"Countdown to Life" Privacy Policy

Updated: Sep 1, 2021

Effective date: May 25, 2020

Company: Wuhan Net Power Technology Co., Ltd.

This privacy policy will help you understand the following main policies:

1) In order to guarantee the normal function of the product's core functions and other functions, we will collect some of your necessary information;

2) We will store your personal information collected and generated during domestic operations in the territory of the People's Republic of China, and we will not transfer the above information overseas. We will only retain your personal information for as long as necessary to provide the "Countdown to Life" software and related services;

3) We will not share, provide, transfer or obtain your personal information from third parties, except with your consent;

4) We will strive to take reasonable security measures to protect your personal information. In particular, we will use the methods commonly used in the industry and use our best business efforts to protect the security of your personal sensitive information;

5) How you access, correct, delete personal information, withdraw consent, and report complaints.

If you do not agree with this privacy policy and start using it, we will only collect the information necessary to maintain the basic functions of "Countdown to Life", which will prevent us from providing you with complete products and services, but we will also use de-identification, Encryption and other measures to protect this information. When you use it again, it is necessary to realize the performance of the contract and service. It will be deemed that you accept and acknowledge that we will process your relevant information in accordance with this policy.

We take the protection of our users' personal information very seriously and treat them with diligence and prudence. When you download, install, open, browse, use (collectively, "Use") the "Countdown to Life" software and related services, we will collect, save, use, share, disclose and protect your personal information in accordance with this Privacy Policy. We want to introduce to you how we treat your personal information through this privacy policy, so we recommend that you read all the terms of this privacy policy carefully and completely. Among them, the content related to your information and rights will be reminded in bold form, please read the following:

How we collect and use personal information

Our use of cookies and similar technologies

How we store personal information

How we share, transfer, and publicly disclose personal information

V. How do we protect the security of personal information

Your rights

Terms of use for minors

Amendments and notices of privacy policy

Nine, scope of application

10. How to contact us

Eleven, other

How we collect and use personal information

During your use of the "Countdown to Life" software and services, we will collect information in accordance with the principles of lawfulness, justification and necessity. The information we collect or ask you to provide will be used:

1. Guarantee the normal operation of the product's foundation;

2. Realize various functions and services;

3. Optimize and improve products and services;

4. Guarantee the safety of products, services and users;

5. Recommend to you ads, information, etc. that may interest you;

(I) Personal Information We Proactively Collect and Use

We collect information that you actively provide when you use the service and that you generate when you use features or receive services:

1. Guarantee the "life countdown" and the normal operation of the service

When you use "Countdown to Life" and related services, in order to ensure the normal operation of software and services, we will collect your hardware model, operating system version number, network device hardware address (MAC), IP address, software version number, network Information such as the access method and type, and operation logs. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of our products.

2. Registration and Login

You can choose to use a third-party account such as Alipay or WeChat for authorized login in this software. If you choose to log in to the software using an account such as Alipay or WeChat, you need to authorize your account, avatar, nickname and other necessary information in Alipay or WeChat, for the purpose of:

(1) Better service for you through account management. By logging into your account, you can synchronize your related information.

(2) If you provide a real and valid mobile phone number, QQ number, Weibo number, and WeChat for binding, you can easily retrieve your account number and password when you encounter a problem of losing your registered account or forgetting your password.

3. Provide you with the time of life and clock of death, add wish, date calculation, contact customer service and other functions or services

(1) Contact customer service function needs storage permission to send local pictures

(2) The life countdown function needs to obtain device information permissions to provide different functions and experiences based on different device and system versions, to obtain product usage and bug information, and to help us continuously improve product functions and experiences

4. Use other third-party code to count your information

(1) In the process of using our products, in order to reduce the impact of bugs on your use, and to change the interaction and improve the user experience based on your behavior habits, we will upload behavior information and crash logs to Baidu mobile statistics platform, talkingdata platform, used to collect detailed crash logs and behavior analysis.

(2) If you encounter any problems during the use of our products, in order to be able to contact us faster, we have integrated third-party Aurora IM instant messaging.

(4) During your use of our products, we will show you third-party advertisements and information.

You can access the privacy policies of third-party platforms via the following links:

Baidu Privacy Policy: https://www.baidu.com/duty/yinsiquan-policy.html

Aurora IM Privacy Policy: https://www.jiguang.cn/license/privacy

Tencent Privacy Policy https: //www.tencent.com/en-us/privacy-policy.html

5. Guarantee the safety of products, services and users

To help us better understand the operation of the "Countdown to Life" and related services in order to ensure the security of operation and provision of services, we use third-party statistical tools to record network log information, as well as the frequency of use of software and related services, crash data, General installation, usage, performance data, etc.

Please understand that when we collected and used the above information, we performed de-identification / anonymization. The data analysis only corresponds to specific codes that cannot be directly associated with the user's identity.

