netease yidun privacy policy-博天堂国际

effective date: march 3, 2023

special notes:

welcome to use the products and/or services (hereinafter collectively referred to as “yidun services”) provided by hangzhou netease zhiqi technology co., ltd. and its affiliates (hereinafter collectively referred to as “we” or “netease yidun”). we always attach great importance to the protection of personal information. when you use yidun services, you, as our customer, we may collect and use your personal information. at the same time, you, as the data controller, decide the purpose and method of processing personal information of the end users of your products and/or services (hereinafter referred to as the “end users”) the purpose and method of processing personal information.we may act as a data processor in the process of providing you with yidun services, accept your entrustment and collect and use the relevant personal information of the end users according to your instructions . we hope that through this "netease yidun privacy

policy (hereinafter referred to as the “policy”) to clearly introduce how we handle your and end users’ personal information, so as to better protect your and end users’ rights.

this policy applies to all yidun services, including but not limited to the websites, sdks, apis, plug-ins, components, codes, tools, products and services that we provide. therefore, before using the yidun sservices, please be sure to carefully read and thoroughly understand this policy., eespecially for the bold and underline terms marked in bold and underlined,. yyou should focus on reading and use our related products and/or services after confirming that you fully understand and agree to themit. before end users use your products and/or services, you must formulate and publish your privacy policy documents, which shall contain the processing rules of this policy regarding the personal information of end users and of which the personal information protection standards should not lower than that of this policy, and obtain your end users’ consent so that we have the right to collect and use their personal information to provide corresponding services. the policy document shall contain the processing rules of this policy regarding the personal information of end users and the personal information protection standards should not lower than this policy.

if you disagree with any content of this policy or your end user disagrees with our collection and use of their personal information to provide corresponding services in accordance with this policy, you shallould immediately stop using yidun services. your use or continued use of yidun services means that you agree and will ensure that the end user fully understands and agrees thatwhat we collect, use, store, share, transfer and disclose your and end user’s personal information in accordance with this policy (including updated versions).if you do not obtain the consent of the end user in advance, the related liabilities responsibilities will be entirely borne by you.

it should be specially noted that in terms of the processing of your personal information, the “netease group privacy policy” and this policy are both binding uponeffective for you. if this policy is inconsistent with the “netease group privacy policy”, this policy shall prevailbe applied first. any itemsif it is not mentioned in this policy shall be governed by , the provisions of the “netease group privacy policy” shall prevail.

after reading this policy, if you and the end user have any questions about this policy , you can contact us through the feedback channels listed in “how to contact us” section of this policy , and we will answer it as soon as possible.

this policy will help you understand the following:

i. how we collect and use personal information ofabout you and end users ii. authorization and use of the personal information of end users

iii. how do will we share, transfer, and publicly disclose personal information about you and end users

iv. how do will we store the personal information of you and the end user

v. how to protect the personal information of you and the end user

vi. how do will we manage the personal information of you and end users

vii. how dowill we deal with the information of minors

viii. amendments and notifications

ix. how to contact us

i. how we collect and use personal information about you and end users

we will, in accordance with relevant laws and regulations, follow the principles of fairness, lawfulness, and necessity, and for the purposes described in this policy, collect and use the personal information that you proactively provide during the use of the yidun service, and those generated by your use of the yidun service and . personal information of you and/or end users generated by your end users’ useing your products and/or services.

please understand that due to changes in business strategies and related requirements of laws and regulations, the business functions of yidun services may also undergo changes and developments. if we want to use your and/or end-user’s personal information for other purposes not specified in this policy or collect additional personal information not mentioned, we will obtain your consent separately collect additional information through page prompts, interactive processes, website announcements or other methods to get your consent. during this process, you can contact us through the feedback channels listed in “how to contact us” section of this policy , and we will answer as soon as possible.

