"MiliYue" Privacy Policy

This "Privacy Policy" (referred to as "this Policy") applies only to the MiliYue App products or services. When you use our products, we will collect, store, use, and externally provide your personal information in accordance with this Policy. At the same time, we will explain through this Policy how we provide you with services to access, update, manage, and protect your personal information. This Policy is closely related to your use of our products, and we recommend that you read and understand the entire content of this Policy carefully. Once you start using any MiliYue products or services, it means that you have fully understood and agreed to this Policy. If you have any questions, comments, or suggestions, please contact us via email: miliyue2024@126.com
The following are special reminders from our company, please pay special attention:
1. We hope that users have carefully considered and hereby confirm that the provision of any personal information to our company is appropriate before doing so. Users hereby agree that their personal information can be processed for the purposes and in the manner described in this Policy.
2. The realization of personal information rights includes but is not limited to access, correction, deletion, cancellation, withdrawal of authorization, timely response, etc., to ensure users' control over their personal information.
3. Our company will strictly process users' personal information in accordance with this Policy and the user's consent. If the user does not agree to this Policy, the user should immediately stop using this software service.
4. Please understand that this software is only provided for adults aged 18 and above. If the user is a minor under the age of 18, please do not register or use this software in any way.
5. Once the user starts using any service of this software, it means that the user has fully understood and agreed to this Policy. It is specially stated that this Policy does not apply to services provided by other third parties to users, nor does it apply to products or services that have independently set separate privacy policies.
[Special Note] We do not provide services to minors under the age of eighteen. Section Six of this Policy specifically regulates the protection of minors' personal information. If you are a minor, especially a minor under the age of fourteen, please do not register as our user or use our products and services.

This Policy will help you understand the following:

I. How We Collect and Use Personal Information
II. How We Use Cookies and Similar Technologies
III. How We Share, Transfer, and Publicly Disclose Personal Information
IV. How We Protect Personal Information
V. Your Rights
VI. How We Handle Minors' Personal Information
VII. How We Store Personal Information
VIII. How We Update This Policy
IX. Others

We deeply understand the importance of personal information to you and will do our utmost to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and adhere to the following principles to protect your personal information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise to adopt corresponding security protection measures in accordance with industry mature security standards to protect your personal information. Please read and understand this Policy carefully before using our products.

I. How We Collect and Use Personal Information

Our company will collect and use users' personal information based on the principles of legality, legitimacy, necessity, and transparency, for the purposes described in this Policy. If our company uses users' personal information for purposes not stated in this Policy, or collects users' personal information for other specific purposes, our company will inform users in a reasonable manner and obtain users' consent again before use. 1.1 Personal Information Voluntarily Provided by Users During the Process of Providing Products and/or Services
1.1.1 To realize the basic business functions of this software, our company needs to collect the following personal information from users. If users refuse to provide it, our company will not be able to provide corresponding services to users. (1) Account Registration, Login, and Verification
When users register a personal account in this software, they need to provide the following information to our company to complete the registration:
1) User's mobile phone number and SMS verification code: Our company will send an SMS verification code to the user based on the provided mobile phone number to verify the accuracy of the user's mobile phone number. If the user does not provide the received SMS verification code, registration will fail, and the user will not be able to register and continue using this software service. Please note that the mobile phone number provided by the user will be used as the user account for subsequent use of this software and as the user identity credential for logging into this product.
2) Password information: The user needs to set a login password for their personal account, which will be used as the verification method when the user chooses to log in using their mobile phone number and password.
3) Date of birth information: The user needs to provide their real date of birth for their personal account. Our company will determine the user's age based on the provided date of birth. After the update, this software only provides services to adult users aged 18 and above. If the user is under 18 years of age or does not provide date of birth information during registration, the user will not be able to register as our user and continue using this software service.
4) Facial recognition information: The user needs to provide real facial recognition information for their personal account so that our company can collect the user's facial feature information for verification. If the user does not provide such information, registration will fail, and the user will not be able to register and use this software service.
5) Gender: The user needs to fill in their personal gender information for their personal account. If the user does not provide such information, registration will fail, and the user will not be able to register and use this software service.
6) Hobbies and interests: The user needs to select their hobby and interest tags. Our company will assign the user to specific hobby and interest groups based on the specific tags selected by the user. If the user refuses to select specific hobby and interest tags, registration will fail, and the user cannot continue to register and use this software service.
7) Occupation, height, weight, body type, figure, WeChat, dating range, personal signature: Users can choose to provide relevant information. Our company will display the information provided by the user to other users. This information is optional, and not choosing it does not affect the use of normal functions.
When the user completes the registration process by providing the above information and obtains a MiliYue software account, it is deemed that the user has successfully logged into the software and is always in a logged-in state. If the user needs to log out and log in again, the user needs to enter the mobile phone number and then enter the login password set during registration or choose to receive an SMS verification code to complete the login.
(2) Retrieve Password
When a user needs to retrieve their password, they need to provide the mobile phone number provided during registration and the received SMS verification code to verify their identity. After verification, the user needs to set a new password to replace the old one for the next login using the username + password method. Our company has the right to change the above verification method and process for retrieving passwords at any time. The specific method actually used shall be subject to the display on the software interface.
(3) Change Bound Mobile Number
If the user wishes to change the mobile number provided during registration while maintaining the login status, the user needs to go to [Settings - Bind Mobile] themselves, enter the new mobile number, and complete the change after entering the verification code received by the new mobile number.
If the user is logged out and requests to change the bound mobile number for login because the original mobile number is no longer in use, the user needs to follow the prompts on the interface. After our company verifies the user's identity, the mobile number change can be completed.
(4) Information Content Publishing Function
When users use the 'Status Publishing' or 'Chat' function of this software or other functions involving information publishing, users agree and confirm that their publishing behavior is deemed as their consent to our company collecting the information they publish afterwards. If our company discovers or receives complaints that the information published by the user violates any laws, regulations, or the terms of the Registration Agreement and this Agreement, our company has the right to deal with it according to the terms of the Registration Agreement.
(5) Feedback
If users have any feedback regarding this software service, users can provide feedback through "Settings" - "Help & Feedback" - "Feedback" within this software. Users need to provide a specific description of the opinion and upload proof photos to help our company understand the issues raised and find corresponding solutions.
(6) Marketing Activities
In order to better serve users, our company may reasonably send commercial service information to users via SMS. If users do not wish to receive such commercial marketing activity information, users can unsubscribe by editing the corresponding information. After successful unsubscription, our company will no longer send this type of SMS. The specific unsubscription information shall be subject to the methods listed in the SMS.

