This Privacy Policy will help you understand (1) Logo design is a tool APP developed by Liaoning Qisi Technology Co., Ltd. In order to realize core functions such as font download, font use, font sharing and other functions, we will collect some of your necessary information; (2) When you publish information, interact with each other, register and authenticate, or use geographic location-based services, based on legal requirements or necessary to realize functions, we may collect names, ID numbers, contact information, address books, audio and video Personal information such as files and geographic location. You have the right to refuse to provide us with such information, or to withdraw your authorization and consent to such information. Please understand that refusal or withdrawal of authorization consent will result in your inability to use related specific functions, but it will not affect your use of other functions of "Logo Design"; (3) We will store your personal information collected and generated during domestic operations in the territory of the People's Republic of China, and will not transmit the above information abroad. We will only retain your personal information for the period necessary for the purpose of providing "Logo Design" software and related services; (4) We will not share, provide, transfer or obtain your personal information from third parties, unless with your consent; (5) We will endeavor to take reasonable security measures to protect your personal information. In particular, we will adopt common methods in the industry and do our utmost commercial efforts to protect the security of your sensitive personal information; (6) How you access, correct, delete your personal information and withdraw your consent authorization, as well as how to cancel your account, complain and report. If you do not expressly agree to this privacy policy and start using it, we will only collect information necessary to maintain the use of fonts, which will cause us to be unable to provide you with complete products and services, but we will also adopt measures such as de-identification and encryption to protect this information. If you do not agree to this Privacy Policy, we cannot provide you with complete products and services, and you can also choose to stop using them. When you choose to continue or use it again, based on the necessity of providing products and services, it will be deemed that you accept and approve that we will process your relevant information in accordance with this policy. We attach great importance to the protection of users' personal information, and will treat such information with diligence and prudence. When you download, install, open, browse, register, log in, and use (hereinafter collectively referred to as "use") "Logo Design" software and related services, we will collect, store, use, share, disclose and Protect your personal information. We hope to introduce to you how we handle your personal information through this "Privacy Policy", so we recommend that you read all the terms of this "Privacy Policy" carefully and completely. Among them, the content related to your information and rights will remind you to pay attention in bold form, please read it emphatically. This privacy policy is designed to help you understand the following: 1. How we collect and use personal information 2. Our use of cookies and similar technologies 3. How we store personal information 4. How we share, transfer, and publicly disclose personal information 5. , How do we protect the security of personal information 6. Your rights 7. Terms of use for minors 8. Privacy policy amendments and notices 9. Scope of application 10. Others 1. How we collect and use personal information During your use of the "Logo Design" software and services, we will collect information in accordance with the principles of legality, legitimacy and necessity. The information we collect or ask you to provide will be used for: 1. To ensure the normal operation of the product; 2. To realize various functions and services; 3. To optimize and improve products and services; 4. To ensure the safety of products, services and users; 5. Comply with laws, regulations and national standards. When you use our APP service, we will apply for the following necessary mobile phone sensitive information from you The MAC address of the mobile phone, the MAC address is only used for login verification, various service authentication, and for statistical click behavior. When the user uses the APP, we will obtain the MAC address information when necessary, and the scope of acquisition is in the network operation , the MAC address information will be obtained. During your use of our APP services, we will apply to you for the following necessary mobile APP client permissions to obtain corresponding services. ·Android.permission.INTERNET permission, network access permission is necessary, we will use the network to download the corresponding application data, set information and perform network operations such as user registration and login; The android.permission.READ_PHONE_STATE permission is necessary to obtain the device identifier permission. We will use the WeChat login SDK for third-party login, and Youmeng+SDK for user statistics data collection; ·android.permission.ACCESS_NETWORK_STATE, check the network connection. During the use of the APP, the network is necessary. During the use of the service, we will check whether the user client has a network connection, which is used to remind the user to make the necessary network connection. Get our services. Such as access to services such as font downloads, user registration and login; ·android.permission.ACCESS_WIFI_STATE, check the WLAN status. When the APP is downloading some large amounts of data, we will judge the network connection status of the APP to remind users whether the network is free or not, so as to save user traffic. Such as downloading fonts and other services; ·android.permission.WRITE_EXTERNAL_STORAGE, to read, modify or delete the content in the memory card. When users use our