WEST TOWER DEFENSE is a software program provided by Seven Eight Nine(HK) Limited.Seven Eight Nine(HK) Limited respects your personal information and data and will do our best to protect the safety and

 reliability of your personal information and data.This policy only applies to user information and data collected and stored by the 789 Sikutai application.

    We attach great importance to the protection of your personal information and we are committed to maintaining your trust in us. We are committed to taking appropriate security measures to protect your 

personal information in accordance with the generally applicable security standards in the industry.However, it is important to note that this policy does not apply to products or services provided to you by other

 third parties.If you use products or services provided by third parties, please pay attention to the user agreement and privacy policy of the third party's products or services.

    Before using our products and services, you must carefully read and fully understand this policy.

    1.When you use the Products and Services, we recommend that you log in with your Facebook account to fully use all the functions of the Products and Services.After you agree to this Privacy Policy, you can use 

this App.If you log in as a visitor, you may not be able to enjoy other product features and/or services.

    2.In order to protect your account, network, operation and system security, prevent phishing site fraud and Trojan virus, we may collect your equipment information during your use of the product.Include 

non-modifiable unique device identification (such as IMEI number, Android ID, IDFA, GUID, OpenUDID, SIM card IMSI information), hardware serial number, and MAC address.

    3.In order to realize the following product functions and/or services, we may need to collect the corresponding personal information from you. If you refuse to provide such information, you will not be able to 

use such specific services, but your normal use of the basic product functions and services will not be affected.

    1)Customer service.When you file a complaint, make an inquiry or appeal, in order to contact you or help you solve the problem, we may require you to provide your name, mobile phone number, email and 

other valid contact information.If you refuse to provide the above information, we may not be able to timely feedback the relevant processing results.

    2)Personalized display service.In order to facilitate you better manage your preferences, get easier access to experience, we will based on the collected information, the user preferences, habits, location, operating 

habits, portrait equipment information analysis of the characteristics and user groups, to help you get more interested in your community content, or the tool material and presents on the AD content 

recommendation conforms to the content of your needs,In order to reduce your vast amount of Internet content screening time.To do this, we need to collect information including your device ID number, 

language time zone, browser model of using the product, your application list information and browsing history.

    3)We may also collect your network operator and type, network type and WiFi name to help you save network traffic in the process of advertising push.


    4)Maintain product safety and troubleshoot timely.In order to maintain the normal operation of our services, protect the security of your account, troubleshoot product faults, and improve and optimize our 

services, we will collect your EXIF data, IMEI, device model information, login IP address and operation log information.Such information is the information that must be collected to provide the service and is then 

de-identified and not used to identify any particular user.

    5)Ensure account security.We may require you to provide valid identity information to ensure the security of the above operations when you change your password, verify security, appeal or operate in an 

abnormal manner.

    6)We may indirectly obtain your personal information from third parties.

    a)When you log in with Facebook, you may choose to authorize WEST TOWER DEFENSE to read and obtain the public information (including nickname and avatar) that you have registered, published and 

recorded on the third-party platform in accordance with relevant laws and regulations.

    b)WEST TOWER DEFENSE requires your authorization to obtain the above information from a third party in order to remember your login identity as a WEST TOWER DEFENSE user in order to provide you with 

better products and/or services.We will only collect and use your personal information within the scope of your authorized consent.After you register or log in with your third-party account, your third-party 

account will be bound to your WEST TOWER DEFENSE account.

    c)Only when you use the wallet functionality provided by a third party, we may be from a third party to get your phone number, credit, payment amount, loan success status, overdue status, to be able to timely 

notify to you to apply for approval to borrow in your application and development on loan after a successful order status, repayment plan, and demand that remind payment information to you.

    7)If you believe that your relevant rights have been infringed, you can lodge a complaint or report according to our infringement complaint process and through our contact information published to the 

public.In this process, we will ask you to provide valid personal identity information to verify the authenticity of complaints and reports.At the same time, if you apply to remove the abnormal status of your account,

 we may also ask you to provide valid identity information for verification.This is personal sensitive information, we will take strict confidentiality measures, will not share with the third party.

    8)Please understand, we provide you with the functions and services are constantly updated and development of the, if we want to use your personal information for other USES, this policy does not contain or

 based on particular purpose will collect information for other purposes, we will be in a reasonable way (such as page prompts, interactive process, site, etc.) to inform you, and again ask for your approval before 

use.

