Miracle Box
Privacy Policy
Miracle Box Privacy Policy
[Foreword] Miracle Box (hereinafter also referred to as "we") has always solemnly committed to protecting the personal information and privacy of users who use Miracle Box (hereinafter collectively referred to as "users" or "you"). When you use Miracle Box services, we may collect and use your relevant personal information. We hope to explain to you the relevant matters such as our corresponding processing rules when collecting and using your relevant personal information through the " Miracle Box Privacy Policy" (hereinafter referred to as "this Policy"), so as to better protect your rights and interests.
If you do not agree with this Privacy Policy, you should immediately stop using the relevant service channels of this platform, including Miracle Box and other channels. When you use the services provided by this platform, you agree to this Privacy Policy.
【Special Note】
1. This policy applies to the Miracle Box (hereinafter also referred to as "this product") service provided by us. Underage users are prohibited from participating in consumption.
2. This policy stipulates how we process your information in different scenarios, but we will only process your information in order to achieve relevant functions and services when you enable relevant functions or use relevant services. If you do not enable related functions or use related services, we will not process your corresponding information. In addition to this policy, we will also explain to you the purpose, scope and usage of our information through real-time notifications such as pop-up windows and page prompts. The content of these real-time notifications forms part of this policy and is equivalent to this policy. effect, please pay special attention.
3. Before using this product service, please be sure to read and thoroughly understand this policy, especially the terms marked in bold/bold underline, you should read it carefully, and start using it after confirming your full understanding and agreement. If you do not agree with the content of this policy, it may cause the product service to fail to operate normally, or the service effect we intend to achieve cannot be achieved, you should immediately stop accessing/using the product service.
After reading this policy, if you have any questions about this policy or matters related to this policy, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will answer you as soon as possible.
This policy will help you understand the following:
1. How we collect and use your personal information
2. How we use cookies or similar technologies
3. We may share, transfer and disclose your personal information
4. How we store and protect your personal information
Protection of Minors
1. How we collect and use personal information
(1) We will collect and obtain your personal information through the following means:
1. The information you provide. E.g:
(1) The information you provide to us when you register the account of the Miracle Box product or use the service of this product;
(2) Information stored when you use this product service.
Please note that if you disclose your information in a public area visible to other users of this product, such information may be collected and used by others. When you become aware that others are improperly collecting or using your information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy.
2. Your information shared by third parties.
3. Your information legally obtained by us in the process of providing services to you. When you use this product service, we collect, aggregate and record the information.
(2) We will collect and use your personal information of the following types for the following purposes:
1. Help you complete registration and login
In order for us to provide you with continuous and stable services and ensure the safety of your use of Miracle Box products, we need you to provide basic registration or login information, including mobile phone numbers, etc., and create your account and user name. If you only need to use basic functions such as searching and browsing, you do not need to register or log in and provide the above information.
2. Perform real-name authentication
In accordance with relevant laws and regulations and regulatory requirements, or in order to meet the needs of authentic user identity verification and to ensure system and service security, you may need to perform real-name authentication before using specific functions and services. In this case, we may require you to provide real identity information, including name, valid identity documents (such as ID card, passport, driver's license, household registration book, etc.), mobile phone number, photo, etc. If you do not provide the above real identity information or provide false information, we will not be able to provide you with related functions and services. For the purpose of real-name authentication, you agree and authorize us to provide, inquire and verify your aforementioned identity to the relevant real-name authentication agencies (relevant state authorities, public security departments or other agencies entrusted/cooperated by them) by ourselves or by entrusting a third party. information.
3. Maintain the normal operation of basic functions, network and operational security During your use of our services, in order to provide you with basic functions such as browsing and searching, identify abnormal account status, understand product suitability, ensure the network and operational security of this product service, and maintain the normal operation of the aforementioned basic functions, We may collect and store log information, device information, account information, transaction information and information that our affiliates and partners have authorized by you or shared in accordance with the law about the services you use and how you use them, and associate such information to Comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law:
(1) Log information: When you use our services, we will collect your login logs, operation information, interaction records, ID, search query content, IP address, browser type, telecom operator, network environment, usage language, date and time of visit and web browsing records you visit, Push open records, duration of stay, refresh records, release records, follow, subscribe, favorite and share.
(2) Device information: We will receive and record information about the device you use: device model, operating system and version, client version, device resolution, package name, device settings, device identifiers (MAC/IMEI/ Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information), software and hardware feature information, IP address. In order to collect the above basic personal device information, we will apply for permission to access your device information. This type of information is the basic information that must be collected in order to provide services.