services and store a large amount of data, storage space is inevitably needed. We use this permission to read the data of the APP client Retrieve, modify or delete to save space on the user's mobile phone. Such as font storage, video file storage, expression file storage and other services (1) Handling of changes in the purpose of collecting and using personal information Please understand that with the development of our business, there may be adjustments and changes to the functions and services provided by "Logo Design". When the new function or service is related to the font download and use function scenario, the personal information collected and used is directly or reasonably related to the original purpose. In scenarios that are not directly or reasonably related to the original purpose, we will notify you again and obtain your consent when we collect and use your personal information. (2) Personal information that is legally exempted from obtaining consent to collect and use Please understand that in the following situations, according to laws, regulations and relevant national standards, we do not need to obtain your authorization and consent to collect and use your personal information: (1) Directly related to national security and national defense security; (2) Directly related to public security, public health, and major public interests; (3) Directly related to criminal investigation, prosecution, trial and execution of judgments; (4) Out of Safeguarding the major legitimate rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the consent of the individual; (5) The collected personal information is disclosed to the public by you; (7) It is necessary to sign or perform a contract according to your request; (8) It is used to maintain the "Logo Design" software and Necessary for the safe and stable operation of related services, such as discovering and handling failures of "Logo Design" software and related services; (9) Necessary for legitimate news reports; (10) Academic research institutions conduct statistical or academic research based on public interests It is necessary for the research institute, and when the results of academic research or description are provided to the outside world, the personal information contained in the results is de-identified; (11) Other situations stipulated by laws and regulations. You are specially reminded that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information or we When data that cannot be associated with any specific personal information is combined with other personal information of yours, during the combined use, such information will be treated and protected as your personal information in accordance with this Privacy Policy. 2. The use of cookies and similar technologies Cookies and similar technologies are commonly used technologies on the Internet. When you use the "To do list" software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We use cookies and similar technologies mainly to achieve the following functions or services: (1) To ensure the safe and efficient operation of products and services We may set cookies or anonymous identifiers for authentication and security to allow us to confirm whether you have logged in to the service safely, or whether you have encountered illegal activities such as theft and fraud. These technologies will also help us improve service efficiency, login and response speed. (2) Helping you obtain an easier access experience Using such technologies can help you avoid repeating the steps and processes of filling in your personal information and entering search content (for example: realize one-click login process, record search history). 3. How do we store personal information (1) Location of information storage We store your personal information collected and generated during domestic operations in the territory of the People's Republic of China in accordance with laws and regulations. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow the relevant national regulations and ask for your consent. (2) Storage period We only retain your personal information for the period necessary for the purpose of providing "Logo Design" and services, for example, the audio, video and other information you released, during the period when you have not withdrawn, deleted or canceled your account , we will retain relevant information. After the necessary period is exceeded, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations. 4. How do we share, transfer and publicly disclose personal information (1) Sharing and transfer of personal information We will not share or transfer your personal information to third parties, unless you have authorized and agreed in advance, or the personal information shared or transferred is de-identified information, and the shared The third party cannot re-identify the natural person subject of such information. 1. Careful assessment and responsibility constraints on the third-party subject of sharing personal information (1) With your consent, we will only share with third parties the information necessary to achieve the purpose. If a third party really needs to use personal information beyond the scope of the aforementioned authorization due to business needs, the third party will need to ask for your consent again. (2) For the third parties with whom we share your personal information, these third parties will sign a confidentiality agreement with us. At the same time, we will evaluate its data security capabilities and environment and require third parties to process such information with confidentiality and security measures not lower than those required by this Privacy Policy. 