1 Star 0 Fork 0

ala/sclanai

Create your Gitee Account
Explore and code with more than 13.5 million developers,Free private repositories !:)
Sign up
文件
Clone or Download
yinsi 18.64 KB
Copy Edit Raw Blame History
ala authored 2025-10-17 12:10 +08:00 . update yinsi.
Privacy Policy
This policy is closely related to the software or services you use from us. When you download, install, launch, log in, and use our software or services,
we will process and protect your personal information in accordance with the provisions of this policy. We will emphasize the terms in this policy that (may)
have a significant relationship with your rights and interests by using bold font. Please focus on reviewing them.
I. Personal information collected by this software and the purpose of collecting such information
1. When you use this software and its services, we will automatically collect and use the following types of personal information:
(1) Device information. In order to comply with relevant legal regulations, prevent improper use by users, identify illegal activities of users, eliminate
security faults, maintain network, operational, and system security, ensure the safe operation of the software and services, and ensure your normal use of
this software, we may collect certain technical information about your device and this software when you use it, including: (i) type, name, and version of the operating system;
(ii) configuration and settings of the software and services, versions of the software and services;
(iii) ISP (Internet Service Provider), Internet Protocol (IP) address, network device hardware address (MAC address), anonymous user identifier, device
configuration and identifier (such as IMEI);
(iv) Advertising ID (such as IDFA); (v) WLAN connection status;
(vi) Apple ID; (vii) Operation logs.
(2) Virtual item information. When you use the withdrawal function of this software, in order to ensure the operation and development of basic functions,
conduct anti-cheat detection, and convert virtual items into corresponding gifts or cash according to the exchange rules of this software, we will obtain
information about the type, quantity, and other relevant details of the virtual items (such as coins, points, etc.) you have obtained by using this software.
You will be redirected to the corresponding payment platform through the WeChat SDK integrated into this software to complete the withdrawal. At that time,
the WeChat SDK will automatically collect details about the amount of your withdrawal, withdrawal order number, etc. We recommend that you carefully read
the user agreement and privacy policy of the WeChat payment platform before using it for withdrawals.
(3) Order information. To help you fulfill your demand for ordering paid services of this software and provide you with subsequent after-sales services,
we will collect order information about your ordering of paid services of this software, including order items, order time, order status, order amount,
payment time, etc. However, we do not collect specific payment information such as payment bank account and password, and we are not responsible for the
collection and security of such information. Such payment information is processed and stored by third-party payment platforms (such as Apple Inc.).
Before you use the payment services provided by third-party payment platforms, we recommend that you read and familiarize yourself with the privacy
policies of these third-party payment platforms. In order for third-party payment platforms to recognize the validity and amount of the order and
complete your payment instructions, we will share order status, order amount, and order time with third-party companies.
(4) Software installation list. If you choose to install your favorite style theme icons on your device, or when you use the custom icon feature and
choose to share your customized style theme with third-party apps or apply style themes, we will automatically read your software installation list
information, but will not upload it to the server. (5) Usage records. In order to maintain network, operational, and system security, ensure your
normal use of the software, improve our services, and provide you with more personalized services, we will collect interaction information between
you and your device, including when and how you use the software and services, as well as usage frequency.
2. When you use this software and its services, the personal information you voluntarily submit to us or the permissions you grant us include:
(1) Support information. If you contact us via email, we may collect your email address, as well as your questions or suggestions to us, and identify
your user ID. However, such information is only used to provide you with support services and will not be associated with any other information collected
from you through this software.
(2) Third-party platform account information. When you choose to use a third-party platform account (such as WeChat, QQ,
Weibo) as a shortcut to log in to this software, we will collect your public information (such as the nickname, avatar, ID, etc. of your third-party
platform account).
(3) Access to photo albums/photos. In order to ensure that you can normally synchronize the wallpaper in the style theme as your phone
wallpaper and use the pictures in your phone album to set as custom icons for third-party apps, we need to access your photo album. If you refuse access,
you will not be able to use the above functions normally.
(4) Uploaded/published information. When you use the custom icon function and upload/publish a
custom icon to this software, we will collect the custom icon you upload/publish.
(5) Access to step count. In order for you to add a step count widget to your desktop and display your step count normally within the widget,
we need your authorization to access the step count information recorded by your health app or device system. This step count information is
only saved locally on the device and will not be uploaded to our server. If you refuse authorization, the step count widget will not be able
to display your daily step count normally, but it will not affect your use of other functions of the software.
