"Power Fruit Sweep" Privacy Policy

Release date: February 1, 2023

Updated date: June 7, 2023

Effective Date: February 1, 2023

The main body of the company: Wuhan Wangmi Technology Co., Ltd.

This Privacy Policy will help you understand the following key policies:

1) In order to ensure the normal operation of the core functions and other functions of the product, we will collect some of your necessary information

2) We will not share, provide, transfer or obtain your personal information from third parties, unless with your consent;

3) We will endeavor to take reasonable security measures to protect your personal information. In particular, we will adopt common methods in the industry and do our utmost commercial efforts to protect the security of your sensitive personal information;

4) How you access, correct, delete personal information, withdraw consent authorization, and complain and report.

If you do not agree to this privacy policy and start using it, you can only use basic browsing functions, and no information about you will be collected. Full functions and services can only be used with your consent, and we will process your relevant information in accordance with this policy.

We attach great importance to the protection of users' personal information, and will treat such information with diligence and prudence. When you download, install, open, browse, and use "Richsmiley" software and related services, we will collect, store, use, share, disclose and protect your personal information in accordance with this Privacy Policy. We hope to introduce to you how we handle your personal information through this Privacy Policy, so we recommend that you read all the terms of this Privacy Policy carefully and completely. Among them, the content related to your information and rights will remind you to pay attention in bold form, please read the following content emphatically:

1. How we collect and use personal information

2. Our use of cookies and similar technologies

3. How do we store personal information

4. How do we share, transfer and publicly disclose personal information

V. How do we protect the security of personal information

6. Your rights

7. Terms of Use for Minors

8. Revision and notice of privacy policy

9. Scope of application

10. How to contact us

11. Others

1. How we collect and use personal information

Please note that when you open and read this privacy policy or user agreement, the mobile phone system may have related information such as using your wifi, reading the current process or status behavior when loading this webpage (when the webview loads the webpage), please be informed We know that this behavior is not an active behavior of our products, and we will not collect any information from you. We will only start using and collecting information after you confirm and agree to the privacy policy.

During your use of the software and services of "Miguo Scanpu", we will collect and use your personal information in accordance with the principles of legality, minimum necessity, and openness and transparency. The information we collect or ask you to provide will be used to:

1. Ensure the normal operation of the basic functions of the product;

2. Realize various functions and services;

3. Optimize and improve products and services;

4. Ensure the safety of products, services and users;

5. Comply with laws, regulations and national standards;

1. Guarantee the normal operation of "Power Fruit Scan" and services

When you use "Power Fruit Scan" and related services, in order to ensure the normal operation of the software and services, we will collect your unique device identifier (IMEI/OAID/UUID (IDFV)/androidID/SIM card IMSI information), Hardware model, operating system version number, network device hardware address (MAC), IP address (rough location information), software version number, network access method and type, and operation log information. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of products.

2. Realize various functions and services

To provide you with functions or services of numbered notation recognition and numbered notation scanning.

When registering and logging in, you can choose to use Alipay or a WeChat third-party account to authorize the login in "Miguo Scan Pu". If you choose to use your Alipay or WeChat account to log in to "Miguo Scanpu", you need to authorize the necessary information on your Alipay or WeChat account, avatar, and nickname for the purpose of:

(1) Provide you with better services through account management. By logging into your account, you can synchronize your relevant information.

(2) If you provide a real and valid mobile phone number for binding, you can easily retrieve your account number and password when you encounter problems with losing your registered account or forgetting your password.

(3) When using a third-party account to log in, it may be necessary to write and read information necessary to log in to the clipboard. This information is only used for login-related purposes, and your private information will not be collected.

No Permission name Obtaining method Purpose of obtaining this permission
1 Get device ID and status Get silently

1. It is used as the basis for identifying real users instead of plug-in software and machines when logging in and registering.

2. It is used to collect bug information generated by statistical applications so that we can better improve our products.

3. Collect device MAC address device information to help us analyze the performance of the app on different terminal devices to adapt to more terminal devices. We encrypt the information we collect for added protection of privacy.

