Privacy Policy
NNLink is a network acceleration service product ("this Product") provided to you by Shenzhen Wendehaizhi Technology Co., Ltd. (hereinafter referred to as "NNLink" or "the Company"). NNLink highly respects your personal information and data, and we fully understand the importance of personal information to you. We will take corresponding security protection measures in accordance with relevant laws and regulations, and make every effort to protect the security and reliability of your personal information and data, as well as ensure that your personal information is secure and controllable. In view of this, the provider of NNLink acceleration service (or referred to as "we") formulates this Privacy Policy (hereinafter referred to as "this Privacy Policy") and reminds you:
When you use the services provided by us, you agree to be bound by this Policy and the specific privacy information clauses ("Specific Clauses") set forth in the respective individual services. In such cases, the Specific Clauses and this Policy shall be effective for you simultaneously. If there is any inconsistency between the Specific Clauses and this Policy regarding the same type of clauses, the Specific Clauses shall prevail within the scope of their application. If any individual service provided by us does not apply to this Policy, such service will explicitly exclude the application of this Policy in an appropriate manner.
Before using this Service, please carefully read and fully understand this Policy, especially the clauses marked in bold, which you should pay special attention to. Only use the Service after confirming that you have fully understood and agreed to this Policy. If you do not agree to the content of this Policy, it may result in the inability of this Service to operate normally or fail to achieve the intended service effect, and you should immediately stop accessing/using this Service.
This Policy will help you understand the following:
I. How We Collect and Use Your Personal Information
II. How We Use Cookies or Similar Technologies
III. Personal Information We May Share, Transfer, or Disclose
IV. How We Store, Transfer, and Protect Personal Information
V. How to Manage Your Personal Information
VI. Third-Party Services
VII. Protection of Minors
VIII. Revisions and Notifications
IX. How to Contact Us
Appendix: Regional Requirements
I. How We Collect and Use Your Personal Information
1. We will collect, use, and store the personal information you actively provide or generate during the use of NNLink in accordance with the principles of legality, legitimacy, and necessity, and for the purposes stated in this Privacy Policy. In the course of your use of NNLink services, we will collect the information you actively provide or generate through the use of the services in the following ways to provide you with services, optimize our services, and ensure the security of your account. If we use your personal information beyond the scope claimed at the time of collection and its direct or reasonable connection, we will inform you again and obtain your explicit consent before using your personal information.
Business/Function Scenarios | Personal Information Fields That May Be Collected/Types of System Permissions Obtained | Purpose of Collection/Obtainment |
Registration & Login | Name/Mobile Phone Number/Email/Dynamic Verification Code | To identify you as a NNLink user and complete the login process, thereby providing a customizable and continuous experience, and communicating with you regarding your accountTo comply with legal obligations related to account creation and maintenance, such as: ·Implementing age verification and authentication measures |
Device MAC Address, Unique Device Identifier, Network and Technical Information | To ensure the security and stability of account login and service operation, and to assist in locating and resolving service exceptions | |
Third-Party Platform Accounts | To enable quick login to NNLink services through third-party accounts, reducing the complexity of registration and login | |
Location Information | To determine your region and network operator, so as to provide you with accurate acceleration line information | |
Usage Data and Preferences, Communications with Us, Location Information | To optimize our services, provide personalized recommendations, and improve your user experience | |
Local Game Detection | Registry Information Query Permission | To identify locally installed game software that supports acceleration by reading the installation and startup paths of game applications in the registry, facilitating quick scanning and adding of games to your acceleration list, and supporting direct startup through this software |
IP Address Query Permission | To determine your region and network operator, so as to provide you with accurate acceleration line information | |
VPN Permission | To properly obtain game traffic, realize game data transmission, and provide corresponding acceleration services for specific applications or games | |
PC Game Acceleration | Current Device Information and Running Process Query Permission | To verify the legitimacy of game processes by reading the list of locally running processes to obtain game process names and signature information, and provide acceleration services for specific games |
Administrator Permission | To properly install or run game acceleration components and provide corresponding acceleration services for specific games | |
Location Information, IP Address Query Permission | To determine your region and network operator, so as to provide you with accurate acceleration line information; | |
Registry Information Query Permission | To identify locally installed game software that supports acceleration, facilitating quick scanning and adding of games to your acceleration list, and supporting direct startup through this software; | |
Local Time Reading | To verify with the system server time and assist in locating acceleration issues | |
