App Privacy Policy
loyker is an APP developed and operated by Shenzhen surang Technology Co., Ltd
【Shenzhen surang Technology Co., Ltd. (hereinafter referred to as "we") understands the importance of information to you and will do our best to protect the security and reliability of your information. We will explain to you through this policy how we collect, store, protect, use, and provide your information to the public, and explain the rights you enjoy. Meanwhile, we promise to take appropriate security measures to protect your information in accordance with mature industry security standards.
Please carefully read and clearly understand this Privacy Policy before using our products (or services).
1、 How do we collect and use information
We will only collect and use your information for the purposes described in this policy, for the scenarios necessary to achieve product service functions
1. Account registration, login, and membership services
According to the provisions of the Network Security Law and the Regulations on the Management of Information Services for Mobile Internet Applications, in order to complete the creation of an account, you need to comply with the requirements of the real name system and provide the following information: your user name, e-mail address, created user name and password. For services that require access through an account, we may verify your identity based on the information you provide to ensure that we are providing services for you personally.
In order to complete order payment, when you need to provide Alipay account, WeChat payment account or bank transfer payment method, we will record your platform account member name, corresponding payment account name, order payment related information and other necessary information required by anti money laundering laws. If you do not agree to provide the above information, you will not be able to perform specific operations, but it does not affect your use of other unrelated services.
The personal information such as the account you provide will continue to be authorized for use by us during your use of this service. When you cancel your account, we will stop using and delete the above information, and the account will be cancelled within 48 hours.
3. Customer service and dispute resolution
When you contact us or apply for after-sales service or dispute resolution, in order to ensure the security of your account and system, we need you to provide necessary personal information to verify your membership identity.
For the convenience of contacting you, helping you solve problems as soon as possible, or recording the solutions and results of related issues, we may save your communication/call records and related content with us (including account information, order information, other information you provide to prove relevant facts, or contact information you leave). If you inquire about specific ordersFor complaints or suggest ions, we will use y our account information and order information.
4. APP permission acquisition instructions
When using our products and services, you need to apply for the following permissions within the necessary scope. Please rest assured that we will not proactively enable these permissions. It is only possible to collect your information through these permissions if you confirm to do so proactively. You can choose whether to authorize us to grant the following permissions:
(1) Read and Write Memory Permissions: The purpose is to ensure the stable operation of this product, and we promise to only read or cache necessary information. If you choose not to enable this permission, you will not be able to use specific functions related to this permission, but it does not affect your use of other unrelated services.
(2) Camera and Album Permissions: When you use functions such as scanning, profile picture settings, uploading licenses, and screenshot feedback, you need to enable camera or album permissions so that you can take real-time photos or upload pictures or videos. If you do not upload, you will not be able to use the relevant specific functions, but it does not affect your use of other unrelated services.
(3) Permission to read phone status: In order to complete security risk control, it is necessary to read your device identification information, device status information, and device environment information. If you choose not to enable this permission, you may not be able to complete security risk control verification, but it does not affect your use of other unrelated services.
(4) Microphone permission: For your convenience in using the features of my voice service product, you can choose to enable microphone permission. If you choose not to enable this permission, you will not be able to use specific functions related to voice input, but it will not affect your use of other services.
During the use of this application, we need to apply for your relevant permissions. The above permissions will not be enabled by default and will only be authorized to us with your explicit consent.
We will ask you one by one whether you are allowed to use this permission during the first call, and you can enable the relevant permissions when we ask. You can also refuse to provide the above information. If you do not provide the above information, we will not be able to provide you with relevant services, but it does not affect your use of other functions. In the later stage, you can also manage the relevant permissions on your own in the device system settings.
Third party SDK description:
1. CnJpushAurora Push: Aurora Push provides the app with the ability to push messages and notifications. After integrating the Aurora Push SDK into your app, the Aurora Push SDK will collect personal information necessary for implementing services and push messages and notifications to your end users through encrypted channels. The personal information collected and used by Aurora Push SDK includes: ① device information: used to identify unique users and ensure accurate delivery of message push; Optimizing push channel resources, we will integrate message push channel resources based on the activity of different apps on the device, to improve the message delivery rate for developers; Provide developers with smart tags and services to display business statistics information; ② Network and location information: Optimize the network connection requests between SDK and Aurora servers to ensure service stability and continuity; Implement the function of regional push.
