God of Fate Privacy Policy

Privacy Policy
Updated: July 19, 2024
Effective: July 19, 2024

Terms

Your trust is very important to us. We deeply understand the significance of personal information to you, and we will take appropriate security measures as required by laws and regulations to ensure that your personal information is secure and controllable. Hence, the service provider of God of Fate (or “we”) has formulated this “Privacy Policy” (hereinafter referred to as “this policy” or “this privacy policy”) and reminds you:

This policy applies to all products and services provided by God of Fate, including but not limited to applications for computers and mobile smart terminals, webpages, software development kits (SDKs), and application programming interfaces (APIs) used by third-party websites and applications. It is important to note that this policy does not apply to services provided to you by other third parties. To ensure a smooth product experience, you may receive content or network links provided by third parties. Please be cautious in choosing whether to access links, content, products, and services provided by third parties. Before submitting personal information to third parties, please read their privacy policies carefully.

Before using the God of Fate services, please be sure to read and fully understand this policy. Only after you have fully understood and agreed to it should you start using it. If you have any questions, opinions, or suggestions regarding the content of this policy, you can contact us through various contact methods provided by God of Fate.

Part 1: Definitions

God of Fate: Refers to the God of Fate client.
God of Fate Service Provider: Refers to the provider of internet information and software technology services for God of Fate, 【Beijing Prudence Interactive Technology Co., Ltd.】.
Children: Refers to minors under the age of fourteen.
Personal Information: Refers to various information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.
Sensitive Personal Information: Refers to personal information that includes identification numbers, personal biometric information, bank account numbers, property information, tracking information, transaction information, children’s information, etc.
Personal Information Deletion: Refers to the act of removing personal information from a system that involves daily business functions, making it unsearchable and inaccessible.

Part 2: Privacy Policy

This part of the privacy policy will help you understand the following:

I. Collection, protection, and use of your personal information

II. How we manage your personal information

III. How we protect your personal information

IV. How you can manage your personal information

V. How we handle the personal information of minors

VI. How your personal information is transferred globally

VII. How this privacy policy is updated

VIII. How to contact us

I. Collection, Protection, and Use of Your Personal Information

You understand and agree that:

  1. We are committed to creating excellent product features and services to meet your needs. Since the products and services we provide to you are varied, and the specific product features and service ranges chosen by different users may vary, the types and ranges of personal information collected and used for various features will differ. Please refer to the specific product features and service functions for details.
  2. To provide you with better product features and service experiences, we continuously strive to improve our technology. As a result, we may introduce new or optimized features from time to time, which may require collecting and using new personal information or changing the purposes or methods of using personal information. We will explain the purposes, ranges, and methods of information collection through policy updates, pop-ups, and page prompts, and provide you with the option to agree. We will collect and use such information only after obtaining your explicit consent.
  3. To achieve specific business functions, we may need to collect relevant personal information from end users, primarily including: log information, network information, system name, system version, and country code.
  4. User Information Authentication Service: When using features or services that require identity verification, you may need to provide your name, ID number, and phone number to verify your identity according to relevant laws and regulations. This information is classified as sensitive personal information. You can refuse to provide it, but you may not be able to access the related services.
  5. Network Signal Reporting: God of Fate can report the network signal of your phone, including Wi-Fi signal strength, SIM card signal strength, and network type. To achieve this function, God of Fate needs to use the location information of your device. Location permissions involve sensitive personal information. If you refuse to provide it, God of Fate will not report SIM card signals and will not affect the normal use of other services that do not require location permissions. The information we collect and use is anonymized and analyzed only with specific, non-directly identifiable codes, and will not be linked to your real identity.
  6. Customer Service and Issue Resolution: When you contact us through customer service consultations, we will collect the consultation content you provide and your contact information (name, address, email, or other contact information you leave) to contact you or help resolve issues, or record the solutions and results of relevant issues.
  7. Providing Security for You: To enhance the security of your use of services provided by us and our affiliates and partners, protect the personal and property safety of you, other users, or the public from infringement, better prevent phishing software, fraud, software vulnerabilities, computer viruses, and malicious software intrusions, and more accurately identify violations of laws, regulations, or our relevant agreement rules, we may use or integrate your member information, device information, service log information, and information shared by our affiliates or partners that you have authorized or legally shared to comprehensively judge your account risk, verify your identity, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures as required by law.
  8. Other:

(1) If the information you provide contains personal information of other users, you need to ensure that you have obtained legal authorization before providing this personal information to us.

(2) If we use information for purposes not described in this policy, or use information collected for specific purposes for other purposes, or obtain your personal information from third parties, we will obtain your prior consent.

