防沉迷系统   纠纷处理  适龄提示:18岁以上玩家  |   用户登录  用户注册  用户支付

Index > User Privacy Agreement

User Privacy Agreement

Update: 01 March 2022

Effective date: 01 March 2022

As a professional game R&D and distribution company, Beijing Qilong Interactive Technology Co., Ltd. (Hereinafter collectively referred to as "our company") has always attached great importance to the protection and privacy of personal information (hereinafter referred to as "user" or "you") in data services. Knowing the importance of personal information to you, we will do our best to protect your personal information security. We are committed to maintaining your trust in us, respecting the following principles and protecting your personal information: the principle of clear purpose, the principle of choice and consent, the principle of minimum adequacy, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. When you use any of our products and services, we will take appropriate security measures to protect your personal information in accordance with established industry safety standards. Strictly abide by laws and regulations, and follow the following privacy protection principles to provide you with safer and more reliable services:

[Special Tips]

1. This policy applies to our game services. The Personal Information Protection Rules for Children and Notice to Guardians shall also apply to users under the age of 14.

2. This policy defines how we process your information in different scenarios, but only when you turn on related functions or use related services will we process your information in order to achieve related functions and services. If you do not turn on related functions or use related services, we will not process your corresponding personal information. We will also provide you with information on the purpose, scope and use of this product through instant notifications, such as pop-ups and page tips, which form part of this Privacy Policy and have the same effect as this Policy. Please pay special attention to this.

After reading this policy, if you have any questions about this policy or related matters, you can contact us through the feedback channels listed in the "How to contact us" section of this policy, and we will answer them for you as soon as possible.

This policy will help you understand the following:

1. How do we collect and use your personal information

2. How do we use COOKIES or similar technologies

3. We may share, transfer or make your personal information public

4. How do we store and protect your personal information

5. How to exercise your personal information-related rights

6. Protection of Minors

7. Revision and Notification

8. How to contact us

1. How do we collect and use your personal information

(1) We will collect and obtain your personal information through the following channels:

1.1.1. Information you provided on your own initiative. For example:

(1) Information you provide to us when you register your account number or use the game;

(2) Information stored when you use the game.

Note that if you make your information public in an open area visible to other users in the game, it may be collected and used by others. When you find that others have inappropriately collected or used your information, you can contact us through the feedback channels listed in the "How to contact us" section of this policy.

1.1.2. Your information is lawfully shared by third parties.

1.1.3. Your usage information that we legally acquire in the course of providing services to you, such as the information that we collect, summarize and record when you use the game.

(2) We collect and use your personal information for the following purposes:

1.2.1. Help you complete your registration and login

In order for us to provide you with a consistent service and ensure the security of your game, we need you to provide basic registration or login information, including mobile phone number, e-mail, etc., and create your game account number, user name and password.

In accordance with relevant laws, regulations and regulatory requirements, after you register your game account number, we may need you to provide real identity information, including your name, valid identity documents (such as ID card, passport, driver's license, residence book, etc.), photos, etc. If you do not provide the above authentic identity information or provide false information, you will not be able to sign in to the game, enjoy relevant services or be restricted from using the game. We will not be able to provide you with game services or restrict your game behavior accordingly. To achieve the purpose of real-name authentication, you agree and authorize us to provide, inquire about and verify the above-mentioned identity information to the relevant real-name authentication organizations (the competent national online game authorities, the public security departments or other institutions entrusted/cooperated by them).

You can also log in to the game using an account with an approved third-party platform. When you log in to the game using a mailbox account, a mobile account, or an account with an approved third-party platform, we will obtain the relevant information under those accounts (including: user name, nickname, avatar, unique identity, friendship or other information authorized by you) according to your authorization to help you complete the registration. Sign in and have a better game entertainment experience.

1.2.2. Provide basic game functions, maintain network and operational security

During your use of our online game services, you will be provided with the basic functions of the game, as well as the identification of account number abnormalities, understanding and improving product adaptivity, ensuring the network and operational security of the game services, in order to maintain the normal operation of the aforementioned functions, protect the personal property security of you or other users or the public from infringement, and better prevent phishing sites, fraud, network vulnerabilities, computer viruses, network attacks, etc. Security risks such as network intrusion, more accurately identifying violations of laws and regulations, we may collect and store information about the services you use and how you use them, such as equipment information, log information, account number information, transaction information or information shared according to law, and associate these information to comprehensively judge your account number and transaction risk, authenticate, detect and prevent security incidents, and take necessary records according to law. Audit, analysis and disposal measures:

(1) When you use our game services, we will collect your game log information, such as login log, item log, operation information, game match information, game friend information and interactive records, login account number, game ID, search query content, IP address, telecommunication operator, network environment, language used, date and time of access and sharing.