2. ComHuaweiHMS (Huawei; Huawei push) ① Device information:used to identify a unique user and ensure accurate delivery of messages; Optimizing push channel resources, we will integrate message push channel resources based on the activity of different apps on the device, to improve the message delivery rate for developers; Provide developers with smart tags and services to display business statistics information; ② Network and location information: Optimize the network connection requests between SDK and Aurora servers to ensure service stability and continuity; Implement the function of regional push.
3. Alibaba Baichuan SDK, comAlibabaBaichuan (Alibaba Baichuan E-commerce) collects personal information of the following types: device identification information (such as IMEI/IMSI, SIM card serial number/MAC address, android_id), network information, and geographic location information. Purpose of use: Alibaba Baichuan SDK to obtain the latest coupon related information on the platform. SDK Provider Name: Alipay (China) Network Technology Co., Ltd. For details, please refer to the link of the personal information protection policy: https://opendocs.alipay.com/apis/01g6qm
4. Alipay SDK comAlipay collects personal information types such as Bluetooth, device identification information (such as IMEI/IMSI, SIM card serial number/MAC address, android_id), network information, and geographic location information. Purpose of use: Alipay pays for goods orders in the app. SDK Provider Name: Alipay (China) Network Technology Co., Ltd. For details, please refer to the link of the personal information protection policy: https://opendocs.alipay.com/apis/01g6qm
5. Tencent Open Platform SDK comTencentTauth, type of personal information collected: device identification information, geographic location information. Purpose of use: To assist users in sharing content with third-party applications. SDK provider name: Shenzhen Tencent Computer Systems Co., Ltd. For details, please refer to the link of the personal information protection policy: https://privacy.qq.com/andhttps://mp.weixin.qq.com/cgi-bin/announce?action=getannouncement&key=1503979103&version=1&lang=zh_CN&platform=2;
Obtain the user's phone number, IMEI, software installation list, and MAC address to push relevant information;
6. WeChat SDK: Function: Third party login, sharing, and collection of personal information Type or permissions: Service log information, device information (device model, operating system version, unique device identifier (IMEI, MAC, Android ID, IDFA (unique to iOS)), battery, Bluetooth, signal strength information), software information (including installed application list, software version number, browser type), IP addressLocation information (may also be obtained through IP addresses, GPS, WLAN (such as WIFI), or base stations based on the iOS system).
SDK subject: Shenzhen Tencent Computer Systems Co., Ltd
Privacy Policy Link: https://privacy.qq.com/policy/tencent-privacypolicy
7. ComTencentThe types of personal information collected by SMTT (TBS Tencent Browsing Service; Tencent Browsing Service; Tencent X5 Browser; Tencent Browser) include device identification information,Bluetooth, and geographic location information. Purpose of use: To assist users in sharing content with third-party applications. SDK provider name: Shenzhen Tencent Computer Systems Co., Ltd. For details, please refer to the link of the personal information protection policy: https://privacy.qq.com/andhttps://mp.weixin.qq.com/cgi-bin/announce?action=getannouncement&key=1503979103&version=1&lang=zh_CN&platform=2;
Obtain the user's phone number, IMEI, software installation list, and MAC address to push relevant information;
8. Alipay SDK comAlipay, collected personal information types:IMSI, ANDROID ID, MAC personal information, Bluetooth, clipboard personal information, device identification information IMEI/IMSI, SIM card serial number/MAC address, Android_ID, sensor information, sticker information, unique device identification, device model, IMEI, device serial number, device information, network information, and geographic location information. Purpose of use: Alipay pays for goods orders in the app. SDK Provider Name: Alipay (China) Network Technology Co., Ltd. For details, please refer to the link of the personal information protection policy: https://opendocs.alipay.com/apis/01g6qm
9. Tencent Open Platform SDK comTencentTauth, collected personal information types: IMSI, ANDROID ID, Bluetooth, MAC personal information, clipboard personal information, device identification information, geographic location information. Purpose of use: To assist users in sharing content with third-party applications. SDK provider name: Shenzhen Tencent Computer Systems Co., Ltd. For details, please refer to the link of the personal information protection policy: https://privacy.qq.com/andhttps://mp.weixin.qq.com/cgi-bin/announce?action=getannouncement&key=1503979103&version=1&lang=zh_CN&platform=2
10. Tencent Bugly SDK: In order to provide users with more stable services, this application integrates Tencent Bugly SDK to monitor abnormal software crashes. The relevant device information that Tencent Bugly SDK needs to collect mainly includes: log information (including: Third-party developer custom logs, Logcat logs and APP crash stack information), device brand and model, "get running process information", etc. In order to quickly discover problems that arise during use, and quickly locate and solve problems based on relevant information, so as to facilitate timely optimization of the APP. https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56
5. Application permission acquisition and usage
(a) Camera: When uploading a profile picture, the camera will be called to capture the profile picture.