    4.To ensure the normal operation of the Website, to help you have an easier access experience, and to recommend information that may be of interest to you, we will store small data files called Cookies on your

 computer or mobile device.Cookies typically contain an identifier, a site name, and some numbers and characters.With Cookie, the website can store your preferences and other data, so as to help you avoid the 

tedious task of filling in personal information repeatedly, entering the history of search content;At the same time, we may also use the above technologies to recommend, display and push the content you are 

interested in.You can manage or delete cookies according to your preferences, or you can erase all cookies stored on your computer.For more information, see AboutCookies.org.We do not use cookies for any 

purpose other than the purposes described in this Policy.Most web browsers have the ability to block cookies, you can use the browser Settings option to remove all cookies stored on your computer, but if you 

do so, you may need to personally change the user Settings every time you visit our site.

    5.Content related to the sharing, transfer and public disclosure of your personal information:

    1)Share

   We will not share your personal information with any company, organization, or individual, except in the following circumstances:

    a)Sharing with express consent: We may share your personal information with other parties after obtaining your express consent.

    b)Sharing with express consent: We may share your personal information with other parties after obtaining your express consent.

    c)To the extent required or permitted by law, it is necessary to provide your personal information to third parties in order to protect the interests, property or safety of WEST TOWER DEFENSE and its users or 

the general public from damage.

    2)Transfer

    We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

    a)We will transfer your personal information to other parties with your express consent;

    b)Involved in mergers, acquisitions or bankruptcy liquidation, such as involving personal information transfer, we will be in demand new hold your personal information companies, organizations such as the 

main body, continue to accept the privacy policy constraints, if the policy agreed by the personal information collection, handling, use change, such as the purpose, we will ask the company, organization, such as 

the main body to ask for a grant to you.

    3)Public disclosure

    We will only collect or publicly disclose your Personal Information if:

    a)With your express consent;

    b)We may disclose your personal information based on the mandatory requirements of laws and regulations, judicial authorities or administrative authorities.

    4)Exceptions to the collection, sharing, transfer, or public disclosure of personal information without authorization.

    In accordance with relevant laws and regulations, we may collect, share, transfer or publicly disclose your Personal Information without your authorized consent under the following circumstances.

    A. Directly related to national security, national defense security and other national interests;

    B. Those directly related to public safety, public health, public knowledge and other major public interests;

    C. Those directly related to criminal investigation, prosecution, trial and execution of judgment;

    D. For the purpose of safeguarding your or other personal life, property, reputation and other important legitimate rights and interests, but it is difficult to get my consent;

    E. Necessary for the execution and performance of the Contract as required by you;

    F. Those necessary to maintain the safe and stable operation of the products or services provided, such as finding and dealing with faults of the products or services;

    G. It is necessary to carry out statistics or academic research in the public interest, and when the results of academic research or description are provided to the outside, the personal information contained in

 the results is de-identified;

    H. Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

    I. Other circumstances provided by laws and regulations.

    6. WEST TOWER DEFENSE will do its best to protect your personal information.

    1)We have used industry-standard security measures to protect your personal information and prevent unauthorized access, public disclosure, use, modification, damage or loss of data.We will take all reasonably

 practicable steps to protect your personal information.For example, data exchanged between your browser and the Service is protected by SSL encryption;We provide HTTPS secure access to the accompanying 

Web services provided by the product;We will use encryption to ensure the confidentiality of the data;We will use trusted protection mechanisms to protect our data from malicious attacks;We will deploy access 

control mechanisms to ensure that only authorized personnel have access to personal information;And we will organize security and privacy protection training courses to enhance employees' awareness of the 

importance of protecting personal information.

    2)We will take all reasonably practicable steps to ensure that no extranical personal information is collected.We are committed to keeping your personal information stored at all times for the period required by 

law or reasonably necessary to realize product features and services.Personal information beyond the deadline will be deleted or anonymized immediately.

    3)The Internet is not a completely secure environment, and email, instant messaging, and communication with other users are not encrypted, and we strongly recommend that you do not send personal 

information through such means.Please use a complex password to help us keep your account secure.

    4)The Internet environment is not 100 percent secure and we will do our best to ensure or warrant the security of any information you send us.

    5)In the unfortunate occurrence of personal information security incident, we will in accordance with the requirements of laws and regulations to inform you in a timely manner: the basic situation and possible 

impact of the security incident, we have taken or will take measures to deal with, you can prevent and reduce the risk of suggestions, remedial measures for you, etc..We will timely inform you of the relevant 

situation of the event through email, letter, phone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to release the 

announcement.At the same time, we will also in accordance with the requirements of the regulatory authorities, the initiative to report the disposal of personal information security incidents.

