EYG Privacy Policy


EYG is developed and operated by Liaoning Erya Network Information Technology Co., Ltd. The privacy policy of EYG applies to all software, websites, and services provided by EYG (collectively referred to as "EYG Products or Services"), including but not limited to products and services suitable for computers, mobile intelligent terminals, and vehicle navigation devices.

The privacy policy of EYG is designed to help you better understand what data we collect, why we collect this data, what we do to benefit this data, and how we protect this data. Understanding these contents is crucial for you to exercise your personal rights and protect your personal information. Please take the time to carefully read this policy before using our products or services. When you start downloading, accessing, or using our products or services, you indicate that you have agreed to this privacy policy and trust our handling of your information. Your information should be subject to the privacy terms of third parties.

This policy includes the following content:

(1)The necessary permissions for the software and the information you share.

(2)How do we collect and use your personal information.

(3)How can we share, transfer, and publicly disclose your personal information.

(4)How can we save and protect your personal information.

(5)How do you manage your personal information.

(6)How do we use cookies and similar technologies.

(7)Applicable law and dispute resolution.

(8)Protection of minors.

(9)Change.

(10)Contact us.

Thank you for your support and trust in EYG. EYG understands the importance of personal information to you, and we will continue to strive to provide you with more reliable services.

1.  Necessary software permissions and information you share.

During the process of using the EYG APP, in order for this software to provide the described functions, you will apply for the following permissions. After rejecting or granting permissions, you can reset the permissions in the client settings.

(1)Storage: Used to store user login information and settings.

(2)Camera: Based on QR code scanning and user profile settings, it is recommended to set the user profile by taking photos.

2.  How do we collect and use your personal information.

"Personal information"  refers to various types of information recorded in electronic or other forms that can be individually or in combination with other information to identify a specific natural entity or reflect a specific natural activity situation. When you use EYG products or services, EYG may receive and record server values on your website or application, including but not limited to the keywords you enter, the operating status of EYG products or services, network environment, abnormal logs, etc basic record information that is clearly and objectively reflected on the server side of EYG products or services. You understand and agree that the aforementioned basic record information and other personal information that cannot be identified through it do not belong to your personal information .

2.1  The information you directly provided and we actively collected :

(1)When you use EYG service, we need to collect your device identification information (IMEI, IDFA, IDFV, Android ID, MEID, MAC address, OAID, IMSI, ICCID, hardware serial number), current application information (application name, application version number), device parameters and system information (system properties, device model, operating system, operator information) in order to troubleshoot and diagnose various problems in the application, Ensure the safe and normal operation of the product. At the same time, in order to achieve the detection and linkage functions of machine shaking and screen rotation, we need to access your device and network information (such as IP address, 4G/5G/WiFi status, signal strength information, sensor information).

(2)When you register your account, you will provide us with the account name, nickname, password, phone number, etc. After registering and logging in, you will enjoy the services provided by EYG.

(3)When you are in contact with EYG on a phone, in order to facilitate contact or help you solve problems, we may record your contact information and information, and record your call content as needed.

2.2 The information we indirectly collected when you used third-party services and functions :

In order to provide you with more convenient services, EYG has provided third-party services, such as Tencent Bugly. You authorize us to provide this information to the third party who provides you with services, and authorize us to indirectly obtain relevant information from the third party. If you refuse to collect such information from us, we will not be able to provide you with relevant functions and services.

Application SDK Name: Tencent Turing Shield
Third Party Name: Shenzhen Tencent Computer System Co., Ltd.
Empowered by: Enhancing Software Operational Security
Collect personal information: software installation list, device information (including IMEI, IDFA, Android ID, MEID, MAC address, OAID, IMSI, hardware serial number), network status, system settings, device model, operating system and IP address, and installed APP information.
Privacy Policy Link: https://privacy.qq.com/document/preview/5331f064a91a47eb93993fdacb91c8f7/

