Children's Puzzle Brain Teaser Privacy Policy

Updated Date: October 29, 2024

Effective Date: October 29, 2024

Children's Puzzle (hereinafter referred to as "we") attaches great importance to protecting your (your) personal information and privacy. We know that personal information is important to you and will take appropriate security protection measures in accordance with laws and regulations and industry standard practices to protect your personal information. We hope that this privacy policy will clearly introduce how we handle your personal information when using our products/services, and the ways we protect this information.

Please read and fully understand this Privacy Policy carefully before using any of the products/services we provide. By using or continuing to use our products/services, you agree to our handling of your related information according to this privacy policy. If you are a minor under 18 years old (especially under 14 years old), please read this policy under the supervision and guidance of your guardian before using our products/services. After obtaining your guardian's consent to this policy, you may use our products or services and provide your personal information. If you are the guardian of a minor, please carefully read and carefully choose whether to agree to this policy. If you have any questions about the use of our products or services by the minor you are guardian for and the provision of personal information, please contact us through the contact information provided in this policy.

This privacy policy only applies to the personal information we collect from you, as well as the services and functions we provide to you. It does not apply to any third-party collection of your personal information, or the rules for using personal information provided by any third party or any third-party services.

1. The information we collect and use

When you use our related services, we will collect the following data to ensure the normal operation of the software and services, as well as the normal use of third-party payment sharing functions:

1. Proper functioning of the product.

The hardware model, operating system version number, software version number, reading the list of installed applications, network access method and type, operation log information (error information), hardware serial number, device language, device location, user device name, device resolution, current running processes, and setting the clipboard content. Collecting this information helps us understand the problems you encounter while using our product and optimize it.

The device's MAC address, unique device identifiers (IMEI, ANDROID ID, IDFA, OPENUDID, OAID, MEID, and SIM card IMSI information). We need to collect this information when the app first starts up, to confirm your unique identity so that we can provide consistent services for you.

To help us better understand your usage and resolve issues you encounter in our products, we may record network log information, as well as usage frequency, crash data, overall installation, usage, performance data, and other related information.

2. Exceptions to Authorization Consent

According to relevant laws, regulations, and national standards, we may collect and use your relevant personal information without seeking your authorization and consent in the following circumstances:

2.1. To enter into and perform a contract to which you are a party;

2.2. It is necessary for the fulfillment of legal duties or obligations;

2.3. To respond to public health emergencies or in cases of emergency where the life and property of natural persons need to be protected;

2.4. Carry out news reporting and public opinion supervision for the public interest, and handle personal information within a reasonable range.

2.5. Handle personal information that an individual has disclosed or that has otherwise been lawfully made public within reasonable limits;

2.6. Any other circumstances provided for by laws and regulations.

2. How We Share and Disclose Your Personal Information

1. Delegated processing

1.1. We may engage authorized partners to process your personal information to provide you with the relevant products or services. However, we will only share your personal information for legitimate, justified, necessary, specific, and clearly defined purposes, and only share the personal information necessary for providing the products or services. Our app will integrate third-party software development kits (SDKs) to achieve this purpose. If our partners use your personal information for purposes other than those authorized by us, the third party should obtain your consent again.

1.2. Our partners include the following types:

1.2.1. Providers of technical services. We may provide your personal information to third parties that support our functions, including providers of infrastructure technology services, data analysis services, and data processing services.

1.2.2 Advertising and analytics service partners. We will comply with laws and regulations and industry standard security technologies, and entrust these partners with processing information related to advertising placement, coverage, and effectiveness.

1.2.3. For personal information that we entrust to our partner agents, we will sign data protection agreements with them, requiring them to handle personal information in accordance with the agreement, this privacy policy, and relevant laws and regulations.

2. Sharing

We will not share your personal information with any company, organization, or individual except in the following cases:

2.1. Share with others with your explicit authorization or consent. We will share your personal information with others after obtaining your explicit authorization or consent.

2.2. Legally required sharing. We may share your personal information in accordance with laws and regulations, requests from governmental or judicial authorities.

2.3. Shared in the event of mergers, acquisitions, or bankruptcy liquidation. If personal information is transferred, we will require that the new company or organization that holds your personal information be bound by this privacy policy, or we will require that the company or organization obtain your authorization again.

