Privacy Policy Statement

This policy only applies to this product or service. Latest update date: October 24, 2024


This policy will help you understand the following:
1、 How do we (“We”) collect and use your user information on our “One Touch” online store
2、 How do we use cookies and similar technologies
3、 How do we share, transfer, and publicly disclose your user information
4、 How do we protect your user information
5、 Your rights
6、 How do we handle children’s personal information
7、 How your user information is stored and transferred globally
8、 How to update this policy
9、 How to contact us and provide developer information


We deeply understand the importance of user information to you and will do our best to protect the security and reliability of your user information. We are committed to maintaining your trust in us, adhering to the following principles, and protecting your user information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of selective consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take corresponding security measures in accordance with mature industry security standards to protect your user information.


Please read and understand this privacy policy carefully before using our products (or services).
1、 How do we collect and use your user information
(1) The information we collect and use during your use of our products or services
We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to the problems you encounter:
When you use our services, we allow you to collect information that you provide to us on your own or that is necessary to provide services to you, including: phone number, account information, device information, log information, IP address, location information, etc.
Special note: During the operation of the mall, IMEI and other aforementioned information will be obtained. This information is only used for login verification and security identification purposes and will not be used for any other purposes. Please rest assured.
We guarantee that the collected user information will be de identified or anonymized in accordance with the law. Information that cannot be used alone or in combination with other information to identify a natural person’s personal identity is not considered personal information in the legal sense. If we combine non personal information with other information to identify your personal identity, or use it in conjunction with your personal information, we will process and protect such information as your personal information in accordance with this privacy policy during the combined use period.
In order to better operate and improve our technology and services, or due to changes in business strategy, when the collection, use, or processing of user information required for the products or services we provide exceeds the scope mentioned above, or when we intend to use the collected user information for other purposes not specified in this privacy policy, or when we intend to use information collected for specific purposes for other purposes, we will notify you within a reasonable period of time after obtaining the user information or before processing the user information, and obtain your authorization and consent.


(2) Preservation of Personal Information
1. Information retention period
During the period when users use our services, we will continuously store their personal information.
When you voluntarily delete personal information or cancel your account, we will retain your existing personal information for the shortest period required by laws and regulations. Within the shortest retention period required by laws and regulations, we will no longer commercially use your personal information. When your personal information exceeds the above-mentioned retention period, we will anonymize it.
a. In order to cooperate with the People’s Procuratorate, public security organs, and national security organs in investigating criminal acts committed by users during the use of our services, and to better protect the safety of other users’ lives and property, when users voluntarily delete personal information or cancel their accounts, we will encrypt, isolate, and archive their personal information within the time limit for criminal prosecution stipulated in the Criminal Law.
b. If you seriously violate laws, regulations, platform agreements, platform rules, etc. during the use of our services, your illegal or breach records and corresponding platform credit records will be permanently saved.
Information storage area
The personal information we collect from you will be stored and used at the location of the site.
At present, we do not have a scenario of providing personal information to non site locations or other regional sub stations of the site. If there is a need to transfer personal information abroad in the future, we will clearly inform you of the purpose, recipient, security measures, and obtain your consent separately.
Security protection measures
Our company will adopt strict security regulations and industry standard security technologies and procedures to ensure that your personal information is not lost, leaked, damaged, or accessed or used without authorization.
We take the following security measures to protect your personal information:
a. User personal information is encrypted and stored on the server, and is stored through data isolation technology.
b. Use encrypted transmission protocols during data transmission.
c. Strictly control data access permissions and establish a comprehensive system for applying for and approving sensitive data access permissions.
d. Establish a data security monitoring and auditing system to carry out comprehensive data security control.
6. Security incident handling
To address potential security risks such as personal information leakage, damage, and loss, multiple systems have been issued within the company, clarifying the classification and grading standards for security incidents and vulnerabilities, as well as internal processing procedures (including emergency response procedures) and remedial measures for the aforementioned security incidents and vulnerabilities.
Once a security incident occurs, we will promptly inform you of the basic situation and risks of the incident, the measures we have taken or will take, and your suggestions on how to reduce risks on your own.
Stop operation
If the operation is stopped, we will issue a notice at least 30 days in advance and promptly stop collecting personal information.
After ceasing operations, we will cease the commercial use of personal information and anonymize the collected personal information after meeting the minimum retention period required by laws and regulations.
(3) Exceptions to obtaining authorization and consent
Please understand that according to laws, regulations, and relevant national standards, we do not need your authorization or consent to collect and use your user information in the following situations:
1. Directly related to national security and defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
4. For the purpose of safeguarding your or other individuals’ significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;
5. The user information collected from you is publicly disclosed to the general public by yourself;
6. Collecting your user information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;
7. Necessary to sign or fulfill the contract according to your requirements;
8. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling software and related service failures;
9. The personal information controller is a news organization and is necessary for conducting legitimate news reporting;
10. Academic research institutions conduct statistical or academic research based on public interest, and when providing results of academic research or descriptions to external parties, they de identify the personal information contained in the results.
11. Other circumstances stipulated by laws and regulations.
2、 How do we use cookies and similar technologies
(1) Cookie
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies typically contain identifiers, site names, as well as some numbers and characters. With the help of cookies, websites can store your visit preference data.
We will not use cookies for any purposes other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a feature to block cookies. But if you do so, you will need to personally change the user settings every time you visit our website.
(2) Website beacons and pixel tags
In addition to cookies, we also use other similar technologies such as website beacons and pixel tags on our website. For example, the email we send you may contain a click URL that links to the content of our website.
If you click on the link, we will track this click to help us understand your product or service preferences and improve customer service. A website beacon is typically a transparent image embedded in a website or email. By using pixel tags in emails, we can determine whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
(3) Do Not Track
Many web browsers have a Do Not Track function, which can issue Do Not Track requests to websites. At present, the major Internet standards organizations have not established relevant policies to specify how websites should respond to such requests. But if your browser has enabled Do Not Track, then all of our websites will respect your choice.


3、 How do we share, transfer, and publicly disclose your user information
(1) Sharing
We will not share your user information with any other company, organization, or individual, except in the following circumstances:
1. Sharing with explicit consent: With your explicit consent, we will share your user information with other parties.
2. We may share your user information with external parties in accordance with laws and regulations or mandatory requirements of government regulatory authorities.
(2) Transfer
We will not transfer your user information to any company, organization, or individual, except in the following circumstances:
1. Transfer with explicit consent: With your explicit consent, we will transfer your user information to other parties;
2. When it comes to mergers, acquisitions, or bankruptcy liquidation, if there is a transfer of user information, we will require the new company or organization holding your user information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.
(3) Public disclosure
We will only publicly disclose your user information in the following situations:
1. After obtaining your explicit consent;
2. Legal Disclosure: We may publicly disclose your user information in the event of legal, procedural, litigation, or mandatory requirements from government authorities.
(4) Exceptions to obtaining prior authorization and consent for sharing, transferring, or publicly disclosing information
Please understand that according to laws, regulations, and relevant national standards, we do not need your authorization or consent to share, transfer, or publicly disclose your user information in the following situations:
1. Directly related to national security and defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
4. For the purpose of safeguarding your or other individuals’ significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;
5. Information that you disclose to the public on your own;
6. Collected from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels.