Updated: March 15, 2023 Effective date: March 15, 2023 Welcome to use the "Linknews" software and related services! The software service for Linknews is developed and released by the company (hereinafter referred to as "us" or "the company"). Protecting user personal information is a basic principle of the company. The company collects and uses personal information in accordance with laws and regulations, and adheres to the principles of legality, legitimacy and necessity in the collection and use of personal information. Before using the "Linknews" software and related services, please read and understand this privacy policy carefully. The company will use your mobile phone and relevant information. Once you choose to use the "Linknews" software and related services, you agree that the company collects, protects, uses, shares, discloses and protects your information in accordance with this privacy policy. If you are under 18, please read and fully understand this privacy policy with the guardian's company, and use our services or provide us with information with the consent of your guardian. Please read carefully and choose to accept or not accept this privacy policy. We have already prompted you in bold form for important contents such as the terms and conditions on your personal information rights and interests. Please pay special attention to it. If you do not agree with this privacy policy, we cannot provide you with complete products and services, and you may choose to stop using it. When you choose to continue or reuse, you will be deemed to accept and accept our processing of your relevant information in accordance with this policy, based on the necessity of providing products and services. Children's Privacy These Services do not address anyone under the age of 13. We do not knowingly collect personally identifiable information from children under 13. In the case we discover that a child under 13 has provided us with personal information, we immediately delete this from our servers. If you are a parent or guardian and you are aware that your child has provided us with personal information, please contact us so that we will be able to do necessary actions. This privacy policy will help you understand: ·We will collect and use your information in accordance with the privacy policy, but will not collect personal information in a package of mandatory bundling only because you agree to this privacy policy. ·When you use or turn on the relevant functions or services, we will collect and use relevant information necessary for the realization of the functions and services. You may refuse to provide and do not affect other functions or services unless necessary information is necessary to achieve basic business functions or requirements of laws and regulations. We will provide information in the privacy policy that is necessary item by item. ·If you do not log in to the account, we will guarantee the basic functions through the identifier information corresponding to the device. If you log in to the account, we will push the information according to the account information. ·The exact geographic location and album permissions will not be opened by default. Only with your express authorization can they be used in order to realize specific functions or services, and you can also withdraw the authorization. It is particularly important to note that even if we have obtained these sensitive permissions with your authorization, we will not collect your information when the relevant functions or services do not need to. ·This privacy policy is applicable to your access to and use our products and services through the synthetic Fruit application, the SDK and the application programming interface (API) for the use of the composite giant Fruit application, for the use of third-party websites and applications. The following will help you to learn more about our collection principles, how to collect, use, store, transfer, share, transfer (if applicable) and protect personal information. Among them, we have used bold form to prompt important contents about your personal information rights and interests. Please pay special attention to it. 1. Principles and purposes of information collection 2. How do we collect and use personal information 3. How do we share, transfer and disclose personal information publicly 4. How do we store personal information 5. How do we protect personal information 6. Some permission instructions for Linknews 7. Access privacy policy 8. Stop operating and inform you 9. Minors terms of use 10. Amendment and notification of privacy policy 11. Contact us 1. Principles and purposes of information collection In the process of using "Linknews" and service, we will collect information according to the legal, legitimate and necessary principles. The information we collect or you provide will be used to: 1. Ensure the normal basic operation of the products; 2. Realize all functions and services; 3. Optimize and improve products and services; 4. Ensure the safety of products, services and users; 5. Follow the laws and regulations and the national standards. 2. How do we collect and use personal information We will collect information you actively provide when using the service and collect information generated by you in the process of using the function or receiving the service by means of automation: 2.1 registration, login and authentication 2.1.1 registration and login You can log in and use a third-party account. You will authorize us to obtain the public information (head image, nickname and other information authorized by you) registered on the third party platform, which is used to bind with the composite giant Fruit account, so that you can log in directly and use this product and related services. 2.1.2 certification When you use the authentication function or service, according to the relevant laws and regulations, you may need to provide your real identity information (real name, ID number, phone number) to complete the real name verification. This information is personal sensitive and you may refuse to provide it, but you may not be able to access the relevant services, but will not affect the normal use of other functions and services. 