Privacy Policy

Release date of this version: March 10, 2021

Effective date: March 10, 2021

    We are fully aware of the importance of personal information to you and appreciate your trust in us. Through this policy, we will explain to you how we collect, store, protect, use and disclose your information, and explain your rights. The key points are as follows:

    1. In order for you to easily understand the type and purpose of the information we need to collect when you use our products and services, we will explain it to you in conjunction with specific products and services.

    2. In order to provide you with services, we will collect your information in accordance with the principles of legality, legitimacy and necessity.

    3. If your information needs to be shared with a third party in order to provide you with services, we will evaluate the legality, legitimacy, and necessity of the third party's collection of information. We will require third parties to take protective measures for your information and strictly comply with relevant laws, regulations and regulatory requirements. In addition, in accordance with the requirements of laws, regulations and national standards, we will obtain your consent or confirm that a third party has obtained your consent by confirming the agreement, copywriting confirmation in specific scenarios, pop-up prompts, etc.

    4. If we need to obtain your information from a third party in order to provide you with services, we will require the third party to explain the source of the information and require the third party to ensure the legality of the information it provides.

    5. If we use information for other purposes not specified in this Policy, use information collected for specific purposes for other purposes, or the personal information processing activities we need to carry out our business exceed the scope of authorization you originally provided personal information to a third party, we will seek your explicit consent in advance .

    6. You can access and manage your information, set privacy features, cancel your account, or make complaints and reports through the methods described in this policy.

You can read the corresponding chapters according to the following index to further understand the specific content of this policy:

    I. Introduction

    II. Definition

    III. How we collect and use your personal information

    IV. How we use cookies and similar technologies

    V. How we share, transfer and disclose your personal information with third parties

    VI. How we store and protect your personal information

    VII. How you access and manage your information

    VIII. How we protect the personal information of minors

    IX. Applicable Exceptions to the Privacy Policy

    X. Changes to this Policy

    XI. Contact, Complaints and Reports

    XII. Product and service operator information

    XIII. Governing Law and Dispute Resolution

I. Introduction

    Shenzhen Xiyoudiary Network Technology Co., Ltd. (hereinafter referred to as "Xiyoudiary") attaches great importance to the privacy of users. When you use our services, we will collect and use your relevant information. Through this policy, we hope to explain to you how we collect, use, store and share this information when using our services, as well as the ways we provide you with to access, update, control and protect this information. This policy is closely related to our products and services that you use. We hope that you will read it carefully and make the choices you think are appropriate in accordance with the guidance of this policy when necessary. We try to express the relevant technical terms involved in this policy in a concise manner and provide links to further explanations (if necessary) for your understanding.

    It should be noted that this policy applies to the platforms, products, and services that are currently in effect and may be released and operated in the future under Xiyoudiary. If the products and services of our affiliated companies (scope see the definition section) use the products and services we provide but do not have an independent privacy policy, this policy also applies to those products and services.

    In order for you to fully understand this statement and the terms in this statement that have or may have a significant relationship with your rights and interests, we have used bold font to draw your attention.

    If you check or click "Agree" to this "Privacy Policy" during initial installation, first use or first login/registration of an account, it means that you agree to this "Privacy Policy". However, this does not mean that we will immediately collect all personal information contained in this Privacy Policy. Only when you open and use a certain function through browsing, active filling, clicking and other autonomous behaviors, we will follow this Privacy Policy. 》Collect and use the personal information corresponding to this function.

    If you do not agree to this Privacy Policy, please do not use or stop using our products and services.

    The functions we provide you:

        1. No registration/login required: User Agreement, Privacy Policy.

        2. Registration/login required: pet expenses, item management, food taboos, veterinary drug inquiries, ingredients, nutrients, pet-related records, updates, recipes, my page, etc.

II. Definition

    1. Affiliates

    Refers to companies that have a direct or indirect control relationship or significant influence relationship with Xiyoudiary, including but not limited to the following situations: the total direct or indirect holdings of one of the shares of the other party reach 25% or more; the shares directly or indirectly owned or controlled by a third party reach 25% or more; the loan funds between Xiyoudiary and another company account for 50% or more of Xiyoudiary's paid-in capital; more than half of the directors or managers or other senior management of the affiliated company or one of the managing directors are appointed by Xiyoudiary.