1. your personal information as our customer

1.1 in order to complete the necessary activities such as the registration, login, management and real-name authentication of the yidun service account, you need to submit true, legal and valid information. the information you may need to submit includes: your basic account information , including user name ,mobile phone number , email address , account password,your identity information , including your name ,id number , front and back photos of your id card , including your personal image of ahand-held id card photo containing your personal image ; your product information, including your product name, industry classification ;your contact information, including contact name , contact phone number and qq number ; your corporate information: including company name,unified society credit code , front and back photos of the legal representative’s id card.

in order to achieve the purpose of real-name authentication, you agree and authorize us to provide, inquire, and verify your aforementioned information to relevant identity authentication agencies (such as credit reporting agencies, government departments, etc.) either by ourselves or by entrusting a third party.

1.2 in order to ensure the normal operation of yidun services, protect your or a third party’s personal and property safety from infringement, and better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and more accurately identify violations of laws and regulations or relevant protocol rules of yidun services, we will record and save the details of your login and use of yidun services during your use of yidun services and save them as web logs , including internet protocol (ip) address , internet service provider (isp) ,browser type , access date and time , software and hardware characteristics information, and web browsing records.

we collect this information to provide you with better services. in order to achieve this purpose, we will also use your information for the following purposes: (1) contact you to solve problems; (2) improve the quality of our services; (3) ) other uses permitted by you.

2. personal information of your end users

based on your entrustment and instructions, we may need to collect and use the relevant personal information of your end users in order to realize the basic business functions of the yidun service. yidun services include but are not limited to content security, business security services, mobile security services, and public opinion monitoring services. please note that only some yidun services need to collect and use the personal information of the end user and the personal information of the end user we collect will be different depending on the yidun service you choose. the following will list in detail the basic business functions of the yidun service to collect and use end-user personal information and the types of information necessary to realize this function. the collection and use of such personal information requires you to obtain the end user’s consent.

2.1 yidun content security service

yidun content security services, are based on our years content security protection experience, to provide you with efficient and low-cost content security solutions, including audio detection services, video detection services, document detection services, audio and video detection services, converged media detection services, and websites content detection inspection service, text detection inspection service, image detectioninspection service.

2.1.1 in audio detection, video detection, document detection, audio and video detection, converged media detection and website content detection services, we will detect whether the content you submit is illegal or not and identify the publisher of the relevant content to help you efficiently filter the content of pornography , gambling, violence, etc. in order to achieve the above-mentioned service purposes, you need to submit corresponding inspection information to be detected to us, including: audio , video , document and other content information released by end users , user account and ip address information of end user . we will only detect inspect the specified content according to the inspection information you submit, and will not actively collect and use any personal information of the end user.

2.1.2 in the text detection and image detection services, we will detect pornography, violent terrorism and other illegal information and your personalized content and identify the publisher of the relevant content to help you efficiently filter and delete the relevant information. to achieve the above purpose of the service, you need to submit the appropriate submission of information to be detected to us, including: end-users text , picture and end user account information (account , phone number , nickname , gender , user rating , registration time , the number of friends , fans nnumber , friend relationship ), device information (device id , id type , device mac address,

international mobile device identification code , idfv) , log information (app version , recipient id , sender/receiver , group chat id , room id , post id , main comment id ,commodity id , ip address) . we will only inspect the specified content according to the inspection information you submit, and will not actively collect and use any personal information of the end user.

2.2 yidun business security service

yidun business security services, are based on our rich big data and artificial intelligence technology, to ensure business security from the source, and solve business security problems intelligently and efficiently for you, including behavioral verification code services, sms verification codes and number verification services, and real person verification services , marketing anti-cheating service, registration and login protection service, device fingerprint service.

2.2.1 in behavioral verification code services, marketing anti-cheating services, registration protection services, login protection services, and device fingerprint services, we need to accurately identify devices and user operations and perform corresponding analysis and judgments. in order to achieve the above service purposes, we need to obtain the end user’s device information , log information, and application information.