2.2 safe operation 2.2.1 safety protection function We are committed to providing you with a safe and reliable product and use environment. Providing high quality and reliable services is our core goal. The information collected in order to realize the security function is necessary information. 2.2.2 equipment information and log information a. In order to ensure the safe operation of software and services, we will collect your hardware model, operating system version number, international mobile device identification code, unique device identifier, network device hardware address, IP address, WLAN access point, Bluetooth, base station, software version number, network access mode, type, status, network quality data, operation, use and service log. b. To prevent malicious programs and safe operations, we may collect the installed application information or running process information, the overall operation of the application, usage and frequency, application crash, overall installation usage, performance data, application source. c. We may use your account information, equipment information, service log information and information that our affiliated companies and partners can share in obtaining your authorization or can be shared according to law, so as to judge account security, conduct authentication, detection and prevention of security events. 2.3 sessions and available data "Sessions and available data" is about the information you provide us about the use of applications and services, including, but not limited to, the data information you use for connections and services that you generate using applications and services. Sessions and available data include information related to connection requests, server communications, and data sharing, including network tests, quality of service, date, time, and geographic location. We can also concentrate on sessions and available data. Note that sessions and available data do not include any personal information, nor what you can send or share by using applications such as photos, contacts, schedules, etc., or services. 2.4 changes in the purpose of collecting and using personal information Please understand that with the development of our business, the functions and services provided by "Linknews" may be adjusted and changed. In principle, when a new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In the case of no direct or reasonable association with the original processing purpose, we will collect and use your personal information and will inform you again and obtain your consent. 2.5 personal information that is exempted from the law and approved to be collected and used Please understand that in the following cases, we do not need your authorization to collect and use your personal information in accordance with laws and regulations and relevant national standards: a. Directly related to national security and national defense security; b. Directly related to public safety, public health and major public interests; c. Directly related to criminal investigation, prosecution, trial and execution of judgment; d. It is difficult to get my consent for safeguarding the vital legal rights and interests of the personal information subject or other individuals' life and property; e. Your personal information collected is disclosed to the public by yourself; f. The channels for collecting your personal information from the legally disclosed information, such as legal news reports, government information disclosure, etc; g. Necessary for signing or performing the contract in accordance with your requirements; h. Necessary for maintaining the safe and stable operation of software and related services, such as the detection and disposal of software and related service failures; i. Necessary for legal news coverage; j. When the academic research institutions carry out statistics or academic research institutes based on public interests and provide the results of academic research or description to the outside world, they shall de identify the personal information contained in the results; k. Other circumstances as stipulated by laws and regulations. Please note that if information cannot be identified as your personal identity alone or in combination with other information, it is not your personal information in legal sense; when your information can be recognized by yourself or in combination with other information or when data that we will not be able to establish contact with any specific personal information is used with other personal information of you, such information is used in combination with other personal information During the combined use, it will be treated and protected as your personal information in accordance with this privacy policy. 3. How do we share, transfer and disclose personal information publicly 3.1 sharing 3.1.1 sharing principle a. Authorization consent principle: sharing your personal information to our related parties and third parties shall be approved by your authorization, unless the shared personal information is the information after de identification processing, and the natural person who shares the third party cannot recognize the natural person subject of such information. If the purpose of using information by related parties and third parties exceeds the original authorization consent, they need to obtain your consent again. b. Principle of legality and minimum necessity: data shared to related parties and third parties must have legitimate and legitimate purposes, and the shared data shall be limited to the necessity of achieving the purpose. c. Safety prudence principle: we will carefully evaluate the purpose of data sharing of related parties and third parties, comprehensively evaluate the safety and security capability of these partners and require them to comply with the cooperative legal agreement. We will strictly monitor the software tool development package (SDK) and application interface (API) for the partners to obtain information to protect the data security. 