2 access network Get silently Used to obtain the network status and make network requests to use the numbered musical notation recognition function
3 Read and write storage permission Dynamic acquisition, user active authorization Used to import pictures for recognition or save scanned copies
4 camera Dynamic acquisition, user active authorization Used for normal use of photo scanning function
5 Device stays awak Get silently It is used to keep the device always on during the identification request to avoid invalidation of the request
6 Get a list of software installations Get silently Export and share files to other installed third-party applications

Please refer to the third-party SDK services currently included in our products 《Power fruit scan third-party information sharing list》 。The collection and processing of information by the aforementioned service providers comply with their own privacy clauses, which do not apply to this policy. In order to protect your information security to the greatest extent, we recommend that you check the privacy policy of any third-party SDK service before using it. In order to protect your legitimate rights and interests, if you find that these SDKs or other similar applications are at risk, you are advised to immediately terminate the relevant operations and contact us in time.

4. Other third-party statistical codes share your information

(1) During your use of our products, in order to reduce the impact of bugs on your use, and according to your behavior habits, change the interaction to improve the user experience, we will upload behavior information and crash logs to the Baidu mobile statistics platform, talkingdata platform, Google Firebase platform, data roamer statistics platform, Huawei data statistics, used for detailed crash log statistics and behavior analysis.

(2) If you encounter any problems during the use of our products, in order to contact us faster, the third-party Jiguang IM instant messaging is integrated.

(3) In the process of using our products, in order to realize the cloud backup function of sticky notes, we use the third-party Qiniu cloud service and the knowledge cloud service.

(4) When you use our products, we will show you third-party advertisements and information.

(5) In the process of using our products, we will provide better product experience and meet your actual needs. We use Baidu human key point recognition, Baidu cutout, pickup cutout and face++ beauty services.

You can access the privacy policies of third-party platforms via the following links:

SDK product name Provider name Applications for APP products Scene description Collection method Personal information type Personal Information Field Use or purpose Is necessary information Information processing method Privacy policy
Alipay payment SDK Alipay Android system Login, pay Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information In order to allow you to log in to the Memo Notepad APP more safely and conveniently, you can choose to use the third-party account of Alipay to authorize the login Memo Notepad, which is more convenient to purchase the paid services in the Memo Notepad. Yes Use de-identification to desensitize personal information

https://render.alipay.com/p/c/k2cx0tg8

WeChat SDK WeChat Android system Login, pay Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information In order to allow you to log in to the Memo Notepad APP more safely and conveniently, you can choose to use the third-party account of Alipay to authorize the login Memo Notepad, which is more convenient to purchase the paid services in the Memo Notepad. Yes Use de-identification to desensitize personal information