(1) Handling of changes in the purpose of collecting and using personal information

Please understand that with the development of our business, the functions and services provided by the "Countdown to Life" may be adjusted and changed. In principle, when new functions or services are related to scenarios such as time of life, time of death, adding wish, date calculation, contacting customer service, etc., the personal information collected and used will have a direct or reasonable relationship with the original processing purpose. Where there is no direct or reasonable connection with the original purpose, we will collect and use your personal information, and we will inform you again and obtain your consent.

(2) Personal information exempt from obtaining consent to collect and use according to law

Please understand that in the following situations, we do not need your authorization to collect and use your personal information in accordance with laws and regulations and / or relevant national standards:

(1) directly related to national security and national defense security;

(2) directly related to public safety, public health, and major public interests;

(3) Directly related to crime investigation, prosecution, trial and judgment enforcement;

(4) It is difficult to obtain the consent of the personal information subject or other individuals because they have significant legal rights such as life and property;

(5) Your personal information collected is disclosed to the public by yourself;

(6) Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, etc .;

(7) Necessary for signing and performing contracts according to your requirements;

(8) Other circumstances required by laws and regulations.

It is particularly reminded that if the information cannot identify you personally or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information When data that cannot be linked to any particular personal information is used in combination with other personal information about you, that information will be treated and protected as your personal information in accordance with this privacy policy during the combined use.

Use of Cookies and Similar Technologies

Cookies and similar technologies are commonly used technologies on the Internet. When you use the "Countdown to Life" software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We may set authentication and security cookies or anonymous identifiers to ensure the safe and efficient operation of our products and services, help us improve the efficiency of our services, and increase login and response speed. Using such technologies can also help you avoid the need to repeat the steps and processes of selecting personalization settings (for example: record the status of options in settings), and help you get an easier access experience.

How we store personal information

(I) Location of information storage

In accordance with laws and regulations, we store your personal information collected and generated during domestic operations in the People's Republic of China. At this time, we will not transfer the above information overseas.

(Two) storage period

We only retain your personal information for the period necessary for the purpose of providing "countdown to life" and services. After the necessary period, we will delete or anonymize your personal information. However, as otherwise provided by laws and regulations, except.

How we share, transfer, and publicly disclose personal information

(1) Sharing

Respecting the privacy of users is a basic principle of ours. We will not share your personal information with any company, organization, or individual except:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information with external parties in accordance with the requirements of judicial or administrative agencies.

3. Sharing with related parties: Your personal information may be shared with our affiliated companies. We only share necessary personal information and are subject to the purposes stated in this privacy policy. If the affiliate wants to change the purpose of processing personal information, it will ask for your authorization again.

4. Sharing with authorized partners: For the purposes stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legitimate, proper, necessary, specific, and clear purposes, and we will only share the personal information necessary to provide the service, such as when you purchase our products online to share your information. Our partners are not authorized to use the shared personal information for any other purpose. For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.

(2) Transfer

We will not transfer your personal information to any company, organization, or individual, except as follows:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.

(3) Public disclosure

We will only disclose your personal information publicly if:

1. Disclose the personal information you specified in a disclosure method that you explicitly agree to

2. Where your personal information is required to be provided in accordance with the requirements of laws, regulations, mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information in accordance with the type of personal information required and the manner of disclosure. Subject to laws and regulations, when we receive the above request for information disclosure, we will require the corresponding legal documents, such as subpoenas or investigation letters.

3. Please understand that in the following situations, we do not need your authorization to share, transfer, or publicly disclose your personal information in accordance with laws and regulations and / or relevant national standards

(1) directly related to national security and national defense security;

(2) directly related to public safety, public health, and major public interests;

(3) Directly related to crime investigation, prosecution, trial and judgment enforcement;

(4) It is difficult to obtain your own consent in order to protect your or other individuals' important legal rights such as life and property;

(5) personal information that you disclose to the public;

(6) Where personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

V. How do we protect the security of personal information

(I) We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or without authorization Accessed, publicly disclosed, used, modified, damaged, lost or leaked.

(2) We will use reasonable and feasible means such as encryption technology and anonymization to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

(3) We will establish special security departments, security management systems, and data security processes to ensure the security of your personal information. We adopt a strict data usage and access system to ensure that only authorized personnel can access your personal information and conduct security audits of data and technology in a timely manner.

(IV) Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we can do our best to strengthen Security measures cannot always guarantee 100% security of information, and we will do our best to ensure the security of the personal information you provide to us. You understand and understand that the systems and communication networks you use to access our services may cause problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of your personal information.

(5) We will formulate emergency response plans, and immediately launch emergency response plans when user information security incidents occur, and strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (leakage, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or are about to take, and you can take the initiative Advice on preventing and reducing risks, remedies for you, etc.