【Privacy Policy】

Latest update date: December 11, 2024

We attach great importance to user privacy and personal information protection. When you use our products and/or services, we may collect and use your relevant information. We hope to explain to you through the Privacy Policy ("this Privacy Policy") how we collect, use, save, share, and transfer this information when you use our products and/or services, as well as the ways we provide you with access, update, delete, and protect this information.

This policy will help you understand the following:

1. How do we collect and use your personal information

2. How do we use cookies and similar technologies

3. How do we share, transfer, and publicly disclose your personal information

4. How do we protect and save your personal information

5. How do you manage personal information

6. Protection of minors' information

7. Notification and Revision

8. How to contact us

This privacy policy is closely related to the products and services you use, as well as the various business functions included in the service (hereinafter collectively referred to as "our products and/or services"). We hope that you carefully read and confirm that you have fully understood the content stated in this policy before using our products and/or services, and that you can make the appropriate choices according to the guidelines of this privacy policy. We strive to express the relevant terms involved in this privacy policy in a concise and concise manner, and provide further explanatory links for your better understanding. By using or continuing to use our products and/or services after we update this privacy policy (we will promptly notify you of any updates), you agree to the content of this privacy policy (including the updated version) and agree to our collection, use, storage, and sharing of your relevant information in accordance with this privacy policy. If you do not agree with the content of this policy, it may cause our products and/or services to malfunction or fail to achieve the intended service effect. You should immediately stop accessing/using our products and/or services.

After reading this policy, if you have any questions about this policy or related matters, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will provide you with answers as soon as possible.

一、How do we collect and use your personal information

We collect your personal information mainly to make it easier and more satisfactory for you and other users to use our products and/or services.

(一)We will collect and obtain your personal information through the following channels:

1. The information you provided. For example:

(1)The information you provide to us when applying for or using our products and/or services through our partners;

(2)The shared information you provide to other parties through our products and/or services, as well as the information stored when you use our products and/or services.

Please note that if you disclose your information in public areas visible to other users in our products and/or services, or in your responses to information uploaded or published by others, such information may be collected and used by others. When you discover that others have improperly collected or used your information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy.

2. Your information shared by others. That is, the shared information about you provided by others when using our products and/or services.

3. We obtained your information. The information we collect, summarize, and record when you use our products and/or services, such as log information, location information, and device information.

(二)We will collect and use the following types of personal information from you for the following purposes:

1. Login

In order for us to provide services for you, you need to provide basic account information through partners, including ID number, name, mobile phone number, city, etc., and create your account, user name and password.

You can also choose to fill in your nickname, modify or supplement your avatar according to your own needs to further improve your information. However, if you do not provide these supplementary information, it will not affect your basic use of our products and/or services.

In addition, in accordance with the conditions stipulated in the service agreement and relevant national laws and regulations, we also provide account cancellation. You can contact us through the feedback channels listed in the "How to Contact Us" section of this policy for handling.

2. authentication
In order for us to provide services for you, you need to provide basic account information through the partner, including ID number, name, mobile phone number, city, vehicle, enterprise information, etc., and pass the certification.

3. Providing services to you

The personal information we collect and use is a necessary condition for providing you with services. Without relevant information, we will not be able to provide you with the core content of the service, such as:

(1)When you use our products and/or services, upload and/or publish information, and engage in related activities (such as notepad), we will collect the information you upload, publish, or form, and have the right to display your nickname, avatar, and published content;

(2)When you contact us, we may save your communication/call records and content, or the contact information you left behind, in order to contact you or help you solve problems, or record the solutions and results of related problems;

(3)To provide user profiling, understand product compatibility, identify account abnormalities, and improve product service quality, we may collect and correlate information about the services you use and how you use them. This information includes:

l Log information: When you use our service, we may automatically collect detailed usage information about your use of our service as a relevant network log. For example, your login account, IP address, browser type, telecom operator, network environment, language used, access date and time, as well as the webpage browsing records you visited, push opening records, stay time, refresh records, and publish records.

l Device information: We may receive and record device related information (such as IMEI, MAC, Serial, SIM card IMSI identification code, device model, operating system and version, client version, device resolution, package name, device settings, process and software list, unique device identifier, software and hardware feature information) based on the specific permissions granted by you during software installation and use Information related to the location of the device (such as IP address, GPS location, and WLAN access point, Bluetooth, and base station sensor information that can provide relevant information).

