This policy applies only to GelinBite Information Technology 's Sugar Tile products or services.
Policy release update date: June 1, 2025.
Policy release effective date: June 1, 2025. What you should know:
This product is produced by GelinBite Information Technology (hereinafter referred to as "we"). We provide services to users (hereinafter referred to as "you") through Sugar Tile (hereinafter collectively referred to as "this software").
We have formulated the Sugar Tile Privacy Policy (hereinafter referred to as the "Policy") in accordance with the regulations of the App Store and are committed to protecting the security of your personal information.
Your agreement to the privacy policy only means that you have understood the functions provided by the application and the necessary personal information required for the operation of the functions. It does not mean that you have agreed that we can collect non-essential personal information. Non-essential personal information will be separately obtained with your consent based on your authorization during use.
The corresponding device permissions are not enabled by default. When it comes to important or sensitive device permissions, we will ask for your consent again when you use the corresponding business functions. After the permissions are enabled, you can also turn off the permissions at any time through the device settings. If you do not agree to enable permissions, it will not affect the normal use of other non-related business functions. For personal sensitive information, we will process it after obtaining your consent separately.
Please read and fully understand this policy before using this platform. This policy will cover the following aspects:
1. How do we collect and use your personal information?
1. We will collect and use your personal information in the following business scenarios:
2. System permissions used by this software
3. Other legal grounds other than consent
II. How do we entrust the processing, sharing, transfer and public disclosure of your personal information?
1. Sharing your personal information
2. Transfer of your personal information
3. Public disclosure of your personal information
III. How do we protect your personal information?
1. Technical measures and data security measures
2. Security certification
3. Security incident handling
IV. How do you manage your personal information?
1. Delete your personal information
2. Obtain a copy of your personal information
3. Withdraw your authorization and consent
4. Cancel your account
5. Respond to your above requests
V. How do we store your personal information?
VI. How do we use cookies and other technologies?
VII. Information We May Send to You
8. Protection of Minors
IX. How do we update and modify this policy?
10. How to contact us
XI. Dispute Resolution
According to the Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications, this software is a "utility tool" application, and its basic functional service is "knowledge popularization". No personal information is required to use the basic functional service.
1. We will collect and use your personal information in the following business scenarios:
We will follow the principles of legitimacy, legality and necessity to collect and use the personal information you actively provide during the use of the service or generated by the use of this software for the following purposes described in this policy. If we want to use your personal information for other purposes not specified in this policy, or use the collected information for other purposes based on specific purposes, we will inform you in a reasonable manner and obtain your consent again.
When you use this software and/or service, we need/may need to collect and use your personal information in the following two situations:
(1) In order to provide you with the basic business functions of this software and/or service (which is part of all business functions), you must authorize us to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use the most basic functions.
(2) In addition to providing relatively basic business functions, we have been working hard to provide richer services to expand, improve and enhance your user experience; such business functions require the collection and use of necessary personal information. If you refuse to provide it, you will not be able to use the business functions of the relevant extended experience or achieve the best extended function effects and experience we intend to achieve, but it will not affect your normal use of the basic business functions of this software.
2. System permissions used by this software
2.1 We may need to provide personal information corresponding to your mobile phone, including device ID (IMEI, Android_ID), mobile phone number, location information, and WeChat information (avatar, name). The device ID is used to determine the uniqueness of the user and prevent cheating. WeChat information (avatar, name) is authorized to display the user's nickname and avatar in the user participation activity rankings. If you refuse to provide it, you will not be able to use the specific service, but it will not affect your normal use of the basic product functions and services of this software.
2.2 After we launch the App for the first time and agree to the privacy policy, we will collect a unique device identification code (such as IMEI, Android_ID, OPENUDID, ICCID, MAC, OAID, MEID, device serial number, GUID, SIM card IMSI information, local number, SSID, BSSID on Android; such as IDFA, IDFV on iOS) to uniquely identify the user in order to collect new user data statistics. The statistical analysis service has basic anti-cheating functions. By obtaining user location information and IP addresses, cheating devices are eliminated, and the user's geographical distribution data is corrected to improve the accuracy of report data.
2.3 In order to read the device identification number normally and ensure that you can save pictures, videos or cache information to your phone normally, we will apply to the system for "reading the phone status and identity, and enabling the permission to write to the external storage card". We will ask for your consent before applying, and you can choose to "allow" or "forbid" the permission application; you can choose to close some or all permissions in the device's settings function to refuse to collect the corresponding personal information.
