User Privacy Protection Terms

Update Time: 12/12/2024

Effective Time: 12/12/2024


We hereby specially remind you (the user) to carefully read the "User Privacy Protection Terms" (hereinafter referred to as "this Agreement") before using HadoAI (hereinafter referred to as "this Application"), and ensure that you fully understand each clause in this Agreement. Please carefully read and choose to accept or not accept this Agreement. Your registration, login, use and other behaviors will be deemed as acceptance of this Agreement and agreement to be bound by all terms of this Agreement. This Agreement can be updated by "HadoAI" at any time. Once the updated agreement terms are published, they will replace the original agreement terms, and no separate notice will be given. Users can check the latest version of the agreement terms in this Application. After modifying the agreement terms, if you do not accept the modified terms, please immediately stop using the services provided by "HadoAI". Your continued use of the services will be deemed as acceptance of the modified agreement.

1. How We Collect and Use Your Personal Information

(1) Information Collection

During your use of relevant applications or services provided by us, we may collect, use and save the following information related to you. If you do not provide it, you will not be able to enjoy the corresponding services provided by us:

1. When you register for this application, you need to provide us with your mobile phone number, SMS verification code, and login password you set; if you cannot provide or are unwilling to provide the above information, you may not be able to perform account registration operations.

You can also fill in or supplement other additional information during registration, login or subsequent use (including your nickname, avatar, gender, birthday), which will help us provide you with a better service experience, but if you do not provide this information, it will not affect your use of the basic functions of this application.

2. When you log in to this application, you need to provide us with your mobile phone number + login password (you can change the mobile phone number or modify the password in "My-Account Information"). If you do not provide the above information, we will not be able to provide you with services such as video library viewing, copywriting library viewing, editing tool use, course viewing and other services that require login.

3. When you reset your application account password, you need to provide us with your mobile phone number, SMS verification code, and new password. If you cannot provide or are unwilling to provide the above information, you will not be able to complete the password reset.

4. When you download this application for the first time, upon entry, you need to authorize us to use your wireless/data network for service use. If you cannot provide or are unwilling to provide the above information, it may affect the normal use of some application functions.

5. When you perform real-name authentication, we will collect your real name and ID number. You should enter all the above information according to the page prompts, and agree that we will compare and verify the name and ID number you provide to us with institutions or government-authorized institutions allowed by laws and regulations. If you cannot provide or are unwilling to provide the above information, you will not be able to complete the real-name authentication operation, and may also be unable to use related services.

6. When you use search services, we will collect your search keyword information and log records. To provide efficient search services, some of the aforementioned information will be temporarily stored in your local storage device, and can display search result content and search history to you. It can also improve our products and services. If you want to delete your search records, you can clear the records in "Search Box-Search Records".

7. We will collect International Mobile Equipment Identity (IMEI), Android ID (obtained when the application is in the background), and network device address (MAC) encrypted with MD5 algorithm, as well as mobile phone model, names, versions, package names, software usage time and frequency, software crash logs, application installation lists, running process information, and clipboard access information to count the number of users of our products, analyze product usage, troubleshoot crash causes, reduce crash situations, and use internal update methods to continuously improve our products. This information may involve your personal identity and other privacy information.

8. We will use your ID type, ID number, mobile phone number, operating system, unique device identifier IMEI code, login IP address, operation logs to prevent, detect, investigate fraud, endanger security, illegal or violate agreements, terms or rules with us, to protect your and our legitimate rights and interests.

9. When you use sharing services, you can use the "Share" button to share certain content to WeChat third-party platforms. These functions may collect your personal information (including your log information), and may install cookies in your device to operate the above functions normally;

10. When you use payment services, services are provided by third-party payment institutions cooperating with us. Third-party payment institutions may need to collect your name, bank card type and card number, expiration date and mobile phone number. Bank card number, expiration date and mobile phone number are sensitive personal information. This information is necessary for payment functions. Refusal to provide will result in you being unable to use this function, but will not affect the normal use of other functions.

11. To make it more convenient for you to use this application service, in the following situations, you can choose whether to authorize us to collect and use your personal information:

(1) Storage-based related functions/services: When you need to modify your avatar, save pictures and other multimedia files to the album, we will use this permission.

(2) Camera (gallery)-based related functions/services: You can use services such as image upload.

(3) Network communication-based functions: After you enable the network communication function of this application, you can obtain various services provided by the server system through our client.

(4) Phone (device identification information)-based related functions/services: Used to identify user identity, prevent malicious programs and required for secure operations. (Personal commonly used device information: refers to information describing the basic situation of personal commonly used devices, including hardware serial number, device MAC address, software list, unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card, IMSI information), etc.)

(5) Floating window permission, dynamically obtained, requires user authorization. Used for floating ball function.

12. Third-party SDK collection information during your service use. To provide service operations, we will embed third-party SDKs. The following content is the description of the third-party SDK collection items when this agreement takes effect, and the content is provided by the third party to which the SDK belongs. This article is only for reference. If you choose not to provide the described information, you may not be able to use the corresponding services. Please note that third parties are responsible for the confidentiality of information collected by third-party SDKs. Please refer to the third party's privacy policy for relevant confidentiality policies.

