Renewal Date: July 15, 2024
Effective Date: July 15, 2024
Welcome to use the services provided by Rizz Lines! MUZUI LIMITED (hereinafter referred to as "we") attaches great importance to the protection of your privacy and personal information. This Privacy Policy applies to your access and use of the services provided by Rizz Lines in any way.
Rizz Lines is a mobile input method application designed to enhance users' language expression and communication efficiency (hereinafter collectively referred to as "Rizz Lines products or services"). We will only process the personal information you need to use the products or services.
This Privacy Policy applies to your access to and use of our Services through Rizz Lines applications, Software Development Kits (SDKs) for third-party websites and applications, and application programming interfaces (APIs).
Rizz Lines covers multiple versions such as iOS, Android, etc. Please select the corresponding version according to the type of installed device. The type of personal information collected by Rizz Lines depends on the application version you use, device model, and features you enable.
This Privacy Policy aims to explain to you the reasons and purposes for collecting personal information and how we protect it. We will collect and use your personal information under the premise of complying with the Privacy Policy, but we will not force the collection of all your personal information solely because you agree to this Privacy Policy. We will seek your affirmative consent on specific occasions when required by law. In addition to this Privacy Policy, we may also explain to you in detail the specific rules for processing personal information through product pages, pop-ups, etc., which have the same effect as this Privacy Policy.
For Apple device users, we comply with the EULA: https://www.apple.com/legal/internet-services/itunes/dev/stdeula/ .
Unless otherwise provided by laws and administrative regulations, you have the right to know and decide how we process your personal information, including restricting or refusing us or other parties to process your personal information, and requesting us to explain the rules of personal information processing. Please read and understand this Privacy Policy carefully before using Rizz Lines and related services in order to make wise choices.
This Privacy Policy will help you understand the following:
The information we collect and its purpose of use
How we use cookies and other technologies
How we share, transfer, publicly disclose and entrust your personal information
How we store and protect your personal information
Your rights
How we handle personal information of minors
Privacy Policy Updates
How to contact us
We deeply understand the importance of personal information and are committed to protecting your information security to maintain your trust. We promise to follow the principles of consistency of rights and responsibilities, clear purpose, consent selection, minimum sufficient, ensuring security, subject participation, openness and transparency, and adopt mature security measures in the industry to protect your personal information.
We solemnly promise to implement appropriate security measures to protect your personal information in accordance with industry-recognized security standards.
We will follow the principles of legality, legitimacy and necessity when collecting and using your personal information. We process your personal information to provide you with corresponding service functions. If you provide personal information of others, please ensure that you have obtained the authorization of the individual. We reserve the right to verify the legality of the source of these personal information.
In order to achieve basic business functions such as registration login (including mobile phone number login and third-party platform login, etc.) and payment, you need to provide us with necessary personal information. If you refuse to provide this necessary information, we will not be able to provide you with corresponding services.
For your understanding, the following is a list of the business functions we provide, the processing purposes and the personal information required:
Register and login account: When you use the content provided by Rizz Lines, you need to register and log in to a Rizz Lines account. You can create an account with your mobile phone number and complete your account information. During the registration and login process, you need to provide your mobile phone number and can choose to set an account name. You can also log in to Rizz Lines with a third-party account (such as WeChat, Apple ID, Google). At this time, you authorize Rizz Lines to obtain the public information you registered with the third-party account (including nickname, avatar, and other authorized information). You can also choose to log in to Rizz Lines through "one click login", in which case the operator will process your mobile phone number information.
Usage information: This includes information such as clicks, favorites, searches, queries, and browsing generated when you use the App.
Safe operation and service improvement: In order to ensure the safe operation of the software and services, prevent your personal information from being illegally obtained, more accurately prevent fraud and protect account security, we will collect your device information, log information and other information related to the login environment. Please note that when you switch Rizz Lines to the background operation of the device, due to certain device models and systems, the information collection behavior generated when you previously used Rizz Lines may not stop immediately, which may lead to a short-term background information collection behavior.
Exceptions with prior authorization
Please note: In the following cases, the collection and use of personal information does not require your prior authorization:
Directly related to national security and national defense security.
Necessary for the conclusion and performance of a contract in which an individual is a party;
Necessary for fulfilling legal duties or obligations.
It is necessary to respond to public health emergencies or to protect the life, health, and property safety of natural persons in emergency situations.