2.4. Shared with affiliated companies. Some of the business functions described in this policy are provided jointly by affiliated companies, so your personal information may be shared between affiliated companies. We will only share the necessary personal information and it will be subject to the stated purposes in this policy.

2.5. Share with authorized partners. In order to enhance the user experience and enable you to receive information, make payments, log in, and share information, our app incorporates software development kits (SDKs) provided by third parties to achieve these goals.

Please note:

(1) The third-party SDK code contains various permissions, but we only allow the SDK to use network access permissions, view WLAN connections, switch network connections, read and write external storage cards, read phone status and identity, retrieve the list of currently running applications, and read installed application lists. We will carefully evaluate, monitor the security assurance capabilities of authorized partners, and require them to comply with the provisions of the cooperation agreement to protect your personal information security.

(2) Third-party SDKs may collect information about your device, including device version, system version, sensor information, generated ID, phone model, phone name, ICCID, BSSID, MAC address, IMSI, IMEI, OAID, Android ID, GUID, OPENUDID, IDFA, MEID, IP address, etc. We will allow third-party SDKs to collect your personal information after you agree to this privacy policy. These SDKs may collect this information while your app is running in the foreground or background.

(3) If you use such services provided by third parties in the Children's Puzzle, you agree that they will directly collect and process your personal information. The collection and processing of personal information by the third party should comply with their own personal information protection policy. In order to maximize the security of your information, we recommend that you review the privacy policy of any third-party SDK service before using it.

SDK Name: Yunmeng Statistic

Shared Information: IMEI, MEID, ICCID, Mac, Android ID, IDFA, OPENUDID, GUID, SIM IMSI, device serial number (SN code)

The purpose of information sharing: for data statistics.

Information Sharing Party: Youmeng Tongxin (Beijing) Technology Co., Ltd.

Privacy Policy link: https://www.umeng.com/policy

The included permission codes: view WLAN connections, use Bluetooth, get approximate location, get precise location, camera, read external storage card, read phone status and identity, write to external storage card, retrieve currently running applications, and get a list of installed applications.

SDK Name: WeChat Open SDK

SDK Type: Login and Payment

The usage scenarios of the SDK: users can choose to log in via WeChat when using it.

Required user information fields for SDK: device model, system version, phone model, OPENUDID, OAID, IMEI, MAC address (will also retrieve user's MAC information in the background/silent mode), Android ID, location information (including approximate geographic information and precise location information for the purpose of providing a convenient and fast login channel for the app).

Note: User's MAC information will also be retrieved in the background/silent mode.

SDK Name: com.alipay (Alipay | mPaaS | Alipay Ride Code | Sesame Authentication | Real Person Authentication)

SDK Type: Payment

SDK usage scenarios: Alipay payment

The required user information fields for SKD: changeable unique device identifier, basic device information, software installation list, and network information.

The purpose of information sharing: payment.

Information Sharing Party: Alipay (China) Network Technology Co., Ltd.

Privacy Policy link: https://opendocs.alipay.com/common/02kiq3

Use for: Purchasing goods in a shopping mall

3. Public disclosure

We may disclose your personal information under the following circumstances and only if we take appropriate security measures consistent with industry standards:

3.1. We will disclose your personally identifiable information in accordance with your instructions and in the manner you have agreed to, subject to your explicit consent.

3.2. In cases where we are required by law, regulation, or by forceful administrative enforcement or judicial requirements to provide your personal information, we may disclose your personal information publicly in accordance with the type and disclosure method of the personal information required. Under the premise of compliance with laws and regulations, when we receive such a request for disclosure of personal information, we will require the corresponding legal documents, such as subpoenas or investigation letters.

III. Cookies

What are Cookies?

When you use our products, we will store small data files called Cookies on your computer or mobile device. These usually contain identifiers, site names, and some numbers and characters. When you log in, with the help of Cookies, we can identify whether you are one of our users each time you use our products. We can also enable direct navigation from one page to another without having to log in again on each page. Website beacons, pixels, or other similar files can do the same thing. In this policy, we use the term "Cookies" to refer to all files that collect information in this way.

2. How we use Cookies

We use cookies to determine whether you have logged in without having to log in on every page, record the pages you have browsed so that you can browse more quickly and conveniently next time and improve service quality and optimize the user experience. We also enable support for security functions through cookies, monitor and prevent suspicious activities, fraudulent traffic, and behaviors that violate our user agreement. We will not use cookies for any other purpose other than those described in this policy.

