Privacy Agreement

This policy only applies to XChen's Bird Chat products or services.Last updated date:2024-03-11

This policy will help you understand the following:

I. How we collect and use your user information

(1) Information collected and used by us in the course of your use of our products or services

We will only collect and use your user information for the business functions described in this Policy, and the purpose of collecting user information is to provide you with products or services, and you have the right to choose whether to provide the information or not, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services and respond to the problems you encounter: When you use our services, we are allowed to collect the information that you provide to us or necessary to provide you with services, including: nickname, profile picture, mobile phone number, location information, device information, service log information, etc. For the user information we collect, it is used to help you complete registration, protect account security, establish and manage contact relationships, and provide you with chat functions and group chat functions. The above information you provide will continue to be authorized for us to use during your use of this service. When you stop using the push service, we will stop using it and delete the above information. We guarantee that the collected user information will be de-identified or anonymized in accordance with the law, and information that cannot identify a natural person alone or in combination with other information is not personal information in the legal sense. If we combine non-personal information with other information to identify you personally, or when combined with your personal information, we will treat and protect such information as your personal information during the combined use in accordance with this Privacy Policy. In order to better operate and improve our technology and services, or due to changes in business strategies, when the collection, use, and processing of user information required for the products or services we provide exceed the above scope, or when we want to use the collected user information for other purposes not specified in this Privacy Policy, or when we want to use the information collected for a specific purpose for other purposes, we will notify you within a reasonable period after obtaining the user information or before processing the user information, and obtain your authorization and consent.

(2) Exceptions to obtaining authorization and consent

Please understand that, in accordance with laws and regulations and relevant national standards, we do not need to obtain your authorization and consent to collect and use your user information under the following circumstances: 1. Directly related to national security and national defense security; 2. Directly related to public safety, public health, or major public interests; 3. Directly related to criminal investigation, prosecution, trial and judgment enforcement; 4. For the purpose of protecting the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the person; 5. The user information collected by you is disclosed to the public by yourself; 6. Your user information collected from legally and publicly disclosed information, such as legitimate news reports, government information disclosure and other channels; 7. It is necessary to sign or perform the contract according to your requirements; 8. Necessary to maintain the safe and stable operation of software and related services, such as discovering and disposing of faults of software and related services; 9. Where the Personal Data Controller is a news unit and it is necessary for them to carry out lawful news reporting; 10. When it is necessary for academic research institutions to carry out statistical or academic research based on the public interest, and when the results of academic research or descriptions are provided to the outside world, the personal information contained in the results is de-identified. 11. Other circumstances stipulated by laws and regulations.

II. How we use cookies and similar technologies

(1) Cookies

To ensure the proper functioning of our website, we store small data files called cookies on your computer or mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. With the help of cookies, the website is able to store data about your preferences. We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can erase all cookies saved on your computer, and most web browsers have a function to block cookies. However, if you do so, you will need to change your user settings every time you visit our website.

(2) Web beacons and pixel tags

In addition to cookies, we also use other similar technologies, such as web beacons and pixel tags, on our website. For example, the e-mails we send you may contain click-through URLs that link to content on our website. If you click on the link, we will track that visit to help us understand your product or service preferences and improve customer service. A web beacon is usually a transparent image embedded in a website or email. With the help of pixel tags in emails, we know if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

(3)Do Not Track

Many web browsers have a Do Not Track feature that publishes Do Not Track requests to websites. At this time, the major Internet standards organizations do not have policies in place that govern how websites should respond to such requests. However, if Do Not Track is enabled in your browser, then all of our websites will respect your choice.

III. How We Share, Transfer, and Publicly Disclose Your User Information

(1) Sharing

We will not share your user information with any other company, organization or individual, except in the following circumstances: 1. Sharing with explicit consent: After obtaining your explicit consent, we will share your user information with other parties. 2. We may share your user information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities. 3. Sharing with our affiliates: Your user information may be shared with our affiliates. We will only share necessary user information and is bound by the purposes stated in this Privacy Policy. If the affiliate company wants to change the purpose of processing user information, it will ask for your authorization and consent again. 4. Sharing with authorized partners: For the purpose stated in this Policy, some of our services will be provided by authorized partners. We may share some of your user information with our partners to provide better customer service and user experience. We will only share your user information for legitimate, legitimate, necessary, specific and explicit purposes, and will only share the user information necessary to provide services. In order to better operate and improve the technology and services, you agree that we and our authorized partners may use the collected information for other services and purposes under the premise of complying with relevant laws and regulations.

