Children’s Personal Information Protection Rules and Guardian Notice

Updated: April 14, 2025

The software operator (hereinafter collectively referred to as “this Software” or “we”) fully understands the importance of children’s (referring to minors under the age of 14, hereinafter the same) personal information and privacy security. We hope to explain through these “Children’s Personal Information Protection Rules and Guardian Notice of this Software” (hereinafter referred to as “this Policy”) the corresponding processing rules and related matters when we collect and use children’s personal information. Before using our products and services (hereinafter collectively referred to as “this Software Service”), please ask children, children’s parents or other guardians (hereinafter collectively referred to as “guardians”) to carefully read and thoroughly understand this Policy, especially the clauses marked in bold/underline should be read carefully, and only start using after confirming full understanding and agreement with all clauses.

Special Notice to Guardians:
If we learn that your child is under the age of fourteen, we will take special measures under this Policy to protect the personal information of your child that we obtain. Please help us protect your child’s personal information and privacy security, require them to read and accept this Policy together under your supervision, and use this Software Service and submit personal information under your consent and guidance. If you do not agree with the content of this Policy, you should require your child to immediately stop accessing/using this Software Service. Your clicking “Agree” to this Policy, or your child’s use/continued use of this Software Service and submission of personal information, indicates that you agree to our collection, use, storage, sharing, transfer and disclosure of your child’s personal information in accordance with this Policy (including updated versions).

Special Notice to Children:
We recommend: Any child participating in online activities should obtain prior consent from their guardian. If you are a child, please notify your guardian to read this Policy together, and seek your guardian’s consent and guidance before you use this Software Service and submit personal information. Your clicking “Agree” to this Policy, or your use/continued use of this Software Service and submission of personal information, indicates that you have obtained your guardian’s permission, and your guardian agrees to our collection, use, storage, sharing, transfer and disclosure of your personal information in accordance with this Policy (including updated versions).

This Policy applies to our activities of collecting, using, storing, sharing, transferring and disclosing children’s personal information through the network within the People’s Republic of China. When children use the services of this Software, guardians agree to accept the protection of this Policy as well as the specific children’s personal information protection rule clauses (if any, hereinafter referred to as “specific clauses”) issued by us in that individual service. In this case, both the specific clauses and this Policy shall be simultaneously effective on guardians and children. If there are inconsistent provisions of the same type between the specific clauses and this Policy, the specific clauses shall prevail within the scope of their constraint. If a certain individual service provided by us is not applicable to this Policy, the service will expressly exclude the application of this Policy in an appropriate manner.

After reading this Policy, if you have any questions about this Policy or matters related to this Policy, you may contact us through the feedback channels listed in the “How to Contact Us” section of this Policy, and we will respond as soon as possible.

This Policy will help you understand the following:
I. How we collect and use children’s personal information
II. How we use COOKIES and similar technologies
III. Children’s personal information we may share, transfer or disclose
IV. How we store and protect children’s personal information
V. How to manage children’s personal information
VI. Third-party services
VII. Notices and amendments
VIII. How to contact us

I. How we collect and use children’s personal information
The privacy policy of this Software sets forth our usual personal information collection practices. We will collect and use the following types of children’s personal information after obtaining the consent of their guardians for the following purposes:

  1. Complete registration and login
    To facilitate our provision of services, children need to provide basic registration or login information and create a Software Service account, username and password. In some individual services, if only basic services such as browsing and searching are needed, children do not need to register as users of this Software or provide the above information. Registration requires binding a mobile phone number. After registration, children can log in through their mobile phone number or third-party accounts supported by this Software. Third-party accounts supported by this Software are generally WeChat.

During the registration and login process of some individual services, if children provide other additional information (such as nickname, gender, native place, date of birth, avatar, hobbies and interests), it will help us provide personalized recommendations and better service experience, but if this information is not provided, it will not affect their use of the basic functions of this Software Service. At the same time, in accordance with the real-name requirements of relevant laws and regulations or the needs of specific functions and services, we may need children and/or guardians to provide other information (such as name, ID card, household register, passport or other identity proof information). If the above information is not provided, we will not be able to provide the relevant functions and services to them.

