Privacy Policy


Welcome to visit our products. CBODY (including services provided by products such as apps and websites, hereinafter referred to as "products and services") is developed and operated by Sichuan Penglakun Network Technology Co., Ltd. (hereinafter referred to as "we"). Ensuring the data security and privacy protection of users is our top priority. This privacy policy sets out the data collected when you access and use our products and services and how it is processed.

Please be sure to read carefully and confirm that you fully understand all the rules and key points of this Privacy Policy before continuing to use our products. Once you choose to use it, you are deemed to agree to the entire content of this Privacy Policy and agree to our collection and use of you in accordance with it. related information. If you have any questions about this policy while reading, you can contact our customer service for consultation. Please contact us through cbodyspa@gmail.com or the feedback method in the product. If you do not agree with the relevant agreement or any terms thereof, you should stop using our products and services.

This privacy policy applies to the products or services in this software.

It should be noted that this privacy policy does not apply to products or services provided to you by other third parties, nor does it apply to products or services in this software that have separate legal statements and privacy policies.

 

Before using the various products or services of this software, please be sure to carefully read and thoroughly understand this Privacy Policy, and use relevant products or services after confirming that you fully understand and agree. Once you start using the products or services of this software, it means that you have fully understood and agreed to this policy. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the app’s dedicated customer service.

Part 1 Definition

This software: refers to the software client you are currently downloading.

Personal information: refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.

Sensitive personal information: including ID number, personal biometric information, Alipay account, property information, whereabouts, transaction information, personal information of children under 14 years old (inclusive), etc.

Deletion of personal information: refers to the act of removing personal information from systems involved in realizing daily business functions, so that it cannot be retrieved or accessed.

Part 2 Legal Statement

Rights ownership

Unless otherwise stated by us, all rights (including copyrights) to all products, technologies, software, programs, data and other information (including text, icons, pictures, photos, audio, video, graphics, color combinations, layout design, etc.) of this software , trademark rights, patent rights, trade secrets and other related rights) are owned by the software service provider. Without the permission of the software service provider, no one may use any content in this software by monitoring, copying, disseminating, displaying, mirroring, uploading, downloading, etc. including through robots, spiders and other programs or equipment. The words and/or logos of this software, as well as other logos, emblems, product and service names are the trademarks of the service provider in China. If there is any need for publicity, display, etc., you must obtain the prior consent of the service provider of this software. Written authorization.

Limitation of Liability

In view of the fact that the information publishing service provided by this software is in the nature of an electronic bulletin board, the information on this software (including but not limited to store name, company name, contact person and contact information, product descriptions and instructions, related pictures, videos, etc.) is provided by the user. If provided and uploaded by oneself, the user shall bear corresponding legal responsibility for the information provided and uploaded. If the software service provider has any other agreement on this, it will be clarified with you in the relevant agreement or other legal text.

Intellectual Property Protection

We respect intellectual property rights and oppose and crack down on infringements of intellectual property rights. If the intellectual property right holder believes that the content of this software (including but not limited to information published by users of this software) infringes upon his or her legitimate rights and interests, he or she may lodge a complaint through the exclusive customer service of this software client. We will notify the intellectual property right holder after receiving a qualified notice. Process it in a timely manner in accordance with corresponding laws, regulations and platform rules.

Part 3 Privacy Policy

This privacy policy section will help you understand the following:

1. How we collect and use your personal information
2. How we use cookies and similar technologies
3. How we share, transfer and publicly disclose your personal information
4. How we protect your personal information
5. How do you manage your personal information?
6. How we handle minors’ personal information
7. How your personal information is transferred globally
8. How to update this privacy policy
9. How to contact us

1. How we collect and use your information


We will collect and use your personal information for the following purposes described in this privacy policy:


(1) Display and push products or services to you

In order to improve our products or services, we will extract your browsing, search preferences, behavioral habits, location information and other features based on your browsing and search records, device information, location information, order information, etc., and conduct indirect crowd profiling based on feature tags And display and push information.

(2) Provide products or services to you

1. Information you provide to us

In order to provide you with products or services, you may need to provide your contact email, contact number, Alipay account and select a payment method, etc. If we entrust a third party to provide services to you, we will share the above information with the third party with your consent. If you refuse to provide such information, we will not be able to provide related products or services.