https://open.weixin.qq.com/cgi-bin/frame?t=news/protocol_developer_tmpl

Baidu Mobile Statistics Baidu Android system Statistical functions for all dimensions of the Ap Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information Used for statistical detailed crash logs and behavior analysis Yes Use de-identification to desensitize personal information https://tongji.baidu.com/web/help/article?id=330&type=0
https://www.baidu.com/duty/yinsiquan-policy.html
FireBase statistics Google Android system Statistical functions for all dimensions of the Ap Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information Used for statistical detailed crash logs and behavior analysis Yes Use de-identification to desensitize personal information https://firebase.google.com/support/privacy
Talkingdata statistics TalkingData Android system Statistical functions for all dimensions of the Ap Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information Used for statistical detailed crash logs and behavior analysis Yes Use de-identification to desensitize personal information https://www.talkingdata.com/privacy.jsp?languagetype=zh_cn
Data roamer statistics Today's headlines Android system Statistical functions for all dimensions of the Ap Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information Used for statistical detailed crash logs and behavior analysis Yes Use de-identification to desensitize personal information https://www.volcengine.com/docs/6256/649029
Huawei statistic Huawei Android system Statistical functions for all dimensions of the Ap Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information Used for statistical detailed crash logs and behavior analysis Yes Use de-identification to desensitize personal information https://consumer.huawei.com/cn/privacy/privacy-policy/
Aurora IM aurora Android system By identifying device information, App is given the ability to deliver instant messages for instant messaging; geographic location and network information are used to create smart tags to achieve regional and group instant messaging. The overall implementation gives the App instant messaging capabilities, which can be used for in-app chat, contact customer service, timely feedback user problems, and solve user problems. Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information Give the App instant messaging capabilities, which can be used for in-app chat, contact customer service, timely feedback user problems, and solve user problems. Yes Use de-identification to desensitize personal information https://www.jiguang.cn/license/privacy
Qiniu Cloud Storage Qiniu Cloud Android system Obtain the memo stored by the user through storage permissions and upload it to the cloud Call system related interface to automatically collect Network information, memos stored by users Network information: IP address, WiFi information, base station information and other related information Storage information: information on external storage In order to realize the cloud backup function of the notes, to avoid the loss of the user's saved notes, and to synchronize in time after changing the phone Yes Use de-identification to desensitize personal information https://www.qiniu.com/privacy-right
Excellent amount of exchange Tencent Android system By identifying device information, geographic location, and network information, it is used to create smart labels to push more intelligent and reasonable advertisements to users. Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information Display third-party ads Yes Use de-identification to desensitize personal information https://www.tencent.com/zh-cn/privacy-policy.html
pangolin Today's headlines Android system By identifying device information, geographic location, and network information, it is used to create smart labels to push more intelligent and reasonable advertisements to users. Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information Display third-party ads Yes Use de-identification to desensitize personal information https://partner.oceanengine.com/privacy
vivo traffic allianc vivo Android system By identifying device information, geographic location, and network information, it is used to create smart labels to push more intelligent and reasonable advertisements to users. Call system related interface to automatically collect Personal equipment information, location information, network information, personal communication information Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device Model, operating system and hardware related information) Network information: IP address, WiFi information, base station information and other related information Display third-party ads Yes Use de-identification to desensitize personal information https://www.vivo.com.cn/about-vivo/privacy-policy
Baidu human body key point recognition Baidu Android system Whether the picture meets the production requirements when making the ID photo Call system related interface to automatically collect Network information, memos stored by users Network information: IP address, WiFi information, base station information and other related information Storage information: information on external storage In order to make the product meet the actual requirements Yes Use de-identification to desensitize personal information https://www.baidu.com/duty/yinsiquan-policy.html
Baidu Cutout Baidu Android system Change the background color of the ID photo Call system related interface to automatically collect Network information, memos stored by users Network information: IP address, WiFi information, base station information and other related information Storage information: information on external storage In order to make the product meet the actual requirements Yes Use de-identification to desensitize personal information https://www.baidu.com/duty/yinsiquan-policy.html
Pickup Cutout Pickup Android system Change the background color of the ID photo Call system related interface to automatically collect Network information, memos stored by users Network information: IP address, WiFi information, base station information and other related information Storage information: information on external storage In order to make the product meet the actual requirements Yes Use de-identification to desensitize personal information http://www.picup.shop/servicePrivacy.html
Beauty face++ Android system Beautify the face Call system related interface to automatically collect Network information, memos stored by users Network information: IP address, WiFi information, base station information and other related information Storage information: information on external storage In order to make the product a better experience Yes Use de-identification to desensitize personal information https://www.faceplusplus.com.cn/privacy-policy/