III. How we collect and use your personal information

    We collect information to provide better services to all users. The main sources of information we collect are: information you provide to the Pet Diary, information obtained by the Pet Diary during your use of Xiyou Diary's products and services, and shared information you provide to other parties through our products and services. We will collect your personal information legally, reasonably and to the minimum extent possible. Before collecting, we will clearly inform you of the type of personal information we collect, the rules for use, and obtain your authorization and consent.

    Pet Diary will collect and use your personal information for the following purposes:

    (1). Registration/Login

    If you use pet expenses, item management, food taboos, veterinary drug inquiries, ingredients, nutrients, pet-related records, updates, recipes, my page, etc., you need to register/log in (logging in means you have registered as our user) Customer Terminal, we will collect the following personal information based on your registration/login method:

    1. Mobile phone number is the personal information you actively provide to us when you choose to use your mobile phone number to register/log in. At the same time, we will verify whether your account is valid by sending a SMS verification code. You can also retrieve and modify your account password through your mobile phone number.

    2. Email address is the personal information you actively provide to us when you choose to register/log in using your email address. At the same time, we will verify whether your account is valid by sending an email verification code. You can also retrieve and modify your account password through email.

    If you do not provide this information, you will not be able to register/log in to our products, and you will not be able to use functions that require registration/log in, but this will not affect your normal use of functions that do not require registration/log in.

   (2) You can search for content by text

    When you type in a text search, we will save your search keyword information and search history locally on the client . This is to prevent you from repeatedly entering the same search content next time, and to enable us to continuously improve and optimize the above functions.

    (3) Contact us

    When you contact us, we may save your communication records and content or the contact information you leave in order to contact you or help you solve the problem, or record the solution and results of related problems; if you do not provide the aforementioned information, it will not affect your use of other services we provide.

    (4) WeChat authorization

    When you share content and invitation codes in WeChat, or help your friends to support, you need to authorize WeChat in the Pet Diary APP. If you do not authorize, it will affect your sharing and support.

    (5) Message Push

    If you need to receive our push notifications (SMS, push, in-site messages) to keep abreast of pet reminders, item expiration reminders, and event promotion information for products or services you purchased through our products and services, we will provide you with push notification services. This function requires the use of your contact number and the opening of receiving permissions. If you do not agree to receive the aforementioned information, you can unsubscribe through SMS notifications or other methods we provide. You need to open the corresponding notification authorization so that we can push relevant information to you as soon as possible. If you do not authorize, it will not affect your use of other services we provide.

    (6) Access our products and services

    Setting up the corresponding network can help you better access our products and services.

    (7) Receive notifications

    Notification permissions include banners, sounds, and tags. If you turn on the corresponding notification authorization, we can push relevant information to you as soon as possible. If you do not authorize, it will not affect your use of other services we provide.

    Autostart and associated startup instructions

    1. In order to ensure that the application can normally receive the information pushed by the client when it is closed or running in the background, the application must use the (self-starting) capability, and there will be a certain frequency of sending broadcasts through the system to wake up the application's self-starting or associated startup behavior. , necessary to implement functions and services.

    2. When you open a content push message, the relevant content will be redirected to you after obtaining your explicit consent. There will be no self-initiation or associated activation without your consent.

    3. When you open a file downloaded within this App, the third-party App will be launched in association with it.

    (8) Shear Plate

    [Sharing and identification] When you share or receive shared information, participate in activities, etc., we need to access your clipboard and read the passwords, sharing codes, and links contained in it to achieve jumps, sharing, and activities. Linkage and other functions or services.

    [Statistical Analysis] We may need to collect statistics on the application source channel information through the clipboard. During the statistical process, we will not send back your personal privacy information written into the clipboard.

    [Special Note] The systems of some mobile phones and other terminal devices will prompt that the application (App) is reading the clipboard, but the system prompt cannot distinguish whether clipboard information is being collected, and false positives cannot be ruled out. Therefore, if you find similar prompts, please contact us so that we can locate the problem.

    (9) Improve image access speed

    We will cache the images you download while using our products and services on external storage (this permission is only based on Android system development) in order to increase the speed when you access the aforementioned images again.

    (10) To improve the security of your use of the services provided by us and our affiliates and partners, to protect the personal and property safety of you or other users or the public from infringement, to better prevent security risks caused by phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, and illegal and irregular content, and to more accurately identify violations of laws and regulations or relevant agreement rules formulated by us, we may obtain your account information, transaction information, device information, log information, and information that our affiliates and third-party partners have obtained your authorization or shared in accordance with the law to comprehensively judge your account and transaction risks, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

   1. Device Information

    Information related to your device and software: device brand and model, IP address, device software version information, device identification code .