VPN Permission | To properly obtain game traffic, realize game data transmission, and provide corresponding acceleration services for specific games; | |
Search/Download/Install Games | Storage Space Permission | To store application caches and facilitate your upload and download of files such as resources necessary for software operation |
Searched Content, Clipboard, Download History | To provide efficient search services and personalized recommendation services | |
Order Placement, Payment, and Delivery | Order Amount, Virtual Property Information, Transaction and Consumption Records | To help you successfully complete the purchase of goods/services, ensure transaction security, query order information/transaction records, and provide customer service, etc. |
Transaction Amount, Order Placement Time, Order Merchant, Order Number, Payment Method, Payment Account, Payment Status Information | To complete order payment and ensure transaction security | |
WeChat, Alipay, GooglePay, ApplePay, PayPal-related Information; | To complete the binding of WeChat/Alipay/PayPal/GooglePay/ApplePay and fund settlement | |
Customer Service, Dispute Resolution, and Self-Service | Necessary Personal Identification Information, Content of Communications with Us | To promptly feedback the results of your complaints, appeals, or inquiries |
Partial Personal Information, including but not limited to account nickname, mobile phone number, name, email, registration information, and other relevant information | To realize NNLink account information query and problem feedback | |
Game Acceleration Data | To promptly analyze and follow up on the issues you feedback |
2. We will not share or sell your information to third parties unless required by law. We may use your information to provide you with our services, improve our products, and communicate with you about important updates and offers.
3. Data Retention: We only retain personal data for as long as is reasonably necessary to achieve the purposes for which it was collected, including fulfilling any legal, regulatory, tax, accounting, or reporting obligations. If there is a reasonable possibility of a complaint or legal claim, we may retain your personal data for a longer period.
4. Data Security: We have adopted appropriate administrative, technical, and physical measures to protect your information against accidental or unauthorized loss, misuse, access, disclosure, alteration, or destruction. If we discover any unauthorized disclosure of your information, we will notify you in accordance with legal requirements and take measures to protect your information.
5. To comply with relevant laws, regulations, policies, and the requirements of relevant competent authorities, NNLink users are required to complete real-name authentication to continue using the accelerator service. We will collect your real-name identity information (including name, ID card number, passport number, etc.) with your consent or when you actively provide it. Such information is sensitive information, and refusing to provide real-name identity information may result in corresponding restrictions when using this product.
6. Exceptions to Obtaining Authorization and Consent:
According to relevant laws and regulations, we may process your information without obtaining your authorization and consent in the following circumstances:
(1) Necessary for concluding or performing a contract to which you are a party;
(2) Necessary for performing statutory duties or obligations;
(3) Necessary for responding to public health emergencies or protecting the life, health, and property safety of you or others in emergency situations;
(4) Necessary for conducting news reporting, public opinion supervision, and other acts for the public interest, and processing your personal information within a reasonable scope;
(5) Processing your personally disclosed or otherwise legally disclosed personal information within a reasonable scope;
(6) Other circumstances required by laws, regulations, and regulatory authorities.
II. How We Use Cookies or Similar Technologies
1. We or our third-party partners may obtain and use your information through Cookies or similar technologies and store such information as log information.
2. By using Cookies, we provide users with a simple, easy-to-use, and personalized network experience. A Cookie is a small amount of data sent from a web server to your browser and stored on your computer's hard drive. We use Cookies to benefit our users. For example, to make the login process of the NNLink virtual community faster, you can choose to store your username in a Cookie. This way, the next time you want to log in to NNLink's services, it will be more convenient and faster. Cookies can help us determine the pages and content you access, the time you spend on specific NNLink services, and the services you choose.
Cookies enable us to serve you better and faster, and make your experience on this service more personalized. However, you should be able to control whether and how Cookies are accepted by your browser. Please refer to the documentation that comes with your browser for more information on this.
3. We and our third-party partners may collect and use your information through Cookies or similar technologies and store such information.
4. We may use our own Cookies or similar technologies for the following purposes:
(1) Remember your identity. For example: Cookies or similar technologies help us identify you as our registered user or save your preferences or other information you provide to us;
(2) Analyze your use of our services. We can use Cookies or similar technologies to understand what activities you perform using this service or which services are most popular;
(3) Advertising optimization. Cookies or similar technologies help us provide you with ads relevant to you rather than general ad delivery based on your information.