You can access the privacy policies of third-party platforms via the following links:
Gson vivold SDK Android WorkManager AndroidX VersionedParcelable JetBrains Java Annotations
Okio Jackson Annotations FastJson AndroidX CardView AndroidX ConstraintLayout
Jackson Core Glide Annotation Compiler AndroidX CustomView AndroidX DocumentFile Greenrobot EventBus
TensorFlow Lite huangyz0918 AndroidWM Kotlin Stdlib TooTallNate Java-WebSocket BumpTech Glide
AndroidX Core Utilities Bouncy Castle AndroidX Preference shaohui10086 BottomDialog checker- framework
Glide Mocks SDK RxJavaFX youth banner AndroidX Annotations AndroidX VectorDrawable
oppo-openid Flyco TabLayout medyo FancyButtons JakeWharton Timber Trackinglo
Picasso GreenDAO Lottie flexbox-layout BaseRecyclerViewAdapterHelper
Curzibn Luban Android Lifecycle GPUImage for Android ARouter qstumn BadgeView
Glide GIF Decoder Retrofit 2 Android Multi Dex Library Apache XmlBeans AndroidX Interpolator
JSON In Java RxAndroid Apache POI OkHttp Kotlin Android Extensions Runtime
lenovo-opendeviceid JakeWharton RxBinding2 aritraroy PinLockView AndroidX Camera Google Material Components For Android
Glide Annotations Chrisbanes PhotoVvew SLF4J opencv-android SimpleXML
AndroidUtilCode AndroidX Legacy Lzyzsd JsBridge Guava FlycoDialog. Master
AndroidX Lifecycle Razerdp BasePopup AndroidX AppCompat AndroidX Arch Core Components
AndroidX Fragment AndroidX Activity AndroidX DataBinding AndroidX Core AndroidX Annotation

5. Guarantee the safety of products, services and users

To help us better understand the operation of the software and related services, so as to ensure the security of operation and provision of services, we use third-party statistical tools to record network log information, as well as the frequency of use of software and related services, crash data, General installation, usage, performance data, etc.

Please understand that when we collected and used the above information, we performed de-identification / anonymization. The data analysis only corresponds to specific codes that cannot be directly associated with the user's identity.

(I) Handling of changes in the purpose of collecting and using personal information

Please understand that with the development of our business, the functions and services provided by the software may be adjusted and changed. In principle, when new functions or services are related to making photos, the personal information collected and used will have a direct or reasonable correlation with the original processing purpose. Where there is no direct or reasonable connection with the original purpose, we will collect and use your personal information, and we will inform you again and obtain your consent.

(II) Personal information exempted from obtaining consent to collect and use according to law

Please understand that in the following situations, we do not need your authorization to collect and use your personal information in accordance with laws and regulations and / or relevant national standards:

(1) directly related to national security and national defense security;

(2) directly related to public safety, public health, and major public interests;

(3) Directly related to crime investigation, prosecution, trial and judgment enforcement;

(4) It is difficult to obtain the consent of the personal information subject or other individuals because they have significant legal rights such as life and property;

(5) Your personal information collected is disclosed to the public by yourself;

(6) Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, etc .;

(7) Necessary for signing and performing contracts according to your requirements;

(8) Other circumstances required by laws and regulations.

It is particularly reminded that if the information cannot identify you personally or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information or we When data that cannot be linked to any particular personal information is used in combination with other personal information about you, that information will be treated and protected as your personal information in accordance with this privacy policy during the combined use.

II. Use of Cookies and Similar Technologies

Cookies and similar technologies are commonly used technologies on the Internet. When you use the  software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We may set authentication and security cookies or anonymous identifiers to ensure the safe and efficient operation of our products and services, help us improve the efficiency of our services, and increase login and response speed. Using such technologies can also help you avoid the need to repeat the steps and processes of selecting personalization settings (for example: record the status of options in settings), and help you get an easier access experience.

How we store personal information

(I) Location of information storage

In accordance with laws and regulations, we store your personal information collected and generated during domestic operations in the People's Republic of China. At this time, we will not transfer the above information overseas.

(II) storage period

We only retain your personal information for the period necessary for the purpose of providing software and services, and after the necessary period, we will delete or anonymize your personal information, but otherwise provided by laws and regulations except.

IV. How we share, transfer, and publicly disclose personal information

(I) Sharing

Respecting the privacy of users is a basic principle of ours. We will not share your personal information with any company, organization, or individual except:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information with external parties in accordance with the requirements of judicial or administrative agencies.

3. Sharing with related parties: Your personal information may be shared with our affiliated companies. We only share necessary personal information and are subject to the purposes stated in this privacy policy. If the affiliate wants to change the purpose of processing personal information, it will ask for your authorization again.