2.4 Based on the synchronization and update of account data, you need to obtain your GET_ACCOUNTS permission to ensure the effective synchronization of account data.
2.5 We may analyze the risk level of the current device through the application list information, which can effectively identify various cheating behaviors and risky devices, and can be used to evaluate channel quality, identify malicious brushing, malicious programs, and protect the security of your account.
2.6 Customer Service: When you file a complaint, appeal or make an inquiry to this software, in order to facilitate contact with you or help you solve the problem, we may need you to provide your name, mobile phone number and/or email address and other contact information, and use this information to contact you. If you submit an infringement complaint, this software will also require you to submit your ID card, authorization, and ownership certificate in accordance with legal provisions to clarify your qualifications as the subject of the complaint and determine whether your complaint is established. If it is necessary to submit your aforementioned information to the court or other regulatory agency or judicial department according to legal provisions, we will provide it in accordance with the law. If you do not provide the above information, our customer service will not be able to provide you with the aforementioned services, but it will not affect your use of other services we provide.
2.7 Permissions for additional functions (You understand and agree that the following additional services may require you to enable access permissions for your device and camera in your device to enable the collection and use of information involved in these permissions. You can view the status of the above permissions item by item in your device settings, and you can decide to enable or disable these permissions at any time. Please note that when you enable any permission, it means that you authorize us to collect and use relevant personal information to provide you with the corresponding services. Once you close any permission, it means that you cancel the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, and we will not be able to provide you with the services corresponding to the permission. However, your decision to close the permission will not affect the previous collection and use of information based on your authorization. And if you refuse to provide it, you will not be able to use the relevant specific service, but it will not affect your normal use of the basic product functions and services of this software) If we use your personal information beyond the purpose stated at the time of collection and the scope of direct or reasonable connection, we will inform you again and obtain your explicit consent before using your personal information.
(1) Device information
Purpose: Collect unique device identification codes (IMEI, Android_ID, OPENUDID, ICCID, MAC, OAID, MEID, device serial number, GUID, SIM card IMSI information, local phone number, SSID; IDFA, IDFV) to uniquely identify users; IP anti-cheating
Scenario: After launching the App and agreeing to the privacy policy, the unique device identification code (IMEI, Android_ID, OPENUDID, ICCID, MAC, OAID, MEID, device serial number, GUID, SIM card IMSI information, local phone number, SSID; IDFA, IDFV) will be collected to uniquely identify the user in order to conduct statistics on new user data. The statistical analysis service has basic anti-cheating functions. By obtaining user location information and IP addresses, cheating devices are eliminated, and user geographical distribution data is corrected to improve report accuracy.
(2) Storage (READ_EXTERNAL_STORAGE to read external storage, WRITE_EXTERNAL_STORAGE to write external storage, ACCESS_MEDIA_LOCATION to read photo location information)
Purpose: To read the device identification number normally and ensure that you can save pictures, videos or cache information to your phone normally.
Scenario: When reading the device identification number, saving pictures, videos, or caching information on the phone, we will apply to the system for "reading the phone status and identity, and enabling the permission to write to the external storage card". We will ask for your consent before applying, and you can choose to "allow" or "forbid" the permission application; you can choose to turn off some or all permissions in the device's settings to refuse to collect the corresponding personal information.
(3) Positioning (ACCESS_FINE_LOCATION accesses precise positioning, ACCESS_COARSE_LOCATION accesses rough location, and ACCESS_BACKGROUND_LOCATION supports background access to location)
Purpose: To provide you with weather information in your city and area or nearby information
Scenario: Based on the additional services related to positioning information technology, during the first installation, we will ask or require authorization to use the device positioning information in specific scenarios to provide you with the weather in your city and area or nearby consulting information. You can refuse to open this positioning permission without affecting your other normal use.
(4) Installed APP information (PackageManager.getInstalledPackages())
Purpose: Get the list of installed applications
Scenario: We analyze the risk level of the current device through the application list information, which can effectively identify various cheating behaviors and risky devices. It can be used to evaluate channel quality, identify malicious volume brushing, malicious programs, and protect your account security.
(5) Acceleration sensor (TYPE_ACCELEROMETER)
Purpose: monitor the acceleration of the phone
Scenario: Used to count and display the user's real-time step count.
