WEST TOWER DEFENSE is a software program provided by Seven Eight Nine(HK) Limited.Seven Eight Nine(HK) Limited respects your personal information and data and will do our best to protect the safety and
reliability of your personal information and data.This policy only applies to user information and data collected and stored by the 789 Sikutai application.
We attach great importance to the protection of your personal information and we are committed to maintaining your trust in us. We are committed to taking appropriate security measures to protect your
personal information in accordance with the generally applicable security standards in the industry.However, it is important to note that this policy does not apply to products or services provided to you by other
third parties.If you use products or services provided by third parties, please pay attention to the user agreement and privacy policy of the third party's products or services.
Before using our products and services, you must carefully read and fully understand this policy.
1.When you use the Products and Services, we recommend that you log in with your Facebook account to fully use all the functions of the Products and Services.After you agree to this Privacy Policy, you can use
this App.If you log in as a visitor, you may not be able to enjoy other product features and/or services.
2.In order to protect your account, network, operation and system security, prevent phishing site fraud and Trojan virus, we may collect your equipment information during your use of the product.Include
non-modifiable unique device identification (such as IMEI number, Android ID, IDFA, GUID, OpenUDID, SIM card IMSI information), hardware serial number, and MAC address.
3.In order to realize the following product functions and/or services, we may need to collect the corresponding personal information from you. If you refuse to provide such information, you will not be able to
use such specific services, but your normal use of the basic product functions and services will not be affected.
1)Customer service.When you file a complaint, make an inquiry or appeal, in order to contact you or help you solve the problem, we may require you to provide your name, mobile phone number, email and
other valid contact information.If you refuse to provide the above information, we may not be able to timely feedback the relevant processing results.
2)Personalized display service.In order to facilitate you better manage your preferences, get easier access to experience, we will based on the collected information, the user preferences, habits, location, operating
habits, portrait equipment information analysis of the characteristics and user groups, to help you get more interested in your community content, or the tool material and presents on the AD content
recommendation conforms to the content of your needs,In order to reduce your vast amount of Internet content screening time.To do this, we need to collect information including your device ID number,
language time zone, browser model of using the product, your application list information and browsing history.
3)We may also collect your network operator and type, network type and WiFi name to help you save network traffic in the process of advertising push.
4)Maintain product safety and troubleshoot timely.In order to maintain the normal operation of our services, protect the security of your account, troubleshoot product faults, and improve and optimize our
services, we will collect your EXIF data, IMEI, device model information, login IP address and operation log information.Such information is the information that must be collected to provide the service and is then
de-identified and not used to identify any particular user.
5)Ensure account security.We may require you to provide valid identity information to ensure the security of the above operations when you change your password, verify security, appeal or operate in an
abnormal manner.
6)We may indirectly obtain your personal information from third parties.
a)When you log in with Facebook, you may choose to authorize WEST TOWER DEFENSE to read and obtain the public information (including nickname and avatar) that you have registered, published and
recorded on the third-party platform in accordance with relevant laws and regulations.
b)WEST TOWER DEFENSE requires your authorization to obtain the above information from a third party in order to remember your login identity as a WEST TOWER DEFENSE user in order to provide you with
better products and/or services.We will only collect and use your personal information within the scope of your authorized consent.After you register or log in with your third-party account, your third-party
account will be bound to your WEST TOWER DEFENSE account.
c)Only when you use the wallet functionality provided by a third party, we may be from a third party to get your phone number, credit, payment amount, loan success status, overdue status, to be able to timely
notify to you to apply for approval to borrow in your application and development on loan after a successful order status, repayment plan, and demand that remind payment information to you.
7)If you believe that your relevant rights have been infringed, you can lodge a complaint or report according to our infringement complaint process and through our contact information published to the
public.In this process, we will ask you to provide valid personal identity information to verify the authenticity of complaints and reports.At the same time, if you apply to remove the abnormal status of your account,
we may also ask you to provide valid identity information for verification.This is personal sensitive information, we will take strict confidentiality measures, will not share with the third party.
8)Please understand, we provide you with the functions and services are constantly updated and development of the, if we want to use your personal information for other USES, this policy does not contain or
based on particular purpose will collect information for other purposes, we will be in a reasonable way (such as page prompts, interactive process, site, etc.) to inform you, and again ask for your approval before
use.