4. Sharing with authorized partners: For the purposes stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legitimate, proper, necessary, specific, and clear purposes, and we will only share the personal information necessary to provide the service, such as when you purchase our products online to share your information. Our partners are not authorized to use the shared personal information for any other purpose. For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.

(II) Transfer

We will not transfer your personal information to any company, organization, or individual, except as follows:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.

(III) Public disclosure

We will only disclose your personal information publicly if:

1. Disclose the personal information you specified in a disclosure method that you explicitly agree to

2. Where it is necessary to provide your personal information in accordance with the requirements of laws, regulations, mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information according to the type of personal information required and the manner of disclosure. Subject to laws and regulations, when we receive the above request for information disclosure, we will require the corresponding legal documents, such as subpoenas or investigation letters.

3. Please understand that in the following situations, we do not need your authorization to share, transfer, or publicly disclose your personal information in accordance with laws and regulations and / or relevant national standards

(1) directly related to national security and national defense security;

(2) directly related to public safety, public health, and major public interests;

(3) Directly related to crime investigation, prosecution, trial and judgment enforcement;

(4) It is difficult to obtain your own consent in order to protect your or other individuals' important legal rights such as life and property;

(5) personal information that you disclose to the public;

(6) Where personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

V. How do we protect the security of personal information

(I) We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or without authorization Accessed, publicly disclosed, used, modified, damaged, lost or leaked.

(II) We will use reasonable and feasible means such as encryption technology and anonymization to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

(III) We will establish special security departments, security management systems, and data security processes to ensure the security of your personal information. We adopt a strict data usage and access system to ensure that only authorized personnel can access your personal information and conduct security audits of data and technology in a timely manner.

(IV) Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we can do our best to strengthen Security measures cannot always guarantee 100% security of information, and we will do our best to ensure the security of the personal information you provide to us. You understand and understand that the systems and communication networks you use to access our services may cause problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of your personal information.

(V) We will formulate emergency response plans, and immediately launch emergency response plans when user information security incidents occur, and strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (leakage, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or are about to take, and you can choose Advice on preventing and reducing risks, remedies for you, etc. We will promptly inform you about the event in the form of push notifications, emails, letters, text messages, etc. If it is difficult to notify them one by one, we will take a reasonable and effective way to make announcements. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

(VI) We would like to remind you that the personal information protection measures provided in this privacy policy only apply to the  software and related services. Once you leave the software and related services, browse or use other websites, services and content resources, we have no ability and obligation to protect any personal information submitted by you in software and websites other than the software and related services , Regardless of whether you log in, browse or use the above software, or whether the website is based on links or directions from the software.

VI. Your rights

We take your management of your personal information very seriously and make every effort to protect your rights to access, modify (update or correct), delete, and withdraw your consent to your personal information so that you have the full ability to protect your privacy and security .

(I) Manage and withdraw your authorized information

You can withdraw your consent by turning off features, changing application permissions in your device settings, changing the scope of your authorization for us to continue collecting personal information, or withdrawing your authorization. Please understand that certain business functions and services will require your information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and we will no longer process your corresponding Personal information. However, your decision to withdraw consent or authorization will not affect the processing of personal information previously based on your authorization.

(II) Access Privacy Policy

You can view the entire contents of this privacy policy in Settings-Privacy Policy in the client.

(III) Informing you of your right to stop operations

If we cease operations, we will stop collecting your personal information in a timely manner, we will notify you of the suspension of operations in the form of one-by-one delivery or announcement, and delete or anonymize your personal information.

(IV) Cancel the account

You can cancel your account by contacting us through "Settings"-"Cancel Account" or the method specified in this privacy policy. We will delete your account within 15 working days after verifying your identity.

Customer Service Phone: 027-87610239

Customer Service Email: moreapps.service@gmail.com

Your cancellation of the above account is irreversible. We will stop providing you with products or services, will no longer collect your personal information, and delete personal information related to your account or make anonymization according to your request, but laws and regulations Unless otherwise specified or otherwise required by the regulatory authority.