(6) Gyro sensor (TYPE_GYROSCOPE)
Purpose: Identify device status to determine whether the user is engaged in interaction
Scenario: Combining the two sensors, accelerometer and gyroscope, provides end users with a more realistic user experience, accurate navigation system and other functions.
(7) Read the contents of the SD card and read the storage space permission (READ_EXTERNAL_STORAGE)
Purpose: Provides the function of reading data in the mobile phone storage space
Scenario: Provides the function of reading data in the phone's storage space. Allows the App to read the contents of files in the storage, mainly used to help record crash log information locally.
(8) Write/delete the contents of the SD card, write/delete/storage space permission (WRITE_EXTERNAL_STORAGE)
Purpose: Provides writing to external storage
Scenario: Provides the ability to write to external storage. Allows the app to write/download/save/cache crash log information.
(9) Linear acceleration sensor (TYPE_LINEAR_ACCELERATION)
Purpose: Identify the current user's physical activity
Scenario: Used for outdoor running and walking, to record the number of steps taken by the user during outdoor exercise.
3. Other legal grounds other than consent
In accordance with relevant laws and regulations, we may collect and use some necessary personal information without your authorization or consent in the following circumstances:
(1) Necessary for the conclusion or performance of a contract to which the individual is a party;
(2) Necessary for the performance of statutory duties or obligations;
(3) It is necessary to respond to public health emergencies or to protect the life, health and property safety of natural persons in emergency situations;
(4) Processing personal information that an individual has disclosed on his/her own or that has been legally disclosed within a reasonable scope in accordance with the provisions of the Personal Information Protection Law of the People's Republic of China;
(5) Other circumstances prescribed by laws and administrative regulations.
1. Sharing your personal information
In order to provide you with comprehensive products and services, some of our services or technologies will be provided by authorized partners. Please be aware that we will not proactively provide your personal information to other personal information processors. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share necessary personal information.
In the following circumstances, we will provide your personal information to other personal information processors, inform you of the recipient's name, contact information, processing purpose, processing method and type of personal information, and obtain your separate consent.
At the same time, we will sign strict confidentiality agreements with our partners, requiring them to strictly follow our instructions, these guidelines and any other relevant confidentiality policies and take security measures to handle your personal information.
We require our partners not to use shared personal information for any other purpose. When you view web pages created by third parties or use applications developed by third parties, these third parties may place their own cookies or use other technical means, which are not under our control and their use is not subject to this policy. Partners may have their own independent personal information protection policies and user agreements. Please read and agree to comply with the third party's personal information protection policies and user agreements. Regarding the types of personal information collected by our partners (shared) and the purpose of collection, the SDK list is as follows:
1. Shen Ce
Third Party Category: Statistical Analysis
SDK provider: Sensors Network Technology (Beijing) Co., Ltd.
SDK collection purpose: provide data analysis, data-driven, improve product quality, and optimize user experience
SDK collects information: IMEI, OAID, Serial Number, MEID, IMSI, User ID, Android ID, Mac address, Google Advertising ID, carrier information, IP address, mobile phone Region settings, device model, phone battery level, mobile phone operating system version and language, accelerometer, device sensor
Sharing method: Native SDK collection
SDK Privacy Policy: https://www.sensorsdata.cn/market/privacy_policy.html
SDK usage scenario: APP data analysis
SDK sensitive permissions: None
2. Umeng
Third Party Category: Statistical Analysis
SDK provider: Beijing Umeng Network Technology Co., Ltd.
