Welcome to use the Lane APP! We attach great importance to the protection of your privacy and personal information. This privacy policy applies to Lane APP.。
This privacy policy is designed to help you understand what data the APP collects, why it collects it, what it does with it, and how to protect it. Please be sure to read this privacy policy carefully and use the Lane APP after confirming that you fully understand and agree. If you or your guardian do not agree with any content of this Privacy Policy, you should immediately stop using it。
This Privacy policy will help you understand the following:
1、What information we collect and how we use it
2、How do we use cookies and similar technologies
3、How do we share, transfer and publicly disclose your personal information
4、How do we keep and protect your personal information
5、Your Rights
6、How do we handle minors' personal information
7、How can your personal information be transferred across borders
8、How is this policy updated
9、Other Privacy Agreements
10、How to Contact us
We understand the importance of personal information to you and that effective protection of your information is the cornerstone of the healthy and sustainable development of our business. Thank you for your use and trust in the trap! We are committed to maintaining your trust in us by adhering to the following principles to protect your personal information: the principle of alignment of rights and responsibilities, the principle of clear purpose, the principle of consent by choice, the principle of minimum sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency。
We make a solemn commitment,We will take appropriate security measures to protect your personal information according to the mature security standards of the industry。
Personal information refers to all kinds of information recorded electronically or by other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information。
In order to provide you with better and more personalized products and services, when you use the following services, functions or Settings, we will collect and use your personal information in the following ways:
Registration Information。You use the Lane service to log in to a registered Lane account. When registering a secret account, you need to provide us with the following information: account name, profile picture, and create a password。
Log Information。When you use the Lane account service, our server will automatically record your log information, such as the picture information you upload, hardware device information, operating system version, network operator information, etc。
(1)Please note: In the following cases, the collection and use of personal information does not require prior authorization from you:
a)Directly related to national security and national defense security;
b)Directly related to public safety, public health or major public interests;
c)Directly related to the investigation, prosecution, trial and execution of judgments of crimes;
d)In order to protect your or other personal life, property and other major legal rights and interests, but it is difficult to get the consent of the person;
e)The collected personal information is disclosed to the public by yourself;
f)Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
g)Necessary to provide you with a product or service according to your requirements;
h)It is necessary to maintain the safe and stable operation of the provided product or service, for example, to find and troubleshoot faults of the product or service;
i)Other circumstances prescribed by laws and regulations。
After collecting your personal information, we will anonymize the data in a timely manner through technical means。
In the process of providing a service, some of your device permissions are invoked. The following is the service function corresponding to the secret invocation permission, the purpose of the invocation permission, and the information asked before the invocation permission。
You can disable some or all of the permissions on the device to disable the collection of personal information. The display mode and disabling mode of permission may vary depending on the device. For details, see the device and system developer's instructions or guidelines。
Cookie and anonymous identifier tools。Cookies are a mechanism that enables the server (or script) to store and retrieve information on the client. When you use a secret product or service, we send one or more cookies or anonymous identifiers to your device. When you interact with the secret service, we allow cookies or anonymous identifiers to be sent to Baidu servers. Cookie It usually contains an identifier, a site name, and some numbers and characters. Using Cookie technology, the secret can understand your use habits, remember your preferences, save you the step of entering repeated information, provide you with more thoughtful personalized service, or help you judge the security of your account. Cookies can also help us count traffic and analyze page design and advertising effectiveness。
We do not use cookies for any purpose other than those described in this policy. You can manage or delete cookies based on your preferences。
1. We will treat your information with a high duty of care. With your express consent, we will share your personal information with other parties. We may share your personal information in accordance with laws and regulations, or in accordance with laws and regulations, legal procedures or mandatory government requirements or judicial decisions.
2. Some of our services will be provided by authorized partners only for the purposes stated in this Privacy Policy. We may share some of your personal information with our partners in order to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific and explicit purposes, and only the personal information necessary for the provision of services. Our partners have no right to use the shared personal information for any other purpose.
3. We will investigate the data security environment of the companies, organizations and individuals with whom we share personal information, sign strict confidentiality agreements with them, and require them to handle personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.
4. We will not transfer your personal information to any company, organization or individual except in the following cases:
(1) Obtain your express authorization or consent in advance;
(2) meet the requirements of laws and regulations, legal procedures or mandatory government requirements or judicial decisions;
(3) If we or any of our affiliates are involved in a merger, division, liquidation, acquisition or sale of assets or businesses, and your personal information is likely to be transferred as part of such transaction, we will ensure the confidentiality of such information during transfer. And do our best to ensure that the new company or organization holding your personal information continues to be bound by this privacy policy, otherwise we will require the company or organization to ask you for authorization again.
(1) Obtain your express consent;
(2) based on laws and regulations, legal procedures, lawsuits or mandatory requirements of competent government departments.