1.2 Personal Information Actively Collected by Our Company During the Process of Providing Software Services to Users
Under the premise of complying with laws and regulations, in order to protect the security of users' accounts and provide users with better services, our company will collect and use the following information generated by users during their use of this software service:
1.2.1 Device Information
In order to necessary adapt this software to the user's mobile device, provide users with a secure and trustworthy product and usage environment, and ensure the secure operation of this software, when users use this software, based on the specific permissions granted by the user during software installation and use, our company will collect the user's device model, device identification code (including but not limited to IMEI/Android ID/IDFA/IDFV/OPEN UDID/GUID/OAID/SNID/MEID, Advertising ID, SIM card phone number, IMSI, ICC ID), software list, device operating status information, system version, MCC, MNC, MAC address information (including phone MAC address and Bluetooth MAC address), device sensor information, installed APP information or running process information. Collecting this information is to help our company with bug analysis, anti-cheating, anti-black production and other security protection work, ensure the user's normal use of this software service, improve and optimize our product experience, and protect the user's account security. At the same time, unless otherwise specified in this Policy, our company will not provide the user's device information to any third party, but our company cannot guarantee that other third parties will not obtain the user's device information through other channels and combine the user's device information with other information to identify the user's personal identity. Any loss caused to the user as a result shall be claimed from that third party. The above device information is basic information collected to provide services. If the user does not want the above device information to be collected by our company, it may result in our company being unable to provide normal services.
1.2.2 Log Information
When users use this software service, our company will collect relevant network log information of the user, including software crashes, system activity information, device network connection status, browsing history, click records, software usage records, and IP address information. Our company collects the above information to better use it for security maintenance and optimization of this software service, providing users with a better user experience. The above log information is basic information collected to provide services. If the user does not want the above log information to be collected by our company, it may result in our company being unable to provide normal services.
1.2.3 Geographical Location Information
When the user agrees to enable the location permission, our company will collect the user's geographical location information to provide the user with matching activity dynamics published by users in the same city, recommendations for nearby merchant group buying products, and to provide convenient services for you. If the user refuses our company to collect such information, the above functions of this software will not be realized.
To protect the legitimate rights and interests of users (combating black production, preventing fraud) and maintaining the secure operation of this software service, our company will collect the base station information connected to the user's device (including base station status, LAC, BID, NID, SID, signal strength) and WIFI information (including BSSID, SSID, signal strength).
1.2.4 Facial Data (Core Module)
To realize the "Real Person Real Avatar Authentication" function and ensure the authenticity of the platform's dating environment, MiliYue will collect and temporarily process your facial data when you actively initiate authentication. The specific explanation is as follows:
1. Facial Data Retention Statement: During the real person authentication process, MiliYue only temporarily obtains and processes your facial image data and feature information, and will not retain the user's original facial data or complete feature data for a long time. After completing the verification of the face against the avatar photo, the relevant original facial data will be immediately and automatically deleted, and only the "authentication passed" result status is retained. This result status does not contain any facial information that can identify an individual.
2. Reason for Storage: Temporary storage of facial data is solely for the single purpose of achieving "real person real avatar verification", specifically including: confirming through facial recognition technology that the current operator is the account holder themselves, while comparing the consistency of facial features with the uploaded avatar to ensure that the avatar used by the account is a real photo of the user themselves, preventing fake avatars and identity fraud, and protecting the dating safety and rights of other users on the platform.
3. Storage Period and Reason: The temporary storage period for facial data is strictly controlled during the authentication process execution period, with a maximum of no more than 5 minutes. After the authentication process is completed (whether passed or not), the system will immediately trigger a data deletion command. The reason for setting this period is: the authentication process can usually be completed within 3-5 minutes. This period is sufficient to support the technical verification needs. Retaining data beyond this period has no functional value and can minimize the risk of privacy leakage that may be caused by data retention, complying with the "minimum necessity" principle of data processing.
4. Third-Party Sharing Situation: MiliYue's facial recognition technology is supported by Alibaba Cloud Real Person Authentication, therefore temporary collected facial data will be shared with this third-party service provider. The reason for sharing is: to utilize the third-party's professional face verification technical capabilities to improve the accuracy and security of authentication results and ensure the compliance of the authentication process. This third-party service provider only processes facial data within the scope of providing technical services to our company. It temporarily calls and collects photo data through the SDK, and stores and deletes according to our company's instructions. It only temporarily stores facial data to complete the verification operation. After the verification is completed, the relevant data will be completely deleted within 10 minutes; meanwhile, the device information obtained during its service process (including device model, operating system version, device settings, device environment and other characteristic information) will not be stored. Its privacy protection practices follow the "Alibaba Cloud Real Person Authentication Service Privacy Policy". This service provider has passed China's National Cybersecurity Level Protection certification and has a comprehensive data security protection system. Except for the third parties explicitly stated above, this APP will not share user facial data with any other third parties.
1.2.5 Other Necessary Information
In order to improve the security of the services provided by this software to users, protect the personal and property safety of users or other users or the public from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusion, and more accurately identify situations that violate laws and regulations or this Policy, our company may use or integrate the user's user information, transaction information, device information, relevant network logs, and information shared with our company by our affiliated companies or partners after obtaining user authorization or based on law, to comprehensively judge user account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

