User Privacy Protection Guidelines
Updated on:March 1, 2022
Became effective on:March 1, 2022
Summary
Thank you for your choice of product provided by Kingtrun Technology (hereafter referred to as “we” or “us”)! Through the User Privacy Protection Guidelines ("Guidelines"), we will further elaborate on how we collect, use, store and share your personal information when you are using our product, as well as the relevant rights you are entitled to. The highlights are as follows:
• You can manage your personal information and the relevant authorizations according to the provisions of this Guideline.
• We adopt a wide range of security measures to ensure that your personal information is protected under a reasonably safe manner.
By reading the full version of “User Privacy Protection Guidelines”, you may learn more about the processing rules of personal information such as the correspondence between the types and the uses of personal information.
1.Information we collect
While you are using our product, the device will collect through the following ways the information that you voluntarily provide when using the service or the information generated by your use of the service, in order provide and optimize our services to you and to ensure your account in safe security:
1.1 When you switch the device to network mode, need to send the Wi-Fi SSID and password to device, or it can not use under network mode.
1.2 You may not use the network mode if you don’t agree.
2.Storage of Information
2.1 Manner and Term of Storing Information
We will store your information in a secure manner, including storing it locally (such as data caching via APP), using database and server logs.
In general, we will only store your information for a necessary period for achieving the purpose of providing our services or as required by laws and regulations.
2.2 Territory of Storing Information
Personal information collected within China would be stored within China pursuant to the laws and regulations.
2.3 Termination Notice of the Product or Service
In the event the operation of a product or service is terminated, we will make an announcement in accordance with the relevant laws and regulations, and will protect your legitimate rights and interests.
3.Information Security
3.1 Security Measurements
We strive to protect information security of the users to avoid any information leakage, loss, improper usage, unauthorized access and disclosure, etc. We employ multiple security measures, including technical protection solutions, management system controlling, security system guarantee and others to make sure the user’s personal information is protected in a reasonably secured manner.?
We adopt leading technical protection measures in the industry. The measures we take include but not limited to firewall, encryption (such as SSL), de-identification or anonymization, access controlling, etc. Further, we will constantly strengthen the security capacity of the software installed in your devices. For example, we will implement part of the encryption work in your devices locally to consolidate a secured transmission; we will collect the information of the applications installed in your devices and its processing information during operation to avoid malicious programs such as virus and Trojan.
3.2 Dealing with Security Incident
If any security incident such as the leak of personal information occurs, we will initiate the emergency plan to prevent it from expanding. Upon the occurrence of such incident, we will inform you the basic situation of the security incident, the treatment measures and remedies we will take or have taken as well as our advices for you, via announcements, push notifications or emails, etc. If it is difficult to inform every user, we will issue the warning through public announcements.
4.How we use the Information
We will strictly obey the laws, regulations and the agreement with our users, and we will make use of the collected information in accordance with the Guidelines to provide you with better service.4.1 Rules for Using Information
We will use the collected information in accordance with the following rules:
Under device network mode, the information will be used;
4.2 The Way to Seek Consent after Informing the Purpose of Changing
We will use the collected information within the scope included in the Guidelines. If we use your personal information beyond the scope of purpose we claimed when collecting those information or a direct or reasonably relevant scope, we will again inform you and seek your express consent before using your personal information.
5.Provide to other Entities
Currently, except for the conditions provided in the Guidelines, we will not actively share, provide or transfer your personal information to any other third party outside of Kingtrun Technology. In the event we share, provide or transfer your personal information or you need us to share, provide or transfer your personal information to a third party outside of Kingtrun Technology, we will directly ask for your express approval or confirm that the third party has obtained your express approval.
Except as otherwise provided in the Guidelines, we will not publicly disclose the information we collect. If a disclosure is necessary, we will inform you about the purpose of the disclosure, the type of the disclosed information and the sensitive information that may be involved, and we will also obtain your express approval.
In addition, in accordance with relevant laws, regulations and national standards, we may share, transfer, or publicly disclose personal information without your prior authorization and approval in the following situations:
1) where it is directly related to the national security and national defense security;
2) where it is directly related to public security, public health or major public interests;
3) here it is directly related to public security, public health or major public interests;
4) where it is for protecting the material legal rights and interests such as life, property and others of the personal information holder or other individuals but it is also difficult to obtain consent from the involved person;
5) where the personal information holder publicly discloses personal information by himself/herself;
6) where those personal information is collected through legitimate and publicly channels, such as legitimate news reports, government information disclosure, etc.
6.Your rights
During the time you use our product, we may provide you with the corresponding operation settings based on the specific situation of the game products, so that you can search, delete, change or withdraw your relevant personal information.
7.Amendments
We may amend the Guidelines as appropriate. When the provisions of the Guidelines have been amended, we will inform you of the amended Guidelines in a proper way at the time of version update. Please read the amended Guidelines or the content carefully. Your continuous use of Tencent Game would be deemed as your approval for us to collect, deal with or use your personal information in accordance with the updated Guidelines.
8.Contact us
When you have other complaints, suggestions, or questions regarding personal information , please contact us via 2810959285@qq.com or mail to the following address:
3E, Unit 2, Building 5, Jinditang Road, Daling Community, Minzhi Street, Longhua District, Shenzhen
Zip Code: 518131