2. Information we collect during your use of products or services

In order to provide you with the page display and search results you need, understand product suitability, and identify abnormal account status, we will collect information about the products or services you use and how you use them, and associate this information. This information includes:

Hardware serial number: When you register/log in to your account, you need to provide your mobile phone number and verification code. When using the App service, you need to provide your mobile phone number as your account login name. When logging in, we also need to collect your hardware serial number and unique device Identification code (android_id, Mac address, IMEI, IMSI, SIM serial number) to verify the account and password and complete the login and device location-related information (such as IP address, GPS location and Wi-Fi access point that can provide relevant information, Sensor information such as Bluetooth and base stations).

Device sensors: When providing you with channel content in the same city or content or services related to the location of your device, with your authorization, we will use geographical location information related to this service (such as precise positioning information, WLAN access points, Bluetooth and base station, sensor information) to ensure the quality of content or services. The precise positioning information is personal sensitive information. If you refuse to authorize location permission, it will affect the accuracy of positioning, but it will not affect the normal use of other functions and services. We will only use the city and/or the corresponding network information (such as IP). Or show you potentially relevant content or services.

Clipboard: When you share or receive shared information, participate in activities, etc., we need to access your clipboard locally and read the passwords, sharing codes, and links contained in it to achieve jump, sharing, Functions or services such as activity linkage. We will only upload the clipboard content to our server when we locally identify that it belongs to instructions such as jump, share, activity linkage, etc. Apart from this, we will not upload other information about your clipboard to our servers. In addition, we may need to read your mobile phone photo album so that you can share or receive shared videos and pictures.

Local storage permissions: Additional services based on reading and writing external memory cards: After turning on local storage permissions, you can use this function to upload your photos/pictures/videos to comment/share or communicate with customer service Proof and other functions.

Log information: When you use our products or services, we will automatically collect your detailed usage of our products or services and save them as relevant network logs. For example, your search query content, IP address, browser type, telecom operator, language used, access date and time, and web page records you visited, etc.

Please note that individual device information, log information, etc. are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, such non-personal information will be treated as personal information during the period of combined use, unless we obtain your authorization. Unless otherwise provided by laws and regulations, we will anonymize and de-identify such personal information.

When you contact us, we may save your communication/call records and content or the contact information you left and other information in order to contact you or help you solve the problem, or record the solutions and results of related problems.

3. Your personal information we collected through indirect acquisition methods

In order to provide you with better and superior services, or to jointly provide you with services, or for the purpose of preventing Internet fraud, our affiliates and partners will do so in accordance with legal provisions or agreements with you or with your consent. , share your personal information with us.

(3) Provide you with safety protection

Please note that in order to ensure the authenticity of your identity and provide you with better security, you can provide us with identity information such as ID card, military officer's ID, passport, driver's license, social security card, residence permit, etc. to complete the real-name authentication of relevant matters.

In order to improve the security of your use of the services provided by us and our partners, protect the personal and property safety of you or other users or the public from infringement, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc. Security risks, to more accurately identify violations of laws, regulations or agreement rules related to this software, we may use or integrate your member information, transaction information, device information, relevant network logs and we and partners obtain your authorization or share in accordance with the law information to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

(4) Other uses

When we use information for other purposes not specified in this privacy policy, or when we use information collected for specific purposes for other purposes, we will obtain your consent in advance.

(5) Exceptions to obtaining authorized consent

According to relevant laws and regulations, your authorization and consent are not required to collect your personal information in the following situations:

1. Relevant to national security and national defense security;
2. Relevant to public safety, public health, and major public interests;
3. Relevant to criminal investigation, prosecution, trial and judgment execution;
4. To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain your consent;
5. The personal information collected is disclosed to the public by you;
6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
7. Necessary to sign a contract according to your requirements;
8. Necessary to maintain the safe and stable operation of the products or services provided, such as discovering and handling product or service failures;
9. Necessary for legitimate news reporting;
10. When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results will be de-identified;
11. Other situations stipulated by laws and regulations. 

If we stop operating this software, product or service, we will promptly stop collecting your personal information and notify you of the cessation of operations in the form of one-by-one deliveries or announcements. We will also collect information from you in accordance with the requirements of applicable laws and regulations. Some personal information will be deleted or anonymized.

2. How we use cookies

In order to ensure the normal operation of the website and provide you with an easier access experience, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, the website can store data such as your product preferences.

If you do not agree with us storing cookie small data files on your computer or mobile device, you can uninstall this software and no longer use it.

