B.A.D PrivacyPolicy

Privacy Policy

Update date: November 30, 2023

Effective date: November 30, 2023

 

Notice Clause

Your trust is very important to us. We are well aware of the importance of personal information to you. We will take corresponding security protection measures in accordance with the requirements of laws and regulations and try our best to protect the safety and controllability of your personal information. In view of this, the Battle Across Darkness (or “B.A.D”) service provider (or “we”) formulates this “Privacy Policy” (hereinafter referred to as “this policy or this privacy policy”) and reminds you:

 

This policy applies to all products and services provided by B.A.D , including but not limited to applications for computers, mobile smart terminals, web pages, software development kits (SDKs) and application programming for third-party websites and applications. Application Process Interfaces (APIs) and services. It should be noted that this policy does not apply to services provided to you by other third parties. To ensure a smooth product experience, you may receive content or network links from third parties. Please carefully choose whether to access links, content, products and services provided by third parties. Please carefully read the privacy policies of these third parties before submitting personal information to them.

Before you use the B.A.D service, please be sure to carefully read and thoroughly understand this policy, and then start using it after confirming that you fully understand and agree. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the various contact methods provided by B.A.D .

 

Part 1 、Definition

 

B.A.D : refers to the B.A.D client.

B.A.D service provider: refers to B.A.D’s Internet information and software technology service provider [Beijing Prudence Interactive Technology Co., Ltd.].

Children: refers to minors under the age of fourteen.

Personal information: refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.

Sensitive personal information: refers to personal information including ID number, personal biometric information, bank account number, property information, whereabouts, transaction information, children’s information, etc.

Deletion of personal information: refers to the act of removing personal information from the systems involved in realizing daily business functions, so that it cannot be retrieved or accessed.

 

Part 2 Privacy Policy

This privacy policy section will help you understand the following:

I. Collection, protection and use of your personal information

II. How we manage your personal information

III. How we protect your personal information

IV. How do you manage your personal information?

V. How we process personal information of minors

VI. How your personal information is transferred globally

VII. The permisssions we are requesting from your phone

VIII. How is this privacy policy updated

IX. Contact us

 

I. Collection, protection and use of your personal information

 

You understand and agree:

1. We are committed to creating excellent product functions and services to meet your needs. Because there are many types of functions and services in the products we provide you, and the specific product functions and service scopes that different users choose to use are different, accordingly, the various functions and the type and scope of personal information collected and used will be different. For differences, please refer to the specific product functions and service functions;

2. In order to bring you better product functions and service experience, we are continuing to work hard to improve our technology, and we may launch new or optimized functions from time to time, which may require the collection and use of new personal information or Change the purpose or method of using personal information. In this regard, we will separately explain to you the purpose, scope and use of the corresponding information by updating this policy, pop-up windows, page prompts, etc., and provide you with a way to choose your consent, and after obtaining your express consent Collect and use.

3. In order to realize various specific business functions, we may need to collect relevant personal information from end users, mainly including: log information (including: third-party developer custom logs, Logcat logs and APP crash stack information), device ID (including : androidid and idfv), network information, system name, system version and country code.

4. User information authentication service: When you use functions or services that require identity authentication, according to relevant laws and regulations, you may be required to provide your name, ID number, and phone number to verify your true identity. This information is personal sensitive information and you can refuse to provide it, but you may not be able to obtain relevant services.

5. Network signal broadcast: B.A.D can broadcast the network signal of the mobile phone, including WiFi signal strength, SIM card signal strength and network type. In order to achieve this feature, B.A.D needs to use information about the location of your device. Among them, location permission involves sensitive personal information. If you refuse to provide it, B.A.D will not broadcast the SIM card signal, and it will not affect the normal use of other services that do not require location permission.

The above information we collect and use has been de-identified. Data analysis only corresponds to specific codes that cannot be directly associated with your identity, and will not be associated with your real identity.

 

7. Customer service and problem solving

Contact us through customer service consultation, etc.: When you contact us, we will collect the consultation content you provide and your contact information (name, address, email or other contact information you left) and other information in order to communicate with you. Contact or help you solve problems, or record solutions and results of related problems.

