Release date of this version: April 20, 2024
Effective date: April 20, 2024
We understand the importance of personal information to you and thank you for your trust in us. We will use this policy to explain to you how we collect, store, protect, use and provide your information to the outside world, and explain your rights. The key points are as follows:
1. In order for you to easily understand the type and purpose of the information we need to collect when you use our products and services, we will explain it to you in conjunction with specific products and services.
2. In order to provide you with services, we will collect your information in accordance with the principles of legality, legitimacy and necessity.
3. If your information needs to be shared with a third party in order to provide you with services, we will evaluate the legality, legitimacy, and necessity of the third party's collection of information. We will require third parties to take protective measures for your information and strictly comply with relevant laws, regulations and regulatory requirements. In addition, in accordance with the requirements of laws, regulations and national standards, we will obtain your consent or confirm that a third party has obtained your consent by confirming the agreement, copywriting confirmation in specific scenarios, pop-up prompts, etc.
4. If we need to obtain your information from a third party in order to provide you with services, we will require the third party to explain the source of the information and require the third party to ensure the legality of the information it provides.
5. If we use the information for other purposes not specified in this policy, use the information collected for specific purposes for other purposes, or the personal information processing required for our business exceeds what you originally provided to the third party. The scope of authorization when collecting personal information will require your explicit consent in advance .
6. You can access and manage your information, set privacy features, cancel your account, or make complaints and reports through the methods described in this policy.
You can read the corresponding chapters according to the following index to learn more about the specific content of this policy:
I. Introduction
2. Definition
3. How we collect and use your personal information
4. How we use cookies and similar technologies
5. How we share, transfer and disclose your personal information with third parties
6. How we store and protect your personal information
7. How you access and manage your information
8. How we protect the personal information of minors
9. Applicable Exceptions to the Privacy Policy
10. Changes to this Policy
11. Contact, Complaints and Reports
12. Product and service operator information
13. Governing Law and Dispute Resolution
I. Introduction
Shenzhen Xiyou Diary Network Technology Co., Ltd. (hereinafter referred to as "Xiyou Diary") attaches great importance to the privacy of its users. When you use our services, we will collect and use your relevant information. We hope to use this policy to explain to you how we collect, use, store and share this information when using our services, and how we provide you with access, update, control and protect this information. This policy is closely related to our products and services you use. I hope you read it carefully and, when necessary, follow the guidelines of this policy to make the choices you deem appropriate. We try to express the relevant technical terms involved in this policy as concisely as possible and provide links to further explanations (if necessary) to facilitate your understanding.
In particular, this policy applies to platforms, products, and services that are currently valid under Grapefruit Diary and may be released and run in the future. If the products and services of our affiliates (see the definition section for scope) use the products and services we provide but If there is no independent privacy policy, this policy will also apply to that part of the products and services.
In order for you to fully understand this statement and the terms in this statement that have or may have a significant relationship with your rights and interests, we have used bold font to draw your attention.
If you check or click "Agree" to this "Privacy Policy" during initial installation, first use or first login/registration of an account, it means that you agree to this "Privacy Policy". However, this does not mean that we will immediately collect all personal information contained in this Privacy Policy. Only when you open and use a certain function through browsing, active filling, clicking and other autonomous behaviors, we will follow this Privacy Policy. 》Collect and use the personal information corresponding to this function.
If you do not agree to this Privacy Policy, please do not use or stop using our products and services.
Features we offer you:
1. No registration/login required: Privacy Policy, User Agreement.
2. Registration/login required: ingredients, nutrients, discovery, Meaty, weight, daily routine, feeding amount calculation, recipes, pet management, etc.
2. Definition
1.Affiliated companies
Refers to companies that have a direct or indirect control relationship or significant influence relationship with Grapefruit Diary, including but not limited to the following situations: they directly or indirectly hold 25% or more of the total shares of one of them; they directly or indirectly share the same interests with each other; 25% or more of the shares owned or controlled by a third party; the loan funds between Grapefruit Diary and another company account for 50% or more of the paid-in capital of Grapefruit Diary; senior management personnel such as directors or managers of the affiliated company More than half may have one managing director appointed by Grapefruit Diary.