II. Personal Information Collected by Third Parties and Their Purposes. This software may incorporate advertisements promoting products or
features of third-party platforms. We only provide advertising promotion cooperation or access to jump services. You need to carefully read
the user agreements and privacy policies of such third-party platforms before using their products or features. We will not access the
relevant personal information you leave behind when using these products or features. Third parties providing technical services to us
will collect relevant information from you to implement the services they support, such as using Youmeng SDK, AppFlyer SDK, and Firebase
SDK to analyze and statistically evaluate anomalies in the operation of this software, ensuring that it can provide you with continuous
and secure services. For example, using WeChat SDK, Weibo SDK, and QQ SDK to provide you with third-party login services within this software.
As this software may incorporate advertisements promoting products or features of third-party platforms, it will incorporate SDKs from
advertising service providers or agents, such as Pangolin Ads SDK and Guangdiantong Ads SDK, to enable this software to normally provide
you with third-party advertisements. This software may choose to use some of its third-party partners or change partners at different times,
so the list of partners may be adjusted.
Third-party providers of advertising services require access to your device's location, device information, network, and storage permissions,
which will be obtained after you grant authorization. The purposes for these third parties to obtain the aforementioned permissions are as
follows: To accurately match relevant advertisements, the third-party providers of advertising services need to access your device's location
to provide you with more personalized advertising services; when you need to cache advertising content locally on your device, the third-party
providers of advertising services need to access your device's storage permissions to assist you in caching the aforementioned content to your
device; to ensure that the software can smoothly request and display advertisements from the advertising platform, the third-party providers of
advertising services need to access your device's network connection status.
III. How to share and transfer your information 1. We will not share your information with any company, organization, or individual outside our
scope, except for the following situations:
(1) We will share your information with other parties after obtaining your explicit consent;
(2) We will share your information externally according to laws and regulations, the need to resolve litigation disputes, or the requirements
proposed by administrative or judicial authorities in accordance with the law;
(3) Within the scope permitted by laws and regulations, we will
share your information with our affiliates or partners to provide you with more online services;
(4) It is necessary to provide it for the public
interest, property, or safety of the society;
(5) To handle disputes or controversies between you and others at your request;
(6) Use it based on the public interest in accordance with legal provisions;
(7) Share your information with third parties according to the agreement of this agreement.
2. We will not transfer your information to any
company, organization, or individual, except for the following situations:
(1) We will transfer your information to other parties after obtaining
your explicit consent;
(2) Transfer it according to the requirements of applicable laws and regulations, legal procedures, or mandatory administrative or
judicial requirements;
(3) In cases involving mergers, acquisitions, asset transfers, or similar transactions that involve information transfer, we will require the
new company or organization holding your information to continue to be bound by this privacy policy. Otherwise, we will require the company
or organization to seek your authorization and consent again.
IV. How to protect your information
1. We have taken reasonable and feasible security measures in line with industry standards to protect the
security of the information you provide, preventing unauthorized access, public disclosure, use, modification, damage, or loss of the information.
We will use encryption technology to enhance the security of the information; we will employ trusted protection mechanisms to prevent malicious
attacks on the information; and we will deploy access control mechanisms to ensure that only authorized personnel can access the information.
2. We will take all reasonable and feasible measures to ensure that no unrelated information is collected.
3. Despite having taken the above reasonable and effective measures and complied with the standards required by relevant legal regulations,
please understand that due to technical limitations and various possible malicious means, in the internet industry, even with our best efforts
to strengthen security measures, it is impossible to always guarantee 100% security of the information. We will do our best to ensure the
security of the information you provide to us. You acknowledge and understand that the systems and communication networks you use to access
our services may encounter issues due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your information.
4. We will develop emergency response plans and immediately initiate them in the event of a user information security incident, striving to prevent
the impact and consequences of such incidents from escalating. In the event of a user information security incident (leakage, loss, etc.),
we will promptly inform you of the basic situation and possible impacts of the security incident, the measures we have taken or will take,
suggestions for you to independently prevent and reduce risks, and remedial measures for you, in accordance with legal and regulatory requirements.
We will promptly inform you of the relevant situation through push notifications, emails, letters, text messages, etc.; when it is difficult to
inform you individually, we will take reasonable and effective measures to make announcements. At the same time, we will also report the handling
of user information security incidents to relevant regulatory authorities as required. You confirm that if any loss is incurred due to unintentional
leakage of your information by us, we will be exempted from all responsibilities provided that we have taken the above emergency measures.
