新增hanfei苹果隐私政策和技术支持
This commit is contained in:
BIN
view/molistar/common/images/support.png
Normal file
BIN
view/molistar/common/images/support.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 790 KiB |
319
view/molistar/privacy.html
Normal file
319
view/molistar/privacy.html
Normal file
@@ -0,0 +1,319 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
|
||||
<head>
|
||||
<meta charset="UTF-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<title>Privacy Policy</title>
|
||||
<style>
|
||||
* {
|
||||
margin: 0;
|
||||
padding: 0;
|
||||
}
|
||||
|
||||
body {
|
||||
padding: 0 20px;
|
||||
font-size: 14px;
|
||||
box-sizing: border-box;
|
||||
overflow-x: hidden;
|
||||
}
|
||||
|
||||
.title {
|
||||
margin: 0 auto;
|
||||
text-align: center;
|
||||
font-weight: bold;
|
||||
margin: 0.8rem auto 1rem;
|
||||
}
|
||||
</style>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<div class="title">"MoliStar" Privacy Policy</div>
|
||||
"MoliStar" (hereinafter referred to as "we") fully understands the importance of personal information to you, and we
|
||||
will provide you with more complete and reliable services in accordance with legal regulations. In order to provide
|
||||
you (hereinafter referred to as "you" or "users") with more accurate and personalized services, this application
|
||||
will use and disclose your personal information in accordance with this Privacy Policy (referred to as "this Service
|
||||
Agreement"). The main purpose is to explain to you the types of personal information and business scenarios we
|
||||
collect and use within the necessary scope, as well as the basic rules for processing your personal information.
|
||||
1. How We Collect and Use Your Personal Information <br><br>
|
||||
In order to provide services, we must process information about you. Please note that we only collect information
|
||||
from you for legitimate purposes and under necessary conditions. You can choose not to provide any data or
|
||||
information sought for collection. In this case, you may not agree to this policy. Accordingly, we have the right
|
||||
not to provide services to you. We collect information in the following ways:<br><br>
|
||||
1.1. Information and Content You Provide<br><br>
|
||||
We collect personal information, messages, and other information you provide when using our services, including
|
||||
information you provide when registering an account, creating or sharing content, or communicating with other users.
|
||||
With your consent, we will also collect contact information that you choose to upload, sync, or import from your
|
||||
device into the services we provide.<br><br>
|
||||
1.2. Information and Content We Collect with User Consent<br><br>
|
||||
1.2.1. Your Usage Information. We collect information generated when you use our services and information from third
|
||||
parties (such as when you access our services through social media accounts), such as your phone number and
|
||||
password; the types of content you view or participate in; the features you use; the actions you take; the time,
|
||||
frequency, and duration of your activities; your feedback, etc.<br><br>
|
||||
1.2.2. Device Information. We collect and record information about the devices you use based on the access
|
||||
permissions granted when installing and using our services. We will strictly adhere to the rules and regulations of
|
||||
data collection, respecting and protecting your rights and interests. Specifically as follows:<br><br>
|
||||
(1) Registration and Login<br><br>
|
||||
● You can create an account with your mobile phone number. You need to provide your mobile phone number. We need to
|
||||
collect your mobile phone number to verify the validity of your identity by sending a SMS verification code to your
|
||||
registered mobile phone. After registration, the system will assign you an avatar and nickname. You can modify your
|
||||
avatar and nickname. Collecting this information is to help you complete the registration.<br><br>
|
||||
● You can also log in to "MoliStar" through third-party platforms. We will obtain your personal information (avatar,
|
||||
nickname, gender) registered on the third-party platform. After collecting it, we will only use it for your login to
|
||||
"MoliStar" and will not use it for other purposes.<br><br>
|
||||
● You can set your personal profile according to your own situation, choose to fill in and complete your gender,
|
||||
birthday, and other information. Collecting this information is for displaying your personal profile. You can also
|
||||
choose not to fill in this part of the information, which will not affect your use of the "MoliStar" software.<br><br>
|
||||
(2) Business Functions<br><br>
|
||||
Our product features include:<br><br>
|
||||
● Upload Avatar<br><br>
|
||||
When you log in to the MoliStar product, we will, according to your choice, access your phone's photo album or call
|
||||