3. How we collect and use your personal information
We collect information to provide better services to all users. The main sources of information we collect include: the information you provide to Pet Recipe, the information Pet Recipe obtains when you use the products and services of Grapefruit Diary, and the shared information you provide to other parties through our products and services. . We will collect your personal information legally, reasonably and to a minimum. Before collection, we will clearly inform you of the types of personal information we collect, the rules for its use, and obtain your authorization and consent.
Pet Recipe will collect and use your personal information for the following purposes:
(1) Registration/Login
If you use ingredients, nutrients, discovery, Meaty, weight, daily, feeding amount calculation, recipes, pet management, etc., you need to register/log in (logging in means you register as our user) client, we will register according to your /Log in to collect the following personal information:
1. Mobile phone number (email address) is the personal information you actively provide to us when you choose to use your mobile phone number (email address) to register/log in. At the same time, we will verify whether your account is valid by sending a SMS (email) verification code. You can also retrieve and modify your account password through your mobile phone number (email address).
2. Third-party application account (Taobao, WeChat) and nickname, avatar public information (please refer to the information displayed on the authorized login interface), you choose to use a third-party account to register/log in, and authorize Pet Recipe to read your The above information registered for the third-party account.
If you do not provide this information, you will not be able to register/log in to our products, and you will not be able to use functions that require registration/log in, but this will not affect your normal use of functions that do not require registration/log in.
(2) You can search for content by text
When you type a text search, we will save your search keyword information and search history locally on the client . This is to prevent you from repeatedly entering the same search content next time, and so that we can continue to improve and optimize the above. Function.
(3) Contact us
When you contact us, we may save your communication records and content or the contact information you left in order to contact you or help you solve your problem, or record the solutions and results of related problems; if you do not provide the above Information will not affect your use of other services we provide.
(4) WeChat authorization
When you share content and invitation codes in WeChat, or help your friends to support, you need to authorize WeChat in the Pet Recipe APP. If you do not authorize, it will affect your sharing and support.
( 5) Message push
If you need to receive our push messages (SMS, push, in-site messages) and keep abreast of pet reminders and event promotion information for products or services you purchase through our products and services, we will provide you with push information services. This function requires using your contact number and turning on the receiving permission. If you do not agree to receive the aforementioned information, you can unsubscribe by replying to the SMS prompt or other methods we provide. You need to turn on the corresponding notification authorization, so that we can push the relevant information to you as soon as possible. If you do not authorize it, it will not affect your use of other services we provide.
(6) Access our products and services
Setting up the corresponding network can help you better access our products and services.
(7) Receive notifications
Notification permissions include banners, sounds and marks. If you turn on the corresponding notification authorization, we can push relevant information to you as soon as possible. If not authorized, it will not affect your use of other services we provide.
Autostart and associated startup instructions
1. In order to ensure that the application can normally receive the information pushed by the client when it is closed or running in the background, the application must use the (self-starting) capability, and there will be a certain frequency of sending broadcasts through the system to wake up the application's self-starting or associated startup behavior. , necessary to implement functions and services.
2. When you open a content push message, the relevant content will be redirected to you after obtaining your explicit consent. There will be no self-initiation or associated activation without your consent.
3. When you open a file downloaded within this App, the third-party App will be launched in association with it.
(8) Cutting board
[Sharing and identification] When you share or receive shared information, participate in activities, etc., we need to access your clipboard and read the passwords, sharing codes, and links contained in it to achieve jumps, sharing, and activities. Linkage and other functions or services.
[Statistical Analysis] We may need to count the application source channel information through the clipboard. During the statistical process, we will not return the personal privacy information you wrote to the clipboard.
[Special Note] The systems of some mobile phones and other terminal devices will prompt that the application (App) is reading the clipboard, but the system prompt cannot distinguish whether clipboard information is being collected, and false positives cannot be ruled out. Therefore, if you find similar prompts, please contact us so that we can locate the problem.
( 9) Improve image access speed
We will cache the pictures you download when using our products and services on external storage (this permission is only developed based on the Android system), in order to improve the speed when you access the aforementioned pictures again.