Please note that separate device information and log information are information that cannot identify a specific natural person. If we combine this type of non personal information with other information to identify a specific natural person, or use it in conjunction with personal information, during the combined use period, this type of non personal information will be considered personal information. Unless authorized by you or otherwise specified by laws and regulations, we will anonymize or de label this type of personal information.

(4)We have collected your personal information indirectly:

We may obtain relevant information that you have authorized to share from related parties or third-party partners. For example, we may obtain account information (including username, avatar, and nickname) that you have authorized to share from a third party and bind your third-party account to your service account after you agree to this policy, allowing you to directly log in and use our products and/or services through the third-party account. We will collect and use your information in accordance with relevant laws and regulations, and in accordance with agreements with related parties or third-party partners, on the premise that we are confident that the information provided by them is from a legitimate source.

(5)The services we provide may include advertisements, and you agree to display advertisements provided by us, third-party suppliers, and partners during use.

4. Push cancellation to you

We may issue notifications related to services to you when necessary (such as when we suspend, change, or terminate the provision of a single service due to system maintenance).

If you do not want to continue receiving messages we push, you can ask us to stop pushing, for example: according to the SMS unsubscribe guidelines, we are required to stop sending SMS, or set up in the mobile device to no longer receive messages we push; Except in cases where we send messages in accordance with legal provisions or service agreements for individual services.

5. Providing you with security

To improve the security of your use of our services and those provided by our partners, protect the personal and property security of you, other users, or the public from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, and more accurately identify violations of laws, regulations, or service related agreement rules, we may collect, use, or integrate your account information, device information Log information, as well as information obtained by our affiliated companies and partners through your authorization or legal sharing, is used to comprehensively assess the risk of your account, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

6. Improve our services

We may use the information collected through one service for our other services. For example, the information collected when you use a certain service may be used in another service to provide you with specific content or display information related to you, rather than being generally pushed; We may involve you in surveys related to services to help us improve existing services or design new ones; Meanwhile, we may use your information for software updates.

7. OTHERS

You understand and agree that after collecting your personal information, we may use technical means to deidentify the data, and the deidentified information will not be able to identify you. In this case, we have the right to use the deidentified information to analyze and commercialize the user data base without obtaining your consent.

Please note that if we wish to use your personal information for other purposes not specified in this policy or collect additional personal information not mentioned, we will obtain your consent through page prompts, interactive processes, website announcements, or other means. Once you agree, such additional use will be considered as part of this policy, and such additional information will also apply to this policy.

8. Exceptions to obtaining authorized consent

According to relevant laws and regulations, collecting your information does not require your authorized consent in the following situations:

(1)Related to national security and national defense security;

(2)Related to public safety, public health, and major public interests;

(3)Related to criminal investigation, prosecution, trial, and execution of judgments;

(4)For the purpose of safeguarding the significant legitimate rights and interests of the information subject or other individuals, such as life and property, but it is difficult to obtain your personal consent;

(5)The information collected is publicly available to the public on your own;

(6)Collecting information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;

(7)Necessary for signing the contract according to your requirements;

(8)Necessary for maintaining the safe and stable operation of our services, such as detecting and disposing of product or service malfunctions;

(9)Necessary for legitimate news reporting;

(10)It is necessary for academic research institutions to conduct statistical or academic research based on the public interest, and to de label the information contained in the results when providing academic research or descriptive results to the public;

(11)Other situations stipulated by laws and regulations.

9. Specific access rights usage

You understand and agree that some individual services may require you to enable specific access permissions (such as your location information, camera, album, etc.) on your device to collect and use the information involved in these permissions. When you need to turn off this feature, most mobile devices will support your needs. For specific methods, please refer to or contact your mobile device's service provider or manufacturer. Please note that if you enable any permission, it means that you authorize us to collect and use relevant information to provide you with corresponding services. If you close any permission, it means that you have cancelled the authorization. We will no longer continue to collect and use relevant information based on the corresponding permission, nor will we be able to provide you with the services corresponding to that permission. However, your decision to close permissions will not affect the collection and use of information previously based on your authorization.

Explanation of the usage of mobile phone permission application:

Location Information: We will collect your location information (we only collect your geographical location at the time, but will not combine your location information from different time periods to determine your whereabouts) to determine your location for more accurate exam questions, information, and advertising services. At the same time, the collected location information will be used for statistical analysis of user regional distribution, so that we can better improve our products and services. If you refuse to provide location information, it will not affect the normal use of other functions.

Enable mobile storage permissions: mainly used for users to load and play course videos, download and update question banks.

Turn on the camera: used for class hour facial verification recognition and modifying user avatars.

Open Access Album: Used to modify user avatars.