  1. the device information including a device unique identifier ( device serial number , the imei , the mac address , android id , meid, idfv, idfa ), equipment brand , device name , device type and device type of system , detailed setting and version information . therefore, wwe also need to obtain the end user’s device information related permissions.
  2. log information , including 1) network related information : device ip address , router identification ( bssid , ssid , mac ) and ip address , network operator information , network connection status; 2) operational information : end user power on, click behavior, installation behavior and sensor information. we also need to obtain the location permission of the end user (the ios system needs to obtain the location permission to obtain wifi information ).
  3. application information . we will collect the bundle id of the ios application you developed and/or the application package name , application name and version number , and application signature information of the android application you developed on the end user’s device.

2.2.2 in the sms verification code service, we need to send sms to the end user. in order to achieve the above service purposes,we will collect and use the end user’s mobile phone number.

2.2.3 in the number authentication service (including one-key login service and number authentication service), we will integrate the corresponding third-party service functions of china mobile, telecom, and china unicom. the third party will directly collect and use the personal information of the end user. the user needs to click to agree to the above-mentioned third-party privacy documents, and they will be directly responsible to you and the end user. we do not collect any personal information of end users.

2.2.4 in the real person information authentication service (including id card authentication, real person authentication, live detection, face comparison, face detection, id card ocr recognition, bank card three/four element recognition, phone number three element recognition service ), we need to check whether the person, id,phone number, and bank card number are consistent with each othersame. in order to achieve the above service purposes, we will collect and use different personal information according to the type of service you choose, as follows:

2.2.4.1 id card authentication service: we will collect and use the end user’s name , id number , and front and back photos of the id;

2.2.4.2 real person authentication service: we will collect and use the end user’s name , id number , and face image information;

2.2.4.3 living body detection service, face detection service, face retrieval service, face comparison service: we will collect and use the end user’s facial recognition information (static and/or dynamic) , as well as obtain the end user’s device camera permissions;

2.2.4.4 id card ocr service: we will collect and use the front and back photos of your id card, and identify the end user’s face image , gender , age , address , birthday , ethnicity , id card validity period , card issuing authority information from it;

2.2.4.5 phone number two-element/three-element identification service: we will collect and use the end user’s name, mobile phone number , and id number (only the three elements of phone number are required);

2.2.4.6 bank card three/four elements recognition service: we will collect and use the end user’s name , id number , bank card number , and phone number (only required by the bank’s four elements).

in order to realize the services described in article 2.2.4, you agree that we will provide the end-user personal information described in this aarticle to third parties, and we will evaluate the legality, legitimacy, and necessity of such personal information collectioned by such third-party services. these third parties will be required by us to take protective measures technology for your personal information and strictly abde by relevant laws, regulations and regulatory requirements.

2.3 yidun mobile security service

yidun mobile security services provide one-stop security solutions for mobile applications to ensure your application code securiy, data security and operational security, including anti-plug services, android and ios application reinforcement services, sdk reinforcement services, and security component services.

in the anti-plug-in service, we need to detect whether the equipment, end user operation, and network environment are abnormal. in order to achieve the above service purposes, we need to collect the end user’s device information , log information , and application information.

(1) the device information including a device unique identifier ( device serial number , the imei , the mac address , android id , meid, idfv, idfa ), deviceequipment brand , device name , device type and device type of system , detailed setting and version information . we also need to obtain the end user’s device information related permissions.** .

(2) log information , we need to obtain the log information of the end user, including 1) network related information : device ip address , router identification ( bssid , ssid , mac ) and ip address , network operator information , network connection status ; 2) operational information : end-user startup , click , and installation behavior information . we also need to obtain the location permission of the end user (the ios system needs to obtain the location permission to obtain wifi information).

(3) application information . we will collect the bundle id of the ios application you developed and/or the application package name , application name , version number , and application signature information of the android application you developed on the end user’s device.

in the application hardening services, in order to resist multiple decompilation and reverse tools to prevent your sdk from being cracked and plagiarized, we will collect end user’s device information and application information for analyzing the risks mentioned above, but such information will not be transferred and will be for local use only.

(1) device information includes operating system version number, cpu architecture, and operating system setting information.

(2) application information. we will collect current package name and signature of the application developed by you from the devices of end users.