(10) In order to improve the security of your use of the services provided by us and our affiliates and partners, protect the personal and property safety of you or other users or the public from infringement, and better prevent attacks caused by phishing websites, fraud, network vulnerabilities, and computer Security risks caused by viruses, network attacks, network intrusions, and illegal content. To more accurately identify violations of laws and regulations or relevant agreement rules we have formulated, we may obtain your account information, transaction information, device information, and log information. As well as our affiliated companies and third-party partners, we obtain the information you authorize or share in accordance with the law to comprehensively judge your account and transaction risks, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.
1. Device information
Your device and software related information: device brand and model, IP address, device software version information, device identification code, AndroidID [Android only], IDFV [iOS only] .
2. Log information
When you use our products and services, we will collect your detailed usage of our services and save them as relevant network logs, including: your search query content (such as search terms), IP address, browser type, access Social media page URL address, access date and time, system error logs and access records . Please note that when you turn on these permissions, you authorize us to collect and use this personal information to implement the above functions. When you turn off the permissions, you cancel these authorizations, and we will no longer continue to collect and use your personal information. information, and cannot provide you with the above-mentioned functions corresponding to these authorizations. Your decision to turn off permission will not affect the previous processing of personal information based on your authorization.
( 11) Exceptions to obtaining authorized consent
According to relevant laws and regulations, we do not need to obtain your authorization and consent when collecting and using your personal information under the following circumstances:
1. Related to national security and national defense security;
2. Relevant to public safety, public health, and major public interests;
3. Relevant to criminal investigation, prosecution, trial and decision, execution of judgment, etc.;
4. To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain your consent;
5. The personal information collected is disclosed to the public by you yourself;
6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure, new media platforms and other channels;
7. Necessary to conclude a contract at your request;
8. Necessary to maintain the safe and stable operation of the products or services provided, such as discovering and handling product or service failures;
9. Necessary for legitimate news reporting;
10. When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing the results of academic research or description to the outside world, the personal information contained in the results will be de-identified;
11. Other situations stipulated by laws and regulations.
Please understand and agree that if your information cannot identify you individually or in combination with other information, it does not belong to your personal information in the legal sense; only if your information can identify you individually or in combination with other information If your identity is not the same, it will be treated and protected as your personal information in accordance with this policy during the combined use period.
4. How we use cookies and similar technologies
(1) We or our third-party partners may collect and use your information through cookies and web beacons, and store such information as log information.
(2) You can refuse or manage cookies or web beacons through browser settings. However, please note that if you disable cookies or web beacons, you may not be able to enjoy the best service experience, and some services may not work properly.
(3) Please understand that some of our services can only be achieved through the use of Cookies. If your browser or browser add-on services allow it, you can modify the acceptance of Cookies or reject our Cookies. However, rejecting our Cookies may in some cases affect your safe access to platform-related websites and use of the services provided by the platform. Serve.
5. How we share, transfer and disclose your personal information with third parties
We will inform you of the purpose of sharing, the legality of the data recipients, and obtain your consent in advance. Accurately record and save the sharing of your personal information, including the date, scale, purpose of sharing, and the basic information of the data recipients.
(1) Sharing
1. We will not share your personal information with any other company, organization or individual, except in the following circumstances:
(1) Obtain your explicit consent or authorization in advance;
(2) Provided in accordance with applicable laws and regulations, legal process requirements, mandatory administrative or judicial requirements;
(3) To the extent permitted by laws and regulations, it is necessary to protect Grapefruit Diary, Grapefruit Diary’s affiliates or partners, you or other Grapefruit Diary users, or the public’s interests, property or safety from damage;
(4) Only by sharing your information can we realize the core functions of the products and services provided by us, our affiliated companies, and third parties that cooperate with us or provide the services you need;
(5) Handle disputes or controversies between you and others upon your request;
(6) Comply with the relevant agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;
(7) Used based on academic research;
(8) Information that needs to be disclosed to specific third parties (such as third-party audit institutions, corporate listing regulatory authorities) as stipulated by laws and regulations of national and industry authorities;
(9) Necessary sharing within Grapefruit Diary and its affiliated companies. We will only share necessary personal information and for the purposes stated in this Privacy Policy. If you want to change the purpose of processing personal information, your authorization and consent will be asked again.