upon your phone's camera function so that you can complete your avatar information by accessing photos in the album
|
||||
or taking photos. If you do not agree to us accessing the above permissions, you may not be able to complete
|
||||
uploading the avatar. Please be aware that even if you have agreed to open camera or album permissions, relevant
|
||||
processing will only occur within the scope of photos you actively shoot or select.<br><br>
|
||||
● Message Posting<br><br>
|
||||
After you register as a MoliStar user, you can post text, pictures, and voice messages. We need to collect the
|
||||
information you post and display your nickname, avatar, and posted content.<br><br>
|
||||
● Voice Broadcasting<br><br>
|
||||
If you wish to use the voice call function, we will request permission to access your device's microphone so that
|
||||
you can make voice calls with others through the recording function in the microphone. If you refuse to grant
|
||||
microphone permissions, you will be unable to use the voice call function, but it will not affect your normal use of
|
||||
other MoliStar functions. If you wish to use the voice broadcast function, we will request permission to access your
|
||||
device's microphone and camera so that you can better conduct voice broadcasts with others (friends). If you refuse
|
||||
to grant microphone and camera permissions, you will be unable to use the voice broadcast function, but it will not
|
||||
affect your normal use of other MoliStar functions.<br><br>
|
||||
● Recharge and Consumption-related Functions or Services<br><br>
|
||||
When you use the consumption functions of our product, we will collect your recharge and consumption records to
|
||||
allow you to query your transaction records and protect your property and virtual property to the greatest extent
|
||||
possible. In addition, we may also collect some other information related to orders, including transaction goods or
|
||||
service information, order number, transaction amount, order time, order merchant, order number, order status,
|
||||
payment method, payment account, payment status. We collect this information to help you complete transactions
|
||||
smoothly, ensure the security of your transactions, query order information, provide services, etc. The above
|
||||
information is sensitive, but collecting it is necessary to realize relevant functions, otherwise, transactions
|
||||
cannot be completed. We cannot obtain your personal property information based solely on this information, nor can
|
||||
we identify specific natural person identity information.<br><br>
|
||||
(3) Information Provided by You Proactively in Using the "MoliStar" Service<br><br>
|
||||
When you need to save a picture from "MoliStar" to your local device, "MoliStar" will access your local photo album
|
||||
to store the picture you need to save. Before accessing it, "MoliStar" will clearly prompt you to access your local
|
||||
photo album, and only with your explicit consent can you save the picture locally.<br><br>
|
||||
(4) Operation and Safe Operation<br><br>
|
||||
In order to provide you with a secure and reliable usage environment and enjoy more trustworthy and high-quality
|
||||
product features and services. We need to collect the following information about your device to maintain the normal
|
||||
and stable operation of product-related functions or services, improve the security of the system when you use our
|
||||
product functions and services, more accurately prevent phishing website fraud, protect account security, ensure
|
||||
network security, operational security, and eliminate malicious cheating behaviors:<br><br>
|
||||
● To ensure the secure operation and quality and efficiency of software and services, we will collect data from your
|
||||
device, such as hardware model, operating system version number, SD card data, device identifiers (IMEI, AndroidID,
|
||||
OAID, IMSI, ICCID, GAID, MEID; different identifiers have different validity periods, whether they can be reset by
|
||||
users, and how they are obtained), hardware addresses of network devices (MAC addresses), hardware serial numbers,
|
||||
IP addresses, WLAN access points (such as SSID, BSSID), base stations, software version numbers, network access
|
||||
methods, types, statuses, network quality data, operations, usage, service logs, sensor information, and application
|
||||
software installation lists.<br><br>
|
||||
Log information includes:<br><br>
|
||||
● Usage information of this software: the version number of the software you use, the overall operation status of
|
||||
the software, and your usage frequency. Such information is anonymous, and we will not match it one by one or match
|
||||
it with your personal identity information.<br><br>
|
||||
● Network security-related log information (network collapse, system activity information). Such information is
|
||||
collected as required by law. If you do not want such information to be collected by us, please do not use this