5. While using Cookies or similar technologies for the above purposes, we may aggregate and provide non-personal identification information collected through Cookies or similar technologies to advertisers and other partners for analyzing how you and other users use this service and for advertising services. There may be Cookies or similar technologies placed by advertisers and other partners on this service. These Cookies and/or similar technologies may collect non-personal identification information related to you to analyze how users use such services, send you ads that may be of interest to you, or evaluate the effectiveness of advertising services. The collection and use of such information by these third-party Cookies or similar technologies are not subject to this Policy but to their own information protection statements, and we are not responsible for third-party Cookies or similar technologies.
6. You can refuse or manage Cookies or similar technologies through your browser or user selection mechanisms. However, please note that if you disable Cookies or similar technologies, we may not be able to provide you with the best service experience, and certain services may not function properly. At the same time, you will still receive ads, but the relevance of these ads to you will be reduced.
III. Personal Information We May Share, Transfer, or Disclose
1. We attach great importance to protecting your personal information. We will share personal data with affiliated companies, suppliers, or agents who serve us for the purposes specified in this Privacy Policy. In such cases, these companies must comply with our data privacy and security requirements. We only share information on the premise of disclosing the minimum required information.
2. To better protect the physical and mental health of minors, guide minors to surf the Internet healthily, and prevent minors from fraudulently using or borrowing relevant information of adults, we will, in accordance with the provisions of laws and regulations or the request of minors' guardians, inform their guardians of minors' relevant login accounts, login duration, consumption transaction records, and behavioral information for reminder, confirmation, and handling.
3. To improve the security of your use of NNLink services, protect the personal and property safety of you, other users, or the public, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and more accurately identify violations of laws and regulations or relevant agreement rules of NNLink. We may use or integrate your account information, device information, software usage information, and information obtained with your authorization or shared in accordance with the law to conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.
1. With the continuous development of our business, we may conduct mergers, acquisitions, asset transfers, or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization that holds your personal information to continue to be bound by this Policy; otherwise, we will require the company or organization to seek your authorization and consent again.
2. We will transfer your personal information to a third party only with your explicit consent.
1. We will disclose your personal information only in the following circumstances and on the premise of adopting security protection measures that meet industry standards:
2. Disclose the information you specify in the disclosure method explicitly agreed to by you according to your needs;
3. In cases where it is necessary to provide your information in accordance with the requirements of laws and regulations, mandatory administrative law enforcement, or judicial requirements, we may disclose your information in accordance with the required information type and disclosure method. On the premise of complying with laws and regulations, when we receive a request for such disclosure of information, we will require the recipient to issue corresponding legal documents, such as a subpoena or investigation letter. We firmly believe that the information required of us should be as transparent as possible within the scope permitted by law. We carefully review all requests to ensure they have a legal basis and are limited to data that law enforcement agencies have the legal right to obtain for specific investigation purposes.
(IV) Exceptions to Obtaining Prior Authorization and Consent for Sharing, Transferring, or Disclosing Information
In the following circumstances, sharing, transferring, or disclosing your information does not require prior authorization and consent from you:
(1) Directly related to national security and national defense security;
(2) Directly related to public security, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments and other judicial or administrative law enforcement;
(4) Necessary to protect the major legitimate rights and interests of you or others but difficult to obtain the consent of the person concerned;
(5) Information you voluntarily disclose to the public;
(6) Collecting information from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels;
(7) Related to our performance of obligations stipulated by laws and regulations.
According to legal provisions, sharing, transferring, or disclosing de-identified personal information and ensuring that the data recipient cannot recover and re-identify the information subject is not an act of external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require further notification to you and obtaining your consent.
IV. How We Store, Transfer, and Protect Personal Information
(I) Storage of Personal Information
1. We maintain main servers around the world to continuously provide you with our services globally, and your personal information may be stored in the Hong Kong Special Administrative Region.
2. Unless otherwise stipulated by laws, regulations, or regulatory authorities, we only store your personal information for the period necessary and shortest for the purposes stated in this Policy. If we terminate the service or operation, we will promptly stop continuing to collect your personal information, and at the same time, we will notify you in advance in accordance with the requirements of relevant laws and regulations, and delete or anonymize your personal information after terminating the service or operation, unless otherwise stipulated by laws, regulations, or regulatory authorities.