 

8. Provide you with safety guarantee

In order to improve the security of your use of the services provided by us and our affiliates and partners, protect your personal and property safety or that of other users or the public from infringement, and better prevent phishing software, fraud, software vulnerabilities, computer viruses, and malware Intrusion and other security risks, to more accurately identify violations of laws, regulations or our relevant agreement rules, we may use or integrate your member information, device information, service log information and our affiliated companies and partners to obtain your authorization or share it in accordance with the law information to comprehensively judge your account risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

9. Others

(1) If the information you provide contains the personal information of other users, you need to ensure that you have obtained legal authorization before providing us with such personal information. (2) If we use information for other purposes not specified in this policy, or use information collected for specific purposes for other purposes, or if we proactively obtain your personal information from a third party, we will obtain it in advance. Your consent.

If we obtain your information indirectly from a third party, we will clearly request in writing before collection that the third party collect personal information after obtaining your consent in accordance with the law, and inform you of the content of the shared information, which involves sensitive information. Your explicit confirmation is required before it is provided to us for use, and the third party is required to make a commitment to the legality and compliance of the source of personal information. If the third party violates the rules, we will clearly require the other party to bear corresponding legal responsibilities; at the same time, , our professional security team will perform security reinforcement on personal information (including sensitive information reporting, sensitive information encrypted storage, access permission control, etc.). We will use no less protective means and measures than we use for our own users’ personal information to protect indirectly obtained personal information.

10. Exceptions to obtain authorization and consent

You fully understand and agree that our collection and use of your personal information does not require your authorization and consent under the following circumstances, and we may not respond to your requests for correction, modification, deletion, cancellation, withdrawal of consent, or request for information:

(1) Related to national security and national defense security;

(2) Relevant to public safety, public health, and major public interests;

(3) Relevant to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and judgment execution;

(4) To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

(5) Personal information that you disclose to the public on your own;

(6) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

(7) Necessary to sign and perform relevant agreements or other written documents with you;

(8) Necessary to maintain the safe and stable operation of the products and/or services provided, such as discovering and handling product or service failures;

(9) Necessary for legitimate news reporting;

(10) When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results will be de-identified;

(11) Other situations stipulated by laws and regulations.

Please be aware that, in accordance with applicable laws, if we take technical measures and other necessary measures to process personal information so that the data recipient cannot re-identify a specific individual and cannot recover it, or we may conduct de-identification research on the collected information. , statistical analysis and prediction, used to improve our content and layout, provide product or service support for business decisions, and improve our products and services (including using anonymous data for machine learning or model algorithm training), then such processing The data is used without further notification to you and without your consent.

1 1. If we stop operating our products or services, we will promptly stop the activities of continuing to collect your personal information, notify you of the cessation of operations in the form of one-by-one delivery or announcements, and make a clear record of the information we hold and have already Personal information related to business closure will be deleted or anonymized.

1 2. Instructions for accessing third-party SDK

 

In order to provide users with more services, ensure service stability and quality, or upgrade related functions, we may need to adjust the third-party SDK we access. We will promptly update you on this page on the latest situation of third-party SDKs involved in collecting user information. Instructions for using third-party SDKs: The SDKs used include iFlytek , Wwise, and SoundRaw .

 

Third-party sdk source: iFlytek: Use/Purpose of collecting user information: Language information, text information, device information, and log information are mainly used to provide speech-to-text, speech synthesis, and speech evaluation services after voice input, and after providing text input Speech synthesis services, authorization billing, user identification; more accurately locate and solve problems encountered by developers and end users when using our products and/or services, avoid conflicts with other applications, count service usage, and ensure Service stability and network security; conduct data statistics and operational analysis, improve and optimize product interaction experience. Third-party privacy policy link: https://www.xfyun.cn/doc/tts/offline_tts/offline_tts_sdkprivacy.html#

 

Third-party SDK source: wwise: Provides a complete set of interactive audio design and development tools, simplifies the multi-platform development process, provides dynamic mixing effects, allows adjusting the priority of sounds, and ensures full utilization of processing resources while complying with relevant restrictions. At the same time, sound propagation, virtual acoustics and audio rendering based on spatial information are used to build an immersive audio environment. Third-party privacy policy link: https://www.audiokinetic.com/zh/user-account-policy/

 

Third-party sdk source: SoundRaw: ai music generator. Third-party privacy policy link: https://soundraw.io/privacy

 

 

1 3. Provide security guarantee for users

In order to ensure account security and system operation security, and meet the relevant requirements of laws, regulations and our agreement rules, when users use our products, we will obtain the user’s device information, including the device attributes, connections and status used by the user, with the user’s authorization. Information, such as device model, device identifier (such as IMEI/androidID/IDFA/OPENUDID/GUID/OAID, SIM card IMSI, ICCID information, etc.), device MAC address, software list, telecom operators and other software and hardware feature information.