|
||||
software.<br><br>
|
||||
1.3. Please understand that the collection of device information is the premise and basis of our service provision.
|
||||
After you install and open this software, we will seek your consent through "authorization pop-ups".<br><br>
|
||||
1.4. Individual device information alone cannot identify specific natural person identity, and we have de-identified
|
||||
and anonymized such information.<br><br>
|
||||
2. Exemption from Consent for Collection and Use of Personal Information According to Law
|
||||
Please understand that in the following circumstances, according to laws, regulations, and relevant national
|
||||
standards, we may collect and use your personal information without obtaining your authorization:<br><br>
|
||||
● Related to the fulfillment of legal obligations by the personal information controller;<br><br>
|
||||
● Directly related to national security and defense;<br><br>
|
||||
● Directly related to public safety, public health, and significant public interests;<br><br>
|
||||
● Directly related to criminal investigation, prosecution, trial, and execution of judgments;<br><br>
|
||||
● Necessary for the protection of the life, property, and other significant legitimate rights and interests of the
|
||||
personal information subject or other individuals but it is difficult to obtain the consent of the individual;<br><br>
|
||||
● The personal information involved is voluntarily disclosed to the public by the personal information subject;<br><br>
|
||||
● Necessary for signing and fulfilling contracts at the request of the personal information subject;<br><br>
|
||||
● Collecting personal information from legally disclosed information, such as legal news reports, government
|
||||
information disclosure, etc.;<br><br>
|
||||
● Necessary to maintain the security and stable operation of the provided products or services, such as discovering
|
||||
and dealing with faults in products or services;<br><br>
|
||||
● Necessary for news units engaged in legitimate news reporting;<br><br>
|
||||
● Necessary for academic research institutions, for statistical or academic research necessary for public interest,
|
||||
and when providing academic research or describing the results externally, the personal information contained in the
|
||||
results is de-identified.<br><br>
|
||||
3. Use of COOKIES and Similar Technologies3.1. Introduction to COOKIES and Similar Technologies
|
||||
We or our third-party partners may obtain and use your information through COOKIES and WEB BEACON, and store such
|
||||
information as log information. COOKIES refer to a technology where when a user visits a website equipped with
|
||||
COOKIES, the website's server automatically sends COOKIES to the user's browser and stores them on the user's mobile
|
||||
device. These COOKIES are responsible for recording various activities, personal information, browsing habits,
|
||||
consumption habits, and even credit records of the user's visits to the website in the future. COOKIES technology
|
||||
enables us to provide services better and faster, and enables this platform to serve you more effectively.<br><br>
|
||||
3.2 Purposes of Using COOKIES and Similar Technologies<br><br>
|
||||
We use our own COOKIES and WEB BEACON for the following purposes:<br><br>
|
||||
● Remembering your identity;<br><br>
|
||||
● Analyzing and optimizing our service situations;<br><br>
|
||||
3.3. Authorized Use of COOKIES and WEB BEACON<br><br>
|
||||
Cookie and device information identifiers and similar technologies are commonly used in the Internet. When you use
|
||||
"MoliStar" and related services, we may use such technologies to send one or more COOKIES or anonymous identifiers
|
||||
to your device to collect and identify information about your visits and use of this product. We promise not to use
|
||||
COOKIES for any purposes other than those described in this Privacy Policy. We use COOKIES and similar technologies
|
||||
mainly to achieve the following functions or services:<br><br>
|
||||
● Ensuring the safe and efficient operation of products and services<br><br>
|
||||
We may set COOKIES or anonymous identifiers for authentication and security protection to confirm whether you are
|
||||
securely logged into the service, or whether you encounter theft, fraud, and other illegal activities. These
|
||||
technologies also help us improve service efficiency and enhance login and response speeds.<br><br>
|
||||
● Data analysis and anomaly troubleshooting<br><br>
|
||||
(1) We may use such technologies to understand your usage habits, conduct data analysis, and improve product
