Glory Frontline Privacy Policy

Disclaimer

Updated: July 16, 2025

Effective:July 16, 2025

Your trust is very important to us. We deeply understand the significance of personal information to you, and we will take appropriate security measures as required by laws and regulations to ensure that your personal information is secure and controllable. Hence, the service provider of Glory Frontline (or “we”) has formulated this “Privacy Policy” (hereinafter referred to as “this policy” or “this privacy policy”) and reminds you:

This Privacy Policy applies to all products and services provided by the Game Service Provider, including but not limited to applications, websites, Software Development Kits (SDKs), and Application Programming Interfaces (APIs) designed for computers, mobile intelligent terminals, and third-party websites/applications. It should be particularly noted that this Policy does not cover services provided by other third parties. To ensure a smooth product experience, you may encounter third-party-provided content or network links. Please exercise caution when deciding to access third-party-provided links, content, products, and services. Prior to submitting your personal information to a third party, please carefully review their privacy policies.

Prior to accessing or utilizing the services provided by the Game Service Provider, you are hereby required to carefully read, comprehensively understand, and explicitly consent to the terms of this Privacy Policy. Only after achieving full comprehension and express agreement shall you proceed to engage with the services. Should you encounter any inquiries, suggestions, or dissents regarding the contents of this Policy, you may contact us through the various communication channels provided by the Game Service Provider for further clarification.

Part 1: Definitions

Glory Frontline: Refers to the Glory Frontline client.
Glory FrontlineService Provider: Refers to the provider of internet information and software technology services for Glory Frontline, 【 Beijing Prudence Interactive Technology Co., Ltd.】.
Children: Refers to minors under the age of fourteen.
Personal Information: Refers to various information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.
Sensitive Personal Information: Refers to personal information that includes identification numbers, personal biometric information, bank account numbers, property information, tracking information, transaction information, children’s information, etc.
Personal Information Deletion: Refers to the act of removing personal information from a system that involves daily business functions, making it unsearchable and inaccessible.

Part 2: Privacy Policy

This part of the privacy policy will help you understand the following:

I.Collection, protection, and use of your personal information

II.How we manage your personal information

III. How we protect your personal information

IV.How you can manage your personal information

V.How we handle the personal information of minors

VI.How your personal information is transferred globally

VII. How this privacy policy is updated

VIII. How to contact us

I. Collection, Protection, and Use of Your Personal Information

You understand and agree that:

  1. We are committed to creating excellent product features and services to meet your needs. Since the products and services we provide to you are varied, and the specific product features and service ranges chosen by different users may vary, the types and ranges of personal information collected and used for various features will differ. Please refer to the specific product features and service functions for details.
  2. To provide you with better product features and service experiences, we continuously strive to improve our technology. As a result, we may introduce new or optimized features from time to time, which may require collecting and using new personal information or changing the purposes or methods of using personal information. We will explain the purposes, ranges, and methods of information collection through policy updates, pop-ups, and page prompts, and provide you with the option to agree. We will collect and use such information only after obtaining your explicit consent.
  3. To achieve specific business functions, we may need to collect relevant personal information from end users, primarily including: log information, network information, system name, system version, and country code.
  4. User Information Authentication Service: When using features or services that require identity verification, you may need to provide your name, ID number, and phone number to verify your identity according to relevant laws and regulations. This information is classified as sensitive personal information. You can refuse to provide it, but you may not be able to access the related services.
  5. Network Signal Reporting: This game provides network signal broadcasting functionality, including real-time reporting of:(a) Wi-Fi signal strength;(b) SIM card signal strength;(c) Network type.To enable this feature, we require access to your device’s geographic location data (GPS coordinates or coarse location). Such location data constitutes sensitive personal information. If you decline to grant location permission, the game will not broadcast your SIM card signal,and it will not affect the normal use of other services that do not require location permissions.All the above information we collect and use has been de-identified. Data analysis only corresponds to specific codes that cannot directly link to your identity, and will not be associated with your real identity.
  6. Customer Service and Issue Resolution: When you contact us through customer service consultations, we will collect the consultation content you provide and your contact information (name, address, email, or other contact information you leave) to contact you or help resolve issues, or record the solutions and results of relevant issues.
  7. Providing Security for You: To enhance the security of your use of services provided by us and our affiliates and partners, protect the personal and property safety of you, other users, or the public from infringement, better prevent phishing software, fraud, software vulnerabilities, computer viruses, and malicious software intrusions, and more accurately identify violations of laws, regulations, or our relevant agreement rules, we may use or integrate your member information, device information, service log information, and information shared by our affiliates or partners that you have authorized or legally shared to comprehensively judge your account risk, verify your identity, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures as required by law.
  8. Other:

(1) If the information you provide contains personal information of other users, you need to ensure that you have obtained legal authorization before providing this personal information to us.

(2) If we use information for purposes not described in this policy, or use information collected for specific purposes for other purposes, or obtain your personal information from third parties, we will obtain your prior consent.

If we indirectly obtain your information from third parties, we will clearly require the third party to collect personal information with your consent in written form before collecting it and inform you of the shared information content. If sensitive information is involved, it must be confirmed by you before providing it to us for use. We will require the third party to commit to the legality and compliance of the personal information source. If the third party violates the agreement, we will require them to bear corresponding legal responsibilities. Our professional security team will reinforce the security of personal information (including sensitive information reporting, sensitive information encrypted storage, access permission control, etc.). We will use protection means and measures no less stringent than those we use to protect our own users’ personal information to protect the indirectly obtained personal information.

