Privacy Policy
The Bintang application, its affiliates ("we"), are well aware of theimportance of personal information to you. We will protect your personal information and privacy in accordance with laws and regulations. We have formulated this "Privacy Policy" with a special reminder: I hope you read and understand this privacy policy carefully before using Bintang and related services, so that you can make an appropriate choice.
This privacy policy will help you understand:
We will collect and use your information in accordance with the privacy policy, but we will not collect personal information in an amandatory bundle just because you agree to this privacy policy
When you use or turn on related functions or use services, we will collect and use relevant information in order to realize the functions and services necessary. Unless it is necessary for the realization of basic business functions or in accordance with the requirements of laws and regulations, you can refuse to provide without affecting other functions or services. We will explain what information item by item in the privacy policy
*lf you are not logged in to your account, we will use the identifier information corresponding to the device to ensure the basic functions of information push. lf you log in to your account, we will push information based on your account information.
*The camera,microphone, and album permissions will not be returned by default. Only after your express authorization can they be used for specific functions or services, and you can also withdraw the authorization. In particular, we need to point out that even if we have obtained these sensitive permissions with your authorization, we will not collect your information when relevant functions or services are not needed.
"This privacy policy applies to your access and use of our products and products through the Bintang application, Bintangsoftware development kit (SDK) and application programminginterface (APl) for third-party websites and applications services.
The following will help you understand in detail how wecollect,use,store,transfer, share, transfer (ifapplicable)and protect personal information; help you understand the ways to query, access,delete. correct.
and withdraw authorized personal information.
1. How we collect and use personal information
2. How do we share, transfer, and publicly disclose personalinformation
3. How do we store personal information
4. How do we protect the security of personal information
5. Manage your personal information
6. inor Clause
7. How to delete personal information
8. Revision and notice of privacy policy
9. Contact us
1. How we collect and use personal information
We will collect information that you proactively provide when you use the service in the following ways, and collect information generated during your use of the function or the process of receiving the service through automated means.
1.1 Registration, login, authentication
1.1.1 Register and log in to your account
a. When you register and log in to Bintang and related services, you can create an account, and you can complete the relevant network identification information (avatar, nickname, password). This information is collected to help you complete the registration. You can also choose to fill in gender, birthday, region and personal introduction according to your own needs to improve your information.
b.When you log in to the product through a third-party accountyou need to authorize us to obtain the public information of thethird-party account you used to log in (such as avatar, nicknamegender, and other information authorized by you), and combinethe account with your product account binding. If you do not agree to authorize or refuse us to obtain the above information, you will not be able to log in to the product through a third-party account. But it will not affect your normal use of Bintang's other functions.
1.2 Release and interaction
1.2.1 Information release
a. When you post audio, video, pictures and other content, we will collect the information you post and display your nickname,avatar,post content and information.
b. When you use the function of live broadcast, audio and video will ask you to authorize the camera, photo, and microphone permissions. If you refuse to provide authorization, you will not be able to use this function, but it will not affect your normal use of Bintang's other functions.
c.When you use the live broadcast component through the iOSsystem and Android system, we may use the third-party NamaSDK for video image processing and face beauty. informationnecessary for the third-party service, including mobile phonemodel, unique device number, etc. Please note that suchinformation is one of the preconditions for using this part of theservice. When you use this part of the service, you will obtain thispart of the information to authenticate the authority of theservice you are using. lf you refuse to provide it, you will not beable to use the service. Facial data is not used and will never be used to identify users in the app. The Nama SDK will only be used when the host starts the live broadcast, and the Nama SDK will be terminated when the live broadcast ends or exits.
When you use the filters, beauty and other tools provided in Bintangto shoot and publish content, we will collect live video data and facial feature data according to your operation. This function is not face recognition authentication, but only to identify the host facial features to achieve better live broadcast visual effects. Recognition is only done locally on the device, and will not identify the user's personal identity through facial features, nor will any facial feature value information uploaded, stored or provided to third-party users.
1.2.2 Interactive Communication
a. When you follow the account, browse, chat, we will collect the account you follow and the above information, and display the content of the following account.
b. You can follow or unfollow friends in Bintang. To help you achieve this function, we will create the following list and follower list information. These lists are necessary information forestablishing and managing friend relationships.
c. When you comment on the live or moment broadcast that you are interested in, we will collect your comment content and display or notify the users you commented on.
d. When you use virtual property to reward other users, we will collect your avatar, nickname and reward data, and display it to other users.