3.1.2 realize the shared information of functions or services When you use the functions provided by our related parties and third parties in the Linknews, or when the software service provider, intelligent equipment provider, system service provider and we jointly provide services to you, we will share the demarcated personal information with these related parties and third parties, conduct comprehensive statistics and make the information of interest analysis through the algorithm for characteristics and preferences analysis . 3.1.3 realize the sharing information related to advertising A. advertising push: we may share information with partners who have commissioned us to promote and advertising, but we will not share information (name, ID number) used to identify your personal identity, only to provide these partners with the unrecognized identifier and identification or anonymity information to help them not identify your personal identity. On the premise of improving the effective reach rate of advertising. b. Advertising statistics: we may share statistical information of analysis and deidentification with service providers, suppliers and other partners of the business. It is difficult to associate with your identity information, which will help us analyze and measure the effectiveness of advertising and related services. 3.1.4 realize the sharing information of safety and analysis statistics a. Security of use: we attach great importance to the security of account and service. In order to protect the account and property of you and other users and protect your and our legitimate rights and interests from illegal infringement, we and related companies or service providers may share necessary equipment, account number and log information. b. Analyze product usage: in order to analyze the use of our services and improve the user experience, it may share statistical data of product usage (crash, flash back) with related parties or third parties. These data are difficult to identify your personal status in combination with other information. 3.1.5 terms of third party SDK Third party SDK service provider: our products may contain third-party SDK or other similar applications. If you use such services on our platform, you agree that your information will be collected and processed directly by it These embedded third-party services may collect personal information from your end-users, and such third-party services are operated by the corresponding third party. The above-mentioned service provider collects and processes information in accordance with its own privacy terms, rather than applicable to this policy. In order to protect your legal rights and interests, if you find that there is a risk in such SDK or other similar applications, it is recommended that you immediately terminate the relevant operation and contact us in a timely manner. 3.2 transfer a. We will not transfer your personal information to any other third party unless you have your express consent. b. As our business continues to develop, we will be able to merge, acquire, transfer assets, and your personal information may be transferred accordingly. In case of any change mentioned above, we will protect your personal information according to laws and regulations and the security standards set forth in this privacy policy. Otherwise, we will ask the successor to obtain your authorization again. 3.3 disclosure a. We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. Our public disclosure of your personal information will be in line with industry standards of security measures b. We will disclose the information of the relevant account when we announce the punishment of illegal account and fraud. c. We will publicly disclose the information related to the event after the public welfare projects such as "person hunting" and "pursuit" are in accordance with the provisions of laws and regulations and clearly authorized. When the incident is over, we will promptly delete the disclosed personal sensitive information. 3.4 exemption from personal information that can be shared, transferred or disclosed in accordance with the law Please understand that under the following circumstances, in accordance with laws, regulations and national standards, we do not need your authorization to share, transfer and publicly disclose your personal information: a. Directly related to national security and national defense security; b. Directly related to public safety, public health and major public interests; c. Directly related to criminal investigation, prosecution, trial and execution of judgment, etc; d. In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to get my consent; e. Personal information that you disclose to the public on your own; f. Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels. 4. How do we store personal information 4.1 storage location In accordance with laws and regulations, we will store your personal information collected and generated in the process of domestic operation in the people's Republic of China. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow the relevant national regulations or seek your consent. 4.2 storage period We only keep your personal information for the shortest period necessary for the purpose of providing "Linknews" and services. After the necessary period, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations. 5. How do we protect the security of personal information a. We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information, so as to prevent your personal information from being improperly used or being accessed, publicly disclosed, used, modified, damaged, lost or leaked without authorization. b. We will protect your personal information by using encryption technology, anonymous processing and relevant reasonable and feasible means that are not inferior to those in the industry, and use security protection mechanism to prevent your personal information from being attacked maliciously. c. We will establish a special security department, security management system and data security process to ensure your personal information security. We adopt strict data use and access system to ensure that only authorized personnel can access your personal information, and timely conduct security audit on data and technology. d. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to the limitations of technology and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen the security measures, it is impossible to always guarantee the 100% security of information. We will try our best to ensure that the personal information you provide to us Information security. e. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take positive measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and relevant personal information to others. f. We will formulate an emergency plan, and immediately start the emergency plan in case of user information security incidents, and strive to prevent the expansion of the impact and consequences of these security incidents. Once a user information security incident (leakage, loss) occurs, we will timely inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can prevent and reduce the risk on your own, and the remedial measures for you in accordance with the requirements of laws and regulations. We will timely inform you of the relevant information of the event in the form of push notice, email, letter, SMS and other relevant forms. If it is difficult to inform you one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will report the disposal of user information security incidents in accordance with the requirements of relevant regulatory authorities. g. Once you leave the "Linknews" and related services, browse or use other websites, services and content resources, we will not have the ability and direct obligation to protect any personal information submitted by your software or website other than the Linknews and related services, regardless of whether you login, browse or use the above software or website based on the link or guidance of "Linknews". 6. Description of some permissions used by Linknews a. Geographic location information This software will not obtain and save the user's location information for any malicious purpose. We use these permissions to provide better service, which helps to improve the user experience. Our users will never upload any location information. b. Internet access Access to the Internet. Linknews will use the network to perform some functions, including virus database update, garbage cache database, receiving version update information, etc. c. Read and modify the content permission of storage device Linknews uses this permission to view and operate files stored on the device. We promise that we will only read the file name and file size to display to users for downloading and installing app and downloading and viewing related files. Will never save, upload any file content, and will never disclose your privacy to anyone or third party interest information. d. Notification bar permissions This permission is only used to boot the user when the notification management feature is used for the first time. e. Access to mobile phone status This permission allows us to identify your mobile device. Linknews will use this permission to bind important data in the user's application with the device to prevent data loss. f. Permission to track the source of user installation This permission can be used to determine the channel from which the user installed the Linknews. 7. Access privacy policy a. You can view all the contents of this privacy policy when you visit the app welcome page for the first time. You can also view all the contents of this Privacy Policy in settings privacy policy. b. Please understand that the "Linknews" and related services described in this privacy policy may vary according to your mobile phone model, system version, software application version, mobile client and other factors. The final products and services are subject to the "Linknews" software and related services you use. 8. Stop operation to inform you If we stop operation, we will stop the activities of collecting your personal information in time, notify you of the notice of stopping operation in the form of one by one delivery or announcement, and delete or anonymize your personal information. 9. Minor clause a. If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using "Linknews" and related services. b. We protect the personal information of minors in accordance with the relevant national laws and regulations. We will only collect, use, store, share, transfer or disclose the personal information of minors when it is permitted by law, explicitly agreed by parents or other guardians, or necessary for the protection of minors. If we find that we have collected the personal information of minors without the prior consent of verifiable parents Minors' personal information will be deleted as soon as possible. c. If you are the guardian of a minor, if you have any questions about the personal information of the minor, please contact us through the contact information publicized in this privacy policy. d. For the personal information of children under the age of 14 that may be involved, we further take the following measures to protect it: for the collected personal information of children, in addition to complying with the agreement on user's personal information in this privacy policy, we will also adhere to the principles of legitimate necessity, informed consent, clear purpose, security and legal use, and strictly follow the "children's personal information network" We will delete or anonymize children's personal information when it is due. 10. Revision and notification of privacy policy a. In order to provide you with better services, Linknews and related services will be updated and changed from time to time. We will revise this privacy policy from time to time. These amendments form a part of this Privacy Policy and have the same effect as this privacy policy. Without your explicit consent, we will not reduce your rights under the current privacy policy. b. After this privacy policy is updated, we will issue an updated version to Linknews, and remind you of the updated content in an appropriate way before the updated terms come into effect, so that you can keep abreast of the latest version of this privacy policy. If you continue to use our services, you agree to accept and be bound by the revised policy. 11. Contact us If you have any complaints, suggestions or questions about personal information protection, you can contact us. Email:motian2023@gmail.com.We will give you feedback as soon as possible within 3 working days after checking and verifying your user identity.