V. Storage of Information
1. Duration of Information Storage. We commit to storing your information for a period that is always within the reasonable
and necessary timeframe required by law or necessary to fulfill the functions and services of this software. For information that exceeds
the required duration, we will immediately delete or anonymize it.
2. Location of Information Storage. In accordance with laws and
regulations, we will store your information collected and generated during our domestic operations within the territory of the People's Republic of China.
VI. Your Rights
1. In accordance with relevant Chinese laws, regulations, and standards, we guarantee your rights to access, correct, modify,
and delete your information, withdraw your consent to our collection, use, and disclosure of your information, deactivate your account,
and lodge complaints regarding personal information security issues. However, please understand and agree that when you withdraw certain authorizations,
it will result in the unavailability of related product functions, and we will be unable to continue providing you with the specific
functions and/or services corresponding to the withdrawn consent or authorization. 2. Response to Your Rights Claims. To ensure security,
when you make the above-mentioned claims, we need to verify your identity before processing your request. Generally, we will process and
respond within [15] days. In the following situations, we will be unable to respond to your request as required by laws and regulations:
(1) related to national security and defense security;
(2) related to public security, public health, and major public interests;
(3) related to criminal investigation, prosecution, trial, and execution of judgments;
(4) there is sufficient evidence indicating that the personal information subject has subjective malice or abused rights;
(5) responding to your request will result in serious damage to your or other individuals' or organizations' legitimate rights and interests;
(6) involving trade secrets.
VII. How to handle information of minors
1. If you are a minor under the age of 14, we recommend that you ask your guardian to carefully read this Privacy Policy and use our services
and provide us with information only after obtaining your guardian's explicit consent.
2. For situations where information of minors is collected through the use of our products or services with the consent of their guardians,
we will only use, share, transfer, or disclose this information when permitted by laws and regulations, with the explicit consent of the guardians, or when necessary to protect the minors.
3. If your guardian does not agree to your using our services or providing us with personal information in accordance with this Policy,
please immediately terminate your use of our services and notify us promptly.
4. If you have any questions about the use of our products/services by the minors under your guardianship or the personal information
they provide to us, please contact us promptly.
VIII. Revision: In accordance with changes in national laws and regulations and our operational needs, we reserve the right to
modify the content of this Privacy Policy from time to time. Once the revised content is published on this software in any form,
it shall take effect and replace the previous relevant content. You should pay attention to changes in the relevant content of
this software from time to time. You acknowledge and confirm that if you do not agree with the updated content, you should
immediately stop using this software; if you continue to use this software, it shall be deemed that you have acknowledged the changes and agreed to accept them.
IX. Scope of Application This Privacy Policy applies to this software and related services, but not to third-party products or services
that have separate privacy policies and are not included in this Privacy Policy. If you use products or services provided by third parties,
please pay attention to the user agreements and privacy policies of those third-party products or services. Your use of these third-party
services (including any personal information you provide to these third parties) will be subject to the terms of service and
privacy policies of those third parties (not this Privacy Policy). Please protect your personal information properly and
provide it to third parties only when necessary. The software and related services described in this Privacy Policy may
vary depending on factors such as the phone model, system version, and software application version you are using.
The final products and services are subject to the software and related services you use on your device.
10、 The validity and interpretation of this agreement shall be governed by the laws of the People's Republic of China.
If any provision of this agreement conflicts with Chinese law, it shall be reinterpreted in accordance with relevant laws.
The invalidity or reinterpretation of this clause shall not affect the validity and enforcement of the remaining clauses.
You agree to resolve any disputes arising from these terms through negotiation. If the negotiation fails, you agree to submit
the dispute or controversy to the people's court with jurisdiction over the defendant's location.
11、 Subscription member related instructions - Upgrade to a premium account and enjoy more powerful features - ● Unlimited photo object
recognition; Experience all functions, such as tapping wooden fish and object recognition; No advertising interruptions.
Subscription Rule
3. Members' Continuous Subscription Service has the following products: Subscription Period: a, 28 yuan/week
4. Members' subscription service will be paid directly through iTunes account
5. The system will automatically renew and deduct corresponding fees according to the subscription type 24 hours before the subscription service expires
6. If you need to turn off the continuous monthly subscription service, please operate in "Account Settings" at least 24 hours in advance
12、 How to contact us? If you have any questions, comments or suggestions regarding this privacy policy or your information, you can send us an email (email: a17057931753@outlook.com )Please provide us with your feedback within 15 days.
Loading...
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
Objective-C
1
https://gitee.com/adstext/sclanai.git
git@gitee.com:adstext/sclanai.git
adstext
sclanai
sclanai
master

Search