  1. Provide products or services
    The children’s personal information we collect and use is a necessary condition for providing this Software Service to children. If relevant information is missing, we will be unable to provide the core content of this Software Service to them, for example:
    (1) When children use this Software Service, upload and/or publish information and conduct related behaviors (such as publishing task content), we will collect the information uploaded, published or formed by children, and have the right to display children’s nicknames, avatars and published content;
    (2) If children participate in irregularly held activities in this Software and the relevant activities involve prizes, in order to facilitate the provision of prizes to children, we may need children to provide recipient personal identity information, name, delivery address, postal code, recipient, contact phone number. If such information is refused to be provided, we will be unable to provide delivery to them. Before participating in such activities and providing information to us, children need to ensure that they have obtained the authorization and consent of their guardians;
    (3) When children contact us, we may save children’s communication/call records and content or contact information left by children, in order to contact children or guardians or help them solve problems, or record the handling plans and results of related problems;
    (4) In order to provide children with page displays and personalized content recommendations that better fit their needs or are appropriate for their age, conduct user profiling, understand product compatibility, and identify account abnormal status, we may collect information about the services used by children and how they use them and correlate this information, including:
    Log information: When children use this Software Service, we may automatically collect detailed usage of this Software Service by children and save it as relevant network logs. For example, children’s login accounts, search query content, IP addresses, browser types, telecom operators, network environment, language used, access date and time, web browsing records accessed, Push opening records, dwell time, refresh records, publishing records, following, subscriptions, favorites and sharing.
    Device information: We may receive and record information about the device used by children (such as device model, operating system and version, client version, device resolution, package name, device settings, processes and software lists, software and hardware characteristic information), device location information (such as IP address, GPS location and WLAN access points, Bluetooth and base station sensor information that can provide relevant information) based on the specific permissions granted by children during software installation and use.
    Here, we specially inform you:单独 device model and other device information, operation time and other log information cannot identify specific children’s identity. If we combine this type of non-children personal information with other information to identify specific children’s identity, or combine it with children’s personal information, then during the combined use, this type of non-children personal information will be regarded as children’s personal information. Except with guardian authorization or other provisions of laws and regulations, we will anonymize and de-identify this type of children’s personal information.
    (5) Children’s personal information collected by us through indirect means: We may obtain relevant information authorized for sharing by children from affiliated parties and third-party partners. For example, we may obtain account information authorized for sharing by children from third parties (including username, avatar, nickname) and, after guardians agree to this Policy, bind children’s third-party accounts with their Software Service accounts, so that children can directly log in and use our products and/or services through third-party accounts. We will collect and use this children’s information in compliance with relevant laws and regulations, and based on agreements with affiliated parties or third-party partners, and being convinced that the source of the information they provide is legal.
    (6) Based on the information provided to us by children above, the information we may collect and the children’s information collected by us through indirect means, we may conduct recommendation algorithm modeling, programmatic advertising recommendation algorithm modeling, user behavior analysis and user profiling based on the combination of one or more of the above information, in order to provide children with page displays and personalized content recommendations that better fit their needs or are appropriate for their age.
  2. Push messages
    (1) Display and push products or services to children. We may use children’s information (such as browsing and search records, device information, location information) to extract their browsing, search preferences, behavioral habits, location information related characteristics, and send information that fits their needs or is appropriate for their age through SMS or other means based on characteristic tags, to provide or promote our or third-party products and services that may be related to them.
    (2) Send notices to children. We may send service-related notices to children when necessary (for example, when we suspend a certain individual service due to system maintenance, change, or terminate providing a certain individual service).
    If children and guardians do not wish to continue receiving messages pushed by us, they may request us to stop pushing, for example: requesting us to stop sending promotional SMS according to SMS unsubscribe guidance, or setting on mobile devices to no longer receive messages pushed by us; except where we send messages according to legal provisions or individual service agreement provisions.
  3. Security assurance
    To improve the security of children using services provided by us and our partners, protect children or other users or the public from infringement of personal and property safety, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, more accurately identify situations that violate laws and regulations or this Software Service related agreement rules, we may collect, use or integrate children’s account information, transaction information, device information, log information as well as information authorized or legally shared by our affiliated companies and partners, to comprehensively judge children’s account risk, conduct identity verification for children and/or guardians, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.
  4. Improve our services
    We may use the information collected through a certain Software Service for our other services. For example, information collected when children use a certain Software Service may be used in another Software Service to provide specific content to them or display information related to them rather than universally pushed information; we may let guardians and children participate in surveys related to this Software Service to help us improve existing services or design new services.
  5. Other uses
    After collecting children’s personal information, we may de-identify the data through technical means. De-identified information cannot identify the identity of specific children. In this case, we have the right to use the de-identified information, analyze the user database and use it commercially without separately obtaining the consent of guardians.