    2. Log information

    When you use our products and services, we will collect detailed information about your use of our services and save it as relevant network logs, including: your search query content (such as search terms), IP address, browser type, URL address of the social media page visited, access date and time, system error log and access history . Please note that when you enable these permissions, you authorize us to collect and use these personal information to achieve the above functions. When you close the permissions, you cancel these authorizations, and we will no longer continue to collect and use your personal information, and we will not be able to provide you with the above functions corresponding to these authorizations. Your decision to close permissions will not affect the processing of personal information previously performed based on your authorization.

    (11) Exceptions to obtaining authorized consent

    According to relevant laws and regulations, we do not need to obtain your authorization and consent when collecting and using your personal information under the following circumstances:

    1. Related to national security and national defense security;

    2. Related to public safety, public health, and major public interests;

    3. Relevant to criminal investigation, prosecution, trial and decision, execution of judgment, etc.;

    4. To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain your consent;

    5. The personal information collected is disclosed to the public by you on your own initiative;

    6. Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure, new media platforms and other channels;

    7. Necessary for entering into a contract at your request;

    8. Necessary to maintain the safe and stable operation of the products or services provided, such as discovering and handling product or service failures;

    9. Necessary for legitimate news reporting;

    10. When academic research institutions conduct statistical or academic research based on public interests and provide the results of academic research or descriptions to the public, they shall de-identify the personal information contained in the results;

    11. Other situations stipulated by laws and regulations.

    Please understand and agree that if your information cannot identify you individually or in combination with other information, it does not belong to your personal information in the legal sense; only if your information can identify you individually or in combination with other information If your identity is not the same, it will be treated and protected as your personal information in accordance with this policy during the combined use period.

IV. How we use cookies and similar technologies

    (1) We or our third-party partners may collect and use your information through cookies and web beacons and store such information as log information.

    (2) You can reject or manage cookies or web beacons through browser settings. However, please note that if you disable cookies or web beacons, you may not be able to enjoy the best service experience and some services may not work properly.

    (3) Please understand that some of our services can only be achieved through the use of Cookies. If your browser or browser add-on services allow it, you can modify the acceptance of Cookies or reject our Cookies. However, rejecting our Cookies may in some cases affect your safe access to platform-related websites and use of the services provided by the platform. Serve.

    (4) Use of SDK.

    1. Alibaba Baichuan SDK

    Third-party SDK name: Alibaba Baichuan SDK

    Name of third party: Zhejiang Taobao Network Co., Ltd.

    Types of personal information collected: device identification information (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information), geographic location information, software installation list, network information, and access to running process information

    Purpose of use: Alibaba Baichuan SDK (wake up mobile Taobao, use Taobao third-party login, users can agree to certain functions/capabilities for the media to use, the media can access the page/API data by obtaining the user's authorization, and using Taobao to log in will be transparent User login status)

    Privacy policy link: https://gouduosheng.com/yinsiurl.php?urlid=3

    2. Pangolin SDK

    Third-party SDK name: Pangolin SDK

    Third-party name: Beijing Bytedance Network Technology Co., Ltd.

    Types of personal information collected: basic information such as device brand, model, software system version, resolution, network signal strength, IP address, device language, accelerometer, etc. [both ends]. Android ID [Android only]. Basic information such as phone system restart time, total disk space, total system memory space, number of CPUs, etc., IDFV [iOS only].

    Purpose of use: Use this SDK to provide advertising service functions (such as rewarded video ads) for the Pet Diary APP. Statistics of impressions, clicks, and conversion advertising data are used for advertisers to calculate delivery results. Collect crash information and performance data during operation to minimize App crashes, ensure normal server operation, and improve scalability and performance.

    Privacy Policy Link: https://www.csjplatform.com/privacy/partner

V. How we share, transfer and disclose your personal information with third parties

    We will inform you of the purpose of sharing, the legality of the data recipients, and obtain your consent in advance. Accurately record and save the sharing of your personal information, including the date, scale, purpose of sharing, and the basic information of the data recipients.

