Issuance/Effective Date: January 1, 2026
Thank you for trusting and using our product. We fully respect your right to privacy, so we hereby formulate this "App Privacy Statement" (hereinafter referred to as "this Statement") to help you understand how we collect, use, disclose, protect, store, and transmit your personal data. Please read this Statement carefully. If you have any questions, please let us know.
Personal information refers to various information recorded electronically or by other means that can identify a natural person alone or in combination with other information. This Statement explains how we process your personal information, and the processing methods for specific products or services will be detailed in the corresponding privacy notices or supplementary statements.
This Statement will help you understand the following:
Please note:
Our product services are diversified, and the types and scopes of personal information collected and used for different services will vary. We will only collect personal information corresponding to the service functions you purchase or use. If you do not use or purchase any of the above functions, we will never and cannot collect personal information related to that function.
Devices, mobile applications, and Windows applications may use local storage technologies such as Cookies, pixel tags, and web beacons. We treat information collected through Cookies and similar technologies as non-personal information. However, if local laws regard IP addresses or similar identification marks as personal information, we will also treat such identification marks as personal information.
A Cookie is a plain text file stored by a web server on a computer or mobile device. The content of a Cookie can only be retrieved or read by the server that created it. Each Cookie is unique to your web browser or mobile application. Cookies usually contain an identifier, site name, and some numbers and characters.
We sometimes store Cookies on computers or mobile devices. The purpose of enabling Cookies is to improve the user experience, including:
We will not use Cookies for any purposes other than those described in this Statement. You can manage or delete Cookies according to your preferences. For details, please see AboutCookies.org . You can clear all Cookies stored on your computer, and most web browsers have functions to block Cookies.
If you clear Cookies, you will need to change user settings yourself each time you visit our website. Please also note that some of our services may must use Cookies, and disabling Cookies may affect your use of all or part of the functions of these services.
In addition to Cookies, we and some third parties will use web beacons and pixel tags on websites. A web beacon is usually an electronic image embedded in a website or email, which can be used to identify Cookies on your device when you view a web page or email. Pixel tags allow us to send emails in a format you can read and enable us to know whether the email has been opened.
We and some third parties use such technologies for various purposes, including analyzing service usage (in conjunction with Cookies) and providing content and advertisements that better meet your needs. For example, emails we send to you may contain click URLs linked to website content. If you click the link, we will track the click to help us understand your preferences and improve customer service. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
We and some third parties may use other local storage technologies in some services, such as local shared objects (also known as "Flash Cookies") and HTML5 local storage. These technologies are similar to the aforementioned Cookies. They are also stored on your device and can be used to record certain information about your activities and preferences. However, these technologies may use different devices from standard Cookies, so you may not be able to control them using standard browser tools and settings. For instructions on disabling or deleting information contained in Flash Cookies, please click here.
Many web browsers have a Do Not Track function, which can send Do Not Track requests to websites. Currently, major internet standards organizations have not established relevant policies to regulate how websites should respond to such requests. If your browser enables Do Not Track, all our websites will respect your choice.
In some cases, we will entrust other companies to process your personal information on our behalf. For example, companies that process hotlines, send emails, and provide technical support on our behalf. These companies can only use your personal information to provide services to you on our behalf.
We will sign strict confidentiality agreements or personal information processing clauses with the entrusted parties, requiring them to process personal information in accordance with this Statement and take relevant confidentiality and security measures.
Sharing refers to the process in which we provide personal information to other personal information controllers, and both parties have independent control over the personal information. We will not share your personal information with external parties except in the following cases:
Under 3-4 above, we will sign strict confidentiality agreements with companies, organizations, and individuals with whom we share personal information, requiring them to process personal information in accordance with this Statement and take relevant confidentiality and security measures.
Transfer refers to the process of transferring the control of personal information from us to another personal information controller. We will not transfer your personal information to any company, organization, or individual except in the following cases:
We will only publicly disclose your personal information in the following cases:
In the following circumstances, sharing, transferring, or publicly disclosing your personal information does not require your prior authorization and consent:
According to legal provisions, sharing or transferring anonymized personal information, and ensuring that the data recipient cannot restore or re-identify the personal information subject, is not considered as external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require additional notification to you and obtaining your consent.