If third-party institutions refuse to provide or cannot obtain your data, the corresponding services cannot be used. You can refuse or cancel related permissions, but it will affect the use of some services.

13. If we change or exceed the purpose stated at the time of collection and the scope directly or reasonably related when using your personal information, we will inform you again and obtain your explicit consent before using your personal information.

(2) Information Usage

  1. We will collect International Mobile Equipment Identity (IMEI), Android ID (obtained when the application is in the background), and network device address (MAC) encrypted with MD5 algorithm, as well as mobile phone model, names, versions, package names, software usage time and frequency, software crash logs, application installation lists, running process information, and clipboard access information to count the number of users of our products, analyze product usage, troubleshoot crash causes, reduce crash situations, and continuously improve our products. This information may involve your personal identity and other privacy information.
  2. To improve the security of services provided by us and our affiliated companies and partners, protect you or other users or the public from infringement on personal and property safety, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, and more accurately identify situations that violate laws and regulations or relevant agreement rules of this application. We may use or integrate your account information, device information, software usage information, and information shared by our affiliated companies and partners with your authorization or in accordance with the law for identity verification, detection and prevention of security incidents, and take necessary recording, auditing, analysis and disposal measures in accordance with the law.
  3. Exceptions to obtaining authorization consent
    1. Directly related to national security and national defense security;
    2. Directly related to public security, public health, and major public interests;
    3. Directly related to criminal investigation, prosecution, trial and execution of judgments;
    4. For the purpose of safeguarding the major legitimate rights and interests of your or other individuals' life and property, but it is difficult to obtain personal consent;
    5. The collected personal information is disclosed by you to the public;
    6. Necessary for signing and performing contracts as required by you;
    7. Collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels;
    8. Necessary for maintaining the safe and stable operation of this application service, such as discovering and disposing of product or service faults;
    9. Necessary for conducting legal news reporting;
    10. Necessary for conducting statistics or academic research for public interests, and when providing academic research or descriptive results to the outside world, de-identifying the information contained in the results;
    11. Other circumstances stipulated by laws and regulations.

2. How We Share, Transfer and Publicly Disclose Your Personal Information

(1) Sharing

We will not share your personal information with companies, organizations and individuals other than us, except in the following situations:

  1. With your prior explicit consent
  2. Sharing under legal circumstances: We may share your personal information externally according to laws and regulations, litigation dispute resolution needs, or requirements lawfully put forward by administrative and judicial authorities;
  3. Sharing with affiliated companies: To facilitate us providing services to you based on affiliated accounts and protect the personal and property safety of our affiliated companies, other users, and the public from infringement, your personal information may be shared with our affiliated companies. We will only share necessary personal information (such as sharing your necessary account information with affiliated companies to facilitate your use of affiliated company products or services through our accounts). If we share your sensitive personal information or affiliated companies change the purpose of personal information use and processing, we will seek your authorization consent again.
  4. Sharing with authorized partners: Only to achieve the purposes stated in this privacy policy, some of our services will be provided jointly by us and authorized partners. For example:

Please be aware that we will only share your personal information for legitimate, proper, necessary, specific, and clear purposes. For companies, organizations, and individuals with whom we share personal information only to achieve the purposes stated in this policy, we will sign strict information protection and confidentiality agreements with them, requiring them to comply with the agreements and take relevant security measures to protect your personal information.

(2) Transfer

We will not transfer your personal information to any company, organization, or individual. Except in the following situations:

  1. With your prior consent.
  2. Provided in accordance with applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements.
  3. In the event of our merger, acquisition, or bankruptcy liquidation, or other situations involving merger, acquisition, or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this policy; otherwise, we will require the company, organization, and individual to seek your authorization consent again.

(3) Public Disclosure

We will only publicly disclose your personal information in the following situations:

  1. With your explicit consent or based on your active choice, we may publicly disclose your personal information;
  2. If we determine that you have violated laws and regulations or seriously violated our relevant agreement rules, or to protect the personal and property safety of us, our affiliated companies, users, or the public from infringement, we may disclose personal information about you with your consent in accordance with laws and regulations or our relevant agreement rules, including relevant violations and measures we have taken against you.

(4) Exceptions to Obtaining Authorization Consent in Advance When Sharing, Transferring, or Publicly Disclosing Personal Information

In the following situations, sharing, transferring, or publicly disclosing your personal information does not require obtaining your authorization consent in advance:

  1. Related to national security and national defense security;
  2. Related to public security, public health, and major public interests;
  3. Related to criminal investigation, prosecution, trial, and execution of judgments;
  4. For the purpose of safeguarding the major legitimate rights and interests of your or other individuals' life and property, but it is difficult to obtain personal consent;
  5. Personal information disclosed by you to the public;
  6. Collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels.
  7. Other situations related to our fulfillment of obligations stipulated by laws and regulations, regulatory requirements, and industry regulatory authorities.

3. How We Store Your Personal Information

We will store the collected personal information within the territory of the People's Republic of China in accordance with laws, regulations, and regulatory requirements.