  1. Exceptions to Obtaining Authorization and Consent You fully understand and agree that we may collect and use your personal information without your authorization and consent in the following situations, and we may not respond to your requests for correction, modification, deletion, cancellation, withdrawal of consent, or retrieval of information:
  • Related to national security or defense security;
  • Related to public safety, public health, or significant public interests;
  • Related to criminal investigation, prosecution, trial, and judgment execution;
  • To protect your or others’ major legitimate rights and interests such as life and property, but it is difficult to obtain your consent;
  • Personal information that you disclose to the public yourself;
  • Personal information collected from legally disclosed information, such as legal news reports, government information disclosure, etc.;
  • Necessary to sign and perform a contract or other written documents with you;
  • Necessary to maintain the safe and stable operation of products and/or services provided, such as discovering and handling product or service failures;
  • Necessary for legal news reporting;
  • Academic research institutions conducting statistics or academic research based on public interest, and when providing academic research or description results externally, the results include de-identified personal information;
  • Other circumstances stipulated by laws and regulations.Please be aware that according to applicable laws, if we take technical measures and other necessary measures to process personal information so that the data receiver cannot re-identify specific individuals and cannot recover it, or we may study, statistically analyze, and predict the collected information after de-identification, used to improve our content and layout, support business decisions, and improve our products and services (including using anonymous data for machine learning or model algorithm training), then such processed data does not require separate notification and consent from you.
  1. If we stop operating our products or services, we will promptly stop the collection of your personal information, notify you by individual delivery or announcement, and delete or anonymize the personal information related to the terminated business we hold.
  2. Explanation of Third-Party SDK Integration

To provide users with more services, ensure service stability and quality, or upgrade related features, we may need to adjust the third-party SDKs we integrate. We will promptly explain the latest situation regarding third-party SDKs that collect user information on this page. The SDKs used include iFLYTEK, Wwise, Tencent GVoice (Game Voice), and Agora Real-time Voice.

  • Third-Party SDK Source: iFLYTEK: Purpose/Use of Collecting User Information: Language information, text information, device information, and log information are primarily used to provide speech-to-text, speech synthesis, and speech evaluation services after voice input for visually impaired users, text-to-speech services after text input, authorization billing, and user identity verification. These data help accurately locate and resolve issues developers and end users encounter while using our products and/or services, avoid conflicts with other applications, track service usage statistics, ensure service stability and network security, and conduct data statistics and operational analysis to improve and optimize product interaction experiences. Third-party privacy policy link: https://www.xfyun.cn/doc/tts/offline_tts/offline_tts_sdkprivacy.html#
  • Third-party SDK Source: Wwise: Wwise provides a complete set of interactive audio design and development tools, simplifying the cross-platform development process, offering dynamic mixing effects, and allowing adjustment of sound priorities to fully utilize processing resources within relevant constraints. It also uses sound propagation, virtual acoustics, and spatially-based audio rendering to build immersive audio environments.Third-party privacy policy link: https://www.audiokinetic.com/zh/user-account-policy/
  • Third-party SDK Source: Tencent GVoice (Game Voice): GVoice (Game Voice) is a voice service that supports a variety of gameplay scenarios, providing comprehensive coverage for gaming applications.Documentation link: https://gcloud.tencent.com/pages/documents/details.html?projectId=256&docId=6061
  • Third-party SDK Source: Agora Real-time Voice: Agora provides real-time voice communication that brings people closer together, offering an immersive communication experience and helping your app improve user engagement. This article explains how to integrate the Agora audio SDK with minimal code and use its API to enable high-quality, low-latency voice communication in your app. Documentation link: https://docportal.shengwang.cn/cn/voice-legacy/start_call_audio_android?platform=Android

12.Providing Security for Users

To ensure account security and system operation security, comply with relevant legal regulations, and our agreement rules, during the use of our products, we may obtain user device information with user authorization. This includes device attributes, connection, and status information. We may attempt to read or write SDcard data (public storage area) to ensure the smooth operation of this app. Please be aware of this necessity.

II. How We Manage Your Personal Information

1. Sharing

We do not share your personal information with companies, organizations, or individuals outside of our game service providers, except in the following circumstances:

  • Legal Requirements: We may share your personal information according to legal regulations, for litigation or dispute resolution needs, or as required by administrative or judicial authorities.
  • With Explicit Consent: We will share your personal information with others only after obtaining your explicit consent.
  • Personal Information Sharing with Affiliated Companies: To facilitate the provision of products and services based on “Glory Frontline“, identify anomalies in user information, and protect the safety of “Glory Frontline” affiliates or other users or the public, your personal information may be shared with our affiliates or their designated service providers. We will only share necessary personal information and it will be subject to the purposes stated in this privacy policy. If we share your sensitive personal information or if our affiliates change the purpose or processing of personal information, we will seek your authorization and consent again.
  • With Authorized Partners: We may entrust authorized partners to provide certain services or perform functions on our behalf. We will only share your information for the legitimate, necessary, specific, and clear purposes stated in this privacy policy. Authorized partners can only access information necessary for their duties and must not use this information for any other purposes.
    We will conduct rigorous security checks on the application programming interfaces (APIs) and software development kits (SDKs) used by authorized partners and agree on strict data protection measures to ensure that they process personal information according to our entrusted purposes, service descriptions, this privacy policy, and other related confidentiality and security measures.