(2) To ensure your normal use of our game services, to maintain the normal operation of basic game functions, to enhance the game experience and to ensure the security of your account number, we will receive and record the device information you use: device name, device model, operating system and version, client version, device resolution, package name, device settings, device identifier (MAC/IMEI/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information), Software and hardware feature information, IP address. In order to collect the above basic personal device information, we will apply for access to your device information in the necessary scenarios.

Note that individual device information and log information are information that does not identify a particular natural person. If we use this information in conjunction with other information to identify a particular natural person, or if we use it in conjunction with personal information, the information will be treated as personal information during its combined use. We will anonymize and de-identify such personal information, except as otherwise authorized by you or regulated by laws and regulations. This type of information will be processed and protected as your personal information during its combined use in accordance with this policy.

1.2.3. Help you complete your order, pay, recharge and deliver your goods or services

(1) When you order specific goods and/or services and recharge in the game service, in order to show you the transaction information of the account number and ensure transaction safety, we will generate orders for the purchase of the goods and/or services for you through the system, collect information such as your specific order number, order creation time, transaction amount, etc., to show you and facilitate your transaction management of the order. In the process of placing an order, if it is a physical commodity, we also need you to provide information such as the name of the consignee, the address of the consignee, the telephone number, etc. so that we can deliver the commodity to you.

(2) In order to complete order payment, deliver goods or services, confirm transaction status, and provide you with post-sale and dispute resolution services, we will collect your account number, order, transaction, logistics information related to transaction progress, or share your transaction information with the above service providers, based on the trading objects, payment institutions, logistics companies, etc. selected by your exchange.

Charging records and consumption records are sensitive personal information. Collecting such information is necessary to achieve the consumption function, otherwise the transaction cannot be completed.

1.2.4. Provide you with customer service or other user response functions

When you contact our customer service or use other user response functions (personal information protection complaints or suggestions, minor game related complaints or suggestions or other customer complaints and needs), we need you to provide the necessary personal information to match and verify your user identity in order to ensure your account number and system security. In order to process your request, manual customer service needs to inquire about or verify your relevant information within your authorization and only use it if necessary. If you refuse to provide or make a mistake, we may not be able to provide you with appropriate support. After confirming your user identity, we will also save your contact information (any other contact you used when you contacted us or any other contact you offered us on your own initiative), your communications/call records and content with us, other necessary information associated with your needs to contact you or to help you solve problems, or to record solutions and results for related problems.

1.2.5. You understand and agree that during the use of the game, we will apply for access to your system if necessary to collect and use the information involved in these rights.

Before opening the permission, we will inform you of the purpose of opening the permission and ask for your consent. If you do not agree, we will not open the permission or provide you with the services corresponding to the permission.

(1) After you agree to access storage rights, you allow us to access your storage space so that you can download and save content, or use caching to implement functions such as services;

(2) After you agree to access the telephone information rights, you allow us to obtain your device information as a unique identification of your device, in order to provide you with more pages that meet your needs to display and recommend personalized content, understand and improve product adaptivity, identify abnormal conditions, and ensure the network and operational security of game services;

(3) After you agree to access the camera rights, you can upload, take photos/pictures/videos, publish information and comments, broadcast live videos or provide proof communication with customer service.

(4) After you have agreed to access the address book permissions, we can get your address book friends'information in order to provide you with functions such as friend status query, inviting your friends to use games, sharing content/products with people you know, etc.

(5) After you turn on the microphone and related voice rights, you can use the voice function to interact with our products, other people, or contact customer service, etc.

(6) After you open the location rights, we can get your location information so that you can interact with your friends nearby, etc.

When you need to turn off these functional privileges, most mobile devices will support this requirement by referring to or contacting the service or manufacturer of your mobile device. Please note that if you turn on any privilege, you authorize us to collect and use relevant information to provide you with corresponding services. If you turn off any privilege, you revoke the privilege. We will no longer continue to collect and use relevant information based on the corresponding privilege, nor will we be able to provide you with the services corresponding to that privilege. However, your decision to close permissions will not affect previous information collection and use based on your authorization.

