This policy applies only to the CoulChoice App product and related services of Shenzhen QuXin Tiaodong Technology
    Co., Ltd.
    
    
Last updated: March 20, 2024
    
    
Effective date: March 20, 2024
    
    
If you have any questions, comments, or suggestions regarding this policy or related matters, you can contact
    us through the following contact information or other various contact methods provided by the platform:
    
    
Data Protection Officer's email: QXtd0328@163.com
    
    
This Privacy Policy will help you understand the following:
    
    Introduction
    
    1. How we collect and use your personal information
    
    2. How we entrust, share, transfer, and publicly disclose your personal information
    
    3. How we protect your personal information
    
    4. Your rights
    
    5. How we handle personal information of minors
    
    6. How we store your personal information
    
    7. Revision and notification of privacy policies
    
    8. How to contact us
    
    9. Scope of application
    
    
    
    
Shenzhen QuXin Tiaodong Technology Co., Ltd. (referred to as "we") is well aware of the importance of personal
    information to you, and we will fully protect your personal information and privacy in accordance with the
    provisions of laws and regulations. We are committed to maintaining your trust in us and adhere to the principles of
    consistency between rights and responsibilities, clear purposes, choice and consent, minimal necessity, security
    assurance, subject participation, openness and transparency, etc. At the same time, we promise that we will adopt
    corresponding security protection measures to protect your personal information according to mature industry
    security solutions.
    
    
We hope that before using our products and related services, you will carefully read and thoroughly understand
    this Privacy Policy in order to make appropriate choices. 
    
    
    
Introduction
    
    
We strictly keep the user information we collect confidential and establish a sound system for protecting user
    information to provide reliable and trustworthy services for each user:
    
    
1. Clear and explicit
    
    
We will explain the privacy policy in plain and understandable language as much as possible, so that you can
    have a clearer understanding of how we protect and handle the information we collect.
    
    
2. Safeguarding rights and interests
    
    
We will take sufficient and reasonable measures to protect your privacy rights and interests.
    
    
3. Respecting users
    
    
We respect the freedom of users to exercise their rights, such as the right to choose and the right to be
    informed, and allow you to manage your personal information.
    
    
4. Necessary security
    
    
We will only collect necessary information and use this information to provide you with secure and detailed
    services.
    
    
5. Timely and thoughtful
    
    
We will listen to your inquiries at any time and provide prompt answers to your questions.
    
    
We hope you carefully read the "Privacy Policy" (referred to as "this policy") to understand in detail how we
    collect and use information, so that you can better understand our services and make choices that truly reflect your
    intentions. If you have any questions, please contact us.
    
    
1. How we collect and use your personal information
    
    
    
In order to provide you with a better product and service experience, we are continuously improving our
    technology. As a result, we may occasionally introduce new or optimized features that may require the collection and
    use of new personal information or a change in the purpose or method of using personal information. In this case, we
    will explain to you the purpose, scope, and use of the corresponding information through methods including but not
    limited to updating this policy and page prompts, and provide you with a voluntary choice to agree. We will collect
    and use the information only after obtaining your explicit consent. During this process, if you have any questions,
    comments, or suggestions, you can contact us through various contact methods provided by us, and we will answer them
    as soon as possible.
    
    
The types of personal information we collect and the rules for collecting and using personal
      information are as follows:
    
    
1. When you publish image content or make comments, we will collect the information you published and display
    your nickname, avatar, published content, and information.
    
2. When you use the image publishing function, we will request your authorization for camera, photo,
      microphone, and view network status permissions. If you refuse to authorize this, you will not be able to
    use this function, but it will not affect your normal use of other functions.
    
3. When you choose to establish a follow-up relationship with someone you are interested in, we will collect
    service log information including your following relationship and sharing history to achieve the above functions and
    other purposes that we explicitly inform you of.
    
