NovelVaultUser Personal Information Protection and Privacy Policy Agreement
Introduction:
Welcome to NovelVault software and services!
In order to use the NovelVault software and services (hereinafter referred to as "the Software", "NovelVault" or "the Service"), you should read and abide by the NovelVaultUser Personal Information Protection and Privacy Policy Agreement" (hereinafter referred to as "this Agreement" or "Agreement").
Please be sure to carefully read and fully understand the content of each clause, especially the corresponding clauses on exemption or limitation of liability, as well as the separate agreement for opening or using a service, and choose to accept or not to accept it. Restrictions and disclaimers have been highlighted in bold for your attention. We will provide you with corresponding services after expressly obtaining your consent and acceptance.
The terms under this agreement may be changed by us at any time, and you should review them regularly. Once the terms of the agreement are changed, our company will announce the updated version of the agreement on this page, and provide the changed content on the relevant page of NovelVault. Once the updated agreement is announced, it will effectively replace the original agreement. Access to or use of this software after this agreement is updated shall be deemed your acceptance of the updated agreement. You have the right not to accept the updated agreement, but it may cause you to stop using a software or service provided by our company. You can check the latest user personal information protection and privacy policy on this page at any time.
If you have any violation of this agreement, our company will unilaterally restrict, suspend or terminate the provision of this service to you at any time according to the violation, and investigate your relevant responsibilities.
I. Definitions
1.NovelVault Software: refers to the reading tool provided by our company to users, supports the reading of books in the software's built-in bookstore, and provides users with functions or content including but not limited to book recommendation, friend sharing, etc. The software license and client software of the Services are referred to in this Agreement as "NovelVault".
2. User: refers to the user who enables, browses, or uploads data to NovelVault, more commonly referred to as "you" in this Agreement.
3. Other users: refer to other NovelVault users other than the user.
2. Scope of the agreement
1. This agreement is an agreement between you and this platform regarding your downloading, installation, and use of this software involving user personal information protection and privacy policy and other related matters.
2. The content of this agreement also includes relevant agreements, statements, business rules and announcement guidelines that our company may issue from time to time on the protection of users' personal information and privacy policies (hereinafter collectively referred to as "special rules"). Once the above content is officially released, it is an integral part of this agreement, and you should also abide by it.
III. User Personal Information Protection and Privacy Policy
1. Before you can use some functions of this service, you need to have a successfully registered NovelVault platform account, and you need to provide Googleor a Facebook account. For your account information, this platform will use professional encrypted storage and transmission methods to ensure information security, and will not collect, use, disclose or disclose without authorization. Please be aware that it is your responsibility to keep your account information and account password safe.
About the specific rules for your account use, please abide by the relevant account use agreement (including but not limited to the "NovelVault User Service Agreement") and other special rules issued by our company for this purpose.
2. You understand and agree that, in order to achieve some specific functions and services, when you use or enable relevant functions or services, we will collect and use the personal information necessary for some of the above-mentioned specific functions and services (we In this privacy policy, the purpose, method, scope, storage period and place of personal information collection and use will be expressly indicated to you, and information collection will be carried out after obtaining your express authorization and consent). If you refuse to provide personal information, we may not be able to provide you with some of the above functions or services, but it will not affect your use of basic business functions.
2.1 Scope of collection and use of information:
(1) The information you fill in when you register your account (mobile phone number), and the information you upload when you use the service.
(2) The information you submit through our customer service or when you participate in our activities and the information we obtain when you use the service.
The function introduction and the detailed list of information collected and used by the corresponding functions are as follows:
1) Login: the user uses the "one-click login";
2) Edit information: account avatar, nickname, gender (*);
3) Account: account ID (the system-generated unique identifier, which cannot be edited by users), account avatar, nickname, gender;
4) Notifications: If you agree and actively click "Allow", we will send you push notifications. You can set the sound and mark of the notification in the mobile phone system; if you want to turn off push notifications, you can The mobile phone system is set to turn off notifications;
5) Search: When you use the search service, in order to show you your search history, we will collect the information you enter in the search box.