Push notification: used to prompt users to display the progress of the download.

Calling: Used for users to directly call customer service.

We will inform you in advance in the form of pop-up windows when you first download the app or specifically use the functions listed above. You can choose according to your needs. You can view and close the above system permissions in the "Settings Applications Permission Management" section of your device. In different device or system versions, the relevant viewing or operating paths and methods may vary. Please refer to the instructions or guidelines of the device and system developers for details. After disabling permissions, it will only affect the current use of related functions, but will not affect the normal use of other functions.

10. Sensitive personal information reminder

The above information provided by you or collected by us may include your personal sensitive information, such as ID number number, mobile phone number, account number and its related password, web browsing records, and location information. Please be cautious and pay attention to personal sensitive information. You agree that we can handle your personal sensitive information according to the purposes and methods described in this policy.

 

二、Personal information that we may share, transfer, or disclose

(一)share

We promise to keep your information strictly confidential. Unless otherwise specified by laws and regulatory authorities, we will only share your information with third parties (including our affiliated companies, cooperative financial institutions, and other partners) in the following situations. We will only share your personal information for legitimate, legitimate, necessary, specific, and clear purposes. We will sign strict confidentiality agreements with companies, organizations, and individuals with whom we share personal information, requiring them to handle the information in accordance with our instructions, this policy, and any other relevant confidentiality and security measures.

We will obtain your consent in the form of confirmation agreements, specific scenario copywriting confirmation, and pop-up prompts in accordance with laws, regulations, and national standards, or confirm that a third party has obtained your consent, unless the shared personal information is deidentified and the natural person subject of such information cannot be re identified by the sharing third party.

The specific business sharing content includes:

1. Implement shared information for services or functions

Some products and/or services may be provided by third parties or jointly provided by us and third parties. Therefore, in order to achieve the functionality of our products and/or services and enable you to use the services normally, we need to share your information.

(1)Service providers and other partners

Including training business partners (such as your transportation enterprise and driving school), training class hour recognition management department, your name, ID number, class hour data and face verification collection data, which will be displayed to the corresponding service providers and partners according to relevant policies and management requirements, or data transmission will be carried out in the service provider and partner's business platform.

(2)payments function

The payment function is provided by third-party payment institutions we cooperate with. Third party payment institutions may need to collect your name, bank card type and number, expiration date, and mobile phone number. This information is personal sensitive and necessary for the payment function. Refusing to provide it will result in you being unable to use the function, but it will not affect the normal use of other functions.

(3)Message push function compatible with the terminal model you are using

We may share phone models, versions, and related device information with terminal device manufacturers through technologies such as SDK.

2. Realize shared information related to advertising

(1)Advertising push

We may share information (geographical location, device identification) with partners who entrust us with promotion and advertising, but we will not share information (name, ID number number) used to identify your personal identity, so as to help them launch more accurately based on geographical location without identifying your personal identity, and improve the effective reach rate of advertising.

(2)Advertising Statistics

We may share deidentified device information or statistical information with service providers, suppliers, and other partners in our business, which is difficult to associate with your identity information and will help us analyze and measure the effectiveness of advertising and related services.

3. Help you participate in marketing promotion activities

If you choose to participate in a lottery, competition, or other similar marketing promotion event jointly organized by us and a third party, we may share with them the necessary information generated from the event to complete the event, so that the third party can promptly distribute prizes to you or provide services to you. We will clearly inform you on the activity rules page or through other means of what information needs to be provided to third parties in accordance with legal regulations or national standards. You may need to provide information such as name, mailing address, contact information, etc. These information are personal sensitive information. Refusing to provide them may affect participation in related activities, but it will not affect the use of other functions. Only with your consent will we share this information with related parties or third parties to ensure that you receive consistent service experience in joint activities, or entrust third parties to timely redeem rewards to you.

4. Implement shared information for security and analysis statistics

(1)Ensure safe use

We attach great importance to account and service security. In order to ensure the security of your and other users' accounts and protect your and our legitimate rights and interests from infringement, we may use your account information, device information, service log information, as well as information that our affiliates and partners are authorized by you or can share according to law, to determine account security, perform identity verification, detect, and prevent security incidents.

(2)Analyze product usage

To analyze the usage of our products and/or services and improve user experience, we may share deidentified data of product usage (crashes, flashbacks, usage duration, etc.) with third parties, which is difficult to identify your personal identity in combination with other information.