3. How we share, transfer and publicly disclose your personal information

 (1) Sharing

We will not share your personal information with companies, organizations and individuals other than this software service provider, except in the following circumstances:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. Sharing under legal circumstances: We may share your personal information externally in accordance with laws and regulations, litigation and dispute resolution needs, or as required by administrative and judicial authorities in accordance with the law.

3. Sharing with authorized partners: Only to achieve the purposes stated in this privacy policy, some of our services will be provided jointly by us and authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and we will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for other purposes unrelated to products or services.

Currently, our authorized partners include the following types:

(1) Authorized partners in advertising and analysis services. Unless you give us your permission, we will not use your personally identifiable information (information that can identify you, such as name or email address, through which you can be contacted or identified) to provide advertising and analysis services. shared by partners. We provide these partners with information about the reach and effectiveness of their advertising without providing your personally identifiable information, or we aggregate the information so that it does not identify you personally. For example, only after the advertiser agrees to abide by our advertising guidelines, we may tell the advertiser how effective their ads are, or how many people saw their ads or installed the app after seeing the ads, or provide payment services to these partners. Partners provide non-personally identifiable statistical information to help them understand their audience or customers.

(2) Suppliers, service providers and other partners. We send information to vendors, service providers and other partners who support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, and payment facilitation. or conduct academic research and investigations.

The authorized SDK is as follows:

com.sina.weibo (Weibo)

Purpose of use: used to realize third-party account login (note: this function is not currently available, and will be opened in the future depending on the situation)

Type of personal information collected: your Weibo account information

Third-party privacy policy link: https://www.weibo.com/signup/v5/privacy

 

com.google.apis(Google)

Purpose of use: Help users locate their location when posting information

Collection type: location information, device information (IMEI, IDFA, IDFV, Android ID, MEID, MAC address, OAID, IMSI, ICCID, hardware serial number), IP address, GNSS information, WiFi status, WiFi parameters, WiFi list, SSID , BSSID, base station information, signal strength information, Bluetooth information, sensor information, device signal strength information, external storage directory

Third-party privacy policy link: https://policies.google.com/privacy?hl=zh-cn



com.umeng(Umeng)

Purpose of use: Provide the function of sharing pictures and text; optimize the display of sharing pages, identify abnormal account status and device abnormal status

Types of personal information collected: device information (such as IMEI, MAC, IMSI, etc.), IP address, network connection status

Third-party privacy policy link: (https://www.umeng.com/policy)https://www.umeng.com/policy

 

com.tencent.tauth (Tencent open platform; WeChat; QQ) (This function is not currently available and will be opened in the future depending on the situation)

Purpose of use: Used to help users share information to WeChat and QQ; to enable WeChat and QQ login

Types of personal information collected: device information (device model, operating system, unique device identifier (Android such as AndroidID/OAID, iOS such as IDFA before iOS14.5), login IP address, software version number, method of accessing the network , type and status, network quality data, device accelerators (such as gravity sensing devices), location information, Wi-Fi address, carrier information, application list

Third-party privacy policy link: (https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy)https://weixin.qq.com/cgi-bin/readtemplate?lang= zh_CN&t=weixin_agreement&s=privacy

 

We will sign strict data protection agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

(2) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
2. When the software service provider undergoes a merger, acquisition or bankruptcy liquidation, or other situations involving mergers, acquisitions or bankruptcy liquidation, if the transfer of personal information is involved, we will request the new company or organization that holds your personal information. Continue to be bound by this Privacy Policy, otherwise we will require the company, organization and individual to re-obtain your authorization and consent.

(3) Public disclosure
We will only publicly disclose your personal information under the following circumstances:
1. We may publicly disclose your personal information with your explicit consent or based on your active choice;
2. If we determine that you have violated laws and regulations or seriously violated the rules of Xiangli-related agreements, or to protect the personal and property safety of users of this software and its affiliated companies or the public from infringement, we may, in accordance with laws and regulations or Xiangli-related agreements, The rules of the agreement disclose personal information about you, including related violations and the measures the app has taken against you.

(4) Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information
In the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

1. Relevant to national security and national defense security;
2. Relevant to public safety, public health, and major public interests;
3. Relevant to criminal investigation, prosecution, trial and judgment execution;
4. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;
5. Personal information that you disclose to the public on your own;
6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

According to legal provisions, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot recover and re-identify the subject of the personal information, does not constitute the external sharing, transfer and public disclosure of personal information. The use of such data Storage and processing will be without further notification to you and without your consent.