1.2.6. Exceptions to Authorized Consent

According to the relevant laws and regulations, it is not necessary to obtain your authorized consent to collect your information in the following situations:

(1) directly related to national security and national defense security;

(2) directly related to public safety, public health and important public interests;

(3) directly related to criminal investigation, prosecution, trial and execution of judgments;

(4) for the purpose of safeguarding your or other individual's vital and lawful rights and interests, such as life and property, but it is difficult to obtain the consent of the person concerned;

(5) The personal information collected is made public to the public on your own;

(6) Necessary for signing and executing a contract in accordance with your requirements;

(7) collecting personal information from lawfully disclosed information, such as lawful news reports, government information disclosure, etc.

(8) It is necessary to carry out lawful news reporting;

(9) Other circumstances prescribed by laws and regulations.

1.2.7. Tips on sensitive personal information

Sensitive personal information refers to personal information that, once disclosed or illegally used, may easily result in the infringement of the human dignity of natural persons or the endangerment of the safety of persons and property. The above information provided by you or collected by us may contain sensitive personal information such as identification number, personal biometric information (static or dynamic), bank account, communication records and contents, property information, whereabouts, accommodation information, transaction information. Please be careful and aware of sensitive personal information, and you agree that we can process your sensitive personal information for the purposes and methods described in this policy.

2. How do we use COOKIES or similar technologies

We or our partners may obtain and use your information through COOKIES or similar technologies and store it as log information.

By using COOKIES, we provide users with an easy and personalized web experience. A COOKIES is a small amount of data that is sent from a network server to your browser and stored on your computer's hard drive. We use COOKIES to benefit its users. For example, to make the virtual community login process faster, you can choose to have the user name in a COOKIES. This will make it easier and faster for you to sign in to the service of Beijing Qilong Interactive Technology Co., Ltd next time. COOKIES helps us determine the pages and content you connect to, the time you spend on a particular service, and the related services you choose.

COOKIES enables us to serve you better and faster, and to personalize your service experience. However, you should be able to control whether and how COOKIES is accepted by your browser. Please check the files attached to your browser for more information on this.

We and third party partners may collect and use your information through COOKIES or similar technologies and store it.

We use our own COOKIES or similar technology, which may be used for the following purposes:

2.1. Remember your identity.

For example: COOKIES or similar technologies can help us identify you as our registered user;

2.2. Analyse your use of our services.

We can use COOKIES or similar technology to find out what activities you are doing with our company's services or which services are most popular.

While we use COOKIES or similar technologies for these purposes, a summary of non-personal identity information collected by COOKIES or similar technologies may be provided to other partners to analyze how you and other users use our company's services.

You can reject or manage COOKIES or similar technologies through a browser or user selection mechanism. However, please note that if you disable COOKIES or similar technologies, we may not be able to provide you with the best service experience, and some services may not function properly.

3. Personal information that we may share, transfer or disclose

(1) Sharing

We attach great importance to the protection of your personal information. Except in the following circumstances, we will not share your personal information with any third party other than our company without your prior consent:

3.1.1. Sharing necessary to achieve our services/functions. In some cases, we need to share your information with third parties to achieve the functionality of our products and/or services so that you can use the services you need normally, including: (1) sharing the corresponding transaction order information and payment amount information with third-party payment agencies that provide payment services; (2) Share the information needed for real-name certification with the real-name certification service provider; (3) Sharing required by other suppliers, service providers and business partners related to our services/functions.

3.1.2. Necessary sharing with some of our partners. For the smooth development of necessary/reasonable business, meeting your requirements, fulfilling our obligations under relevant user agreements or this policy and enforcing our rights or abiding by legal provisions, we may need to share your information with some partners, including: (1) sharing log information and equipment information with partners providing data services (including data statistics, data analysis, etc.); (2) Share statistical data on your product usage (such as crashes, flickers) with partners who provide product analysis services, including application crash analysis, network performance analysis, domain name resolution optimization; (3) Other necessary shares with some of our partners.

3.1.3. To achieve the other purposes described in the first section of this policy,'How do we collect and use personal information'.

3.1.4. Perform our obligations and exercise our rights in this Policy or in other agreements with you.

3.1.5. To comply with the law, protect us and our affiliates or partners, your or other users of our company or the public interest, property or security from damage, such as to prevent illegal activities such as fraud and reduce credit risks, we may exchange information with other companies and organizations to the extent permitted by the law and regulations. However, this does not include information that is sold, leased, shared or otherwise disclosed for profit in violation of the commitments made in this policy.

