Version 4; Updated on March 20, 2024
Effective Date: March 20, 2024

Your personal information security is of utmost importance to us. We have always been committed to providing a safer internet environment for every user. We will collect and use your personal information in accordance with the "People's Republic of China Cybersecurity Law," "Information Security Technology Personal Information Security Specification" (GB/T 35273-2017), as well as other relevant laws, regulations, and technical specifications to assist us in providing you with higher-quality products and/or services. "User Privacy Terms" (hereinafter referred to as "these Terms") represent an upgrade and revision of the previous version of "User Privacy Terms," aimed at presenting in a more transparent manner how we collect and use your personal information, as well as your control over personal information. We promise to strictly keep your personal information and other data confidential and process your personal information strictly in accordance with the content outlined in this policy. We will collect, use, store, share, and transfer your personal information based on your consent and other legal bases for processing personal information.

The personal information covered by this policy includes: Personal basic information (including name and English name, age, grade, gender, personal phone number, email address); personal location information; network identity information (including system account and password, IP address); address book; personal common device information (including hardware model, device MAC address, operating system type, software list, unique device identifiers (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information, and other information describing the basic characteristics of personal common devices).

Table of Contents
A. Collection of User Information
1. User Personal Information
2. User Behavioral Information
3. User Device Information

B. Use of Personal Information
1. Protection and Security Measures for Personal Information
2. Storage of Personal Information
3. Sharing, Transfer, and Public Disclosure of Personal Information
1. Default Authorization for Third-Party Sharing and Transfer
2. Exceptions to Information Sharing, Transfer, and Disclosure
3. Changes and Deletion of Personal Privacy Data
4. Minors' Protection Clause

C. Auto-Startup and Related Startup Instructions

D. Other Notes
1. Linked Websites
2. Changes to Privacy Terms
3. Contact Us

A. Collection of User Information

You are aware of and consent to the fact that when you register for an account on the "iLoveMusic Teacher APP" developed by Shanghai Aipinyou Information Technology Co., Ltd. (hereinafter referred to as "our company") or use the services provided by our company, we will record the relevant personal information you provide, such as your password and phone number. The above personal information forms the basis for you to access the services provided by our company. Additionally, for the purpose of optimizing user experience, our company will obtain other information related to improving our services.

Before using our services, we will guide you to read this policy, and upon your acceptance of this policy, we will collect your relevant personal information. If you do not agree to provide personal information, you will be unable to use all or part of our company's functions and services, participate in certain activities, or receive our notifications.

1. User Personal Information

    • Phone number, email address, third-party account information for account registration and user identification.
    • Your date of birth, gender, nickname, contact information, age, and school-related personal information.
    • Geographic location for improving our products and providing you with better services.
    • Phone contact list for facilitating the addition of friends and students and enhancing app usability.
    • Permission to access the microphone for sending voice messages and completing oral assignments.
    • Permission to access the camera for video recording, including singing and dancing, and for online video classes.
    • Permission to read app data for user-uploaded images.
    • Permission to write to external storage for saving images locally.

2. User Behavioral Information

2.1 When you download and use our mobile application, the app will collect user behavioral information such as usage duration, frequency of use, and commonly used features. These data are used to collect user usage patterns and popular features to help us continuously improve our products and services, making it more convenient for you to use our app.

2.2 User behavioral information will exist and be used as aggregated summary data for user groups, and there will be no association between behavioral information and specific users.

2.3 Cookies

To ensure the proper functioning of the website, we will store small data files called Cookies on your computer or mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. With the help of Cookies, websites can store your preferences and other data.

We or our third-party partners may collect or use your information through cookies and store this information as log data.

We use our own cookies for the following purposes:
(1) Remembering your identity: Cookies help us recognize you as our registered user.
(2) Analyzing your usage of our products and/or services: We can use cookies to understand what activities you perform using our products and/or services and which web pages or products and/or services are most popular with you.

We will not use Cookies for any purposes other than those described in this policy. You can manage or delete Cookies according to your preferences. Most web browsers have features to block Cookies. However, if you do so, you may need to manually change your user settings every time you visit our website.

