personal information security incidents related to the platform, you can timely feed back to the platform and contact us.

四.Rights of users (personal information subjects)

(一)Edit information

1.Personal information: On the app side, "click on the 'Me' function module in the bottom column - click on the personal Avatar" to modify, correct, supplement, etc.

As some of your information is key to personal identification, we may need to re verify some of your personal information, or require you to resubmit new information, etc.

(二)Cancel account

If you do not need to use the services of the platform, you can apply to the platform to cancel your account. You can apply for account cancellation by clicking "my - logout account" at the bottom of the app. Please note that account cancellation is an unrecoverable operation. You need to back up the relevant information and data under your account by yourself. Please confirm that all services related to mobile phone location - finding the location of friends and family have been properly handled before operation.

After you cancel your account, you will no longer be able to use the platform's services through this account, and we will stop collecting and using your information. However, according to the relevant requirements of laws and regulations, we still need to continue to retain the relevant data and information of users in this service (including but not limited to the user's account information).

The above specific operation process may be adjusted with the upgrading of this service. We will inform you in an appropriate form and guide the operation.

五.Dealing with personal information of minors

If you are a minor over the age of 16 whose main source of livelihood is your own labor income, you have full civil capacity, and your previous relationship with the platform is fully applicable to this privacy policy.

If you are not a minor over or under the age of 16 whose main source is your own labor income, you still need to use our products with the consent and supervision of your guardian. The platform will collect, use or publicly disclose your personal information when permitted by law, with the explicit consent of your guardian, or when necessary to protect minors.

六.Data storage area

Your personal information will only be stored on servers located in China, and your information will not be actively transmitted abroad by the platform.

七.Update of privacy policy

With the development of platform operation, this privacy policy will be updated from time to time. We will remind you of the update of relevant content by pushing, email, SMS and other appropriate methods on the app side. You can also visit our privacy policy page at any time to get the latest version.

For major changes (changes in the way we collect and use your personal information will lead to a substantial reduction in your rights or a substantial increase in your obligations), we will adopt a more significant way of notification.

After you receive the above update, please read the details carefully. If you do not agree with the update of the privacy policy, the relevant functions will not be available.

八.Contact us

For any questions about this Privacy Policy and personal information (including feedback, suggestions, complaints, reports, etc.), you can contact us through the online feedback function of the product or the following ways:

Email: majianning@jiacheng.center

In order to check your problems and feed back to you in time, we may need you to submit your identity certificate, valid contact information, written request and relevant evidence. We will deal with your problem within 15 working days, and you can still give feedback to relevant government departments in accordance with laws and regulations.

Appendix:

Personal information: refers to all kinds of information recorded electronically or in combination with other information that can identify the identity of a specific natural person or reflect the activities of a specific natural person. The personal information involved in this privacy policy includes: personal basic information, personal identity information, network identity information, personal location information, etc.

Personal sensitive information: refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, and is very likely to cause damage to personal reputation, physical and mental health or discriminatory treatment. Personal sensitive information involved in this privacy policy includes: personal identity information, network identity information, etc.

Personal location information: including IP address, location (or precise positioning/rough positioning (depending on the specific device system permission management function)), Wi Fi access point, Bluetooth, base station and other information.

Unless otherwise specified, the specific terms used in this privacy policy follow the above definitions.