1.3. System Permissions Called by This Software
As mentioned above, in order to provide users with this software service, our company needs to use system permissions on the user's device (excluding permissions called by integrated third parties) to collect relevant personal information. Although it has been involved in the previous sections, this section will summarize all system permissions used by this software to present them to users more systematically, completely, and transparently. Users can choose whether to authorize our company to use the relevant permissions of the device. If the user does not authorize our company to use the relevant permissions, it will cause some or all services to be unavailable. If some functions become unavailable, it will not affect the use of other functions.
1.3.1. Photo Album and Storage Permission
When the user agrees to enable this permission, our company will use the photo album reading and storage function on the user's device. This function will be used for the user to upload text and image content from the device, and can also cache text and image content generated during the user's use of this software service. Please note that our company will not automatically read the stored content of the user's local photo album. It will only obtain data after the user agrees to enable this permission and actively selects the corresponding picture or video in the photo album. If the user refuses this authorization, the aforementioned functions will not work properly.
1.3.2. Camera Permission
When the user agrees to enable this permission, our company will use the camera shooting function on the user's device. This function will be used to realize photo taking and video recording functions, and to collect and identify the picture and video information taken or recorded during the realization of these functions. If the user refuses this authorization, the aforementioned functions will not be available.
1.3.3. Geographical Location Permission
When the user agrees to enable the location permission, our company will collect the user's geographical location information to display the user's geographical location when the user posts, or to inform other users of this account user's geographical location when other users use this software service. If the user refuses our company to collect such information, they will not be able to register for a MiliYue software account. For those already registered, it will cause some or all functions of this software to be unavailable.
1.3.4. Device Information Access Permission
In order to ensure your normal use of our services, maintain the normal operation of the APP's basic functions, optimize the performance of this APP product based on your device terminal and network status, improve your APP experience, and ensure your account security, we will collect your device name, device type, device model and version, operating system, system attributes, IP address, carrier information, Wi-Fi status/parameters, device identifiers (such as IMEI, IMSI, MAC address, Android ID, hardware serial number), application ID, network type, sensor information, installed APP information or running process information. Please note that sensor information alone does not constitute personal information, and we will not use sensor information for other purposes.
1.3.5. Clipboard Access Permission
When you share or receive shared information, participate in activities, etc., we need to access your clipboard locally to read the commands, sharing codes, and links contained therein to achieve functions or services such as jumping, sharing, and activity linkage. We only upload your clipboard content to our server when we locally identify that it belongs to instructions for jumping, sharing, activity linkage, etc. Apart from this, we will not upload other information from your clipboard to our server.
1.3.6. Collecting Location Information, IMEI, Pictures and Other Information
Usage scenario, purpose description: Interface authentication and verification service for requesting server data, conducting data statistics and operational analysis, and as a means for authorized billing and user identity recognition: at the same time, this information will also be used to more accurately locate and solve problems encountered by developers and end users when using our products and/or services, and to avoid conflicts with other applications, thereby providing you with better product services. Frequency of acquisition: Acquisition frequency is IMSI 4 times/minute ANDROID ID 8 times/minute.
1.3.7. Device Push Notification Permission
In order to send you timely system messages, customer service reminders, friend chat reminders and other notifications related to you, we may request your device's push notification permission. You can turn off this permission in your device settings at any time, but it may affect the timeliness of some services.

1.4 Changes in the Purpose of Collecting and Using Personal Information As our business develops, we will make adjustments to our products. When new functions or services are related to registration, publishing graphic content, account recommendation, interactive communication, search, query, authentication, virtual property scenarios, the collection and use of personal information is directly related to the original purpose. In scenarios not directly related to the original purpose, we will obtain your consent again before collecting and using your personal information.
1.5 Personal Information Collected and Used Without Consent According to laws, regulations, and relevant national standards, we collect and use your personal information without your authorized consent in any one or more of the following circumstances. (1) Directly related to national security and national defense security;
(2) Directly related to public security, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(4) Where it is necessary to protect the life, property, and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain your consent;
(5) The personal information collected is disclosed to the public by yourself;
(6) Collected from legally publicly disclosed information, such as legal news reports and government information disclosure;
(7) Necessary for the conclusion or performance of a contract at your request;
(8) Necessary for the safe and stable operation of the product, such as for discovering and handling product failures;
(9) Necessary for legitimate news reporting;
(10) Necessary for academic research institutions to conduct statistical or academic research based on public interests, and when providing the results of academic research or description to the outside, the personal information contained in the results is de-identified;
(11) Other circumstances stipulated by laws and regulations and relevant national standards.