During your use of this application service, we will continue to store your personal information for you. After you log off your application account, we will only retain your personal information within the time limits stipulated by laws and regulations, regulatory requirements, and necessary for achieving the purposes stated in this clause. After exceeding the above personal information storage period, we will delete or anonymize your personal information.

4. How You Manage Your Personal Information

(1) Query, Correct, Delete Your Personal Information

Except for exceptional situations stipulated by laws and regulations, you have the right to query, correct, supplement, and delete your information. You can do so through the following methods:

  1. After logging into this application, you can view or modify your user nickname, birthday, and gender in "My-Click Avatar";
  2. You can modify the bound mobile phone number in "My-Account Management-Change Mobile Number".
  3. You can modify or reset your password in "My-Account Management-Modify Password".
  4. You can view the latest version of this application's user privacy protection terms in "My-About Us-Privacy Policy".
  5. Search records: You can clear your search history in this application's search interface.

(2) Change the Scope of Your Authorization Consent or Withdraw Your Authorization

You can withdraw all privacy authorizations by logging off your account, deleting all user information in this application, and uninstalling this application. We will no longer collect, use, or provide externally personal information related to this account. However, information you provided or generated during your use of our services still needs to be saved anonymously according to regulatory requirements, and within the time of legal preservation, judicial authorities still have the right to inquire legally.

You can also change the scope of your authorization for us to continue collecting personal information and revoke your authorization by modifying privacy settings in your mobile operating system. After you withdraw consent or authorization, we cannot continue to provide you with services corresponding to the withdrawn consent or authorization. However, your decision to withdraw consent or authorization will not affect the processing of use, storage, and external provision of your personal information that we conducted based on your authorization previously.

(3) Account Cancellation Management

You can cancel your account in "My-Account Management-Cancel Account".

(4) Responding to Your Above Requests

If you believe that we violate laws and regulations or agreements with you in collecting and using your personal information, you can also contact us through "Manual Customer Service" or by sending an email to chenghengkj@163.com and request deletion of your relevant personal information. We will confirm the issues involved within 15 working days, and after a dedicated person verifies your user identity, we will reply and handle it in a timely manner.

5. How We Protect Your Personal Information

We strive to provide protection for user personal information security to prevent information loss, improper use, unauthorized access, or public disclosure.

(1) To protect your information security, we will use security protection measures that meet industry standards to protect the personal information you provide in accordance with laws and regulations and current technical levels, and take physical, technical, and administrative management security measures to reduce the risks of loss, misuse, unauthorized access, disclosure, and alteration, and strive to prevent data from unauthorized access, public disclosure, use, modification, damage, or loss.

(2) We establish specialized management systems, processes, and organizations to protect information security, strictly limit the scope of personnel accessing information, require them to comply with confidentiality obligations, and conduct audits.

(3) If all or part of the services we provide stop being used, we will inform you through message notifications, and at the same time stop the collection and other operations of your personal information by related services to protect your personal information security. If all or part of the services become unusable due to various reasons such as technical failures, network attacks, natural disasters and accidents, human factors, etc., we will take emergency response and recovery measures to respond and restore services as soon as possible.

(4) The Internet environment is not 100% secure. We will do our best to ensure the security of your personal information. If our physical, technical, or management protection facilities are compromised, resulting in unauthorized access, public disclosure, tampering, destruction, or other personal information leakage security incidents, we will activate emergency plans to prevent the security incident from expanding, and inform you of the relevant situation through push notifications or message notifications. At the same time, we will report the handling of personal information security incidents in accordance with regulatory requirements.

(5) When you use this application service, we will identify your identity through your mobile phone number, name, and ID number. Please properly keep the above information. Once you leak the above information, your account information may be leaked as a result, and may cause losses to your personal rights and interests such as fund security.

(6) We will take all reasonable and feasible measures to ensure that we do not collect personal information unrelated to the application services you use.

6. How This Agreement Is Updated

When relevant laws and regulations change or our services change in necessary situations, if we need to modify this agreement, our application may be announced through instant notification (including pop-up windows, page prompts, etc.), function update descriptions, etc. It will take effect after publication and replace the previous content. If you do not agree to the new modifications, please contact us in time or immediately stop using the services stipulated in this agreement. If you choose to continue using the relevant services, it will be deemed that you fully agree to and accept the new modifications. If objective circumstances and business policies change and we need to interrupt or stop relevant services, we will notify you in time. Please understand and agree to this.

7. Other Provisions

(1) The establishment, effectiveness, performance, interpretation, and dispute resolution of this agreement shall be governed by the laws of the mainland region of the People's Republic of China. Where laws have no explicit provisions, domestic common practices may be applied.

(2) If this agreement is partially invalid or unenforceable for any reason, it will not affect the validity of other parts of this agreement.

(3) Matters not covered in this agreement shall be handled in accordance with laws and regulations and our relevant business rules and domestic common practices.

8. Contact Us

Developer: Rui'an Chengheng Digital Technology Co., Ltd.

Contact QQ: 2718837573

Email: kefu-xiaoqi@huadouzi.com