User privacy policy

Update date: August 2021

 

You are welcome to use Rhythm Fighter (hereinafter referred to as the "Game"). The game is operated by Shanghai Kena Information Technology Co., Ltd. and its affiliates (hereinafter referred to as "we" or "Coconut Island Game"). We attach great importance to user privacy. When you use the game, we may collect and use your relevant information in accordance with the "User Privacy Policy" (hereinafter referred to as the "Privacy Policy"). We hope to use this privacy policy to explain to you how we collect, use, store and share this information when using our services, as well as the ways we can provide you with access, update, control and protection of this information. This privacy policy is closely related to the game service you use. We hope you read it carefully (minors should read it with their legal guardian), and when necessary, make the choices you think are appropriate in accordance with the guidelines of this privacy policy. Remind you to pay special attention to the bold and/or underlined clauses in this privacy policy. The content of these clauses is particularly critical.

 

Please pay special attention that your use or continued use of our services means that you agree to our collection, use, storage and sharing of your relevant information in accordance with this privacy policy. If you do not agree with the content of this privacy policy, this game may not run normally, or you may not be able to fully experience the settings in the game, and you will not be able to use this game. If you select "Agree" on the pop-up page, it means that you fully understand and agree to the entire content of this privacy policy.

 

If you have any questions, suggestions or comments, please contact us through the following contact methods:

Contact address: Room 201, Block A, No. 1339, Changde Road, Putuo District, Shanghai

Contact email: contact@coconut.is

Contact number: 021-62999686

 

This privacy policy will help you understand the following:

 

1. How we collect and use personal information

 

2. How do we use COOKIES or similar technologies

 

3. How do we share, transfer, and publicly disclose your personal information

 

4. How do we store and protect personal information

 

5. Third-party services

 

6. Protection of minors

 

7. Your rights

 

8. Notification and Amendment

 

9. How to contact us

 

 

 

1. How we collect and use personal information

 

We collect your personal information mainly for you and other users to use our services more easily and satisfactorily. Our goal is to provide all Internet users with a safe, interesting and instructive online experience. And this information helps us achieve this goal.

 

(1) We will collect and obtain your personal information through the following channels:

 

1. Information provided by you on your own initiative. For example:

 

1) The information you provide to us when you register for our service account or use our service;

 

2) The shared information you provide to other parties through our services, and the information stored when you use our services.

 

Please note that if you publish your information in the information uploaded or posted in the public area visible to other users in the game, or in your response to the information uploaded or posted by other people, such information may be collected and used by others. Use. When you find that others have improperly collected or used your information, please contact us immediately through the feedback channels listed in "How to Contact Us" in this policy.

 

2. Your information shared by other parties. That is, information about you that is provided by other parties when using our services, or we have obtained your authorization from other parties in order to provide you with better services.

 

3. Your information we have obtained. When you use our services, we collect, aggregate, and record information, such as log information, location information, and device information.

 

(2) We will collect and use the following types of your personal information for the following purposes:

 

1. Help you complete registration and login

 

When you register a game account or log in to the game, we will obtain your basic registration or login information, including your account number, and user name. This information is obtained to facilitate us to provide you with services.

 

When you log in through APPLE ID, we will collect your APPLE ID, email address, device information, network status, and connection method.

 

2. Maintain the normal operation of basic functions

 

During your use of our services, we may automatically collect and store information about the services you use and how you use them and associate these information to identify abnormal status of your account, understand product suitability, and provide you with browsing and searching To maintain the normal operation of basic functions such as basic services, this information includes:

 

(1) Log information: When you use our services, we may automatically collect your detailed usage of our services and save them as relevant web logs. Including, your login account, IP address, telecommunications operator, network environment, language used, date and time of access, game behavior (including your collection and use of props, reward collection, etc.);

 

(2) Device information: We may receive and record the device-related information (such as IMEI, MAC, Serial, SIM card IMSI identification code, device model, Operating system and version, client version, device resolution, package name, device settings, unique device identifier, software and hardware feature information), information about the location of the device (such as IP address, GPS location, and WLAN access Entry point)

 

(3) Payment information: When you recharge or pay in our products or services, we will collect your recharge records, consumption records and other information so that you can inquire about your transaction records, and when there is a dispute in the transaction, Customer service personnel provide information to support the handling of disputes. At the same time, in order to protect the safety of your property as much as possible, we will collect device information, network identification information and network environment information at the time of payment to identify, reconfirm or block high-risk transactions.