    
(4) For the Purpose of Providing Security Functions
    
    
To provide you with a more secure and trustworthy product and usage environment, and to provide high-quality,
    reliable services and information, we will collect information about your usage of products or services and how you
    use them, and correlate this information. This information includes:
    
    
1. Device Information:
    
During your use of the platform, in order to provide you with services that better meet your needs,
    interaction displays, search results, recognition of abnormal account states, maintenance of normal platform
    operations, and protection of your account security, we will receive and record specific permissions granted by you
    during software installation and use for device-related information (including device model, hardware serial
      number, operating system version, setting parameters, device configuration, International Mobile Station Equipment
      Identity (IMSI), Unique Device Identifier (IMEI, OAID, AndroidID), network device hardware address (MAC address),
      device network information, device environment software and hardware feature information, WLAN access point,
      Bluetooth, base station, access network type and status, network quality data, and device location-related
      information (IP address, geographic location information). Because the services we provide are based on
    geolocation-based mobile social services, you confirm that the successful registration of the "Platform" account is
    considered as confirming that we are authorized to extract, disclose and use your IP address information.
    
2. Log Information:
    
When you use the products or services provided by our website or client, we will automatically collect
    detailed usage information about our products or services as a network log save. This includes browsing,
      clicking to view and searching for query content, following and sharing information, posting information, and IP
      address, browser type, carrier information, language used, access date and time, and web pages visited.
    Please note that individual device information and log information are not personal information that can identify
    specific individuals. Therefore, if we combine this information with other information to identify specific
    individuals or use it in combination with personal information, during the period of combined use, this type of
    information will be regarded as personal information. Except as authorized by you or as required by law and
    regulations, we will anonymize and de-identify such personal information.
    
3. When you contact us, we may save your communication/call records and content or the contact
      information you leave in order to contact you or help you solve problems. We may also record the
    solutions and results related to the relevant issues.
    
4. In order to improve the security of your use of our services and services provided by affiliated companies
    and partners, protect your or other users' or the public's personal and property safety from infringement, better
    prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions,
    etc., more accurately identify violations of laws and regulations or platform-related agreement rules, we may use or
    integrate your user information, transaction information, device information, relevant network logs, and
      information shared with affiliated companies or partners that have obtained your authorization or according to
      law, and then comprehensively judge the transaction risks of your account, conduct identity verification,
    detect and prevent security incidents, and take necessary record-keeping, auditing, analysis, and disposal measures
    in accordance with the law.
    
5. Please note that as our business develops, Platform's functions and services may be adjusted. In principle,
    when new functions or services are related to our current functions or services, the personal information collected
    and used will have a direct or reasonable relationship with the original processing purpose. In scenarios where
    there is no direct or reasonable relationship with the original processing purpose, we will inform you again of the
    collection and use of your personal information and obtain your consent.
    
    
(5) Other Purposes
    
    
1. If the information you provide contains other users' personal information, you must ensure that you have
    obtained legal authorization before providing this personal information to the platform.
    
2. If we use information for other purposes not mentioned in this policy, or use information collected for
    specific purposes for other purposes, or actively obtain your personal information from third parties, we will
    obtain your consent in advance.
    
3. If we indirectly obtain your information from a third party, we will explicitly require the third party in
    writing to collect the information after obtaining your consent in accordance with the law, and inform you of the
    shared information content. For sensitive information, we will require your explicit confirmation before providing
    it for our use. We will ask the third party to make a commitment on the legality and compliance of the personal
    information source. If the third party violates this commitment, we will explicitly request the third party to bear
    corresponding legal responsibilities; at the same time, our professional security team will protect personal
    information (including sensitive information grading classification, access control for sensitive information use,
    encryption storage for sensitive information, etc.). We will use protection measures and methods that are no less
    than those used for protecting personal information of our own users for indirectly obtained personal information.
    
4. Explanation of platform APP device permission requests:
    
    
Read phone state permission: When you run the Android version of the platform APP, we will
    request this permission to facilitate calling customer service. If you refuse, you can choose to turn off this
    permission.
    
    
Read and write external storage permission: When you use the avatar setting or send pictures
    in the Android version of the platform APP, you can use or save pictures or files by enabling storage permissions.
    If you do not enable this permission, you will not be able to use functions related to reading or caching storage
    cards, but it does not affect your use of other services.
    