Directly related to criminal investigation, prosecution, trial, and judgment execution.
For the protection of your or other individuals' significant legal rights and interests such as life and property, but it is difficult to obtain your consent.
Collect personal information that you disclose to the public or that has been lawfully disclosed within a reasonable range in accordance with laws and regulations;
Collect your personal information from legally disclosed information within a reasonable range in accordance with laws and regulations, such as legal coverage, government information disclosure and other channels;
Carry out coverage, public opinion supervision and other behaviors for the public interest, and process personal information within a reasonable range;
Academic research institutions that conduct statistical or academic research based on public interest need to de-identify the personal information contained in the results of academic research or descriptions when providing them to the public.
Other circumstances stipulated by laws and regulations.
The anonymization of personal information
Without publicly disclosing or providing your personal information, MUZUI LIMITED has the right to mine, analyze, and utilize the anonymization-processed user database (including commercial use), and has the right to statistics on product/service usage and share anonymization-processed statistical information with the public/third parties.
Device permission invocation
During the process of providing services, in order to ensure that you can use the product functions normally, we will apply for the following system device permissions for your device from the system. Before applying, we will seek your consent, and you can choose to "allow" or "prohibit" the permission application. After your authorization, we will activate the relevant permissions, and you can cancel the authorization at any time in the system. Canceling the authorization will prevent you from using the relevant business functions, but it will not prevent you from using other business functions.
The situation of calling system privacy permissions for various business functions is as follows:
Device permissions
Business functions
Permission authorization method
Can it be closed?
Storage
Read and write images, files, or cache information
When users use storage-related business functions for the first time, a pop-up window inquiry will appear
Yes
Read and write clipboard/clipboard
One-click Search, Keyboard Use, Enhance User Experience
When users use relevant business functions, pop-up inquiries
Yes
Phone (also known as "device information" permission on some models)
Improve and optimize the service experience to ensure the security of your account
When the user opens Rizz Lines for the first time and clicks Agree, a pop-up window asks
Yes
Wireless network
Network connection for various business functions
When the user opens Rizz Lines for the first time, a pop-up window asks
Yes
Notification
Send notification message
When the user opens Rizz Lines for the first time, a pop-up window asks
Yes
IDFA IDFA
Improve and optimize the service experience
When the user opens Rizz Lines for the first time, a pop-up window asks
Yes
You can turn on or off some or all permissions at any time through the permission settings provided by your device.
In order to refuse Rizz Lines's collection of corresponding personal information. The display and disabling methods of permissions may vary among different devices. Please refer to the instructions or guidelines of the device and system developers for details.
Other purposes for which you have agreed otherwise
When we use information for other purposes not specified in this Privacy Policy, we will seek your consent in advance. When we use information collected for specific purposes for other purposes, we will seek your consent in advance.
How we use cookies and similar technologies
Cookie and anonymous identifier tool. Cookie is a mechanism that supports server-side (or script) storage and retrieval of information on the Client. When you use Rizz Lines products or services, we will send one or more cookies or anonymous identifiers to your device. When you interact with Rizz Lines services, we allow cookies or anonymous identifiers to be sent to MUZUI LIMITED servers.
We will not use cookies for any purpose other than those described in this agreement. You can clear all saved cookies, and most web browsers have a function to block cookies. However, if you do so, you will need to personally change your user settings every time you visit our website, but you may not be able to log in or use the services or features provided by MUZUI LIMITED that rely on cookies due to such modifications.
You can clear your cookies and restrict Rizz Lines's use of cookies through "My - Clear Cache".
How we share, transfer, publicly disclose, and entrust your personal information and the third parties we access
Some of our services will be provided by authorized partners. Only for the purposes stated in this Privacy Policy, we may share some of your personal information with partners to provide a better Client Server and User Experience. We will only share your personal information for legal, legitimate, necessary, specific, and explicit purposes, and will only share personal information necessary to provide services. Unless otherwise authorized by you or required by laws and regulations, our partners have no right to use the shared personal information for any other purpose.
3.1. Sharing
We will not share your personal information with third parties other than MUZUI LIMITED unless you have given your separate consent in advance or otherwise as required by other laws and regulations, except where the processing cannot identify a specific individual and cannot be restored.
For companies, organizations and individuals with whom we share personal information, we will investigate their data security environment, sign strict confidentiality agreements with them, and require them to take confidentiality and security measures in accordance with the law to handle personal information.