SDK collection purpose: To identify your device and prevent malicious programs and cheating, improve service security, ensure operational quality and efficiency, and provide data statistics and data analysis services
SDK collects information: obtain your IP address, device information (IMEI, MAC, Android_ID, IDFA, OpenUDID, GUID, device hardware serial number, device serial number, SIM card IMSI information, ICCID, SN personal information), device serial number, running process information, installed APP information, SD card data, OAID, operator information, IP address
Sharing method: Native SDK collection
SDK Privacy Policy: https://www.umeng.com/page/policy
SDK usage scenario: Initialize Umeng SDK after App is started and privacy policy is agreed to, and perform data statistics services
SDK sensitive permissions: running process information, installed APP information, OAID, operator information, storage, reading mobile phone identity and status
3. BlankjUtilCode (com.blankj.utilcode)
Third-party category: Infrastructure
SDK provided by: Blankj
SDK collection purpose: Using its packaged APIs can greatly improve development efficiency
SDK collects information: device ID (Device ID, device identifier), operator information, SIM card status, IMEI, IMSI, local phone number, read and write mobile phone external storage information, installed APP information
Sharing method: Local SDK collection
SDK Privacy Agreement: https://github.com/Blankj/AndroidUtilCode
SDK usage scenarios: Use encapsulated functions commonly used in Android development and for unit testing
SDK sensitive permissions: None
4. MAX
Third-party category: Advertising and monetization
SDK provider: AppLovin Corporation
SDK collection purpose: Provide advertising services, optimize advertising display effects, improve advertising relevance, and realize advertising monetization for developers
SDK collection information: device identifiers (such as Android ID, OAID, etc.), IP address, device model, operating system version and language, network status information, advertising display and click data, application usage time, screen orientation, sensor information (such as accelerometer, etc., used to optimize advertising display effects)
Sharing method: Local SDK collection
SDK privacy agreement: https://applovin.com/privacy
SDK usage scenario: In-APP advertising display and monetization
SDK sensitive permissions: None
5. Appsflyer
Third-party category: Attribution analysis and marketing effectiveness evaluation
SDK provider: AppsFlyer Ltd.
SDK collection purpose: Used for user attribution analysis and marketing effectiveness evaluation to help developers understand user sources, installation channels and in-app behaviors, thereby optimizing marketing strategies.
SDK collects information: device information (such as device model, operating system, unique device identifier, etc.), application usage (such as installation time, application opening status, etc.), sensor information (such as gyroscope sensor, accelerometer sensor data).
Sharing method: Native SDK collection
SDK privacy agreement: https://www.appsflyer.com/legal/privacy-policy
SDK usage scenarios: In-APP user behavior analysis and attribution
SDK sensitive permissions: None
6. Mintegral
Third-party category: Advertising and monetization
SDK provider: Mintegral Ltd.
SDK collection purpose: for advertising, attribution analysis, precision marketing and user experience optimization.
SDK collects information:
Location information: IP address, country, time zone, and locale.
Device/advertising IDs: IMEI, Android ID, OAID, IDFV, IDFA, Google Advertising ID, Amazon ID, MAC address.
Device information: device manufacturer, model, operating system information, device type, screen information, battery information, volume and font size, whether it is an emulator, network information, hardware information, sensor information, Limit Ad Tracking (LAT) status, phone power-on time, user name summary, and storage capacity information.
Application information: partner application package name, application version and features, whether downloaded from the App Store, SDK version, and list of installed applications.
Usage data: user interaction with ads, such as browsing and clicking on ads.
Other information: device event information (such as system crashes, system activities), timestamps, source URLs, user agents.
Sharing method: collected by the local SDK, and may be shared with third parties such as advertisers, advertising agencies, advertising attribution service providers, and advertising demand-side platforms for advertising attribution, settlement, monitoring of advertising quality, and precise delivery.
SDK Privacy Agreement: https://www.mintegral.com/cn/privacy
SDK Usage Scenario: In-APP advertising display and monetization
SDK Sensitive Permissions: None
2. Transfer of your personal information
In principle, we will not transfer control of your personal information to other companies, organizations or individuals. If a merger, acquisition or bankruptcy liquidation occurs, it will involve the transfer of personal information. In this case, we will inform you of the name or name and contact information of the recipient and require the new company or organization holding your personal information to continue to be bound by these guidelines. If there is any change in the collection and processing of personal information agreed in these guidelines, the company or organization will re-ask you for authorization and consent.
3. Public disclosure of your personal information
We will only collect or disclose your personal information in the following circumstances:
(1) After obtaining your explicit consent;
(2) We may disclose your personal information based on mandatory requirements of laws, regulations, judicial organs or administrative authorities.
In accordance with relevant laws and regulations, we may collect, share, transfer or publicly disclose your personal information without your authorization or consent in the following circumstances.
(1) Directly related to public safety, public health, public knowledge, or major public interests;
(2) Directly related to criminal investigation, prosecution, trial and execution of judgment;
(3) To protect your or other individuals¡¯ life, property, reputation, or major legal rights and interests, but it is difficult to obtain their consent;
(4) Necessary for signing and performing a contract according to your request;
(5) Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and handling product or service failures;
(6) When it is necessary to conduct statistical or academic research in the public interest and when the results of academic research or descriptions are provided to the public, the personal information contained in the results is de-identified;
(7) Personal information collected from legally disclosed information, such as legal news reports and government information disclosure channels;
(8) Other circumstances prescribed by laws and regulations.