3.1.6. In response to your legitimate needs or with your authorization.

3.1.7. Provide your information at the legal request of your guardian.

3.1.8. Provided on the basis of social and public interests conforming to laws and regulations.

We will only share your personal information for legitimate, legitimate, necessary, specific, clear purposes. For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements that require them to process the information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.

(2) Assignment

3.2.1. As our business continues to grow, we may be conducting mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will ask new companies and organizations that hold your personal information to continue to be bound by this policy. Otherwise, we will ask them to re-ask you for authorization consent.

3.2.2. With your explicit consent, we will transfer your personal information to third parties.

(3) Disclosure

We will only disclose your personal information if we take industry-standard security precautions:

3.3.1. Disclosure the information you specify in a manner that you expressly agree to, depending on your needs.

3.3.2. We may disclose your information in accordance with the type of information required and the mode of disclosure, provided that it is necessary for us to provide your information in accordance with the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements. Subject to the law and regulations, when we receive the above request to disclose information, we will require the recipient to produce corresponding legal documents, such as subpoenas or letters of inquiry. We firmly believe that the information we are asked to provide should be as transparent as possible and within the limits of the law. All requests are carefully reviewed to ensure they have a legitimate basis and are limited to data that law enforcement authorities have a legitimate right to obtain for specific investigative purposes.

(4) Exceptions for obtaining prior authorized consent to share, transfer or disclose information

Sharing, transferring, and disclosing your information does not require your prior authorized consent in the following situations:

3.4.1. It is directly related to national security and national defense security;

3.4.2. It is directly related to public safety, public health and important public interests;

3.4.3 directly related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and execution of judgments;

3.4.4. For the purpose of safeguarding your or other individual's vital and lawful rights and interests, such as life and property, it is difficult to obtain my consent;

3.4.5. Information that you have made available to the public on your own;

3.4.6. Gathering information from lawfully disclosed information, such as lawful news reports, government information disclosure, etc.

3.4.7. Relevant to our obligations under laws and regulations.

In accordance with the law, sharing, transferring and disclosing personal information that has been de-identified, and ensuring that the recipient of the data cannot recover and re-identify the subject of the information, are not acts of sharing, transferring and publicly disclosing personal information. The preservation and processing of such data will not require additional notification and your consent.

4. How do we store and protect personal information

(1) Storage of personal information

Except as otherwise provided by laws, regulations or regulatory authorities, we store your personal information only for the minimum time required for the purposes stated in this policy. If we terminate the service or operation, we will stop the activities to continue collecting your personal information in a timely manner. We will also notify you in advance in accordance with relevant laws and regulations, and delete or anonymize your personal information after termination of the service or operation, except as otherwise provided by laws and regulations or regulatory authorities.

Personal information collected and generated during our operations in the People's Republic of China shall be stored in the territory of China, except in the following circumstances:

4.1.1. There are clear provisions in laws and regulations;

4.1.2. Obtain your authorized consent;

4.1.3. Your company's services cover cross-border areas. Our company needs to provide your personal information overseas.

In light of the above circumstances, we will ensure that it is implemented in accordance with the laws and regulations of the State and relevant regulatory authorities, and provide adequate protection for your personal information.

(2) Protection of personal information

We attach great importance to information security, set up a dedicated security team, and take all reasonable and feasible measures to protect your personal information:

4.2.1. Technical measures for data security

We will adopt industry-standard security precautions, including establishing reasonable institutional specifications and security technologies to prevent unauthorized access, use, and modification of your personal information and to avoid data damage or loss.

Our services employ a variety of encryption technologies, for example, in some services, we will use encryption technology (such as SSL) to encrypt and save your personal information, and isolate it through isolation technology to protect your personal information.

In the use of personal information, such as information display, Information Association calculation, we use a variety of data desensitization technologies to enhance the security of information in use.

We also use strict data access control and multiple authentication technology to protect personal information from illegal use.

4.2.2. Other security measures we take to protect personal information

We provide comprehensive security control over data through contact confidentiality protocols, monitoring and auditing mechanisms.

We will conduct security and privacy protection training courses to enhance employee safety awareness and awareness of personal information protection policies and related procedures.