 If we indirectly obtain your information from third parties, we will clearly require the third party to collect personal information with your consent in written form before collecting it and inform you of the shared information content. If sensitive information is involved, it must be confirmed by you before providing it to us for use. We will require the third party to commit to the legality and compliance of the personal information source. If the third party violates the agreement, we will require them to bear corresponding legal responsibilities. Our professional security team will reinforce the security of personal information (including sensitive information reporting, sensitive information encrypted storage, access permission control, etc.). We will use protection means and measures no less stringent than those we use to protect our own users’ personal information to protect the indirectly obtained personal information.

  1. Exceptions to Obtaining Authorization and Consent You fully understand and agree that we may collect and use your personal information without your authorization and consent in the following situations, and we may not respond to your requests for correction, modification, deletion, cancellation, withdrawal of consent, or retrieval of information:
  • Related to national security or defense security;
  • Related to public safety, public health, or significant public interests;
  • Related to criminal investigation, prosecution, trial, and judgment execution;
  • To protect your or others’ major legitimate rights and interests such as life and property, but it is difficult to obtain your consent;
  • Personal information that you disclose to the public yourself;
  • Personal information collected from legally disclosed information, such as legal news reports, government information disclosure, etc.;
  • Necessary to sign and perform a contract or other written documents with you;
  • Necessary to maintain the safe and stable operation of products and/or services provided, such as discovering and handling product or service failures;
  • Necessary for legal news reporting;
  • Academic research institutions conducting statistics or academic research based on public interest, and when providing academic research or description results externally, the results include de-identified personal information;
  • Other circumstances stipulated by laws and regulations.Please be aware that according to applicable laws, if we take technical measures and other necessary measures to process personal information so that the data receiver cannot re-identify specific individuals and cannot recover it, or we may study, statistically analyze, and predict the collected information after de-identification, used to improve our content and layout, support business decisions, and improve our products and services (including using anonymous data for machine learning or model algorithm training), then such processed data does not require separate notification and consent from you.
  1. If we stop operating our products or services, we will promptly stop the collection of your personal information, notify you by individual delivery or announcement, and delete or anonymize the personal information related to the terminated business we hold.

11. Explanation of Third-Party SDK Integration

To provide users with more services, ensure service stability and quality, or upgrade related features, we may need to adjust the third-party SDKs we integrate. We will promptly explain the latest situation regarding third-party SDKs that collect user information on this page. The SDKs used include iFLYTEK and Wwise.

Third-Party SDK Source: iFLYTEK
Purpose of Collecting User Information: To provide services such as speech-to-text conversion, speech synthesis, speech evaluation after voice input, and text-to-speech synthesis after text input. It is also used for authorization billing, user identity recognition, more accurately locating and resolving issues encountered by developers and end-users while using our products and/or services, avoiding conflicts with other applications, statistical analysis of service usage, ensuring service stability and network security, performing data statistics and operational analysis, and improving and optimizing product interaction experience.
Third-Party Privacy Policy Link: https://www.xfyun.cn/doc/tts/offline_tts/offline_tts_sdkprivacy.html#

Third-Party SDK Source: Wwise
Purpose of Collecting User Information: Provides a complete set of interactive audio design and development tools, simplifies multi-platform development processes, provides dynamic mixing effects, allows for adjusting sound priorities, ensures full utilization of processing resources while adhering to relevant constraints. Additionally, it uses sound propagation, virtual acoustics, and spatial audio rendering to create immersive audio environments.
Third-Party Privacy Policy Link: https://www.audiokinetic.com/zh/user-account-policy/

12. Providing Security for Users

To ensure account security and system operation security, comply with relevant legal regulations, and our agreement rules, during the use of our products, we may obtain user device information with user authorization. This includes device attributes, connection, and status information. We may attempt to read or write SDcard data (public storage area) to ensure the smooth operation of this app. Please be aware of this necessity.

II. How We Manage Your Personal Information

1. Sharing

We do not share your personal information with companies, organizations, or individuals outside of the “God of Fate” service provider, except in the following cases:

  • Legal Requirements: We may share your personal information according to legal regulations, for litigation or dispute resolution needs, or as required by administrative or judicial authorities.
  • With Explicit Consent: We will share your personal information with others only after obtaining your explicit consent.
  • With Affiliates: To facilitate the provision of products and services based on “God of Fate”, identify anomalies in user information, and protect the safety of “God of Fate” affiliates or other users or the public, your personal information may be shared with our affiliates or their designated service providers. We will only share necessary personal information and it will be subject to the purposes stated in this privacy policy. If we share your sensitive personal information or if our affiliates change the purpose or processing of personal information, we will seek your authorization and consent again.
  • With Authorized Partners: We may entrust authorized partners to provide certain services or perform functions on our behalf. We will only share your information for the legitimate, necessary, specific, and clear purposes stated in this privacy policy. Authorized partners can only access information necessary for their duties and must not use this information for any other purposes.
    We will conduct rigorous security checks on the application programming interfaces (APIs) and software development kits (SDKs) used by authorized partners and agree on strict data protection measures to ensure that they process personal information according to our entrusted purposes, service descriptions, this privacy policy, and other related confidentiality and security measures.