Application SDK Name:Tencent Bugly
Third Party Name:Shenzhen Tencent Computer System Co., Ltd.
Empowered by:collect software problems to improve software quality
Collect personal information:mobile phone model, mobile phone brand, system version, Android system api level, Android ID, manufacturer system version, cpu architecture type, whether the device is root, disk space occupation, sdcard space occupation, memory space occupation, network type Installed APP information.
Privacy Policy Link: https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56/

Application SDK Name:WeChat SDK
Third Party Name:Shenzhen Tencent Computer System Co., Ltd.
Empowered by: To provide WeChat authorization to log in
Collect personal information:Installed APP information.
Privacy Policy Link: https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8/

Third party SDK name: Huawei Unified Scan Code SDK (Android version)
Third Party Name:Huawei Software Technology Co., Ltd.
Collect personal information:text information, images, network information, application basic information, operator information, device hardware information (including sensor information), device model, operating system, system settings information, and information about your use of this application.
Empowered by:To provide code generation or scanning capabilities for developers' applications.
Privacy Policy Link: https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050043971

2.3 Instructions for use.

(1)You authorize us to use the above information during your use of EYG products and services.

(2) If we need to collect or use your personal information for other purposes or non-specific purposes not specified in this policy, we will seek your consent in advance.

2.4  Deidentification.

After collecting your personal information, we will use technical means to de label the data in a timely manner. The de labeled information will not be able to identify the subject. Without disclosing your personal information, EYG has the right to mine, analyze, and utilize user data (including commercial use) .

2.5 Special circumstances.

 In the following special circumstances, collecting your personal information does not require your authorized consent

a.Related to national security and national defense security;

b.Related to public safety, public health, and major public interests;

c.Related to criminal investigation, prosecution, trial, and execution of judgments;

d.For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain your consent;

e.The personal information collected is publicly available to the public on your own;

f.Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;

g.Necessary for implementing product functions and services according to your requirements;  

h.Necessary for maintaining the safety and compliance of the products and services provided, such as identifying and handling malfunctions in the products and services;

i.Necessary for legitimate news reporting;

j.Academic research institutions conduct statistical or academic research based on the public interest, and when providing academic research or descriptive results to the public, de label the personal information contained in the results;

k.Other situations stipulated by laws and regulations;

l.When violating the relevant regulations of EYG or affecting the interests of EYG.

3.  How do we share, transfer, and publicly disclose your personal information

3.1 Sharing

(1)EYG will treat your information with a high degree of diligence and obligation, and will not share your personal information with any company, organization, or individual outside of EYG and its affiliated companies. Except for the following situations :

a.Obtain your explicit authorization or consent in writing or email in advance;  

b.According to applicable laws and regulations, legal procedures, government mandatory requirements or judicial rulings, EYG must provide;  

c.Within the scope required or allowed by law, it is necessary to provide in order to protect EYG, users of EYG, or public interests, property, or safety from damage;

d.Provided for use based on certain academic research;

e.Provide use based on social and public interests that comply with laws and regulations;

f.Use in accordance with the provisions of other legal documents signed with you (such as this clause);

g.Due to some of our services being provided by authorized partners, EYG may provide your personal information to third parties such as partners. Our partners have no right to use the shared personal information for any other purpose.

(2)Our authorized partners may include the following types:

  1. Software service providers, smart device providers, and system service providers .

When combining with third-party software and device systems to provide location-based services, EYG may collect your location and device information based on your authorization and settings for system positioning, and provide it to the system. In special situations, it may include personal information that you have filled out separately. If you refuse to collect and use such information, you will need to set up or disable the software providing services in the device system. EYG cannot automatically or manually set up or disable related services.

  1. Suppliers, service providers, and other partners .

We may send information to suppliers, service providers, and other partners who support our business, including providing technical infrastructure services, providing functional services within or after product links, analyzing the usage of our services, measuring the effectiveness of advertising and services, providing customer service, and conducting surveys.

(3) Sharing requirements .

Before sharing information, we will conduct a data security capability audit on third parties sharing personal information, sign strict data security and confidentiality agreements with them, and require them to take relevant confidentiality and security measures to handle the above information in accordance with our instructions and this privacy policy.

3.2  Transfer and Disclosure

(1) Transfer .We will not transfer your personal information to companies, organizations, or individuals other than EYG and its affiliated companies, except for the following situations :

a. Obtain your explicit authorization or consent in writing or email in advance  

b.According to legal regulations, legal procedures, mandatory government requirements or judicial rulings, EYG must provide  

c.Use in accordance with the provisions of other legal documents you have signed (such as this clause);

d.When it comes to mergers, acquisitions, or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.

(2) Public disclosure . We will only publicly disclose your personal information in the following circumstances :

a.We have obtained your explicit consent in writing or email;

b.We may publicly disclose your personal information under laws and regulations, legal proceedings, litigation, or mandatory requirements from relevant government departments.

3.3 Exceptions

In the following situations, sharing, transferring, and publicly disclosing personal information does not require authorization and consent from the personal information subject :

a.Related to national security and national defense security;

b.Related to national security and national defense security;

c.Related to criminal investigation, prosecution, trial, and execution of judgments;

d.For the purpose of safeguarding the significant legitimate rights and interests of personal information subjects or other individuals, such as life and property, but it is difficult to obtain personal consent;

e. Personal information disclosed by the individual information subject to the public on their own;

f.Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels.

4.  How do we save and protect your personal information

4.1  Shelf life .

Unless otherwise specified by laws and regulations,EYG will strictly store your information as follows:

During your use of EYG products or services, we will continue to save them for you

4.2 Safety measures.

(1)EYG will take appropriate security measures and technical means that comply with industry standards to store and protect your personal information, to prevent its loss, misuse, unauthorized access or leakage, tampering or destruction, such as encrypted transmission through network security layer technology SSL, information encryption storage, strict restrictions on data center access, use of dedicated network channels and network proxies. Your personal information is stored on a password controlled server, and access is restricted.

(2) In order to protect your information security, if the user's personal information is incorrect, EYG will strictly verify and verify the applicant's identity, and access, correct, or delete relevant information according to the user's requirements (unless EYG must retain this personal information for legitimate reasons).

4.3 Special reminder.

(1)The Internet is not an absolutely secure environment, and communication methods with other users such as email, instant messaging, social media, and trading platforms cannot be determined whether they are fully encrypted ,Please pay attention to protecting the security of your personal information when interacting and do not easily believe scammers' remittance requirements .

(2)Please understand that due to the rapid development of computer and internet technology and the limitations of synchronization speed, various malicious or non malicious attack methods may exist or appear on the network. Although EYG continues to strive to improve and strengthen security measures to protect your information from accidents or damage, it still cannot always guarantee 100% security of your information .

(3) The system, communication network, or hardware devices used by you when using products or services cannot be controlled, Please understand and pay attention to protecting the security of your personal information.

4.4 Safety incidents

(1) If an unfortunate personal information security incident occurs, we will promptly inform you of the basic situation and potential impact of the security incident, the measures we have taken or will take to address it, suggestions for risks you can independently prevent and reduce, and remedial measures for you in accordance with legal and regulatory requirements. We will promptly inform you of the relevant situation of the event through on-site notifications, SMS notifications, phone calls, emails, and other contact information you have reserved. If it is difficult to inform you one by one, we will take reasonable and effective measures to publish an announcement .

(2)We will promptly address security risks such as system vulnerabilities, network attacks, virus attacks, and network intrusions. When an event endangers network security occurs, we will follow the emergency plan for network security incidents, take corresponding remedial measures in a timely manner, and report to the relevant regulatory authorities in accordance with regulations .

5.  How do you manage your own information

EYG highly advocates and welcomes your attention to personal information. You have the right to search, correct, manage, and protect your privacy and security.

5.1 Access Rights.

Except for exceptions specified by laws and regulations, we will strive to ensure that you have smooth access to your personal information whenever you use our services.

Account Information: If you wish to access or edit personal information in your account, change your password, etc., you can perform such actions in "My" - "Edit".