    
Album permission: When you use the avatar setting or send pictures in the Android or iOS
    version of the platform APP, you can upload pictures from your device by opening album permissions. If you do not
    enable this permission, you will not be able to use functions related to uploading and sending pictures, but it does
    not affect your use of other services.
    
    
Camera permission: When you use the avatar setting or send pictures in the Android or iOS
    version of the platform APP, you can take real-time photos and upload them to set avatars or send pictures by
    opening camera permissions. If you do not enable this permission, you will not be able to use functions related to
    taking pictures, but it does not affect your use of other services.
    
    
Location permission: When you use the remote control function in the Android or iOS version
    of the platform APP, you can view the approximate distance between the remote control parties by opening location
    permissions. If you do not enable this permission, you will not be able to use this function, but it does not affect
    your use of other services.
    
    
Microphone permission: When you use the voice service in the Android or iOS version of the
    platform APP, you can record personal profile voice messages, send voice messages, or make voice calls by enabling
    microphone permissions. If you do not enable this permission, you will not be able to use functions related to voice
    input, but it does not affect your use of other services.
    
    
Bluetooth permission: When you use the Android or iOS version of the platform APP, we will
    obtain this permission to connect the application to the CoulChoice intelligent device and provide you with the function
    of directly controlling the device. If you do not enable this permission, you will not be able to use this function,
    but it does not affect your use of other services.
    
    
View network state permission: When you use the Android or iOS version of the platform APP,
    we will obtain this permission to view all network states, such as existing and connected networks. If you do not
    enable this permission, you will not receive timely notifications of changes in network status, but it does not
    affect your use of other services.
    
    
You understand and agree that the above services may require you to enable access to your location
      information (geographic location), camera, album and storage, microphone (voice), phone status, and network
      status on your device to collect and use information related to these permissions. You can check the
    status of these permissions in the "Settings-App Permissions" of your mobile phone, and you can decide to turn them
    on or off at any time. Please note that when you enable any permission, you authorize us to collect and use relevant
    personal information to provide you with corresponding services. Once you turn off any permission, you cancel the
    authorization, and we will no longer collect and use relevant personal information based on the corresponding
    permission, and we will be unable to provide the service corresponding to that permission. However, your decision to
    turn off permissions will not affect the information collection and use based on your previous authorization.
    
    
You understand and agree that the functions and service scenarios we provide to you are constantly being
    upgraded. If we do not expressly state the personal information that needs to be collected in the above scenarios,
    we will provide you with another prompt or obtain your consent through page prompts or interactive design to clearly
    indicate the content, scope, and purpose of information collection.
    
    
Android operating system application permission request and usage instructions:
    
To ensure the safe and stable operation of CoulChoice intelligent devices, we may apply for or use relevant
    operating system permissions of the Android system. To protect your right to know, we will display and explain the
    relevant operating system permissions that the product may apply for or use through the following content, and you
    can manage the relevant permissions according to your actual needs:
    
    
1. Access network
    
android.permission.INTERNET
    
• Permission function description: access network connection, which may generate GPRS traffic.
    
    
2. Recording
    
android.permission.RECORD_AUDIO
    
• Permission function description: record sound through the microphone of the phone or headset.
    
    
3. Get network status
    
android.permission.ACCESS_NETWORK_STATE
    
• Permission function description: get the network information status, such as whether the current network
    connection is valid.
    
    
4. Get Wi-Fi status
    
android.permission.ACCESS_WIFI_STATE
    
• Permission function description: get the current Wi-Fi access status and information about WLAN hotspots.
    
    
5. Change Wi-Fi status
    
android.permission.CHANGE_WIFI_STATE
    
• Permission function description: change Wi-Fi status.
    
    
6. Wake lock
    
android.permission.WAKE_LOCK
    
• Permission function description: allow the program to continue running in the background after the phone
    screen is turned off.
    