We may share your personal information with the following third parties:
3.1.1 Third party product or service providers.
Rizz Lines has access to a variety of third-party services. When you use the third-party services accessed by Rizz Lines, you may need to submit your personal information. We will provide your personal information to the third party that provides you with services based on your valid authorization or when necessary to enter into or perform a contract as a party. For specific information on how third-party services collect and use your personal information, we recommend that you refer to the relevant service agreements and Privacy Policies of third-party services.
3.1.2 third parties with whom you choose to share personal information
You can use Rizz Lines's sharing function to share with WeChat friends, including but not limited to content generated by your use of the platform. Please fully consider the reputation of the information recipient before using third-party services or sharing functions, and it is recommended that you check the personal information processing rules (such as Privacy Policy) of the social network or third-party service provider you use to understand how they handle your information for prudent decision-making.
3.2. Transfer
We will not transfer your personal information to any company, organization or individual other than MUZUI LIMITED, except in the following circumstances:
Obtain your explicit authorization or consent in advance.
Meet the requirements of laws, regulations, legal procedures, or mandatory government requirements or judicial rulings.
If we or our affiliates are involved in transactions such as mergers, separations, liquidations, acquisitions or sales of assets or businesses, your personal information may be transferred as part of such transactions. We will ensure the confidentiality of such information during the transfer, inform you of the name or name and contact information of the recipient, and do our best to ensure that the new company or organization holding your personal information continues to be bound by this Privacy Policy. Otherwise, we will require the company or organization to seek your authorization again.
3.3. Public disclosure
We will only publicly disclose your personal information in the following circumstances:
Obtain your separate consent
Based on laws, regulations, legal procedures, litigation, or mandatory requirements of government authorities.
When announcing punishment for illegal accounts and behaviors, we will disclose information about the relevant accounts, which inevitably includes account-related authentication information and violations.
3.4. Exceptions to obtaining prior authorization when sharing, transferring, or publicly disclosing personal information
In the following circumstances, the sharing, transfer and public disclosure of personal information does not require the prior authorization and consent of the subject of personal information:
Directly related to national security and national defense security.
Necessary for the conclusion and performance of a contract in which an individual is a party;
Necessary for fulfilling legal duties or obligations.
Directly related to public safety, public health, and major public interests. For example, it is necessary to respond to sudden public health incidents or to protect the life, health, and property safety of natural persons in emergency situations.
Directly related to criminal investigation, prosecution, trial, and judgment execution.
For the protection of the major legitimate rights and interests of the subject of personal information or other individuals such as life and property, but it is difficult to obtain the consent of the individual;
In accordance with the provisions of laws and regulations, handle personal information that individuals have self-disclosed or other legally disclosed personal information within a reasonable range, such as legal coverage, government information disclosure channels, etc.
Where there are other provisions in laws and administrative regulations.
In order to provide you with better services, we may entrust third-party partners to process your personal information. We will only entrust third-party partners to process your information for legal, legitimate, necessary, specific, and clear purposes. We will strictly limit the information processing purposes of the entrusted party and require the entrusted party to take sufficient data security measures. If the third-party partner uses your information for purposes not entrusted by us, they will obtain your consent separately. The authorized partners we entrust include advertising and analysis service authorized partners. We will entrust these partners to process information related to advertising placement, advertising effectiveness, and advertising reach rate under the premise of complying with industry-prevailing security technologies. Without your valid authorization, we will not entrust third-party partners with information that can directly identify your personal identity. If you actively leave your contact information, address information and other personal information for specific third-party partners to contact you, they will directly process your personal information.
In the case of joint processing, we will also sign relevant agreements with partners in accordance with laws and regulations, and fulfill relevant personal information protection obligations.
3.5. Third-party Software Development Kits (SDKs) that we have access to
In order to adapt to using Rizz Lines and third-party platform services on different mobile devices, achieve one-click login with your mobile phone number, login to third-party platform accounts, share information through third-party platforms, and third-party payments, Rizz Lines has accessed third-party SDKs. The above third-party SDK providers include mobile device manufacturers, social platforms, communication operators, and third-party payment institutions. Some third-party SDKs may call your device permissions and obtain your relevant information so that you can use the corresponding functions normally on different mobile devices or third-party platforms. The types of device permissions called by different third-party SDKs and the information obtained may vary, including obtaining your location, reading/writing your external storage card, reading your phone status and identity, viewing WLAN connections, retrieving running applications, and retrieving a list of your installed applications. Regarding the specific types of device permissions called by third-party SDKs and how they collect and use your personal information, we recommend that you refer to the relevant service agreements and Privacy Policies of the third-party SDKs. If you want to further understand the third-party SDKs we have accessed, please read the third-party SDK directory.