(b) Microphone: A microphone will be used to send voice chats during voice chats.
(c) Photo reading: When uploading avatars, articles, and videos, it will be used to read photos.
(d) Add photos: When uploading avatars, articles, and videos, it will be used to read photos.
(e) Positioning (during use): When updating personal information on, the location will be located for data editing.
(f) Media database: When uploading avatars, articles, and publishing videos, the media database will be used.
(g) Music background playback: Use the background playback function in music.
(h) SMS: In Android phones, reading verification codes is used to provide users with a more convenient registration and login experience.
(i) Address book: The application will be used to send business cards during conversations with customer service and other users.
(g) CnJpushAurora Push: Aurora Push provides the app with the ability to push messages and notifications. After integrating the Aurora Push SDK into your app, the Aurora Push SDK will collect personal information necessary for implementing services and push messages and notifications to your end users through encrypted channels. The personal information collected and used by Aurora Push SDK includes: ① device information: used to identify unique users and ensure accurate delivery of message push; Optimizing push channel resources, we will integrate message push channel resources based on the activity of different apps on the device, to improve the message delivery rate for developers; Provide developers with smart tags and services to display business statistics information; ② Network and location information: Optimize the network connection requests between SDK and Aurora servers to ensure service stability and continuity; Implement the function of regional push.
(k) ComHuaweiHMS (Huawei; Huawei Push) ① Sensor information, pasting board information, unique device identification, device model, IMEI, device serial number, and device information: used to identify unique users and ensure accurate delivery of message push; Optimizing push channel resources, we will integrate message push channel resources based on the activity of different apps on the device, to improve the message delivery rate for developers; Provide developers with smart tags and services to display business statistics information; ② Network and location information: Optimize the network connection requests between SDK and Aurora servers to ensure service stability and continuity; Implement the function of regional push.
(l) Obtain the user's phone number, IMEI, software installation list, and MAC address to push relevant information.
6. Exceptions to obtaining authorized consent
In the following situations, we will collect and use your information in accordance with the law without your consent:
(1) Related to the fulfillment of legal and regulatory obligations by information controllers;
(2) Directly related to national security and national defense security;
(3) Directly related to public safety, public health, and major public interests;
(4) For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my authorized consent;
(5) Directly related to criminal investigation, prosecution, trial, and judgment;
(6) Information that you disclose to the public on your own;
(7) Based on what is necessary for you to sign and fulfill the contract;
(8) Collecting information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;
(9) Necessary for maintaining the safe and stable operation of the provided products or services, such as discovering and dealing with product or service malfunctions.
7. The necessary functions to ensure account security and software security and stable operation
In order to ensure the safe and stable operation of the services provided to you, prevent viruses, trojans, or other malicious programs, websites, we need to record the following information about your use of our products: your hardware serial number or unique identification code (such as IMEI, IMSI, AndroidID, etc.), the nickname we will use to obtain and save access to the terminal's user account, operation time, operation type, etcNetwork source and destination addresses, query content, browser type, access date and time, MAC address, login IP address, software version number, device model, login IP information, software version number, and other characteristic code information that can identify customer terminals, device SIM card, number of device SIM cards, IP version number, IP address. This type of information is the basic information that must be collected to provide services.