    (I). Sharing

    1. We will not share your personal information with any other company, organization or individual, except in the following circumstances:

    (1) Obtain your explicit consent or authorization in advance;

    (2) Providing information as required by applicable laws and regulations, legal procedures, or mandatory administrative or judicial requirements;

    (3) To the extent permitted by laws and regulations, it is necessary to protect Xiyoudiary, Xiyoudiary’s affiliates or partners, you or other Xiyoudiary users, or the public’s interests, property or safety from damage;

    (4) Only by sharing your information can we realize the core functions of the products and services provided by us, our affiliated companies, and third parties we cooperate with or provide the services you need;

    (5) Resolve disputes or controversies between you and others upon your request;

    (6) Comply with the relevant agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;

    (7) Used based on academic research;

    (8) Information that needs to be disclosed to specific third parties (such as third-party audit institutions, corporate listing regulatory authorities) as stipulated by laws and regulations of national and industry authorities;

    (9) Necessary sharing within Xiyoudiary and its affiliates. We will only share necessary personal information and will be subject to the purposes stated in this Privacy Policy. If we want to change the purpose of processing personal information, we will ask for your authorization and consent again.

    (10) Use based on the public interest in accordance with laws and regulations.

    2. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we may share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures. We will only share necessary personal information and for the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will ask for your authorization and consent again.

    3. To comply with the law, enforce or apply our terms of use and other agreements, or to protect the rights, property or security of Xiyoudiary, you or other Xiyoudiary customers, such as to prevent fraud, cyber attacks, phishing websites, network vulnerabilities, computer viruses, cyber attacks, network intrusions and other illegal activities and reduce credit risk, and exchange information with other companies and organizations. However, this does not include the sale, rental, sharing or other disclosure of personal information for profit purposes in violation of the commitments made in this Privacy Policy.

    4. We may share your order information, account information, and payment information with third parties such as partners to ensure the smooth completion of the services provided to you. However, we only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose. Our partners include the following types:

    (1) Authorized partners for data statistics and data analysis services. In order to maintain/improve our products/services and provide you with better services, we may access the designated partners that provide this service, such as Umeng, Bugly, and Jiguang, to read your device information (including open independent device identifier (Open UDID), unique device identifier IMEI, iOS advertising identifier IDFA, MAC address, device model, terminal device operating system version), device language, and network/language status related information for the purpose of analyzing your use of our services and optimizing our services.

    (2) Suppliers, service providers and other partners . We will store your device information (including device model, operating system version, device settings, unique device identification code IMEI, device location-related information (including your authorized GPS location and WLAN access point, Bluetooth and base station sensor information), Device environment software and hardware characteristics information), log information (including browsing, click to view, search query, collection, add to shopping cart, transaction, after-sales, attention sharing information and other service-related log information), IP address, browser type , network status is sent to suppliers, service providers and other partners that support our business (such as JD.com, Taobao Baichuan, Alipay). These supports include providing users with product display, product search, and shopping payment.

    (3) In order to enable you to share information and browse products on third-party platforms, our applications will embed the SDK of authorized partners or other similar applications. If you use Weibo, WeChat, or QQ third-party accounts to log in to our client, its SDK needs to collect your third-party account, device information (including device model, operating system version, unique device identifier IMEI, international mobile subscriber identifier IMSI, MAC address), IP address, MAC address, application list, log information, and location-related information; if you use the online customer service function, Qiyu SDK will collect your device information (including device model, operating system version, unique device identifier IMEI), network status, location-related information and request to obtain album/camera permissions, microphone permissions, external storage permissions, background operation permissions (this permission is only applicable to Android systems), etc.; Tencent X5 SDK provides browsing services, which will obtain your unique device identifier IMEI, international mobile subscriber identifier IMSI, MAC address, device model, screen size, operating system version number, target API (TargetAPI), network type (ApnType), network change monitoring broadcast, and Wifi MAC address. The above-mentioned suppliers, service providers, and other partners shall collect and process information in accordance with their own privacy policies, etc., and are not subject to this Privacy Policy. At the same time, in order to maximize the security of your information, we recommend that you review the privacy policy of any third-party SDK service before using it. To protect your legal rights and interests, if you find that such SDK or other similar applications have risks, it is recommended that you immediately terminate the relevant operations and contact us in a timely manner.

    (II) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

    1. Obtain your explicit consent or authorization in advance;

    2. Provide information as required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;

    3. Comply with the relevant agreements signed with you (including online electronic agreements and corresponding platform rules) or other legal documents;

    4. As the business and operating conditions of Xiyoudiary continue to develop, we and our affiliates may engage in mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. . We will notify you before the transfer. If the transfer of personal information is involved, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.