6) Today's reading: Count the reading time of the user in NovelVaultAPP on that day, the statistical unit is minutes;
7) Invite friends:
Facebook Invitation: If you agree and actively click on Facebook Invite, in order to realize the invitation function, we need to open your Facebook (*), and we need to ask for your consent when opening it for the first time;
7) Reading History: In order to show you your browsing history and bookshelf history, we collect your browsing history(*) (users use the same device in NovelVault Browsing books), adding to the bookshelf record (all books added to the bookshelf by the user with the same account, the user can delete the books that have been added to the bookshelf record, and add the books in the bookshelf record to the local bookshelf of the device). In order to realize the functions of bookshelf history and management of bookshelf history, you need to log in NovelVault to register an account. If you refuse to log in, you cannot use the functions of bookshelf history and management of bookshelf history;
8) Bookshelf: When you open the NovelVaultAPP for the first time, we may proactively recommend high-quality books to you and add them to your bookshelf, or you can add the books you are reading Or put your favorite books into the bookshelf for easy search, or delete books that you do not want to keep in the bookshelf;
9) Account binding: When you click My - Settings - Account and Security page, complete google or Facebook binding, or change the bound google or Facebookt account, we will collect your google, facebook (*), if you want to cancel the binding of google or Facebook account, please contact our customer service;
10) Help and feedback: If you agree and actively click "I want feedback", you need to submit a description of the problem, a picture of the problem (optional) and the user's contact information, emial (*) or facebook (*). In order to realize the function of submitting pictures, we need to access your camera(*), album(*), access to camera requires camera permission(*), access to album requires camera permission(*) strong>Mobile phone storage permission (*), if you do not agree with us to obtain this permission, you will not be able to use the function of submitting pictures, but this will not affect your use of other functions of NovelVault.
11) Product security function: In order to ensure your account security and system security, we need to obtain your device MAC address, IMSI, Android ID, and IP address.
The above functional permissions are all necessary permissions to use the corresponding product functions and services. If you do not grant the corresponding permissions, you cannot use the relevant functions, but it does not affect the use of other functions, nor does it affect your use of basic business functions .
If you agree to provide your personal sensitive information (*), you agree that we will process your personal sensitive information in accordance with the purposes and methods described in this agreement.
2.2 For users of Android system, when you use this software, for the purpose of providing, processing, maintaining, improving, developing our products and/or providing services to you, NovelVault may Obtain the following permissions for your terminal device:
• Allow access to the network;
• Allow access to WiFi status permission;
• Allow access to network status permissions;
• Allows permission to write to external storage; this permission is used for: (1), the software can store the content of the novel to external storage when the user is reading the content of the novel; (2), when the user modifies the avatar and uses the camera function, This software can store the photos taken to external storage;
• Allows the permission to read the external storage; this permission is used for: (1), the software can read the novel resources cached in the external storage when the user is reading the novel content; (2), the user is using the modification of the software When the avatar uses the album selection function, the software can read the album resources from the external storage of the mobile phone;
• Allow access to phone status (obtain device ID, MAC address, IMEI) permission; this permission is used for: (1) This software integrates Umeng Statistics SDK for data analysis. This SDK needs to obtain this permission for accurate data; ( 2), this software integrates Jiguang one-key login function, this function (Aurora SDK) needs to obtain this permission;
• Allow program to vibrate permission;
• Allow the system to pop up dialog boxes;
• Allow access to CellID or WiFi hotspot to obtain your rough location permission before we can obtain it, if you turn off the authorization, we cannot continue to obtain this information;
• Allow access to GPS positioning information permission, you can set permission in the mobile phone system, we can obtain it, if you turn off the authorization, we cannot continue to obtain the information;
• Allows the permission to install the App; this permission is used to download and install a new version of the software when there is a new version.