2. Transfer of personal information during acquisitions, mergers, and reorganizations With the continuous development of our business, we may carry out mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will continue to protect or require the successor of personal information to continue to protect your personal information in accordance with laws and regulations and the security standards not lower than the requirements of this privacy policy, otherwise we will require the successor to re-obtain Your authorization agrees. (2) Public disclosure of personal information Except for the announcement of penalties for illegal accounts and fraudulent behavior, we will disclose the necessary information of the relevant accounts, and we will not publicly disclose your information, unless we comply with national laws and regulations or obtain your consent . When we publicly disclose your personal information, we will adopt security protection measures that comply with industry standards. (3) Personal information that is legally exempt from obtaining consent for sharing, transfer, and public disclosure Please understand that in the following situations, according to laws, regulations and national standards, we do not need your authorization to share, transfer, and publicly disclose your personal information Consent (1) directly related to national security and national defense security; (2) directly related to public security, public health, and major public interests; (3) directly related to criminal investigation, prosecution, trial, and execution of judgments; ( 4) It is difficult to obtain your consent for the protection of your or other personal life, property and other major legitimate rights and interests; (5) Personal information that you disclose to the public; Collect personal information, such as legal news reports, government information disclosure and other channels. V. How do we protect the security of personal information (1) We attach great importance to the security of your personal information, and will try our best to take reasonable security measures (including technical aspects and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or without authorization be accessed, publicly disclosed, used, modified, damaged, lost or leaked. (2) We will use reasonable and feasible means such as encryption technology and anonymization processing that are not inferior to those of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked. (3) We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in due course. (4) Although the above-mentioned reasonable and effective measures have been taken and the standards required by the relevant laws have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if We do our best to strengthen security measures, and it is impossible to always guarantee 100% security of information. We will try our best to ensure the security of the personal information you provide to us. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and other personal information to others. (5) We will formulate an emergency response plan, and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (leakage, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can independently Suggestions for preventing and reducing risks, remedial measures for you, etc. We will promptly inform you of the relevant situation of the incident by email, letter, text message, etc. If it is difficult to inform you one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities. (6) We would like to remind you that the personal information protection measures provided in this Privacy Policy only apply to the "Logo Design" software and related services. Once you leave "Logo Design" and related services, browse or use other websites, services and content resources, we have no ability and obligation to protect you Any personal information submitted by software and websites other than "Logo Design" software and related services, regardless of whether you log in, browse or use the above-mentioned software or website based on the link or guidance of "Logo Design". 6. Your rights We attach great importance to the management of your personal information, and do our best to protect your rights to access, modify (update or correct), delete and withdraw your authorization and consent to your personal information, so that you have the ability to protect your privacy and security. ( 1) Complaints and reports You can make complaints or reports in accordance with our publicized system. If you think that your personal information rights may be violated, or you find clues of personal information rights violations, you can contact us by clicking "Settings" and entering the suggestion feedback interface. We will feedback your complaints and reports within 30 days after verification. (2) To access the privacy policy, you can view the entire content of this privacy policy on the registration page, or in [About] - [Privacy Policy]. (3) Stop operations and notify you of your rights If we stop operations, we will stop collecting your information in a timely manner. The activities of personal information will notify you of the notice of cessation of operation in the form of delivery or announcement one by one, and delete or anonymize your personal information held. 7. Terms for Minors If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using the "Logo Design" software and related services. We protect the personal information of minors in accordance with relevant national laws and regulations, and will only collect, use, share or disclose personal information of minors when permitted by law, with the explicit consent of parents or other guardians, or when it is necessary to protect minors information; if we discover that we have collected personal information of minors without prior verifiable parental consent, we will try to delete the relevant information as soon as possible. If you are the guardian of a minor, when you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information published in this privacy policy. 