Privacy Policy
Effective April 6, 2023
This policy will help you understand the following content that may be involved in the process of using CheerMate:
- 1. How to collect and use your personal information
- 2. How to use cookies and similar technologies
- 3. How to share, transfer and publicly disclose your personal information
- 4. How to protect your personal information
- 5. Your rights
- 6. Applicable law and jurisdiction
- 7. How to update this policy
- 8. How to contact us
CheerMate is well aware of the importance of personal information to you, and will do its best to protect your personal information safe and reliable. We are committed to maintaining your trust in us, adhering to the following principles to protect your personal information: the principle of consistent power and responsibility, the principle of clear purpose, the principle of choice consent, the principle of least enough, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, CheerMate promises that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry.
Please read and understand this Privacy Policy carefully before using our products (or services).
1. How we collect and use your personal information
Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person or reflect the activities of a specific natural person either alone or in combination with other information.
Other business functions
- 1. In order to troubleshoot product failures and ensure account security, we may collect your device model, operating system, unique device identification code, IP address, network access method, type and status, software usage records, click records, and operation log information , language and time zone.
- 2. In order to provide you with customized product content, recommend product updates and functions, and send push messages, we may collect the following information: device model, operating system, unique device identification code, IP address, access network method, type and status , software usage records, click records, language and time zone. This information will be used to create a user profile but will not be associated and used to identify a specific user. You can continue to use other features of CheerMate.
- 3. When you give feedback, consultation or complaint to CheerMate, in order to facilitate contact with you or help you solve problems, we may need you to provide name and mobile phone number , email and other valid contact methods. If you refuse to provide the above information, it will affect the timely handling of questions and feedback.
- 4. CheerMate (Cheering Partner) may be connected to other third-party apps. CheerMate will only provide advertising cooperation or access redirection services. Please be sure to read the third party's "User Agreement" and "Privacy Policy" carefully before using it. Policy", use after confirmation, CheerMate will not contact and save your personal information collected when using a third-party APP.
2. How do we use cookies and similar technologies
(一)Cookie
To ensure the proper functioning of the website, we store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names and some numbers and characters. Cookies allow websites to store data about your preferences. We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your own preferences. See AboutCookies.org for details. You can clear all cookies saved on your computer, and most web browsers have the function of blocking cookies, and you can clear all cookies saved on your computer through the browser setting options.
(2) Web beacons and pixel tags
Besides Cookie, we also use other similar technologies such as web beacon and pixel tag on our website. For example, emails we sent to you may include click URL linked to our web. If you click this link, we will track down this click, help us to know your preference to products or service and improve customer service. A web beacon is usually a transparent image embedded in a website or email. With the help of pixel tags in emails, we can know whether the emails are opened. If you do not want your activities to be tracked down in this way, you can unsubscribe from our mail list at any time.
3. How do we share, transfer and publicly disclose your personal information
(1) Sharing
We will not share your personal information with any company, organization or individual, except in the following cases:
- 1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
- 2. We may share your personal information externally in accordance with the provisions of laws and regulations, the needs of litigation dispute resolution, or the mandatory requirements of government authorities or judicial authorities.
- 3. To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect Pinguo and its users or the public interests, property or safety from damage.
Currently, our authorized partners include the following three types:
- 1) Technical support partners. In order to complete the corresponding functions, we will access third-party SDKs to obtain technical support, such as helping us to understand product user distribution and data analysis statistics, and we may provide the following personal information to such partners. CheerMate may choose to use some of the partners or change the partners at different times, so the partners in the list may be adjusted.
Third-party SDK name |
Use scenario description |
Types of Personal Information Shared |
Privacy Policy |
Youmeng SDK |
Statistical analysis of user behavior data |
Device information (IMEI/Mac/Android ID/IDFA/OPENUDID/GUID/SIM IMSI/Geolocation) |
Umeng Privacy Policy |
(2) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following cases:
- 1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
- 2. When it comes to mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to Ask for your authorization again.
(3) Public disclosure
We will only publicly disclose your personal information under the following circumstances:
- 1. After obtaining your explicit consent;
- 2. Disclosure based on laws: We may publicly disclose your personal information under the circumstances of laws, legal procedures, lawsuits or mandatory requirements of government authorities.
(4) Exceptions
According to relevant laws and regulations, in the following situations, we may collect, share, transfer or publicly disclose your personal information without your authorization and consent.