3. We commit to storing your personal information within a reasonable and necessary period as required by law; after the above period, we will delete your personal information or anonymize your personal information.
(II) Transfer of Personal Information
1. Our business may require us to transfer your personal data to countries outside your place of residence, which may include the People's Republic of China or other countries and regions. We will take appropriate measures to ensure that the recipient of your personal data fulfills the obligation of confidentiality and ensure the implementation of measures such as standard contractual clauses. You can obtain these clauses by contacting us.
2. Our service providers, corporate affiliates and subsidiaries, and partners are located in various countries around the world. Your personal information may be transmitted to and processed in these countries/regions, which may be different from the region where you reside. The data protection laws of these countries/regions may be different from those of your jurisdiction (and in some cases, may be less protective). These entities commit to processing information in accordance with applicable data protection laws and implementing appropriate security measures to protect your information.
(III) Protection of Personal Information
We attach great importance to information security, have established a dedicated security team, and take all reasonable and feasible measures to protect your personal information:
1. Data Security Technical Measures
We will adopt security protection measures that meet industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from being unauthorized accessed, used, modified, and avoid data damage or loss.
Our services adopt a variety of encryption technologies. For example, in certain services, we will use encryption technologies (such as SSL) to encrypt and store your personal information, and isolate it through isolation technologies to protect your personal information.
2. When Using Personal Information
For example, in information display and information correlation calculation, we will adopt a variety of data desensitization technologies to enhance the security of information during use.
We also adopt strict data access permission control and multi-factor authentication technologies to protect personal information and avoid unauthorized use of data.
3. Other Security Measures We Take to Protect Personal Information
(1) We have an industry-leading data security management system centered on data and carried out around the data life cycle, which improves the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We manage and standardize the storage and use of personal information by establishing data classification and grading systems, data security management specifications, and data security development specifications.
(2) We conduct comprehensive security control of data through information contactor confidentiality agreements, monitoring, and auditing mechanisms.
(3) We also hold security and privacy protection training courses to enhance employees' security awareness and understanding of personal information protection policies and relevant procedures.
(4) We only allow NNLink employees and partners who need to know this information to access your personal information, and have set up strict access permission control and monitoring mechanisms for this purpose. We also require all personnel who may come into contact with your personal information to fulfill corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or termination of the cooperative relationship with NNLink.
(5) The Internet is not an absolutely safe environment, and communication methods with other users such as email, instant messaging, social software, or other service software cannot be determined to be completely encrypted. We recommend that you use complex passwords when using such tools and pay attention to protecting your information security. When communicating with third parties or purchasing goods and services through this service, you will inevitably disclose your information, such as contact information or postal address, to the counterparty or potential counterparty. Please properly protect your information and only provide it to others when necessary.
(6) The Internet environment is not 100% safe, and we will do our best to ensure or guarantee the security of the personal information you send to us. If our physical, technical, or management protection facilities are damaged, leading to unauthorized access, public disclosure, tampering, or destruction of personal information and causing damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.
4. Handling of Security Incidents
To respond to potential risks such as leakage, damage, and loss of personal information, we have formulated a number of systems that clarify the classification and grading standards of security incidents and security vulnerabilities and corresponding handling processes. We have also established an emergency response team for security incidents. In accordance with the requirements of security incident handling specifications, we activate security plans for different security incidents, conduct loss prevention, analysis, positioning, formulate remedial measures, and jointly trace and combat with relevant departments. We also regularly organize internal training and emergency drills to enable our relevant staff to master corresponding emergency response strategies and procedures.
In the unfortunate event of a security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. At the same time, we will promptly inform you of the relevant situation of the incident by email, letter, phone call, push notification, etc. When it is difficult to inform each information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will take the initiative to report the handling of the information security incident in accordance with the requirements of regulatory authorities.
Please understand that due to technical limitations and limitations in risk prevention, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the system and communication network you use to access this service may have problems due to circumstances beyond our control.
Please be sure to properly keep your account, password, and other identity elements. When you use this service, we will identify your identity through your account, password, and other identity elements. Once you leak the aforementioned information, you may suffer losses and may be adversely affected. If you find that your account, password, and/or other identity elements may have been or have been leaked, please contact us immediately so that we can take corresponding measures in a timely manner to avoid or reduce relevant losses.