Third-party SDK directory
WeChat SDK
Purpose of use: Support WeChat login and WeChat sharing
Usage scenario: Use WeChat login when the user logs in, and use WeChat sharing when the user logs in.
Third Party Name: Shenzhen Tencent Computer System Co., Ltd
Involving personal information: Device ID (Android such as IMEI, Android ID, Serial, iOS such as IDFV), MAC address, WLAN access point, sharing pictures or content
Third party official website: https://open.weixin.gg.com/
Privacy Policy: https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy
Information collection method: SDK collection
Alibaba Cloud Ali Cloud Aliyun
Purpose of use: to provide mobile phone number one click login function, data statistics and analysis
Usage scenario: When logging in, use one click login.
Third Party Name: Alibaba Cloud Ali Cloud Aliyun Computing Co., Ltd
Involving personal information: network status information, mobile phone number, application list information, SIM card identification code (ICCID), Device ID (iOS IDFA (IDFA), International Mobile Equipment Identity (IMEI), Open Anonymous Device Identifier (OAID), International Mobile Subscriber Identity (IMSI), SIM card serial number), application list information, base station information
Third party official website: https://www.aliyun.com/?spm=5176.sop_connect__home.J_3207526240.1.7fa62b82WeWts6
Privacy Policy: http://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud201902141711_54837.html
Umeng SDK
Purpose of use: used to collect and analyze App operation data such as user activity and new additions, and App crash and card monitoring.
Usage scenario: When the user operates the APP
Third-party name: Beijing Ruixun Lingtong Technology Co., Ltd
Involving personal information: mobile phone status and identity, obtaining location information, device information, identifiers (IMEI, Android_ID, such as IDFV, IDFA), location information
Third-party official website: https://www.umeng.com/
Privacy Policy: https://www.umeng.com/page/policy
Information collection method: SDK collection
Premium Cloud SDK
Purpose of use: To collect and analyze app operation data such as user activity and new additions.
Usage scenario: When the user operates the APP
Third-party name: Beijing Reyun Technology Co., Ltd
Involving personal information: iOS IDFA (IDFA and IDFV), Android advertiser identifier (Android ID), network interface card address (MAC), IP Address, International Mobile Equipment Identity (IMEI), running process, mobile device identification code (MEID), anonymous Device ID code (OAID), device hardware information, system information, operating environment information, risk control information
Official website: https://www.reyun.com/
Privacy Policy: https://www.reyun.com/privacyPolicy/
Information collection method: SDK collection
Alipay SDK
Purpose of use: To help users use Alipay within the application.
Usage scenario: Used when the user pays with Alipay
Third-party name: Alipay (Hangzhou) Information Technology Co., Ltd
Involving personal information: Device ID (Android such as IMEI, MEID, IMSI, Android ID, Serial, ICCID, iOS such as IDFV, IDFA), MAC address, IP address, WLAN access point
Official website: https://pay.weixin.qq.com/index.php/core/home/login?return_url=%2F
Privacy Policy: https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy
Information collection method: SDK collection
WeChat Pay SDK
Purpose of use: To help users use the WeChat system within the application
Usage scenario: Used when users use WeChat Pay
Third Party Name: Tenpay Payment Technology Co., Ltd
Involving personal information: Device ID (Android such as IMEI, MEID, IMSI, Android ID, Serial, ICCID, iOS such as IDFV, IDFA), MAC address, IP address, WLAN access point
Official website: https://pay.weixin.qq.com/index.php/core/home/login?return_url=%2F
Privacy Policy: https://pay.weixin.qq.com/index.php/core/home/pay_pact_v4
Information collection method: SDK collection
Aurora Push SDK
Purpose of use: Push messages
Third-party name: Shenzhen Hexun Huagu Information Technology Co., Ltd
Involving personal information: device parameters and system information (device type, device model, system version, and related hardware information): used to identify the user's device type, device model, system version, etc., to ensure accurate message delivery; Device ID symbols (IMEI, IDFA, Android ID, GAID, MAC, OAID, VAID, AAID, IMSI, MEID, UAID, hardware serial number information, ICCID, SIM information): used to identify unique users, ensure accurate delivery of push and accurate statistics of push information; network information (IP address, WiFi information, base station information, DNS address, DHCP address, SSID, BSSID) and location information (latitude and longitude): used to optimize the network connection request between the SDK and the Aurora server. Ensure the stability and continuity of the service, while achieving regional push function; Application list information (application crash information, notification switch status, APP application list and active status, APP application page information, APP function event related information): When a device has multiple APP push links active at the same time, we use the merge link technology to randomly merge into one link to achieve the purpose of saving power and traffic for users.
