Privacy Policy

This policy applies only to the "FunBlocks" products or services. Last updated: December 16, 2023.

This policy will help you understand the following:

1. How we collect and use your user information

2. How we use Cookies and explain basic app permissions

3. How we share, transfer, and publicly disclose your user information

4. How we protect your user information

5. Your rights

6. How we handle children's personal information

7. How this policy is updated

8. Account closure process

9. How to contact us

We understand the importance of user information to you and will do our best to ensure the security and reliability of your user information. We are committed to maintaining your trust by adhering to principles such as the consistency of rights and responsibilities, clear purposes, choice and consent, minimum necessity, security assurance, subject participation, public transparency, etc. At the same time, we promise to protect your user information in accordance with mature industry security standards by implementing appropriate security measures.

Before using our products (or services), please read and understand this privacy policy carefully.

1. How we collect and use your user information

(1) Information collected and used during your use of our products or services

We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to the issues you encounter:

When you use our services, we may collect information that you voluntarily provide to us or that is necessary to provide services to you, including: account nickname, password, password protection options, email address, phone number, location information, device information (IMEI, OAID, IMSI, MAC), etc.

Our web application allows you to log in using your Google account. When you choose to log in with your Google account, we collect and store some basic information about you, including but not limited to:

  • Unique identifier of your Google account
  • Your name (if provided in your Google account)
  • Email address

The personal information we collect will be used to create your account, provide information sharing services, search services, anti-cheating, etc.

The information you provide will be continuously authorized for use during your use of this service. When you stop using push services, we will stop using and delete the information mentioned above. We guarantee that we will de-identify or anonymize the collected user information in accordance with the law. Information that cannot identify the personal identity of a natural person either individually or in combination with other information does not constitute personal information in a legal sense. If non-personal information is combined with other information to identify your personal identity or used in conjunction with your personal information, we will process and protect such information as your personal information according to this privacy policy during the combination period. In order to better operate and improve our technology and services, or due to changes in business strategies, when the collection, use, and processing of user information required for the products or services we provide exceeds the scope mentioned above or when we need to use the collected user information for purposes not specified in this privacy policy, or when we need to use information collected for specific purposes for other purposes, we will notify you within a reasonable period after obtaining the user information and obtain your authorization and consent.

We will only use the information you provide for user authentication to ensure your secure usage of our web application. We will not share your personal information with any third parties.

(2) Exceptions to obtaining authorization and consent

Please understand that, according to laws and regulations and relevant national standards, there are situations where we do not need to obtain your authorization and consent to collect and use your user information:

1. Directly related to national security and defense security;

2. Directly related to public safety, public health, and significant public interests;

3. Directly related to crime investigation, prosecution, trial, and execution of judgments;

4. For the purpose of safeguarding the vital legal rights such as life and property of yourself or other individuals but it is difficult to obtain the consent of the person;

5. The user information collected is publicly disclosed by yourself to the public;

6. User information collected from legally disclosed information, such as legal news reports, government information disclosure channels, etc.;

7. Necessary for signing or fulfilling contracts at your request;

8. Necessary for the secure and stable operation of software and related services, such as discovering and handling faults in software and related services;

9. Necessary for news units that are personal information controllers and are engaged in legitimate news reporting;

10. Necessary for academic research institutions to conduct statistics or academic research based on public interests, and when providing de-identified results of academic research or descriptions to the public, de-identifying the personal information contained in the results.

11. Other circumstances stipulated by laws and regulations.

2. How we use Cookies and explain basic permissions

(1) Cookies To ensure the normal operation of the website, we will store small data files called Cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of Cookies, websites can store your visit preference data.

We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete Cookies according to your preferences. Most web browsers are equipped with features to block Cookies. However, if you do so, you may need to change user settings each time you visit our website.

(2) Website beacons and pixel tags

In addition to Cookies, we will also use other similar technologies such as website beacons and pixel tags on the website. For example, emails we send to you may contain click URLs linked to our website content. If you click on the link, we will track this click to help us understand your product or service preferences and improve customer service. Website beacons are usually transparent images embedded in websites or emails. With pixel tags in emails, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

(3) Do Not Track Many web browsers have a Do Not Track feature that sends Do Not Track requests to websites. Currently, major internet standards organizations have not established relevant policies to specify how websites should respond to such requests. However, if your browser enables Do Not Track, all our websites will respect your choice.

3. How we share, transfer, and publicly disclose your user information

(1) Sharing We will not share your user information with any other companies, organizations, or individuals, except in the following cases:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your user information with other parties.

2. We may share your user information with third parties as required by laws and regulations or mandatory requirements of government authorities.

3. Sharing with affiliated companies: Your user information may be shared with our affiliated companies. We will only share the necessary user information, and it will be subject to the constraints of the purposes stated in this privacy policy. If affiliated companies need to change the processing purpose of user information, they will seek your authorization and consent again.