(2) Assignment

We will not transfer your user information to any company, organization or individual, except in the following circumstances: 1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your user information to other parties; 2. In the event of merger, acquisition or bankruptcy liquidation, if the transfer of user information is involved, we will require the new company or organization that holds your user information to continue to be bound by this Privacy Policy, otherwise we will require the company or organization to seek your authorization and consent again.

(3) Public disclosure

We will only publicly disclose your user information in the following circumstances: 1. After obtaining your explicit consent; 2. Disclosure based on law: We may publicly disclose your user information under the mandatory requirements of laws, legal procedures, litigation or government authorities.

(4) Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing information

Please understand that, in accordance with laws and regulations and relevant national standards, we do not need your authorization and consent to share, transfer or publicly disclose your user information under the following circumstances: 1. Directly related to national security and national defense security; 2. Directly related to public safety, public health, or major public interests; 3. Directly related to criminal investigation, prosecution, trial and judgment enforcement; 4. For the purpose of protecting the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the person; 5. Information you disclose to the public; 6. Collected from legally and publicly disclosed information, such as lawful news reports, open government information, and other channels.

IV. How We Protect Your User Information

(1) We have used security measures that comply with industry standards to protect the user information you provide and prevent unauthorized access, public disclosure, use, modification, damage or loss of the data. We will take all reasonable and practicable measures to protect your user information. For example, data exchanged between your browser and the Service is protected by SSL encryption, we also provide https secure browsing on our website, we use encryption technology to ensure the confidentiality of data, we use trusted protection mechanisms to protect data from malicious attacks, we deploy access control mechanisms to ensure that only authorized personnel have access to user information, and we conduct security and privacy training courses to raise awareness among employees about the importance of protecting user information. (2) We will take all reasonable and practicable measures to ensure that irrelevant user information is not collected. We will only retain your user information for as long as necessary to achieve the purposes described in this policy, unless it is necessary to extend the retention period or permitted by law. (3) The Internet is not a completely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted, and we strongly recommend that you do not send user information through such means. (4) We will regularly update and disclose the relevant content of reports such as security risks and user information security impact assessments. You can obtain it in the following ways: Supplemental Security Risk Disclosure Pathway (5) The Internet environment is not 100% secure, and we will do our best to ensure the security of any information you send to us. Even if we have made great efforts and taken all reasonable and necessary measures, it is still possible that we will not be able to prevent your user information from being illegally accessed, illegally stolen, illegally tampered with or destroyed, resulting in the damage to your legitimate rights and interests. (6) In the unfortunate event of a user information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, suggestions for you to prevent and reduce risks on your own, and remedial measures for you. We will promptly inform you of the relevant circumstances of the incident by email, letter, telephone, push notification, etc., and if it is difficult to inform the user information subject one by one, we will take reasonable and effective measures to make an announcement. At the same time, we will also take the initiative to report the handling of user information security incidents in accordance with the requirements of the regulatory authorities.

