Fonts Privacy AgreementFonts
Fonts Privacy AgreementFonts

Fonts Privacy AgreementFonts

This privacy policy will help you understand

(1) Fonts is a tool app developed by Liaoning Qisi Technology Co., Ltd. In order to achieve core functions such as font download, font usage, font sharing, and other functions, we will collect some necessary information from you;

(2) When you publish information, interact, register and authenticate or use location-based services, we may collect personal information such as name, ID card number, contact information, address book, audio and video files, and geographical location based on legal requirements or necessary to achieve functions. You have the right to refuse to provide us with this information, or to withdraw your authorization and consent to this information. Please understand that refusing or revoking authorization consent will result in you being unable to use specific functions related to it, but it will not affect your use of other functions of “Fonts”;

(3) We will store your personal information collected and generated during our domestic operations within the territory of the People’s Republic of China and will not transmit the aforementioned information overseas. We will only retain your personal information for the period necessary for the purpose of providing the “Fonts” software and related services;

(4) We will not share, provide, transfer or obtain your personal information from third parties, unless with your consent;

(5) We will strive to take reasonable security measures to protect your personal information. Specifically, we will use industry-wide methods and make every commercial effort to protect the security of your sensitive personal information;

(6) The methods for accessing, correcting, deleting personal information, revoking consent and authorization, as well as the methods for account cancellation and complaint reporting.

If you do not explicitly agree to this privacy policy and start using it, we will only collect the necessary information to maintain font usage, which will prevent us from providing you with complete products and services. However, we will also adopt measures such as de identification and encryption to protect this information. If you do not agree with this privacy policy, we are unable to provide you with complete products and services, and you can also choose to stop using them. When you choose to continue or use again, based on the necessity of providing products and services, it will be deemed that you accept and acknowledge our handling of your relevant information in accordance with this policy. We attach great importance to the protection of user personal information and will treat this information with diligence and prudence. We will collect, save, use, share, disclose, and protect your personal information in accordance with this Privacy Policy when downloading, installing, opening, browsing, registering, logging in, and using the “Fonts” software and related services (hereinafter collectively referred to as “using”). We hope to introduce you to the way we handle your personal information through this Privacy Policy, so we suggest that you carefully and completely read all the terms of this Privacy Policy. Among them, the content related to your information and rights will be highlighted in bold for your attention. Please read it carefully. This privacy policy aims to help you understand the following content: 1. How we collect and use personal information; 2. Our use of cookies and similar technologies; 3. How we store personal information; 4. How we share, transfer, and publicly disclose personal information; 5. How we protect the security of personal information; 6. Your rights; 7. Terms of use for minors; 8. Revision and notification of privacy policy; 9. Scope of application; 10 other

1、 How do we collect and use personal information

In the process of using the “Fonts” software and services, we will collect information based on the principles of legality, legitimacy, and necessity. The information we collect or ask you to provide will be used to: 1. ensure the basic normal operation of the product; 2. Implement various functions and services; 3. Optimize and improve products and services; 4. Ensure the safety of products, services, and user use; 5. Comply with laws, regulations, and national standards.

During your use of our APP service, we will apply to you for the following necessary sensitive phone information

·Mobile MAC address, which is only used for login verification, various service authentication, and statistical click behavior. When users use the APP, we will obtain MAC address information when necessary, and the scope of obtaining MAC address information is during networking operations.

During your use of our app services, we will apply to you for the necessary mobile app client permissions to obtain the corresponding services.

·Android. permission. INTERNET permission, network access permission is necessary. We will use the network to download corresponding application data, set information, and perform network operations such as user registration and login;

·android.permission.READ_ PHONE_ State permission is necessary to obtain device identifier permission. We will use WeChat login SDK for third-party login, and Youmeng+SDK for user volume statistics data collection;

·android.permission.ACCESS_ NETWORK_ STATE, check the network connection. During the use of the APP, the network is necessary. During the service process, we will check whether the user’s client has a network connection, which is used to remind users to make necessary network connections to obtain our services. When obtaining services such as font download and user registration login;

·android.permission.ACCESS_ WIFI_ State, check the WLAN status. When the app is downloading a large amount of data, we will determine the network connection status of the app to remind users whether the network is free, in order to save user traffic. When downloading services such as fonts;

·android.permission.WRITE_ EXTERNAL_ STORAGE, which reads, modifies, or deletes content from a storage card, inevitably requires storage space when users use our service to store a large amount of data. We use this permission to read, modify, or delete data from the APP client to save users’ mobile space. When performing services such as font storage, video file storage, emoticon file storage, etc

