I. Scope of Application of the Agreement
This Agreement applies to all users who obtain services through this website (including iOS/Android clients, H5 pages and other mobile portals), including official users who have completed mobile phone number/email registration, users who quickly log in with third-party accounts, and browsing visitors who are not logged in.
Minors must read and agree to this Agreement in the presence of their guardians. For minors under the age of 18, the system will verify the guardian's identity through the real-name authentication interface. The guardian's selected consent will be deemed as a legally binding confirmation of the user.
II. Collection and Use of Personal Information
Collection Scope:
Basic Information: Account (including username/mobile number/email address), contact information (delivery address/emergency contact), device information (such as IP address, MAC address, IMEI, browser User-Agent, and terminal characteristics such as screen resolution).
Optional information: data and content actively submitted by users through the system, occupation/income range filled in when participating in the questionnaire, and other extended information.
Purpose of Use:
Service optimization (e.g., adapting page layout to device resolution), security verification (analyzing unusual logins through IP geolocation), personalized content push (recommending products based on interest tags), and compliance statistics for government regulations (e.g., annual data reporting).
This information will not be used for commercial promotion (e.g., telemarketing) or sold to third-party data brokers without the user's separate authorization. When data sharing is necessary (e.g., in logistics and delivery scenarios), a third-party data confidentiality agreement will be signed, clearly defining the boundaries of use.
III. User Rights and Safeguards
Rights Disclaimer:
Users can directly modify fields other than real-name authentication information on designated pages through the Member Center or submit a deletion request through the system (this must be completed within 15 business days after identity verification).
Refusing to provide non-essential information (such as real-name information and contact information) will disable corresponding features (for example, only displaying a list of general services on the homepage), but will not affect access to core services.
Security Protection:
Sensitive data is stored using AES-256 encryption technology and hosted on ISO 27001-certified cloud servers. Quarterly penetration testing and security audits are conducted by third-party organizations (such as SGS).
In the event of a data breach, in addition to notifying users via their registered email address or SMS within 72 hours, we will also report to provincial cybersecurity authorities in accordance with the Cybersecurity Law. Free identity monitoring services (such as credit inquiry alerts) are also provided.
IV. Third-party liability and disclaimer
When integrating a third-party SDK, the scope of data collection will be publicly displayed on the relevant page, and a pop-up window will be displayed before the first call to obtain explicit user consent.
For data loss caused by force majeure (such as cross-border data transmission interruptions caused by national firewall upgrades, targeted attacks by APT groups) or user-related reasons (such as shared accounts and passwords), the platform assumes no liability for compensation, provided it has fulfilled its basic security obligations. However, the platform may assist users with data recovery (e.g., providing operation logs from the past 30 days).
V. Agreement Updates and Dispute Resolution
After the revised terms are updated, they will be posted on the website's announcement board for 15 days, and a notification will be sent to the user via in-site message (user notification permission is required). If users continue to log in or complete any interactive operations (such as clicking on a page) after the new version takes effect, they will be deemed to have accepted the new terms.
Disputes will be resolved primarily through negotiation. If negotiation fails, litigation may be filed in the local Internet Court. The normal secure storage of collected data will not be affected during the litigation period.