V. Your Rights

In accordance with the relevant laws, regulations, and standards of the United States, as well as the common practices of other countries and regions, we protect you to exercise the following rights with respect to your user information: (1) Access to your user information You have the right to access your user information, except for exceptions provided by laws and regulations. If you want to exercise your right to access your data, you can do so yourself in the following ways: Supplemental access to user information If you do not have access to this user information through the links above, you can contact us at any time using our web form or by sending an email to {Company Email}. We will respond to your request for access within 30 days. We will provide you with other user information generated during your use of our products or services, as long as we do not need to invest too much. If you would like to exercise your right to access your data, please send an email to {company email}. (2) Correct your user information You have the right to request that we correct the user information we process about you when you find that there is an error. You may submit a request for correction in the manner listed in "(1) Access to your user information". If you are unable to correct this user information via the link above, you can contact us at any time using our web form or by sending an email to {Company Email}. We will respond to your correction request within 30 days. (3) Delete your user information You may request us to delete your user information under the following circumstances: 1. If our processing of user information violates laws and regulations; 2. If we collect and use your user information without your consent; 3. If our processing of user information violates the agreement with you; 4. If you no longer use our products or services, or you cancel your account; 5. If we no longer provide you with products or services. We will evaluate your deletion request and, if the appropriate requirements are met, we will take appropriate steps to deal with it. When you make a deletion request to us, we may ask you to verify your identity to protect the security of your account. When you delete information from our Services, we may not immediately delete the corresponding information from our backup system due to applicable legal and security technologies, and we will securely store your information until the backup can be erased or anonymized. (4) Change the scope of your authorization and consent Each business function requires some basic user information to be completed (see "Part I" of this Policy). For the collection and use of user information, you can give or withdraw your authorization and consent at any time. You can do it yourself in the following ways: Supplemental changes to the way you access user information After you withdraw your consent, we will no longer process the corresponding user information. At the same time, please note that your withdrawal of authorization and consent may lead to certain consequences, such as we may not be able to continue to provide you with corresponding services or specific functions, but your decision to withdraw your consent will not affect the previous processing of user information based on your authorization. (5) User information subjects cancel accounts You can cancel your previously registered account at any time, and you can do it yourself in the following ways: Supplement the operation method of canceling your account After the account is cancelled, we will stop providing you with products or services and delete or anonymize your information according to your requirements, unless otherwise provided by laws and regulations. This may also result in you losing access to the data in your account, so please exercise caution. (6) The user information subject obtains a copy of the user information You have the right to obtain a copy of your user information, and you can do so yourself in the following ways: Supplemental access to a copy of your user information Where technically feasible, such as data interface matching, we may also transfer a copy of your user information directly to a third party designated by you at your request. (7) Restrain the automatic decision-making of information systems In some business functions, we may only make decisions based on non-human automated decision-making mechanisms, including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will also provide appropriate remedies. (8) Respond to your above requests For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will respond within thirty days. If you are not satisfied, you can also complain through the following channels: supplement other grievance channels In principle, we do not charge a fee for your reasonable request, but we will charge a certain cost fee for repeated requests that exceed reasonable limits due to repeated requests. We may reject requests that are unreasonably repetitive, require excessive technical means (e.g., need to develop new systems or fundamentally change current practices), pose risks to the legitimate rights and interests of others, or are very impractical. Please also understand that due to security considerations, requirements of relevant laws and regulations, or technical limitations, we may not be able to respond to some of your requests, such as in the following situations: 1. It is related to the performance of the obligations stipulated by laws and regulations by the user information controller; 2. Directly related to national security and national defense security; 3. Directly related to public safety, public health, or major public interests; 4. Directly related to criminal investigation, prosecution, trial and enforcement of judgments; 5. The user information controller has sufficient evidence to show that the user information subject has subjective malice or abuses rights; 6. For the purpose of protecting the life, property and other major legitimate rights and interests of the user information subject or other individuals, but it is difficult to obtain the consent of the person; 7. Responding to the request of the user information subject will cause serious damage to the lawful rights and interests of the user information subject or other individuals or organizations; 8. Involving trade secrets.

VI. How We Process Children's Personal Information

We take the protection of children's personal information very seriously, and our products, websites and services are primarily intended for adults. Children should not create their own user accounts without parental or guardian consent. Although local laws and customs define a child differently, we consider anyone under the age of 14 to be a child. For the collection of child user information with the consent of parents or guardians, we will only store, use or publicly disclose this information as permitted by law, with the explicit consent of parents or guardians, or as necessary to protect children, otherwise we will try to delete the relevant data as soon as possible. In view of the limitations of existing technology and business models, it is difficult for us to actively identify children's personal information, if you find that we have collected children's personal information without our knowledge or without the prior consent of a verifiable guardian, you can contact us in a timely manner, and we will try to delete it in a timely manner after discovery, and if we find the aforementioned circumstances ourselves, we will also delete it in a timely manner, except for those required by law for us to retain.

VII. How your user information is stored and how it is transferred globally

In principle, user information that we collect and generate in the United States will be stored in the United States. We will only retain your user information for the purposes and purposes described in this Policy and for the shortest period stipulated by laws and regulations, and after the above retention period, we will delete or anonymize your user information in accordance with the requirements of applicable laws and regulations. We may need to retain relevant data for a longer period of time, unless otherwise provided by laws and regulations, or for the purposes of public interest, scientific and historical research, or otherwise authorized by you. Since we provide products or services through resources and servers all over the world, this means that after obtaining your authorization and consent, your user information may be transferred to or accessed from the foreign jurisdictions of the country/region where you use the products or services. Such jurisdictions may have different data protection laws, or may not have such laws at all. In such cases, we will ensure that your user information receives an adequate level of protection within the United States. For example, we may ask for your consent to the cross-border transfer of user information, or implement security measures such as data de-identification prior to cross-border data transfers.

VIII. How this Policy is Updated

Our Privacy Policy is subject to change. Without your express consent, we will not reduce your rights under this Privacy Policy. We will post any changes to this policy on this page.

For material changes, we will also provide more prominent notices (including that we may notify you by email, etc.).

The material changes referred to in this Policy include, but are not limited to:

IX. How to contact us

If you have any questions, comments or suggestions about this Privacy Policy, please contact us at:

We have set up a dedicated department for the protection of user information, and you can contact the relevant personnel in the following ways:

Generally, we will reply within 7 days.