4.2.3. We only allow employees and partners of companies who need to be aware of this information to access your personal information and set up strict access control and monitoring mechanisms for this purpose. We also require all persons who may have access to your personal information to perform appropriate confidentiality obligations. Failure to fulfil these obligations may result in legal liability being pursued or suspension of partnership with the company.

4.2.4. The Internet is not an absolutely secure environment, and the way you communicate with other users, such as e-mail, instant messaging, social networking or other service software, cannot determine if they are fully encrypted. We recommend that you use complex passwords when using such tools, and pay attention to protecting your information security. When communicating with third parties or purchasing goods and services through our company's services, it is unavoidable for you to disclose your own information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your information and only provide it to others if necessary.

4.2.5. The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of the personal information you send us. If our physical, technical, or administrative protective facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, resulting in damage to your legitimate rights and interests, we shall bear corresponding legal liabilities.

4.2.6. Disposal of Security Events

In response to the potential risks of personal information disclosure, damage and loss, we have formulated a number of systems to clarify the classification and grading standards for security incidents and vulnerabilities and the corresponding processing procedures. We have also set up an emergency response team for security incidents, which initiates security plans for different security incidents, stops, analyzes, locates, establishes remedial measures, and combines with relevant departments to trace back and attack, as required by the safety incident disposal specifications. We also regularly organize in-house training and emergency drills to enable our staff to master appropriate emergency response strategies and procedures.

After unfortunate information security incidents occur, we will inform you in time, as required by laws and regulations, of the basic situation and possible impact of the security incidents, the disposal measures we have taken or will take, the suggestions you can take to prevent and reduce risks on your own, and the remedies you can take. At the same time, we will timely inform you about the event by mail, letter, telephone, push notification, etc. When it is difficult to inform the information subject one by one, we will take a reasonable and effective way to publish the announcement. At the same time, we will actively report the disposition of information security incidents in accordance with the requirements of the regulatory authorities.

Please understand that due to technical limitations and risk prevention limitations, even if we have tried to strengthen security measures, we cannot always guarantee 100% security of information. You need to know that your access to the systems and communication networks used by the services of Beijing Qilong Interactive Technology Co., Ltd. may cause problems due to conditions outside our control.

Please ensure that your account number, password and other identity elements are properly maintained. When you use our company's services, we will identify you by your account number, password and other identity elements. Once you have disclosed the above information, you may suffer losses and may be detrimental to you. If you find that your account number, password and/or other identities may or have been compromised, please contact us immediately so that we can take timely action to avoid or reduce the related losses.

5. How to manage your personal information

(1) Access, update and deletion

We encourage you to update and modify your personal information to make it more accurate and effective.

You can also contact us to handle this for you through the feedback channels listed in the "How to contact us" section of this policy. We will take appropriate technical means or channels of contact to enable you to access, update and delete your personal information or other information provided in the use of our company's services, except as otherwise provided by laws and regulations.

Except as otherwise provided by laws and regulations, when you correct or delete your personal information, we may not immediately correct or delete it from the backup system, but we will correct or delete it when backup updates occur.

(2) Account number cancellation

We provide you with a way to log off your account. In accordance with the terms and conditions of our service and the relevant laws and regulations of the State, you can submit the application for account cancellation in the Account Number Center of our company in accordance with the corresponding requirements. You can also choose to contact us through the feedback channels listed in the "How to contact us" section of this policy, and we will give you an answer as soon as possible.

After the cancellation of your account number, we will stop providing you with all or part of our company's services and delete your personal information or anonymize it according to your requirements, except as otherwise stipulated by laws and regulations.

(3) Change the scope of your authorized consent

You always have the option of disclosing personal information to us. Some personal information is necessary to use our company's services, but most other information is provided at your discretion. You can change the scope of your authorization to continue collecting information or revoke your authorization by deleting information, turning off device functions, and canceling your account number.

When you revoke your authorization, we will not be able to continue providing you with the appropriate services for revoking your authorization, nor will we process your corresponding information. However, your decision to withdraw your authorization will not affect any previous information processing based on your authorization.

(4) Respond to your above request

For your safety, you may need to make a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We do not charge you for reasonable requests in principle, but we will charge you a fee for repeated requests that exceed reasonable limits as appropriate. We may reject requests that are unreasonably duplicated, require too many technical means (for example, the need to develop a new system or radically change current practices), pose a risk to the legitimate rights and interests of others, or are highly impractical (for example, involving information stored on backup tapes).

