Privacy Policy
1 Introduction
This Privacy Policy is intended to inform you of how JoyeEcho (hereinafter referred to as "we") collects, uses, stores, and shares your personal information to ensure that your information security and privacy are fully protected. We deeply understand that your trust is crucial to us, and therefore we are committed to strictly adhering to applicable international data protection standards to protect your legitimate rights and interests. Please read this Privacy Policy carefully. If you have any questions or comments about this policy, please contact us at [Email: 710534946@qq.com].
2 Types of Data Collected
1. Basic Personal Information
(1) We may collect your name, gender, date of birth, ID number, or other valid identification numbers. This information is used to accurately identify your identity so that we can provide you with personalized services and support. For example, when you register as our user, we need you to provide your name and contact information so that we can create an account for you and communicate with you regarding relevant service information.
(2) Regarding contact information, we will collect your phone number, email address, etc. The phone number is used to contact you when necessary, such as to notify you of service changes, solve problems, etc.; the email address can be used to send important notifications, service updates, and related marketing information, but we will strictly abide by your marketing preferences to ensure that you do not receive unwanted emails.
2. Device and Network Information
(1) When you use our services, we will collect your device information, including device model, operating system version, device identifier (such as IMEI, MAC address, etc.). This information helps us optimize the compatibility of services on different devices to ensure that you can have a smooth user experience. For example, by understanding your device model and operating system version, we can promptly identify and resolve possible adaptation issues.
(2) Regarding network information, we will collect your IP address, network connection type (such as Wi-Fi, mobile data), and network service provider information. The IP address is used to determine your general geographic location to provide you with localized services and content; network connection type and service provider information help us analyze network conditions, optimize data transmission, and improve service performance.
3. Service Usage Information
(1) We will record detailed information about your use of our services, including the pages you visit, the content you browse, the keywords you search for, and the time and frequency of your operations. This information can help us understand your usage habits and needs, so that we can continuously improve and optimize service content to provide you with recommendations and personalized experiences that better match your interests. For example, based on your search history and browsing records, we can recommend related products or services to you.
(2) When you interact with our services, we will also collect the information you submit, such as the content provided in comments, feedback, and questionnaires. This information is very important for us to understand your satisfaction with the service, opinions and suggestions, and helps us continuously improve service quality.
4. Location Information
(1) If you agree, we may collect your precise location information, such as your real-time location obtained through GPS positioning technology. This information can be used to provide you with location-based services, such as nearby store recommendations, local news and event information, etc. For example, when you use our life service app, we can recommend nearby restaurants, hotels, etc. based on your location.
(2) We may also collect your general location information, such as the city or region you are in determined by IP address or base station positioning technology. This type of information can be used for broader market analysis and service optimization to meet the needs of users in different regions.
3 Purpose of Data Usage
1. Providing and Improving Services
(1) We use the collected information to provide you with the services you request. For example, we will customize personalized interfaces and service content for you based on the personal information and preference settings you provide, so that you can more conveniently and quickly obtain the information and functions you need.
(2) Through the analysis of your usage information and feedback, we continuously improve and optimize the performance, functions, and user experience of the service. For example, we decide whether to improve or expand a particular function based on user feedback and usage frequency of that function.
2. Customer Communication and Support
(1) We use your contact information to communicate with you as necessary, including sending service notifications, security tips, product updates, and other information. These notifications are crucial for you to understand the relevant dynamics of the service, protect your account security, and use the service normally.
(2) When you contact our customer service team, we will use your relevant information to better understand your issues and provide accurate and effective solutions. By understanding your usage history and relevant information, customer service staff can more quickly locate and resolve the issues you encounter, improving service efficiency and quality.
3. Personalized Recommendations and Marketing
(1) Based on your personal information, usage habits, and preferences, we will provide you with personalized product recommendations, service suggestions, and marketing information. These recommendations are designed to help you discover content and services that may interest you, enhancing your user experience and satisfaction. For example, on e-commerce platforms, we recommend related products based on your purchase history and browsing records.