2. Transfer

We do not transfer your personal information to any company, organization, or individual, except in the following cases:

  • With Explicit Consent: We will transfer your personal information to others after obtaining your explicit consent.
  • Business Changes: In the event of a merger, acquisition, or bankruptcy liquidation of the service provider, or other scenarios involving such changes, if personal information is to be transferred, we will require the new company or organization holding your personal information to continue to adhere to this policy. Otherwise, we will require the new company or organization to seek your authorization and consent again.

3. Public Disclosure

We will only disclose your personal information in the following situations:

  • With Explicit Consent: We may publicly disclose your personal information if we obtain your explicit consent or based on your active choice.
  • Legal or Contractual Obligations: If we determine that you have violated laws, regulations, or seriously breached the terms of our product-related agreements, or to protect the safety of users or the public, we may disclose your personal information in accordance with legal regulations or our product-related agreements, including related violations and the measures taken by our product.

4. Exceptions to Prior Authorization for Sharing, Transfer, or Public Disclosure

The following situations do not require prior authorization and consent for sharing, transfer, or public disclosure of your personal information:

  • Related to national security or defense security.
  • Related to public safety, public health, or significant public interests.
  • Related to criminal investigations, prosecutions, trials, and enforcement of judgments.
  • To protect the life and property of individuals but difficult to obtain consent from the individual.
  • Personal information you have made public.
  • Personal information collected from legally publicly disclosed information, such as news reports or government information disclosures.

According to legal regulations, sharing or transferring de-identified personal information, ensuring that the data recipient cannot restore or re-identify the personal information subject, does not constitute sharing, transfer, or public disclosure of personal information. Such data storage and processing do not require further notice or consent from you.

III. How We Protect Your Personal Information

1. Security Measures

We have implemented industry-standard and reasonably feasible security measures to protect your information from unauthorized access, public disclosure, use, modification, damage, or loss. Specifically:

  • Encryption Technology: We use encryption technology to enhance the security of personal information.
  • Trusted Protection Mechanisms: We employ trusted protection mechanisms to prevent malicious attacks on personal information.
  • Access Control: We deploy access control mechanisms to ensure that only authorized personnel can access personal information.
  • Security and Privacy Training: We conduct security and privacy protection training courses to increase employee awareness of the importance of personal information protection.

2. Data Security Management System

We have an advanced data-centric data security management system that focuses on the data lifecycle. This system improves overall security from various dimensions including organizational development, system design, personnel management, and product technology.

3. Minimizing Data Collection and Retention

We take reasonable and feasible measures to avoid collecting irrelevant personal information. We will retain your personal information only for the duration necessary to achieve the purposes described in this policy, unless legally required to retain it for a longer period. The criteria for determining this period include:

  • Ensuring the safety and quality of the services we provide to you.
  • Whether you agree to a longer retention period.
  • Any other special agreements regarding retention periods.

After the retention period expires, we will delete or anonymize your personal information in accordance with applicable laws.

4. Internet Security Limitations

The internet is not an entirely secure environment. When using the services provided by “Glory Frontline,” we strongly recommend not using communication methods not recommended by us to send your information. You can use our services to establish contact and share information. When creating communications, transactions, or sharing through our services, you may choose who to communicate or share with, and these third parties may see your contact information, communication details, or shared content.

Please be aware that information you voluntarily share or publicly disclose while using our services may involve personal information or sensitive personal information of yourself or others. Consider carefully whether to share or publicly disclose such information when using our services.

We will strive to ensure the security of any information you send us. If our physical, technical, or managerial protective measures are breached, leading to unauthorized access, public disclosure, tampering, or damage of information, resulting in harm to your legal rights, we will assume corresponding legal responsibilities.

5. Updates and Public Disclosure

We will periodically update and publicly disclose information about security risks, personal information security impact assessments, and other related content, which you can access through our announcements.

6. Response to Security Incidents

In the unfortunate event of a personal information security incident, we will notify you in accordance with legal requirements, including:

  • Basic information about the security incident and potential impacts.
  • Measures we have taken or will take to address the issue.
  • Suggestions for you to independently prevent and mitigate risks.
  • Remedial measures for you.

We will inform you of the incident details through email, letter, phone, push notifications, or other means. If it is difficult to inform each affected individual, we will use reasonable and effective methods to issue public announcements.

We will also report the handling of personal information security incidents to regulatory authorities as required.

IV. How You Can Manage Your Personal Information

1. Correcting or Supplementing Your Personal Information

If you find that the personal information we handle about you is incorrect, you have the right to request corrections or supplements. You can submit a request to us for these changes.

2. Deleting Your Personal Information

  • You can request the deletion of your personal information under the following circumstances:
  1. If our handling of personal information violates laws and regulations.
  2. If we have collected or used your personal information without your explicit consent.
  3. If our handling of personal information severely violates our agreement with you.
  4. If you no longer use our products or services, or you have voluntarily canceled the product.
  5. If we no longer provide products or services to you permanently.
  • If we decide to respond to your deletion request, we will also, if possible, notify the parties who obtained your personal information from us, requesting them to delete it promptly, unless otherwise specified by laws and regulations or those parties have obtained your independent authorization.
  • After you delete information from our services, we may not immediately remove the corresponding information from backup systems, but will delete it when the backup is updated.