II. How We Use Cookies and Similar Technologies

To make your visit easier, when you use our products, we may use small data files to identify your identity. This can save you the step of repeatedly entering registration information or help determine the security status of your account. These data files may be Cookies. Cookies usually contain identifiers, site names, and some numbers and characters. You can manage or delete Cookies according to your preferences. In addition to Cookies, we also use other similar technologies such as web beacons and pixel tags on our platform. We will not use Cookies and similar technologies (such as Beacons, Proxy, etc.) for any purposes other than those described in this Policy. You can manage or delete Cookies according to your preferences. But please note that if you disable Cookies, you may not be able to enjoy the best service experience, and some services may not function properly.

III. How We Share, Transfer, and Publicly Disclose Personal Information

To make your visit easier, when you use our products, we may use small data files to identify your identity. This can save you the step of repeatedly entering registration information or help determine the security status of your account. These data files may be Cookies. Cookies usually contain identifiers, site names, and some numbers and characters. You can manage or delete Cookies according to your preferences. In addition to Cookies, we also use other similar technologies such as web beacons and pixel tags on our platform. We will not use Cookies and similar technologies (such as Beacons, Proxy, etc.) for any purposes other than those described in this Policy. You can manage or delete Cookies according to your preferences. But please note that if you disable Cookies, you may not be able to enjoy the best service experience, and some services may not function properly.
3.1 Registration and Services
During the registration and service usage process, if you provide the following information to complete your profile: avatar, photo album, personal tags, nickname, gender, age, height, weight, city, occupation, real-name authentication, etc., it will help us provide you with better services and experiences. When you actively cancel your account, we will anonymize or delete your personal information as soon as possible in accordance with applicable laws and regulations.
When you use the activity publishing function, we will request your authorization for storage (photo album, media, and other files) to ensure that images can be uploaded. If you refuse to authorize the provision, you will not be able to use the corresponding function, but it will not affect your normal use of other functions of MiliYue.
When you publish dynamic content, the following content is prohibited:
- Hate speech, incitement to violence
- Adult or sexually suggestive content
- Content that infringes intellectual property rights
- Violators will face content deletion or account ban.

3.2 How to Share Personal Information Except in the following circumstances, we will not share your personal information with any company, organization, or individual: (1) Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
(2) We may share your personal information externally in accordance with legal provisions or mandatory requirements from government authorities.
(3) Sharing with our affiliates: Your personal information may be shared with our affiliates. We only share necessary personal information and are bound by the purposes stated in this Policy. If affiliates wish to change the purpose of personal information processing, they will seek your authorization and consent again.
(4) Sharing with authorized partners: Only for the purposes stated in this Policy, some of our services will be provided by authorized partners. We may share certain personal information of yours with partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share the personal information necessary to provide the services. Our partners are not authorized to use the shared personal information for any other purposes.
(5) User active sharing of information: Many services of our product allow you to publicly share your relevant information not only with your social network but also with all users using the service. For example, the information you upload or publish in the product (including your public personal information, the lists you create), your responses to information uploaded or published by others, and including location data and log information related to this information. Other users using our services may also share information related to you (including location data and log information). In particular, the social media services of the product are designed to allow you to share information with users around the world, so that shared information can be delivered in real-time and widely. As long as you do not delete the shared information, the relevant information remains in the public domain; even if you delete the shared information, the relevant information may still be independently cached, copied, or stored by other users or non-affiliated third parties not under our control, or saved in the public domain by other users or such third parties. The content and information you provide, upload, or publish in our services (such as photos or information about your social activities) may disclose your sensitive personal information. You need to carefully consider whether to use our services to disclose your sensitive personal information. Our authorized partners include the following types:
Suppliers, service providers, and other partners. We send information to suppliers, service providers, and other partners who jointly provide services for you globally. These joint efforts include providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service or prizes, marketing promotions, payment convenience, or conducting academic research and surveys. For example, when you need to use the location function, to achieve this function, we may collect your location information and related device information (such as hardware model, operating system version number, International Mobile Equipment Identity (IMEI), Network Device Hardware Address (MAC)) after de-identification and provide it to the aforementioned providers. You can refuse to provide such information, but it will not affect your use of other services. For companies, organizations, and individuals with whom we share personal information, we agree to strict confidentiality terms with them. At the same time, we will assess their data security capabilities and environment and require third parties to process this information with confidentiality and security measures no less than those required by this Policy. We require them to process personal information in accordance with our instructions, this Policy, and any other relevant confidentiality and security measures. If a third party needs to use personal information beyond the scope of the aforementioned authorization due to business needs, that third party will need to seek your consent again.
Therefore, please carefully consider the information content you upload, publish, and communicate through the product's services. In some cases, you can control the range of users who have the right to browse your shared information through the privacy settings of certain services of the product. If you request to delete your personal information from the product's services, please operate through the methods provided by the special service terms.
3.3 How to Transfer Personal Information
We will not transfer your personal information to any company, organization, or individual, except in the following cases:
(1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
(2) In the event of mergers, acquisitions, asset transfers, or bankruptcy liquidation, if personal information transfer is involved, we will require the new holder of your personal information to continue to be bound by this Policy, and will continue to protect or require the successor to continue to protect your personal information in accordance with laws and regulations and security standards no less than those required by this Policy. Otherwise, we will require that company or organization to seek your authorization and consent again.
3.4 How to Disclose Personal Information
We will only publicly disclose your personal information and adopt security protection measures that comply with industry standards under the following circumstances:
(1) After obtaining your explicit consent;
(2) Disclosure based on law: Under the circumstances of laws, legal procedures, litigation, or mandatory requirements from government authorities, we may publicly disclose your personal information.
(3) Publishing penalty announcements for违规 accounts and fraudulent behaviors.