6. Exceptions to prior authorization for sharing, transferring or publicly disclosing personal information
Sharing, transferring or publicly disclosing personal information does not require prior authorization from the subject of personal information under the following circumstances:
(1) Directly related to national security and national defense security
(2) directly related to public security, public health and major public interests;
(3) directly related to criminal investigation, prosecution, trial and execution of judgment;
(4) In order to protect the life, property and other major legal rights and interests of the subject of personal information or other individuals, but it is difficult to get the consent of the person; Personal information disclosed to the public by the subject of personal information; Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
1. Retention period. During your use of Secret products and services, we will keep your personal information for you. If you cancel your account or delete the above information voluntarily, the secret will continue to save your information within 6 months after your deletion according to the Network Security Law and other laws and regulations. During this period, we will not use your personal information commercially.
2. Save the region. Your personal information is stored in the People's Republic of China. If cross-border transmission is required, we will obtain your authorization and consent separately.
3. Safety measures.
(1) We will collect, use, store and transmit user information under the principle of "minimization", and inform you of the purpose and scope of the use of relevant information through the user agreement and privacy policy.
(2) We attach great importance to information security. We have set up a special team responsible for the development and application of a variety of security technologies and procedures, we will conduct security background checks on security management leaders and personnel in key security positions, and we have established a sound information security management system and internal security incident handling mechanism. We will store and protect your personal information with appropriate industry-standard security measures and technical means to prevent the loss, unauthorized access, public disclosure, use, damage, loss or disclosure of your information. We will take all reasonably practicable measures to protect your personal information. We will use encryption technology to ensure the confidentiality of data; We use trusted protection mechanisms to protect our data from malicious attacks.
(3) We will cultivate employees' awareness of data security and conduct training and assessment of security ability to strengthen their understanding of the importance of protecting personal information. We will conduct identity authentication and authority control for employees who handle personal information, and will sign confidentiality agreements with employees and partners who have access to your personal information, clarify job responsibilities and code of conduct, and ensure that only authorized personnel can access personal information. If violates the confidentiality agreement, the cooperation with us will be terminated immediately, and will be investigated for relevant legal responsibilities. The personnel who contact personal information are also required to keep confidential when they leave their post.
(4) We remind you that the Internet is not an absolutely safe environment. When you interact with other users about your geographical location or whereabouts through third-party social software, email, SMS embedded in the secret box, you are not sure whether the third-party software will fully encrypt the information transmission. Pay attention to ensure the safety of your personal information.
(5) We also ask you to understand that in the Internet industry, due to the limitation and rapid development of technology and the possible existence of various malicious attack means, even if we do our best to strengthen security measures, it is impossible to ensure the security of information 100%. Please understand that your use of our products and/or services by systems and communication networks may cause security problems in other links outside our control.
According to our security management system, personal information disclosure, damage or loss is classified as the most extreme security incident, once it occurs, the company will launch the highest level of emergency plan, The security department, government relations department, legal department and other departments to form a joint emergency response team to deal with.
4. Security Incident notification
(1) We will formulate an emergency plan for network security incidents to timely deal with system vulnerabilities, computer viruses, network attacks, network intrusion and other security risks. In the event of an incident endangering network security, we will immediately start the emergency plan, take corresponding remedial measures, and report to the relevant competent authorities in accordance with regulations.
(2) Disclosure, damage and loss of personal information are major security events of the company level. We will be responsible for regularly organizing members of the working group to conduct security plan drills to prevent the occurrence of such security events. In the event of an unfortunate occurrence, we will activate the emergency response plan with the highest priority and form an emergency response team to trace the cause and reduce the damage in the shortest possible time.
(3) In the event of an unfortunate personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, suggestions on risks that you can independently prevent and reduce, and remedial measures for you. We will timely inform you of the relevant information through the site notification, SMS notification, phone call, email and other contact information you have reserved. If it is difficult to inform you one by one, we will take a reasonable and effective way to release announcements. At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
In accordance with the relevant laws, regulations and standards of China, as well as the common practices of other countries and regions, we guarantee you to exercise the following rights with your personal information:
1, access.
2, right of correction. When you find that there is a mistake in your personal information processed by us, you have the right to correct or update the wrong or incomplete information after verifying your identity and the correction does not affect the objectivity and accuracy of the information. You can make the correction yourself in the secret box, or submit your application for correction to us through feedback and error reporting.
3, Delete right. You may request us to delete your personal information under the following circumstances:
(1) If we terminate the product operation and service of the Secret;
(2) If you log out of the account, we will delete your personal information or do anonymous processing;
(3) involving trade secrets.
If we collect, use, share or transfer your personal information in violation of laws and regulations or agreements with you, you have the right to request us and a third party to delete it.
If we publicly disclose your personal information in violation of laws and regulations or the agreement with you, you have the right to request us to immediately stop the public disclosure and issue a notice requiring the relevant recipient to delete the relevant information.