8. The situation of obtaining your information from a third party
We obtain the account information authorized by you to share from a third party, and after you agree to this privacy policy, we will bind your third-party account with our account or verify your identity information, so that you can directly log in, use (or purchase) our products and services through the third-party account. We will comply with your authorization and the agreement of the third party, After confirming the legality of the information source, use your information in accordance with relevant laws and regulations. We promise that the information collected from third parties will be used within the scope of your authorization, following the principles of minimum and necessity. If used beyond the authorized scope, we will obtain your explicit consent. We will also strictly comply with relevant laws and regulations, and require third parties to ensure the legality of the information they provide.
9. List of purposes, functions, and permissions related to third-party SDK services
We collect data based on your interaction with us and the choices you make, including your settings and the products and features you use. Therefore, when meeting new service requirements and business function changes, we may adjust the third-party SDKs we connect to. We will promptly disclose to you the latest information on the third-party SDKs accessed in our privacy policy. At present, if you do not agree to obtain information related to third-party SDKs, you may not be able to obtain corresponding services, but it does not affect your normal use of other functions and services of this APP.
2、 How do we use cookies and similar technologies
To make your activities more convenient and enjoyable, we will use relevant technologies to collect and store information when necessary. We will use small data files to identify your identity, which will help you reduce the repeated steps of entering registration information or determine the security status of your account. These data files may be cookies, and flash cookies usually contain identifiersSite name and some numbers and characters. Please understand that some of our services can only be implemented through the use of cookies. We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a feature to block cookies.
In addition to cookies, we will also use other similar technologies such as website beacons and pixel labels on the website. For example, the email we send you may contain a click URL that links to our website content. If you click on the link, we will track this click to help us understand your product or service preferences and improve customer service. A website beacon is usually a transparent image embedded in a website or email. By using pixel labels in emails, we can determine whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
Many web browsers have the Do Not Track feature, which allows you to post Do Not Track requests to websites. At present, the major Internet standards organizations have not established relevant policies to specify how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our websites will respect your choice.
We will do our best to ensure the security of your account and prevent criminals from tampering with your normal access content.
3、 How do we store and use your information
(1) Storage
The information we collect and generate within the territory of the People's Republic of China will be stored within the country. After you cancel your account, we will stop providing you with products and services, and delete your information or anonymize it according to your requirements, while complying with laws, regulations, and regulatory requirements. If we cease operations, we will immediately cease the collection of your information and inform you to delete or anonymize your information, subject to compliance with laws, regulations, and regulatory requirements.
(2) Sharing
We will not share your information with any other company, organization, or individual, except in the following circumstances:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your information with other parties.
2. We will share your information with the public in accordance with laws and regulations or mandatory requirements from government regulatory authorities.
(2) Transfer
We will not transfer your information to any company, organization, or individual, except in the following circumstances:
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your information to other parties;
2. When it comes to mergers, acquisitions, or bankruptcy liquidation, if it involves information transfer, we will require the new company or organization that holds your information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.
(3) Public disclosure
We will only publicly disclose your information in the following circumstances:
1. After obtaining your explicit consent;
2. Legal disclosure: We will publicly disclose your information in legal, procedural, litigation, or mandatory requirements from government authorities. You understand and agree that the disclosure of such information will not require separate notice to you and your consent.
4、 How do we protect your information
(1) We have used industry standard security measures to protect the information you provide, preventing unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your information. For example, being protected by SSL encryption when exchanging data (such as credit card information) between your browser and the "service"; We also provide HTTPS secure browsing for our website; We will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanisms to prevent data from being maliciously attacked; We will deploy access control mechanisms to ensure that only authorized personnel can access information; And we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting information.