• Allows requesting access to photo and photo album permissions; this permission is used for users to use the mobile phone's photo and photo album functions normally when using the software's avatar modification function
• Allows the application process to still run after the phone is locked;
• Permission to make phone calls; this function is used for users to apply for this permission when using the 'contact customer service' function of the software, and can directly call the phone call function after authorization.
2.3 How we share, transfer and publicly disclose your personal information
2.3.1 Sharing
We attach great importance to the protection of your personal information. Your personal information is an important basis and part of the products and/or services we provide you. For your personal information, we will only use it in this "Privacy Policy". We will not share your personal information with third-party companies, organizations and individuals other than our company and its affiliates, unless there is one of the following or Various scenarios:
(1) You make your own request;
(2) Your express authorization and consent have been obtained in advance;
(3) For necessary and reasonable sharing within our company and its affiliates, you acknowledge and agree that our company's registered account information and some personal information that does not include your personal sensitive information in the relevant reading data may be associated with us Company sharing, we will strive to ensure that affiliated companies take no less than the level of security measures promised in this Privacy Policy and comply with other security protection requirements we put forward to protect the security of your personal information;
(4) Sharing with third parties in order to protect you, our other users or employees, our company or the public interest, property or safety (eg: fraud or credit risk, etc.) from damage;
(5) In some cases, only by sharing your personal information can we realize the core functions of our products and/or services or provide the services you need, or deal with disputes or disputes between you and others;
(6) Shared in accordance with the relevant agreements you signed with us (for example: online agreements, platform rules, etc.) or legal documents;
(7) In accordance with the relevant agreement between you and other third parties;
(8) Sharing based on reasonable business practices, for example: sharing information such as winnings/winners in joint marketing activities with third parties so that they can issue prizes/gifts to you in a timely manner; when we accept due diligence, etc. ;
(9) Other situations that need to be shared as required by competent authorities, litigation disputes, laws and regulations, etc.
We will only share your personal information for legitimate, legitimate, necessary, specific and explicit purposes, and only necessary personal information. When we share information with our business partners, we strictly require them to fulfill their responsibility to protect your personal information.
2.3.2 Transfer
Transfer is the process of transferring control of personal information to another company, organization or individual. In principle, we will not transfer your personal information, except in the following cases:
(1) You make your own request;
(2) Your express authorization and consent have been obtained in advance;
(3) If we conduct a merger, acquisition, reorganization, division, bankruptcy, asset transfer or similar transaction, and your personal information may be transferred as part of such transaction, we will require the new holder Continue to abide by and implement the entire contents of this "Privacy Policy" (including the purpose of use, rules of use, security protection measures, etc.), otherwise we will require it to re-obtain your express authorization;
(4) Other circumstances stipulated by laws and regulations.
If it is necessary to transfer for the above reasons, we will inform you of the purpose and type of the transferred information before the transfer (if it involves your personal sensitive information, we will also inform you of the content of the sensitive information involved) , and transfer it after obtaining your authorization and consent, unless otherwise stipulated by laws and regulations or otherwise agreed in this policy.
2.3.3 Public disclosure
Public disclosure is the act of releasing information to society or an unspecified group of people. We will not publicly disclose your personal information, except for necessary disclosures due to the need to announce penalties for illegal accounts, fraudulent acts, etc., and to desensitize and display relevant information when announcing the list of winners/winners. If there are reasonable reasons for public disclosure, we will inform you of the purpose and type of the publicly disclosed information before the public disclosure (if it involves your personal sensitive information, we will also inform you of the content of the sensitive information involved), And it will be disclosed publicly after obtaining your authorization and consent, unless otherwise stipulated by laws and regulations or otherwise stipulated in this policy.
For your personal information disclosed publicly, we will pay full attention to the risks, and prudently review its legitimacy, rationality and legitimacy as soon as we receive the application for public disclosure. Take personal information security protection measures and means no less than the level agreed in this "Privacy Policy" to protect it.