    
7. Modify sound settings
    
android.permission.MODIFY_AUDIO_SETTINGS
    
• Permission function description: modify sound setting information.
    
    
8. Auto startup on boot
    
android.permission.RECEIVE_BOOT_COMPLETED
    
• Permission function description: allow the program to automatically run on boot.
    
    
9. Write external storage
    
android.permission.WRITE_EXTERNAL_STORAGE
    
• Permission function description: allow the program to write to external storage, such as writing files to an
    SD card.
    
    
10. Use vibration
    
android.permission.VIBRATE
    
• Permission function description: allow vibration.
    
    
11. Make phone calls
    
android.permission.CALL_PHONE
    
• Permission function description: allow the program to enter phone numbers from a non-system dialer.
    
    
12. Camera permission
    
android.permission.CAMERA
    
• Permission function description: allow access to the camera for taking photos and videos.
    
    
13. Use Bluetooth
    
android.permission.BLUETOOTH
    
• Permission function description: allow the program to connect to paired Bluetooth devices.
    
    
14. Bluetooth management
    
android.permission.BLUETOOTH_ADMIN
    
• Permission function description: allow the program to discover and pair new Bluetooth devices.
    
    
15. Get accurate location
    
android.permission.ACCESS_FINE_LOCATION
    
• Permission function description: receive satellite location information through GPS chips, with an accuracy
    of within 10 meters.
    
    
16. Get Task Information
    
android.permission.GET_TASKS
    
• Permission Function Description: Allows the application to get the current or recently run applications.
    
    
17. Modify System Settings
    
android.permission.WRITE_SETTINGS
    
• Permission Function Description: Allows the application to read and write system settings.
    
    
18. Get Device Identification Code
    
android.permission.READ_PHONE_STATE
    
• Permission Function Description: Allows access to the device identification code (including IMEI/Android
    ID/IDFA/IDFV/OPEN UDID/GUID/OAID/MEID, advertising ID, SIM card phone number, IMSI, ICCID, device serial number) in
    order to provide related services such as identifying carriers and binding devices.
    
    
iOS Operating System Application Permission Request and Usage Instructions
    
    
To ensure the safe and stable operation of CoulChoice smart devices, we may request or use relevant permissions of
    the iOS system. To protect your right to know, we provide the following explanations of the permissions that the
    product may request and use. You can manage the relevant permissions according to your actual needs:
    
    
1. NSBluetoothAlwaysUsageDescription
    
• Permission Function Description: Use Bluetooth functionality to connect to Bluetooth devices.
    
    
2. NSBluetoothPeripheralUsageDescription
    
• Permission Function Description: Use Bluetooth functionality to connect to Bluetooth devices (compatible
    with versions prior to iOS 13).
    
    
3. NSCameraUsageDescription
    
• Permission Function Description: Use the camera.
    
    
4. NSLocationAlwaysUsageDescription
    
• Permission Function Description: Allow the app to always access the geographic location.
    
    
5. NSLocationUsageDescription
    
• Permission Function Description: Allow the app to access the geographic location.
    
    
6. NSLocationWhenInUseUsageDescription
    
• Permission Function Description: Only obtain the geographic location when the app is in use.
    
    
7. NSMicrophoneUsageDescription
    
• Permission Function Description: Use the microphone.
    
    
8. NSPhotoLibraryAddUsageDescription
    
• Permission Function Description: Add content to the photo library.
    
    
9. NSPhotoLibraryUsageDescription
    
• Permission Function Description: Read content from the photo library.
    
    
Exceptions to Obtaining Authorized Consent
    
    
You fully understand and agree that we may collect and use your personal information without your authorized
    consent under the following circumstances, and we may not agree to your requests for correction/modification,
    deletion, cancellation, withdrawal of consent, or information retrieval:
    
    
1. Related to national security and defense.
    
    
2. Related to public safety, public health, or major public interests.
    
    
3. Related to criminal investigations, prosecutions, trials, and enforcement of judgments.
    
    
4. Necessary for the protection of the vital interests of individuals or other individuals, but it is
    difficult to obtain your personal consent.
    