1.3 Recharge and query virtual property
When you enter the [Wallet] function, you can check theremaining amount of your virtual property, and you can purchaseand recharge through this page. We will collect your balanceinformation and display it on the [Wallet] function page. whenyou use payment-related functions, product payment iscompleted through payment services provided by third-partypayment institutions. Thirdparty payment services may usebiometric information for payment verification. Please read this section when you use third-party payment services. lf you disagree with the privacy policy of the third-party institution, please stop the third-party payment service in time.
1.4 Safe operation
1.4.1 Security function
We are committed to providing you with a safe and reliable product and use environment, and providing high-quality and reliable services and information is our core goal. The information collected to realize the security function is necessary information.
1.4.2 Device Information and Log Information
a. In order to ensure the safe operation of software and services, we will collect your operating system version number, deviceidentifier,iP address, software version number, phone call information, such as information operator and subscriber identitymodule information, network access mode, type, status, network quality data, operation,usage, service log.
b.In order to prevent malicious programs and necessary for safe operation,we will collect installed application information or running process information, the overall operation of the application,usage and frequency, application crashes, overall installation and usage, performance data, applications source
c.We may use your account information, device information, service log information, and information that our affiliates and partners can share with your authorization or legally to determine account security, perform identity verification, detect and prevent security incidents.
1.5 Changes to the purpose of collecting and using personal information
Please understand that as our business develops, Bintang'sfunctions and services may be adjusted and changed. Inprinciple,when a new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly orreasonably related to the original processing purpose, we will collect and use your personal information, and we will notify you again and obtain your consent.
1.6 The collection and use of personal information exempted from consent in accordance with the law
Please understand that in the following situations, in accordance with laws, regulations and relevant national standards, we do not need your authorization to collect and use your personal information:
a. Directly related to national security and national defensesecurity
b. Directly related to public safety, public health, and major public interests;
c. Directly related to criminal investigation, prosecution, trial and execution of judgments,
d.In order to protect the life, property and other major legal rights of the personal information subject or other individuals, it is difficult to obtain the consent of the person;
e. Your personal information collected is disclosed to the public by yourself;
f. Collect your personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
g. Necessary for signing or performing a contract according to your requirements;
h.Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling faults in software and related services;
i. Necessary for legal news reports,
j.Other circumstances stipulated by laws and regulations.
You are particularly reminded that if the information can identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or when data that cannot be linked with any specific personal information is used in combination with other personal information of you, this information will be treated and protected as your personal information in accordance with this privacy policy during the combined use period.
2. How do we share, transfer, and publicly disclose personal information
2.1 Sharing
2.1.1 Sharing principle
a.Authorization and consent principle: without your consent, we will not share your personal information, unless the shared personal information is de-identified information, and the shared third party cannot re-identify the natural person subject of such information. If the third party uses the information for a purpose beyond the scope of the original authorization and consent, they need to obtain your consent again.
b. The principle of legality and minimum necessity: The shared data must have a legitimate and legitimate purpose, and the shared data is limited to the extent necessary to achieve the purpose.
c. The principle of security prudence: we will carefully evaluate the purpose of the third party's use of shared information,conduct a comprehensive assessment of the security capabilities of these partners, and require them to abide by the cooperation legal agreement. We will conduct strict security monitoring on the software tool development kit (SDK) and application program interface (APl) used by partners to obtain information to protect data security.
Access to the third-party SDK directory
In order to ensure the realization of the relevant functions of theBintang App and the safe and stable operation of the application, we may access software development kits (SDk) provided by third parties to achieve related purposes.
We will conduct strict security monitoring on the software development kits (SDk) used by partners to obtain information to protect data security. The relevant third-party SDK we access to are listed in the catalog.