(2) We may use your information to conduct market research and marketing activities to understand market demand and user feedback, and promote our products and services. When conducting marketing activities, we will strictly comply with relevant laws and regulations and your marketing preferences to ensure that you do not receive unwanted marketing information.
4. Security and Risk Prevention
(1) We use the collected information to ensure the security and stable operation of the service, prevent various security threats and risks, such as fraud and malicious attacks. For example, by analyzing users' login behavior, device information, etc., we can promptly detect abnormal activities and take corresponding preventive measures to protect your account security and personal information security.
(2) We will conduct security audits and monitoring of the service to ensure compliance with relevant security standards and regulatory requirements. During the audit and monitoring process, we will use your relevant information to detect and prevent potential security issues and ensure the reliability and security of the service.
4 Data Storage Period
1. General Storage Principles
(1) We will determine the storage period of data based on the nature of the data, the purpose of use, and applicable laws and regulations. Generally, we will only store your personal information for the shortest time necessary to achieve the relevant business purpose.
(2) When determining the storage period, we will consider factors such as the value of the data, the impact on users, and compliance requirements. For example, for some important transaction records and user identity information, we may store them for a longer period according to legal and regulatory requirements to meet audit and compliance needs.
2. Specific Storage Period Regulations
(1) For basic personal information, such as name and contact information, we will store it during the validity period of your account. After you cancel your account, we will delete the relevant information within a reasonable time, except as required by laws and regulations to be retained. For example, in some industries, user identity information may need to be retained for a period of time to meet regulatory requirements such as anti-money laundering.
(2) Device and network information, service usage information, etc. will usually be stored for a period of time so that we can perform data analysis and service optimization. The specific storage period may vary depending on the importance and usage frequency of the data, generally ranging from [X] months to [X] years. After the storage period expires, we will anonymize or delete the data.
(3) Location information will be deleted or anonymized as soon as the purpose of use is completed. For example, if you no longer need the location-based service after using it, we will promptly delete the relevant location records to protect your privacy.
3. Extension and Termination of Storage Period
(1) In certain special circumstances, we may need to extend the storage period of data. For example, when there are legal disputes, regulatory requirements, or to protect the legitimate rights and interests of users, we may extend the data storage time according to relevant regulations. Before extending the storage period, we will notify you of the relevant situation and explain the reasons and duration of the extension.
(2) When the data storage period expires and there is no situation for extending the storage period, we will delete or anonymize the data according to the established procedures. When deleting data, we will take appropriate technical and management measures to ensure that the data cannot be recovered or identified.
5 User Rights
1. Right to Know
(1) You have the right to know the specific circumstances of how we collect, use, store, and share your personal information. We will inform you of relevant information in detail through this Privacy Policy and other appropriate methods, such as prompting on the service interface, to ensure that you have a clear understanding of our data processing activities.
(2) You can request us to provide a detailed report on your personal information processing situation at any time, including what information is collected, for what purpose, where it is stored, and with which third parties it is shared. We will provide you with relevant information in a clear and easy-to-understand manner within a reasonable time after receiving your request.
2. Right to Choose
(1) You have the right to choose whether to provide us with certain personal information. For example, when using certain functions, if providing specific information is not a necessary condition, you can choose not to provide it without affecting your use of basic services. However, in some cases, if you do not provide certain key information, it may cause us to be unable to provide you with complete services.
(2) You can withdraw the consent you previously granted for us to use your personal information at any time. After withdrawing consent, we will no longer use your relevant information based on that consent, but withdrawing consent does not affect the legal data processing activities we conducted based on consent before you withdrew it. You can withdraw your consent through [specific method].
3. Right of Access
(1) You have the right to access your personal information stored by us. You can query the content of your personal information, including basic personal information and service usage records, through the user interface we provide or by contacting our customer service team.