2.4 You are aware of and agree that in certain specific business scenarios, for the purpose of improving business processing capabilities, reducing costs, or other considerations, we may use third-party SDKs to obtain your relevant information. For example, we may use an exception reporting SDK to obtain your device information and application crash information to promptly follow up and fix online application crash issues. However, without your consent, we will not proactively transmit signed information to third parties.

2.4.1 Getui SDK (including Getui Push, Getui SDK, com.heytap.msp (OPPO Push), com.xiaomi.push (Xiaomi Push), and Zhuoxin ID):
      Purpose of use: Push notifications.
      Purposes of collecting personal information:
        (1) Device information: Device identification code, device platform, device manufacturer used to generate a unique push target ID (CID) and device ID (GID) to ensure the accurate delivery of messages and the accurate recognition of device information. Device brand, model, and system version are used to optimize the effectiveness of channel resources, improve the message delivery rate and stability. In addition, to ensure the uniqueness of CID, improve message push stability and accuracy, storage permission (WRITE_EXTERNAL_STORAGE), and device permission (READ_PHONE_STATE) are required.
        (2) Application list information: We use merge-link technology for technical push, and when multiple app push links are active on one device simultaneously, we randomly merge them into one link to save power and bandwidth for users. Therefore, we need to obtain the application list information. We also provide smart push functionality that recommends push content that better suits your user needs based on this information, reducing the disturbance of useless push messages to your users. You can choose to enable or disable this service, but disabling this service will increase power and bandwidth consumption.
        (3) Network information and location-related information: To maintain the stability of network connections to the maximum extent and establish long connections, we need to understand device network status and changes to achieve stable continuous push services. We provide context-aware push, and location-related information will help us provide refined push in offline scenarios. It can recommend push content that better suits your user needs and reduce the disturbance of useless push messages to your users.
      Types of personal information collected: Device identification code, device platform, device manufacturer, device brand, device model, and system version, storage permission (WRITE_EXTERNAL_STORAGE), and device permission (READ_PHONE_STATE), network information, and location-related information.
      Privacy statements or development guides for third-party SDKs: [Link to Getui SDK Privacy Statement or Development Guide](https://docs.getui.com/privacy/)
	 
2.4.2 Tencent QQ Connect (com.tencent.open)
      Purpose of use: To help users share information to QQ.
      Types of personal information collected: Device information.
      Third-party SDK privacy statement: [Link to QQ Connect SDK Privacy Protection Statement](https://wiki.connect.qq.com/QQ互联SDK隐私保护声明)

2.4.3 Tencent Bugly SDK (com.tencent.bugly)
      Purpose of use: To provide more realistic crash scenario restoration services for developers, troubleshoot crash issues, and help improve app stability.
      Information collected: Phone model, phone brand, Android system version, app information (package name, version, process name), device information (Android_ID), Android system API level, manufacturer system version, CPU architecture type, device root status, disk space usage size, sdcard space usage size, memory space usage size, network type, WiFi_SSID.
      Third-party SDK privacy statement: [Link to Tencent Bugly SDK Privacy Statement](https://privacy.qq.com/document/priview/fbd2c3f898df4c1c869925dd49d57827)

2.4.4 Sina Weibo (com.sina.weibo)
      Purpose of use: To provide third-party login functionality for users via Weibo.
      Types of personal information collected: Device information.
      Third-party SDK privacy statement: [Link to Sina Weibo SDK Privacy Statement](https://weibo.com/signup/v5/privacy?spm=a1zaa.8161610.0.0.4f8776217Wu8R1)

2.4.5 Tencent Open Platform (com.tencent.tauth)
      Purpose of use: To provide third-party login functionality via WeChat for users and help users share information to WeChat.
      Types of personal information collected: Device information.
      Third-party SDK privacy statement: [Link to Tencent Open Platform SDK Privacy Statement](https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy)

3. User Device Information

3.1 To continuously optimize the product experience on your device, our application will collect the following non-personalized information:
    • Operating system and version.
    • Device manufacturer, model, hardware information, and device ID.
    • Screen specifications.

3.2 The above information will exist and be used as aggregated summary data for user groups, and there will be no association between device information and specific users.

B. Use of Personal Information

To provide you with better services or products, we will use your personal information in the following situations:
(1) According to the requirements of relevant laws and regulations.
(2) With your authorization.
(3) In accordance with the provisions of our company's relevant service terms and application license agreements. 