We may try to read or write SDcard data (public storage area). Please be aware that this is necessary to ensure the smooth operation of this APP.

 

 

II. How we manage your personal information

 

(1) Sharing

We will not share your personal information with companies, organizations and individuals other than B.A.D service providers, except in the following circumstances:

1. Sharing under legal circumstances: We may share your personal information externally in accordance with laws and regulations, litigation, dispute resolution needs, or as required by administrative and judicial authorities in accordance with the law.

2. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

3. Sharing with affiliated companies: In order to facilitate us to provide you with products and services based on B.A.D , identify anomalies in user information, and protect the personal and property safety of B.A.D affiliated companies or other users or the public from infringement, your personal information may be With our affiliates or their designated service providers. We will only share necessary personal information and it will be subject to the purposes stated in this privacy policy. If we share your sensitive personal information or our affiliates change the purpose of use and processing of personal information, we will ask for your authorization and consent again.

4. Sharing with authorized partners: We may entrust authorized partners to provide you with certain services or perform functions on our behalf. We will only share you for the legal, legitimate, necessary, specific and clear purposes stated in this privacy policy. Authorized partners will only have access to the information necessary to perform their duties and may not use this information for any other purpose.

We will conduct strict security testing on the application programming interface (API) and software tool development kit (SDK) used by authorized partners to obtain relevant information, and agree on strict data protection measures with authorized partners to ensure that they comply with our entrusted purposes. Service Description, this Privacy Policy and any other relevant confidentiality and security measures to handle personal information.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

(1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

(2) When the provider of this product and service undergoes a merger, acquisition or bankruptcy liquidation, or other situations involving mergers, acquisitions or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company that holds your personal information, The organization continues to be bound by this policy, otherwise we will require the company, organization and individual to re-obtain your authorization and consent.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

(1) We may publicly disclose your personal information with your explicit consent or based on your active choice;

(2) If we determine that you have violated laws and regulations or seriously violated the agreement rules related to this product, or to protect the personal and property safety of users of this product and its affiliated companies or the public from infringement, we may act in accordance with laws and regulations or this product The relevant agreement rules will disclose your personal information with your consent, including related violations and the measures this product has taken against you.

(4) Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information

In the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

1. Relevant to national security and national defense security;

2. Relevant to public safety, public health, and major public interests;

3. Relevant to criminal investigation, prosecution, trial and judgment execution;

4. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

5. Personal information that you disclose to the public on your own;

6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

According to legal provisions, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot recover and re-identify the subject of the personal information, does not constitute the external sharing, transfer and public disclosure of personal information. The use of such data Storage and processing will be without further notification to you and without your consent.

 

III. How we protect the security of your personal information

(1) We have adopted reasonable and feasible security protection measures that comply with industry standards to protect your information and prevent personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms to try to ensure that only authorized personnel can access personal information; and we will hold Security and privacy protection training courses to enhance employees’ awareness of the importance of protecting personal information.

(2) We have an industry-leading data security management system that is centered on data and revolves around the data life cycle, improving the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology.

(3) We will take reasonable and feasible measures to try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless there are mandatory retention requirements by law. Our criteria for judging the aforementioned period include:

1. Ensure the safety and quality of the services we provide you;

2. Do you agree to a longer retention period;

3. Is there any other special agreement on the retention period?

After your personal information exceeds the retention period, we will delete your personal information or make it anonymized in accordance with the requirements of applicable laws.

(4) The Internet is not an absolutely secure environment. When using the services provided by B.A.D , we strongly recommend that you do not use communication methods that are not recommended by B.A.D to send your information. You can connect and share with each other through our services. When you create communications, transactions or share through our services, you can independently choose the objects to communicate or share with, as third parties who can see your contact information, communication information or shared content and other related information.

Please note that the information you voluntarily share or even share publicly when using our services may involve your or others’ personal information or even personal sensitive information. Please consider more carefully whether to share or even share relevant information publicly when using our services.

We will do our best to keep any information you send us secure. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability.

(5) We will update and disclose relevant content such as security risks and personal information security impact assessment reports from time to time, which you can obtain through our announcements.