|
||||
services.<br><br>
|
||||
(2) In using "MoliStar", we may use COOKIES to record browsing activities for troubleshooting crashes, delays, and
|
||||
other related anomalies, and to explore better service methods.<br><br>
|
||||
● Clearing COOKIES<br><br>
|
||||
Most browsers provide users with functions to clear browser cache data, and you can perform corresponding data
|
||||
clearing operations in the browser settings. If you clear them, you may not be able to use services or functions
|
||||
provided by us that rely on COOKIES.<br><br>
|
||||
4. How We Share, Transfer, and Publicly Disclose Your Personal Information4.1 Preconditions for Sharing Information
|
||||
We will not share your personal information with any other companies, organizations, and individuals except in the
|
||||
following circumstances:<br><br>
|
||||
● With your explicit consent or authorization beforehand;<br><br>
|
||||
● Sharing is required pursuant to applicable laws, regulations, or mandatory administrative or judicial
|
||||
requirements;<br><br>
|
||||
● Sharing Information for Security and Statistical Analysis<br><br>
|
||||
Ensuring Security: We attach great importance to the security of accounts and services. In order to protect the
|
||||
security of your and other users' accounts and properties, and to protect your and our legitimate rights and
|
||||
interests from illegal infringements, we or service providers may share necessary device, account, and log
|
||||
information. Analyzing Product Usage: To analyze the usage of our services and improve user experiences, we may
|
||||
share statistical data on product usage (crashes, crashes) with affiliates or third parties. This data is difficult
|
||||
to combine with other information to identify your personal identity.
|
||||
For companies, organizations, and individuals with whom we share personal information, we will sign strict
|
||||
confidentiality agreements with them and require them to handle personal information in accordance with our
|
||||
instructions, this Privacy Policy, and other relevant confidentiality and security measures. At the same time, we
|
||||
will only provide information to third parties covering the scope and effectiveness of promotion, without providing
|
||||
information that can identify you, or we will aggregate and anonymize this information so that it cannot identify
|
||||
you personally. We will only share your information for legitimate, necessary, and specific purposes.<br><br>
|
||||
● Transfer of Personal Information in Acquisitions, Mergers, or Reorganizations<br><br>
|
||||
As our business continues to develop, we may conduct mergers, acquisitions, asset transfers, or similar
|
||||
transactions, and your personal information may be transferred as part of such transactions. We will require the new
|
||||
holder of your information to continue to be bound by this Privacy Policy. Otherwise, we will require the company or
|
||||
organization to re-obtain your authorization.<br><br>
|
||||
● Information Disclosure Based on Other Reasons<br><br>
|
||||
We may also retain, preserve, or disclose your personal information for the following reasons:<br><br>
|
||||
● Authorized or consented by "MoliStar" for disclosure;<br><br>
|
||||
● Compliance with applicable laws and regulations;<br><br>
|
||||
● Compliance with court orders or other legal proceedings;<br><br>
|
||||
● Compliance with requests from relevant government agencies.<br><br>
|
||||
● We believe it is reasonably necessary to comply with applicable laws and regulations, maintain social public
|
||||
interests, protect our or our group companies, our customers, other users, or employees' personal and property
|
||||
safety or legitimate rights and interests, or public safety and interests, as well as other circumstances deemed
|
||||
necessary by "MoliStar" in accordance with the relevant provisions of "MoliStar" Terms of Service and Statements, or
|
||||
otherwise necessary.<br><br>
|
||||
5. How We Access Partner SDKs<br><br>
|
||||
Please note that some of our services will be jointly provided by us and authorized partners. We will access partner
|
||||
SDKs for legitimate, necessary, specific, and clear purposes. They will collect your personal information through
|
||||
SDK interfaces to realize product functions and services. We will demonstrate to you the purpose of accessing
|
||||
partner SDKs; partners will collect the personal information necessary to implement product functions and services
|
||||
through SDK interfaces; for the types or identities of partners.<br><br>
|
||||