3. Changing the Scope of Your Authorized Consent

Each business function requires certain basic personal information to function (see “Section II” of this privacy policy). Beyond that, you can withdraw part of your authorization by unlinking, modifying personal settings, or deleting relevant information, or by turning off certain features.

When you withdraw consent, we will no longer process the corresponding personal information. However, the decision to withdraw consent will not affect the processing of personal information based on your prior authorization.

4. Constraints on Automated Decision-Making by Information Systems

In some product functions, decisions may be made solely by automated decision-making mechanisms such as information systems or algorithms. If these decisions significantly impact your legal rights, you have the right to request an explanation. We will provide a method for appeal without compromising the product’s commercial secrets, other users’ rights, or public interests.

5. Responding to Your Requests

  • To ensure security, you may need to provide a written request or other proof of your identity. We may ask you to verify your identity before processing your request.
  • We will respond to your request within 15 days.
  • For reasonable requests, we generally do not charge fees. However, for repeated or excessive requests, we may charge a reasonable fee. We may refuse requests that are groundless, require excessive technical means (e.g., developing a new system or fundamentally changing current practices), pose risks to others’ legal rights, or are impractical.
  • In the following situations, we may not be able to respond to your requests as required by laws and regulations:
  1. Related to national security or defense.
  2. Related to public safety, public health, or major public interests.
  3. Related to criminal investigation, prosecution, trial, and enforcement of judgments.
  4. Where there is sufficient evidence showing that the data subject has subjective malice or abuses their rights.
  5. Where responding to the request would severely harm your or others’ legal rights.
  6. Involving commercial secrets.

V. How We Handle Children’s Personal Information

Children are not allowed to create their own accounts without the consent of a guardian. If you are a child, we ask that your guardian carefully read this privacy policy and use our services or provide information only with their consent.

For instances where personal information of children is collected with the guardian’s consent to use our products or services, we will only use, share, transfer, or disclose such information in accordance with legal regulations, with the explicit consent of the guardian, or when necessary to protect the child.

VI. How Your Personal Information Is Transferred Globally

Personal information collected and generated during our operations within the People’s Republic of China is stored within China, except in the following circumstances:

  1. When required by laws and regulations;
  2. With your explicit authorization;
  3. When you engage in cross-border transactions or other voluntary actions via the internet.

In such cases, we will ensure that your personal information is adequately protected in accordance with this privacy policy.

VII. How This Privacy Policy Is Updated

Our privacy policy may be updated.

  1. No Limitation of Rights: We will not limit your rights as outlined in this privacy policy without your explicit consent. Any changes to the privacy policy will be published on a dedicated page (Settings – About Us – User Agreement – Privacy Policy).
  2. Significant Changes: For significant changes, we will provide more prominent notifications, including notifications through our service or even pop-up alerts. Significant changes include but are not limited to:
  • Major Changes in Service Model: Such as changes in the purposes of processing personal information, types of personal information processed, or methods of using personal information.
  • Major Changes in Control: Such as changes in ownership due to mergers or acquisitions.
  • Changes in Main Recipients of Personal Information: Such as changes in the entities to which personal information is shared, transferred, or disclosed.
  • Significant Changes in Your Rights: Such as changes in your rights related to personal information processing and how to exercise them.
  • Changes in Responsible Department or Contact Information: Such as changes in the department responsible for personal information security, contact details, or complaint channels.
  • High-Risk Findings: When personal information security impact assessments indicate high risks.

VIII. How to Contact Us

You can contact us through the following methods, and we will respond to your request within 15 days:

  1. Questions, Comments, or Suggestions: If you have any questions, comments, or suggestions regarding this policy, you can contact us by sending an email to service@xzhd.onaliyun.com.
  2. Unresolved Issues: If you are not satisfied with our response, especially if you believe that our handling of personal information has infringed upon your legal rights, you may also seek resolution by filing a lawsuit in a court with jurisdiction over the defendant’s residence.

提示條款

更新日期:2025年6月16日

生效日期:2025年6月16日

您的信任對我們非常重要,我們深知個人資訊對您的重要性,我們將按法律法規要求,採取相應安全保護措施,盡力保護您的個人資訊安全可控。鑒於此,本遊戲服務提供者(或簡稱“我們”)制定本《隱私權政策》(下稱“本政策或本隱私權政策”)並提醒您:

本政策適用於遊戲提供的所有產品和服務,包括但不限於適用於電腦、移動智能終端的應用程式、網頁、供第三方網站和應用程式使用的軟體開發工具包(SDK)和應用程式編程介面(API)及服務。需要特別說明的是,本政策不適用於其他第三方向您提供的服務,為確保流暢的產品體驗,您可能會收到來自第三方提供的內容或網路鏈接。請您謹慎選擇是否訪問第三方提供的鏈接、內容、產品和服務。在向第三方提交個人資訊之前,請認真閱讀這些第三方的隱私政策。

在使用本遊戲服務前,請您務必仔細閱讀並透徹理解本政策,在確認充分理解並同意後再開始使用。如對本政策內容有任何疑問、意見或建議,您可通過本遊戲提供的各種聯繫方式與我們聯繫。