We attach great importance to the security of personal information and take industry-standard practices to protect your personal information from unauthorized access, disclosure, use, modification, damage, or loss. To this end, we have specially taken the following measures:
In short, we will do our best to protect your personal information. However, no measure is impenetrable, and no product or service, website, data transmission, computer system, or network connection is absolutely secure.
To cope with possible risks such as personal information leakage, damage, and loss, we have formulated a number of systems and control measures, clarified the classification and grading standards for security incidents and vulnerabilities and corresponding processing procedures, and established special security notification and security early warning pages. We have also established a special emergency response team for security incidents. In accordance with the requirements of security incident disposal specifications, we activate security plans for different security incidents, stop losses, analyze, locate, formulate remedial measures, and collaborate with relevant departments to trace back and crack down.
If a personal information security incident unfortunately occurs, we will inform you in accordance with legal requirements: the basic situation of the security incident and possible impacts, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will inform you of the relevant situation of the incident by email, SMS, push notification, etc. If it is difficult to inform each personal information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.
In many countries or regions where we provide products and services, the legislation in some countries or regions stipulates that personal information subjects have the right to access, rectify, and delete relevant personal information retained by us. In the aforementioned countries or regions, personal information subjects or their agents can request us to access, rectify, and delete relevant personal information retained by us (hereinafter collectively referred to as "requests").
Requests for personal information subjects must be made in writing. Even if the requester does not specify the legal basis for the request, the request is still valid. Generally speaking, oral access requests are invalid. If the legislation of some countries also recognizes the validity of oral requests, we will comply with such provisions.
If a personal information subject makes a relevant request through other channels such as hotlines, service emails, online customer service, or service stores, we will guide the personal information subject to make a formal request through the aforementioned channels to facilitate communication and feedback on the processing progress and results. We have established special channels for personal information subject requests to protect the legitimate interests of personal information subjects and ensure our normal operations, preventing the abuse or misuse of the right to request personal information.
Most laws require personal information subjects to follow specific requirements when making requests. This Statement requires personal information subjects to do the following:
We will make every effort to ensure a response within one month of the submission of a personal information subject's access request. Considering the complexity and quantity of requests, this period may be extended by another two months if necessary. In case of delayed information provision, we will notify the personal information subject of the relevant situation and the reason for the delay. If the time limit set in this paragraph conflicts with local legal provisions, the local legal provisions shall prevail.
After a personal information subject's request is made, the following results may occur:
In some cases, the personal information subject's request will be rejected, including but not limited to:
If we reject a personal information subject's access request, we will formally explain the reasons to the requester.
When the situations in “①” do not occur, we will satisfy the personal information subject's request. To increase the possibility of a successful request, please provide as detailed information as possible when making the request, such as the type and specific content of the request, information about the information holder (such as the name of our service you use), and the time range of information generation or processing (the smaller the time range, the greater the possibility of success).
You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting information, turning off device functions, setting privacy in our terminal devices or Apps, etc. In our account-related services, you can also withdraw all authorizations for us to continue collecting your personal information through account-related services by canceling your account.
Please understand that each business function requires some basic personal information to be completed. When you withdraw your consent or authorization, we will not be able to continue to provide you with the services corresponding to the withdrawn consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the personal information processing carried out based on your authorization before.
How to withdraw consent in specific services will be published by us in special privacy notices or supplementary statements.
Our personal and household devices are mainly for adults, but for minors using the devices and services, we are well aware of the importance of taking additional precautions to protect their privacy and security. We regard anyone under the age of 18 (or the age specified by local laws) as a minor.
For minors' personal information collected with the guardian's consent, we will only use or disclose it when permitted by law, explicitly agreed by the guardian, or necessary to protect the minor. If at any time the guardian needs to access, modify, or delete personal information related to the ward, please contact us in the manner described in "4. How we protect your personal information".