 

At the same time, we will apply for permission to access your device information to collect the above basic personal device information and provide you with our basic services and basic functions. If you refuse to provide the above permissions, you may not be able to use our services.

 

Please note that separate device information and log information are information that cannot identify a specific natural person. If we combine this type of non-personal information with other information to identify a specific natural person, or combine it with personal information, during the combined use period, this type of non-personal information will be treated as personal information, unless you have obtained your authorization Or unless otherwise provided by laws and regulations, we will anonymize and de-identify this type of personal information. During the combined use, this information will be treated and protected as your personal information in accordance with this privacy policy.

 

 

1. Your personal information that we have collected indirectly:

 

We may obtain relevant information that you have authorized to share from related parties and third-party partners. Third-party partners are mainly third-party social platform partners you use to log in quickly (see Article 1 (2) 1 of this privacy policy for details). We will collect and use your information under the premise of complying with relevant laws and regulations, and in accordance with the agreement with the affiliates or third-party partners, and believing that the source of the information provided by them is legal.

 

2. Provide you security service

 

In order to improve the security of your use of the services provided by us and our partners, protect the personal and property safety of you or other users or the public from infringement, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc. Security risks, to more accurately identify violations of laws and regulations or our service-related agreement rules, we may collect, use or integrate your account information, transaction information, equipment information, log information, and our affiliates and partners obtain you Authorize or share information in accordance with the law to comprehensively determine your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

3. Only with your consent, for promotional or marketing purposes, including (i) sending you promotional materials about our products and services and conducting direct sales, either separately or in conjunction with our affiliated entities or business The products/services provided by the partners are carried out together; and (ii) publish your personal information in our product and service marketing or promotional materials (regardless of the media and format). If we provide your personal information to third parties (including our subsidiaries and affiliated entities) for their promotional or marketing purposes, we will obtain separate written consent from you. From time to time, you may choose to "accept service" or "reject service" regarding our use of your personal information for promotional and marketing purposes. If you do not want to receive our promotional and marketing materials, you can obtain our contact information through Article 9 of this privacy policy, contact us to make your request, and we will reply within 15 working days.

 

4. You understand and agree that some individual services may require you to enable specific access permissions on your device to achieve the collection and use of information related to these permissions. For example:

 

(1) After you turn on the album permissions, you can save the screenshots in the game and share them with others;

 

(2) After you turn on the location authority, we can obtain your fuzzy location information, so that you can choose nearby players for information interaction, etc.;

 

We will ask you again before you receive a specific single service for the first time, and we can only provide follow-up services after obtaining your explicit authorization. You can change the authorization status of the permission at any time, for example, from agreeing to authorization to withdrawing authorization. Most mobile devices will support this requirement. For specific methods, please refer to or contact the service provider or manufacturer of your mobile device. When you choose to withdraw the authorization, we will no longer continue to collect and use relevant information based on the corresponding authority, and we will not be able to provide you with the services corresponding to the authority, but your decision to withdraw the authorization will not affect the previous authorization based on your authorization. Information collection and use.

 

 

 

 

5. Exceptions for obtaining authorization and consent

 

According to relevant laws and regulations, we may obtain and use your personal information in the following situations without seeking your authorization and consent:

 

(1) Related to national security and national defense security;

 

(2) Related to public safety, public health, and major public interests;

 

(3) Related to criminal investigation, prosecution, trial and execution of judgments, etc.

 

(4) In order to protect the life, property and other major legal rights of the information subject or other individuals, but it is difficult to obtain your own consent;

 

(5) The collected information is disclosed to the public by yourself

 

(6) Collecting information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

 

(7) Necessary for signing a contract according to your requirements;

 

(8) Necessary for maintaining the safe and stable operation of our services, such as discovering and disposing of product or service failures;

 

(9) Necessary for legal news reports;

 

(10) When it is necessary for academic research institutions to conduct statistical or academic research based on the public interest, and when they provide academic research or described results to the outside, they de-identify the information contained in the results;

 

(11) Other circumstances stipulated by applicable laws and regulations.

 

 

1. How do we use COOKIES or similar technologies

 

In order to enable us to serve you better and faster, and to make your experience on our services more personalized, we or our third-party partners may obtain and use your information through COOKIES or similar technologies, And store this information as log information. A cookie is a small amount of data, which is sent from a web server to your browser and stored on the computer hard drive. We use COOKIES to benefit its users. For example, in order to make the login process of our virtual community faster, you can choose to store the user name in a cookie, so that it will be more convenient and faster next time you want to log in to our service. COOKIES can help us determine the pages and content you connect to, the time you spend on our specific services and the services you choose.

