"TikStar Privacy Policy"

Release Date: August 26, 2021
Effective date: August 26, 2021
Xiamen Sumeng Technology Co., Ltd. is the developer of TikStar. TikStar attaches great importance to users' privacy and personal information protection. When you use our products and services, we may collect and use your relevant information. We hope to use this "TikStar Privacy Policy" (hereinafter referred to as "this policy" or "this privacy policy") to explain to you how we collect, use, store, share and transfer this information when you accept our products and services. And the ways we provide you with access, update, control and protection of this information.
We are well aware of the importance of personal information to you, and will do our best to protect your personal information safe and reliable. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: principle of consistent rights and responsibilities, principle of clear purpose, principle of choice and consent, principle of least sufficient, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc. . At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with the mature security standards of the industry.
When you click to confirm and agree to this policy, it means that you have fully read, understood, and accepted all the content of this policy, and have reached an agreement with us. This policy is legally binding on you and us.

One. Definition

Personal information: refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. For the personal information referred to in this privacy protection policy, please refer to the types listed in the clause "How do we collect and use your personal information".
Personal sensitive information: refers to personal information that, once leaked, illegally provided, or misused, may endanger personal and property safety, and easily lead to personal reputation, physical and mental health damage, or discriminatory treatment. The personal sensitive information involved in this privacy protection policy includes: network identification information (including account name, account nickname and password related to the foregoing); other information (including address book, personal phone number, mobile phone number, location information, webpage Browse records).

Two. How do we collect and use your personal information

We will only collect and use your personal information for the following purposes described in this privacy protection policy.
2.1 To help you register as a user of TikStar.
2.1.1 To help you become a user of TikStar, that is, to complete the creation of an account, so that we can provide you with TikStar registered user services, we provide you with a variety of registration channels for you to choose. When you choose to register with your mobile phone number, you need to provide us with your mobile phone number and password (encrypted) personal sensitive information. We use this type of information to send verification code information for you to submit to verify whether your identity is valid.
2.1.2 When you choose to use a third-party account (such as WeChat) to register and log in to the TikStar user account more conveniently, we will access and collect your expressly authorized personal information through indirect access (you are in the third-party account Please refer to the public information and permissions authorized by different third-party accounts for specific avatar and nickname information) and bind your third-party account with your TikStar registration account. If you refuse to provide information under a third-party account, you cannot choose to use the third-party account to register and log in. We promise the legitimacy of the third-party account channel source of such personal information.
2.1.3 You are aware that we collect mobile phone number information to meet the network real-name system requirements of relevant laws and regulations. If you do not provide such information, you may not be able to use our registered user service normally. However, your failure to provide mobile phone number, third-party account information and supplementary information will not affect your enjoyment of some basic core business functions.
2.2 Provide you with personalized content display and push
The display and push of personalized content is to provide you with page content that is more in line with your needs. If you refuse to agree to directly provide or authorize the provision of information, we will not be able to provide you with the display and push of personalized content. In order to achieve this core business function, we will collect and based on your device information (including device model, operating system version, device settings, unique device identifier, network device hardware address MAC and other software and hardware characteristics information), device location related Information (including IP address, GPS location, and sensor information such as WLAN access points, Bluetooth, and base stations that can provide relevant information), and use this to make an indirect population portrait that does not identify you based on your community feature tags, so as to provide you Provide personalized content display and push.
2.3 Improve our products or services
We may also obtain other information about you for reasonable needs to improve our products or services, including relevant feedback information provided when you contact customer service, questionnaire response information sent to us when you participate in a questionnaire survey, and your relationship with us. Related information that we authorized to obtain when interacting with our affiliates and our partners. For the information collected from your various devices, we may associate them so that we can provide you with consistent services on these devices. We may combine information from one service with information from other services in order to provide you with services, personalized content and suggestions.
2.4 Provide you with security
In order to improve the security of your use of our services, protect the personal and property safety of you, other users or the public, and better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and more Accurately identify violations of laws and regulations or platform-related agreement rules. For example, we will comprehensively analyze user account activity abnormalities, multi-terminal logins, abnormal traffic, and collect information such as network device hardware addresses (MAC), application lists, etc., to protect you 'S account security. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of our products. We will not collect MAC, application list and other information before you click to agree to the user agreement.
2.5 Provide you with content publishing services such as pictures and texts
When you post pictures, texts and other content by yourself, we will ask you to authorize the photo permission. During this process, you can choose whether to provide it to us. If you refuse to authorize the provision, you will not be able to use this additional function, but it will not affect your normal use of other functions of TikStar.