(6) After an unfortunate personal information security incident occurs, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and how you can prevent and reduce risks on your own suggestions, remedies for you, etc. We will notify you of event-related information by email, letter, phone call, push notification, etc. When it is difficult to notify the personal information subjects one by one, we will issue announcements in a reasonable and effective manner.

At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

 

IV. How do you manage your personal information?

 

You can access and manage your personal information in the following ways:

(1) Correct or supplement your personal information

When you find errors in the personal information we process about you, you have the right to ask us to make corrections or additions. You can submit a request for corrections or additions to us.

(2) Delete your personal information

(1) In the following circumstances, you can make a request to us to delete personal information:

1. If our handling of personal information violates laws and regulations;

2. If we collect and use your personal information without your explicit consent;

3. If our handling of personal information seriously violates the agreement with you;

4. If you no longer use our products or services, or you actively cancel the product;

5. If we permanently no longer provide you with products or services.

(2) If we decide to respond to your deletion request, we will also try our best to notify the subjects who obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these subjects obtain your independent authorization. .

(3) When you delete information from our services, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.

(3) Change the scope of your authorization and consent

Each business function requires some basic personal information to complete (see “Part 2” of this Privacy Policy). In addition, you can revoke some authorizations by unbinding, modifying personal settings, deleting relevant information, etc. You can also revoke some authorizations by turning off functions.

When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

 

( 4 ) Constraint information system automatic decision-making

In some product functions, we may make decisions only based on non-artificial automatic decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appeal methods without infringing on the trade secrets of this product or other user rights and public interests.

( 5 ) Respond to your above request

(1) To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.

(2) We will respond within 15 days.

(3) In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. We may reject requests that are unreasonably repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical.

(4) In the following circumstances, we will not be able to respond to your request in accordance with legal and regulatory requirements:

1. Relevant to national security and national defense security;

2. Relevant to public safety, public health, and major public interests;

3. Relevant to criminal investigation, prosecution, trial and execution of judgments;

4. There is sufficient evidence that the personal information subject has subjective malice or abused his rights;

5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

6. Involving business secrets.

 

V. How we process children’s personal information

 

Children are not allowed to create their own users without the consent of their guardian. If you are a child, we ask that you ask your guardian to read this privacy policy carefully and use our services or provide information to us with your guardian’s consent.

For situations where children’s personal information is collected with the consent of their guardians to use our products or services, we will only use, share, transfer or disclose this information when permitted by laws and regulations, with the explicit consent of the guardian, or when necessary to protect children.

 

VI. How your personal information is transferred globally

The personal information we collect and generate during our operations in the People’s Republic of China is stored in China, except for the following circumstances:

1. Laws and regulations have clear provisions;

2. Obtain your explicit authorization;

3. You conduct cross-border transactions and other personal proactive behaviors through the Internet.

In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

 

VII. The permisssions we are requesting from your phone

(1) android.permission.WRITE_EXTERNAL_STORAGE

The service requires to read and write permisison to the phone storages, so as to ensure its regular functionality such as storing service data, users’ personal configuration, caches, and etc.

(2) android.permission.INTERNET

The service requires accessibility to the Internet, to operate normally, such as, connecting to the game server, downloading updates, uploading users’ service data, and etc.

 

VIII. How is this privacy policy updated

 

Our privacy policy may change.

(1) We will not restrict your rights in accordance with this Privacy Policy without your explicit consent. We will post any changes to the privacy policy on a dedicated page (Settings – About Us – Agreement of Use – Privacy Policy).

(2) For major changes, we will also provide more prominent notifications (including notifications through public announcements in secret games or even providing you with pop-up reminders).

Major changes referred to in this policy include but are not limited to:

1. Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;

2. We have major changes in control and other aspects. Such as changes in owners caused by mergers, acquisitions, reorganizations, etc.;

3. The main objects to whom personal information is shared, transferred or publicly disclosed change;

4. Significant changes in your rights to participate in the processing of personal information and how you exercise them;

5. When our responsible department, contact information and complaint channels for handling personal information security change;

6. When the personal information security impact assessment report indicates that there is a high risk.

 

IX. Contact us

 

You can contact us through the following methods and we will respond to your request within 15 days:

(1) If you have any questions, comments or suggestions about the content of this policy, you can contact us by sending an email to service@xzhd.onaliyun.com

(2) If you are not satisfied with our response, especially if you believe that our personal information processing has harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit with the court with jurisdiction over the defendant’s domicile.