第一部分 定義

本遊戲:指《榮耀戰場》客戶端。 本遊戲服務提供者:指本遊戲的互聯網資訊及軟體技術服務提供者【北京心智互動科技有限公司】。(以下簡稱為提供者) 兒童:指不滿十四周歲的未成年人。 個人資訊:指以電子或者其他方式記錄的能夠單獨或者與其他資訊結合識別特定自然人身份或者反映特定自然人活動情況的各種資訊。 個人敏感資訊:指包括身份證件號碼、個人生物識別資訊、銀行帳號、財產資訊、行蹤軌跡、交易資訊、兒童資訊等的個人資訊。 個人資訊刪除:指在實現日常業務功能所涉及的系統中去除個人資訊的行為,使其保持不可被檢索、訪問的狀態。

第二部分 隱私權政策

本隱私權政策部分將幫助您瞭解以下內容:

  1. 一. 您的個人資訊的收集保護及使用
  2. 二. 我們如何管理您的個人資訊
  3. 三. 我們如何保護您的個人資訊
  4. 四. 您如何管理您的個人資訊
  5. 五. 我們如何處理未成年人的個人資訊
  6. 六. 您的個人資訊如何在全球範圍轉移
  7. 七. 本隱私權政策如何更新
  8. 八. 如何聯繫我們

一. 您的個人資訊的收集保護及使用

您理解並同意:

我們致力於打造優秀的產品功能和服務以滿足您的需求。因我們向您提供的產品中的功能和服務種類較多,且不同用戶選擇使用的具體產品功能及服務範圍存在差異,相應的,各類功能及收集使用的個人資訊類型、範圍等會有所區別,請以具體的產品功能及服務功能為准;

為給您帶來更好的產品功能和服務體驗,我們在持續努力改進我們的技術,隨之我們可能會不時推出新的或優化後的功能,可能需要收集、使用新的個人資訊或變更個人資訊使用目的或方式。對此,我們將通過更新本政策、彈窗、頁面提示等方式另行向您說明對應資訊的收集目的、範圍及使用方式,並為您提供自主選擇同意的方式,僅在獲得您的明確同意並遵守適用法律的情況下處理此類個人資訊。

為實現各類特定業務功能,我們可能需要向端用戶收集相關個人資訊,主要包括:日誌資訊(包括:第三方開發者自定義 日誌、Logcat 日誌以及 APP 崩潰堆疊資訊)、設備 ID(包括:androidid 以及 idfv)、聯網資訊、系統名稱、系統版本以及國家碼。

用戶資訊認證服務:在您使用需要身份認證才能提供的功能或服務時,根據相關法律法規,您可能需要提供姓名、身份證號碼、電話號碼以證實您的真實身份。 這些資訊屬於個人敏感資訊,您可以拒絕提供,但您將可能無法獲得相關服務。

網路信號播報:本遊戲可以播報手機的網路信號,包括wifi信號強度以及sim卡信號強度以及網路類型。為實現這一功能,本遊戲需要使用您的設備所在位置相關資訊。其中,位置許可權涉及個人敏感資訊,若您拒絕提供,本遊戲將不會播報sim卡信號,且不會影響其他不需要位置許可權的服務正常使用。我們收集、使用的上述資訊均進行了去標識化處理,數據分析僅對應特定的、無法直接關聯您身份的編碼,不會與您的真實身份相關聯。

客服及問題解決:通過客服諮詢等方式與我們聯繫:當您與我們聯繫時,我們將收集您提供的諮詢內容以及您的聯繫方式(姓名、住址、郵箱或您留下的其他聯繫方式)等資訊,以便與您聯繫或幫助您解決問題,或記錄相關問題的處理方案及結果。

為您提供安全保障:為提高您使用我們及我們關聯公司、合作夥伴提供服務的安全性,保護您或其他用戶或公眾的人身財產安全免遭侵害,更好地預防釣魚軟體、欺詐、軟體漏洞、電腦病毒、惡意軟體侵入等安全風險,更準確地識別違反法律法規或我們相關協議規則的情況,我們可能使用或整合您的會員資訊、設備資訊、服務日誌資訊以及我們關聯公司、合作夥伴取得您授權或依據法律共用的資訊,來綜合判斷您帳戶風險、進行身份驗證、檢測及防範安全事件,並依法採取必要的記錄、審計、分析、處置措施。

其他資訊

(1)若您提供的資訊中含有其他用戶的個人資訊,在向我們提供這些個人資訊之前,您需確保您已經取得合法的授權。

(2)若我們將資訊用於本政策未載明的其他用途,或者將基於特定目的收集而來的資訊用於其他目的,或者我們主動從第三方處獲取您的個人資訊,均會事先獲得您的同意。

若我們從第三方處間接獲取您的資訊的,我們會在收集前明確以書面形式要求該第三方在已依法取得您同意後收集個人資訊,並向您告知共用的資訊內容。若涉及敏感資訊的在提供給我們使用前需經過您的明確確認,要求第三方對個人資訊來源的合法性和合規性作出承諾,如第三方有違反行為的,我們會明確要求對方承擔相應法律責任。同時,我們的專業安全團隊對個人資訊會進行安全加固(包括敏感資訊報備、敏感資訊加密存儲、訪問許可權控制等)。我們會使用不低於我們對自身用戶個人資訊同等的保護手段與措施對間接獲取的個人資訊進行保護。

征得授權同意的例外:您充分理解並同意,我們在以下情況下收集、使用您的個人資訊無需您的授權同意,且我們可能不會回應您提出的更正、修改、刪除、註銷、撤回同意、索取資訊的請求:

與國家安全、國防安全有關的;

l與公共安全、公共衛生、重大公共利益有關的;

與犯罪偵查、起訴、審判和判決執行等司法或行政執法有關的;