(2) When you access your personal information, we will ensure that the information provided to you is accurate and complete. If you find that the information about you stored by us is incorrect or incomplete, you have the right to request us to correct and supplement it.
4. Right to Correction
(1) If you find that the personal information we collect and store about you is incorrect or inaccurate, you have the right to request us to correct it in a timely manner. You can submit a correction request through the user feedback channels we provide or by contacting the customer service team, and provide necessary supporting materials.
(2) We will verify the situation and make corrections as soon as possible after receiving your correction request. For corrections involving important information, we may take additional identity verification measures to ensure the security and accuracy of the correction operation.
5. Right to Deletion
(1) Under the circumstances of compliance with laws and regulations and this Privacy Policy, you have the right to request us to delete your personal information. For example, when you cancel your account, withdraw consent, or we no longer need your information for relevant business purposes, you can make a deletion request.
(2) We will follow the established procedures and technical measures to delete your personal information as soon as possible after receiving your deletion request. During the deletion process, we will ensure that the data cannot be recovered or identified to protect your privacy.
6. Right to Data Portability
(1) You have the right to request that we provide your personal information to you or a third party you designate in a structured, common, and machine-readable format. This right is designed to facilitate the transfer of personal information between different service providers and promote data circulation and user autonomy.
(2) We will provide the relevant data according to your request when it is technically feasible. When providing data, we will take appropriate security measures to ensure the integrity and confidentiality of the data.
6 Third-Party Sharing Rules
1. Sharing Principles
(1) We will only share your personal information with third parties when it is necessary and in compliance with laws and regulations and this Privacy Policy. The purpose of sharing is limited to achieving specific business functions, such as providing better services and conducting marketing activities.
(2) Before sharing your personal information with third parties, we will ensure that the third parties have appropriate data protection capabilities and sign strict data protection agreements with them, clarifying both parties' rights and obligations, and requiring third parties to protect your personal information in accordance with our requirements and applicable laws and regulations.
2. Types of Third Parties to Share With
(1) Service Providers: We may share your personal information with some service providers to assist us in providing services. For example, cloud computing service providers, data analysis companies, payment processing institutions, etc. These service providers process your information according to our instructions under our strict supervision and are not allowed to use the information for other purposes.
(2) Partners: We may share your personal information with business partners to conduct joint marketing activities, provide complementary products or services, etc. Before sharing information with partners, we will clearly inform you of the purpose of sharing, the type of information, and the identity of the partners, and obtain your consent.
(3) Third parties required by law: In certain circumstances, we may share your personal information with relevant government agencies or law enforcement departments according to legal requirements, such as court orders or law enforcement investigations. In such cases, we will ensure that the relevant sharing activities comply with legal procedures and make every effort to protect your privacy.
3. Responsibilities and Obligations of Third Parties
(1) We require all third parties who share your personal information with us to comply with strict data protection standards and our requirements. Third parties must take appropriate technical and management measures to protect the security of your personal information and prevent information leakage, tampering, or abuse.
(2) Third parties are not allowed to use your personal information for any purpose not authorized by us. If a third party violates the relevant regulations, we will take legal measures to pursue their responsibility and do our best to protect your legitimate rights and interests.
4. Notification and Consent
(1) Before sharing your personal information with third parties, we will notify you of the specific circumstances of sharing in a clear and explicit manner, including the identity of the third party sharing, the type of information shared, the purpose of sharing, and your rights. Notification methods may include prompting on the service interface, sending emails, or push notifications.
(2) For sharing involving your sensitive information, we will do so only after obtaining your explicit consent. You can withdraw your consent to third-party sharing at any time, and after withdrawing consent, we will stop the relevant sharing activities.
7 Data Security Protection Measures
1. Technical Measures
(1) We use various technical means to ensure the security of your personal information, including encryption technology, access control technology, data desensitization technology, etc. For example, during data transmission, we will use encryption protocols to encrypt the data to prevent it from being stolen or tampered with during transmission; in data storage, we will encrypt and store sensitive information and set strict access permissions, allowing only authorized personnel to access the relevant data.