1. Technical measures and data security measures
We strive to take various physical, electronic and management security measures that meet industry standards to protect your personal information. We actively establish a data classification and grading system, data security management specifications, and data security development specifications to manage and regulate the storage and use of personal information, and ensure that personal information that is not related to the services we provide is not collected.
We implement comprehensive data security control by signing confidentiality agreements with information contacts and monitoring and auditing mechanisms to prevent your personal information from being accessed, disclosed, used, modified, damaged or lost without authorization.
We have used security measures that meet industry standards to protect the personal information you provide and prevent unauthorized access, disclosure, use, modification, damage or loss of your data.
We will take all reasonable and feasible measures to protect your personal information:
(1) We will use encryption technology to ensure the confidentiality of data;
(2) We will use trusted protection mechanisms to prevent data from malicious attacks;
(3) We will deploy access control mechanisms to ensure that only authorized personnel can access personal information;
(4) We will organize security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
When we display your personal information, we will use methods including content replacement and anonymization to desensitize your information to protect the security of your information.
2. Security certification
We have completed the Ministry of Public Security's information security level protection level 3 certification, and have established a good coordination and communication mechanism with regulatory agencies and third-party evaluation agencies to promptly resist and deal with various information security threats and provide all-round protection for your information security.
3. Security incident handling
We will do our best to ensure the security of any information you send to us, but please understand that due to technical limitations and various malicious means in the Internet industry, we cannot guarantee that the information is 100% secure. You need to understand that the system and communication network you use to access our services may have problems due to factors beyond our control.
To prevent security incidents, we have developed a proper early warning mechanism and emergency plan. If a personal information security incident unfortunately occurs, we will promptly inform you of the following in accordance with the requirements of laws and regulations: the basic situation and impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own and remedial measures for you, and immediately activate the emergency plan to minimize the loss.
We will promptly inform you of the relevant situation of the incident by phone or push notification. When it is difficult to inform users one by one, we will take reasonable and effective measures to issue an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities and closely cooperate with the work of government agencies.
We have set up a dedicated department for personal information protection: Information Security Department. You can contact them in the following ways: [jszgamemail@gmail.com]. Generally, we will reply within fifteen working days.
We attach great importance to the management of your personal information and provide a variety of functions to protect your rights to access, correct, delete and withdraw consent to personal information. This software does not have a login function. You can log out of the personal device information obtained by the platform through the logout entrance.
1. Delete your personal information
In the following circumstances, we will proactively delete your personal information. If we do not delete it, you can send us an email to [jszgamemail@gmail.com] to request us to delete your personal information:
(1) The purpose of processing has been achieved, cannot be achieved or is no longer necessary for the purpose of processing;
(2) We stop providing products or services, or the shelf life has expired;
(3) You withdraw your consent;
(4) We process personal information in violation of laws, administrative regulations or agreements;
(5) Other circumstances prescribed by laws and administrative regulations.
After you delete the information, we will adjust the services provided to you by this software accordingly. However, please understand that this will not affect the previous processing of personal information based on your authorization.
2. Obtain a copy of your personal information
If you need to obtain a copy of your personal information, you can contact the email address: [jszgamemail@gmail.com] to apply for downloading your personal information collected by this software.
3. Withdraw your authorization and consent
3.1 Permission settings: You can manage, set, and withdraw system permissions that you have enabled when using this software on the system permission settings page.
3.2 Withdrawal of Personal Information Protection Guidelines: You can withdraw your authorization to these guidelines by clicking "Withdraw Privacy Policy Authorization". After you withdraw, you will need to reselect your authorization status so that you can continue to use Zhihu's products or services.
4. Cancel your account
You can cancel your account by going to "Privacy Settings - Account Cancellation" in this software and selecting the Account Cancellation button. After canceling your account, we will stop providing you with all services and process your personal information through anonymization methods in accordance with relevant laws and regulations, or delete personal information related to your account, unless laws, regulations or regulatory authorities have other provisions on the storage period of user information.
You should be aware that once the cancellation application is submitted, it cannot be revoked or restored, and you will permanently lose access to all data in your account. We will complete your cancellation request within 15 days. Please note that this software account is linked to your device. When you apply to cancel your account, the device number will be cancelled. After the cancellation is completed, the device cannot be registered or used in this software again. Please operate with caution.
5. Respond to your above requests
We will respond to your request within fifteen working days of receiving your request.