(2) We will take all reasonable and feasible measures to ensure that no irrelevant information is collected. We will only retain your information for the period necessary to achieve the objectives stated in this policy, unless an extension of the retention period is required or permitted by law.
(3) The Internet is not an absolutely secure environment, and email, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send information through such methods. Please use complex passwords to assist us in ensuring the security of your account.
(4) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technological, or management protective facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, which damages your legitimate rights and interests, we will bear corresponding legal responsibilities.
(5) In the event of an unfortunate information security incident, we will promptly inform you in accordance with legal and regulatory requirements of the basic situation and possible impacts of the security incident, the measures we have taken or will take to dispose of it, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the event through email, letter, phone, push notifications, and other means. If it is difficult to inform the information subject one by one, we will take reasonable and effective measures to publish an announcement.
At the same time, we will also proactively report the handling of information security incidents in accordance with regulatory requirements.
5、 Your rights
According to relevant laws, regulations, standards in China, as well as common practices in other countries and regions, we guarantee that you exercise the following rights over your own information:
(1) Access your information
You have the right to access your information, except for exceptions specified by laws and regulations. If you wish to exercise data access rights, please send an email to2113025019@qq.com.
(2) Correct your information
When you discover errors in the information we process about you, you have the right to request us to make corrections. You can send an email to2113025019@qq.com. We will respond to your correction request within 10 working days.
(3) Delete your information
In the following situations, you can request us to delete information:
1. If our behavior in handling information violates laws and regulations;
2. If we collect and use your information without your consent;
3. If our handling of information violates our agreement with you;
4. If you no longer use our products or services, or if you cancel your account, we will no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the entities that have obtained your information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or if these entities have obtained your independent authorization.
When you delete information from our service, we may not immediately delete the corresponding information in the backup system, but we will delete this information during backup updates.
(4) Information subject cancels account
You can cancel your previously registered account at any time. After canceling the account, we will stop providing you with products or services and delete your information at your request, except as otherwise provided by laws and regulations.
Account cancellation process
Please follow the following path to log out of your account, log in to your account - find "My" in the bottom menu bar - Account and Security - click the "Log Out Account" button - Log out complete
(5) In response to your above request
To ensure security, you may need to provide a written request or other means of proving your identity. We may first request you to verify your identity before processing your request. We will provide a response within ten working days. If you are not satisfied, you can also file a complaint through the following channels: call 15818594262
For your reasonable requests, we do not charge any fees in principle, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as involving information stored on backup tapes).
In the following situations, according to legal requirements, we will not be able to respond to your request:
1. Related to national security and national defense security;
2. Related to public safety, public health, and major public interests;
3. Related to criminal investigation, prosecution, and trial;
4. There is sufficient evidence to indicate that you have subjective malice or abuse of power;
5. Responding to your request will result in serious harm to the legitimate rights and interests of you or other individuals or organizations.
6、 How do we protect the information of minors
Our products, websites, and services are primarily aimed at children. Minors are not allowed to create their own user accounts without the consent of their parents or guardians. For cases where information about minors is collected with the consent of parents, we will only use or publicly disclose this information when permitted by law, explicitly agreed upon by parents or guardians, or necessary to protect minors. If we find ourselves collecting information about minors without obtaining verifiable parental consent in advance, we will try to delete the relevant data as soon as possible.
7、 How to update this privacy policy
We may make adjustments or changes to this privacy policy in a timely manner, and any updates to this privacy policy will be published on our APP in a manner marked with the update time. Unless otherwise mandatory by laws, regulations or regulatory provisions, the adjusted or changed content will take effect 7 days after being notified or published. If you continue to use any of our services or access our related websites after adjusting or changing your privacy policy, we believe that this represents that you have fully read, understood, and accepted the revised privacy policy and are bound by it.
8、 How to contact us
If you have any questions, opinions or suggestions about this privacy policy, please call 18823759797 for consultation. Generally, we will reply within ten working days.
If you do not agree to some or all of the authorized terms of this policy, you should stop using the corresponding features or services of this product.
Shenzhen surang Technology Co., Ltd.
March 18, 2024s