DTX-Lite 2025 软件下载

我们只研究技术做好工具!

用户工具

站点工具


privacy_en

Privacy Policy

This project respects and protects the personal privacy rights of all service users

In order to provide you with accurate and personalized services, we will use and disclose your personal information in accordance with the provisions of this privacy policy. But we will treat this information with a high degree of diligence and prudence. Unless otherwise specified in this privacy policy, we will not disclose or provide this information to third parties without your prior permission.

This privacy policy will help you understand the following content:

1. What information will the platform collect and the necessity of collecting this information

2. How the platform will use this information

3. Your right to control personal information

4. How to update the privacy policy

5. Personal information security protection for children

6. How to contact us

1. Information type and purpose

In order to provide corresponding services, the “information to be collected” and “information not to be collected” are arranged as follows

1.1 Basic registration and login information

The platform will obtain your phone number, nickname, MAC address, Android ID to identify you

1.2 Access permissions to photos, media content, and files on the device

During the use of this software, it is necessary to download media and data files from the network and store these files on the local device. If this permission is denied, the media files will not be able to be downloaded and played

1.3 Permission to obtain location information

Low power Bluetooth MIDI connection technology relies on this permission to achieve wireless wave directional transmission, which is a necessary permission for Bluetooth connection. The program must obtain this permission to use Bluetooth functionality.

1.4 Log information

During the user's use of this software, the software will moderately record the user's usage (such as the score of a single practice session, etc.) to record the user's practice results, and anonymize it.

1.5 Network Access Permissions

During the use of this software, it will interact with the server to obtain data, so the software operation depends on network access permissions.

1.6 Obtain Application List

During the update process, this software may access your application list to obtain information related to itself.

1.7 Do not collect personal information of children

This project does not collect, store, or use any personal information of children. Minors using this software must be accompanied and supervised by adults (see clause 5).

2. Information usage

We will not provide, sell, rent, share or trade your personal information to any unrelated third party, unless we have obtained your permission in advance, or if such third party and our company provide services to you individually or jointly, and after the end of such services, they will be prohibited from accessing all such information, including those they have previously been able to access. We also do not allow any third party to collect, edit, sell or disseminate your personal information for free through any means. If any of our platform users engage in the above activities, we have the right to immediately terminate the service agreement with that user upon discovery. For the purpose of serving users, we may provide you with information that interests you by using your personal information, including but not limited to sending you product and service information, or sharing information with our partners so that they can send you information about their products and services (the latter requires your prior consent).

2.1 Information Disclosure

In the following circumstances, we will disclose all or part of your personal information according to your personal wishes or legal provisions:

With your prior consent, you may disclose your personal information to third parties in order to provide the products and services you require. In accordance with relevant laws or administrative or judicial requirements, if you violate Chinese laws, regulations, or our service agreements or rules, If you are an intellectual property complainant and have filed a complaint, you need to disclose it to a third party at the request of the respondent, in order for both parties to handle possible rights disputes. Other disclosures deemed appropriate according to laws, regulations, or website policies

2.2 Scope of application

When you register for this project account, the personal registration information provided according to the requirements of this project will automatically receive and record information from your browser and computer when you use the network services of this project or access the website of this project platform, including but not limited to your IP address, browser type, language used, access date and time Software and hardware feature information, as well as web page records and other data required by you. This project obtained user personal data through legal means from business partners

You understand and agree that the following information is not subject to this privacy policy:

The keyword information you entered when using the search services provided by this project. The information data collected by this project regarding your publication in this project, including but not limited to participation in activities, transaction information, and evaluation details, which violate legal provisions or project rules, and the measures taken by this project against you

2.3 Information Storage and Exchange

The information and materials we collect about you will be stored on the servers of our company and/or its affiliated companies, and these information and materials may be transmitted to your country, region, or overseas where we collect information and materials, and accessed, stored, and displayed overseas.

2.4 Information Security

This project does not require an account password to log in, but you can still record your usage information by binding your phone number. Please keep your phone number and password information safe. We will ensure that your account is not abused or altered by adding mechanisms such as SMS authentication.

2.5 Alibaba AliSDK

This project will use Alibaba SDK to provide Alipay payment related functions

3. Your right to control personal information

We attach great importance to your attention to personal information and do our best to protect your rights to access, correct, delete, and withdraw your consent to personal information, so that you have sufficient ability to protect your privacy and security. Your rights include:

3.1 Accessing and correcting your personal information

Except as required by laws and regulations, you have the right to access and correct your personal information at any time, including:

3.1.1 You can access or modify your nickname information through [User → Account Settings];

3.1.2 You can access or modify your email through [User → Account Settings]

3.2 Deleting Your Personal Information

In the following situations, you can request us to delete personal information:

3.2.1 If our handling of personal information violates laws and regulations

3.2.2 If we collect and use your personal information without your consent

3.2.3 If our handling of personal information violates our agreement with you

3.2.4 If we terminate our services and operations

If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or if these entities have obtained your independent authorization.

3.3 Change the scope of your authorized consent

You can change the scope of your authorization to continue collecting personal information or revoke your authorization by deleting information, disabling device features, or changing privacy settings in the software.

But please understand that business functions require some basic personal information to be completed. After you withdraw your consent, we will continue to provide you with the services corresponding to the withdrawal of consent or authorization, and will not process your corresponding personal information.

3.4 Respond to your above request

To ensure security, we may first require you to verify your identity before processing your request. You may need to provide a written request or other means to prove your identity. We will respond to your request within 30 days in principle. For your reasonable requests, we do not charge any fees in principle, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical.

In the following situations, according to legal requirements, we will not be able to respond to your request:

1. Directly related to national security and national defense security

2. Directly related to public safety, public health, and major public interests

3. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments

4. There is sufficient evidence to suggest that you have subjective malice or abuse of power

5. Responding to your request will result in serious damage to your or other individuals or organizations' legitimate rights and interests

6. Involving trade secrets

4. Privacy Policy Update

We will update this privacy policy from time to time. When you agree to our service usage agreement, it is deemed that you have agreed to all the contents of this privacy policy. This privacy policy is an integral part of our service usage agreement.

5. Personal information security protection for children

We attach great importance to the security of children's personal information. We promise not to collect, store, or use any personal information of children. We will take reasonable and necessary measures to protect children's personal information at the current technological level, and take measures such as physical protection, security technology, and management systems to reduce the risk of misuse, unauthorized access, disclosure, and modification. For example, we strictly limit the scope of personnel with access to personal information, sign strict confidentiality agreements with them, and if we discover potential information leakage, damage, or loss, we will immediately activate emergency plans and take remedial measures; If it causes or may cause serious consequences, we will also report to the relevant regulatory authorities and inform the affected children and their guardians of the relevant situation of the incident.

6. How to contact us

You can contact us to provide feedback on the issues you have encountered (official website www.dtx2020.com or WeChat Chadwi), and we will reply to your questions within 3 working days.

privacy_en.txt · 最后更改: 2024/02/05 01:18 由 chadwi