5. Other shared information

(1)According to your legitimate needs or with your authorized consent;

(2)Provide your information at the lawful request of your guardian;

(3)Provided in accordance with the single service agreement signed with you (including online electronic agreements and corresponding platform rules) or other legal documents;

(4)Provided based on academic research;

(5)Provided based on social public interests that comply with laws and regulations.

(二)transference

1. With the continuous development of our business, we may engage in mergers, acquisitions, asset transfers, or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization that holds your personal information to continue to be bound by this policy. Otherwise, we will require the company or organization to seek your authorization and consent again.

2.After obtaining your explicit consent, we will transfer your personal information to other parties.

(三)publish

We will only disclose your personal information under the following circumstances, and only if we take security measures that comply with industry standards:

1. According to your needs, disclose the information you have specified in a disclosure method that you have explicitly agreed to;

2. In cases where it is necessary to provide your information according to laws, regulations, mandatory administrative enforcement or judicial requirements, we may disclose your information based on the type of information and disclosure method required. On the premise of complying with laws and regulations, when we receive the request for disclosure of information mentioned above, we will require the recipient to provide corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that the information requested from us should be kept as transparent as possible within the scope permitted by law. We have carefully reviewed all requests to ensure that they have legal basis and are limited to data that law enforcement agencies have legitimate rights to obtain for specific investigative purposes.

(四)Exceptions to obtaining prior authorization and consent when sharing, transferring, or disclosing information

In the following situations, sharing, transferring, or disclosing your information does not require your prior authorization and consent:

1.Related to national security and national defense security;

2. Related to public safety, public health, and major public interests;

3. Related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial, and execution of judgments;

4. For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;

5. Information that you disclose to the public on your own;

6. Collecting information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels.

According to legal regulations, sharing, transferring, or disclosing personal information that has undergone de identification processing and ensures that the data recipient cannot recover and re identify the information subject does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require separate notice to you or your consent.

四、How do we retain, store, and protect personal information

We will only retain your personal information for the period necessary for the purposes stated in this policy and within the time limit required by laws and regulations.

The personal information we collect and generate during our operations within the People's Republic of China is stored within the territory of China, except for the following situations:

1. There are clear provisions in laws and regulations;

2. Obtain your authorized consent.

In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this policy and national laws and regulations.

We attach great importance to information security, establish a dedicated security team, and take all reasonable and feasible measures to protect your personal information:

(一)Data security technical measures

We will adopt security measures that comply with industry standards, including establishing reasonable institutional norms and security technologies to prevent unauthorized access, use, and modification of your personal information, and to avoid data damage or loss.

Our services adopt various encryption technologies. For example, in some products, we will use encryption technology to protect your personal information, use encryption technology to encrypt and save your personal information, and use isolation technology for isolation.

When using personal information, such as information display and information association calculation, we will use various data desensitization technologies to enhance the security of information in use.

We will also adopt strict data access control and multiple identity authentication technology to protect personal information and avoid unauthorized use of data.

(二)Other security measures we take to protect personal information

We manage and standardize the storage and use of personal information by establishing a data classification and grading system, data security management standards, and data security development standards.

We implement comprehensive security control over data through information contact confidentiality agreements, monitoring, and auditing mechanisms. We will also hold security and privacy protection training courses to enhance employees' security awareness and awareness of the importance of protecting information.

We only allow employees and partners who need to know this information to access your personal information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to fulfill corresponding confidentiality obligations. If these obligations are not fulfilled, legal responsibility may be pursued or our cooperation relationship may be terminated.

We will take all reasonable and feasible measures to ensure that unrelated personal information has not been collected.

The Internet is not an absolutely secure environment, and communication methods with other users such as email, instant messaging, social media, or other service software cannot be determined whether they are fully encrypted. We recommend that you use complex passwords when using such tools and pay attention to protecting your information security.

The internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of the personal information you send us. If our physical, technical, or management protective facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.

(三)Security Incident Handling

To address the potential risks of personal information leakage, damage, and loss, we have developed multiple systems to clarify the classification and grading standards for security incidents and vulnerabilities, as well as corresponding handling processes. We have also established a dedicated emergency response team for safety incidents. In accordance with the requirements of safety incident handling standards, we initiate safety plans for different safety incidents, conduct loss stopping, analysis, positioning, develop remedial measures, and collaborate with relevant departments to trace and crack down.

After an unfortunate information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will also promptly inform you of the relevant situation of the event through email, letter, phone call, push notifications, and other means. If it is difficult to inform the information subject one by one, we will take reasonable and effective measures to publish the announcement. At the same time, we will also proactively report the handling of information security incidents in accordance with regulatory requirements.