4.To ensure the normal operation of the Website, to help you have an easier access experience, and to recommend information that may be of interest to you, we will store small data files called Cookies on your
computer or mobile device.Cookies typically contain an identifier, a site name, and some numbers and characters.With Cookie, the website can store your preferences and other data, so as to help you avoid the
tedious task of filling in personal information repeatedly, entering the history of search content;At the same time, we may also use the above technologies to recommend, display and push the content you are
interested in.You can manage or delete cookies according to your preferences, or you can erase all cookies stored on your computer.For more information, see AboutCookies.org.We do not use cookies for any
purpose other than the purposes described in this Policy.Most web browsers have the ability to block cookies, you can use the browser Settings option to remove all cookies stored on your computer, but if you
do so, you may need to personally change the user Settings every time you visit our site.
5.Content related to the sharing, transfer and public disclosure of your personal information:
1)Share
We will not share your personal information with any company, organization, or individual, except in the following circumstances:
a)Sharing with express consent: We may share your personal information with other parties after obtaining your express consent.
b)Sharing with express consent: We may share your personal information with other parties after obtaining your express consent.
c)To the extent required or permitted by law, it is necessary to provide your personal information to third parties in order to protect the interests, property or safety of WEST TOWER DEFENSE and its users or
the general public from damage.
2)Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
a)We will transfer your personal information to other parties with your express consent;
b)Involved in mergers, acquisitions or bankruptcy liquidation, such as involving personal information transfer, we will be in demand new hold your personal information companies, organizations such as the
main body, continue to accept the privacy policy constraints, if the policy agreed by the personal information collection, handling, use change, such as the purpose, we will ask the company, organization, such as
the main body to ask for a grant to you.
3)Public disclosure
We will only collect or publicly disclose your Personal Information if:
a)With your express consent;
b)We may disclose your personal information based on the mandatory requirements of laws and regulations, judicial authorities or administrative authorities.
4)Exceptions to the collection, sharing, transfer, or public disclosure of personal information without authorization.
In accordance with relevant laws and regulations, we may collect, share, transfer or publicly disclose your Personal Information without your authorized consent under the following circumstances.
A. Directly related to national security, national defense security and other national interests;
B. Those directly related to public safety, public health, public knowledge and other major public interests;
C. Those directly related to criminal investigation, prosecution, trial and execution of judgment;
D. For the purpose of safeguarding your or other personal life, property, reputation and other important legitimate rights and interests, but it is difficult to get my consent;
E. Necessary for the execution and performance of the Contract as required by you;
F. Those necessary to maintain the safe and stable operation of the products or services provided, such as finding and dealing with faults of the products or services;
G. It is necessary to carry out statistics or academic research in the public interest, and when the results of academic research or description are provided to the outside, the personal information contained in
the results is de-identified;
H. Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
I. Other circumstances provided by laws and regulations.
6. WEST TOWER DEFENSE will do its best to protect your personal information.
1)We have used industry-standard security measures to protect your personal information and prevent unauthorized access, public disclosure, use, modification, damage or loss of data.We will take all reasonably
practicable steps to protect your personal information.For example, data exchanged between your browser and the Service is protected by SSL encryption;We provide HTTPS secure access to the accompanying
Web services provided by the product;We will use encryption to ensure the confidentiality of the data;We will use trusted protection mechanisms to protect our data from malicious attacks;We will deploy access
control mechanisms to ensure that only authorized personnel have access to personal information;And we will organize security and privacy protection training courses to enhance employees' awareness of the
importance of protecting personal information.
2)We will take all reasonably practicable steps to ensure that no extranical personal information is collected.We are committed to keeping your personal information stored at all times for the period required by
law or reasonably necessary to realize product features and services.Personal information beyond the deadline will be deleted or anonymized immediately.
3)The Internet is not a completely secure environment, and email, instant messaging, and communication with other users are not encrypted, and we strongly recommend that you do not send personal
information through such means.Please use a complex password to help us keep your account secure.
4)The Internet environment is not 100 percent secure and we will do our best to ensure or warrant the security of any information you send us.
5)In the unfortunate occurrence of personal information security incident, we will in accordance with the requirements of laws and regulations to inform you in a timely manner: the basic situation and possible
impact of the security incident, we have taken or will take measures to deal with, you can prevent and reduce the risk of suggestions, remedial measures for you, etc..We will timely inform you of the relevant
situation of the event through email, letter, phone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to release the
announcement.At the same time, we will also in accordance with the requirements of the regulatory authorities, the initiative to report the disposal of personal information security incidents.