V. How to Manage Your Personal Information
(I) Query, Update, and Deletion
1. We encourage you to update and modify your personal information to make it more accurate and effective. We will take appropriate technical means or provide contact channels for submitting applications to ensure that you can query, update, and correct your personal information or other information provided when using this service within the time specified by relevant laws. For the information collected about you through Cookies or similar technologies, we also explain the selection mechanism provided to you in Part II of this Policy.
2. Deletion of Personal Information: Refers to the act of removing personal information from the systems involved in the realization of daily business functions, keeping it in a state that cannot be retrieved or accessed. You have the right to delete your information at any time. If you want to query, modify, or delete your information, please log in to the NNLink account center and the relevant function pages of each individual service. We provide you with relevant operation guidelines and settings, and you can operate independently. If you have doubts or difficulties during the operation, you can choose to contact us through the feedback channels listed in the chapter, and we will reply to you within 30 working days.
3. You have the right to require us to delete your personal information when the following situations occur:
(1) The purpose of processing has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose of processing;
(2) We stop providing products or services, or the retention period has expired;
(3) The individual withdraws authorization;
(4) Our processing of personal information violates laws, administrative regulations, or agreements with you;
(5) Other circumstances stipulated by laws and administrative regulations.
4. When you correct or delete your personal information or apply for account cancellation, we may not be able to correct or delete the corresponding information from the backup system immediately. We will securely store your personal information and restrict any further processing of it until the backup can be cleared or anonymized.
(II) Public Disclosure and Sharing
Many of our services allow you to publicly share your relevant information not only with your social network but also with all users of the service. For example, the information you upload or publish in this service, your responses to information uploaded or published by others, uploading or publishing your information through email or in public areas visible to unspecified users in this service, and including location data and log information related to this information. As long as you do not delete the information you disclose or share, the relevant information may remain in the public domain; even if you delete the shared information, the relevant information may still be independently cached, copied, or stored by other users or third parties not under our control, or saved by other users or such third parties in the public domain. If you disclose or share your information through the above channels, resulting in the leakage of your information, we will not be liable. Therefore, we remind you to carefully consider whether to disclose or share your information through the above channels.
1. We provide you with a way to cancel your account. Under the conditions stipulated in our service terms and relevant laws and regulations, you can contact us through the listed feedback channels, and we will help you cancel your account.
2. After you apply for account cancellation, we will review your cancellation application within 15 working days after counting the virtual assets in your account. Once approved, your account will not be recoverable.
3. After your account is canceled, we will stop providing all or part of this service for you, and delete your personal information or anonymize it in accordance with your request, unless otherwise stipulated by laws and regulations.
(IV) Changing the Scope of Your Authorized Consent
1. You can choose whether to disclose personal information to us. Some personal information is necessary for using this service, but the provision of most other information is determined by you. You can change the scope of authorization for us to continue collecting information or withdraw your authorization by deleting information, turning off device functions, canceling your account, etc.
2. After withdrawing authorization, we will no longer be able to provide you with the services corresponding to the withdrawn authorization, nor will we process your corresponding information. However, your decision to withdraw authorization will not affect the information processing carried out based on your authorization before.
(V) Restricting Automated Decision-Making by Information Systems
In certain business functions, we may make decisions only based on non-manual automated decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request us to explain, and we will also provide appropriate remedies.
(VI) Responding to Your Above Requests
For security purposes, you may need to provide a written request or prove your identity in other ways. We may first require you to verify your identity before processing your request. For your reasonable requests, we will not charge fees in principle, but for repeated requests that exceed a reasonable limit, we will charge a certain cost fee as appropriate. We may refuse requests that are unreasonably repetitive, require excessive technical means (for example, requiring the development of a new system or fundamentally changing existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes).
We will not be able to respond to your request in the following circumstances:
(1) Related to our performance of obligations stipulated by laws and regulations;
(2) Directly related to national security and national defense security;
(3) Directly related to public security, public health, and major public interests;
(4) Directly related to criminal investigation, prosecution, trial, and execution of judgments and other judicial or administrative law enforcement;
(5) We have sufficient evidence to show that you have subjective malice or abuse of rights;
(6) Necessary to protect the major legitimate rights and interests of you or others but difficult to obtain the consent of the person concerned;
(7) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(8) Involving trade secrets.