    
5. The collected personal information is voluntarily made public by you.
    
    
6. Collected from legally disclosed information, such as legal news reports, government information disclosure
    channels, etc.
    
    
7. Necessary for signing a contract at your request.
    
    
8. Necessary for ensuring the safe and stable operation of the provided products or services, such as
    discovering and handling product or service faults.
    
    
9. Necessary for legitimate news reporting.
    
    
10. Necessary for academic research institutions to carry out statistics or academic research based on public
    interests, and when providing academic research or describing results to the public, the personal information
    included in the results is de-identified.
    
    
11. Other circumstances as stipulated by laws and regulations.
    
    
Please be aware that according to applicable laws, if we take technical measures and other necessary measures
    to process personal information so that the data recipient cannot re-identify specific individuals and cannot
    restore it, or if we may de-identify the collected information for research, statistical analysis, and prediction,
    to improve the platform's content and layout, provide support for business decisions, and improve our products and
    services (including using anonymous data for machine learning or model algorithm training), such use of the
    processed data does not require separate notification and your consent.
    
    
If we cease the operation of the platform product or service, we will promptly stop any further collection of
    your personal information, and notify you of the cessation of operation through individual notifications or
    announcements. We will delete or anonymize the personal information we hold.
    
How do we entrust the processing, sharing, transfer, and public disclosure of your personal
      information?
    
    
(1) Entrusted Processing
    
    
Certain modules or functions of the platform are provided by external suppliers. For specific details, please
    refer to Chapter 10 of this policy, "SDK Technical Specifications." We will require companies, organizations, or
    individuals entrusted with the processing of personal information to handle your personal information in accordance
    with our requirements, this personal information protection policy, and any other relevant confidentiality and
    security measures.
    
    
(2) Sharing
    
    
We will not share your personal information with companies, organizations, and individuals other than
      platform service providers, except in the following circumstances:
    
    
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal
    information with other parties.
    
    
Currently, our authorized partners include the following types:
    
    
Authorized partners in advertising and analytics services. Without your permission, we will not share your
    personal identity information with partners who provide advertising and analytics services. We will entrust these
    partners to process information related to advertising coverage and effectiveness, but we will not provide your
    personal identity information, or we will de-identify this information so that it does not identify you personally.
    These partners may combine the above information with other data lawfully obtained by them to perform the
    advertising services or decision recommendations entrusted by us:
    
    
①Personal information types shared in advertising: nickname, avatar
    
    
②Personal information types shared by analytics service providers: gender, age, location
    
    
We will conduct strict security checks on application programming interfaces (APIs) and software development
    kits (SDKs) used by authorized partners to obtain relevant information. We will also agree with authorized partners
    on strict data protection measures to ensure that they handle personal information in accordance with our
    commissioned purposes, service descriptions, this privacy policy, and any other relevant confidentiality and
    security measures.
    
    
(3) Transfer
    
    
We will not transfer your personal information to any company, organization, or individual, except in the
    following circumstances:
    
    
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal
    information to other parties.
    
    
2. In the event of a merger, acquisition, bankruptcy liquidation, or other situations involving merger,
    acquisition, or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new
    company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will
    require the company, organization, or individual to seek your authorization and consent again.
    
    
(4) Public Disclosure
    
    
We will only publicly disclose your personal information in the following circumstances:
    
    
1. With your explicit consent or authorization;
    
    
2. If we determine that you have violated laws, regulations, or platform-related agreement rules, or if it is
    necessary to protect the personal and property safety of the platform, its affiliated companies, users, or the
    public, we may disclose your personal information under the circumstances where you have given your consent in
    accordance with laws, regulations, or platform-related agreement rules. This includes relevant violations and the
    measures that the platform has taken against you.
    