    (III) Public Disclosure

We will only disclose your personal information in the following circumstances and only after taking security measures that meet industry standards:

    1. Disclose the personal information you specify in accordance with your needs and in the manner you explicitly consent to;

    2. When it is necessary to provide your personal information in accordance with the requirements of laws, regulations, mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information based on the required type of personal information and disclosure method. Subject to complying with laws and regulations, when we receive the above request to disclose information, we will require the issuance of corresponding legal documents, such as a subpoena or a letter of investigation. We firmly believe that the information we are asked to provide should be as transparent as possible to the extent permitted by law. All requests are carefully reviewed to ensure they have a legitimate basis and are limited to data that law enforcement has a legal right to obtain for specific investigative purposes.

    (IV) Exceptions with consent

Please be fully aware that in the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

    1. Directly related to national security and national defense security;

    2. Directly related to public safety, public health, and major public interests;

    3. Directly related to criminal investigation, prosecution, trial and judgment execution;

    4. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

    5. Personal information that you disclose to the public on your own;

    6. Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

VI. How we store and protect your personal information

    (I) Storage of your personal information
    1. The personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.

    2. We consider the following factors to determine the period for which your personal information will be stored:

        2.1 The minimum storage period required by law, such as the minimum retention period specified in the Cybersecurity Law, the E-Commerce Law, etc.

        2.2 The period necessary for the purpose of providing our products/services. For example, when you use your mobile phone number to register/log in and use the corresponding function, we will continue to save your mobile phone number during the period you provide and use the function, so as to provide you with the function normally.

        2.3 The retention period for fulfilling other legal obligations. For example, according to Article 13 of the "Information Network Communication Protection Regulations", we need to provide the copyright administrative department with the name, contact information and other information of the alleged infringing service object.

        2.4 Network logs related to monitoring and recording network operation status and network security incidents shall be kept for no less than six months.

    3. For personal user information that exceeds the above information retention period, we will use formatting and other methods to delete or anonymize the user's personal information in accordance with relevant laws, regulations and established regulations.

    4. Our network service adopts encryption technologies such as Transport Layer Security Protocol and provides browsing services through https and other methods to ensure the security of user data during transmission.

    5. We encrypt and store your personal information through encryption technologies such as database table space encryption.

    6. In the event that we need to share your personal information, we will conduct a personal information security impact assessment in advance and take effective measures to protect the subject of personal information based on the assessment results. We will try our best to de-identify your personal information before sharing it.

    (2) Protection of your personal information

    1. We have established a personal information protection department to conduct personal information security impact assessments on the collection, use, sharing, and entrusted processing of personal information. At the same time, we have established relevant internal control systems and adopted the principle of minimum authorization for staff who may have access to your information; we systematically monitor the behavior of staff in handling your information, and continuously train staff on relevant laws, regulations and privacy security. Strengthen the promotion of standards and safety awareness, and organize relevant staff to participate in safety training every year. In addition, our corresponding network/system has passed the national network security level protection evaluation. We also hire an external independent third party to evaluate our information security management system every year.

    2. We have formulated an emergency plan for personal information security incidents, and regularly organize internal relevant personnel to conduct emergency response training and emergency drills so that they can master job responsibilities and emergency response strategies and procedures. After the unfortunate occurrence of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, your own suggestions for preventing and reducing risks, and your remedial measures. We will promptly inform you of the relevant situation of the incident by means of APP push notifications, emails/short messages, etc. When it is difficult to inform the subject of personal information one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities. If your legal rights and interests are damaged, we will bear the corresponding legal responsibilities.

    3. We will adopt security protection measures that comply with industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from unauthorized access, use, modification, and avoid data damage or loss.

    4. Our network service adopts encryption technologies such as Transport Layer Security Protocol and provides browsing services through https and other methods to ensure the security of user data during transmission.

    5. We use encryption technology to encrypt and save users’ personal information, and isolate it through access restriction technology. When using personal information, such as personal information display and personal information correlation calculation, we will use a variety of data desensitization technologies including content replacement and content hiding to enhance the security of personal information in use.

    6. We use strict data access permission control and multiple identity authentication technologies to protect personal information and prevent data from being used in violation of regulations.