3.5 Personal Information Shared, Transferred, or Publicly Disclosed Without Consent
According to laws, regulations, and national standards, in the following circumstances, we may share, transfer, or publicly disclose your personal information without obtaining your authorized consent:
(1) Directly related to national security and national defense security;
(2) Directly related to public security, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
(4) Where it is necessary to protect the life, property, and other major legitimate rights and interests of you or other individuals but it is difficult to obtain your consent;

3.6 Personal information that you have disclosed to the public on your own initiative;
3.7 Personal information collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels.

IV. How We Protect Personal Information

The personal information protection measures provided in this Policy only apply to our products. Once you leave our products, browse or use other websites, services, and content resources, we have no ability or obligation to protect any personal information you submit on software or websites outside of our products, regardless of whether your login, browsing, or use of the aforementioned software or websites is based on links or guidance from our products.

4.1 To ensure the security of your information, we are committed to using various security technologies and supporting management systems to minimize the risk of your information being leaked, damaged, misused, accessed without authorization, disclosed without authorization, and altered. We will take all reasonably feasible measures to protect your personal information. For example:
(1) SSL encryption protection when exchanging data between your device and the "product service";
(2) We use encryption technology to ensure data confidentiality;
(3) We use trusted protection mechanisms to prevent data from malicious attacks;
(4) We deploy access control mechanisms to ensure that only authorized personnel can access personal information;
(5) We hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information;
(6) Other reasonably feasible protection measures that we consider.

4.2 We will use encryption technology, anonymization processing, and other reasonably feasible means that are not lower than the industry average to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.
4.3 We will take all reasonably feasible measures to ensure that unrelated personal information is not collected. We will only retain your personal information for the period necessary to achieve the purposes described in this Policy, unless the retention period needs to be extended or is permitted by law. We only retain your personal information for the period necessary for the purpose of providing product services. For example, information such as audio and video information, comments, and likes you publish will be retained during the period when you have not withdrawn, deleted, or canceled your account. After the necessary period, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations.
4.4 The Internet is not an absolutely secure environment, and instant messaging and other methods of communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use complex passwords to help us ensure the security of your account. You must keep your product login name and other identity elements properly. When you use the product, we will identify your identity through your login name and other identity elements. Once you disclose the aforementioned information, you may suffer losses and may incur adverse legal consequences for you. If you find that your product login name and/or other identity elements may have been or have been leaked, please contact us immediately so that we can take timely corresponding measures to avoid or reduce related losses.
4.5 We will irregularly update and publicly disclose relevant content such as security risk reports and personal information security impact assessment reports.
4.6 The Internet environment is not 100% secure. We will strive to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are breached, resulting in information being accessed without authorization, publicly disclosed, altered, or destroyed, causing damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.
4.7 In the unfortunate event of a personal information security incident, we will inform you in accordance with the requirements of laws and regulations in a timely manner: the basic situation of the security incident and its possible impact, the measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedies for you. We will promptly inform you of the relevant situation of the incident by email, phone, push notification, etc. When it is difficult to inform each personal information subject individually, we will issue an announcement in a reasonable and effective manner. We will also actively report the handling of personal information security incidents to regulatory authorities as required.

V. Your Rights

In accordance with relevant laws, regulations, national standards of the People's Republic of China, as well as industry common practices, we guarantee that you can exercise the following rights regarding your personal information. The scope and method of accessing, modifying, and deleting personal information will depend on the specific services you use:

5.1 Access Your Personal Information You have the right to access your personal information, except for exceptions provided by laws and regulations. If you wish to exercise your right to data access, you can access it yourself in the following ways: Account Information – If you wish to access or edit the personal profile information in your account, change your password, add security information, etc., you can click on "Me" in the lower right corner of the product client application, and then click "Edit Profile" or "Settings" in the upper right corner to perform the corresponding operations. If you are unable to access the above personal information through the above methods, you can contact us by sending an email. We will respond to your access request within 15 days.
5.2 Correct Your Personal Information In general, you can directly delete the content you publish and browse, modify, and delete the information you submit at any time. However, for security and identity identification considerations, you may not be able to independently modify certain initial registration information submitted during registration (such as information after real-name authentication); if you do need to modify such information, you can submit a correction request by sending an email or contacting online customer service. We will review the issues involved as soon as possible and reply promptly after专人 verifies your user identity.
5.3 Delete Your Personal Information Under the following circumstances, you can request us to delete personal information:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect and use your personal information without obtaining your consent;
(3) If our processing of personal information violates our agreement with you;
(4) If you no longer use our products or services;
(5) If we no longer provide you with products or services.