If we intend to use children’s personal information for other purposes not set out in this Policy or additionally collect other children’s personal information not mentioned, we will separately obtain the consent of guardians through page prompts, interaction processes, website announcements or other means. Once agreed or continued use of our services, such additional uses will be deemed part of this Policy, and such additional information will also be subject to this Policy.

  1. Exceptions to obtaining authorized consent
    According to relevant laws and regulations, the following situations do not require obtaining the authorized consent of guardians to collect children’s information:
    (1) Related to national security and national defense security;
    (2) Related to public safety, public health, and major public interests;
    (3) Related to criminal investigation, prosecution, trial and judgment execution;
    (4) Out of the need to safeguard the vital legitimate rights and interests such as life and property of the information subject or other individuals, but it is difficult to obtain the consent of the guardian himself;
    (5) The collected information is information that children or guardians have voluntarily made public to the public;
    (6) Collecting information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels;
    (7) Necessary for signing contracts at the request of guardians;
    (8) Necessary for maintaining the safe and stable operation of this Software Service, for example, discovering and disposing of product or service faults;
    (9) Information automatically retained and processed by computer information systems and unable to identify that the retained and processed information belongs to children’s personal information;
    (10) Necessary for academic research institutions to conduct statistics or academic research based on public interests, and when providing academic research or descriptive results to the outside, de-identifying the information contained in the results;
    (11) Other situations stipulated by laws and regulations.
  2. Requirements for some individual services
    Some individual services may require children to enable specific access permissions (such as location information, camera, photo album, microphone, contacts and/or calendar) on their devices to achieve the collection and use of information involved by these permissions. When children and guardians need to close this function, most mobile devices will support this need. For specific methods, please refer to or contact the device’s service provider or manufacturer. When any permission is enabled on the device and the permission request in this Software is agreed to, it represents that guardians authorize us to collect and use relevant information to provide corresponding services to children. Once any permission is closed on the device or the authorization request is refused, it represents that guardians have canceled the authorization. We will no longer continue to collect and use relevant information based on the corresponding permission, and will also be unable to provide children with services corresponding to that permission. However, the decision to close permissions will not affect information collection and use previously conducted based on guardians’ authorization.
  3. Notice regarding personal sensitive information
    Among the children’s information provided by children or guardians or collected by us above, it may contain children’s personal sensitive information, such as communication records and content, movement tracks, etc. Please ask guardians and children to be cautious and pay attention to children’s personal sensitive information. Guardians agree that we can process children’s relevant personal sensitive information in accordance with the purposes and methods described in this Policy.

II. How we use COOKIES or similar technologies
We or our third-party partners may obtain and use user information through COOKIES or similar technologies and save this information as log information. This part mainly occurs during the process of you using third-party browsers to log in and browse this Software’s mobile website.

Through the use of COOKIES, we provide users with a simple, easy and personalized network experience. COOKIES enable us to serve users better and faster, and make users’ experience on this Software Service more personalized. However, users should be able to control whether and how COOKIES are accepted by browsers. Users can refer to the files that come with their browsers for more information in this regard. We and third-party partners may collect and use user information through COOKIES or similar technologies and save this information.

There may be COOKIES or similar technologies placed by advertisers and other partners on this Software Service. These COOKIES and/or similar technologies may collect non-personally identifiable information related to children to analyze how users use these services, send children advertisements they may be interested in or that are appropriate for their age, or to evaluate the effectiveness of advertising services. These third-party COOKIES or similar technologies are not constrained by this Policy when collecting and using this information, but are constrained by their own information protection statements. We do not assume responsibility for third-party COOKIES or similar technologies. Guardians and children can refuse or manage COOKIES or similar technologies through browsers or user selection mechanisms. However, if COOKIES or similar technologies are disabled, related services may also not be available. For example, after disabling COOKIES, the “remember user name” function may not be available, but it does not affect normal access to the website.