4. Sharing with authorized partners: Some of our services will be provided by authorized partners to achieve the purposes stated in this policy. We may share some of your user information with partners to provide better customer service and user experience. We will only share user information necessary for legitimate, legal, necessary, specific, and clear purposes, and we will only share user information necessary to provide services. To better operate and improve technology and services, you agree that we and authorized partners may use the collected information for other services and purposes under the premise of compliance with relevant laws and regulations.

For companies, organizations, and individuals with whom we share user information, we will sign strict confidentiality agreements with them, requiring them to handle user information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.

(2) Transfer We will not transfer your user information to any company, organization, or individual, except in the following cases:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your user information to other parties;

2. In the case of mergers, acquisitions, or bankruptcy liquidation, if the transfer of user information is involved, we will request the new company or organization holding your user information to continue to be bound by this privacy policy, otherwise, we will require the company or organization to re-obtain your authorization and consent.

(3) Public disclosure We will only disclose your user information in the following cases:

1. After obtaining your explicit consent;

2. Based on legal disclosure: In cases where legal procedures, litigation, or mandatory requirements of government authorities require disclosure, we may publicly disclose your user information.

(4) Exceptions to obtaining authorization and consent for sharing, transfer, and public disclosure of information Please understand that, according to laws and regulations and relevant national standards, there are situations where we do not need to obtain your authorization and consent to share, transfer, or publicly disclose your user information:

1. Directly related to national security and defense security;

2. Directly related to public safety, public health, and significant public interests;

3. Directly related to crime investigation, prosecution, trial, and execution of judgments;

4. For the purpose of safeguarding the vital legal rights such as life and property of yourself or other individuals but it is difficult to obtain the consent of the person;

5. Information publicly disclosed by yourself to the public; 6. Collected from legally disclosed information, such as legal news reports, government information disclosure channels, etc.

4. How we protect your user information

(1) We have implemented security measures that comply with industry standards to protect the user information you provide, preventing unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable measures to protect your user information. For example, when exchanging data between your browser and the "service," it is protected by SSL encryption; we also provide a secure browsing mode with https for the website; we use encryption technology to ensure the confidentiality of data; we use trusted protection mechanisms to prevent malicious attacks on data; we deploy access control mechanisms to ensure that only authorized personnel can access user information; and we conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting user information.

(2) We will take all reasonable measures to ensure that irrelevant user information is not collected. We will only retain your user information for the period required to achieve the purposes stated in this policy, unless the retention period needs to be extended or permitted by law.

(3) The internet is not an absolutely secure environment, and email, instant messaging, and other communication methods with other users are not encrypted. We strongly recommend that you do not send user information through such methods.

(4) We will regularly update and publicly disclose relevant contents of reports such as security risk and user information security impact assessment. You can obtain them through the following means: Supplementary Security Risk Public Disclosure Path

(5) The internet environment is not 100% secure, and we will do our best to ensure the security of any information you send to us. Even though we have made great efforts and taken all reasonable and necessary measures, it is still possible that your user information may be illegally accessed, stolen, tampered with, or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of the information network and voluntarily bear them.

(6) In the event of a user information security incident, we will inform you in accordance with legal requirements: the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions for your voluntary prevention and risk reduction, and remedial measures for you. We will inform you of the relevant situation through email, letters, telephone, push notifications, etc. If it is difficult to inform each user individually, we will announce it in a reasonable and effective manner. At the same time, we will also actively report the handling of user information security incidents to regulatory authorities in accordance with regulatory requirements.

5. Your Rights According to the relevant laws, regulations, standards in your region, and common practices in other countries or regions, we ensure that you can exercise the following rights regarding your user information:

(1) Access Your User Information

have the right to access your user information, except as provided by laws and regulations. If you wish to exercise the right to access data, you can do so through the following methods: Supplementary User Information Access Method If you cannot access this user information through the link above, you can always contact us using our web form or by sending an email to {company email}. We will respond to your access request within 30 days. For other user information generated during your use of our products or services, we will provide it to you as long as it does not require excessive investment on our part. If you wish to exercise the right to access data, please send an email to {company email}.

(2) Correct Your User Information

you discover errors in the user information we process about you, you have the right to request correction. You can submit a correction request through the methods listed in "(1) Access Your User Information." If you cannot correct this user information through the link above, you can always contact us using our web form or by sending an email to {company email}. We will respond to your correction request within 30 days.

(3) Delete Your User Information

the following circumstances, you can request the deletion of user information:

1. If our processing of user information violates laws and regulations;

2. If we collect or use your user information without your consent;

3. If our processing of user information violates agreements with you;

4. If you no longer use our products or services, or you have deactivated your account;

5. If we no longer provide products or services to you. We will assess your deletion request, and if it meets the relevant regulations, we will take appropriate steps to process it. When you submit a deletion request to us, we may ask you to verify your identity to ensure the security of the account. After you delete information from our service, due to applicable laws and security technologies, we may not immediately delete the corresponding information from the backup system. We will securely store your information until the backup can be cleared or anonymized.