If we decide to respond to your deletion request, we will also simultaneously notify the entities that have obtained your personal information from us and require them to delete it in a timely manner, unless otherwise stipulated by laws and regulations, or these entities have obtained your independent authorization.
When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but will delete it when the backup is updated.
5.4 Manage Your Authorization Scope
Each business function requires some basic personal information to be completed. For the collection and use of additional personal information, you can give or withdraw your authorized consent at any time. You can perform the following operations yourself: You can change the scope of your authorization in functions and services by deleting information, turning off device functions, or going through "Settings" - "Account & Security, Notifications, Privacy" in the product client application. Specific business functions and services require your personal information to be completed. After you withdraw your consent, we will not be able to continue to provide you with the functions and services corresponding to the withdrawn consent, and will no longer process your corresponding personal information. However, your decision to withdraw consent will not affect the previous personal information processing based on your consent. After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the previous personal information processing based on your authorization.
5.5 Cancel Account
You can cancel your previously registered account at any time. You can apply to cancel your account by email or by contacting customer service. Before canceling the account, we will verify your personal identity, security status, device information, etc. Canceling the account is an irreversible behavior. After the account is canceled, we will delete all information about your product account or anonymize the relevant information, unless otherwise stipulated by laws and regulations.
5.6 How We Respond to Your Requests
To ensure security, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. We will respond within 15 working days. For your reasonable requests, we原则上 do not charge fees, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee depending on the situation. For those requests that are groundlessly repeated, require excessive technical means (for example, requiring the development of new systems or fundamental changes to current practices), pose risks to the legitimate rights and interests of others, or are very unrealistic, we may refuse them. In the following circumstances, according to legal requirements, we will be unable to respond to your request:
(1) Directly related to national security and national defense security;
(2) Directly related to public security, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
(4) There is sufficient evidence showing that you have subjective malice or abuse of rights;
(5) Responding to your request will lead to serious damage to the legitimate rights and interests of you or other individuals or organizations;
(6) Involving trade secrets.

5.7 Complaints and Reports
You can make complaints or reports according to the system we have published. If you believe that your personal information rights may have been infringed, or you discover clues of infringement of personal information rights, you can report it through the following channels. We will provide feedback on your complaint and report within 15 days after verification:
(1) Click [More] in the upper right corner of the infringing user to enter the reporting interface and contact us;
(2) On the "Me" interface, click Contact Customer Service to contact us;
(3) Contact us via email miliyue2024@126.com.

5.8 Access Privacy Policy
You can view the full content of this Policy on the registration or login page, or after logging in, by clicking "Me" - "Settings" - "User Agreement".
5.9 Notify You of Your Rights in Case of Cessation of Operations
If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations by delivering notices individually or by announcement, and delete or anonymize the personal information we hold about you.

VI. Virtual Currency

6.1 Our company will issue virtual currency, namely Gold Coins, on the "MiliYue" platform. Gold Coins can be used to purchase value-added services on the "MiliYue" platform, including but not limited to sending gifts and membership services. Apart from this, they shall not be used for any other purposes. The prices of such value-added services are all denominated in Gold Coins. The specific price information will be determined by our company independently and displayed on the relevant service pages.
6.2 The exchange rate between Gold Coins and RMB varies depending on the user's purchase channel. The specific exchange rate shall be subject to the display on the service page of the relevant channel where the user purchases Gold Coins. Our company has the right to change the above exchange rate at any time according to operational conditions and will display it on the service page of the relevant channel where the user purchases Gold Coins.
6.3 The user's Gold Coin account is opened by default, and the user can purchase (hereinafter referred to as "Recharge") and consume Gold Coins. The user can query the Gold Coin balance, purchase records, and consumption records on the wallet page. Information related to Gold Coins will not be made public.
6.4 Users can recharge their Gold Coin account through WeChat, Alipay, Apple Pay, or other recharge channels provided by the "MiliYue" platform. Users confirm that they will not use illegal methods or non-platform designated recharge channels for recharge. If users illegally recharge/purchase Gold Coins using recharge channels not recognized by our company in violation of regulations, our company does not guarantee that the recharge will be completed smoothly or correctly. If user rights are damaged as a result, our company will not make any compensation or indemnity. At the same time, our company reserves the right to terminate the user's account qualification and the use of various recharge services at any time and impose corresponding penalties.
6.5 Users confirm that they have carefully confirmed their account and carefully selected the relevant operation options before recharging. If users damage their own rights due to factors such as inputting the wrong account, improper operation, or不了解 the recharge billing method, our company will not make any compensation or indemnity.
6.6 Users confirm that once the Gold Coins are successfully recharged, except as clearly stipulated by laws and regulations, after the Gold Coin account recharge is completed, our company will not provide refunds.
6.7 Users confirm and agree that if the user actively cancels the account, the Gold Coins that have been recharged and credited, purchased membership rights, etc., shall be deemed automatically abandoned. Our company will not refund the corresponding cash value nor make any compensation.
6.8 When users use the services provided by our company, if they violate national laws and regulations, the agreements herein, or other management regulations of this platform for users, our company has the right to temporarily or permanently ban the user's account. After the account is banned until it is unblocked (if any), the remaining Gold Coins in the user's account will be temporarily frozen or全部 deducted, cannot continue to be used to purchase virtual products or services on the platform, and the cash value paid by the user to purchase the Gold Coins will not be refunded.

VII. How We Handle Minors' Personal Information

Any minor under the age of 18 shall not create their own user account and/or use our services. We will only use or disclose minors' personal information when permitted by laws and regulations, with the explicit consent of parents or guardians, or when necessary to protect the minor.

According to relevant laws of the People's Republic of China, those under 18 years old are minors, and those under 14 years old are children.