出於維護您或其他個人的生命、財產等重大合法權益但又很難得到本人同意的;

您自行向社會公眾公開的個人資訊;

從合法公開披露的資訊中收集個人資訊的,如合法的新聞報導、政府資訊公開等管道;

根據與您簽訂和履行相關協議或其他書面檔所必需的;

用於維護所提供的產品及/或服務的安全穩定運行所必需的,例如發現、處置產品或服務的故障;

為合法的新聞報導所必需的;

學術研究機構基於公共利益開展統計或學術研究所必要,且對外提供學術研究或描述的結果時,對結果中所包含的個人資訊進行去標識化處理的;

法律法規規定的其他情形。請知悉,根據適用的法律,若我們對個人資訊採取技術措施和其他必要措施進行處理,使得數據接收方無法重新識別特定個人且不能復原,或我們可能會對收集的資訊進行去標識化地研究、統計分析和預測,用於改善我們的內容和佈局,為商業決策提供產品或服務支撐,以及改進我們的產品和服務(包括使用匿名數據進行機器學習或模型演算法訓練),則此類處理後數據的使用無需另行向您通知並征得您的同意。

如我們停止運營我們的產品或服務,我們將及時停止繼續收集您個人資訊的活動,將停止運營的通知以逐一送達或公告的形式通知您,並對我們所持有的與已關停業務相關的個人資訊進行刪除或匿名化處理。

Explanation of Third-Party SDK Integration

為了向用戶提供更多服務、保證服務穩定性和質量,或者升級相關功能時,我們可能需要調整我們接入的第三方 SDK。我們會及時在本頁面向您說明涉及收集用戶信息的第三方 SDK 的最新情況。我們使用的第三方 SDK 包括:科大訊飛、Wwise、騰訊 GVoice(遊戲語音)以及聲網 Agora 實時語音。

第三方sdk來源:科大訊飛: 收集用戶資訊用途/目的:語言資訊、文本資訊、設備資訊、日誌資訊主要用作提供語音輸入後的語音轉文字、語音合成、語音評測服務、提供文本輸入後語音合成服務、授權計費、用戶身份識別;更準確定位並解決開發者以及最終用戶在使用我們產品與/或服務時遇到的問題、避免與其他應用產生衝突、統計服務的使用情況,保障服務穩定和網路安全; 進行數據統計和運營分析、改進和優化產品交互體驗。第三方隱私政策鏈接: https://www.xfyun.cn/doc/tts/offline_tts/offline_tts_sdkprivacy.html#

第三方 SDK 來源:Wwise: 提供一整套互動音頻設計與開發工具,簡化多平台開發流程,提供動態混音效果,允許調節聲音的優先級,確保在遵從相關限制的情況下充分利用處理資源。同時利用聲音傳播、虛擬聲學及基於空間信息的音頻渲染,構建沉浸式音頻環境。 第三方隱私政策鏈接: https://www.audiokinetic.com/zh/user-account-policy/

第三方 SDK 來源:騰訊 GVoice(遊戲語音): GVoice(遊戲語音)是一款支持多樣玩法、全面覆蓋遊戲應用場景的語音服務。 https://gcloud.tencent.com/pages/documents/details.html?projectId=256&docId=6061

第三方 SDK 來源:聲網 Agora 實時語音: 聲網 Agora 提供實時語音通話,能夠拉近人與人之間的距離,為用戶提供沉浸式的交流體驗,並幫助您的應用提高用戶黏性。本文介紹如何通過少量代碼集成 Agora 音頻 SDK 並調用 API,在您的應用中實現高質量、低延遲的語音通話功能。 文檔鏈接: https://docportal.shengwang.cn/cn/voice-legacy/start_call_audio_android?platform=Android

12.為用戶提供安全保障

為了保障帳號安全以及系統運行安全,滿足法律法規和我們協議規則的相關要求,在用戶使用我們的產品過程中,經用戶授權我們會獲取用戶的設備資訊,包括用戶使用的設備屬性、連接和狀態資訊,例如設備型號、設備識別字(如IMEI/androidID/IDFA/OPENUDID/GUID/OAID、SIM卡IMSI、ICCID資訊等)、設備MAC地址、軟體列表、電信運營商等軟硬體特徵資訊。我們可能會嘗試讀取或寫入SDcard數據(公共存儲區)請您知悉,以保障本APP順暢運行的必要。

二.我們如何管理您的個人資訊

(一)共用

我們不會與本遊戲服務提供者以外的公司、組織和個人共用您的個人資訊,但以下情況除外:

1、在法定情形下的共用:我們可能會根據法律法規規定、訴訟、爭議解決需要,或按行政、司法機關依法提出的要求,對外共用您的個人資訊。

2、在獲取明確同意的情況下共用:獲得您的明確同意後,我們會與其他方共用您的個人資訊。

3、與關聯公司間共用:為便於我們基於本遊戲向您提供產品和服務,識別用戶資訊異常,保護本遊戲關聯公司或其他用戶或公眾的人身財產安全免遭侵害,您的個人資訊可能會與我們的關聯公司或其指定的服務提供商共用。我們只會共用必要的個人資訊,且受本隱私政策中所聲明目的的約束,如果我們共用您的個人敏感資訊或關聯公司改變個人資訊的使用及處理目的,將再次徵求您的授權同意。