3.please note that separate device information and service log information are information that cannot identify the identity of a specific natural person.

if we combine this type of non-personal information with other information to identify a specific natural person, or combine it with personal information, during the combined use period, this type of non-personal information will be treated as personal information, unless obtained your authorization is obtained or otherwise provided by laws and regulations, we will anonymize and de-identify this type of information.

4. exceptions for obtaining authorization and consent

according to relevant laws and regulations, the collection of information about you and end users in the following situations does not require your consent:

(1) it is directly related to national security and national defense security;

(2) it is directly related to public safety, public health, and major public interests;

(3) directly related to criminal investigation, prosecution, trial, and execution of judgments;

(4) in order to protect the life, property and other major legal rights of you, the end user or other individuals, but it is difficult to obtain the consent of the person;

(5) the personal information collected is disclosed to the public by you and the end user

at your own discretion;

(6) it is nnecessary forto signing and performing the contract according to your requirements, but only if you have obtained the end user’s consent;

(7) collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

(8) it is nnecessary forto maintaining the safe and stable operation of yidun services, such as discovering and disposing of product and/or service failures;

(9) it is nnecessary forto carrying out legal news reports;

(10) when it is necessary forto conducting statistical or academic research in public interest, and when the results of academic research or description are provided to the outside, the information contained in the results is de-identified;

(11) other circumstances stipulated by laws and regulations.

ii. authorization and use of personal information of end users

as the end user’s personal information controller, we accept your entrustment and provide you with data processing services according to your instructions, but we cannot control how the end user’s personal information is used. you should collect, use, and authorize us to collect and use your end user’s personal information in a manner that complies with applicable laws and ethical obligations.

if you accept this policy and use yidun services in your products and/or services, you need to ensure that you have complied with and will continue to comply with applicable laws, regulations and regulatory requirements and the provisions of this policy, including but not limited to:

  1. will comply with all applicable laws, regulations and regulatory requirements related to the collection of information from end users;

  2. mustit is necessary to disclose to the end users that your our products and/or services have used yidun services, as well as the rules on how we collect and use end users’ personal information, and obtain the end users’ full, necessary and clear authorization and consent that , allowing us to comply with under the premise of relevant laws and regulations, the collected information can be allowed to be used for the service purposes listed in this policy by us provided that relevant laws and regulations are complied with. in order to fulfill the above obligations, you should formulate and publish privacy policy documents of which the personal information protection standard is that are not lower than that the personal information protection standards stipulated in this policy. we also strongly recommend that you embed a link of to this policy in your privacy policy documents and add similar clauses: "our products and/or services may include third-party products and/or services, and may also collect and use your personal information. for example, in order to realize the service integration of netease yidun sdk, netease yidun will act as a data processor collect and process your data in accordance with ourthe company’s instructions. netease yidun will follow the “netease yidun privacy policy” (attached link) collect, use and protect your personal information ";

  3. end users have been provided with easy-to-operate rights realization and information management mechanisms, explaning how users exercise their right of choice, how to access, correct their personal information, exercise their right to delete,and change the scope of their authorization and consent.

if you cannot meet the foregoing conditions or your end user disagrees with netease yidun’s collection and use of personal information in accordance with this policy, you should not continue to use yidun’s services; your continued use shall be deemed that you have agreed and to have been agreed and given to netease. we guaranteed to us that all your end users have agreed that we have the right to collect and use their personal information to provide corresponding services. in any case, if you fail to obtain the consent of the end user in advance so that we have the right to collect and use their personal information to provide services, all liabilitiesresponsibilities incurred thereby shall be borne by you. if any loss is caused to us, you shall be compensated us in full.

iii. how willdo we share, transfer, and publicly disclose personal information about you and end users

1. sharing

we will share your personal information in accordance with the “netease group privacy policy”. except for the following circumstances,

we will not share your end user’s personal information with any third party:

  1. obtain your consent or you entrust us to transfer the personal information of the end user to a third party designated by you, provided that you have obtained the end user’s consent;
  2. according to laws and regulations, mandatory administrative law enforcement or judicial requirements;
  3. only when you share the information of your end users can you provide services be provided or to deal with disputes or disputes between your end users and others. we will sign strict confidentiality agreements with shared partners, requiring them to process and use data in accordance with this policy and by adopting strict data security measurestechnology.