(V) Complaints and reports

You can make a complaint or report in accordance with our publicized system. If you think that your personal information rights may be infringed, or you find clues that infringe your personal information rights, you can go to "Settings"-"Customer Service Center" and enter the feedback interface to contact us. After verification, we will feedback your complaint and report within 15 working days.

VII. Minor clauses

If you are a minor under the age of 18, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using the  software and related services.

We protect the personal information of minors in accordance with the relevant national laws and regulations. We will only collect, use, share or disclose minors' individuals if permitted by law, parents or other guardians expressly agree or protect the minors Information; if we find that personal information from a minor has been collected without prior verifiable parental consent, we will try to delete the information as soon as possible.

If you are the guardian of a minor, if you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information disclosed in this privacy policy.

VIII. Amendments and notices of privacy policy

(I) In order to provide you with better services, the  software and related services will be updated and changed from time to time, and we will amend this privacy policy in a timely manner. This amendment forms part of this privacy policy and is equivalent to this privacy policy. Effectiveness. However, without your explicit consent, we will not reduce your rights under this privacy policy in effect.

(II) After this privacy policy is updated, we will remind you of the updated content in an appropriate manner on the  application client and before the updated terms take effect, so that you can keep abreast of the latest version of this privacy policy. If you continue to use our service, you agree to accept the content of this revised policy, but if the updated content requires the collection of personal sensitive information such as audio and video, contact information, and geographic location, your consent will still be sought in a significant way again.

(III) For major changes, we will also provide more prominent notices (we will explain the specific changes to the privacy policy by including, but not limited to, mail, text messages, private messages, or special reminders on the browse page).

Significant changes referred to in this privacy policy include, but are not limited to:

1. Major changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way in which personal information is used, etc .;

2. We have undergone major changes in terms of ownership structure and organizational structure. Such as business adjustment, bankruptcy mergers and acquisitions, etc .;

3. The main objects of personal information sharing, transfer or public disclosure change;

4. Significant changes have occurred in your right to participate in the processing of personal information and how you exercise it;

5. When our responsible department for handling personal information security, contact methods and complaint channels change.

IX. scope of application

This privacy policy applies to all services provided by Wuhan Wangmi Technology Co., Ltd. and its affiliates, including the software clients, websites, etc., and does not apply to those who have a separate privacy policy and are not included in this privacy policy. Third-party products or services.

This privacy policy does not apply to:

1. Other third-party products or services may include products or websites and advertising content displayed to you in personalized recommendations or other products or websites linked to in the software service;

2. Other third parties advertising the software service.

Your use of these third party services (including any personal information you provide to these third parties) will be governed by these third party's terms of service and privacy policies (not this privacy policy). Please read the terms of the third parties carefully . Please protect your personal information and provide it to third parties only when necessary.

The software and related services described in this privacy policy may vary depending on factors such as the phone model, system version, software application version you are using. The final products and services are subject to the  software and related services you use.

X. How to contact us

1. If you have any questions, comments or suggestions about the content of this privacy policy, you can contact us by emailing moreapps.service@gmail.com.

2. If you believe that we have violated laws and regulations or agreed with you to collect and use your personal information, you can also contact us by sending an email (moreapps.service@gmail.com) and ask to delete your related individuals information. We promise to confirm the issues involved within 15 working days, and we will reply and deal with them in time after verifying your user identity.

XI other

(I) The headings in this "Privacy Policy" are for convenience and readability only, and do not affect the meaning or interpretation of any provisions in this Privacy Policy.

(II) Definitions of terms related to this "Privacy Policy":

1. A related party means any company, institution, or legal representative of a company or institution that is controlled, controlled, or under common control with or under one party. "Control" refers to the ability to directly or indirectly influence the management of the company mentioned, whether through ownership, voting shares, contracts or other legally recognized methods.

2. De-identification refers to the process of processing personal information so that it cannot identify the subject of personal information without resorting to additional information.

3. Anonymization refers to the process of making personal information subject unable to be identified and the processed information cannot be restored through the technical processing of personal information.

(III) The copyright of this "Privacy Policy" is owned by Wuhan Wangmi Technology Co., Ltd. We have the right to interpret and modify to the extent permitted by law.