5.2 Account cancellation.

(1)Open EYG and click on 'My'

(2) Click on 'Setting'

(3)Click on ' Delete Account'

(4) Click "Delete" in the pop-up box

Note: After you log out, we will delete or anonymize your personal information and cannot recover it.

5.3 Exceptions.

According to legal and regulatory requirements, we will not be able to respond to your request in the following situations:

a.Related to national security and national defense security;

b.Related to public safety, public health, and major public interests;

c. Related to criminal investigation, prosecution, and trial;

d.There is sufficient evidence to indicate that you have subjective malice or abused your rights;

e.Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

6.  How do we use cookies and similar technologies

(1)When you use EYG products or services, in order to make your access experience easier, we may use relevant technologies to collect and store information. During this process, we may send one or more cookies or anonymous identifiers to your device. In order to understand your usage habits and avoid repeating steps such as entering registration information, or to help determine the security of your account.

(2) We will not use Cookie for any purpose other than those stated in this policy. You may keep or delete cookie according to your preferences. 。You can clear all Cookie saved in the software ,and once you manually clear them, your relevant information has been deleted.

7.  Applicable Law and Dispute Resolution

7.1 Applicable Law.

The implementation, interpretation, and dispute resolution of this policy shall be governed by the laws of the People's Republic of China and shall not take into account any conflict of laws .

7.2 Dispute Resolution.

If there is any dispute between you and EYG regarding the content or implementation of this policy, both parties shall resolve it through friendly consultation; If both parties are unable to resolve the dispute through consultation, they agree to submit the dispute to the people's court of the defendant's residence for arbitration.

8.  Protection of minors

8.1 We attach great importance to the protection of personal information of minors .

If you are a minor (especially a minor under the age of 14), please ask your guardian to carefully read this privacy policy and use our services with the consent of your guardian .

8.2 Remedial Measures.

(1)If you fail to obtain the consent of your guardian or if you do not agree to your guardian using our services and providing us with information, please immediately stop using our services and contact us promptly .

(2)Upon receiving your written notice or our own knowledge, if EYG collects personal information of minors without the prior consent of the guardian, EYG will immediately cease the collection and use of relevant information.

9.  Changes

9.1 Updates and Adjustments.

This policy will be adjusted or updated periodically based on business models, and such revisions form part of this privacy policy and have retrospective effect .

9.2 Notification Method.

(1)Without your explicit consent, we will not reduce your rights under this privacy policy. We will publish changes to our privacy policy in a reasonable manner. If you continue to use our products or services, you agree to the revised policy terms.

(2) If significant changes occur, we will adopt more informative methods to inform users, including but not limited to websites, mobile intelligent devices, and other forms of notifications. The significant changes referred to in this policy include but are not limited to :

a.Our service model has undergone significant changes;

b.Changes in the main objects of public disclosure of personal information;

c.Significant changes have occurred in the right to process personal information and the way it is exercised;

d.Our contact information and complaint channels have changed.

10.  Contact Us

You can visit the official website of Liaoning Erya Network Information Technology Co., Ltd. to contact us.

a.Visit website: https://www.eryanet.com/game.html;

b. Browse to the bottom of the website to view the company's contact email and phone number;

c. Get in touch with us.

Attachment: Explanation of Terms

In order to help you better understand this privacy policy, some terms in the aforementioned clauses are explained as follows:

Personal sensitive information refers to personal information that, once leaked or abused, may endanger personal and property safety, cause damage to personal reputation, physical and mental health, or discriminatory treatment.

A unique device identifier refers to a unique device identifier, a string of characters programmed by the device manufacturer into the device, which can be used to uniquely identify the corresponding device (such as the international mobile device identification code IMEI number, network device hardware address MAC, etc.). Different device identifiers may vary in terms of validity, whether users can reset them, and how they are obtained. The corresponding device may have multiple unique device identifiers. The unique device identifier can be used for various purposes, including security and fraud detection, as well as synchronization services such as the user's email inbox.