Please be aware that, even if you have obtained your authorization and consent, we will only publicly disclose your personal information for legal, legitimate, necessary, specific and clear purposes, and try our best to carry out the personal information in the publicly disclosed content. Anonymization processing.
According to laws and regulations, in the following cases, sharing, transferring and publicly disclosing your personal information does not require your prior authorization and consent:
(1) Those directly related to national security and national defense security;
(2) Directly related to public safety, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial and execution of judgments, etc.; or in accordance with the requirements of laws and regulations, the requirements of administrative organs or public prosecutors and other competent authorities;
(4) It is difficult to obtain your consent for the protection of your or other personal life, property and other major legitimate rights and interests;
(5) Personal information is disclosed to the society by you or collected from legal public channels (such as legal news reports, government information disclosure, etc.);
(6) Necessary in accordance with the signing and performance of relevant agreements or other written documents with you;
(7) Other circumstances stipulated by laws and regulations.
2.4 Third-party services
NovelVault may contain third-party SDKs or other similar applications (hereinafter collectively referred to as third-party SDKs). The third-party SDKs will directly collect and process your information (such as embedded code, plug-ins, etc. Among them, in order to realize programmatic advertisement push, we have integrated Facebook google SDK. We will not share your personal information with the aforementioned third-party SDKs, which are collected and processed by third-party SDKs Information and other behaviors abide by their own privacy terms, and do not apply to this policy. However, we will also strive to review the business access qualifications of third-party SDKs and prudently evaluate their security assurance capabilities, requiring the legal compliance of such service providers and Security..
2.5 How we use Cookies and similar technologies
Cookies are very important to improve the user experience on the Internet. Our company uses Cookies generally for the following purposes:
(1) Authentication
Cookies notify us when you access our services, allowing us to verify your account information(*) to keep your account secure. For example, Cookie technology notifies us when you are logged into NovelVault, so we can identify you as safe when you visit NovelVault's site Sign in to show you information relevant to you.
(2) Safety
Cookies help us keep our data and services secure, and troubleshoot cheating, hacking, and fraudulent practices on our products and services. For example, Cookie can store your token ticket information(*), which can be verified by the server as your own normal login at NovelVault, Through the encrypted information in the ticket information, various types of attacks are prevented, cross-site information theft is prevented, and identity masquerading is prevented.
(3) Functions and Services
Cookies help us provide users with betterGood product and service. For example, cookies can help you fill in the last login account name through the stored information when you log in, improving your operational efficiency.
(4) Efficiency
Cookies can avoid unnecessary server load, improve service efficiency and save resources. For example, Cookies help us optimize traffic routing between servers and understand how fast different users load our services, and sometimes we may use cookies to let you Loads and responds faster when using NovelVault.
2.6 Ways to use and protect information:
2.6.1 The protection of users' personal information is a basic principle of this platform, and this platform will take reasonable measures to protect users' personal information. Except as provided by laws and regulations or otherwise agreed in this agreement, this platform will not disclose or disclose users' personal information to third parties without the user's permission. This platform adopts professional encrypted storage and transmission methods for relevant information to ensure the security of users' personal information.
2.6.2 This platform will use various security technologies and procedures to establish a sound management system to protect your personal information from unauthorized access, use or disclosure. For example, https + self-developed encryption method realizes transmission encryption; uses JWT authentication (the most popular cross-domain authentication solution at present); malicious user traffic detection, suspicious user behavior Freeze the account after analysis to prevent the account from being stolen and cause losses to users; High Availability of the database (reducing the time when the system cannot provide services by design) prevents the loss of user gold coins, cash and other data, and can be backed up and restored; customers When the terminal displays the mobile phone number to the user, the middle 4 digits are hidden by adding a "*" to protect the user's mobile phone number.