We will not be able to respond to your request in the following circumstances:

5.4.1. Relevant to our obligations under laws and regulations;

5.4.2. It is directly related to national security and national defense security;

5.4.3directly related to public safety, public health and important public interests;

5.4.4directly related to criminal investigation, prosecution, trial and execution of judgments;

5.4.5. We have sufficient evidence that you are subjectively malicious or abusing your rights;

5.4.6. For the purpose of safeguarding your or other individual's vital and lawful rights and interests such as life and property, it is difficult to obtain the consent of the person concerned;

5.4.7. Responding to your request will seriously impair the legitimate rights and interests of you or other individuals or organizations;

5.4.8. involving business secrets.

6. Third-party services

Our company's services may access or link to social media or other services (including websites or other forms of services) provided by third parties. Include:

6.1. You can use the Share key to share some of our company's services to third-party services, or you can share third-party services to our services. These functions may collect your information, including your log information, and may install COOKIES in your device to function properly.

6.2. Other access to third-party services. For example, to achieve the purposes stated in this policy, we may access SDKs or other similar applications (such as embedded code, plug-ins, etc.) provided by third-party service providers in order to provide you with better customer service and user experience. At present, the third-party service providers we access mainly include the following types:

(1) Used for payment of related services, including order payment, transaction verification, income settlement, payment information summary statistics, etc.

(2) Used to obtain the location permissions, collect equipment information and log information, etc. with your consent;

(3) Used for third-party authorization services, including login of third-party account number, sharing relevant content to third-party products, etc.

(4) Used to optimize product performance, including improving hardware distribution capability, reducing server costs, functional hot repair, etc.

(5) Used for account security, product reinforcement related services, including network monitoring, domain name resolution, etc.

Some third-party SDKs or similar applications that we access may collect your personal information. If you use such services provided by third parties in our services, you agree that your information will be collected and processed directly by them. We will assess the legality, legitimacy and necessity of collecting personal information by such third-party services, and require such third-party services to take protective measures against your personal information and to strictly comply with relevant laws, regulations and regulatory requirements. You may also choose to contact us through the feedback channels listed in the "How to contact us" section of this policy, and we will provide you with an answer as soon as possible.

The above third party social media or other services are operated by the relevant third party. Your use of such third party social media services or other services (including any information you provide to such third parties) is subject to the third party's own terms of service and information protection statements (not this policy), and you need to read their terms carefully. This policy applies only to personal information that we collect and does not apply to services provided by any third party or to rules governing the use of information by third parties. If you find these third-party social media or other services at risk, we recommend that you terminate the operation to protect your legitimate rights and interests and contact us in a timely manner.

7. Protection of Minors

We recommend that any minor's participation in online activities should have the prior consent of his or her parents or other guardians (hereinafter referred to as "guardians"). We will protect information about Minors in accordance with relevant laws and regulations of the State.

We encourage guardians to guide minors to use our company's services. If you are a minor under the age of 14, please notify your guardian to read and accept our Rules for the Protection of Personal Information of Children and Notice to Guardians together and to seek their consent and guidance before you use our company's services and submit your personal information.

8. Revision and Notification

In order to provide you with better service, we may amend the terms of this policy in due time in accordance with the update of our company's services and the relevant requirements of laws and regulations, which form part of this policy. We will post any changes to this policy on this page. For major changes, we will also provide more prominent notifications (including push notifications, pop-up alerts, or other means), and major changes referred to in this policy include, but are not limited to:

8.1. Significant changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way in which personal information is used, etc.

8.2. We have undergone major changes in the ownership structure. Such as owner change caused by business adjustment, bankruptcy merger and acquisition, etc.

8.3. Major changes have taken place in the main objects of personal information sharing, transfer or public disclosure;

8.4. Your right to participate in personal information processing and the way you exercise it have changed significantly;

8.5. Significant changes have occurred in the departments responsible for handling personal information security, the ways of contact and the channels of complaint;

8.6. Other important or potentially serious circumstances affecting your personal rights and interests occur.

Any changes we make will put your satisfaction first. We encourage you to consult our privacy policy every time you use our services.

9. How to contact us

We have set up a Personal Information Protection Professional to protect your personal information in accordance with this policy. If you have any complaints or reports about network information security, or if you have any questions, comments or suggestions regarding this policy, our company's privacy measures, or your information, you may send them to qilong@qlgame.net.

Normally, we will handle your questions, comments or suggestions within fifteen days of receiving them and verifying your user identity. Thank you for your support and love for our products.


热门推荐