(10) Use based on social and public interests that comply with laws and regulations.
2. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we may share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures. We will only share necessary personal information and for the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will ask for your authorization and consent again.
3. To comply with the law, enforce or apply our conditions of use and other agreements, or to protect the rights and property or safety of Grapefruit Diary, you or other Grapefruit Diary customers, such as to prevent fraud, network attacks, phishing websites, Network vulnerabilities, computer viruses, network attacks, network intrusions and other illegal activities and reduce credit risks while exchanging information with other companies and organizations. However, this does not include personal information that is sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this Privacy Policy.
4. We may share your order information, account information, and payment information with third parties such as partners to ensure the smooth completion of the services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and we will only share the personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose. Our partners include the following types:
(1) Authorized partners for data statistics and data analysis services. In order to maintain/improve our products/services and provide you with better services, we may access your designated partners Umeng, Bugly, and Jiguang that provide this service to read your device information (including open independent device identifiers) (Open UDID), unique device identifier IMEI, iOS advertising identifier IDFA, MAC address, device model, terminal device operating system version), device language, network/language status related information, used to analyze your use of our services, Optimize services.
(2) Suppliers, service providers and other partners . We will store your device information (including device model, operating system version, device settings, unique device identification code IMEI, device location-related information (including your authorized GPS location and WLAN access point, Bluetooth and base station sensor information), Device environment software and hardware characteristics information), log information (including browsing, click to view, search query, collection, add to shopping cart, transaction, after-sales, attention sharing information and other service-related log information), IP address, browser type , network status is sent to suppliers, service providers and other partners that support our business (such as JD.com, Taobao Baichuan, Alipay). These supports include providing users with product display, product search, and shopping payment.
(3) In order to enable you to share information on third-party platforms and browse products smoothly, our application will embed the SDK of authorized partners or other similar applications. If you use a Weibo, WeChat, or QQ third-party account to log in to our client, its SDK needs to collect your third-party account and device information (including device model, operating system version, unique device identification code IMEI, and International Mobile Subscriber Identification) IMSI, MAC address), IP address, MAC address, application list, log information, geographical location related information; if you use the online customer service function, Qiyu SDK will collect your device information (including device model, operating system version, Unique device identifier IMEI), network status, geographical location related information and request for album/camera permissions, microphone permissions, external storage permissions, background running permissions (this permission only applies to Android systems), etc.; Tencent X5 SDK provides browsing services, It will obtain your unique device identification code IMEI, international mobile subscriber identification code IMSI, MAC address, device model, screen size, operating system version number, target API (TargetAPI), network type (ApnType), network change monitoring broadcast and Wifi’s MAC address. The above-mentioned suppliers, service providers and other partners collect and process information in compliance with their own privacy policies, which do not apply to this Privacy Policy. At the same time, in order to protect your information security to the greatest extent, we recommend that you check the privacy policy of any third-party SDK service before using it. To protect your legitimate rights and interests, if you find that there are risks in this SDK or other similar applications, we recommend that you immediately terminate the relevant operations and contact us in a timely manner.
(2) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Obtain your explicit consent or authorization in advance;
2. Provided in accordance with applicable laws and regulations, legal process requirements, mandatory administrative or judicial requirements;
3. Comply with the relevant agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;
4. With the continued development of Grapefruit Diary’s business and the company’s operating conditions, we and our affiliates may engage in mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. . We will notify you before the transfer. If the transfer of personal information is involved, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.
(3) Public disclosure
We will only publicly disclose your personal information under the following circumstances and under the premise of adopting security protection measures that comply with industry standards:
1. Based on your needs, disclose the personal information you specify in the disclosure method you explicitly agree to;
2. When it is necessary to provide your personal information in accordance with the requirements of laws, regulations, mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information based on the required type of personal information and disclosure method. Subject to complying with laws and regulations, when we receive the above request to disclose information, we will require the issuance of corresponding legal documents, such as a subpoena or a letter of investigation. We firmly believe that the information we are asked to provide should be as transparent as possible to the extent permitted by law. All requests are carefully reviewed to ensure they have a legitimate basis and are limited to data that law enforcement has a legal right to obtain for specific investigative purposes.