2.6.3 Without your consent, our company will not share, transfer or publicly disclose your personal information to any company, organization or individual other than our company, unless otherwise stipulated by laws and regulations or in this agreement except.
2.7 Currently, NovelVault does not have personal information going abroad. If personal information needs to go abroad due to business development in the future, we will list the types of personal information going abroad in this policy item by item and mark them prominently. .
2.8 You understand and agree that if you share relevant content to third-party products/platforms by yourself, the third party will know some of your information, including account avatar, account nickname, and shared content; The information will be displayed on the products/platforms you share (including but not limited to Google, Facebook and other platforms). On this product/platform, third parties can view your information according to the settings of their respective product/platform, including account avatar, account nickname, and shared content. If you are not willing to let third parties know your information, please do not use these functions of this software; if you use these functions of this software, it is deemed that you agree to third parties to know your information.
2.9 You understand and agree that, in order to provide you with better services, this platform can associate the account's data records on the platform's official website and other clients under your NovelVault account (such as purchase records, Consumption records, bookshelf content), similarly, the platform company can also associate your aforementioned data records in NovelVault with the account on the platform’s official website and other clients.
2.10 Where and for how long we store information
2.10.1 We abide by laws and regulations, and the personal information collected and generated during operations in the People's Republic of China is stored in China, except for the following circumstances:
(1) Laws and regulations clearly stipulate;
In the above situations, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.
2.10.2 In general, we will only retain your personal information for the period necessary to achieve the purpose (not less than 6 months), unless there is a mandatory retention requirement by law. Our criteria for judging the aforementioned period include:
(1) Complete your related service purposes, maintain corresponding service and business records, and respond to your possible inquiries or complaints;
(2) Guarantee the safety and quality of our services to you;
(3) Do you agree to a longer retention time;
(4) Is there any other special agreement on the retention period.
After your personal information exceeds the retention period, we will delete or anonymize your personal information as required by applicable law.
2.10.3 Information deletion and anonymization
If NovelVault decides to stop operating, we will stop collecting your personal information after the relevant service stops operating. We will serve you a notice of cessation of operations in the form of an announcement. Your personal information already held will be deleted or anonymized.
IV. YOUR RIGHTS
1. Access your personal information
You have the right to access your personal information, subject to exceptions provided by laws and regulations. If you wish to exercise your data access rights, you can do so yourself by:
(1) Access basic information such as avatar, nickname, gender, etc.: After entering the APP, click "My", click "Avatar" to query and access information;
(2) Access account binding information: After entering the APP, click "Settings", click "Account and Security" to query and access information.
2. Correct your personal information
When you find that your personal information needs to be corrected, you can modify it by yourself through the page in "1. Access your personal information", or you can contact customer service to assist you in modifying the information.
3. Delete your personal information
You may request us to delete personal information in the following circumstances:
(1) If our handling of personal information violates laws and regulations;
(2) If we collect and use your personal information without your consent;
(3) If our handling of personal information violates our agreement with you;
(4) If you no longer use our products or services, or you cancel your account;
(5) If we no longer provide you with products or services.
When your personal information is deleted, we may not delete the corresponding personal information from the backup system immediately, but will delete the information when the backup is updated.
4. Change or withdraw your authorization scope
If you want to change or withdraw the authorization scope, including device information (such as IMEI) (*), mobile phone storage permissions (*), camera and photo album permissions (*), you can directly through the mobile phone Permission settings modify the authorization scope. You can also go to My-Settings-Privacy Settings to enter the mobile phone permission settings page to modify the authorization scope. If you withdraw a necessary authorization for a specific function in the service, you may not be able to use the specific function normally, but it will not affect your use of other functions in the service.
5. Cancellation of account
(1) After the account is cancelled, the relevant information will be emptied and cannot be retrieved, and related operations cannot be performed:
1) Unable to log in, use NovelVault account;
2) The bookshelf records in the account will be cleared;
3) The privileges in the account will be cleared;
(2) Implementation steps: Click Personal Center - Avatar - Cancellation of Account - Apply for Cancellation to apply for cancellation of personal account.