(2) We regularly conduct security assessments and vulnerability scans on the system to promptly identify and fix potential security risks. At the same time, we continuously update and upgrade technical protection measures to deal with the ever-changing network security threats.
2. Management Measures
(1) We have established a complete data security management system, clearly defining the responsibilities and authorities of various departments and personnel in data protection. We provide regular data security training to employees to improve their awareness and skills in data protection, ensuring that employees strictly comply with data security regulations in their daily work.
(2) We have formulated strict access control policies to strictly authorize and approve employees' access to your personal information. Only authorized employees can access and process your information within their job responsibilities, and access behavior will be recorded and audited to promptly detect and handle abnormal situations.
3. Emergency Response Measures
(1) We have formulated a data security emergency response plan to deal with possible data leaks, network attacks, and other security incidents. In the event of a security incident, we will immediately activate the emergency response plan, take measures to control the scope of the incident's impact, such as stopping related services and notifying users.
(2) We will promptly report data security incidents to relevant regulatory authorities and cooperate with regulatory authorities in investigations and handling. At the same time, we will conduct in-depth analysis of incidents, summarize experiences and lessons learned, and continuously improve our data security protection measures to prevent similar incidents from happening again.
8 Policy Updates and Notifications
1. Policy Updates
(1) We will periodically update and improve this Privacy Policy based on changes in laws and regulations, business development needs, and user feedback. Update content may include changes in data collection methods, adjustments in usage purposes, and expansion of user rights.
(2) When updating the Privacy Policy, we will ensure that the new policy complies with applicable international data protection standards and protects your legitimate rights and interests. The new policy will be published in prominent locations on our official website, service interface, etc., so that you can be informed in a timely manner.
2. Notification Methods
(1) When we make significant updates to the Privacy Policy, we will notify you through various methods, including but not limited to sending emails, push notifications, and prominent prompts on the service interface. The notification content will detail the content of the policy updates, the effective time, and the impact on your rights and interests.
(2) For some non-significant updates, we may directly update the Privacy Policy page and indicate the update date on the page. We recommend that you regularly check this Privacy Policy to understand the latest situation regarding our data processing activities.
9 Children's Privacy Protection
1. Children's Information Collection Regulations
(1) We attach great importance to children's privacy protection. We will not actively collect personal information of children under the age of 14 unless explicit consent is obtained from their guardians. If we collect children's personal information without knowledge, we will immediately take measures to delete the relevant information upon discovery.
(2) When obtaining guardian consent to collect children's information, we will strictly comply with relevant laws and regulations, only collect the information necessary to achieve specific business purposes, and take additional security measures to protect children's information security.
2. Guardians' Rights and Obligations
(1) Children's guardians have the right to know the situation regarding our collection, use, and sharing of children's personal information and can exercise rights related to children's information, such as access, correction, and deletion. Guardians can contact us through [specific methods] to make relevant requests.
(2) Guardians are responsible for ensuring that children comply with relevant regulations when using our services and supervise children's behavior when necessary. If guardians find that children's information may pose security risks or be improperly processed, they can contact us in a timely manner, and we will actively cooperate with guardians to resolve the issues.
10 Contact Us
If you have any questions, comments, or suggestions about this Privacy Policy, or if you believe that our handling of your personal information violates laws and regulations or this policy, please contact us through the following methods:
- Company Name: JoyeEcho
- Email: 710534946@qq.com
We will process and respond to your feedback as soon as possible after receiving it. Your feedback is very important to us, and we will continue to strive to improve our data protection level and safeguard your privacy and legitimate rights and interests.
Please read this Privacy Policy carefully. By continuing to use our services, you agree to the content of this Privacy Policy. If you disagree with any part of it, please stop using our services.