    Exceptions to the prior authorization for sharing, transferring, and publicly disclosing personal
      information
    
    
The following circumstances do not require your prior authorization for sharing, transferring, or publicly
    disclosing your personal information:
    
    
1. Related to national security and defense;
    
    
2. Related to public safety, public health, and significant public interests;
    
    
3. Related to criminal investigations, prosecutions, trials, and enforcement of judgments;
    
    
4. Necessary for the protection of your or other individuals' vital interests, but it is difficult to obtain
    your consent;
    
    
5. Personal information that you voluntarily disclose to the public;
    
    
6. Collecting personal information from legally disclosed information, such as lawful news reports, government
    information disclosure, and other channels.
    
    
According to legal provisions, if we use technical measures and other necessary measures to process personal
    information in a way that the data recipient cannot re-identify specific individuals and cannot be restored, the
    sharing, transfer, and public disclosure of such processed data do not require separate notification and consent
    from you.
    
    
How We Protect Your Personal Information
    
    
We have implemented industry-standard security measures to protect the personal information you
      provide, prevent unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take
      all reasonable and feasible measures to protect your personal information.
    
    
1. We will use encryption technology, anonymization processing, and other reasonably feasible methods not
    lower than industry peers to protect your personal information and use security protection mechanisms to prevent
    malicious attacks on your personal information.
    
    
2. We will establish dedicated security departments, security management systems, and data security processes
    to ensure the security of your personal information. We have strict data usage and access systems to ensure that
    only authorized personnel can access your personal information.
    
    
3. Despite having taken the above reasonable and effective measures and complied with the standards required
    by relevant laws and regulations, please understand that due to technological limitations and possible malicious
    means, in the internet industry, even with the best efforts to strengthen security measures, it is impossible to
    guarantee 100% security of information. We will do our best to ensure the security of the personal information you
    provide to us.
    
    
4. You understand and acknowledge that the systems and communication networks you use to access our services
    may encounter problems beyond our control. Therefore, we strongly recommend that you take proactive measures to
    protect the security of personal information, including using complex passwords, regularly changing passwords, and
    not disclosing your account passwords and related personal information to others.
    
    
5. We will formulate emergency response plans and immediately initiate them in the event of a user information
    security incident, striving to prevent the impact and consequences of such security incidents. Once a user
    information security incident (leakage or loss) occurs, we will promptly notify you in accordance with the
    requirements of laws and regulations, including the basic situation and possible effects of the security incident,
    the measures we have taken or will take to deal with it, suggestions for you to prevent and reduce risks, and
    remedies for you. We will inform you of the event-related information through push notifications, emails, letters,
    text messages, and other forms. When it is difficult to notify each individual, we will make reasonable and
    effective announcements. At the same time, we will report the disposal of user information security incidents to the
    relevant regulatory authorities as required.
    
    
Our Data Security Capabilities
    
    
1. Content Security: We have purchased third-party services, including:
    Using Alibaba Cloud to improve our content security storage and protection capabilities.
    
    
2. Data Security: We use Alibaba Cloud services to ensure basic data security services. Additionally, for user
    privacy data, we encrypt it using international standard encryption methods to further protect data storage.
    
    
3. Access Security: All requests are transmitted using HTTPS, and authorization access mechanisms are added to
    the business.
    
    
We will take all reasonable and feasible measures to ensure that we do not collect irrelevant
      personal information. We will only retain your personal information for the period necessary to achieve the
      purposes stated in this policy, unless an extension of the retention period is required or permitted by
      law.
    
    
The internet environment is not completely secure, and we will do our utmost to ensure or
      guarantee the security of the information you send to us. If our physical, technical, or managerial protective
      facilities are compromised, resulting in unauthorized access, public disclosure, tampering, or destruction of
      information, and causing damage to your legitimate rights and interests, we will assume corresponding legal
      responsibilities.
    
    
If you discover that your personal information, especially your account or password, has been
      leaked, please immediately contact platform customer service so that we can take appropriate measures according to
      your request.
    
    Four, Your Rights
    
    
In accordance with the relevant laws, regulations, and prevailing practices in China, we guarantee your rights
    to exercise the following rights regarding your personal information.
    