We value the protection of minors' personal information. Due to the nature of this software, we do not provide this software and services to minors., Our products, websites, and services are only for adults aged 18 and above. During your use of our services, we presume that you have the corresponding capacity for civil conduct.. Any minor under the age of 18 shall not create their own user account and/or use our services. If we discover or audit that any minor registers or uses our products, we will take measures such as canceling accounts and deleting information to prohibit and restrict minors from using them.

VIII. How We Store Personal Information

The personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. We will not transfer the above information overseas. (1) Registration information: Until you instruct to cancel the account, your account will be deleted after verifying account ownership and the cancellation request, or due to violation of rules. To comply with national policy requirements, it will be retained for 6 months before permanent deletion. From the date the cancellation is verified, the account information is anonymized, and all users will be unable to access your account information.
(2) Login data: Information is retained for 6 months from the login date;
(3) Personal information and profile media: Effective immediately through personal information settings. From the date the cancellation is verified, or due to violation of rules, the account information is anonymized, and all users will be unable to access your account information;
(4) Chat information: Data is retained from the start time of the relevant interaction. Actively deleted session information is permanently deleted within 7 days;
(5) Account security: Until you request deletion or revision of personal information, or your account is deleted, whichever is earlier (however, data cached in third-party services may still be available);
(6) Metadata/Log data: Data is retained for 3 months from the login date and then permanently deleted;
(7) Device data: Until you instruct to delete your account. Your account will be permanently deleted 6 months after the account deletion request is submitted;
(8) Cookie: Data is retained for 1 month from the login date and then permanently deleted.

IX. How We Update This Policy

In order to provide you with better services, we will适时 revise this Policy. Such revisions constitute part of this Policy and have the same effect as this Policy. If such revisions would result in a substantial reduction of your rights under this Policy, in that case, if you continue to use our services, it means that you agree to be bound by the revised policy. When the agreement policy is revised, we will notify you through in-app system message push.

X. SDK List

To ensure the realization of relevant functions and the stable operation of the MiliYue App, we will integrate third-party provided Software Development Kits (SDKs) to achieve related purposes. We can only know the permissions that the SDK requires authorization for. Third-party institutions will need to collect your information. We cannot obtain your information unless the third-party institution explicitly discloses to us the sensitive information to be collected. The permissions required by the third-party institution and the sensitive information explicitly disclosed to us for collection are detailed below.