Official website: https://www.jiguang.cn/
Privacy Policy: https://www.jiguang.cn/license/privacy
Information collection method: SDK collection
Huawei push
Purpose of use: Push messages
Third party name: Huawei end point Co., Ltd
Involving personal information: basic application information, Device ID in the application, hardware information of the device, basic system information and system setting information
Privacy Policy: https://developer.huawei.com/consumer/cn/doc/development/app/20213
Information collection methods: encryption and de-identification
Xiaomi push
Purpose of use: Push messages
Third-party name: Xiaomi Mobile Software Co., Ltd
Involving personal information: Device ID symbols (such as Android ID, OAID, GAID), device information
Privacy Policy: https://dev.mi.com/console/doc/detail?pId=1822
Information collection methods: encryption and de-identification
OPPO push
Purpose of use: Push messages
Third-party name: Guangdong Huantai Technology Co., Ltd
Involving personal information: Device ID symbols (such as IMEI, SIM card serial number, IMSI, Android ID, GAID), application information (such as APP package name and version number, running status), network information (such as IP or domain connection results, current network type)
Privacy Policy: https://open.oppomobile.com/wiki/doc#id=10288
Information collection methods: encryption and de-identification
VIVO push
Purpose of use: Push messages
Third-party name: Vivo Mobile Communications Co., Ltd
Involving personal information: Device ID information
Privacy Policy: https://dev.vivo.com.cn/documentCenter/doc/366
Information collection methods: encryption and de-identification
Pangolin SDK
Purpose of use: for advertising placement cooperation, advertising attribution, anti-cheating, statistical analysis to improve performance and User Experience
Third-party name: Beijing Ocean Engine Network Technology Co., Ltd. involves personal information: device brand, model, software system version, resolution, network signal strength, device language, Acceleration Sensor, magnetic field sensor, gravity sensor, gyroscope sensor, AndroidID, IP Address, wireless network SSID name, WiFi router MAC address (BSSID), WIFI scan result, device MAC address, Device ID symbol (IMEI, MEID, IMSI, ICCID, OAID, GAID (only GMS service), device serial number build_serial, specific fields vary due to different software and hardware versions); developer application name, application package name, version number, application front and background status, application list information, running process information; advertising Interaction data such as display, click, and conversion; location information; crash data, performance data; operator information, device time zone.
Privacy Policy: https://www.csjplatform.com/privacy
Information collection methods: encryption and de-identification
China Mobile
Operating entity: China Mobile Communications Group Co., Ltd
Function: Identify the user's mobile phone number for quick login, as well as query, analysis, and risk control.
Type of personal information collected: network type, network address, operator type, local number information, SIM card status, mobile device type, mobile operating system, hardware manufacturer.
Privacy Policy: https://wap.cmpassport.com/resources/html/contract2.html
China Unicom
Operating entity: China United Network Communications Group Co., Ltd
Function: Identify the user's mobile phone number to log in quickly and achieve business risk control
Type of personal information collected: network type, network address, operator type, local mobile phone number, mobile device type, mobile operating system, hardware manufacturer.
Privacy Policy: https://opencloud.wostore.cn/authz/resource/html/disclaimer.html?spm=a2c4g.11186623.0.0.41f1633eHxMLkQ&fromsdk=true
China Telecom
Operating entity: China Telecom Group Co., Ltd
Function: Identify the user's mobile phone number to log in quickly and achieve business risk control
Type of personal information collected: network IP Address, network type, registered mobile phone number, local number, international mobile subscriber identity, application process information, network connection type, network status information, network address, operator type, mobile device type, mobile device manufacturer, mobile operating system type and version.