III. Children’s personal information we may share, transfer or disclose
(I) Sharing
Except in the following situations, without the consent of guardians, we will not share children’s personal information with any third party other than this Software:

  1. Provide our services to children. We may share children’s information with partners and other third parties to realize the functions of our products and/or services, so that children can normally use the services they need. For example, in the process of logging in with a bound mobile phone number, third-party service providers need to obtain relevant device information to provide SMS verification services;
  2. Necessary sharing with affiliated parties. To facilitate us providing consistent services to children based on a unified account system and facilitate their unified management, personalized recommendations, and safeguard system and account security, children’s personal information may be necessarily shared between us and our affiliated parties;
  3. Achieving the purposes stated in Section 1 “How we collect and use children’s personal information” of this Policy;
  4. Fulfilling our obligations in this Policy or other agreements reached with children and guardians and exercising our rights;
  5. Within the scope permitted by laws and regulations, in order to comply with the law, safeguard our and our affiliated parties or partners, children, guardians or other Software users or social public interests, property or security from damage, for example, to prevent fraud and other illegal activities and reduce credit risks, we may exchange information with other companies and organizations. However, this does not include information sold, rented, shared or disclosed in other ways for profit purposes in violation of the commitments made in this Policy;
  6. Responding to children’s legitimate needs or with the authorization and consent of guardians;
  7. Responding to legitimate requests of guardians;
  8. Provided according to individual service agreements (including electronically signed online agreements and corresponding platform rules) or other legal documents;
  9. Provided based on social public interests that comply with laws and regulations.

We will only share children’s personal information for legitimate,正当, necessary, specific and clear purposes. We will conduct security assessments on companies, organizations and individuals with whom we share personal information, and sign strict confidentiality agreements with them, requiring them to process information in accordance with our instructions, this Policy and any other relevant confidentiality and security measures.

(II) Transfer

  1. With the continuous development of our business, we may conduct mergers, acquisitions, asset transfers or similar transactions, and children’s information may be transferred as part of such transactions. We will conduct security assessments and require new companies, organizations that hold children’s personal information to continue to be bound by this Policy, otherwise, we will require that company, organization to re-obtain authorization and consent from guardians.
  2. After obtaining the consent of guardians, we will transfer children’s personal information to other parties.

(III) Disclosure
We will only disclose children’s personal information in the following situations and under the premise of taking security protection measures that meet industry standards:

  1. According to the needs of children or guardians, disclose the information they designate under the disclosure method agreed by guardians;
  2. When children’s information must be provided according to the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may disclose children’s information according to the type of information required and the disclosure method. To the extent permitted by laws and regulations, when we receive the above requests for disclosure of information, we will require the recipient to produce corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that for information requested from us, we should remain as transparent as possible within the scope permitted by law. We have carefully reviewed all requests to ensure they have a legal basis and are limited to data that law enforcement agencies have the right to obtain for specific investigation purposes.

(IV) Exceptions to obtaining authorized consent in advance when sharing, transferring, disclosing information
In the following situations, sharing, transferring, and disclosing children’s information does not require obtaining the authorized consent of guardians in advance:

  1. Related to national security and national defense security;
  2. Related to public safety, public health, and major public interests;
  3. Related to criminal investigation, prosecution, trial and judgment execution and other judicial or administrative law enforcement;
  4. Out of the need to safeguard the vital legitimate rights and interests such as life and property of children or other individuals, but it is difficult to obtain the consent of guardians;
  5. Information that children or guardians have voluntarily made public to the public;
  6. Collecting information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels.

According to legal provisions, sharing, transferring, and disclosing de-identified personal information, and ensuring that the data recipient cannot restore and re-identify the information subject, does not constitute external sharing, transfer and public disclosure of personal information. Saving and processing such data will not require separate notification to guardians and obtaining guardians’ consent.

IV. How we store and protect children’s personal information
(I) Storage
We will only store children’s personal information during the period necessary for the purposes stated in this Policy and the minimum time required by laws and regulations. If we terminate services or operations, we will promptly stop continuing to collect children’s personal information activities, and will comply with relevant laws and regulations to notify guardians in advance, and delete or anonymize children’s personal information after terminating services or operations, unless otherwise provided by laws and regulations or regulatory authorities.

Children’s personal information collected and generated in our operations within the People’s Republic of China is stored within China, except in the following situations:

  1. Laws and regulations have clear provisions;
  2. Obtaining the authorization and consent of guardians;
  3. The products and services used by children involve cross-border, and this Software needs to provide children’s personal information overseas.

For the above situations, we will conduct security assessments and ensure that sufficient protection is provided for children’s personal information in accordance with this Policy and national laws and regulations requirements.

(II) Protection
We attach great importance to children’s privacy security, have established a dedicated security team, and take all reasonably feasible measures to protect children’s personal information:
Data security technical measures
We will adopt security protection measures that meet industry standards, including establishing reasonable institutional norms and security technologies to prevent children’s personal information from unauthorized access and use, modification, and avoid data damage or loss.