(4) Exceptions with consent
Please be fully aware that in the following situations, sharing, transferring, or publicly disclosing your personal information does not require your prior authorization and consent:
1. Directly related to national security and national defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial and judgment execution;
4. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;
5. Personal information that you disclose to the public on your own;
6. Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
6. How we store and protect your personal information
(1) Storage of your personal information
1. The personal information we collect and generate within the territory of the People’s Republic of China will be stored within the territory of the People’s Republic of China.
2. We consider the following factors to determine the period for which your personal information will be stored:
2.1 The minimum storage period stipulated by law, such as the minimum storage time stipulated in the "Network Security Law", "E-Commerce Law", etc.
2.2 The period necessary for the purpose of providing our products/services. For example, when you use the corresponding function after registering/logging in with your mobile phone number, we will continue to save your mobile phone number while you provide and use the function. This feature is provided to you normally.
2.3 The retention period for fulfilling other legal obligations. For example, according to Article 13 of the "Information Network Communication Protection Regulations", we need to provide the copyright administrative department with the name, contact information and other information of the alleged infringing service object.
2.4 Monitor and record network operating status and relevant network logs of network security events for no less than six months.
3. For personal user information that exceeds the above information retention period, we will use formatting and other methods to delete or anonymize the user's personal information in accordance with relevant laws, regulations and established regulations.
4. Our network services adopt encryption technologies such as Transport Layer Security Protocol and provide browsing services through https and other methods to ensure the security of user data during transmission.
5. We encrypt and store your personal information through database table space encryption and other encryption technologies.
6. In situations where your personal information is to be shared, we will conduct a personal information security impact assessment in advance and take effective measures to protect the subject of personal information based on the assessment results. We will try our best to de-identify your personal information before sharing it.
(2) Protection of your personal information
1. We have established a personal information protection department to conduct personal information security impact assessments on the collection, use, sharing, and entrusted processing of personal information. At the same time, we have established relevant internal control systems and adopted the principle of minimum authorization for staff who may have access to your information; we systematically monitor the behavior of staff in handling your information, and continuously train staff on relevant laws, regulations and privacy security. Strengthen the promotion of standards and safety awareness, and organize relevant staff to participate in safety training every year. In addition, our corresponding network/system has passed the national network security level protection evaluation. We also hire an external independent third party to evaluate our information security management system every year.
2. We have formulated an emergency plan for personal information security incidents and regularly organize relevant internal personnel to conduct emergency response training and emergency drills so that they can master their job responsibilities and emergency response strategies and procedures. After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the steps you can take to prevent and reduce risks on your own. Suggestions, remedies for you, etc. We will promptly notify you of the incident-related information through APP push notifications, sending emails/short messages, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities. If your legitimate rights and interests are damaged, we will bear the corresponding legal liability.
3. We will adopt security protection measures that comply with industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from unauthorized access, use, modification, and avoid data damage or loss.
4. Our network services adopt encryption technologies such as Transport Layer Security Protocol and provide browsing services through https and other methods to ensure the security of user data during transmission.
5. We use encryption technology to encrypt and save users’ personal information, and isolate it through access restriction technology. When using personal information, such as personal information display and personal information correlation calculation, we will use a variety of data desensitization technologies including content replacement and content hiding to enhance the security of personal information in use.
6. We use strict data access control and multi-identity authentication technology to protect personal information and avoid illegal use of data.
7. We use data access log analysis technology to conduct personal information security audits.
8. Other security measures we take to protect personal information
8.1 We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.
8.2 We implement comprehensive security controls on data through information contact confidentiality agreements, monitoring and auditing mechanisms.
8.3 We have established a dedicated department for personal information protection and a data security emergency response organization to promote and protect personal information security.
8.4 Strengthen safety awareness. We will also hold security and privacy protection training courses to enhance employees’ awareness of the importance of protecting personal information.
9. We only allow relevant employees and partners who need to know this information to access personal information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all persons who may have access to your personal information to fulfill corresponding confidentiality obligations.