Privacy Policy: https://e.189.cn/sdk/agreement/detail.do?spm=a2c4g.11186623.0.0.41f1633eHxMLkQ&appKey=E_189&hidetop=true&returnUrl =
In order to provide you with better services, we may entrust third-party partners to process your personal information. We will only entrust third-party partners to process your information for legal, legitimate, necessary, specific, and clear purposes. We will strictly limit the information processing purposes of the entrusted party and require the entrusted party to take sufficient data security measures. If the third-party partner uses your information for purposes not entrusted by us, they will obtain your consent separately. The authorized partners we entrust include advertising and analysis service authorized partners. We will entrust these partners to process information related to advertising placement, advertising effectiveness, and advertising reach rate under the premise of complying with industry-prevailing security technologies. Without your valid authorization, we will not entrust third-party partners with information that can directly identify your personal identity. If you actively leave your contact information, address information and other personal information for specific third-party partners to contact you, they will directly process your personal information.
In the case of joint processing, we will also sign relevant agreements with partners in accordance with laws and regulations, and fulfill relevant personal information protection obligations.
How we store and protect your personal information
4.1. Retention period
We will keep your personal information for the period required to provide services, but if laws and regulations have other provisions on the retention period, you agree to retain it for a longer period of time, ensure the safety and quality of the service, achieve the purpose of dispute resolution, and it is technically difficult to achieve, after the expiration of the aforementioned retention period, we will extend the retention period in accordance with the law, contract, or within a reasonable range.
After the expiration of the retention period, we will delete your personal information or anonymization in accordance with the law.
4.2. Save the region
In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. If your personal information may be transferred to overseas jurisdictions in the country/region where you use products or services, or accessed from these jurisdictions, we will strictly fulfill the obligations stipulated by laws and regulations and obtain your separate consent in accordance with the law. Such jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will transfer your personal information in accordance with the current laws of China and ensure that your personal information receives sufficient and equivalent protection within the territory of the People's Republic of China. For example, we may request your consent for cross-border transfers of personal information or implement security measures such as data de-identification before cross-border data transfers.
4.3. Security measures
We will collect, use, store, and transmit user information based on the principle of "minimization", and inform you of the purpose and scope of use of relevant information through the User Agreement and Privacy Policy.
We attach great importance to information security. We have established a dedicated team responsible for researching and applying various security technologies and procedures. We conduct security background checks on the person in charge of security management and personnel in key security positions. We have established a sound information security management system and internal security incident handling mechanism. We will take appropriate security measures and technical means that comply with industry standards to store and protect your personal information to prevent its loss, unauthorized access, public disclosure, use, damage, loss or leakage. We will take all reasonable and feasible measures to protect your personal information. We will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent malicious attacks on data.
We will train and assess employees' awareness of data security and security capabilities, and strengthen their understanding of the importance of protecting personal information. We will authenticate and control the identity of employees who handle personal information, and sign Non Disclosure Agreements with employees and partners who have access to your personal information, clarifying job responsibilities and codes of conduct to ensure that only authorized personnel can access personal information. If there is any violation of the Non Disclosure Agreement, the cooperation relationship with MUZUI LIMITED will be immediately terminated, and relevant legal responsibilities will be pursued. Confidentiality requirements will also be imposed on personnel who have access to personal information when leaving their posts.
We remind you that the Internet is not an absolutely safe environment. When you interact with other users through third-party social software embedded in Rizz Lines, it is uncertain whether the third-party software fully encrypts the transmission of information. Please ensure the security of your personal information.
We also ask you to understand that in the Internet industry, due to technological limitations and rapid development, as well as various malicious attack methods that may exist, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% information security. Please understand that the systems and communication networks you use when using our products and/or services may have security issues in other links beyond our control.
According to our security management system, personal information leakage, damage or loss events are listed as the most serious security incidents, and once they occur, the company's highest level of emergency plans will be activated, and the joint emergency response team will handle them.
4.4. Security Incident Notification
We will develop cyber security emergency response plans, timely disposal of system vulnerabilities, computer viruses, network attacks, network intrusion and other security risks, in the event of cyber security threats, we will immediately activate the emergency response plan, take appropriate remedial measures, and report to the relevant competent authorities in accordance with regulations.
Personal information leakage, damage, and loss belong to major security incidents at the company level. We will be responsible for regularly organizing members of the working group to conduct security plan drills to prevent such security incidents from happening. If an unfortunate event occurs, we will activate the emergency plan according to the highest priority, form an emergency response team, trace the cause in the shortest possible time, and reduce losses.