  1. Register, authenticate, and log in to “Fonts” and related services. (1) When you register and log in to “Fonts” and related services, you can create an account through your phone number. We will verify your identity by sending a SMS verification code, and you can improve the relevant network identity recognition information (such as avatar, nickname, and password). Collecting this information is to help you complete your registration. You can also choose to fill in information such as gender, birthday, region, and introduction according to your own needs to improve your personal information. (2) You can also log in to Fonts using a third-party account (such as WeChat). At this time, you will authorize us to obtain public information (such as avatars, nicknames, etc.) registered on the third-party platform. After you agree to this privacy policy, you will bind your third-party account to your FontDuoDuo account, allowing you to directly log in and use this product and related services through the third-party account.
  2. Provide you with font download and usage functions or services. (1) You proactively obtain file read and write permissions for font download and storage locally. (2) You proactively obtain font setting permissions to set fonts as your phone font. If you refuse authorization to provide it, you will not be able to use this feature, but it will not affect your normal use of other features such as Fonts.
  3. To ensure the safety of products, services, and users, and to help us better understand the operation of “Duoduo Fonts” and related services, in order to ensure the safety of operation and provision of services, we may record network log information, as well as the frequency of using software and related services, crash data, overall installation, usage, performance data, and other information.

(2) We may obtain your personal information from a third party. 1. When you actively log in to “Fonts” using a third party account, we will collect the nickname, avatar, and other information of the third party account. 2. The information collected by us due to the use of our products or services by users, such as information posted by other users that may contain some of your information (such as information related to you in comments, messages, posted images, audio and video).

(3) Please be aware of the handling of changes in the purpose of collecting and using personal information. With the development of our business, there may be adjustments and changes to the functionality and services provided by “Duoduoduo”. When new features or services are related to font download usage scenarios, the personal information collected and used is directly or reasonably related to the original purpose. In situations where there is no direct or reasonable connection with the original purpose, we will collect and use your personal information, and will inform you again and obtain your consent.

(4) Please understand that in the following situations, in accordance with laws, regulations, and relevant national standards, we do not need to obtain your authorization and consent to collect and use personal information that is exempt from collection and use in accordance with the law: (1) directly related to national security and national defense security; (2) Directly related to public safety, public health, and major public interests; (3) Directly related to criminal investigation, prosecution, trial, and execution of judgments; (4) For the purpose of safeguarding the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain personal consent; (5) The personal information collected is publicly available to the public on your own; (6) Collect your personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels; (7) Necessary for signing or fulfilling the contract according to your requirements; (8) Necessary for maintaining the safe and stable operation of the “Fonts” software and related services, such as discovering and handling faults in the “Fonts” software and related services; (9) Necessary for legitimate news reporting; (10) Academic research institutions conduct statistical or academic research based on the public interest, and when providing academic research or descriptive results to the public, de label the personal information contained in the results; (11) Other situations stipulated by laws and regulations.

Please note that if the information cannot be individually or in combination with other information to identify your personal identity, it does not belong to your personal information in the legal sense; When your information can be individually or in combination with other information to identify your personal identity, or when we combine data that cannot be linked to any specific personal information with other personal information, during the combined use period, this information will be treated and protected as your personal information in accordance with this privacy policy.

2、 The use of cookies and similar technologies

Cookies and similar technologies are commonly used technologies in the internet. When you use the “Fonts” software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information about your access and use of this product. We mainly use cookies and similar technologies to achieve the following functions or services:

(1) To ensure the security and efficient operation of products and services, we may set up cookies or anonymous identifiers to authenticate and ensure security, allowing us to confirm whether you have securely logged in to the service or encountered illegal activities such as theft and fraud. These technologies will also help us improve service efficiency, increase login and response speed.

(2) Helping you achieve a more relaxed access experience using such technologies can help you avoid repeating the steps and processes of filling out personal information and entering search content (such as implementing a one click login process and recording search history).

3、 How do we store personal information

(1) We will store your personal information collected and generated during domestic operations within the territory of the People’s Republic of China in accordance with laws and regulations. At present, we will not transmit the above information overseas. If we transmit it overseas, we will comply with relevant national regulations and seek your consent.

(2) We will only retain your personal information for the period necessary for the purpose of providing “Duoduo Fonts” and services, such as the audio and video information you post. During the period when you have not withdrawn, deleted, or cancelled your account, we will retain the relevant information. After the necessary deadline is exceeded, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations.

4、 How do we share, transfer, and publicly disclose personal information

(1) We will not share or transfer your personal information to any third party, unless you have obtained your prior authorization and consent, or if the shared or transferred personal information is deidentified and cannot be re identified by the sharing third party as a natural person.