1.1 We will make every reasonable effort to protect the personal information of our users and have a dedicated data security department to safeguard personal information. To prevent unauthorized access, copying, modification, transmission, loss, destruction, processing, or use of user personal information in unexpected and unauthorized circumstances, we have implemented and will continue to take the following measures to protect your personal information:

1. Protection and Security Measures for Personal Information
(1) Our network services employ encryption technologies such as transport layer security protocols and provide browsing services through HTTPS to ensure the security of user data during transmission.
(2) When using personal information, such as for displaying personal information and calculating personal information associations, we use various data desensitization technologies, including content replacement and encryption, to enhance the security of personal information during use.
(3) We establish strict data usage and access control systems and implement strict data access authorization controls to protect personal information and prevent data from being accessed in violation of regulations.

1.2 Other Security Measures for Protecting Personal Information
(1) We manage and regulate the storage and use of personal information through data classification and grading systems, data security management standards, and data security development standards.
(2) We strengthen security awareness and conduct security and privacy protection training courses to enhance employees' understanding of the importance of protecting personal information.

1.3 Notification of Personal Information Security Incidents
(1) In the event of a security incident related to personal information, we will promptly report it to the relevant competent authorities and conduct problem investigation and emergency measures.
(2) We will notify all users to change their passwords through various means such as telephone and SMS to stop data breaches.

Despite the reasonable and effective measures mentioned above and compliance with the standards required by relevant laws and regulations, we cannot guarantee the security of your personal information when it is transmitted through insecure channels. Therefore, users should take proactive measures to ensure the security of personal information, such as regularly changing account passwords and not disclosing personal information such as account passwords to others.

There is always a risk of information leakage in the network environment. In the event of unexpected incidents, force majeure, or other circumstances that lead to the leakage of your information, we will make every effort to control the situation, promptly inform you of the cause of the incident, the security measures we have taken, and the security measures you can take proactively, among other relevant information.

2. Storage of Personal Information

We will adopt appropriate security measures and technical means to store and protect your personal information, in order to prevent loss, misuse, unauthorized access, disclosure, tampering, or destruction. Your personal information is stored on servers located in China with password controls, and access is restricted.

We will store different levels of personal information for different periods, and the storage period will strictly comply with the requirements of laws and regulations. The minimum retention period is no less than six months. We will save your personal information according to the retention period specified in the Cybersecurity Law. After the statutory retention period expires, we will delete your personal information or anonymize it. If you terminate the use of our software and services, we will stop collecting and using your information, except as otherwise required by laws and regulations. If we cease operation, we will stop collecting and using your personal information.

We only allow third parties, such as our employees, who need to know this information to access personal information and require them to fulfill their confidentiality obligations.

3. Sharing, Transfer, and Public Disclosure of Personal Information

We treat your information with the utmost diligence. Unless you have given your prior consent, we will not share or transfer identifiable personal information to third parties. We may share or transfer de-identified personal information, ensuring that the sharing third party cannot re-identify the natural person subject to such information. In specific circumstances, we may share your personal information with third parties, but we will only share the necessary personal information, and the third party will be bound by the purposes stated in this policy. We will require third parties to protect your personal information and strictly comply with relevant laws, regulations, and regulatory requirements. If a third party wishes to change the processing purpose of personal information, we will seek your authorization again.

3.1 Default Authorization for Third-Party Sharing and Transfer

3.1.1 You agree that we may share information with the following two types of third-party partners:
(1) To achieve specific functions, we may share your information with business partners. Some of our services will be provided by authorized business partners. We may share some of your personal information with these partners to provide better customer service and user experience. We only share this information to achieve the purposes stated in this policy. For example, when using third-party AI recognition, audio and video recognition, and audio and video optimization services, we may provide the corresponding information, but only the necessary information, and remove user personal identification.
(2) When you register through a specific training institution/school (e.g., online or offline promotion of that institution/school), you agree that we may share your information with that institution/school. Your information will only be shared with the institution you registered with and will not be transferred to other training institutions/schools. For example, displaying class students' completion of exercises to teachers or displaying students' learning progress to institutions.