4、與授權合作夥伴共用:我們可能委託授權合作夥伴為您提供某些服務或代表我們履行職能,我們僅會出於本隱私權政策聲明的合法、正當、必要、特定、明確的目的共用您的資訊,授權合作夥伴只能接觸到其履行職責所需資訊,且不得將此信息用於其他任何目的。

(二)轉讓

我們不會將您的個人資訊轉讓給任何公司、組織和個人,但以下情況除外:

(1)在獲取明確同意的情況下轉讓:獲得您的明確同意後,我們會向其他方轉讓您的個人資訊;

(2)在本產品服務提供者發生合併、收購或破產清算情形,或其他涉及合併、收購或破產清算情形時,如涉及到個人資訊轉讓,我們會要求新的持有您個人資訊的公司、組織繼續受本政策的約束,否則我們將要求該公司、組織和個人重新向您徵求授權同意。

(三)公開披露

我們僅會在以下情況下,公開披露您的個人資訊:

(1)獲得您明確同意或基於您的主動選擇,我們可能會公開披露您的個人資訊;

(2)如果我們確定您出現違反法律法規或嚴重違反本產品相關協議規則的情況,或為保護本產品及其關聯公司用戶或公眾的人身財產安全免遭侵害,我們可能依據法律法規或本產品相關協議規則征得您同意的情況下披露關於您的個人資訊,包括相關違規行為以及本產品已對您採取的措施。

(四)共用、轉讓、公開披露個人資訊時事先征得授權同意的例外

The following situations do not require prior authorization and consent for sharing, transfer, or public disclosure of your personal information:

1、與國家安全、國防安全有關的;

2、與公共安全、公共衛生、重大公共利益有關的;

3、與犯罪偵查、起訴、審判和判決執行等有關的;

4、出於維護您或其他個人的生命、財產等重大合法權益但又很難得到本人同意的;

5、您自行向社會公眾公開的個人資訊;

6、從合法公開披露的資訊中收集個人資訊的,如合法的新聞報導、政府資訊公開等管道。

根據法律規定,共用、轉讓經去標識化處理的個人資訊,且確保數據接收方無法復原並重新識別個人資訊主體的,不屬於個人資訊的對外共用、轉讓及公開披露行為,對此類數據的保存及處理將無需另行向您通知並征得您的同意。

三、我們如何保護您的個人資訊安全

(一)我們已採取符合業界標準、合理可行的安全防護措施保護您的資訊,防止個人資訊遭到未經授權訪問、公開披露、使用、修改、損壞或丟失。我們會使用加密技術提高個人資訊的安全性;我們會使用受信賴的保護機制防止個人資訊遭到惡意攻擊;我們會部署訪問控制機制,盡力確保只有授權人員才可訪問個人資訊;以及我們會舉辦安全和隱私保護培訓課程,加強員工對於保護個人資訊重要性的認識。

(二)我們有行業先進的以數據為核心、圍繞數據生命週期進行的數據安全管理體系,從組織建設、制度設計、人員管理、產品技術等方面多維度提升整個系統的安全性。

(三)我們會採取合理可行的措施,盡力避免收集無關的個人資訊。我們只會在達成本政策所述目的所需的期限內保留您的個人資訊,除非法律有強制的存留要求。而我們判斷前述期限的標準包括:

1、保證我們為您提供服務的安全和品質;

2、您是否同意更長的留存期間;

3、是否存在保留期限的其他特別約定。

在您的個人資訊超出保留期間後,我們會根據適用法律的要求刪除您的個人資訊,或使其匿名化處理。

(四)互聯網並非絕對安全的環境,使用本遊戲提供的服務時,我們強烈建議您不要使用不屬於本遊戲推薦的通信方式發送您的資訊。您可以通過我們的服務建立聯繫和相互分享。當您通過我們的服務創建交流、交易或分享時,您可以自主選擇溝通或分享的對象,作為能夠看到您的聯絡方式、交流資訊或分享內容等相關資訊的第三方。

請注意,您在使用我們服務時自願共用甚至公開分享的資訊,可能會涉及您或他人的個人資訊甚至個人敏感資訊。請您更加謹慎地考慮,是否在使用我們的服務時共用甚至公開分享相關資訊。

我們將盡力保障您發送給我們的任何資訊的安全性。如果我們的物理、技術或管理防護設施遭到破壞,導致資訊被非授權訪問、公開披露、篡改或毀壞,導致您的合法權益受損,我們將承擔相應的法律責任。

(五)我們將不定期更新並公開安全風險、個人資訊安全影響評估報告等有關內容,您可通過我們公告方式獲得。

(六)在不幸發生個人資訊安全事件後,我們將按照法律法規的要求向您告知:安全事件的基本情況和可能的影響、我們已採取或將要採取的處置措施、您可自主防範和降低風險的建議、對您的補救措施等。事件相關情況我們將以郵件、信函、電話、推送通知等方式告知您,難以逐一告知個人資訊主體時,我們會採取合理、有效的方式發佈公告。

同時,我們還將按照監管部門要求,上報個人資訊安全事件的處置情況。

四、您如何管理您的個人資訊

您可以通過以下方式訪問及管理您的個人資訊:

(一) 更正或補充您的個人資訊

當您發現我們處理的關於您的個人資訊有錯誤時,您有權要求我們做出更正或補充。您可以向我們提出更正或補充申請。

(二)刪除您的個人資訊

(1)在以下情形中,您可以向我們提出刪除個人資訊的請求:

1、如果我們處理個人資訊的行為違反法律法規;

2、如果我們收集、使用您的個人資訊,卻未征得您的明確同意;

3、如果我們處理個人資訊的行為嚴重違反了與您的約定;

4、如果您不再使用我們的產品或服務,或您主動註銷了產品;

5、如果我們永久不再為您提供產品或服務。

(2)若我們決定回應您的刪除請求,我們還將同時盡可能通知從我們處獲得您的個人資訊的主體,要求其及時刪除,除非法律法規另有規定,或這些主體獲得您的獨立授權。

(3)當您從我們的服務中刪除資訊後,我們可能不會立即從備份系統中刪除相應的資訊,但會在備份更新時刪除這些資訊。

(三)改變您授權同意的範圍

每個業務功能需要一些基本的個人資訊才能得以完成(見本隱私權政策“第二部分”)。除此之外,您可以通過解除綁定、修改個人設置、刪除相關資訊等方式撤回部分授權,也可以通過關閉功能的方式撤銷部分授權。

當您收回同意後,我們將不再處理相應的個人資訊。但您收回同意的決定,不會影響此前基於您的授權而開展的個人資訊處理。

(四)約束資訊系統自動決策

在某些產品功能中,我們可能僅依據資訊系統、演算法等在內的非人工自動決策機制做出決定。如果這些決定顯著影響您的合法權益,您有權要求我們做出解釋,我們也將在不侵害本產品商業秘密或其他用戶權益、社會公共利益的前提下提供申訴方法。

(五)回應您的上述請求

(1)為保障安全,您可能需要提供書面請求,或以其他方式證明您的身份。我們可能會先要求您驗證自己的身份,然後再處理您的請求。

(2)我們將在15天內做出答復。

(3)對於您合理的請求,我們原則上不收取費用,但對多次重複、超出合理限度的請求,我們將視情收取一定成本費用。對於那些無端重複、需要過多技術手段(例如,需要開發新系統或從根本上改變現行慣例)、給他人合法權益帶來風險或者非常不切實際的請求,我們可能會予以拒絕。

(4)在以下情形中,按照法律法規要求,我們將無法回應您的請求:

1、與國家安全、國防安全有關的;

2、與公共安全、公共衛生、重大公共利益有關的;

3、與犯罪偵查、起訴、審判和執行判決等有關的;

4、有充分證據表明個人資訊主體存在主觀惡意或濫用權利的;

5、回應您的請求將導致您或其他個人、組織的合法權益受到嚴重損害的;

6、涉及商業秘密的。

五、我們如何處理兒童的個人資訊

如果沒有監護人的同意,兒童不得創建自己的用戶。如您為兒童,我們要求您請您的監護人仔細閱讀本隱私權政策,並在征得您的監護人同意的前提下使用我們的服務或向我們提供資訊。

對於經監護人同意使用我們的產品或服務而收集兒童個人資訊的情況,我們只會在法律法規允許、監護人明確同意或者保護兒童所必要的情況下使用、共用、轉讓或披露此信息。

六、您的個人資訊如何在全球範圍轉移

我們在中華人民共和國境內運營中收集和產生的個人資訊,存儲在中國境內,以下情形除外:

1、法律法規有明確規定;

2、獲得您的明確授權;

3、您通過互聯網進行跨境交易等個人主動行為。

針對以上情形,我們會確保依據本隱私權政策對您的個人資訊提供足夠的保護。

七、需要獲得允許的手機許可權

  1. android.permission.WRITE_EXTERNAL_STORAGE

本遊戲服務需要允許讀寫手機的存儲空間,以確保其基礎功能的運行,例如存儲服務數據,存儲用戶自定義的配置,緩存,以及其他

  1. android.permission.INTERNET

本遊戲服務需要連接到因特網以運行其基礎功能,例如,連接到遊戲伺服器,下載更新,上傳用戶服務數據,以及其他

八、本隱私權政策如何更新

我們的隱私權政策可能變更。

(1)未經您明確同意,我們不會限制您按照本隱私權政策所應享有的權利。我們會在專門頁面(設置-關於我們-使用協議-隱私權政策)上發佈對隱私權政策所做的任何變更。

(2)對於重大變更,我們還會提供更為顯著的通知(包括我們會通過本遊戲內公示的方式進行通知甚至向您提供彈窗提示)。

本政策所指的重大變更包括但不限於:

1、我們的服務模式發生重大變化。如處理個人資訊的目的、處理的個人資訊類型、個人資訊的使用方式等;

2、我們在控制權等方面發生重大變化。如並購重組等引起的所有者變更等;

3、個人資訊共用、轉讓或公開披露的主要對象發生變化;

4、您參與個人資訊處理方面的權利及其行使方式發生重大變化;

5、我們負責處理個人資訊安全的責任部門、聯絡方式及投訴管道發生變化時;

6、個人資訊安全影響評估報告表明存在高風險時。

九、如何聯繫我們

您可以通過以下方式與我們聯繫,我們將在15天內回復您的請求:

(1)如對本政策內容有任何疑問、意見或建議,您可以通過發送郵件至service@xzhd.onaliyun.com與我們聯繫

(2)如果您對我們的回復不滿意,特別是您認為我們的個人資訊處理行為損害了您的合法權益,您還可以通過向被告住所地有管轄權的法院提起訴訟來尋求解決方案。

Urheberrecht © PRUDENCE INTERACTIVE. Alle Rechte vorbehalten.