    7.Your rights

    In accordance with relevant laws, regulations and standards, we guarantee that you exercise the following rights over your personal information:

    1) You may request us to delete your personal information under the following circumstances:

    A. If we deal with personal information in violation of laws and regulations;

    B. If we collect and use your Personal Information without obtaining your consent;

    C. If we process our personal information in violation of our agreement with you;

    D. If you no longer use our Products or Services;

    E. If we terminate the Services and Operations.

    Once the above deletion request is responded, we will try our best to notify the subject of your personal information to delete the relevant information in a timely manner, unless otherwise stipulated by laws and 

regulations, or these subject have obtained your independent authorization.When you delete information from our services, we may not delete the corresponding information from the backup system immediately. 

We will delete such information or anonymize it during the backup update.

    2)Withdraw your authorization

    If you wish to revoke your consent to our collection, use and disclosure of your other personal information or if you wish us to correct, update or delete your personal information, you may contact us through the

 contact information in this Policy.We will process your request and cease the collection, use and disclosure of your personal information within a reasonable period of time upon receipt of your email.

    However, please understand and agree that, when you withdraw some authorization, the relevant product functions will become unavailable, and we will be unable to continue to provide you with the specific 

functions and/or services corresponding to the withdrawal of the authorization, and your decision to withdraw the authorization will not affect the personal information processing previously carried out based on 

your authorization.

    3)Response to your claim

    To protect your security, you may be required to provide a written request or otherwise prove your identity when you make these claims.We will process your request after verifying your identity.Normally, we will 

reply within [15] days.For your reasonable request, we do not charge in principle, but for repeated, beyond the reasonable limit of the request, we will charge a certain fee as appropriate.We may reject requests that 

are not directly related to your identity, that are unjustifiable, that require too much technology (for example, require the development of new systems or radically change existing practices), that pose a risk to the 

legitimate interests of others, or that are unrealistic.

    In accordance with the requirements of laws and regulations, we will not be able to respond to your request under the following circumstances:

    1) Related to national security and national defense security;

    2) Those related to public safety, public health and major public interests;

    3) Those related to criminal investigation, prosecution, trial and execution of judgment;

    4) There is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights;

    5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

    6) Involving commercial secrets.

    8. Personal information related to minors

    1). We pay special attention to the protection of minors' personal information.If you are a minor under the age of 14, you must read this Policy with your guardian before using our products and/or services, and

 ensure that you have obtained the express consent of your guardian before using our services and providing us with your personal information.

    2). In the case of using our products or services to collect personal information of minors with the consent of the guardian, we will only use, share, transfer or disclose such information when permitted by laws

 and regulations, with the express consent of the guardian or when it is necessary to protect minors.

    3). If your guardian does not agree with your use of our services or provide personal information to us in accordance with this policy, please immediately terminate your use of our services and promptly notify us.

    4). If you have any questions about the use of our products/services by minors under your supervision or the user information provided to us, please contact us in time.

    9.Because we provide products or services to users through our worldwide resources and servers, this means that, with your authorized consent, your personal information may be transferred to, or accessed from,

 the jurisdiction outside the country/region in which you use products or services.Such jurisdictions may or may not have different data protection laws.In such cases, we will ensure that your personal information is 

adequately and equally protected within the People's Republic of China.For example, we may request your consent to transfer your personal information across borders, or implement security measures such as data 

de-identification prior to cross-border data transfer.

    10.his Privacy Policy may be subject to timely changes based on business adjustments, changes in laws and regulations or policies.Without your express consent, we will not diminish your rights under this Privacy 

Policy.We will post any changes we make to this policy on a dedicated page.For major changes, we will notify you in the product or service through pop-up, push, etc.If you do not agree to the revised Privacy Policy, 

you have the right and should immediately stop using our products and/or services.If you continue to use our products and/or services, you will be deemed to have accepted our modifications to the terms of this

 Policy.

    Significant changes referred to in this Policy include, but are not limited to:

    1) The purpose, type and usage of personal information we process have changed;

    2) Your rights to participate in the processing of personal information and the way they are exercised change;

    3) When the personal information security impact assessment report indicates that there is a risk.

    11. Contact information of the company

    If you have any questions, comments, suggestions or complaints about the content of this policy, you can contact us through the following ways: Please send an email to shufa@uctool.com.

    12. Relevant description of authority:

    We will apply to you for the necessary permissions to use the functions of the specific product when you use the functions of the specific product. If you do not agree to open the permissions, please click "Do 

not allow". Refusing the permission application will only affect your use of the functions of the specific product.Here we list the types of permissions that the product might collect and the purposes for which they 

might be used.

    Storage authority (write) write to external storage: used for the user to finish the picture, video to save to the local file preservation function.

    Storage permissions (read) read external storage: read local pictures, videos and other files, used to help users with pictures, video beautification.




    This statement is effective as of the date of update.

    Last revision date: May 08, 2024

    Seven Eight Nine(HK) Limited