7.Your rights
In accordance with relevant laws, regulations and standards, we guarantee that you exercise the following rights over your personal information:
1) You may request us to delete your personal information under the following circumstances:
A. If we deal with personal information in violation of laws and regulations;
B. If we collect and use your Personal Information without obtaining your consent;
C. If we process our personal information in violation of our agreement with you;
D. If you no longer use our Products or Services;
E. If we terminate the Services and Operations.
Once the above deletion request is responded, we will try our best to notify the subject of your personal information to delete the relevant information in a timely manner, unless otherwise stipulated by laws and
regulations, or these subject have obtained your independent authorization.When you delete information from our services, we may not delete the corresponding information from the backup system immediately.
We will delete such information or anonymize it during the backup update.
2)Withdraw your authorization
If you wish to revoke your consent to our collection, use and disclosure of your other personal information or if you wish us to correct, update or delete your personal information, you may contact us through the
contact information in this Policy.We will process your request and cease the collection, use and disclosure of your personal information within a reasonable period of time upon receipt of your email.
However, please understand and agree that, when you withdraw some authorization, the relevant product functions will become unavailable, and we will be unable to continue to provide you with the specific
functions and/or services corresponding to the withdrawal of the authorization, and your decision to withdraw the authorization will not affect the personal information processing previously carried out based on
your authorization.
3)Response to your claim
To protect your security, you may be required to provide a written request or otherwise prove your identity when you make these claims.We will process your request after verifying your identity.Normally, we will
reply within [15] days.For your reasonable request, we do not charge in principle, but for repeated, beyond the reasonable limit of the request, we will charge a certain fee as appropriate.We may reject requests that
are not directly related to your identity, that are unjustifiable, that require too much technology (for example, require the development of new systems or radically change existing practices), that pose a risk to the
legitimate interests of others, or that are unrealistic.
In accordance with the requirements of laws and regulations, we will not be able to respond to your request under the following circumstances:
1) Related to national security and national defense security;
2) Those related to public safety, public health and major public interests;
3) Those related to criminal investigation, prosecution, trial and execution of judgment;
4) There is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights;
5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
6) Involving commercial secrets.
8. Personal information related to minors
1). We pay special attention to the protection of minors' personal information.If you are a minor under the age of 14, you must read this Policy with your guardian before using our products and/or services, and
ensure that you have obtained the express consent of your guardian before using our services and providing us with your personal information.
2). In the case of using our products or services to collect personal information of minors with the consent of the guardian, we will only use, share, transfer or disclose such information when permitted by laws
and regulations, with the express consent of the guardian or when it is necessary to protect minors.
3). If your guardian does not agree with your use of our services or provide personal information to us in accordance with this policy, please immediately terminate your use of our services and promptly notify us.
4). If you have any questions about the use of our products/services by minors under your supervision or the user information provided to us, please contact us in time.
9.Because we provide products or services to users through our worldwide resources and servers, this means that, with your authorized consent, your personal information may be transferred to, or accessed from,
the jurisdiction outside the country/region in which you use products or services.Such jurisdictions may or may not have different data protection laws.In such cases, we will ensure that your personal information is
adequately and equally protected within the People's Republic of China.For example, we may request your consent to transfer your personal information across borders, or implement security measures such as data
de-identification prior to cross-border data transfer.
10.his Privacy Policy may be subject to timely changes based on business adjustments, changes in laws and regulations or policies.Without your express consent, we will not diminish your rights under this Privacy
Policy.We will post any changes we make to this policy on a dedicated page.For major changes, we will notify you in the product or service through pop-up, push, etc.If you do not agree to the revised Privacy Policy,
you have the right and should immediately stop using our products and/or services.If you continue to use our products and/or services, you will be deemed to have accepted our modifications to the terms of this
Policy.
Significant changes referred to in this Policy include, but are not limited to:
1) The purpose, type and usage of personal information we process have changed;
2) Your rights to participate in the processing of personal information and the way they are exercised change;
3) When the personal information security impact assessment report indicates that there is a risk.
11. Contact information of the company
If you have any questions, comments, suggestions or complaints about the content of this policy, you can contact us through the following ways: Please send an email to shufa@uctool.com.
12. Relevant description of authority:
We will apply to you for the necessary permissions to use the functions of the specific product when you use the functions of the specific product. If you do not agree to open the permissions, please click "Do
not allow". Refusing the permission application will only affect your use of the functions of the specific product.Here we list the types of permissions that the product might collect and the purposes for which they
might be used.
Storage authority (write) write to external storage: used for the user to finish the picture, video to save to the local file preservation function.
Storage permissions (read) read external storage: read local pictures, videos and other files, used to help users with pictures, video beautification.
This statement is effective as of the date of update.
Last revision date: May 08, 2024
Seven Eight Nine(HK) Limited