We will use encryption technology (such as SSL) to encrypt and save children’s personal information, and use isolation technology for isolation.

When children’s personal information is used, such as information display, information association calculation, we will adopt multiple data desensitization technologies to enhance the security of information in use.

We will also adopt strict data access permission control and multi-factor authentication technologies to protect children’s personal information and avoid data being used in violation of regulations. All personnel accessing children’s personal information will be approved by the person in charge of children’s personal information protection or authorized management personnel, record access situations, and take technical measures to avoid illegal copying and downloading of children’s personal information.

  1. Other security measures we take to protect children’s personal information
    We manage and regulate the storage and use of children’s personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

We conduct comprehensive security control on data through information contactor confidentiality agreements, monitoring and audit mechanisms, strictly set information access permissions, and control the scope of knowledge of children’s personal information.

We will also hold security and privacy protection training courses to strengthen employees’ security awareness and understanding of the importance of protecting information.

  1. Strictly comply with the “principle of minimum authorization” and “principle of necessity”
    We take minimum authorization as a principle, only allowing Software employees and partners who need to know this information to access children’s personal information, and have set strict access permission control and monitoring mechanisms for this purpose. We also require all personnel who may come into contact with children’s personal information to fulfill corresponding confidentiality obligations. If they fail to fulfill these obligations, they may be held legally liable or their cooperative relationship with this Software may be terminated.
  2. Do not collect “irrelevant information”
    We will take all reasonably feasible measures to ensure that irrelevant children’s personal information is not collected.

Special notice: The Internet is not an absolutely secure environment, and email, instant messaging, social software or other service software and other communication methods with other users cannot determine whether they are fully encrypted. We recommend that guardians and children use complex passwords when using such tools and pay attention to protecting information security. The Internet environment is not 100% safe. We will try our best to ensure or guarantee the security of children’s personal information sent to us by guardians and children. If our physical, technical, or management protection facilities are damaged, resulting in children’s personal information being unauthorizedly accessed, publicly disclosed, tampered with, or destroyed, causing damage to children’s legitimate rights and interests, we will bear corresponding legal responsibilities.

  1. Security incident handling
    (1) Please ask guardians and children to properly protect their information and only provide it to others when necessary. Please ask guardians and children to properly keep their Software Service accounts, passwords and other identity elements. When children use this Software Service, we will identify their identity through accounts, passwords and other identity elements. Once guardians and children leak the above information, they may suffer losses and may have adverse effects on themselves. If guardians and children find that accounts, passwords and/or other identity elements may or have been leaked, please contact us immediately so that we can take corresponding measures in time to avoid or reduce relevant losses.
    (2) To cope with possible risks such as personal information leakage, damage and loss, we have formulated multiple systems, clarifying the classification and grading standards for security incidents and security vulnerabilities and corresponding handling processes. We have also established a dedicated emergency response team for security incidents. According to security incident handling specification requirements, we initiate security plans for different security incidents, conduct loss stopping, analysis, positioning, formulate remedial measures, and jointly trace and attack with relevant departments.
    (3) In the unfortunate event of an information security incident, we will notify guardians and children in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for guardians and children to autonomously prevent and reduce risks, remedial measures, etc. We will also inform guardians and children of the relevant situation of the incident by email, letter, telephone, push notification, etc. in a timely manner. When it is difficult to inform information subjects one by one, we will take reasonable and effective methods to issue announcements. At the same time, we will also take the initiative to report the handling of information security incidents in accordance with regulatory requirements.
    (4) Due to technical limitations and the limitations of risk prevention, even if we try our best to strengthen security measures, we cannot always guarantee that information is 100% safe. Guardians need to understand that the systems and communication networks used by children to access this Software Service may have problems due to circumstances beyond our control.

V. How to manage children’s personal information
(I) Guardian control and choice

  1. Update and modification of information: We encourage guardians to update and modify children’s personal information to make it more accurate and effective. Guardians and children can view and access the personal information about children collected by us through the Software Service they use, and request modification, deletion or refusal to allow further collection or use of this information. Please remember that requests to delete this information may limit children’s access to all or part of the services. We will take appropriate technical means or provide contact channels for submitting applications to ensure that guardians and children can access, update and correct children’s personal information or other information provided when using this Software Service to the greatest extent.
  2. If guardians believe that their children under the age of fourteen may have provided personal information to us, or wish to view, request deletion or prohibit further collection of information about their children, they can operate according to the specific guidelines of individual services or contact us through the feedback channels listed in the “How to Contact Us” section of this Policy for handling. We strongly recommend that guardians supervise children’s use of all digital media.