  1. Prudent evaluation and liability constraints on third-party entities sharing personal information (1) With your consent, we will only share information necessary for the purpose with third parties. If a third party needs to use personal information beyond the aforementioned authorization scope due to business needs, the third party will need to seek your consent again. (2) For third parties with whom we share your personal information, these third parties will sign confidentiality agreements with us. At the same time, we will evaluate its data security capabilities and environment and require third parties to handle this information with confidentiality and security measures not lower than those required by this privacy policy.
  2. Transfer of personal information during acquisitions, mergers, and restructurings. With the continuous development of our business, we may engage in mergers, acquisitions, or asset transfers, which may result in the transfer of your personal information. When the aforementioned changes occur, we will continue to protect or require the recipient of personal information to continue protecting your personal information in accordance with laws and regulations and security standards no lower than those required by this privacy policy. Otherwise, we will require the recipient to obtain your authorization and consent again.

(2) The public disclosure of personal information will not disclose your information unless we comply with national laws and regulations or obtain your consent, except for the necessary information of the relevant account when making punishment announcements for illegal accounts and fraudulent behaviors. We will adopt security measures that comply with industry standards when publicly disclosing your personal information.

(3) Please understand that in the following situations, in accordance with laws, regulations, and national standards, we do not need your authorized consent to share, transfer, or publicly disclose personal information that is exempt from legal exemptions. (1) It is directly related to national security and national defense security; (2) Directly related to public safety, public health, and major public interests; (3) Directly related to criminal investigation, prosecution, trial, and execution of judgments; (4) For the purpose of safeguarding your or other individuals’ significant legitimate rights and interests such as life and property, but it is difficult to obtain your consent; (5) Personal information that you disclose to the public on your own; (6) Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels.

5、 How do we protect personal information security

(1) We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information from improper use or unauthorized access, public disclosure, use, modification, damage, loss or leakage. (2) We will use reasonable and feasible means such as encryption technology and anonymization processing that are not inferior to industry peers to protect your personal information, and use security protection mechanisms to prevent malicious attacks on your personal information. (3) We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt strict data usage and access policies to ensure that only authorized personnel can access your personal information, and conduct timely security audits of data and technology. (4) Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please take into account the limitations of technology and the possibility of various malicious means. In the internet industry, even if we do our best to strengthen security measures, it is impossible to always ensure the 100% security of information. We will do our best to ensure the security of the personal information you provide us. You are aware and understand that the system and communication network you use to access our services may encounter problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing personal information such as your account password to others. (5) We will develop emergency response plans and immediately activate them in the event of user information security incidents, striving to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident occurs (such as leakage, loss, etc.), we will promptly inform you in accordance with legal and regulatory requirements: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the event in the form of emails, letters, text messages, etc. If it is difficult to inform you one by one, we will take reasonable and effective measures to publish an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities. (6) We would like to remind you that the personal information protection measures provided in this privacy policy only apply to the “Fonts” software and related services. Once you leave the “Fonts” and related services and browse or use other websites, services, and content resources, we have no ability or obligation to protect any personal information submitted by you on software or websites other than the “Fonts” software and related services, regardless of whether you log in, browse or use the aforementioned software or website based on the “Fonts” link or guidance.

6、 Your rights

We attach great importance to your management of personal information and do our best to protect your right to access, modify (update or correct), delete, and revoke authorization and consent to your personal information, so that you have the ability to protect your privacy and security (1) You can file a complaint or report according to our public system. If you believe that your personal information rights may be infringed upon, or if you discover clues of infringement, you can contact us by clicking on “Settings” to enter the suggestion feedback interface. We will provide feedback on your complaint and report within 30 days after verification. (2) You can access the privacy policy on the registration page (3) If we stop operating, we will inform you of our rights. If we stop operating, we will promptly stop collecting your personal information, notify you of the cessation of operation in the form of individual delivery or announcement, and delete or anonymize your personal information held

7、 If you are a minor under the age of 18, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using the “Fonts” software and related services. We protect the personal information of minors in accordance with relevant national laws and regulations. We will only collect, use, share, or disclose personal information of minors when permitted by law, with the explicit consent of parents or other guardians, or necessary to protect them; If we find that we have collected the personal information of a minor without obtaining verifiable parental consent in advance, we will try to delete the relevant information as soon as possible. If you are the guardian of a minor, if you have any questions about the personal information of the minor you are monitoring, please contact us through the contact information disclosed in this privacy policy.