Please note that individual device information and log information are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information will be regarded as personal information during the combined use, unless authorized by you Unless otherwise stipulated by laws and regulations, we will anonymize and de-identify such personal information, unless otherwise authorized by you or otherwise stipulated by laws and regulations. During the combined use, such information will be treated and protected as your personal information in accordance with this policy.
4. To provide you with interactive and publishing services
When you use this product service, upload and/or publish information, and perform related interactive behaviors (such as speaking, following, sharing, collecting, rewarding, etc.), we will collect the information you upload, publish or form, and Use your nickname, avatar and post for presentation.
Please note that the information you publish publicly may contain your personal information or personal sensitive information, which may be collected and used by others, please consider carefully before publishing. If the information you publish involves the personal information of others, you should obtain the consent of others before publishing. When you become aware that others are improperly collecting or using your information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy.
5. Help you to place orders, pay, recharge and deliver goods or services to you
(1) When you order specific goods and/or services and recharge in this product service, in order to show you the transaction information of your account and ensure transaction security, we will generate an order for you to purchase the goods and/or services through the system. , to collect your specific order number, order creation time, transaction amount and other information to show you and facilitate your order transaction management. In the process of placing an order, if it is a physical product, we also need you to provide the consignee's name, delivery address, contact number and other information so that we can deliver the product to you;
(2) In order to complete order payment, deliver goods or services, confirm transaction status, and provide you with after-sales and dispute resolution services, we will collect information related to transaction progress through transaction objects, payment institutions, logistics companies, etc., selected by you based on the exchange. Your account, order, transaction, payment, logistics information, or share your transaction information with the above-mentioned service providers.
Recharge records, transaction and consumption records are sensitive personal information, and the collection of such information is necessary for the realization of consumption functions, otherwise the transaction will not be completed.
6. To provide you with customer service or other user response functions
When you contact our customer service or use other user response features (personal information protection complaints or suggestions, other customer complaints and needs), we require you to provide the necessary personal information to match and verify your user identity in order to safeguard your account with system security. In order to handle your appeal, the human customer service needs to query or verify your relevant information within the scope of your authorization and use it only within the necessary scope. If you refuse to provide or provide errors, we may not be able to provide you with corresponding support. After confirming your user identity, we will also save your contact information (the other contact information you use when you contact us or that you provide us with your own initiative), the records and content of your correspondence/calls with us, relevant to your needs other necessary information in order to contact you or help you solve problems, or record the solutions and results of related problems.
7. You understand and agree that in the process of using this product and services, we will apply for access to your system when necessary, so as to realize the collection and use of the information involved in these permissions. Before opening the permission, we will inform you of the purpose of opening the permission and ask for your consent. If you do not agree, we will not enable the relevant permission and will not be able to provide you with the services corresponding to the permission.
(1) After you agree to access storage permissions, you allow us to access your storage space so that you can download and save content, or implement functions such as corresponding services through caching;
(2) After you agree to access the camera, you can upload and take photos/pictures/videos, publish information and comments, live video, or communicate with customer service to provide proofs and other functions.
(3) After you agree to the permission to access the software installation list, you can use WeChat to log in, WeChat share, and obtain WeChat's nickname and avatar through WeChat login.
Tips for specific function permissions: If you need to turn off the function permissions that are turned on to use the above-mentioned specific functions, most mobile devices will support your needs. For specific methods, please refer to or contact the service provider or manufacturer of your mobile device. . You can also contact online customer service for processing. Please note that when you open any permission, you authorize us to collect and use relevant information to provide you with corresponding services. Once you close any permission, it means that you cancel the authorization, and we will no longer continue to collect and use the corresponding permission. Using the relevant information, we cannot provide you with the services corresponding to this permission. However, your decision to close the permission will not affect the previous collection and use of information based on your authorization.
If we want to use your personal information for other purposes not specified in this policy or collect additional personal information not mentioned in this policy, we will obtain your consent through page prompts, pop-up windows or other methods in accordance with the law.
8. Exceptions to authorization and consent
According to relevant laws and regulations, the processing of your information does not require your authorization and consent in the following situations:
(1) Necessary for the conclusion and performance of a contract to which you are a party;
(2) It is necessary to perform legal duties or legal obligations;
(3) Necessary to respond to public health emergencies, or to protect your or others' life, health and property safety in an emergency;
(4) Carry out news reports, public opinion supervision and other acts for the public interest, and process your personal information within a reasonable range;
(5) To process within a reasonable range the personal information that you have disclosed by yourself or others that have been legally disclosed;
(6) Other circumstances stipulated by laws and administrative regulations.
2. How we use cookies or similar technologies
We or our third-party partners may obtain and use your information through cookies or similar technologies, and store such information as log information.
COOKIES enables us to serve you better and faster, and make your experience on this product and service more personalized. However, you should be able to control whether and how cookies are accepted by your browser. Please consult the documentation that came with your browser for more information on this.
We and third-party partners may collect and use your information through cookies or similar technologies, and store such information.
We use our own cookies or similar technologies, which may be used for the following purposes:
1. Remember your identity. For example: COOKIES or similar technologies help us to identify you as our registered user, or to save the preferences or other information you provide us with;
2. Analyze your use of our services. We can use COOKIES or similar technologies to understand what activities you use this product and services, or which services are the most popular;
3. Advertising optimization. COOKIES or similar technologies help us to provide you with advertisements that may be more interesting to you based on your information rather than general advertising.
While we use cookies or similar technologies for the above purposes, we may aggregate the non-personally identifiable information collected through cookies or similar technologies to advertisers and other partners to analyze how you and other users use this product service and for advertising services .
There may be cookies or similar technologies placed by advertisers and other partners on this product service. These cookies and or similar technologies may collect non-personally identifiable information about you to analyze how users use these services, send you advertisements that may be of interest to you, or evaluate the effectiveness of advertising services. The collection and use of such information by these third-party cookies or similar technologies are not governed by this policy, but by their own information protection statements, and we are not responsible for third-party cookies or similar technologies.
You may refuse or manage cookies or similar technologies through your browser or user choice mechanism. However, please note that if you disable cookies or similar technologies, we may not be able to provide you with the best service experience, and some services may not work properly. At the same time, you will still receive ads, they will just be less relevant to you.
3. We may share, transfer or disclose your personal information
(1) Sharing
We take the protection of your personal information very seriously. We will only provide your personal information to third parties for legitimate, legitimate, necessary, specific and explicit purposes. We will sign strict confidentiality agreements with companies, organizations and individuals that receive personal information from us, requiring them to process information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.
1. In order to achieve the purpose stated in this policy, we may access SDK or other similar applications provided by third-party service providers (such as in the form of embedded code, plug-ins, H5, etc.) in order to provide you with better customers Service and User Experience. The situations in which personal information may be entrusted or shared for the realization of our services are as follows.
(1) For advertising-related services, including advertising display, advertising data monitoring/statistics, etc.;
(2) For payment-related services, including order payment, transaction behavior verification, income settlement, payment information summary statistics, etc.;
(3) To obtain device location permissions, collect device information and log information, etc. with your consent;
(5) Used for third-party authorized services, including third-party account logins approved by Miracle Box ;
(5) It is used to support product function modules, including online live broadcast, video playback, voice recognition, AR, intelligent customer service, bullet screen playback, content storage, etc.;
(6) It is used to optimize product performance and service quality, including improving hardware distribution network capabilities, reducing server costs, hot-fixing functions, security analysis, optimizing services, and improving user experience, etc.;
(7) It is used for account security and product reinforcement related services, including network monitoring, domain name resolution, anti-hijacking, anti-spam and anti-cheating, encryption and decryption services, etc.
2. Our services may access or link to other Miracle Box products or services provided by third parties. include:
(1) You can use the "Share" function to share some of the service content of this product to other Miracle Box products or third-party products or services, or you can share the content of other Miracle Box products or services or third-party products or services to this website. product;
(2) Provide you with links through advertisements or other means so that you can link to other products or services of Miracle Box , products or services of third parties or websites;
(3) Other situations of accessing third-party services. For example, some third-party SDKs or similar applications that we access may collect your personal information. If you use such third-party services in our services, you agree that your personal information will be directly collected and processed by them. information. We will evaluate the legality, legitimacy, and necessity of personal information collected by such third-party services, require such third parties to take protective measures for your personal information, and strictly abide by relevant laws, regulations and regulatory requirements.
The above third-party services are operated by the relevant third parties. Your use of such third-party services (including any information you provide to such third-parties) is subject to the third-party's own terms of service and relevant rules for personal information protection (not this policy), and you need to read their terms carefully. This policy applies only to the personal information we collect, and does not apply to any third-party services or third-party information usage rules. If you find that these third-party services are at risk, it is recommended that you terminate the relevant operations to protect your legitimate rights and interests and contact us in time.