10. You should understand that the Internet is not an absolutely secure environment, and we strongly recommend that you do not send personal information using methods other than those recommended by Grapefruit Diary. You can connect and share with each other through our services. When you create communications, transactions or shares through our services, you can independently choose the objects of communication, transactions or sharing as third parties who can see your contact information, communication information or shared content and other related information.
11. When using the cash withdrawal service we provide for online transactions, you will inevitably have to disclose your personal information, such as contact information or contact address, to the counterparty or potential counterparty. Please protect your personal information properly and provide it to others only when necessary. If you find that your personal information, especially your account or password, has been leaked, please contact the transaction party immediately. If necessary, we will immediately assist in handling the aforementioned matters after receiving your request.
12. Please note that the information you voluntarily share or even share publicly when using our services may involve your or others' personal information or even personal sensitive information. Please consider more carefully whether to share or even share relevant information publicly when using our services.
13. Please use complex passwords to help us ensure the security of your account. We will do our best to keep any information you send us secure. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability.
7. How you access and manage your information
(1) We will take appropriate technical means to ensure that you can query your registration information.
1. You can query your avatar, username, and user ID by clicking "Home" - "Drawer Button in the Upper Left Corner".
2. Query other news
2.1 You can view your evaluation information in the app store on "Home Page" - "Drawer Button in the Upper Left Corner" - "Give a Good Review"
2.2 You can view your feedback with us on "Home Page" - "Drawer Button in the Upper Left Corner" - "Feedback"
2.3 You can view the information you receive on "Home Page" - "Drawer Button in the Upper Left Corner" - "My Information"
2.4 You can view relevant information about us (Pet Recipe) in "Home Page" - "Drawer Button in the Upper Left Corner" - "About Us"
2.5 You can check how to modify, log in, log out and other account related information in "Home Page" - "Drawer Button in the Upper Left Corner" - "Settings"
If you are unable to access and manage such personal information through the above paths, you can contact us at any time through the contact information shown in this policy, and we will respond to your access request within 15 working days.
(2) Deletion of personal information
1. You can delete some of your personal information through the methods listed in this article. In the following circumstances, you can make a request to us to delete personal information through the client's "Home Page" - "Drawer Button in the Upper Left Corner" - "Feedback". We will process it within 15 days after verifying the user's identity:
1.1 Our handling of personal information violates laws and regulations;
1.2 We collect and use your personal information without your explicit consent;
1.3 Our handling of personal information seriously violates our agreement with you;
1.4 You no longer use our products or services, or you actively cancel your account;
1.5 We will permanently no longer provide products or services to you.
1.6 If we decide to respond to your deletion request, we will also try our best to notify the subjects who obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these subjects obtain your independent authorization.
1.7 When you delete information from our services, we will not delete the corresponding information from the backup system immediately, but will delete the information when the backup is updated.
(3) Correction of personal information
You can modify your mobile phone number and authorize mobile Taobao, WeChat, and Alipay through "Home Page" - "Drawer Button in the Upper Left Corner" - "Settings".
(4) Withdraw your authorization
1. You can deauthorize your Taobao account by logging out.
Please understand that each business function requires some basic personal information to be completed. When you withdraw your consent or authorization, we cannot continue to provide you with the services and functions corresponding to the withdrawal of consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.
(5) Obtain a copy of personal information
If you need to obtain the personal information you provided to us and the personal information we collected from you through this policy, please contact us through the contact information listed in this policy and make this request. We will verify your identity after , your request will be processed within 15 working days.
(6) Account cancellation
1. You can apply for cancellation through the app client "Home Page" - "Drawer Button in the Upper Left Corner" - "Settings" - "Account Settings" - "Cancel Account". We will process it within 15 days after verifying the user's identity; account cancellation Afterwards, we will delete or anonymize the personal information we have collected.
2. If your account has no login record for more than two years from the date of successful registration, we will reserve the right to cancel the account. Once the account is canceled, we will not accept user applications to unfreeze or retrieve the account. The corresponding member name will be open to any user for registration.