2. Transfer

We do not transfer your personal information to any company, organization, or individual, except in the following cases:

  • With Explicit Consent: We will transfer your personal information to others after obtaining your explicit consent.
  • Business Changes: In the event of a merger, acquisition, or bankruptcy liquidation of the service provider, or other scenarios involving such changes, if personal information is to be transferred, we will require the new company or organization holding your personal information to continue to adhere to this policy. Otherwise, we will require the new company or organization to seek your authorization and consent again.

3. Public Disclosure

We will only disclose your personal information in the following situations:

  • With Explicit Consent: We may publicly disclose your personal information if we obtain your explicit consent or based on your active choice.
  • Legal or Contractual Obligations: If we determine that you have violated laws, regulations, or seriously breached the terms of our product-related agreements, or to protect the safety of users or the public, we may disclose your personal information in accordance with legal regulations or our product-related agreements, including related violations and the measures taken by our product.

4. Exceptions to Prior Authorization for Sharing, Transfer, or Public Disclosure

The following situations do not require prior authorization and consent for sharing, transfer, or public disclosure of your personal information:

  • Related to national security or defense security.
  • Related to public safety, public health, or significant public interests.
  • Related to criminal investigations, prosecutions, trials, and enforcement of judgments.
  • To protect the life and property of individuals but difficult to obtain consent from the individual.
  • Personal information you have made public.
  • Personal information collected from legally publicly disclosed information, such as news reports or government information disclosures.

According to legal regulations, sharing or transferring de-identified personal information, ensuring that the data recipient cannot restore or re-identify the personal information subject, does not constitute sharing, transfer, or public disclosure of personal information. Such data storage and processing do not require further notice or consent from you.

III. How We Protect Your Personal Information

1. Security Measures

We have implemented industry-standard and reasonably feasible security measures to protect your information from unauthorized access, public disclosure, use, modification, damage, or loss. Specifically:

  • Encryption Technology: We use encryption technology to enhance the security of personal information.
  • Trusted Protection Mechanisms: We employ trusted protection mechanisms to prevent malicious attacks on personal information.
  • Access Control: We deploy access control mechanisms to ensure that only authorized personnel can access personal information.
  • Security and Privacy Training: We conduct security and privacy protection training courses to increase employee awareness of the importance of personal information protection.

2. Data Security Management System

We have an advanced data-centric data security management system that focuses on the data lifecycle. This system improves overall security from various dimensions including organizational development, system design, personnel management, and product technology.

3. Minimizing Data Collection and Retention

We take reasonable and feasible measures to avoid collecting irrelevant personal information. We will retain your personal information only for the duration necessary to achieve the purposes described in this policy, unless legally required to retain it for a longer period. The criteria for determining this period include:

  • Ensuring the safety and quality of the services we provide to you.
  • Whether you agree to a longer retention period.
  • Any other special agreements regarding retention periods.

After the retention period expires, we will delete or anonymize your personal information in accordance with applicable laws.

4. Internet Security Limitations

The internet is not an entirely secure environment. When using the services provided by “God of Fate,” we strongly recommend not using communication methods not recommended by us to send your information. You can use our services to establish contact and share information. When creating communications, transactions, or sharing through our services, you may choose who to communicate or share with, and these third parties may see your contact information, communication details, or shared content.

Please be aware that information you voluntarily share or publicly disclose while using our services may involve personal information or sensitive personal information of yourself or others. Consider carefully whether to share or publicly disclose such information when using our services.

We will strive to ensure the security of any information you send us. If our physical, technical, or managerial protective measures are breached, leading to unauthorized access, public disclosure, tampering, or damage of information, resulting in harm to your legal rights, we will assume corresponding legal responsibilities.

5. Updates and Public Disclosure

We will periodically update and publicly disclose information about security risks, personal information security impact assessments, and other related content, which you can access through our announcements.

6. Response to Security Incidents

In the unfortunate event of a personal information security incident, we will notify you in accordance with legal requirements, including:

  • Basic information about the security incident and potential impacts.
  • Measures we have taken or will take to address the issue.
  • Suggestions for you to independently prevent and mitigate risks.
  • Remedial measures for you.

We will inform you of the incident details through email, letter, phone, push notifications, or other means. If it is difficult to inform each affected individual, we will use reasonable and effective methods to issue public announcements.

We will also report the handling of personal information security incidents to regulatory authorities as required.

IV. How You Can Manage Your Personal Information

1. Correcting or Supplementing Your Personal Information

If you find that the personal information we handle about you is incorrect, you have the right to request corrections or supplements. You can submit a request to us for these changes.