3.1.2 For companies, organizations, and individuals with whom we share personal information, we will investigate their data security environments, sign confidentiality agreements with them, and require them to handle personal information in accordance

 with our instructions, this privacy policy, and any other relevant confidentiality and security measures.

3.1.3 As our business continues to grow, we and our affiliates may engage in mergers, acquisitions, asset transfers, or similar transactions, and your personal information may be transferred as part of such transactions. We will notify you before the transfer, and we will continue to protect your personal information in accordance with the standards required by laws and regulations and no lower than this privacy policy.

3.2 Exceptions to Information Sharing, Transfer, and Disclosure

Without your explicit authorization, we will not share, transfer, or publicly disclose your personal information to any company, organization, or individual other than the company and its affiliates, except in the following circumstances:

(1) With your prior explicit consent.
(2) If you voluntarily share, transfer, or make your information public to third parties.
(3) Directly related to national security, national defense, public safety, public health, or public interests.
(4) Disclosures or provisions required by applicable laws, regulations, legal procedures, or mandatory administrative or judicial requirements, or when personal information provided is directly related to criminal investigations, prosecutions, trials, and execution of judgments. In such cases, we will provide or disclose your personal information in accordance with the types and methods of personal information required to be provided or disclosed. In accordance with legal and regulatory requirements, when we receive requests for the above-mentioned disclosure of information, we will require the requesting party to provide corresponding legal documents, such as subpoenas or investigation letters. We will carefully review all requests to ensure that they have a legal basis and that the data requested is limited to what administrative and judicial departments have the legal right to obtain for specific investigation purposes.
(5) When necessary to safeguard the legitimate rights and interests of our other users, affiliated companies, controlling companies, and to ensure the safe and stable operation of products or services, such as finding, preventing, and handling fraudulent activities and reducing credit risks. However, this does not include disclosing or providing personal information for profit purposes in violation of the commitments made in this policy.
(6) When the company files a lawsuit or arbitration to safeguard its legitimate rights and interests.
(7) In cases of mergers, divisions, acquisitions, asset transfers, or similar transactions, where personal information may be transferred, the company will require the new entity holding your personal information to continue to be bound by this privacy policy. Otherwise, the company has the right to request the new entity or organization to re-obtain your authorized consent.
(8) Personal information collected from publicly disclosed information sources, such as lawful news reports and government information disclosures.
(9) For academic research purposes or for academic research institutions, it is necessary for public interests, and when providing academic research or description results to the outside world, personal information contained in the results is de-identified.
(10) Other circumstances as required by laws and regulations.

3.3 Changes and Deletion of Personal Privacy Data

We understand your concerns about personal information and strive to ensure that you have the ability to access, correct, delete, and withdraw authorization for your personal information, allowing you to protect your privacy and security to the fullest extent possible. Your rights include:

3.3.1 You have the right to access your personal information.

You can access relevant personal information you have provided to us in accordance with the relevant instructions (or settings) for the products and services we provide. This includes:
(1) Account Information: You can log in to your personal center through relevant product pages at any time to access your account's personal information, including: avatar, nickname, UID, gender, and more.
(2) Usage Information: You can review your usage history, order information, address information, billing records, and more through relevant product pages.
(3) Other Information: If you encounter operational issues during the access process and need access to other personal information that was not mentioned above, you can contact us through the methods provided in this privacy policy.

3.3.2 You have the right to correct/modify your personal information.

If you find errors, incompleteness, or updates in the personal information you provided to us, you can correct or modify your personal information through the relevant functions on our products and/or services.
(1) For certain personal information, we provide operation settings on relevant product pages for direct correction/modification. For example, "avatar/gender/birthdate."
(2) If you encounter difficulties while exercising the rights mentioned above or if you cannot be provided with online self-correction/modification services at present, and after verifying your identity, and the correction/modification will not affect the objectivity and accuracy of the information, you have the right to request correction or modification of incorrect or incomplete information, especially in cases of data errors, by submitting your correction/modification request through feedback and reporting measures published by us, subject to legal and regulatory provisions. However, for security and identification reasons, you may not be able to modify certain initial registration information provided during registration.