Third-party Company Name Product/Type Shared Information Name Purpose of Use Usage Scenario Sharing Method Third-party Privacy Link
Embedded SDK List (SDK Sharing Type)
OpenIM OpenIM SDK Read SDCard, Write SDCard, Application Information, Unique Device Identification Code (APNS Token, Device Serial Number, AndroidID, OAID, GAID, IDFV, CID, MAC Address); Device Running Status (SIM Card Status, USB Status, Charging Status, Battery Capacity and Power, Screen Lock Time, Startup Time); Device Information (Device Type, Device Brand and Model, Device Manufacturer, Operating System Version Running on the Device, Name, Edit Version Information, System Kernel Information, CPU Model, Device Memory and Storage Size, Screen Brightness and Resolution, Device Input Device, Device Architecture, Baseband Information, Font HASH, HOSTNAME, Accessibility Service List, System Process List); Log Information (Device Running Status (CPU, Memory Running Status), Browser Type and Version Information, Network Connection Type and Status, WIFISSID, WIFIBSSID, IP Address, Carrier Information, Network Proxy, YunXin Communication Service Running Log Information) Provide message delivery, multi-terminal message synchronization, message roaming functions, and to prevent security risks and accurately identify violations of laws and regulations Provided "Chat" function to chat with other users SDK local collection
Alibaba Cloud Computing (Beijing) Co., Ltd. Alibaba Cloud Number Authentication SDK Network status, device IP address, device MAC address, device identifiers (such as IMEI, IMSI, Android ID, OAID), carrier type, local mobile number (for pre-login), SSID, BSSID, sensor information, application installation list (for security risk control), etc. Personal information One-click login and authentication with local number When users register or log in SDK local collection Number Authentication Service Privacy Agreement
Century Long Information Network Co., Ltd. Telecom SDK Device identifiers (IMSI, SIM card information, ICCID, WiFi status), task list, MAC address, local number, carrier information, device model One-click login with local number When users register or log in SDK local collection Telecom SDK Service Privacy Agreement
Alibaba Cloud Computing Co., Ltd. Alibaba Cloud SDK Device permissions (camera, network, storage permissions) Upload and send picture and video resources When users upload picture and video resources
When users send pictures and videos
SDK local collection https://terms.alicdn.com/legal-agreement/terms/privacy_policy_full/20240202100310511/20240202100310511.html
Alipay (Hangzhou) Information Technology Co., Ltd. APP Payment Client SDK Read SDCard, Android ID, Device identifiers (IMEI, IMSI, Hardware Serial Number, ICCID, SIM Card Serial Number, IDFV, IDFA), MAC Address, Device Screen Density, Network Information (Network Type, WiFi Status, Carrier Information, BSSID, SSID), Application Data, Application Package Name, Running Process Information, Sensor List, IP Address, Device Model; Device Permissions (Storage Permission) Alipay payment or withdrawal Used every time the user makes a payment SDK local collection
Backend interface transmission
https://opendocs.alipay.com/open/54/01g6qm#Alipay%20App%20Payment%20Client%20SDK%20Privacy%20Policy
Shenzhen Tencent Computer Systems Co., Ltd. WeChat OpenSDK Android Read SDCard, Write SDCard, Application Information (Installation Package ID, Application Name), Device Information (IMEI/MAC/SIM Card/IP/IDFV), Application List; Device Permissions (Storage Permission) WeChat Pay Used every time the user makes a payment SDK local collection
Backend interface transmission
https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8
Hangzhou Alibaba Cloud Intelligence Technology Co., Ltd. Financial Grade Real Person Authentication Read SDCard, Application Information, OAID, IP Address, SIM Card Status, Face Video and Photos, Light Sensor Information, Device Model, Operating System, Network Connection Type, IP Address, System Settings, System Properties (including sensor list information), Camera (camera parameters, interface), OAID, Some Storage File Paths, Phone Model, Phone Brand, Android System Version, Android System API Level, Manufacturer System Version, CPU Architecture Type, Whether the Device is Rooted, Disk Space Usage, SDCard Space Usage, Memory Space Usage, Network Type, Application Currently Running Process Name and PID Real Avatar Authentication Used during real person authentication and real avatar authentication SDK local collection
Backend interface transmission
https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud202107281509_18386.html】
Daily Interaction Co., Ltd. Getui Required information: Device platform, device manufacturer, device brand, device model and system version, OAID, AndroidID, WIFI connection information, carrier information, DHCP, SSID, BSSID. Optional information: IMEI, MAC, Google Advertising ID (GAID), Serial Number, IMSI, ICCID, IP address, base station information For message push When the App pushes message reminders to users SDK local collection https://www.getui.com/privacy
Beijing Xiaomi Mobile Software Co., Ltd. Xiaomi Push Device identifier OAID and encrypted Android ID, as well as application information using the push service such as application package name, version number and running status, device-related information such as device manufacturer, device model, device memory, operating system version, Xiaomi Push SDK version, device location (country or region), SIM card carrier name, current network type, WiFi status. Among them, the current network type and SIM card carrier name are only read locally on the device and will not be uploaded to Xiaomi servers. For message push When pushing message reminders to users within the App SDK local collection https://dev.mi.com/console/doc/detail?pId=1822
Huawei Software Technology Co., Ltd. Huawei Push SDK OAID, SIM country code, read sdcard, application information, device information (device hardware information, system basic information and system settings) For message push When pushing message reminders to users within the App SDK local collection https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177
OPPO Guangdong Mobile Communications Co., Ltd. OPPO PUSH Client SDK Application information, device-related information (such as IMEI or OAID, Serial Number, IMSI, User ID, Android ID, Google Advertising ID, phone Region settings, device model, phone battery level, phone operating system version and language), application information using the push service (such as APP package name and version number, running status), Push SDK version number, network-related information (such as IP or domain name connection result, current network type), message sending result, notification bar status (such as notification bar permission, user click behavior), lock screen status (such as whether the screen is locked, whether lock screen notifications are allowed) Provide push services When pushing message reminders to users within the App SDK local collection https://open.oppomobile.com/new/developmentDoc/info?id=11228
Vivo Mobile Communication Co., Ltd. vivo PUSH-SDK Device and application information: including the operating system version number, application information (including application installation list), device identifiers (such as IMEI, ICCID, EMMCID/UFSID, OAID/VAID/AAID, SN code and IMSI, Android id, mobile country code and vivo Android device mobile network number, etc.), MAC address, mobile carrier, language used, system settings, activation date, running time and other system, device and application data, log information during your use of vivo devices and services Provide push services When pushing message reminders to users within the App SDK local collection https://dev.vivo.com.cn/documentCenter/doc/366
Shenzhen Honor Software Technology Co., Ltd. Honor Push SDK Device information (such as IMEI, OAID, Android ID, MAC address, device model, operating system version), application information (such as application package name, application version number), network information (such as IP address, network type), SIM card information (such as carrier name), log information related to push services Provide push services When pushing message reminders to users within the App SDK local collection https://developer.honor.com/cn/docs/11002/guides/sdk-data-security
Zhuhai Xingji Meizu Information Technology Co., Ltd. Meizu Push SDK Device information (such as IMEI, OAID, Android ID, MAC address, device model, operating system version), application information (such as application package name, application version number), network information (such as IP address, network type), SIM card information (such as carrier name), log information related to push services Provide push services When pushing message reminders to users within the App SDK local collection https://open.flyme.cn/docs?id=202
Huawei Software Technology Co., Ltd. Performance Acceleration Library Device information (device model, client EMUI version number, Android version number), network information (carrier identification information, country code providing the service, network link type), application information (developer application name, application version number, application package name, application App ID), interface information (interface call type, HMS Core version number, interface call result code, interface response delay) Obtain network status permission, network permission Used every time the user makes a payment SDK local collection
Backend interface transmission
https://developer.huawei.com/consumer/cn/doc/graphics-Guides/sdk-data-security-0000001050700772
Associated APP List (Data Transmission Sharing Type)
None
Partner Third-party List (Data Transmission Sharing Type)
None

XI. Others

(I) The headings in this Policy are for convenience and reading only and do not affect the meaning or interpretation of any provision in this Policy.
(II) The products described in this Policy may vary depending on the mobile phone model, system version, software application version, and other factors you use. The final products and services are subject to the products you use.
(III) The copyright of this Policy belongs to us, and we reserve the right to interpret and modify it.

Release Date: October 20, 2024
Effective Date: December 01, 2024