If we find that we have collected minors' personal information without first obtaining verifiable guardian consent, we will try to delete the relevant content as soon as possible.
Our applications and product services may contain links to third-party websites. Our products and services may also use or provide services from third parties, such as third-party Apps listed in our app market.
All links to third-party websites and services are provided only for the convenience of users. We have no control over such third parties, cannot provide any express or implied guarantees for the linked content, and such links are not considered as our recommendation or authorization of the linked content; we also cannot control the privacy or data protection policies of third parties, and such third parties are not bound by this Statement.
You need to independently judge your interaction with such links. Before submitting personal information to a third party, please read and refer to the privacy policies of these third parties, and we shall not be liable for this.
We provide services through global resources and servers. This means that your personal information may be transferred to other jurisdictions outside the country/region where you use our services, or accessed from these jurisdictions. Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your data is adequately and equally protected as required by all applicable laws and regulations. For example, we will request your consent to the cross-border transfer of personal information or implement security measures such as data anonymization before cross-border transfer.
Major changes referred to in this policy include, but are not limited to:
To provide you with more convenient, high-quality, and personalized products and/or services and to strive to improve your experience, we will collect your device model, operating system, unique device identifier, operation log, MAC address, and application list information. We may collect and use your personal information in the following additional services provided to you. If you do not provide this information, it will not affect your use of basic services such as browsing, searching, and purchasing on our platform, but you may not be able to obtain the user experience brought by these additional services. These additional services include:
You understand and agree that the above additional services may require you to enable the camera, album (picture library), microphone (voice), App installation list, and MAC address access permissions on your device to collect and use the information involved in these permissions. Please note that your enabling of any permission means that you authorize us to collect and use relevant personal information to provide you with the corresponding services. Once you disable any permission, it means that you cancel the authorization, and we will no longer continue to collect and use relevant personal information based on the corresponding permission, nor can we provide you with the services corresponding to that permission. However, your decision to disable the permission will not affect the information collection and use carried out based on your authorization before.
To ensure the security and integrity of image data during transmission and storage, this image push service employs an encryption mechanism that complies with industry security standards. The specific encryption logic is as follows:
The aforementioned encryption mode has covered the core security requirements for image push, complies with industry security standards for data transmission in the field of security surveillance, and can provide reliable security assurance for the image push process.
When using the image push service, users are unable to configure encryption keys on their own to implement additional encryption protection for the pushed image data. If users have higher requirements for data encryption levels or cannot accept the potential risks associated with the current encryption mode, it is recommended to carefully evaluate whether to use this service. Once users choose to use this service, it shall be deemed that they have fully understood, acknowledged, and voluntarily accepted the aforementioned arrangements and any potential risks involved.
In order to ensure the realization and stable operation of the relevant functions of this APP, we may access software development kits (SDKs) provided by third parties to achieve related purposes. Different versions of third-party SDKs will be different. The third-party SDK connected to the APP.
|
The third-party Company Name |
Product/Service |
Purpose Of Usage |
Scenes |
Personal info/Permissions |
How to share |
|
Tencent Technology (Shenzhen) Co., Ltd. |
WeChat third-party login SDK |
You can log in to the app with your WeChat account |
App login |
https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/ONwPihxKd82RAkIJ |
Background interface transfer |
|
|
Firebase |
Push Notification |
User gets Push Notification |
Device identification code (IMEI, android_id, ssid, IDFA, OPENUDID, GUID, SIM card information, IMSI), MAC address, device platform, device manufacturer, device brand, device application installation list; network information and location Related information: network status and changes of the device, location related information, ssid, video, task list, Wifi information |
Background interface transfer |
If you have any questions, comments, or suggestions regarding this statement or matters related to your personal information, please contact our Personal Information Protection Officer by sending an email to [tsrc@tvt.net.cn].
In general, we will review the relevant issues as soon as possible and provide a response within 15 working days.
Important note: Due to local legal and language differences, the local language version of the "Privacy Statement" may differ from this version. In case of any discrepancy, the local language version shall prevail.