XIANGXIN SDK
Affiliated company name: Hangzhou Xiangxin Technology Co.Ltd.Type of data collected by SDK: phone model, unique devicenumberSDK usage: used for face beautificationPrivacy Policy Link: https//:www.faceunity.com/policy.html
Zeqo SDK
Affiliated company name: Shenzhen Jigo Technology Co.. Ltd.Types of data collected by the SDK: network status, read storage space, camera,microphone, photo album SDK usage: low-latency,strong synchronization, high-quality livebroadcast, low-frequency audio and video interaction betweenviewers and anchors
Privacy Policy Link:https://www.zego.im/privacy
Ali Cloud SDK
Company name: Alibaba Cloud Computing Co., Ltd.Type of data collected by SDK: network status
SDK usage: log collection and upload
Privacy Policy Link: https://help.aliyun.com/product/67275.html?spm=5176.29458477.J_9220772140.28.75af4c55MJTfiM
Facebook SDK
Company Name: Meta Platforms, Inc.
Type of data collected by SDK: network statusSDK usage: Three-party loginPrivacy Policy Link: https://developers.facebook.com/temms
Twitter SDK
Company Name: X CropType of data collected by SDK: network statusSDK usage: Three-party loginPrivacy Policy Link: https://twitter.com/en/privacy
Google SDK
Company name: Google Inc.Types of data collected by the SDK: network status, read storagespace
SDK usage: Three-party login
Shumei SDK
Affiliated Company name: NextData/Shumei TechnologyTypes of data collected by the SDK:a.Basic equipment information, including equipment brand,equipment manufacturer, equipment model number, equipment name, equipment system type and version, equipment basicconfiguration,equipment basic settings, equipment environmentb.Device identification information, including lMEl(InternationalMobile Equipment ldentity),lCClD(integrate Circuit Card ldentity)IMSl(International Mobile Subscriber ldentity),MAC address,Android lD, lDFV(ldentity For Vendor),IDFA(ldentity ForAdvertisers),0AlD(Open Anonymous Device ldentifier), deviceserial numberSDK usage: Account security risk control
Privacy Policy Link:https://www.ishumei.com/legal/cn/privacy.html
Firebase SDK
Affiliated company name: Google LLC
Type of data collected by SDK: network status, read storagespaCeSDK usage: log collection and uploadPrivacy Policy Link: https:/policies.google.com/privacy
Adjust SDK
Affiliated company name:Adjust GmbH.
Type of data collected by SDK: network statusSDK usage: log collection and uploadPrivacy Policy Link: https://www.adjust.com/terms/privacy-policy/
2.1.2 Realization of shared information for security and analysis and statistics
a. Safe use: We attach great importance to account, service and content security, in order to protect your and other users' account and property security, and to protect your and our legitimate rights and interests from illegal infringement. We and our affiliates or service providers may.The necessary equipment.account and log information will be shared.
b. Analyze product usage: In order to analyze the usage of our services and improve user experience, we may share statistical data on product usage (crash, flashback) with related parties or third parties, which are difficult to compare with otherinformation Combined to identify your personal identity.
2.2 Assignment
a. We will not transfer your personal information to any other third parties unless you have your explicit consent.
b. With the continuous development of our business, we may carry out mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. In the event of the foregoing changes, we will require the successor to protect your personal information in accordance with laws and regulations and the security standards not lower than this privacy policy, otherwise we will require the successor to re-obtain your authorization and consent.
2.3 Public display
a. We will not publicly disclose your information unless you follow national laws and regulations or obtain your consent.When we publicly disclose your personal information, we will adopt security protection measures that comply with industry standards.
b.We will disclose the relevant account information when we make announcements on penalties for illegal accounts and fraudulent acts.
2.4 Personal information that is legally exempt from consent to share,transfer, and publicly disclose personalinformation
Please understand that in the following situations, in accordancewith laws,requlations and national standards, we do not need your authorization to share,transfer, and publicly disclose your personal information:
a. Directly related to national security and national defense security;
b. Directly related to public safety, public health, and major public interests;
c.Directly related to criminal investigation, prosecution, trial and execution of judgments;
d. in order to protect your or other individuals' lives, property and other major legal rights and interests, but it is difficult to obtain the consent of the person;
e. Your personal information disclosed to the general public,
f. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
3. How do we store personal information
3.1 Storage period
We only keep your personal information for the period necessary for the purpose of providing Bintang and services: the information you post, comments, likes (likes) and related information. During the period when you have not withdrawn, deleted or cancelled your account, we relevant information will be retained. After the necessary period, we will delete or anonymize your personalinformation,except as otherwise provided by laws and regulations.