2. transfer

we will only transfer the personal information of you or the end user in the following situations:

  1. obtain your consent or you entrust us to transfer the personal information of the end user to a third party designated by you, provided that you have obtained the end user’s consent;
  2. with the continuous development of our business, we may conduct mergers, acquisitions, asset transfers or similar transactions, and personal information of you and end users may be transferred as part of such transactions. we will require new companies and organizations that hold the personal information of you and end users to continue to be bound by this policy. otherwise, we will require the companies and organizations to re-seek authorization and consent.

3. public disclosure

we will only publicly disclose the personal information of you or the end user in the following circumstances:

  1. obtain your consent or you entrust us to disclose the personal information of the end user, but the premise is that you have obtained the end user’s consent;
  2. in cases where relevant information must be provided in accordance with laws and regulations, mandatory administrative law enforcement or judicial requirements, we may disclose your or the end user’s personal information based on the required information type and disclosure method.

iv. how willdo we store the personal information of you and the end user

1. storage time limit

unless otherwise stipulated by laws and regulations, regulatory authorities or you and us, we will only store your and end users’ personal information for the period necessary for the purposes described in this policy and within the shortest time limit. if we terminate the service or operation, we will promptly stop the activities of continuing to collect personal information, and at the same time, we will comply with relevant laws and regulations to notify you in advance, and delete or anonymize the relevant personal information after terminating the service or operation, except as otherwise. except the law specified by laws and regulations or regulatory authorities.

2. storage area

in principle, we only store personal information about you and end users in china. however, in the following circumstances, we may provide personal information about you and end users outside china, or store personal information about you and end users outside china:

  1. there are clear provisions in laws and regulations;
  2. obtain your consent, but only if you ensure that you have obtained the end user’s consent.

we ask you to pay special attention: different countries or regions have their own regulatory requirements for the collection, storage, use, and sharing of personal information. you should actively comply with the laws, regulations and regulatory requirements of each country or region . in order to prevent you from violating local regulatory requirements due to your ignorance of the laws and regulations related to the protection of personal information in the country or region where your end user is located, we strongly recommend that you only use yidun services within china. if you apply the yidun service outside of china, you should follow the

local legal requirements for cross-border transfer of personal information to ensure that the storage of personal information in china meets local regulatory requirements . in particular, when cross-border transfers involve russia, india, euthe europe, the united states and other countries or regions, please pay attention to the personal information regulatory requirements of these countries and regions . you agree that the risks and liabilitiesresponsibilities arising from cross-border transmission will be borne by you. if any form of loss occurs to us, you are responsible for giving us full compensation.

v. how willdo we protect the personal information of you and end users

we attach great importance to information security, set up a dedicated security team, and take all reasonable and feasible measurestechnology to protect the personal information of you and end users:

  1. we will adopt security technology measures that comply with industry standards, including encryption and other technologies to encrypt and store your and end users’ personal information, and isolate them through isolation technology to prevent your and end users’ personal information from being unauthorized access, use and modification to avoid data damage or loss.

  2. we have an industry-advanced data security management system centered on personal information and around the data life cycle, which improves the security of the entire system in multiple dimensions from organizational construction, system design, and personnel management. we manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

  3. we only allow those who need to know this information to access the personal information of you and the end user, and set up strict access control and monitoring mechanisms for this purpose. we also require all personnel who may have access to the personal information of you and end users to fulfill the corresponding confidentiality obligations.

  4. we attach importance to information security compliance work, and have passed many international and domestic security certifications, such as iso27001 information security management system certification, information system security level protection certification, etc., to fully protect your and end users’ information with industry-leading solutions.

  5. in order to deal with the possible risks of personal information leakage, damage and loss, we have formulated a number of systems to clarify the classification and classification standards of security incidents and security vulnerabilities and the corresponding processing procedures. we have also established an emergency response team for security incidents, in accordance with the requirements of the security incident handling regulations, launching safety plans for different security incidents, stopping losses, analyzing, positioning, formulating remedial technology, and tracing and combating with relevant departments.

please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measurestechnology, we cannot always guarantee 100% security of information. in the event of a security incident such as the leakage of personal information, we will initiate an emergency plan to prevent the expansion of the security incident, report it in time in accordance with the “national cybersecurity incident emergency plan” and other relevant regulations, and notify you of the relevant situation in the form of emails, push notifications, announcements, etc. , and give you safety advice.

you need to understand that the system and communication network you use for yidun service may occurcause problems matters due to circumstances beyond our control. in order to more effectively protect the information security of you and end users, we also hope that you can strengthen self-protection. if your physical, technical, or management protection facilities are damaged, resulting in unauthorized access to your and end users’ personal information , public disclosure, tampering, or destruction, the risks and responsibilities arising therefrom will be borne by you, and we will not be liable for this.

vi. how to manage the personal information of you and the end user

1. manage your personal information

(1) access, update and delete

we encourage you to update and modify your personal information to make it more accurate and effective. we will adopt appropriate technology or provide contact channels for submitting applications to ensure that you can access, update and delete your personal information as much as possible.

if you want to inquire, modify or delete some of your personal information, you can contact us through the feedback channels listed in the “how to contact us” section of this policy to exercise your rights, except as otherwise provided by laws and regulations. when accessing, updating, correcting and deleting the aforementioned information, we may require you to verify your identity to ensure information security.

(2) account cancellation

we provide you with a way to cancel your account. in compliance with the agreed conditions of our terms of service and relevant laws and regulations, you can contact us through the feedback channels listed in the “how to contact us” section of this policy to cancel your yidun account . when you log out of your account, we may require you to perform identity verification to ensue information security.

(3) change the scope of your authorization

you can always choose whether to disclose personal information to us. some personal information is necessary forto usinge yidun services. for additional personal information collected, you can change the scope of your authorization for ourto continued to collection of the information or withdraw your authorization by deleting the information, turning off the device function, etc.

(4) constrain the automatic decision-making of the information system

in some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems and algorithms. if these decisions significantly affect your legal rights, you have the right to ask us for an explanation, and we will also provide appropriate remedies.

(5)the possible impact of deletion, cancellation and withdrawal of authorization

when you delete a certain personal information or withdraw a certain authorization, we will no longer be able to provide you with the corresponding service, and will no longer process your corresponding personal information; when you log out of your account, we will stop providing you with all yidun services, and delete your personal information or make anonymization processing according to your request, except as otherwise provided by laws and regulations.

in any case, the above decision you make will not affect the previous personal information processing based on your authorization, and as a result, you cannot continue to use all or part of the yidun service. the corresponding consequences and losses shall be borne by you. we it will be processed in accordance with our terms of service and corresponding rules.

2.manage the personal information of end users

since your end user is not a direct customer of netease yidun, you should comply with applicable laws, regulations and regulatory requirements and the provisions of this policy, and provide end users with easy-to-operate methods in response to end users’ access, update, and deletion of their personal information , log off the account, change the scope of theirits authorizationlicense agreement and other requests.

if you have doubts or difficulties during the operation and our cooperation is necessary for youus to complete, you can through this policy “how to contact us” feedback channels listed in the section contact us to exercise your rights, we will process it based on your commission, laws and regulationslegal regulations and the provisions of this policy. if the end user chooses to directly make a related request to netease yidun, in order to protect the legitimate rights and interests of you, the end user and others, we will require the user to verify his identity. after verifying with you, we have the right to process the user’s related request in accordance with laws and regulations and the provisions of this policy.

in any case, as the data controller of the end user, you should be responsible for the response and processing of the end user’s request. if any loss is incured to us you cause any loss to us due to your reasons, you should compensate us in full.