We will conduct security monitoring of the accessed SDKs involving the collection of personal information to protect
|
||||
the security of your personal information. We will only share your information for legitimate, necessary, and
|
||||
specific purposes. We will collect de-identified information that cannot identify you personally. We will require
|
||||
third-party service providers with whom we share information to fulfill relevant confidentiality obligations and
|
||||
take corresponding security measures.<br><br>
|
||||
|
||||
SDK Name: NetEase Yidun<br>
|
||||
Purpose of Use: Implementing UGC Content Filtering Functionality<br>
|
||||
Types of Personal Information:WiFi network status, network status, operator information, change network connection
|
||||
status, phone status, external storage of the reader, obtain MAC address<br>
|
||||
Third-party Privacy Policy Link:https://dun.163.com/clause/privacy<br><br>
|
||||
|
||||
SDK Name: NetEase Cloud IM SDK<br>
|
||||
Purpose of Use: Collect and send end-user voice information<br>
|
||||
Types of Personal Information:Networkaccess, Wi-Fi access status, device information, storage card content, obtain
|
||||
IMEI information, obtain lMSI information, obtain MAC obtain APNS Token, operator type, obtain application
|
||||
information installed by the system<br>
|
||||
Third-party Privacy Policy Link:https://commsease.com/en/clauses?serviceType=3<br><br>
|
||||
|
||||
SDK Name: Agora<br>
|
||||
Purpose of Use:Provide real-time audio and video cloud services<br>
|
||||
Types of Personal Information:Recording microphone permission, camera permission, phone status, Wi-Fi status access,
|
||||
network status, operator information, Bluetooth access, network access, modify audio settings, read/write external
|
||||
storage, keep device awake<br>
|
||||
Third-party Privacy Policy Link:https://www.agora.io/cn/privacy-policy<br><br>
|
||||
|
||||
SDK Name:Tencent Cloud TRTC SDK<br>
|
||||
Purpose of Use:Provide real-time audio and video cloud services<br>
|
||||
Types of Personal Information:Manufacturer of the device, device model, system version, network type, screen
|
||||
resolution, CPU information, IP address, network permissions, storage permissions, microphone permissions, audio
|
||||
permissions, Bluetooth permissions, camera permissions, phone permissions<br>
|
||||
Third-party Privacy Policy Link:https://trtc.io/document/48827<br><br>
|
||||
|
||||
SDK Name:SudMGP<br>
|
||||
Purpose of Use:Provide interactive gaming-related services<br>
|
||||
Types of Personal Information:Personal information types, device cache count, invocation of device speaker and
|
||||
vibration motor, device type, device model, CPU information, storage information, operating system information, IP
|
||||
address, signal strength information, network type, sender and receiver user ID, user attributes, usage duration,
|
||||
personal information setting name, nickname, logs<br>
|
||||
Third-party Privacy Policy Link:https://console.sud.tech/privacy<br><br>
|
||||
|
||||
SDK Name:Umeng SDK<br>
|
||||
Purpose of Use:Statistical analysis<br>
|
||||
Types of Personal Information:Location permission, network access, WiFi state access, carrier information, device
|
||||
information (IMEI/MAC/Android ID/IDFA/OPENUDID/GUID/SIM card IMSI/geographical location), obtaining device serial
|
||||
number<br>
|
||||
Third-party Privacy Policy Link:https://www.umeng.com/page/policy<br><br>
|
||||
|
||||
SDK Name:MobTech SDK<br>
|
||||
Purpose of Use:Provide timely message push and notification functionality for testing a sample application of mobile
|
||||
cross-platform development tools<br>
|
||||
Types of Personal Information:System operation information, network access, obtaining MAC address, obtaining IMEI
|
||||
information, obtaining anonymous device identifiers (OAID), International Mobile Subscriber Identity (IMSI),
|
||||
obtaining installed applications, base station information, obtaining running process information<br>
|
||||
Third-party Privacy Policy Link:https://www.mob.com/about/policy<br><br>
|
||||
|
||||
SDK Name:Umeng+ U-Share SDK`<br>
|
||||
Purpose of Use:One-click sharing<br>
|
||||
Types of Personal Information:Device identification information (such as IMEI/android ID/IDFA, etc.), public
|
||||
information of social media accounts<br>
|
||||
Third-party Privacy Policy Link:https://www.umeng.com/policy<br><br>
|
||||
|
||||
6. How We Store and Protect Information<br><br>
|
||||
6.1 We will use encryption technology and anonymization processing, among other reasonable and feasible means not
|
||||
lower than those of industry peers, to protect your personal information and employ security protection mechanisms