You can click on "Third-Party Service Sharing List" to learn about the details of the third-party services we access. You may also choose to contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will respond to you as soon as possible.
3. In order to improve Miracle Box 's product research and development capabilities and service level, so as to provide you with better products and services, we will share experience with research institutions, research institutes, universities and other institutions within a legal, reasonable and necessary scope. Identified or anonymized processed data. We will not share information that can be used to personally identify you with the above agencies without your express authorization.
(2) Transfer
Your personal information may need to be transferred due to our possible merger, acquisition, transfer of assets, division, dissolution, bankruptcy or the like. We will inform you of the relevant situation, inform you of the recipient's name and contact information, and will require new recipients to continue to protect your personal information in accordance with laws and regulations and the requirements of this policy.
(3) Public
We will only disclose your personal information in the following circumstances:
1. According to your needs, disclose the information you specify with your explicit consent;
2. Disclose your personal information in accordance with the requirements of laws and administrative regulations.
4. How we store and protect your personal information
(1) Storage of personal information
Unless otherwise stipulated by laws, regulations or regulatory authorities, we will only store your personal information for the shortest period of time necessary for the purposes described in this policy.
If we terminate the service or operation, we will promptly stop the collection of your personal information, at the same time, we will notify you in advance in compliance with relevant laws and regulations, and delete or anonymize your personal information after the termination of the service or operation. Except as otherwise provided by laws and regulations or regulatory authorities.
If you apply to cancel your account, delete your personal information voluntarily, or exceed the necessary period, we will delete or anonymize your personal information, unless there is a retention period stipulated by laws and regulations.
(2) Protection of personal information
We attach great importance to information security, set up a dedicated security team, and take all reasonably practicable measures to protect your personal information:
1. Data security technical measures
We will adopt industry-standard security protection measures, including establishing reasonable system specifications and security technologies to prevent unauthorized access, use, and modification of your personal information, and to avoid data damage or loss.
Our service adopts de-identification and various encryption technologies. We will use the above technologies (such as SSL) to encrypt and store your personal information, and isolate it through isolation technology to protect your personal information.
When using personal information, such as information display and information association calculation, we will use a variety of data desensitization technologies to enhance the security of information in use.
We will also use strict data access control and multi-factor authentication technology to protect personal information and prevent data from being used illegally.
2. Other security measures we take to protect personal information
We have an industry-leading data security management system with data as the core and around the data life cycle, which improves the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.
We have comprehensive security controls over data through contact confidentiality agreements, monitoring and auditing mechanisms.
We also conduct security and privacy protection training courses to enhance employees' security awareness and awareness of personal information protection policies and related procedures.
We only allow Miracle Box employees and partners who need to know this information to access your personal information, and set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to fulfill corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or suspension of the partnership with Miracle Box .
The internet environment is not 100% secure and we will do our best to ensure or guarantee the security of the personal information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized disclosure, disclosure, tampering, or loss of personal information, resulting in damage to your legitimate rights and interests, we will notify you as soon as possible in accordance with the law, and bear the corresponding legal responsibilities.
3. Security incident handling
In order to deal with the possible risks of personal information leakage, tampering and loss, we have formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding processing procedures. We have also established an emergency response team for security incidents. In accordance with the requirements of security incident handling specifications, we have launched security plans for different security incidents to stop losses, analyze, locate, formulate remedial measures, and cooperate with relevant departments to trace and combat the source. We also regularly organize internal training and emergency drills to enable our relevant staff to master the corresponding emergency response strategies and procedures.
When an information security incident may or unfortunately occurs, we will immediately take remedial measures in accordance with the requirements of laws and regulations, and promptly inform you of: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, you Recommendations for self-prevention and mitigation of risks, remedies for you, and more. At the same time, we will promptly inform you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the information subjects one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also proactively report the handling of information security incidents in accordance with the requirements of regulatory authorities.
4. Safety Tips
Please understand that due to technical limitations and risk prevention limitations, even if we have strengthened security measures as much as possible, we cannot always guarantee 100% information security. You need to understand that the system and communication network you use to access this product service may have problems due to circumstances beyond our control.
Please be sure to keep your account number, password and other identity elements in a safe place. When you use this product service, we will identify you through your account number, password and other identity elements. Once you disclose the aforementioned information, you may suffer losses and may be detrimental to you. If you find that your account number, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take appropriate measures in a timely manner to avoid or reduce related losses.
5. Protection of Minors
We recommend that any minors are prohibited from participating in consumption, and we will protect the relevant information of minors in accordance with the relevant national laws and regulations.