3. respond to the above request from you and the end user

in order to ensure safety, you and the end user may need to provide a written request or prove their identity in other ways. we may ask you and the end user to verify your identity before processing the request. for reasonable requests from you and the end user, we do not charge fees in principle, but for repeated requests, that requests exceeding reasonable extentslimits, we will charge a certain cost depending on the circumstances. for those requests that who have nothing to do with us, repeat for no reason, require excessive technology (for example, the need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or are very

impractical (for example, involving the information storage on backup tapes) request, we may refuse.

in the following situations, we will not be able to respond to requests from you and end users:

(1) related to our fulfillment of obligations stipulated by laws and regulations;

(2) directly related to national security and national defense security;

(3) it is directly related to public safety, public health, and major public interests;

(4) directly related to criminal investigation, prosecution, trial, and execution of judgments;

(5) we have sufficient evidence to show that you or the end user are subjectively malicious or abuse of rights;

(6) in order to protect the life, property and other major legal rights of you, the end user or other individuals, but it is difficult to obtain the consent of the person;

(7) responding to requests from you and the end user will cause serious damage to the legitimate rights and interests of you, the end user or other individuals or organizations;

(8) involving commercial secrets.

vii. how will do we deal with the information of minors

we attach great importance to the protection of personal information of minors. if you are a minor, please do not register as our user and use yidun services. if your products and/or services involve minor users, you must comply with applicable laws, regulations and regulatory requirements, and take necessary measures technology to ensure the registration, use and collection of minor users’ personal information all have obtained the consent of their guardians, and at the same time, you shallould perform the corresponding notification obligations in your privacy policy documents.

restricted by existing technologies and business models, it is difficult for us to proactively identify information about minors. if we collect the personal information of minors without knowing it or collect the personal information of minors without the prior consent of a verifiable guardian, the guardian can notify us to delete it., iif we find the aforementioned circumstances, we will also take the initiative to delete without your consent, unless the law requires us to retain such information.

viii. amendment and notification

in order to provide you with better services, we may revise the terms of this policy in a timely manner based on the update of yidun services and relevant requirements of laws and regulations, and such revisions constitute part of this policy. we will post any changes to this policy on this page. for major changes, we will also provide more prominent significant notifications (such as website announcements, push notifications, pop-up prompts). the major changes referred to in this policy include but are not limited to:

  1. a major change has taken place in the service model of yidun,. ssuch as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
  2. significant changes have taken place in our ownership structure, . ssuch as changes in owners caused by business adjustments,bankruptcy mergers, etc.;
  3. the main objects of personal information sharing, transfer or public disclosure have undergone major changes;
  4. the rights of you and end users to participate in the processing of personal information and the way in which they are exercised have undergone major changes;
  5. our responsible department, contact information and complaint channels for handling personal information security have undergone major changes;
  6. other ooccurrences of other important situations or the situations likely to seriously affect the personal rights and interests of you and the end user.

if you do not agree to these changes, you will not be able to continue using the yidun service; if you continue to use the yidun service, it means that you have fully read, understood and agreed to be bound by this revised policy which will be revised. any changes made by us will put the satisfaction of you and the end user first. we encourage you to review our privacy policy every time you use the service.

we may issue service-related announcements when necessary (for example, when we suspend a certain service due to system maintenance). you may not be able to cancel these service-related announcements that are not promotional in nature.

ix. how to contact us

we have established a dedicated department for personal information protection, which will protect your personal information and the personal information of end users in accordance with this policy. if you and the end user complain and report about the information security of yidun service, or have any questions, comments or suggestions about this policy, privacy measurestechnology, and the personal information of you and the end user, please contact netease yidun’s personal information protection personnelal information protection . to contact the personnelstaff, you can send an email to , or write to the following address: netease phase ii personal information protection specialist (received), no. 399, wangshang road, binjiang district, hangzhou; zip code: 310052.

under normal circumstances, we will reply within fifteen working days after receiving relevant questions, comments or suggestions and verifying the identity.

网站地图