1. This service may access or link to social media or other services (including websites or other service forms) provided by third parties. Including:
(1) You can use the "Share" button to share certain content of this service to third-party services, or share third-party service content to this service. These functions may collect your information (including your log information) and may install Cookies on your device to ensure the normal operation of the above functions;
(2) We provide links to you through advertisements or other methods of our services, enabling you to link to third-party services or websites;
(3) If you register and log in to use our products through a third-party account, if you need to cancel your account, you need to apply to the corresponding third party to cancel your account or cancel the authorization to log in to our products.
1. If you are a minor under the age of 18, before using this product, you should read and agree to this Privacy Policy together under the supervision and guidance of your parents or other guardians; if you are the guardian of a minor under the age of 18, before using the relevant services, you should read and agree to this Privacy Policy on behalf of your ward.
2. We take measures to verify the user's age, require verifiable parental consent to process minors' personal information, and implement high-privacy default settings to protect children's privacy. These measures also include:
· Provide parents and guardians with service-specific privacy statements explaining what personal information we may collect, use, and disclose from their children.
· Seek verifiable parental consent to process minors' personal information in accordance with legal requirements.
· Limit the processing of minors' personal information to the reasonable and necessary scope for providing services.
· Provide parental controls to achieve visibility and fine-grained control over minors' privacy settings.
Parents and guardians may withdraw permission for further processing of their children's personal information at any time, or request us to delete the personal information related to their children's accounts collected by us by contacting us. If you believe that your child is using a service that processes their personal information without your consent, please contact us through the contact method agreed in this agreement.
3. For the purposes of this section, "minor", "child", or "children" refers to a minor who has not reached the age of digital consent required by the applicable laws of your place of residence, or other situations where there are no legal requirements appropriate to the user's behavior.
4. If you are the guardian of a minor, when you have other questions about the personal information of the minor under your guardianship, please contact us through the contact method announced in the company's Privacy Policy.
VIII. Revisions and Notifications
1. To provide you with better services, we may revise the clauses of this Policy from time to time in accordance with the update of this service and the requirements of laws and regulations. Such revisions constitute part of this Policy. We will post any changes made to this Policy on this page. For major changes, we will also provide more prominent notifications (including website announcements, push notifications, pop-up prompts, or other methods). Major changes referred to in this Policy include but are not limited to:
(1) Significant changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
(2) Significant changes in our ownership structure. Such as changes in ownership caused by business adjustments, bankruptcy and mergers, etc.;
(3) Significant changes in the main objects of personal information sharing, transfer, or public disclosure;
(4) Significant changes in your rights in participating in personal information processing and the way of exercising them;
(5) Significant changes in the responsible department, contact method, and complaint channel for personal information security processing by us;
(6) Other important situations that may seriously affect your personal rights and interests.
2. If you do not agree to such changes, you can choose to stop using this service; if you continue to use this service, it means that you have fully read, understood, and agreed to be bound by the revised Policy.
3. Any revision we make will put your satisfaction first. We encourage you to review our Privacy Policy every time you use this service.
4. We may send you service-related notifications when necessary (for example, when we suspend a single service due to system maintenance, change or terminate the provision of a single service).
5. If you do not want to continue receiving the messages we push, you can request us to stop pushing, for example: request us to stop sending promotional text messages according to the SMS unsubscription guidelines; except when we send messages in accordance with legal provisions or the service agreement of individual services.
6. We provide an English translation of the Privacy Policy. However, if there is any conflict between the English version or the local language translation and the Chinese version, the Chinese version shall prevail unless otherwise stipulated by applicable laws.
1. We have established a dedicated department for personal information protection, which will protect your personal information in accordance with this Policy. If you have complaints and losses related to network information security, or if you have any questions, opinions, or suggestions about this Policy, NNLink's privacy measures, and your information, please contact NNLink's personal information protection staff. Contact method: nnlinkservice@nnlink.com.
2. In general, we will reply to you within 15 working days after receiving your questions, opinions, or suggestions and verifying your user identity.
---
Appendix: Regional Requirements
If you are a user located in Australia, Brazil, Canada, Hong Kong Special Administrative Region, India, Macao Special Administrative Region, Singapore, Taiwan Region of China, or the United States, the clauses listed on this page under the name of your jurisdiction shall also apply to you in addition to the clauses specified in our Privacy Policy.