 

We use our own COOKIES or similar technologies, which may be used for the following purposes:

 

1. Remember your identity. For example: COOKIES or similar technologies help us identify you as our registered user, or save your preferences or other information about you that you provide to us;

 

2. Analyze your use of our services. We can use COOKIES or similar technologies to understand what activities you use our services for, or which services are most popular;

 

While we use cookies or similar technologies for the above-mentioned purposes, we may aggregate non-personally identifiable information collected through cookies or similar technologies to other partners to analyze how you and other users use our services.

 

You can reject or manage cookies or similar technologies through the browser or user selection mechanism, and you can consult the files attached to the browser to obtain more information in this regard. However, please note that if you disable cookies or similar technologies, we may not be able to provide you with the best service experience, and some services may not be available normally.

 

2. How do we share, transfer, and publicly disclose your personal information

 

(1) Sharing

We will integrate all the resources of us and all related parties to provide you with high-quality services, so some of your information may be shared within us and all related parties in order to provide related services based on the principle of minimum necessity. We and all companies within each affiliate will strictly abide by the requirements of this privacy policy and are bound by the stated purpose in this privacy policy. If an affiliate or subsidiary company really needs to change the purpose of processing personal information, we will again seek your authorization and consent.

We will not share your personal information with any companies, organizations and individuals other than affiliates, except in the following cases:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

 

2. We may share your personal information externally in accordance with laws and regulations, or compulsory requirements of government authorities.

 

3. Sharing with authorized partners: only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, when you purchase our products or services, we must share your personal information with payment and platform service providers to arrange for partners to provide services. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services to ensure compliance with the principle of minimization. Our partners have no right to use the shared personal information for any other purpose. Currently, our authorized partners include the following types:

 

1) Authorized partners for advertising and analysis services. Unless we have your permission, we will not share your personally identifiable information (referring to information that can identify you, such as your name, mobile phone number, ID number or email address, through which you can be contacted or identified. ) Share with partners who provide advertising and analysis services. We may provide these partners with anonymized information for advertising and operational analysis. Anonymity will ensure that relevant information will not identify you personally;

 

2) Suppliers and service providers. We may send information to suppliers and service providers that support our business, such as payment service providers, to provide you with transaction services, etc.

 

For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to handle personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.

 

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

 

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

 

3. When it involves mergers, acquisitions, business sector sales, bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy. If the scope of personal information collection or the purpose of use is changed, we will request the company or organization to re-seek authorization and consent from you.

 

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

 

1. After obtaining your explicit consent;

 

2. Disclosure based on law: We may publicly disclose your personal information when required by law, legal procedures, litigation, government supervision, or government authorities.

 

3. How do we store and protect personal information

 

We only store your personal information during the period necessary for the purpose of collecting and processing personal information described in this policy and within the shortest time limit required by laws and regulations. If we terminate the service or operation, we will promptly stop continuing to collect your personal information. At the same time, we will comply with relevant laws and regulations, and notify you in the form of push notifications, announcements, etc. Personal information is deleted or anonymized, unless otherwise provided by laws, regulations or regulatory authorities.

 

We cooperate with well-known cloud service providers (Beijing Sinnet Technology Co., Ltd., Ningxia Xiyun Data Technology Co., Ltd., and Alibaba Cloud Computing Co., Ltd.) to provide a safe storage environment for your personal information. All personal information collected and generated during operations in Mainland China will be stored in China, except in the following circumstances:

 

1. There are clear provisions in laws and regulations;

 

2. Obtain your authorization and consent;

 

3. Our services you use involve cross-border, and we need to provide your personal information overseas, provided that an appropriate degree of protection is ensured.

 

4. In response to the above circumstances, we will ensure that your personal information is adequately protected in accordance with this policy and national laws and regulations.

 

We attach great importance to information security, set up a dedicated security team, and take all reasonable and feasible measures to protect your personal information:

 

(1) Data security technical measures

 

We will adopt security protection measures that comply with industry standards, including establishing reasonable systems, specifications, and security technologies to prevent unauthorized access to, use, and modification of your personal information, and to avoid data damage or loss.

 

Our services adopt a variety of encryption technologies. For example, in some of our services, we will use encryption technology (such as SSL) to protect your personal information, and use encryption technology to encrypt and store your personal information and isolate it. Technology for isolation.

 

When using personal information, such as information display and information association calculations, we will use a variety of data desensitization technologies to enhance the security of information in use.