IV. Personal Information Security Protection

1. To enhance the security of your use of our services, we continuously improve our technical means to strengthen the security capabilities of the software installed on your device to prevent your personal information from being leaked. We have established special management systems, processes, and organizations to ensure the security of information. Currently, we have passed the evaluation and filing for the third-level network security protection (level 3) of the State. We will do our best to protect your personal information, but please understand that no security measures can be foolproof.

2. We strive to provide security for users' information to prevent leaks, loss, improper use, unauthorized access, and disclosure of information. We use multi-faceted security protection measures to ensure that users' personal information is protected at a reasonable security level, including technical protection measures, management control measures, and security system assurance in many aspects. At the same time, we adopt industry-leading technical protection measures. The technical means we use include but are not limited to firewalls, encryption (such as SSL), de-identification or anonymous processing, access control measures, etc. In addition, we will continuously enhance the security capabilities of the software installed on your device. For example, we will complete part of the information encryption work locally on your device to reinforce the secure transmission; we will obtain information about the installed applications and running processes on your device to prevent viruses, trojans and other malicious programs.

3. After a personal information security incident occurs, we will immediately establish a special emergency response team and activate the emergency plan to prevent the security incident from escalating. We will also comply with relevant laws and regulations and inform you in a timely manner: the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, your suggestions for independently preventing and reducing risks, and the remedial measures we will take for you. We will promptly inform you of the relevant situation by email, letter, phone, or push notification. When it is difficult to inform individual information subjects one by one, we will take reasonable and effective measures to issue a public notice. At the same time, we will report the handling situation of personal information security incidents to the supervisory authorities as required.

5. The location and duration of storage of the information.

1. The location where information is stored.

The storage location is within the People's Republic of China. At present, we do not transmit or store your personal information across borders. In the future, if we need to transmit or store personal information across borders, we will comply with Article 38 of the Personal Information Protection Law and inform you of the purpose, recipient, security protection measures, and security risks of the information going abroad, and obtain your consent.

2. Duration of Information Storage

2.1. We will only retain your personal information for the period necessary to achieve the purpose, as prescribed by law. After the expiration of the retention period, we will delete or anonymize your personal information, unless otherwise required by national laws, regulations, rules and normative documents, or government policies, orders, etc., or unless we need to retain your personal information to fulfill our compliance obligations.

6. Protection of Personal Information of Minors

1. We place a high priority on protecting the personal information of minors. Our website and services are primarily aimed at minors. Parents or guardians, please read this privacy policy carefully and agree to it before allowing your child to use our services.

2. In the case of collecting personal information of minors through the use of our products or services with the consent of parents or guardians, we will only use, share, transfer, or disclose this information as permitted by laws and regulations, with the explicit consent of parents or guardians, or as necessary to protect minors.

If we find that we have collected personal information of minors without obtaining verifiable consent from their parents or legal guardians in advance, we will try our best to delete the relevant data as soon as possible.

4. If you need more information about children's information protection, please refer to the "Guidelines for Children's Privacy Protection" for details

7、 Your rights

Complaints Report

You can file a complaint or report according to our publicized system. If you believe that your personal information rights may be infringed, or if you discover clues of infringement of your personal information rights (such as believing that our collection of your personal information violates legal regulations or mutual agreements), you can contact us by clicking on the contact button, finding the email address, and sending an email.

8、 Notification and Revision

To provide you with better service, our business will change from time to time, and this privacy policy will also be adjusted accordingly. Without your explicit consent, we will not reduce the rights you are entitled to under this privacy policy. We will notify you of updates to relevant content by posting updated versions on our website or mobile devices, or by other means. Please also visit us to stay up-to-date with the latest privacy policy. In the aforementioned circumstances, if you continue to use our services, you agree to accept and be bound by the revised policy.

9、 Contact Us

If you have any complaints or reporting needs regarding our personal information processing behavior, you can contact our personal information protection officer through the following methods. We will respond to your request within 15 working days of verifying your identity and make every effort to resolve it:

Send an email to support@fyanteck.com

Mail the letter to the following company address:

Company Name: Hangzhou Fuyan Information Technology Co., Ltd

Registered address: Room H5-7, Building 146, No. 166 Lishui Road, Gongshu District, Hangzhou City, Zhejiang Province