4. How we protect the security of your personal information


(1) We have adopted reasonable and feasible security protection measures that are in line with industry standards to protect the security of the personal information you provide and prevent personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms to try to ensure that only authorized personnel can access personal information; and we will hold Security and privacy protection training courses to enhance employees’ awareness of the importance of protecting personal information.

(2) Our data security management system takes data as the core and revolves around the data life cycle to improve the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology.

(3) We will take reasonable and feasible measures to try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this Privacy Policy, unless an extension of the retention period is required or permitted by law.

(4) The Internet is not an absolutely secure environment. If you find that your personal information, especially your account or password, has been leaked, please contact the app’s exclusive customer service immediately so that we can take appropriate measures based on your application.

Please note that the information you voluntarily share or even share publicly when using our services may involve your or others' personal information or even personal sensitive information. Please consider more carefully whether to share or even share relevant information publicly when using our services.

We will do our best to keep any information you send us secure. Use our best efforts to prevent our physical, technical or administrative safeguards from being breached, resulting in unauthorized access, public disclosure, tampering or destruction of information.

(5) After an unfortunate personal information security incident occurs, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and how you can prevent and reduce risks on your own suggestions, remedies for you, etc. We will notify you of event-related information by email, letter, phone call, push notification, etc. When it is difficult to notify the personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

5. How do you manage your personal information?

You can access and manage your personal information in the following ways:

(1) Access your personal information

You have the right to access your personal information, except for exceptions provided by laws and regulations. The specific access path is subject to that provided in the corresponding product or service of this software.

(2) Correct or supplement your personal information

When you find errors in the personal information we process about you, you have the right to ask us to make corrections or additions.

(3) Delete your personal information and log out of your account

You can cancel your account through the APP. The specific path is: My->Settings->Cancel Account. After canceling your account, we will stop providing products or services to you and delete your personal information according to your request, unless otherwise provided by laws and regulations. You can make a request to us to delete personal information under the following circumstances:

1. If our processing of personal information violates laws and regulations;
2. If our handling of personal information seriously violates the agreement with you;
3. If we permanently no longer provide you with products or services;


If we decide to respond to your deletion request, we will also try our best to notify the subjects who obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these subjects obtain your independent authorization.

When you delete information from our services, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.

(4) Respond to your relevant requests

To ensure safety, when you make a legal or mutually agreed matter, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

We will respond within 15 working days. If you are not satisfied, you can also initiate a complaint through the exclusive customer service of this software.

For your requests that are legitimate and reasonable and comply with the agreement between the parties, we will not charge fees in principle. However, for requests that are repeated multiple times and exceed legal and reasonable limits, we will charge a certain cost depending on the circumstances. We may reject requests that are unreasonably repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical.

In the following circumstances, we will not be able to respond to your request in accordance with legal and regulatory requirements:

1. Relevant to national security and national defense security;
2. Relevant to public safety, public health, and major public interests;
3. Relevant to criminal investigation, prosecution, trial and execution of judgments;
4. There is sufficient evidence that the personal information subject has subjective malice or abused his rights;
5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
6. Involving business secrets.


6. How we process personal information of minors

If you are a minor, we recommend that you ask your parents or guardians to read this Privacy Policy carefully and use our services or provide information to us with the consent of your parents or guardians. 

For the collection of personal information of minors through the use of our products or services with the consent of their parents or guardians, we will only use, share, and transfer them when permitted by laws and regulations, with the explicit consent of their parents or guardians, or when necessary to protect the minors. or disclose this information.

7. How your personal information is transferred globally

The personal information we collect and generate during our operations in the People's Republic of China is stored in China, except for the following circumstances:

1. Laws and regulations have clear provisions;
2. Obtain your explicit authorization;
3. You conduct cross-border transactions and other personal proactive behaviors through the Internet.

In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

 
8. How to update this privacy policy

Our privacy policy may change.

We will not limit your rights under this Privacy Policy without your explicit consent. We will notify you in advance of any changes to the privacy policy through announcements on this software.

9. How to contact us

Developer information: Sichuan Penglakun Network Technology Co., Ltd.
You can contact us through the following ways,
Leave feedback in the user feedback section of this APP
We will respond to your request within 15 working days:

1. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the exclusive customer service of this software;
2. If you find that your personal information may have been leaked, you can complain and report it through the exclusive customer service of this software.