After an unfortunate personal information security incident occurs, we will promptly inform you of the basic situation and possible impact of the security incident in accordance with the requirements of laws and regulations, the measures we have taken or will take to deal with it, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant information of the incident through in-app notifications, SMS notifications, phone calls, emails, and other contact information you have reserved. If it is difficult to inform you one by one, we will take reasonable and effective measures to issue announcements. At the same time, we will also proactively report the handling of personal information security incidents in accordance with regulatory requirements. Please understand that according to the provisions of laws and regulations, if the measures we take can effectively avoid the harm caused by information leakage, tampering, and loss, unless the regulatory authorities require us to notify you, we can choose not to notify you of the personal information security incident.
Your rights
In accordance with relevant Chinese laws, regulations, standards, and practices in other countries and regions, we guarantee that you exercise the following rights to your personal information.
6.1. Right of correction and supplementation
When you find that the personal information we process about you is incorrect or incomplete, after verifying your identity and correcting it does not affect the objectivity and accuracy of the information, you have the right to correct or supplement the incorrect or incomplete information. You can correct or supplement it by yourself through my personal information in Rizz Lines, or submit your correction or supplement application to us through feedback and error reporting.
6.2. Right to Deletion
You may request us to delete your personal information in the following circumstances:
If we process your personal information in violation of laws and regulations or agreements with you;
If our processing purpose has been achieved, cannot be achieved, or is no longer necessary to achieve the processing purpose.
If we stop providing products or services, or the retention period has expired;
If you withdraw your consent;
Other circumstances stipulated by laws and administrative regulations.
When you delete information from our service, we may not immediately delete the corresponding information in the backup system, but will delete the information when the backup is updated. Please know and understand that if the retention period stipulated by laws, administrative regulations or this Privacy Policy has not expired, or if it is technically difficult to delete personal information, we will stop processing other than storage and take necessary security measures.
6.3. Withdrawal of consent
Each business function requires some basic personal information to be completed. For the collection and use of additional personal information, you can give or withdraw your authorization at any time.
You can directly disable system permissions such as camera, storage (or photo album) in the device system, change the scope of consent, or withdraw your authorization.
After you withdraw your consent, we will no longer be able to provide you with the services corresponding to the withdrawal of consent, and will no longer use your corresponding personal information. However, your decision to withdraw your consent will not affect the personal information processing based on your consent.
6.4. Right to cancel
You can cancel the previously registered account.
You can cancel your account on Rizz Lines through the following path: [Me] - [Settings] - [Account Settings] - [Cancel Account].
When you authorize login to Rizz Lines through a third-party account (such as WeChat, Apple ID), you need to apply to the third party to cancel the account.
6.5. The right to data portability and portability
You have the right to copy your personal information collected by us. Under the conditions stipulated by laws and regulations, and in accordance with the instructions and conditions stipulated by the national cyberspace administration, if technically feasible, you can also request us to transfer your personal information to other entities designated by you.
6.6. Prior notice of product and service suspension.
Rizz Lines is willing to accompany you all the time. If the Rizz Lines product stops operating due to special reasons, we will notify you on the main page of the product or service or other appropriate ways to reach you within a reasonable period of time, and will stop collecting your personal information. At the same time, we will delete or anonymize the collected personal information in accordance with legal provisions.
6.7. The right to an explanation
You have the right to request an explanation of our rules for handling personal information. You can contact us using the contact details in Section 8.
6.8. Exceptions to the exercise of rights
We may not be able to respond to your requests for access, correction, supplementation, deletion, copying, portability, knowledge, and decision-making in the following situations:
Directly related to national security and national defense security.
Directly related to public safety, public health, and major public interests.
Directly related to criminal investigation, prosecution, trial, and execution of judgments.
We have sufficient evidence to show that you have subjective malice or abuse of rights (such as your request will endanger public safety and the legitimate rights and interests of others, or your request exceeds the scope that general technical means and commercial costs can cover).
Responding to the request of the subject of personal information will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
Involving trade secrets;
Where there are other provisions in laws and administrative regulations.
6.9. How to respond to your request for rights
To ensure security, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. After verification, we will respond within fifteen working days. You can contact us by sending an email to gasgi888@gmail.com.