 

We will also adopt strict data access control and multi-identity authentication technology to protect personal information and prevent data from being used in violation of regulations.

 

(2) Other security measures we take to protect personal information

 

We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

We use information contact confidentiality agreements, monitoring and auditing mechanisms to fully control data security. We will also organize security and privacy protection training courses to strengthen employees' security awareness and awareness of the importance of protecting information.

(3) We only allow our employees and partners who need to know this information to access your personal information, and set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to perform corresponding confidentiality obligations. If you fail to fulfill these obligations, you may be held accountable or your cooperation relationship with us may be suspended.

 

(4) We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected.

 

(5) The Internet is not an absolutely secure environment, and the communication methods with other users such as e-mail, instant messaging, social software or other service software cannot be determined whether it is completely encrypted. We recommend that you use complex passwords when using such tools, and Pay attention to protect your information security.

 

(6) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of the personal information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.

 

(7) Security incident handling

 

When communicating with third parties or other users through our services, please properly protect your information and provide it to others only when it is necessary and you confirm that the information security is not threatened.

 

In order to deal with the possible risks of personal information leakage, damage and loss, we have formulated a number of systems to clarify the classification and classification standards of security incidents and security vulnerabilities and the corresponding processing procedures. We have also established a special emergency response team for security incidents. In accordance with the requirements of security incident handling regulations, we initiate security plans for different security incidents, stop losses, analyze, locate, formulate remedial measures, and cooperate with relevant departments to trace and crack down.

 

In the unfortunate event of an information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and suggestions that you can independently prevent and reduce risks , Remedies for you, etc. At the same time, we will promptly inform you of the relevant situation of the incident by email, letter, telephone, push notification, etc. If it is difficult to inform the information subject one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also proactively report the handling of information security incidents in accordance with the requirements of the regulatory authorities.

 

Please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. Therefore, the system and communication network used by you to access our services may have problems due to circumstances beyond our control.

 

We hereby remind you that you must keep your account number, password and other identity elements in a safe place. When you use our services, we will use your account number, password and other identity elements to identify you. Once you disclose the aforementioned information, you may suffer losses and may be disadvantageous to you. If you find that your account number, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take appropriate measures in time to avoid or reduce related losses.

 

4. Third-party services

 

Our may access or link to social media or other services (including websites or other forms of services) provided by third parties, including:

 

1. You can use the "Share" button to share some of our service content to third-party services, or you can share third-party service content to our services. These functions may collect your information (including your log information), and may install COOKIES on your computer to operate the above functions normally;

 

3. We provide you with links through advertisements or other methods of our services so that you can link to third-party services or websites; and

 

 

4. Other access to third-party services. In order to complete payment, update patches, optimize advertising, etc. and other legitimate purposes to maintain the order of the game, we may access third-party SDKs or similar applications. Therefore, third-party SDKs or similar applications may also encrypt your phone. And the anonymized or de-identified data will not be directly associated with you. The collection and processing of information by such SDKs or similar applications comply with their respective privacy policies, and this "Privacy Policy" is not applicable. We will evaluate the legality, legitimacy, and necessity of the collection of personal information by such third-party services, and require these third parties to take protective measures for your personal information and strictly abide by relevant laws, regulations and regulatory requirements. In order to ensure the security of your information to the greatest extent, we strongly recommend that you review the privacy policies of third-party SDKs and similar applications. For your review and judgment, we have attached a list of third-party SDK privacy policies at the end of this article for your reference. If you find that such SDKs or similar applications are at risk, it is recommended that you immediately terminate the relevant operations and contact us in time.

 

5. Your rights

 

You can understand and manage the registration information and other personal information you provide while using our services, and you can also contact us in accordance with the guidelines of this privacy policy. The scope and method of your access, modification and deletion of personal information will depend on the specific services you use.

 

(1) Access your personal information and modify or correct your personal information

 

1. You have the right to access, modify and correct your personal information in the game operation interface, except for exceptions provided by laws and regulations. If you are unable to access, modify and correct this personal information through the aforementioned methods, or wish to access, modify and correct other personal information generated during your use of our products or services, or to understand whether your personal information has been collected, collected or used , Reasons for automated processing, etc., you can contact customer service or get our contact information at the end of this privacy policy, contact us to make your request, and we will respond to your request within 15 working days.