3.3.3 You have the right to delete your personal information.

(1) For certain personal information, you can also delete the information you have provided through the relevant functions on our products and/or services. Once you delete it, we will delete this type of information unless otherwise required by laws and regulations.
(2) When the following situations occur, you can directly request us to delete your personal information, except for cases where anonymization or legal and regulatory provisions apply:
(i) When our actions in processing personal information violate laws and regulations.
(ii) When we collect and use your personal information without obtaining your consent.
(iii) When our actions in processing personal information violate our agreement with you.
(iv) When we cease operations and services.

3.3.4 You have the right to withdraw your authorization for personal information.

As mentioned earlier, some features of the products and services we provide require obtaining relevant permissions from your device (including but not limited to the camera, microphone, etc., subject to the actual functions obtained by the product). You can withdraw (or stop) authorization for these permissions at any time after authorization. For example, you can close your authorization for your phone's photo album through "Settings-Privacy-Photos" on your iOS device. You can also permanently withdraw all authorization for us to collect your personal information by logging out of your account. You should understand that when you withdraw authorization, we will not be able to continue providing you with the specific functions and/or services associated with that withdrawal of authorization. However, your decision to withdraw authorization will not affect the previous processing of personal information based on your authorization.

Authorization Use Instructions:

Camera Permission: Used for uploading avatars and pictures
Recording Permission: Used for publishing voice content
Read Application Data: Allows users to select pictures for upload
Write to External Storage: Allows users to save pictures locally

3.3.5 You have the right to cancel your account.

You can cancel your account by following the path in the app: "Mine" -> "My Settings" -> "Security Center" -> "Cancel Account". The cancellation will take effect immediately. After you cancel your account, you will no longer be able to log in or use our products and services with that account. Any remaining benefits and future overdue benefits under your account during its use by our company and its affiliated products and services will be cleared. The content, information, data, records, etc., under your account will be deleted or anonymized.

4. Protection of Minors

In e-commerce activities, we assume that you possess the corresponding legal capacity. If you are a minor, we request that you carefully read this privacy policy with your parents or legal guardians and use our services or provide information to us only with their prior consent.

For cases where we collect personal information of minors with the consent of parents or legal guardians to use our products or services, we will use, share, transfer, or disclose this information only in accordance with applicable laws and regulations, with the explicit consent of parents or legal guardians, or when necessary to protect the rights and interests of minors.

4.1 Minors Without Guardian Consent Cannot Create an Account:

4.2 We will only collect and process the personal information of minors with the prior authorization and consent of parents or legal guardians, and we will strictly adhere to legal requirements when processing this personal information, with the consent of parents or legal guardians or when it is necessary to protect the interests of minors.

4.3 In general, we will not collect personal information that is unrelated to the functions and scenarios described in this privacy policy. If, due to business needs, it becomes necessary to collect and process information beyond the specified purposes, we will inform the parents or legal guardians of minors and obtain their consent accordingly.

4.4 We will strictly define information access permissions for different functions to control the scope of personal information accessible by minors.

4.5 We will ensure the security of personal information of minors in accordance with relevant domestic personal information laws and standards, the storage requirements presented in this privacy policy, and protective measures.

C. Self-starting and Associated Start Instructions

To ensure that this application can receive broadcast messages for push notifications while it is closed or running in the background, the application requires the ability to use (self-starting). This will involve sending periodic broadcasts through the system to wake up the application for self-starting or associated start behaviors, which are necessary to achieve specific functions and services.

D. Other Notes

Linking to Websites:

Our mobile application may provide links to other third-party websites. We are not responsible for the privacy policies or content of those websites. We recommend that you review the privacy policies of those websites.

Changes to Privacy Terms:

In order to provide you with better services, we will update the terms of this Privacy Policy based on product updates and legal requirements. Such updates constitute a part of this Privacy Policy. Without your explicit consent, we will not diminish your rights under this policy. If such updates result in a substantial reduction or significant change in your rights under this Privacy Policy, we will notify you through prominent prompts, push notifications, or other means before this policy takes effect. If you continue to use our services, it means that you have fully read, understood, and agreed to be bound by the revised Privacy Policy.

Contact Us:

If you have any questions about our privacy terms, please contact us.
Company Name: Shanghai Aipinyou Information Technology Co., Ltd.
Registered Address: 2nd Floor, No. 35 Boxia Road, China (Shanghai) Pilot Free Trade Zone.