2. Deleting Your Personal Information

  • You can request the deletion of your personal information under the following circumstances:
  1. If our handling of personal information violates laws and regulations.
  2. If we have collected or used your personal information without your explicit consent.
  3. If our handling of personal information severely violates our agreement with you.
  4. If you no longer use our products or services, or you have voluntarily canceled the product.
  5. If we no longer provide products or services to you permanently.
  • If we decide to respond to your deletion request, we will also, if possible, notify the parties who obtained your personal information from us, requesting them to delete it promptly, unless otherwise specified by laws and regulations or those parties have obtained your independent authorization.
  • After you delete information from our services, we may not immediately remove the corresponding information from backup systems, but will delete it when the backup is updated.

3. Changing the Scope of Your Authorized Consent

Each business function requires certain basic personal information to function (see “Section II” of this privacy policy). Beyond that, you can withdraw part of your authorization by unlinking, modifying personal settings, or deleting relevant information, or by turning off certain features.

When you withdraw consent, we will no longer process the corresponding personal information. However, the decision to withdraw consent will not affect the processing of personal information based on your prior authorization.

4. Constraints on Automated Decision-Making by Information Systems

In some product functions, decisions may be made solely by automated decision-making mechanisms such as information systems or algorithms. If these decisions significantly impact your legal rights, you have the right to request an explanation. We will provide a method for appeal without compromising the product’s commercial secrets, other users’ rights, or public interests.

5. Responding to Your Requests

  • To ensure security, you may need to provide a written request or other proof of your identity. We may ask you to verify your identity before processing your request.
  • We will respond to your request within 15 days.
  • For reasonable requests, we generally do not charge fees. However, for repeated or excessive requests, we may charge a reasonable fee. We may refuse requests that are groundless, require excessive technical means (e.g., developing a new system or fundamentally changing current practices), pose risks to others’ legal rights, or are impractical.
  • In the following situations, we may not be able to respond to your requests as required by laws and regulations:
  1. Related to national security or defense.
  2. Related to public safety, public health, or major public interests.
  3. Related to criminal investigation, prosecution, trial, and enforcement of judgments.
  4. Where there is sufficient evidence showing that the data subject has subjective malice or abuses their rights.
  5. Where responding to the request would severely harm your or others’ legal rights.
  6. Involving commercial secrets.

V. How We Handle Children’s Personal Information

Children are not allowed to create their own accounts without the consent of a guardian. If you are a child, we ask that your guardian carefully read this privacy policy and use our services or provide information only with their consent.

For instances where personal information of children is collected with the guardian’s consent to use our products or services, we will only use, share, transfer, or disclose such information in accordance with legal regulations, with the explicit consent of the guardian, or when necessary to protect the child.

VI. How Your Personal Information Is Transferred Globally

Personal information collected and generated during our operations within the People’s Republic of China is stored within China, except in the following circumstances:

  1. When required by laws and regulations;
  2. With your explicit authorization;
  3. When you engage in cross-border transactions or other voluntary actions via the internet.

In such cases, we will ensure that your personal information is adequately protected in accordance with this privacy policy.

VII. How This Privacy Policy Is Updated

Our privacy policy may be updated.

  1. No Limitation of Rights: We will not limit your rights as outlined in this privacy policy without your explicit consent. Any changes to the privacy policy will be published on a dedicated page (Settings – About Us – User Agreement – Privacy Policy).
  2. Significant Changes: For significant changes, we will provide more prominent notifications, including notifications through our service or even pop-up alerts. Significant changes include but are not limited to:
  • Major Changes in Service Model: Such as changes in the purposes of processing personal information, types of personal information processed, or methods of using personal information.
  • Major Changes in Control: Such as changes in ownership due to mergers or acquisitions.
  • Changes in Main Recipients of Personal Information: Such as changes in the entities to which personal information is shared, transferred, or disclosed.
  • Significant Changes in Your Rights: Such as changes in your rights related to personal information processing and how to exercise them.
  • Changes in Responsible Department or Contact Information: Such as changes in the department responsible for personal information security, contact details, or complaint channels.
  • High-Risk Findings: When personal information security impact assessments indicate high risks.

VIII. How to Contact Us

You can contact us through the following methods, and we will respond to your request within 15 days:

  1. Questions, Comments, or Suggestions: If you have any questions, comments, or suggestions regarding this policy, you can contact us by sending an email to service@xzhd.onaliyun.com.
  2. Unresolved Issues: If you are not satisfied with our response, especially if you believe that our handling of personal information has infringed upon your legal rights, you may also seek resolution by filing a lawsuit in a court with jurisdiction over the defendant’s residence.

Copyright © PRUDENCE INTERACTIVE. All Rights Reserved.