If we decide to respond to your removal request, we will also notify the entities from whom we have obtained your personal information and require them to remove it in a timely manner, unless otherwise required by law or regulation, or unless such entities are independently authorized by you.
After you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.
4. Revocation right. Every business function requires some basic personal information to be performed. You may give or withdraw your authorized consent to the collection and use of additional personal information at any time.
5, know the right to stop operation of products and services in advance. We are willing to accompany you all the time. If we are forced to stop operation of our products and services due to special reasons, we will notify you 15 days in advance by sending you an email or other appropriate means to reach you on the homepage or website of our products or services, and we will stop collecting your personal information. At the same time, we will delete or anonymize your personal information in accordance with the law. For security purposes, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We'll give you a reply within 30 days.
For your reasonable request, we do not charge in principle, but for repeated requests, beyond the reasonable limit, we will charge a certain cost according to the circumstances. We may reject requests that are unnecessarily repetitive, require too much technology (e.g., development of new systems or fundamental changes to existing practices), pose a risk to the legitimate interests of others, or are highly impractical (e.g., involving information stored on backup tapes).
6. Under the following circumstances, according to the requirements of laws and regulations, we will not be able to respond to your request to correct, delete or cancel the information:
(1) directly related to national security and national defense security;
(2) directly related to public security, public health and major public interests;
(3) directly related to criminal investigation, prosecution, trial and execution of judgments;
(4) We have sufficient evidence that you have subjective malice or abuse of rights (such as your request will endanger public security and the legitimate rights and interests of others, or your request is beyond the scope of general technical means and business costs);
(5) Responding to the request of the subject of personal information will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;
(6) involving trade secrets.
We attach great importance to the protection of minors' information.
Our products, websites and services are primarily aimed at adults. Children are not allowed to create their own user accounts without the consent of a parent or guardian. In cases where personal information is collected with parental consent, we will only use or publicly disclose this information if it is permitted by law, with the express consent of the parents or guardians, or if it is necessary to protect the child.
Although local laws and customs define children differently, we consider anyone under the age of 14 to be a child. If we find that we have collected personal information about children without prior verifiable parental consent, we will seek to delete the data as quickly as possible.If you are a minor under the age of 14, it is recommended that you ask your guardian to read this Privacy Policy carefully, and use our products and/or services or provide us with information with the consent of your guardian.
In principle, personal information collected and generated by us within the People's Republic of China will be stored within the People's Republic of China.
Because we provide our products or services through our worldwide resources and servers, this means that, with your authorized consent, your personal information may be transferred to or accessed from jurisdictions outside the country/region in which you use the products or services.
Such jurisdictions may have different data protection laws or even no laws. In such cases, we will ensure that your personal information is adequately and equally protected within the People's Republic of China. For example, we may ask for your consent to the cross-border transfer of personal information, or to implement security measures such as data de-identification prior to the cross-border data transfer.
Our privacy policy may change.
We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes made to this privacy policy on this page.For material changes, We will notify you by email or email or other appropriate means of reaching you on the main exposure page or site of the products or services. If you do not agree to such changes, you may discontinue your use of the Secret Products and Services. By continuing to use our products and/or services, you agree to be bound by this revised Privacy Policy.
Material changes referred to in this policy include, but are not limited to:
1. Our service model has changed significantly. Such as the purpose of personal information processing, the type of personal information processing, personal information use, etc.;
2. We have undergone significant changes in our ownership structure and organizational structure. Such as business adjustment, bankruptcy merger and acquisition caused by the owner change, etc.;
3. The main object of personal information sharing, transfer or public disclosure has changed;
4. Your rights to participate in personal information processing and the way in which they are exercised have changed significantly;
5. When the department responsible for handling personal information security, the contact information and the complaint channel change;
6, personal information security impact assessment report indicates that there is a high risk.
Umeng SDK
Usage purpose: For statistical analysis, iteration for product optimization
Obtain permissions: Obtain your device information, obtain your read/write external storage, and view your network connection status
Name of third party organization: Alliance Tongxin (Beijing) Technology Co., LTD
Please refer to the Privacy Agreement/Policy for details:
Advertising SDK
Purpose: To push advertising information to users, anti-cheating
Access: access to your device information, network information, access to GPS location information, access to system installed applications
Name of third party organization: Tencent Corporation
Please refer to the Privacy Agreement/Policy for details:
Pangolin advertising SDK
Purpose: To push advertising information to users, anti-cheating
Access: Access to your device information, network information
Name of third party organization: Beijing Great Engine Network Technology Co. LTD
Please refer to the Privacy Agreement/Policy for details:
If you have any comments or suggestions on the secret and this privacy policy, please contact us at any time.
2. For questions about the Terms of Service of this user, you can contact us through the following contact ways:
Feedback Email: zerozhou10086@gmail.com
In order to ensure our efficient handling of your problems and timely feedback to you, you need to submit proof of identity, effective contact information, written request and relevant evidence, we will verify your identity and process your request.