Cookie refers to a mechanism that supports server-side (or script) storage and retrieval of information on the client, extending web-based client/server applications by adding simple and persistent client state. The server sends a status message while returning an HTTP object to the client, which is saved by the client. The status information indicates the valid URL range in that state. Afterwards, HTTP requests within this range initiated by the client will return the current value of the status information from the client to the server, which is called a cookie.

Anonymous identifier refers to a identifier generated by machine algorithms based on device parameters to help EYG identify a user, provide them with better products and/or services, and improve the user experience.

Deidentification refers to the process of processing personal information so that it cannot identify the subject of personal information without the use of additional information.

Anonymization refers to the process of processing personal information through technology, which makes the subject of personal information unrecognizable and the processed information unrecoverable.

Affiliated companies refer to any company or legal entity controlled, controlled, or under common control with a party, as well as the legal successors of the aforementioned companies or legal entities. Control refers to (1) directly or indirectly holding a majority of the voting rights; Or (2) directly or indirectly enjoy more than half of the distributable profits; Or (3) directly or indirectly controlling the composition of more than half of the members of the board of directors; Or (4) directly or indirectly holding half of the registered capital.

  • 软件服务提供商、智能设备提供商和系统服务提供商
  • 尔雅畅游与第三方软件、设备系统结合为您提供基于位置的服务时,可能会基于您对系统定位的授权及设定,收取您的位置信息及设备信息并提供给系统,特殊情境下会包含您另行填写的个人信息。如果您拒绝此类信息收集及使用,您需要在设备系统中进行设置或关闭提供服务的软件,尔雅畅游无法通过自动或手动设置关闭相关服务。

  • 供应商、服务提供商和其他合作伙伴
  • 我们可能将信息发送给支持我们业务的供应商、服务提供商和其他合作伙伴,这些支持包括提供技术基础设施服务、提供产品内或产品链接后的功能型服务,分析我们服务的使用方式、衡量广告和服务的有效性、提供客户服务和调查。

    (3) 共享要求

    在共享信息前,我们会对共享个人信息的第三方进行数据安全能力审核,与其签署严格的数据安全和保密协定,要求他们按照我们的说明、本隐私权政策采取相关的保密和安全措施来处理上述信息。

    3.2  转让与公开

    (1) 转让 。我们不会将您的个人信息转让给除尔雅畅游及其关联公司以外的公司、组织和个人, 但以下情况除外

    a.事先获得您的书面或者邮件等明确授权或同意; 

    b.根据法律法规、法律程序的要求或强制性的政府要求或司法裁定尔雅畅游必须提供; 

    c.符合您签署的其它法律文件(如本条款)的约定而使用;

    d.在涉及合并、收购或破产清算时,如涉及到个人信息转让,我们会要求新的持有您个人信息的公司、组织继续受此隐私权政策的约束,否则我们会要求该公司、组织重新向您征求授权同意。

    (2) 公开披露 我们仅在以下情况,公开披露您的个人信息

    a.已获得您的书面或者邮件等明确同意;

    b.在法律法规、法律程序、诉讼或政府相关部门强制性要求下,我们可能会公开披露您的个人信息。

    3.3 例外

    在以下情形中, 共享、转让、公开披露个人信息无需征得个人信息主体的授权与同意

    a.与国家安全、国防安全有关的;

    b.与公共安全、公共卫生、重大公共利益有关的;

    c.与犯罪侦查、起诉、审判和判决执行等有关的;

    d.出于维护个人信息主体或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;

    e.个人信息主体自行向社会公众公开的个人信息;

    f.从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道。

    4.  我们如何保存及保护您的个人信息

    4.1  保存期限

    除非法律法规有明确规定,尔雅畅游将严格按如下保存您的信息:

    您使用尔雅畅游产品或服务期间,我们将持续为您保存

    4.2 安全措施。

    (1)尔雅畅游会采取适当的符合业界标准的安全措施和技术手段存储和保护您的个人信息,以防止其丢失、被误用、受到未授权访问或泄漏、被篡改或毁坏,如通过网络安全层技术SSL进行加密传输、信息加密存储、严格限制数据中心的访问、使用专用网络通道及网络代理。您的个人信息存放在有密码控制的服务器中,访问均是受到限制的。