    7. We use data access log analysis technology to conduct personal information security audits.

    8. Other security measures we take to protect personal information

        8.1 We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

        8.2 We implement comprehensive security controls on data through information contact confidentiality agreements, monitoring and auditing mechanisms.

        8.3 We have established a dedicated department for personal information protection and a data security emergency response organization to promote and protect personal information security.

        8.4 Enhance security awareness. We will also hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

    9. We only allow relevant employees and partners who need to know this information to access personal information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all persons who may have access to your personal information to fulfill corresponding confidentiality obligations.

    10. You should understand that the Internet is not an absolutely secure environment, and we strongly recommend that you do not send personal information using methods other than those recommended by Xiyoudiary. You can connect and share with each other through our services. When you create communications, transactions or shares through our services, you can independently choose the objects of communication, transactions or sharing as third parties who can see your contact information, communication information or shared content and other related information.

    11. When using the cash withdrawal service we provide for online transactions, you will inevitably have to disclose your personal information, such as contact information or contact address, to the counterparty or potential counterparty. Please protect your personal information properly and provide it to others only when necessary. If you find that your personal information, especially your account or password, has been leaked, please contact the transaction party immediately. If necessary, we will immediately assist in handling the aforementioned matters after receiving your request.

    12. Please note that the information you voluntarily share or even publicly share when using our services may involve your or others' personal information or even personal sensitive information. Please consider more carefully whether to share or even publicly share relevant information when using our services.

    13. Please use a complex password to help us ensure the security of your account. We will do our best to ensure the security of any information you send to us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal liability.

VII. How you access and manage your information

    (I). We will take appropriate technical measures to ensure that you can query your registration information.

    1. You can check your avatar, user name, and user ID by clicking "Me".

    2. Query other news

        2.1 You can view your review information in the App Store in "Me" - "Give a good review"

        2.2 You can view the ten agreement information between you and your pet in "Me" - "Our Agreement"

        2.3 You can check how to share the app with friends in "Me" - "Share with friends"

        2.4 You can check the current app version and historical version update information in "Me" - "About Shitui Guan"

        2.5 You can find out how to contact us in "Me" - "Contact the Author"

    If you are unable to access and manage such personal information through the above-mentioned paths, you can contact us at any time through the contact information indicated in this policy, and we will respond to your access request within 15 working days.

    (II) Deletion of personal information

    1. You can delete some of your personal information through the methods listed in this article. In the following situations, you can submit a request to us to delete your personal information through the client "Me" - "Contact Customer Service", and we will process it within 15 days after verifying the user's identity:

    1.1 Our handling of personal information violates laws and regulations;

    1.2 We collect and use your personal information without your explicit consent;

    1.3 Our handling of personal information seriously violates our agreement with you;

    1.4 You no longer use our products or services, or you actively cancel your account;

    1.5 We no longer provide products or services to you permanently.

    1.6 If we decide to respond to your deletion request, we will also try our best to notify the entities that obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization.

    1.7 When you delete information from our services, we will not immediately delete the corresponding information from the backup system, but will delete the information when the backup is updated.

    (III) Correction of personal information

    You can modify your bound mobile phone number, password, and email address through "Me" - "Settings".

    (IV) Withdraw your authorization

        1. You can deauthorize your Taobao account by logging out.

    Please understand that each business function requires some basic personal information to be completed. When you withdraw your consent or authorization, we cannot continue to provide you with the services and functions corresponding to the withdrawal of consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.

    (V) Obtain a copy of personal information

    If you need to obtain the personal information you provided to us and the personal information we collected from you as agreed in this Policy, please contact us through the contact information listed in this Policy and make this request. After verifying your identity, we will process your request within 15 working days.

    (VI) Account cancellation

    1. You can contact us through the app client "Me" - "Contact the Author" to apply for account cancellation. We will process it within 15 days after verifying the user's identity; after the account is cancelled, we will delete or anonymize the personal information that has been collected.

    2. If your account has no login record for more than two years since the date of successful registration, we reserve the right to cancel the account. Once the account is cancelled, we will not accept the user's application for unfreezing or retrieving the account, and the corresponding member name will be open to any user for registration.

    (VII) Responding to your above requests

    1. To ensure security, you need to proactively make a request to us or prove your identity in other ways. We will ask you to verify your identity before processing your request.

    2. We will respond within 15 working days. If you are not satisfied, you can also lodge a complaint through the contact information listed in this policy.