Please understand that due to technological limitations and risk prevention limitations, even if we have tried to strengthen security measures, we cannot always ensure 100% security of information. You need to understand that the system and communication network you use to access our services may encounter problems due to situations beyond our control.

Please ensure that you keep your account, password, and other identity elements properly. When you use our services, we will identify your identity through your account, password, and other identity elements. Once you disclose the aforementioned information, you may suffer losses and may have adverse effects on you. If you find that your account, password, and/or other identity elements may or have been leaked, please contact us immediately so that we can take timely measures to avoid or reduce related losses.

五、How to manage your personal information

(一)Accessing, updating, and deleting

We encourage you to update and modify your personal information to make it more accurate and effective. You can access your personal information through our services and complete or request us to modify, supplement, and delete it according to the corresponding information management method. We will take appropriate technical measures or provide contact channels for submitting applications to ensure as much as possible that you can access, update, and correct your personal information or other information provided when using our services.

When accessing, updating, correcting, and deleting the aforementioned information, we may require you to perform identity verification to ensure information security. For your information collected through COOKIES or similar technologies, we have also explained the selection mechanism provided to you in the second section of this policy, "How do we use COOKIES or similar technologies".

(二)Publicity and sharing

Our service allows you to publicly share your relevant information with all users who use the service, such as the information you upload or post in the comment area, your responses to information uploaded or posted by others, as well as location data and log information related to this information. As long as you do not delete the information you disclose or share, the relevant information may remain in the public domain; Even if you delete shared information, the information may still be independently cached, copied, or stored by other users or third parties beyond our control, or saved in the public domain by other users or such third parties. If you disclose or share information through the aforementioned channels, which results in your information leakage, we will not be responsible. Therefore, we remind and ask you to carefully consider whether to disclose or share your information through the aforementioned channels.

(三)log off

Under the conditions stipulated in the Tong'an Service Agreement and relevant national laws and regulations, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy to apply for cancellation. After your account is cancelled, we will stop providing all or part of the services to you, and according to your request, delete your personal information or anonymize it, unless otherwise stipulated by laws and regulations.

(四)Change the scope of your authorization and consent

You can always choose whether to disclose information. Some information is necessary for using our services, but the provision of most other information is up to you. You can change the scope of your authorization for us to continue collecting information or revoke your authorization by deleting information, turning off device functions, etc.

After you revoke your authorization, we cannot continue to provide you with the corresponding services for revoking your authorization, and we will no longer process your corresponding information. But your decision to revoke your authorization will not affect the information processing previously carried out based on your authorization.

六、third-party services

Our services may be linked to other services provided by third parties (including websites, third-party SDKs, or other forms of services), and we may share certain personal information of you collected in accordance with this policy with such third parties in order to provide complete services and improve user experience.

Other services provided by such third parties shall be operated by the relevant third parties. Your use of other services provided by such third parties (including any information you provide to such third parties) is subject to the third party's own service terms and information protection statements (rather than this policy), and you need to carefully read their terms. This policy only applies to the personal information we collect and does not apply to any third-party services or information usage rules. If you find that these third-party services pose risks, we suggest that you terminate the relevant operations to protect your legitimate rights and interests.

七、age limit

We suggest that any minors who participate in online activities should obtain the consent of their parents or their legal guardians (hereinafter referred to as "guardians") in advance. We will protect the relevant information of minors in accordance with relevant national laws and regulations.

We encourage parents or guardians to guide minors in using our services. If you are a minor, please notify your parents or guardians to read this policy and seek their consent and guidance before submitting personal information.

八、Notices and amendments

In order to provide you with better services, we may modify the terms of this policy in a timely manner according to the updates of products or services and the relevant requirements of laws and regulations, and such modifications form part of this policy. If such updates result in substantial reduction or material change of your rights under this Policy, we will notify you by public account message, push notification, pop-up prompt or other means before this policy takes effect. If you do not agree with such changes, you can choose to stop using our Services; If you continue to use our Services, you have fully read, understood and agreed to be bound by this revised policy.

Any changes we make will put your satisfaction first. We encourage you to review our Privacy policy every time you use our services.

We may make service-related announcements when necessary (such as when we suspend a service due to system maintenance). You may not be able to cancel these service related announcements that are not promotional in nature.

九、How to contact us

If you have any questions, comments or suggestions regarding this Privacy Policy or matters relating to your personal information, please contact us. Send an email to Rocketnoveloffical@gmail.com

In general, we will respond to your question, comment or suggestion within 30 days after we receive your question, comment or suggestion and verify your user identity.