8、 Revision and Notification of Privacy Policy

(1) In order to provide you with better services, the “Fonts” software and related services will be updated and changed from time to time. We will make timely revisions to this privacy policy, which form a part of this privacy policy and have the same effect as this privacy policy. But without your explicit consent, we will not reduce your rights under the current effective privacy policy. (2) After the update of this privacy policy, we will issue an updated version on the “Fonts” application client and remind you of the updated content in an appropriate manner before the updated terms come into effect, so that you can keep up with the latest version of this privacy policy in a timely manner. If you continue to use our services, you agree to accept the revised content of this policy. However, if the updated content requires the collection of audio and video, access to personal sensitive information such as your address book, contact information, geographical location, etc., your consent will still be solicited in a prominent manner again. (3) For significant changes, we will also provide more significant notifications (including but not limited to emails, text messages, private messages, or special reminders on browsing pages to explain the specific changes in privacy policies). The significant changes referred to in this privacy policy include but are not limited to: 1. There have been significant changes in our service model. For example, the purpose of processing personal information, the type of personal information processed, and the way personal information is used; 2. We have undergone significant changes in ownership structure, organizational structure, and other aspects. All changes caused by business adjustments, bankruptcy mergers and acquisitions, etc; 3. Changes in the main objects of personal information sharing, transfer, or public disclosure; 4. Your right to participate in personal information processing and the way you exercise it have undergone significant changes; 5. When there are changes in the responsible department, contact information, and complaint channels for handling personal information security.

9、 Applicable scope

This privacy policy applies to all services provided by Liaoning Qisi Technology Co., Ltd. and its affiliates, including Fonts clients, mini programs, etc. It does not apply to third-party products or services that have a separate privacy policy and are not included in this privacy policy. This privacy policy does not apply to 1. Other third-party products or services, which may include links to other products or websites in H5 and advertising content or fonts services; 2. Other third parties engaged in advertising and promotion for one click font multiple services. Your use of these third-party services (including any personal information you provide to them) will be subject to the terms of these third-party services and privacy policies (rather than this privacy policy). Please carefully read the terms of these third-party services. Please properly protect your personal information and only provide it to third parties when necessary. The term ‘font diversity’ and related services mentioned in this privacy policy may vary depending on factors such as the phone model, system version, and software application version you are using. The final products and services are subject to the “Fonts” software and related services you use. If you have any questions, opinions or suggestions regarding the content of this privacy policy, you can contact us by logging into the “Feedback” page in the “Fonts” client.

10、 Other

(1) The headings in this Privacy Policy are for convenience and reading purposes only and do not affect the meaning or interpretation of any provisions in this Privacy Policy.

(2) Definition of terms related to this “Privacy Policy”: 1. “Fonts” software and related services refer to the products and services provided to you by the company and its affiliated parties through legally owned and operated client applications labeled as “Fonts”, including but not limited to the automatic click function on the mobile screen 2. Related parties refer to any company, institution, or legal representative of the aforementioned company or institution that a party currently or in the future controls, is controlled by, or is under common control with. Control “refers to the ability to directly or indirectly influence the management of the company mentioned, whether through ownership, voting shares, contracts, or other legally recognized means. 3. Personal information refers to various types of information recorded electronically or in combination with other information that can identify a specific natural person’s identity or reflect the activities of a specific natural person, including personal identification information (name, date of birth, ID number, including ID card, military officer certificate, passport, driver’s license), facial features, address, contact phone number, contact list Network identity identification information (including account name, account nickname, email address, as well as password and password protection questions and answers related to the above); Property information, transaction information, personal internet browsing records (network browsing records, click records, etc.), personal commonly used device information (including hardware model, device MAC address, operating system type, software list unique device identification code, etc. describing the basic situation of personal commonly used terminal devices), personal location information, etc. 4. Personal sensitive information refers to personal information that, once leaked, illegally provided, or abused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. The personal sensitive information in this privacy policy includes: personal identification information (ID number, including ID card, military officer certificate, passport, driver’s license), facial recognition features; Property information and transaction information; Network identity identification information (including account name, account nickname, email address, as well as password and password protection questions and answers related to the above); Other information (including address book, personal phone number, itinerary information, and precise positioning information). 5. Deidentification refers to the process of processing personal information through technology, making it impossible to identify the subject of personal information without the use of additional information. 6. Anonymization refers to the process of using technology to process personal information, making the subject of the personal information unrecognizable and the processed information unrecoverable

(3) The copyright of this “Privacy Policy” belongs to Liaoning Qisi Technology Co., Ltd. We have the right to interpret and modify it to the extent permitted by law.

发表回复

您的电子邮箱地址不会被公开。 必填项已用*标注