3. How do we use cookies and similar technologies

To ensure the normal operation of the tool, to provide you with an easier access experience, to recommend content or advertisements that may be of interest to you, etc., we will store a small data file called a cookie on your mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. For example, with the help of cookies, websites and clients can store your registered account number, email address, password (encrypted) and preferences. Cookies can also help us count traffic information and analyze the effectiveness of page design and advertising.
We will not use cookies for any purpose other than those described in this privacy protection policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your mobile device (Path: Settings-Clear Cache), but if you do this, you need to personally change the user settings every time you use the tool. You can also choose not to be tracked by deleting cookies and restoring (clearing) mobile terminal settings (content and data).

Four. How do we share, transfer, and publicly disclose your personal information

4.1. Sharing and disclosure We will not share your personal information with any company, organization or individual other than TikStar, except in the following cases:
1) Sharing with your (and guardian's) explicit consent or authorization or your active choice.
2) We may share your personal information externally in accordance with laws and regulations, the need for litigation dispute resolution, or the requirements of administrative and judicial organs in accordance with the law. For example, if we determine that you have violated laws and regulations or seriously violated relevant agreement rules, or to protect the personal and property safety of TikStar and its affiliated company users or the public from infringement, we may disclose information about Your personal information, including related violations and measures that TikStar has taken against you. For example, if you or the account you use uploads illegal videos, illegal videos and seriously violates our platform rules, violates laws and regulations, and/or violates public order and good customs, causing significant social impact and causing reputational damage to our platform, we may disclose publicly Your information and penalties.
3) In order to enable you to log in by third parties, receive information pushes, share information on third-party platforms, use location services, and the above-mentioned services and functions, we will embed software tool development kits (SDK) or Other similar applications are subject to strict security checks to protect data security. We have listed the SDK related situations involving the use of user information one by one: SDK information table
4.2. Information transfer We will not transfer your personal information to any company, organization or individual, except in the following cases:
1) Obtain your explicit consent or authorization in advance;
2) According to applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;
3) When it comes to mergers, acquisitions, asset transfers or similar transactions, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy, otherwise we will require that The company or organization re-seeks authorization and consent from you.

V. How do we protect and save your personal information

We attach great importance to information security. We use various security technologies and procedures to prevent information loss, improper use, unauthorized reading or disclosure. However, please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the system and communication network you use to access our services may cause problems due to circumstances beyond our control.
We will train and assess employees’ awareness of data security and security capabilities, conduct identity authentication and authority control on employees who handle personal information, and sign confidentiality agreements with employees and partners who contact your personal information to clarify positions Responsibilities and Code of Conduct. If there is any violation of the confidentiality agreement, the labor or cooperative relationship with us will be terminated immediately, and the relevant legal responsibilities will be investigated. The confidentiality requirements of the personnel contacting personal information are also raised when they leave their posts.
In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations and no later than 30 natural days at the latest: the basic situation and possible impact of the security incident, and the disposal measures we have taken or will take , You can independently prevent and reduce risk suggestions, remedial measures for you, etc. We will promptly inform you of the relevant situation of the incident by email, letter, telephone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will adopt a reasonable and effective way to issue an announcement.
We also ask you to understand that due to technological limitations and rapid development in the Internet industry, as well as various malicious attack methods that may exist, even if this unit does its best to strengthen security measures, it is impossible to always guarantee 100% security of information. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing personal information such as your account password to others.