(7) Respond to your above request
1. To ensure safety, you need to make a request to us or prove your identity in other ways. We will ask you to verify your identity before processing your request.
2. We will respond within 15 working days. If you are not satisfied, you can also lodge a complaint through the contact information listed in this policy.
3. In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. We may reject requests that are unreasonably repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical.
4. In the following circumstances, we will not be able to respond to your request in accordance with legal and regulatory requirements:
(1) Related to national security and national defense security;
(2) Relevant to public safety, public health, and major public interests;
(3) Related to criminal investigation, prosecution, trial and execution of judgments;
(4) There is sufficient evidence that the personal information subject has subjective malice or abused his rights;
(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(6) Involving business secrets.
(8) Cessation of operations
If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations in the form of an announcement, and delete or anonymize your personal information held by us.
8. How we protect the personal information of minors
(1) If you are a minor under the age of 14 (inclusive), it is recommended that your parents or guardians read this policy and use our services or provide us with your information with the consent of your parents or guardians . For situations where we collect your information with the consent of your parents or guardians, we will only use or publicly disclose this information as permitted by law, with the explicit consent of your parents or guardians, or as necessary to protect your rights and interests.
(2) If your guardian does not agree with you using our services or providing information to us in accordance with this policy, please terminate your use of our services immediately and notify us in time so that we can take appropriate measures.
9. Applicable Exceptions to the Privacy Policy
(1) Our products and services may include or be linked to social media or other services (including websites) provided by third parties, as well as information collected by other companies and institutions that provide advertising services on our services, such as:
1. You use the sharing function to share certain content to our products or services, or you use third-party online services to log in to our products or services. These features collect your account information.
2. We provide you with links through our services so that you can access third-party products, services or websites.
(2) Such third-party social media or other services may be operated by relevant third-party partners or us. Your use of such third-party social media services or other services (including any information you provide to such third parties) is subject to the third party’s terms of service and privacy policy (not the General Terms of Service or This Policy), you need to read its terms carefully. This policy only applies to the information we collect and does not apply to the products or services provided by any third party or the third party's information use rules.
10. Changes to this Policy
When we make the following " major changes " to our Privacy Policy , we will notify you in a prominent location on our homepage, in a pop-up window, or in other ways. If you do not agree with the updated version, please stop using our products and services. If you continue to use our products and services, you agree to be bound by the revised Privacy Policy :
1. Significant changes in our core business model.
2. We undergo major changes in ownership structure, organizational structure, equity structure, etc. Such as changes in owners caused by business adjustments, bankruptcy, reorganization, mergers and acquisitions, spin-offs, etc.
3. The main recipients of personal information sharing, transfer or public disclosure change.
4. Significant changes in your rights to participate in the processing of personal information and how to exercise them
5. We are responsible for accepting complaints, suggestions regarding personal information and changes in the contact information of this Privacy Policy.
11. Contact, Complaints and Reports
If you find that your information has been used for illegal activities or has been infringed during the use of Xiyou Diary products/services, you are welcome to actively report it. We will accept it in accordance with the "Cybersecurity Law of the People's Republic of China" and other legal requirements. After you provide After you have obtained legal and valid proof of rights, infringement facts and other documents and verified them by us, we will reply to you with the processing results within 15 working days from the date of verification. You can also report to the cybersecurity and informatization department, industry and information department, public security and industrial and commercial supervision departments. department to file a complaint or report. The reporting methods are as follows:
(1) Report email : 2721185782@qq.com.
(2) Client reporting : reporting portal for each function.
12. Product and/or service operator information
(1) Operating entity: Shenzhen Xiyou Diary Network Technology Co., Ltd.
(2) Registered address: No. 119, Xiner Village, Yantian Community, Xixiang Street, Baoan District, Shenzhen City
(3) Contact information of relevant person in charge: 2721185782@qq.com
(4) Application name: Pet Recipe
13. Governing Law and Dispute Resolution
This policy shall be interpreted and governed in accordance with the laws of the People's Republic of China, and any disputes of any kind between you and us shall be resolved through friendly negotiation. If negotiation fails, either party has the right to submit the dispute to the people's court with jurisdiction over where Grapefruit Diary is located for litigation resolution.