(3) In the following cases, we may not be able to respond to your request in accordance with the requirements of laws and regulations:
1) Directly related to national security and national defense security;
2) Directly related to public safety, public health, and major public interests;
3) Related to criminal investigation, prosecution, trial and execution of judgments;
4) There is sufficient evidence to show that you have subjective malice or abuse of rights;
5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
6) Involving commercial secrets.
6. Obtain a copy of your personal information
You have the right to obtain a copy of your personal information. If you need a copy of your personal information, you can contact us through the methods provided at the end of this agreement. After verifying your identity, we will provide you with a copy of your personal information in our products and services (including basic information, identity information), unless otherwise provided by laws and regulations.
7. Constraint information system automatic decision-making
In some business functions (such as sweepstakes), we may only rely on non-human automatic decision-making mechanisms including information systems, algorithms, etc. to make decisions. If these decisions significantly affect your legitimate rights and interests, you have the right to contact us through the means provided at the end of this agreement and ask us for an explanation, and we will provide appropriate remedies.
8. Respond to your above request
In order to ensure security, when responding to your above request (Items 1~7), you may need to provide a written request or prove your identity in other ways. We may verify your identity before processing your request.
We will complete the verification and processing within 15 working days. If you are not satisfied, you can also make a complaint through the "Contact Us" method at the end of this agreement.
In principle, we do not charge a fee for your reasonable request, but for repeated requests that exceed a reasonable limit, we will charge a certain cost as appropriate. For those that are unnecessarily repetitive, require excessive technical means (eg, need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (eg, involve backing up information stored on tapes). requests, we may refuse them.
In the following cases, we willUnable to respond to your request:
(1) Related to our fulfillment of obligations under laws and regulations;
(2) Those directly related to national security and national defense security;
(3) Those directly related to public safety, public health, and major public interests;
(4) Directly related to criminal investigation, prosecution, trial and enforcement of judgments;
(5) We have sufficient evidence to show that your request is subjectively malicious or abuse of rights;
(6) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
(7) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(8) Involving commercial secrets.
9.Complaint management
We provide you with a variety of complaint and feedback channels. For details, please refer to the content of "Contact Us" at the end of this agreement. You can contact us through customer service QQ, telephone and email. After verifying your identity, we will complete the verification and process your complaint within 15 working days.
V. Notification and Delivery
All notices under this agreement can be delivered by means of announcements on important pages, emails, text messages or regular mail; such notices are deemed to have been delivered to the recipient on the date of sending.
Six. Others
1. Your use of this software means that you have read and agreed to be bound by this agreement. This platform will modify the terms of this agreement when necessary. You can check the relevant terms of the agreement in the latest version of the software, and this platform will also publicize it in a prominent place in the software. After the terms of this agreement are changed, if you continue to use the software, it is deemed that you have accepted the revised agreement; if the purpose, method and scope of the collection and use of your personal information are changed, we will prompt you to read in an appropriate manner , and re-acquire your authorization. If you do not accept the revised agreement, you should stop using the software.
2. This agreement is signed in Beijing, People's Republic of China.
3. The establishment, entry into force, performance, interpretation and dispute resolution of this agreement shall be governed by the laws of the mainland of the People's Republic of China (excluding conflict of laws).
4. If there is any dispute or dispute between you and this platform, it should be settled through friendly negotiation first; if the negotiation fails, you agree to submit the dispute or dispute to the jurisdiction of the people's court with jurisdiction in the place where this agreement is signed /strong>.
5. The titles of all clauses in this agreement are for reading convenience only, have no actual meaning in themselves, and cannot be used as the basis for the interpretation of the meaning of this agreement.
6. For whatever reason, the terms of this agreement are partially invalid or unenforceable, and the remaining terms are still valid and binding on both parties. (End of text)