    3. In principle, we do not charge any fees for your reasonable requests, but we will charge a certain cost for repeated requests that exceed reasonable limits. We may reject requests that are unreasonably repeated, require too many technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are extremely impractical.

    4. In the following circumstances, we will be unable to respond to your request in accordance with laws and regulations:

    (1) Those related to national security or national defense security;

    (2) Related to public safety, public health, or major public interests;

    (3) Related to criminal investigation, prosecution, trial and execution of judgment;

    (4) There is sufficient evidence to show that the subject of personal information has subjective malice or abuses his rights;

    (5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

    (6) Involving business secrets.

    (VIII) Cessation of operations

    If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations in the form of an announcement, and delete or anonymize your personal information held by us.

VIII. How we protect the personal information of minors

    (I) If you are a minor aged 14 (inclusive), we recommend that you ask your parents or guardians to read this Policy and use our services or provide us with your information with the consent of your parents or guardians . For situations where your information is collected with the consent of your parents or guardians, we will only use or disclose this information when permitted by law, with the explicit consent of your parents or guardians, or when necessary to protect your rights and interests.

    (2) If your guardian does not agree with you using our services or providing information to us in accordance with this policy, please terminate your use of our services immediately and notify us in time so that we can take appropriate measures.

IX. Applicable Exceptions to the Privacy Policy

    (1) Our products and services may include or be linked to social media or other services (including websites) provided by third parties, as well as information collected by other companies and institutions that provide advertising services on our services, such as:

    1. You use the sharing function to share certain content to our products or services, or you use third-party online services to log in to our products or services. These features collect your account information.

    2. We provide you with links through our services so that you can access third-party products, services or websites.

    (2) Such third-party social media or other services may be operated by relevant third-party partners or us. Your use of such third-party social media services or other services (including any information you provide to such third parties) is subject to the third party’s terms of service and privacy policy (not the General Terms of Service or This Policy), you need to read its terms carefully. This policy only applies to the information we collect and does not apply to the products or services provided by any third party or the third party's information use rules.

X. Changes to this Policy

When the following "significant changes" occur in our Privacy Policy , we will notify you in a prominent position on the homepage, through a pop-up window or other means. If you do not agree to the updated version, please stop using our products and services. If you continue to use our products and services, you agree to be bound by the revised Privacy Policy :

    1. Significant changes in our core business model.

    2. We have major changes in our ownership structure, organizational structure, equity structure, etc. Such as changes in ownership caused by business adjustments, bankruptcy, reorganization, mergers and acquisitions, separations, etc.

    3. The main recipients of personal information sharing, transfer or public disclosure change.

    4. Significant changes in your rights to participate in the processing of personal information and how to exercise them

    5. We are responsible for accepting complaints, suggestions regarding personal information and changes in the contact information of this Privacy Policy.

XI. Contact, Complaints and Reports

    If you find that your information has been used for illegal activities or has been infringed during the use of Xiyou Diary products/services, you are welcome to actively report it. We will accept it in accordance with the "Cybersecurity Law of the People's Republic of China" and other legal requirements. After you provide After you have obtained legal and valid proof of rights, infringement facts and other documents and verified them by us, we will reply to you with the processing results within 15 working days from the date of verification. You can also report to the cybersecurity and informatization department, industry and information department, public security and industrial and commercial supervision departments. department to file a complaint or report. The reporting methods are as follows:

    (1) Report email : 2721185782@qq.com.

    (2) WeChat ID : csgapp66.

    (3) Client reporting : reporting entrance for each function.

XII. Product and service operator information

    (1) Operating entity: Shenzhen Xiyou Diary Network Technology Co., Ltd.

    (2) Registered address: No. 119, Xiner Village, Yantian Community, Xixiang Street, Bao'an District, Shenzhen

    (3) Contact information of relevant person in charge: 2721185782@qq.com

    (4) Application name: Pet Diary

XIII. Governing Law and Dispute Resolution

    This policy shall be interpreted and governed in accordance with the laws of the People's Republic of China. Any disputes between you and us shall be resolved through friendly negotiation. If no agreement is reached through negotiation, either party shall have the right to submit the dispute to the People's Court with jurisdiction over the location of Xiyoudiary for litigation.

The above content is translated from the Simplified Chinese version of the Privacy Policy. If you have any questions, please refer to the Simplified Chinese version of the Privacy Policy.