Special notice: When accessing, updating, correcting and deleting the above information, we may require guardians and/or children to conduct identity verification to ensure information security.

(II) Public and sharing
Some of our individual services allow children to not only share relevant information with their social networks but also publicly share it with all users using the service. For example, information uploaded or published by children in this Software Service, children’s responses to information uploaded or published by others, as well as location data and log information related to this information. As long as guardians and children do not delete the information they have publicly or shared, relevant information may continue to exist in the public domain; even if guardians and children delete shared information, relevant information may still be independently cached, copied or stored by other users or third parties beyond our control, or saved in the public domain by other users or such third parties. If guardians and children publicly or share information through the above channels, we are not responsible for information leakage caused thereby. Therefore, we remind and ask guardians and children to carefully consider whether to publicly or share information through the above channels.

(III) Cancellation
Under the condition that the service agreement of this Software’s individual service is met and relevant national laws and regulations stipulate, children’s this Software Service account may be canceled or deleted, and children or their guardians can also choose to cancel the account in the application. After the account is canceled or deleted, all service materials and data under that individual service related to the account will be deleted or processed according to the service agreement of the individual service, unless otherwise provided by laws and regulations.

(IV) Change the scope of authorized consent
Guardians and children can always choose whether to disclose information. Some information is necessary to use this Software Service, but the provision of most other information is voluntary. Guardians and children can change the scope of their authorization for us to continue collecting information or withdraw their authorization by deleting information, turning off device functions, etc.

When guardians and children withdraw their authorization, we cannot continue to provide services corresponding to the withdrawal of authorization, and will no longer process corresponding information. However, the decision to withdraw authorization will not affect information processing previously conducted based on the authorization of guardians and children.

VI. Third-party services
This Software Service may link children to third-party provided social media or other services (including websites or other service forms). Including:
Children can use the “Share” button to share certain content to third-party services, or children can use third-party services to log in to this Software Service. These functions may collect children’s information (including log information) and may place COOKIES on children’s computers, thereby normal operation of the above functions;

  1. We provide links to children through advertising or other means of our services, so that children can link to third-party services or websites; and
  2. Other situations of accessing third-party services. For example, to achieve the purposes stated in this Policy, we may access third-party SDK services and share certain children’s personal information collected by us in accordance with this Policy with such third parties to provide better customer service and user experience.
    This Software third-party SDK list: Click to view
    Such third-party social media or other services are operated by relevant third parties. Children’s use of such third-party social media services or other services (including any information children provide to such third parties) is subject to third parties’ own service terms and information protection statements (rather than this Policy). Guardians and children need to carefully read their terms. This Policy only applies to the personal information we collect and does not apply to any services provided by third parties or third parties’ information use rules. If guardians and children find that such third-party social media or other services have risks, it is recommended to terminate related operations to protect children’s legitimate rights and interests.

VII. Notices and amendments
In order to provide better services, we may amend the provisions of this Policy from time to time according to the update status of products or services and relevant requirements of laws and regulations. Such amendments constitute part of this Policy. If such updates result in a substantial reduction or material change in the rights of guardians and children under this Policy, we will notify through website announcements, push notifications, pop-up prompts or other means before this Policy takes effect. If guardians do not agree to such changes, they can choose to stop using this Software Service; if children still continue to use this Software Service, it indicates that guardians have fully read, understood and agreed to be bound by the revised this Policy.

Any of our amendments will put user satisfaction first. We encourage guardians and children to review this Policy every time they use this Software Service.

We may issue service-related announcements when necessary (for example, when we suspend a certain service due to system maintenance). Guardians and children may not be able to cancel these service-related announcements that are not promotional in nature.

VIII. How to contact us
We have established a full-time personal information protection department and designated a dedicated person in charge of children’s personal information protection, and will strictly protect children’s personal information in accordance with this Policy. If guardians and children have complaints and reports about network information security, or have any questions, comments or suggestions on matters related to this Policy, this Software’s children’s personal information protection rules and measures, please contact us at any time. The contact information of our personal information protection person in charge is: lovemoapp@gmail.com

Generally, we will reply within 15 days of receiving questions, comments or suggestions and verifying the identity of guardians and/or children.