|
||||
to prevent malicious attacks on your personal information<br><br>
|
||||
6.2 We will establish dedicated security departments, security management systems, and data security processes to
|
||||
ensure the security of your personal information.<br><br>
|
||||
6.3 We implement strict data usage and access control systems to ensure that only authorized personnel can access
|
||||
your personal information, and conduct security audits of data and technologies as needed.<br><br>
|
||||
6.4 Please note that when you voluntarily leave this software or navigate to, use, or access other websites,
|
||||
services, and content resources based on this software, you should carefully consider any personal information you
|
||||
submit to guard against potential risks that may harm your personal rights and interests.<br><br>
|
||||
7. How Users Manage Information<br><br>
|
||||
We attach great importance to your concerns about personal information and make every effort to protect your rights
|
||||
to access, correct, delete, and withdraw consent regarding your personal information, enabling you to fully protect
|
||||
your privacy and security. Your rights include:<br><br>
|
||||
● Your Personal Information<br><br>
|
||||
You have the right to access your personal information, except as otherwise provided by laws and regulations. If you
|
||||
wish to exercise your data access rights, you can do so by accessing:<br><br>
|
||||
A. Personal data - You can view personal information data such as user ID, nickname, gender, birthday, personalized
|
||||
signature, and personalized tag information by entering the "MoliStar" App and clicking "Me" - "Avatar".<br><br>
|
||||
B. Avatar - You can view your avatar by entering the "MoliStar" App and clicking "Me" - "Avatar".<br><br>
|
||||
● Canceling Your Account<br><br>
|
||||
You can submit an account cancellation request by clicking "Me" - "Settings" - "Cancel Account". Please note that
|
||||
after you voluntarily cancel your account, we will stop providing products or services to you and delete or
|
||||
anonymize your personal information, including any related earnings generated by the account.
|
||||
Additionally, in cases where you violate the terms and conditions of service agreements with MoliStar or relevant
|
||||
national laws and regulations, your account may be canceled or deleted. Upon cancellation or deletion of your
|
||||
account, all service data and information associated with the account will be deleted or anonymized.<br><br>
|
||||
8. Age Limitation<br><br>
|
||||
8.1 The software service is primarily intended for adults. Our products, websites, and services are primarily aimed
|
||||
at adults. If you are a minor, you should read the privacy policy with the accompaniment of your guardian before
|
||||
using our products and/or services and ensure that you have obtained your guardian's consent to use our services and
|
||||
provide us with your information. We will pay particular attention to the protection of minors' personal information
|
||||
in accordance with relevant national laws and regulations.<br><br>
|
||||
8.2 In cases where we collect personal information of minors with the consent of parents or legal guardians, we will
|
||||
only use or disclose this information in accordance with the law,<br><br>
|
||||
with the explicit consent of parents or guardians, or as necessary to protect the interests of minors.<br><br>
|
||||
Nine, How to Contact Us<br><br>
|
||||
If you have any questions, comments, or suggestions regarding this Privacy Policy, please contact us at:<br><br>
|
||||
MoliStar666@gmail.com, and we will respond within 15 working days.<br><br>
|
||||
MoliStar Team<br><br>
|
||||
</body>
|
||||
|
||||
</html>
|
36
view/molistar/support.html
Normal file
36
view/molistar/support.html
Normal file
@@ -0,0 +1,36 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
|
||||
<head>
|
||||
<meta charset="UTF-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<title>Technical Support</title>
|
||||
<style>
|
||||
* {
|
||||
margin: 0;
|
||||
padding: 0;
|
||||
}
|
||||
|
||||
@media screen and (min-width:769px) {
|
||||
img {
|
||||
display: block;
|
||||
margin: 0 auto;
|
||||
}
|
||||
}
|
||||
|
||||
@media screen and (max-width:768px) {
|
||||
img {
|
||||
display: block;
|
||||
margin: 0 auto;
|
||||
width: 100%;
|
||||
height: 100vh;
|
||||
}
|
||||
}
|
||||
</style>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<img src="./common/images/support.png" alt="">
|
||||
</body>
|
||||
|
||||
</html>
|
Reference in New Issue
Block a user