- 1. Directly related to national security, national defense security and other national interests;
- 2. Directly related to major public interests such as public security, public health, and public awareness;
- 3. Directly related to criminal investigation, prosecution, trial and judgment execution;
- 4. For the protection of your or other personal life, property, reputation and other major legitimate rights and interests, but it is difficult to obtain the consent of the person;
- 5. It is necessary to sign and perform the contract according to your request;
- 6. It is necessary to maintain the safe and stable operation of the products or services provided, such as discovering and handling product or service failures;
- 7. It is necessary to carry out statistical or academic research in the public interest, and when it provides the results of academic research or description to the outside world, it de-identifies the personal information contained in the results;
- 8. Personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
- 9. Other circumstances stipulated by laws and regulations.
4. How do we protect your personal information
- (1) We have adopted industry-standard security measures to protect the personal information you provide to prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonable and feasible measures to protect your personal information. For example, data exchanged between your browser and the Service (such as credit card information) is protected by SSL encryption; we provide HTTPS secure access to the supporting web services provided by the product; we use trusted protection mechanisms to prevent data Malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.
- (2) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We promise to keep your personal information stored within the reasonable and necessary period required by law or to realize product functions and services. We will immediately delete or anonymize personal information beyond the time limit.
- (3) The Internet is not an absolutely secure environment, and emails, instant messaging, and communication methods with other CheerMate users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.
- (4) The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send to us.
- (5) After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and your own prevention and control measures. Advice on reducing risks, remedies for you, etc. We will promptly inform you of the relevant situation of the incident by email, telephone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also actively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
5. Your rights
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee you to exercise the following rights with respect to your personal information:
(1) Delete your personal information
1. In the following circumstances, you can request us to delete personal information through the contact information in Article 10 of this policy:
- (1) If our handling of personal information violates laws and regulations;
- (2) If we collect and use your personal information without your consent;
- (3) If our handling of personal information violates our agreement with you;
- (4) If you no longer use our products or services;
- (5) If we no longer provide you with products or services.
2. If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and request them to delete them in a timely manner, unless laws and regulations provide otherwise, or these entities obtain your independent authorization. After you delete information from our service, we may not delete the corresponding information from the immediate backup system, but we will delete the information when the backup is updated.
(2) Withdraw your authorization
If you wish to revoke your authorization, you may contact us through the contact information in this policy. We will process your request within a reasonable time after receiving your email or registered mail.
However, please understand and agree that when you withdraw certain authorizations, the related product functions will be unavailable, and we cannot continue to provide you with the specific functions and/or services corresponding to the withdrawal of consent or authorization, and you withdraw the authorization The decision will not affect the previous processing of personal information based on your authorization.
(3) To respond to your above request
- 1. To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. We will respond within thirty days.
- 2. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation. For those that are unnecessarily repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes in existing practices), pose a risk to the legal rights of others, or are very impractical (for example, involving information stored on backup tapes) request, we may deny it.
- 3. In the following situations, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
- (1) Directly related to national security and national defense security;
- (2) Directly related to public security, public health, or major public interests;
- (3) Directly related to criminal investigation, prosecution, trial and execution of judgments;
- (4) There is sufficient evidence that you have subjective malice or abuse of rights;
- (5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.
- (6) Those involving commercial secrets.
6. Applicable law and jurisdiction
This privacy policy applies to the laws of the mainland of the People's Republic of China. Disputes under this Privacy Policy shall be under the jurisdiction of the court at the defendant's domicile.
7. How to update this policy
- (1) Our Privacy Policy and User Agreement may be changed or revised. We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this policy on this page. For major changes, we will notify you by email, telephone and push.
- (2) Major changes referred to in this policy include but are not limited to:
- 1. The purpose of processing personal information, the type of personal information processed, the method of using personal information, etc.;
- 2. There are major changes in your right to participate in the processing of personal information and how to exercise it;
- 3. When the personal information security impact Pinguo report indicates that there is a risk.
8. How to contact us
You can contact us by: Please email:nQIEp9cH@gmail.com。
9. Description of Application Permissions
In order to provide you with better services, the following device permissions will be required during your use. Before using it, we will apply for your authorization, and you can allow or cancel it in the device system'Settings-Application Management or Application Permissions' management. The specific application permissions are described as follows:
1) Storage: Used to access pictures, videos, audio, data files and other content on your device, allow the use of device storage space, and provide services such as file downloads and data storage.
2) Read device status (obtain device IMSI, IMEI number): It is convenient to create a uniquely identified user according to the IMEI number when the user is trying out the function, as the user ID. It is convenient for users to log in quickly.
For all permissions, you can manage related permissions in the setting system "Settings-Application Management or Application Permissions", and allow and cancel permissions independently.