(4) Change the Scope of Your Authorized Consent

business function requires some basic user information to be completed (see "Part One" of this policy). Regarding the collection and use of user information, you can give or withdraw your authorized consent at any time. You can operate it yourself through the following methods: Supplementary Change of User Information Access Method After you withdraw consent, we will no longer process the corresponding user information. Also, please note that revoking consent may result in certain consequences, such as our inability to continue providing you with certain services or specific features. However, your decision to revoke consent will not affect the processing of user information based on your prior authorization.

(5) User Subject Logout

can log out of the account you previously registered at any time. You can operate it yourself through the following methods: Supplementary Account Logout Operation Method After you log out of your account, we will stop providing products or services to you and, based on your request, delete or anonymize your information, except as otherwise provided by laws and regulations. This may also result in you losing access to the data in your account, so please proceed with caution.

(6) User Subject Obtains a Copy of User Information

have the right to obtain a copy of your user information. You can operate it yourself through the following methods: Supplementary User Information Copy Operation Method If technically feasible, such as data interface matching, we can also, at your request, directly transfer a copy of your user information to a third party you specify.

(7) Restrict Information System Automated Decisions

some business functions, we may make decisions based solely on non-human automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate remedies.

(8) Respond to Your Above Requests

security reasons, you may need to provide a written request or other means to prove your identity. We may ask you to verify your identity first and then process your request. We will respond within thirty days. If you are not satisfied, you can also complain through the following channels: Supplementary Other Complaint Channels For your reasonable requests, we generally do not charge fees, but for multiple repeated requests exceeding reasonable limits, we may charge certain costs as appropriate. We may refuse requests that are groundless, require too much technical means (e.g., need to develop a new system or fundamentally change current practices), pose a risk to the legitimate rights and interests of others, or are very impractical. Also, please understand that, for security reasons, legal requirements, or technical limitations, we may be unable to respond to certain requests, such as the following situations:

1. Relevant to the fulfillment of legal obligations by the user information controller;

2. Directly related to national security and defense security;

3. Directly related to public safety, public health, and major public interests;

4. Directly related to crime investigation, prosecution, trial, and execution of judgments;

5. The user information controller has sufficient evidence that the user information subject has subjective malice or abuses rights;

6. Difficult to obtain the consent of the individual concerned for the protection of the major legitimate rights and interests of the user information subject or other individuals;

7. Responding to the user information subject's request will cause serious harm to the legitimate rights and interests of the user information subject or other individuals or organizations;

8. Involving trade secrets.

6. How We Handle Children's Personal Information
attach great importance to the protection of children's personal information. Our products, websites, and services are mainly for adults. Without the consent of parents or guardians, children should not create their user accounts. Although the definition of children may vary according to local laws and customs, we consider anyone under 14 years old as a child. In cases where we collect information about child users with the consent of parents or guardians, we will only store, use, or disclose this information if allowed by law, explicitly agreed by parents or guardians, or necessary for the protection of children. Otherwise, we will try to delete the relevant data as soon as possible. Given the limitations of existing technology and business models, we find it challenging to proactively identify children's personal information. If you discover that we have collected personal information about a child without your knowledge or without obtaining verifiable consent from a guardian, you can contact us promptly. We will try to delete it promptly upon discovery. If we discover such a situation ourselves, we will also delete it promptly, except for data that legal requirements mandate us to retain.
7. How This Policy Is Updated
privacy policy may change. Without your explicit consent, we will not reduce the rights you are entitled to according to this privacy policy. We will publish any changes to this policy on this page. For significant changes, we will also provide more prominent notifications. Significant changes referred to in this policy include but are not limited to:

1. Significant changes in our service model, such as significant changes in the purpose of processing user information, types of user information processed, and the way user information is used;

2. Significant changes in our ownership structure, organizational structure, etc., such as changes in ownership caused by business adjustments, bankruptcy, and mergers and acquisitions;

3. Major changes in the main objects of user information sharing, transfer, or public disclosure;

4. Significant changes in your rights and how you exercise them in user information processing;

5. Changes in the department responsible for the security of user information, contact methods, and complaint channels;

6. User information security impact assessment reports indicate high risks. We will also archive old versions of this policy for your reference.

8. User Cancellation. Account cancellation process, if you do not want to continue enjoying the services we provide, you can contact our account specialist to cancel your account

Account cancellation conditions:

1. The account balance is zero;

2. No transaction records in the account for 30 days;

3. No unfinished transactions in the account;

Account cancellation time

Contact our account customer service specialist. If the conditions are met, the cancellation will be completed within 7 days;

Friendly reminder

After canceling your account, all records and virtual points under your account will be cleared!

9. How to Contact Us

If you have any questions, opinions, or suggestions about this privacy policy, you can contact us through the following methods:

Email: [email protected]

We have established a dedicated department for the protection of user information, and you can contact relevant personnel through the following methods: Supplementary Contact Information for User Information Protection In general, we will respond within thirty days.