VI. Your rights

6.1 Access rights
In principle, you can access your personal information in the following ways:
Account information: You can log in to your personal account at any time (click "My"-click the avatar icon) to access or edit the profile information in your account.
6.2 Right of correction
After verifying your identity and the correction does not affect the objectivity and accuracy of the information, you have the right to correct or update your personal information (including nickname, profile picture, and password information). You can log in to our client Make corrections (click "My"-click the avatar icon or click the gear icon). Under certain circumstances, especially when the data is incorrect, submit your correction application to us by contacting customer service, asking us to correct or update your data , Except as otherwise provided by laws and regulations. However, due to security and identification considerations, you may not be able to modify some of the initial registration information submitted during registration.
6.3 Right of erasure
You can contact us using the methods provided on our website or client. After providing relevant information, we will help you delete your personal information. If we stop operations or stop providing related services, we will promptly stop continuing to collect your personal information activities, will notify you of the suspension of operations in the form of one-by-one delivery or announcement, and delete or anonymize the personal information we hold化处理。 Treatment.
6.4 Right of Claim
If you need a copy of your personal data, you can contact us through the methods provided at the end of this policy. After verifying your identity, we will provide you with a copy of your personal information in our services (basic information, identity information) ), except as otherwise provided by laws and regulations.
6.5 Right to withdraw consent
If you want to change the authorization scope of related functions (location, address book, camera), you can modify your personal settings through your hardware device. If you encounter operational problems during this process, you can contact us through the methods provided at the end of this policy. After you cancel the authorization for the collection of relevant personal information, we will no longer collect this information, and we will no longer be able to provide you with the above information. The corresponding services; but you know and agree that unless you exercise the aforementioned "right to delete", your behavior will not affect our processing and storage of personal information based on your previous authorization.
6.6 Log out of your account
You can log off your account in the APP [My]-[Settings]-[Account Logout]. After confirming the logout, the account will be immediately logged out. In order to ensure that the user or a person authorized by the user applies for cancellation of the account, the platform will collect and verify the personal identity information of the user and the applicant, and do its utmost to protect the rights and interests of the user. TikStar strictly complies with the provisions of laws and administrative regulations on the protection of personal information. The above information is only used for this account cancellation business. Special reminder, the act of canceling your account is irreversible. Once you cancel your account, the platform will delete or anonymize the information about your account. At the same time, you will not be able to obtain platform services through the cancelled account.

VII. Protection of minors

We attach importance to the protection of personal information of minors. During your use of our services, we presume that you have the corresponding capacity for civil conduct. If you are a minor, before you use related services, you should read this privacy policy carefully under the supervision and guidance of your parents or other guardians, and provide us with the consent of your parents or guardians. provide information.
In the case of collecting personal information of minors through the use of our products or services with the consent of their parents or guardians, we will only use, share, or transfer them when permitted by laws and regulations, the parents or guardians have expressly agreed, or are necessary to protect minors Or disclose this information.

8. Modification of Privacy Policy

TikStar will revise the privacy policy when necessary. Please understand that we may revise this privacy policy in due course, and we will mark the date of the most recent update of this privacy policy. Without your explicit consent, your rights in accordance with this privacy policy will not be reduced. For major changes, we will also provide more noticeable notifications (including for some services, we will send notifications via email, push notifications in the APP, etc., to explain the specific changes in the privacy policy). Please visit this privacy policy frequently to read the latest version.

9. Scope of application

This privacy protection policy only applies to all services provided by TikStar and its affiliates, including TikStar clients, websites, etc., and does not apply to third parties that have a separate privacy protection policy and are not included in this privacy protection policy Product or service.
This privacy protection policy does not apply to products or services linked to other third parties in the TikStar service. Your use of these third-party services (including any personal information you provide to these third parties) will be subject to the terms of service of these third parties and Privacy protection policy constraints (not this privacy protection policy), please read the third party's terms carefully for specific provisions. Please properly protect your personal information and provide it to third parties only when necessary.

10. How to contact us

If you have any questions, complaints, comments or suggestions about this privacy protection policy, personal information security and minors' personal information protection related matters, you can send your questions to coupon@xmsumeng.com.
Name of the operating entity: Xiamen Sumeng Technology Co., Ltd.
Registered address: Area A, Room 402, No. 28, Guanri Road, Phase II, Xiamen Software Park
Contact: 0592-5966727
We will review the issues involved as soon as possible and reply in a timely manner after verifying your user identity. Under normal circumstances, we will respond to your request within 15 working days.
If you are not satisfied with our response, especially if you believe that our personal information processing has harmed your legal rights, you can also seek a solution by filing a lawsuit with the court with jurisdiction in the defendant's domicile.