    (2)为了保护您的信息安全,如果用户个人信息有误,尔雅畅游会在严格验证并核实申请人身份后,根据用户要求访问、修正或删除相关信息(除非尔雅畅游出于合法的原因而必须保留这些个人信息)。

    4.3 特别提示。

    (1)互联网并非绝对安全的环境,电子邮件、即时通讯、社交软件、交易平台等与其他用户的交流方式无法确定是否完全加密 ,请您在进行交互使用时,注意保护您个人信息的安全,请勿轻易相信骗子的汇款要求

    (2)请您理解,由于计算机及互联网技术的飞速发展及同步速度的限制,网络上可能存在或出现各种恶意或非恶意的攻击手段。 虽然尔雅畅游持续致力于提升和加强安全措施,以保护您的信息免遭意外或破坏,但仍无法始终保证信息的百分之百安全

    (3) 您使用产品或服务时所用的系统和通讯网络,或硬件设备等尔雅畅游均无法控制, 请您了解并注意保护您的个人信息安全。

    4.4 安全事件

    (1)如不幸发生个人信息安全事件后,我们将按照法律法规的要求,及时向您告知安全事件的基本情况和可能的影响、我们已采取或将要采取的处理措施、您可自主防范和降低的风险的建议、对您的补救措施等。 我们会及时将事件相关情况以站内通知、短信通知、电话、邮件等您预留的联系方式告知您,难以逐一告知时我们会采取合理、有效的方式发布公告

    (2)我们会及时处置系统漏洞、网络攻击、病毒侵袭及网络侵入等安全风险。在发生危害网络安全的事件时, 我们会按照网络安全事件应急预案,及时采取相应的补救措施,并按照规定向相关主管部门报告

    5.  您如何管理自己的信息

    尔雅畅游非常提倡和欢迎您对个人信息的关注,您有权利查询、更正、管理、自己的信息并保护自己的隐私和安全。

    5.1 访问权。

    除法律法规规定的例外情况,无论您何时使用我们的服务,我们都会力求让您顺利访问自己的个人信息。

    帐户信息:如果您希望访问或编辑您的帐户中的个人资料信息、更改您的密码等,您可以在"我的"-"编辑"中执行此类操作。

    5.2 注销账号。

    (1)打开尔雅畅游,点击"我的"

    (2)点击"设置"

    (3)点击"注销账户"

    (4)在弹框中点击"注销"

    注意:当你注销后,我们将删除或匿名化你的个人信息,无法恢复。

    5.3 例外。

    按照法律法规要求,以下情况中, 我们将无法响应您的请求:

    a.与国家安全、国防安全有关的;

    b.与公共安全、公共卫生、重大公共利益有关的;

    c.与犯罪侦查、起诉和审判等有关的;

    d.有充分证据表明您存在主观恶意或滥用权利的;

    e.响应您的请求将导致您或其他个人、组织的合法权益受到严重损害的。

    6.  我们如何使用Cookie 和同类技术

    (1)当您使用尔雅畅游产品或服务时,为使您获得更轻松的访问体验,我们可能会使用相关技术来收集和存储信息,在此过程中可能会向您的设备发送一个或多个 Cookie 或匿名标识符。以便于了解您的使用习惯,使您省去重复输入注册信息等步骤,或帮助判断您的帐户安全。

    (2) 我们不会将Cookie 用于本政策所述目的之外的任何用途,您可根据自己的偏好留存或删除Cookie 。您可清除软件内保存的所有Cookie ,当您手动清除后您的相关信息即已删除。