In principle, we do not charge any fees for your reasonable requests. However, for repeated requests that exceed reasonable limits, we will charge a certain amount of cost depending on the circumstances. We may reject requests that are contrary to the requirements of laws and regulations, are repeated without reason, require too many technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are extremely impractical.
When you use our services, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters.
We use this information to determine whether a registered user is logged in, to improve service and/or product quality and to optimize user experience.
If you do not want your personal information to be stored in cookies, you can configure your browser and choose to disable the cookie function.
You can manage or delete cookies according to your preferences.
You can clear all cookies saved on your computer and most web browsers have the function of blocking cookies.
6.1 Information Notification
When you use our services, we may send you emails, text messages, information or push notifications.
You can choose to unsubscribe on your device by following our relevant prompts.
6.2 Announcements related to services
We may send you service-related announcements when necessary (for example, when a service is suspended due to system maintenance).
You may not be able to opt out of these service-related announcements that are not advertising in nature.
We attach particular importance to the protection of personal information of minors.
According to relevant laws and regulations, if you are a minor under the age of 18, you should obtain the consent of your parents or legal guardians before using our services.
We do not provide products or services specifically for children under the age of 14, nor do our products or services contain functional sections specifically for children. We only collect necessary personal information from users to achieve specific functions.
In accordance with the relevant laws and regulations, if you are a minor under the age of 14 (hereinafter referred to as a "child"), before using our products and/or services, please be sure to read this policy in the company of your guardian, and make sure that you have obtained your guardian's explicit consent before using our services and providing us with your personal information. If you are a guardian of a child, before using our products and/or services, you should carefully read this policy, the product-specific privacy protection guidelines (if any) and the "Children's Privacy Protection Statement", decide whether to agree to this policy, the product-specific privacy protection guidelines (if any) and the "Children's Privacy Protection Statement", and help the child register/use so that the child can use the products or services we provide.
In the case of collecting personal information of minors through the use of our products or services with the consent of their guardians, we will only use, share, transfer or disclose this information when permitted by laws and regulations, with the explicit consent of the guardians, or when necessary to protect minors. If your guardian does not agree with your use of our services or provision of personal information to us in accordance with this policy, please immediately stop using our services and notify us in a timely manner.
If you have any questions about the use of our products/services by the minors under your guardianship or the user information they provide to us, please contact us through the contact information disclosed in Section 10 of this Policy or Section 7 of the Children's Privacy Protection Statement. We will handle and respond to you within a reasonable time.
Although this policy describes the standards we follow in protecting personal information, these standards may change as we revise them from time to time, which shall form part of this policy. This software reserves the right to update or modify this policy from time to time. When this policy changes, we will notify you in a reasonable manner through the platform client in the form of push notifications, pop-ups, etc., so that you can be informed of any changes made to this guideline in a timely manner. You can view the latest content of this policy through "My ¡ú About Us ¡ú Privacy Policy" in this software.
Please note that we will collect, use, process and store your personal information in accordance with the updated statement only after obtaining your consent. We will not reduce your rights under these guidelines without your explicit consent.
For major changes, we will also provide more prominent notices to explain the specific changes to this guideline depending on the specific circumstances. Major changes include but are not limited to:
(1) Our service model undergoes major changes, such as the purpose of processing personal information, the type of personal information processed, and the way personal information is used;
(2) We experience significant changes in our ownership structure or organizational structure, such as changes in ownership due to business adjustments, bankruptcy, or mergers and acquisitions;
(3) The main objects of sharing, transfer or public disclosure of personal information have changed;
(4) There are significant changes in your rights to participate in the processing of personal information and how you exercise them;
(5) There are changes in our responsible department for handling personal information security, contact information and complaint channels;
(6) When the personal information security impact assessment report indicates that there is a high risk.
If you do not agree to the revised personal information protection guidelines, you have the right and should immediately stop using the services of this software.
You can contact us via the following contact information and we will respond to your request within 15 days.
1. If you have any questions, comments or suggestions about this software, you can contact us by sending an email to [jszgamemail@gmail.com];
2. We have also set up a dedicated department for personal information protection. You can also send an email to [jszgamemail@gmail.com] and we will solve your problem in a timely manner.
In order to ensure that we handle your issue efficiently and provide you with timely feedback, you are required to submit your username, valid contact information, written request and relevant evidence when providing feedback. We will process your request after verification.
GelinBite Information Technology Co., Ltd.