4. How do we protect the security of personalinformation
a. We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or under unauthorizedcircumstances Be accessed, publicly disclosed, used, modified damaged, lost or leaked.
b. We will use encryption technology, anonymization processing and related reasonable and feasible means that are no less than that of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.
c.We will establish a special security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner.
d.Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious methods that may exist, in the Internet industry, even if you do your best to strengthen security measures, it is impossible to always guarantee 100% security of the information. We will try our best to ensure the security of the personal information you provide to us.
e. You know and understand that the system and communication networks used by you to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing your account password and related personal information to others.
f.We will formulate emergency response plans, and immediatelyactivate emergency plans when user information securityincidents occur, and strive to prevent the impact andconsequences of these security incidents from expanding. Oncea user information security incident (leakage, loss) occurs, wewill promptly inform you in accordance with the requirements oflaws and requlations: the basic situation and possible impact ofthe security incident, the disposal measures we have taken or willtake, and you can take precautions on your own suggestions toreduce risks, remedial measures for you. We will promptly informyou of the relevant situation of the event through pushnotifications and related forms. When it is difficult to inform you one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
5.Manage your personal information
We attach great importance to the management of your personal information, and do our best to protect your personal informationinquiries,access,modification, deletion, withdrawal of consent and authorization, complaints and reports, and related rights to set up privacy functions, so that you have the ability to protect your privacy and information security.
5.1 Change or withdraw the scope of authorization
5.1.1 Change or withdraw sensitive permission settings
a.You can turn off the camera,microphone, and album permissions in the operating system of the device itself to change the scope of consent or withdraw your authorization.After the authorization is withdrawn, we will no longer collect information related to these permissions.
b.The software does not turn on the auto-start function by default, you can change the settings on your phone.
5.1.2 Information processing of changing or withdrawingauthorization
Specific business functions and services will need yourinformation to complete. When you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to your withdrawal of consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect previous personal information processing based on your authorization.
5.2 Complaints and reports
You can make a complaint or report in accordance with ourpublicized system.lf you think that your personal informationrights may be infringed, or find clues that infringe your persona!information rights, you can send an e-mail metagame24dj@gmail.com live to contact us. We will deal with your complaint and report within 30 days after verification.
5.3 Access to privacy policy
You can view the entire content of this privacy policy on the registration page, or log in to your personal account [Me]-[Settings]-[About Us]-[Privacy Policy].
5.4 Informing you of the suspension of operations
If we cease operations, we will promptly stop the collection of your personal information, notify you of the suspension of operations in the form of one-by-one delivery or announcement and delete or anonymize the personal information we hold.
6. Minor Clause
6.1 General terms for minors
a, if you are a minor under the age of 18, before using Bintang and related services, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians.
b.We protect the personal information of minors in accordance with relevant national laws and regulations, and will only collect,share or disclose minors when permitted by law. Parents or other guardians expressly consent, or necessary to protect minors. If we find that we have collected personal information of minors without the prior consent of verifiable parents or other guardians, we will try to delete the relevant information as soon as possible. At the same time, we have established strict rules for the collection and use of juvenile information.
c. lf you are the guardian of a minor, when you have any questions about the personal information of the minor you are guarding, please contact us through the contact information disclosed in this privacy policy.
7. How to delete personal information
Bintang provides the function of deleting the account in the app.You can apply for account deletion by emailing customer serviceor applying for account deletion in the app. You can apply foraccount deletion through lMy-[Settings]-Account and Security][Delete Account] in the Bintang application. it is recommended thatyou confirm that the relevant information and services in theaccount have been properly handled before applying for accountdeletion. We provide a 15-day appeal period, and users canrevoke their account deletion requests in this period. At the end of the appeal period, the account information will be automatically cleared and cannot be recovered. The deleted information may include all device information (including mobilephone model, unique device number etc.),account information.personal data,account assets,member benefits, chat records.etc.
8. Revision and notice of privacy policy
In order to provide you with better services, Bintang and relatedservices will be updated and changed from time to time. We willrevise this privacy policy in due course. These revisions form part of this privacy policy and have the same effect as this privacy policy. You expressly agree that we will not reduce your rights under this privacy policy currently in effect.
9. Contact us
If you have complaints,suggestions, or questions about the protection of personal information, you can send your questions to the e-mail metagame24dj@gmail.com.
We will review the issue as soon as possible and handle it within fifteen working days after verifying your user identity.