    
(1) Access to Your Personal Information
    
    
You have the right to access your personal information, except for exceptions stipulated by laws and
    regulations. If you want to exercise the right of data access, you can access it by:
    
    
Personal Profile – If you want to access or edit your personal profile, including nickname,
      constellation, age, address, etc., you can perform such operations through the "Personal Profile" section
    on the personal homepage after logging into your account.
    
    
Dynamic Information – You can access or clear your dynamic posting history through the "Community" section
    after logging into your account.
    
    
If you are unable to access your personal information through the above paths, you can contact us through
    platform customer service at any time. We will review the relevant issues as soon as possible and reply to your
    access request within 15 working days after verifying your user identity by a dedicated person.
    
    
(2) Correction of Your Personal Information
    
    
When you find errors in the personal information we handle about you, you have the right to request
    correction. You can submit a correction application through the methods specified in "(1) Access to Your Personal
    Information" above.
    
    
If you are unable to access your personal information through the above paths, you can contact us through
    platform customer service at any time. We will review the relevant issues as soon as possible and reply to your
    access request within 15 working days after verifying your user identity by a dedicated person.
    
    
(3) Deletion of Your Personal Information
    
    
You can delete part of your personal information through the methods specified in "(1) Access to Your Personal
    Information" above. In the following situations, you may request us to delete personal information:
    
    
1. If our handling of personal information violates laws and regulations;
    
    
2. If we collect and use your personal information without obtaining your explicit consent;
    
    
3. If our handling of personal information seriously violates the agreement with you;
    
    
4. If you no longer use our products or services, or you voluntarily cancel your account;
    
    
5. If we no longer provide products or services to you.
    
    
If we decide to respond to your deletion request, we will also notify the entities that have obtained your
    personal information from us to promptly delete it, unless otherwise provided by laws and regulations or unless
    these entities have obtained your independent authorization.
    
    
After you delete your personal information from our products or services, we may not immediately delete the
    corresponding information from the backup system in accordance with legal requirements, but we will delete this
    information when the backup is updated.
    
    
(4) Change the Scope of Your Authorized Consent
    
    
1. You can turn off permissions such as location, camera, microphone, album access through
    the operating system of your device to change the scope of consent or revoke your authorization. After revoking the
    authorization, we will no longer collect information related to these permissions. You can also revoke the
    authorization by canceling your account.
    
    
2. Certain business functions and services require your information to be completed. When you revoke your
    consent or authorization, we will no longer be able to provide you with the corresponding functions and services and
    will no longer process your relevant personal information. However, your decision to revoke consent or authorization
    will not affect the processing of personal information based on your previous authorization.
    
    
(5) Account Cancellation by the Subject of Personal Information
    
    
You can cancel your account by going to "Settings" - "Account Cancellation". Before you cancel your account,
    we will verify your personal identity, security status, and device information. For the process and content of
    account cancellation, please refer to the prompts on the cancellation page. You understand and agree that the act of
    canceling your account is irreversible. After you cancel your account, we will delete relevant information about you
    or anonymize it, except as otherwise provided by laws and regulations.
    
    
(6) Personal Information Subject Obtaining a Copy of Personal Information
    
    
You have the right to obtain a copy of your personal information. If you need to obtain a copy of the personal
    information collected by us, you can contact us. The customer service representative will verify your personal
    information and submit the copy of your personal information to you through online customer service. On the premise
    of complying with relevant legal provisions and technical feasibility, we will provide you with a copy of your
    personal information according to your request.
    
    
Constraints on Automated Decision-Making in Information Systems
    
    
In certain business functions, we may make decisions solely based on non-human automated decision-making
    mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate
    rights and interests, you have the right to request an explanation from us, and we will provide appropriate
    remedies.
    
    
Complaints and Reports
    
    
If you believe that your personal information rights may have been infringed upon or if you discover any clues
    regarding the infringement of personal information rights, you can click on the other party's avatar or more options
    in the information flow or dialogue box to provide relevant information for reporting. We will verify and handle
    your complaints and reports within 15 working days. If you are not satisfied with the results, you can also initiate
    a complaint through platform customer service. We may refuse requests that are unfounded, pose risks to the
    legitimate rights and interests of others, or are highly impractical. In the following circumstances, in accordance
    with legal requirements, we will be unable to respond to your requests:
    
    
1. Related to the obligations of the personal information controller under laws and regulations;
    
    
2. Directly related to national security and defense;
    
    
3. Directly related to public safety, public health, and major public interests;
    
    
4. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;
    
    
5. Where the personal information controller has sufficient evidence to demonstrate subjective malice or
    abusive exercise of rights by the personal information subject;
    
    
6. In order to protect the life, property, and other major legitimate rights and interests of the personal
    information subject or other individuals, but it is difficult to obtain consent from the individual concerned;
    
    
7. Responding to the personal information subject's request would cause serious harm to the legitimate rights
    and interests of the personal information subject or other individuals or organizations;
    
    
8. Involving trade secrets.
    
    
How We Handle Personal Information of Minors
    
    
Our products, websites, and services are intended for adults aged 18 and above. Any minors under the age of 18
    are not allowed to create their own user accounts or use our services. If we discover or verify any minors
    registering or using our products, we will take measures such as account cancellation and information deletion to
    prohibit or restrict the use by minors.
    
    
How We Store Your Personal Information
    
    
(1) In accordance with the provisions of laws and regulations, we store your personal information collected
    and generated during the operation within the territory of the People's Republic of China. Currently, we do not
    transfer the aforementioned information overseas. If we do transfer information overseas, we will follow relevant
    national regulations or seek your consent.
    
    
(2) We only retain your personal information for the period necessary to provide the "platform" and services:
    
    
We will retain relevant information during the period when you have not withdrawn, deleted, or canceled your
    account. After the necessary period, we will delete or anonymize your personal information, except as otherwise
    provided by laws and regulations.
    
    
    
    
Revision and Notification of Privacy Protection Policy
    
    
In order to provide you with better services, the platform and related services will be updated and changed
    from time to time. We will revise this privacy policy in a timely manner. These revisions constitute part of this
    privacy protection policy and have the same effect as this privacy policy. Without your explicit consent, we will
    not reduce the rights you are entitled to under the current effective privacy policy.
    
    
After the update of this privacy protection policy, we will release the updated version on the platform and
    remind you of the updated content in an appropriate manner so that you can timely understand the latest version of
    this privacy policy.
    
    
For significant changes, we will also provide more prominent notifications (including sending notifications
    via SMS to explain the specific changes to the personal information protection policy) where applicable.
    
    
Major changes referred to in this policy include but are not limited to:
    
    
1. Significant changes in our service mode, such as the purpose of processing personal information, types of
    personal information processed, and ways personal information is used;
    
    
2. Significant changes in our ownership structure, organizational structure, etc., such as business
    adjustments, bankruptcy and mergers causing changes in ownership, etc.;
    
    
3. Major changes in the main objects with whom personal information is shared, transferred, or publicly
    disclosed;
    
    
4. Significant changes in your rights regarding participation in the processing of personal information and
    how these rights are exercised;
    
    
5. Changes in the department responsible for the security of personal information, contact methods, and
    complaint channels;
    
    
6. When the personal information security impact assessment report indicates high risks.
    
    How to Contact Us
    
    
If you have any questions or suggestions regarding this policy or related matters, we have established a
    dedicated department for the protection of personal information. You can contact us through the following complaint
    channels:
    
    
Personal Information Protection Officer's Email: QXtd0328@163.com
    
    
We will handle and respond to your complaints properly and promptly within 15 working days after verifying
    your user identity.
    
    
If you are not satisfied with our response, especially if you believe that our handling of personal
    information has harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit with
    the court having jurisdiction over the defendant's domicile.
    
    
Nine, Scope of Application
    
    
This privacy policy applies to all services provided by CoulChoice. However, please note that this privacy policy
    does not apply to services provided by other companies or individuals, and those services are subject to the privacy
    policies of the respective companies or individuals.