8. Revision and notice of privacy policy (1) In order to provide you with better services, the "Logo Design" software and related services will be updated and changed from time to time, and we will revise this Privacy Policy in due course. Such revisions constitute a part of this Privacy Policy and have the same meaning as this Privacy Policy Policy Effectiveness. However, without your explicit consent, we will not reduce your rights under the currently effective Privacy Policy. (2) After this privacy policy is updated, we will issue an updated version on the "Logo Design" application client, and remind you of the updated content in an appropriate way before the updated terms take effect, so that you can keep abreast of the privacy policy The latest version of. If you continue to use our services, you agree to accept the revised content of this policy. However, if the updated content needs to collect audio and video, obtain your address book, contact information, geographical location and other personal sensitive information, it will still be displayed in a prominent manner again. Ask for your consent. (3) For major changes, we will also provide more prominent notices (we will explain the specific changes to the privacy policy through methods including but not limited to emails, text messages, private messages, or special reminders on the browsing page). Major changes referred to in this Privacy Policy include but are not limited to: 1. Major changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the method of using personal information, etc.; 2. We have undergone major changes in ownership structure, organizational structure, etc. Such as all changes caused by business adjustments, bankruptcy mergers, etc.; 3. Changes in the main objects of personal information sharing, transfer, or public disclosure; 4. Significant changes in your rights to participate in personal information processing and how to exercise them; 5. Our When the responsible department, contact method and complaint channel responsible for handling personal information security change. 9. Scope of application This privacy policy applies to all services provided by Liaoning Qisi Technology Co., Ltd. and its affiliates, including logo design clients, applets, etc. third-party products or services. This privacy policy does not apply to 1. other third-party products or services, which may include other products or websites linked to in H5 and advertising content or Logo design services; Three parties. Your use of these third-party services (including any personal information you provide to these third parties) will be governed by the terms of service and privacy policies of these third parties (not this Privacy Policy). Please read the terms of the third parties carefully for specific regulations . Please properly protect your personal information and only provide it to third parties when necessary. The "Logo Design" and related services described in this Privacy Policy may vary depending on factors such as the phone model, system version, and software application version you use. The final products and services are subject to the "Logo Design" software and related services you use. If you have any questions, comments or suggestions about the content of this privacy policy, you can contact us by logging in to the "Feedback" page in the "Logo Design" client. 10. Others (1) The titles in this "Privacy Policy" are for convenience and reading only, and do not affect the meaning or interpretation of any provision in this "Privacy Policy". (2) Interpretation of related terms in this "Privacy Policy" 1. "Logo Design" software and related services refer to the company and its affiliates providing you with legally owned and operated client applications labeled "Logo Design" 2. Affiliated parties refer to any companies, institutions and legal representatives of the above-mentioned companies or institutions that are currently or in the future controlled, controlled, or under common control by a party people. "Control" means the possession, directly or indirectly, of the ability to affect the management of the company in question, whether through ownership, voting shares, contracts, or otherwise as legally determined. 3. Personal information refers to all kinds of information recorded electronically or in other ways that can identify a specific natural person or reflect the activities of a specific natural person alone or in combination with other information, including personal identity information (name, date of birth, ID number, Including ID cards, military ID cards, passports, driver's licenses), facial features, addresses, contact numbers, address books, network identification information (including account names, account nicknames, email addresses, and passwords and password-protected questions and answers related to the aforementioned ); property information, transaction information, personal online records (network browsing records, click records, etc.), personal commonly used device information (including hardware model, device MAC address, operating system type, software list unique device identification code, etc.) Information about the basic situation of commonly used terminal equipment), personal location information, etc. 4. Sensitive personal information refers to personal information that, once leaked, illegally provided or misused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. Personal sensitive information in this privacy policy includes: including personally identifiable information (ID number, including ID card, military officer ID, passport, driver's license), facial recognition features; property information, transaction information; network identification information (including account name , account nickname, email address, and passwords and password-protected questions and answers related to the aforementioned); other information (including address book, personal phone number, itinerary information, and precise positioning information). 5. De-identification refers to the process of technically processing personal information to make it impossible to identify the subject of personal information without additional information. 6. Anonymization refers to the process of making the subject of personal information unidentifiable through technical processing of personal information, and the processed information cannot be restored (3) The copyright of this "Privacy Policy" is owned by Liaoning Qisi Technology Co., Ltd., and we have the right to interpret and modify it within the scope permitted by law.