 

(2) Delete your personal information

 

1. In the following situations, you can request us to delete personal information:

 

(1) If our handling of personal information violates laws and regulations;

 

(2) If we collect and use your personal information without your consent;

 

(3) If our handling of personal information violates our agreement with you;

 

(4) If you no longer use our products or services, or you cancel your account;

 

(5) If we no longer provide you with products or services.

 

2. If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us and require them to delete them in a timely manner, unless laws and regulations provide otherwise, or these entities obtain your independent authorization.

 

3. After you delete information from our service, due to system operation, we may not delete the corresponding information from the backup system immediately, but will delete the information when the backup is updated.

 

(3) Change the scope of your authorization

 

1. We follow the principle of necessity when collecting user information, and providing basic game service functions requires some basic personal information to be completed. For the collection and use of additional personal information, you can give or withdraw your authorization and consent at any time.

 

2. You can contact customer service or get our contact information at the end of this privacy policy, and contact us to make your request.

 

3. After you delete information from our service, due to system operation, we may not delete the corresponding information from the backup system immediately, but will delete the information when the backup is updated.

 

(3) Change the scope of your authorization

 

1. We follow the principle of necessity when collecting user information, and providing basic game service functions requires some basic personal information to be completed. For the collection and use of additional personal information, you can give or withdraw your authorization and consent at any time.

 

2. You can contact customer service or get our contact information at the end of this privacy policy, and contact us to make your request.

 

After you revoke your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

 

(4) The personal information subject cancels the account

 

1. You can contact customer service-enter the "logout" request, and then follow the customer service guidelines, click "please click here to feedback" to confirm the cancellation of your account, we will assist you to cancel your account within 15 working days. After the account is cancelled, you will not be able to use the services we provide.

 

2. If you use the associated APPLE ID as the game account to log in to the game, you need to log out of APPLE ID. Please log out in APPLE ID according to their guidelines .

 

3. After the account is cancelled, we will stop providing products or services to you, and delete your personal information according to your request, unless otherwise provided by laws and regulations.

 

(5) The subject of personal information obtains a copy of personal information

 

You have the right to obtain a copy of your personal information. You can make your request by contacting customer service or at the end of this privacy policy.

 

(6) Responding to your above request

 

1. To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.

 

2. We will reply within 15 working days. If within the time limit, due to objective reasons, it is indeed unable to give a reply, we will contact you in advance to extend the reply period, in order to give you a satisfactory answer.

 

3. If you are not satisfied, you can also make a complaint by calling the contact number shown at the beginning of the article.

 

4. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. We may reject requests that are unreasonably repeated, require excessive technical means (for example, the need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or are very unrealistic.

 

5. In the following situations, we will not be able to respond to your request:

 

(1) It is related to the performance of the obligations stipulated by laws and regulations by the personal information controller;

 

(2) It is directly related to national security and national defense security;

 

(3) It is directly related to public safety, public health, and major public interests;

 

(4) Directly related to criminal investigation, prosecution, trial, and execution of judgments;

 

(5) The personal information controller has sufficient evidence to show that the personal information subject has subjective malice or abuse of rights;

 

(6) In order to protect the life, property and other major legal rights of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;

 

(7) Responding to the request of the personal information subject will cause serious damage to the lawful rights and interests of the personal information subject or other individuals or organizations;

 

(8) Involving trade secrets.

 

6. Notification and Amendment

 

In order to provide you with better services, we may modify the terms of this policy in a timely manner based on the update of our services and relevant requirements of laws and regulations, and such modifications constitute part of this policy. If such updates result in a substantial reduction or major change in your rights under this policy, we will notify you through website announcements, push notifications, pop-up prompts or other methods before this policy takes effect. If you do not agree to these changes, You can choose to stop using our services; if you continue to use our services, it means that you have fully read, understood and agreed to be bound by this revised policy.

 

Any modification we make will put your satisfaction first. We encourage you to review our privacy policy every time you use our services.

 

We may issue service-related announcements when necessary (for example, when we suspend a certain service due to system maintenance). You may not be able to cancel these service-related announcements that are not promotional in nature.

 

7. How to contact us

 

1. If you have any questions, comments or suggestions about this privacy policy, you can get in touch with us in a variety of ways, including online customer service in the game "Settings-Contact Customer Service-Transfer Manual", service hotline (021-62999686) Wait, contact us to make your request, we will reply within 15 working days.

 

2. If you are not satisfied with our response and wish to withdraw your consent to the processing of some or all of your personal data, especially if you believe that our personal information processing behavior has harmed your legitimate rights and interests, you can also send an email to contact @coconut.is, we will provide you with a solution.