    7.  适用法律与争议解决

    7.1 适用法律。

    本政策的执行、解释及争议的解决均适用 中华人民共和国法律,且不考虑任何冲突法

    7.2 争议解决。

    您和尔雅畅游就本政策内容或其执行发生任何争议的,双方应友好协商解决; 如双方无法协商解决争议时,双方同意应将争议提交至被告住所地人民法院裁决。

    8.  未成年人保护

    8.1 我们重视未成年人的个人信息保护

    如您是未成年人(特别是年龄不满14周岁的未成年人), 请务必要求您的监护人仔细阅读本隐私权政策,并请您在征得您的监护人同意的前提下使用我们的服务

    8.2 补救措施。

    (1)如果您未能取得您监护人的同意或您未同意您的被监护人使用我们的服务并向我们提供信息, 请您或被监护人立即停止使用我们的服务并及时与我们取得联系

    (2)在收到您的书面通知而知晓或我们自行知晓,尔雅畅游在未事先获得监护人同意的情况下收集了未成年的个人信息时,尔雅畅游会立即停止相关信息收集及使用。

    9.  变更

    9.1 更新与调整。

    本政策将根据业务模式的调整或不定期更新修订,该修订构成本隐私权政策的一部分,并具有溯及力

    9.2 告知方式。

    (1)未经您的明确同意,我们不会削减您按照本隐私权政策所享有的权利。我们会通过合理的方式发布隐私权政策所做的变更。若您继续使用我们的产品或服务,即表示您同意修订后政策条款。

    (2)如发生重大变更,我们将会采取更具有提示作用的方式告知用户,包括但不限于网站、移动智能端、其他形式的通知等。 本政策所指的重大变更包括但不限于

    a.我们的服务模式发生重大变化;

    b.个人信息公开披露的主要对象发生变化;

    c.个人信息处理的权利及其行使方式发生重大变化;

    d.我们的联络方式及投诉渠道发生变化。

    10.  联系我们

    您可以访问辽宁尔雅网信科技有限公司官方网站与我们联系。

    a. 访问网址:https://www.eryanet.com/game.html;

    b. 浏览至网站最下方,可查看公司联系邮箱及联系电话;

    c. 与我们取得联系。

    附:名词解释

    为了帮助您更好的了解本隐私权政策,将前述条款中的部分名词进行解释如下:

    个人敏感信息 指一旦泄露或滥用,可能危害人身和财产安全、导致个人名誉、身心健康等受到损害或歧视性待遇等的个人信息。

    唯一设备标识符 指具有唯一性的设备标识符,由设备制造商编入到设备中的一串字符,可用于以独有方式标识相应设备(例如国际移动设备身份码IMEI号、网络设备硬件地址MAC等)。不同的设备标识符在有效期、用户是否可以重置以及获取方式方面会有所不同。相应设备可能会有多个不同的具有唯一性的设备标识符。唯一设备标识符可用于多种用途,其中包括安全性和欺诈检测、同步服务(如用户的电子邮件收件箱)。

    Cookie 是指支持服务器端(或者脚本)在客户端上存储和检索信息的一种机制,通过增加简单、持续的客户端状态来扩展基于Web的客户端/服务器应用。服务器在向客户端返回HTTP对象的同时发送一条状态信息,并由客户端保存。状态信息中说明了该状态下有效的URL范围。此后,客户端发起的该范围内的HTTP请求都将把该状态信息的当前值从客户端返回给服务器,这个状态信息被称为cookie。

    匿名标示符 是指基于设备参数,通过机器算法,生成一个标示符帮助尔雅畅游识别一个用户,为其提供更好的产品和/或服务与改善用户体验。

    去标识化 是指通过对个人信息的处理,使其在不借助额外信息的情况下,无法识别个人信息主体的过程。

    匿名化 是指通过对个人信息的技术处理,使得个人信息主体无法被识别,且处理后的信息不能被复原的过程。

    关联公司 是指一方现在或将来控制、受控制或与其处于共同控制下的任何公司、合法机构以及上述公司、合法机构的合法继承人。 控制 是指(1)直接或间接持有过半数的投票权;或(2)直接或间接享有过半数的可分配利润;或(3)直接或间接控制董事会半数以上的成员的组成;或(4)直接或间接持有半数的注册资本。

    -->