We generally do not charge fees for your reasonable requests, but we will charge a certain cost for requests that are repeated multiple times and exceed reasonable limits. We may refuse requests that are unreasonably repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose a risk to the legitimate rights and interests of others, or are very impractical (such as involving information stored on backup tapes).
How we handle personal information of minors
MUZUI LIMITED attaches great importance to the protection of Juvenile information.
Our products and services are mainly for adults. We will only process personal information of minors when permitted by laws and regulations and with the consent of parents or other guardians.
If you are a Juvenile under the age of 14, before using Rizz Lines products and services, you should ask your parents or other guardians to read this Privacy Policy carefully, or jointly read this Privacy Policy under the supervision and guidance of your parents or other guardians, and use our products and services with the consent of your parents or other guardians, or provide us with information.
If we find that we have collected personal information from minors under the age of 14 without the prior consent of verifiable parents or other guardians, we will take measures to delete the relevant information as soon as possible. If at any time the guardian has reason to believe that we have collected personal information from minors without the consent of the guardian, you can send the relevant information to gasgi888@gmail.com.
Amendments to Privacy Policy
Our Privacy Policy may change.
We will not reduce your rights under this Privacy Policy without your affirmative consent. We will post any changes to this Privacy Policy on this page.
For major changes, we will notify you on the main exposure page of the product or service, in-app messages, emails, or other appropriate ways to reach you. If you do not agree to such changes, please immediately stop using Rizz Lines products and services.
The significant changes referred to in this Agreement include but are not limited to:
Our service model has undergone significant changes, such as the purpose of processing personal information, the type of personal information processed, and the way personal information is used.
We have undergone significant changes in ownership structure, organizational structure, etc., such as changes in ownership caused by business adjustments, bankruptcy mergers, etc.
Changes in the main objects of external provision, transfer or public disclosure of personal information;
Significant changes in your rights to participate in the processing of personal information and how you exercise them;
When the department responsible for handling personal information security, contact information and complaint channels change;
When the personal information security impact assessment report indicates that there is a high risk.
How to contact us
Rizz Lines's growth is inseparable from the joint efforts of various user experts. We are very grateful for your contributions to Rizz Lines's data updates and usage feedback.
You can provide feedback on your suggestions and problems encountered during the use of Rizz Lines through "My Feedback" to help us optimize product features and services, making it more convenient for more users to use our products and services.
In order to ensure that we handle your issues efficiently and provide you with timely feedback, you need to submit proof of identity, valid contact information, written requests, and relevant evidence. We will process your request after verifying your identity.
If you are not satisfied with our response, especially if you believe that our personal information processing behavior has harmed your legitimate rights and interests, you can also seek solutions through the following external channels: file a lawsuit with the people's court where our company is located.
Attached: Explanation of terms
Personal information refers to various information related to identified or identifiable natural persons recorded electronically or in other ways, excluding anonymized information. Personal information includes name, date of birth, ID number, biometric data, address, communication contact information, communication records and content, account passwords, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, etc.
Sensitive data refers to personal information that, once leaked or illegally used, can easily lead to infringement of the personal dignity of natural persons or harm to personal and property safety, including biometric identification, religious beliefs, specific identities, medical health, financial accounts, whereabouts and other information, as well as personal information of minors under the age of 14.
Device information may include device attribute information (such as hardware model, operating system version and system status, device configuration, International Mobile Equipment Identity (IMEI), International Mobile Subscriber Identity (IMSI), network device hardware address MAC, IDFA IDFA, vendor identifier IDFV, mobile device identification code MEID, Open Anonymous Device Identifier OAID, Integrated circuit card identity ICCID, Android ID, hardware serial number, etc.), device connection information (such as browser type, telecom operator, language used, WIFI information), and device status information (such as device application installation list, device sensor information).
Log information refers to the requests you make when accessing Rizz Lines automatically recorded by our server, such as your IP address, browser type and language used, hardware device information, operating system version, network operator information, the date, time, duration of your access to the service, and other information you provide, form or retain when using our products or services.
De-identification refers to the process by which personal information is processed so that it cannot identify a particular natural person without additional information.
Anonymization refers to the process of technical processing of personal information so that the subject of personal information cannot be identified and the processed information cannot be restored. The information obtained after anonymization does not belong to personal information.
Thank you again for your trust and use of Rizz Lines!
MUZUI LIMITED