Updated Date: April 1, 2025
Effective Date: April 1, 2025
Privacy Policy
Dear User,
Your trust is of great importance to us. We fully understand the significance of your personal information and will take corresponding security protection measures in accordance with legal regulations to strive to keep your personal information secure and controllable. In view of this, the provider of Token Box APP services (hereinafter referred to as "we" or "us") has formulated this Privacy Policy (hereinafter referred to as "this Policy/this Privacy Policy") and would like to remind you:
We respect and protect the personal privacy rights of all users of our services. In order to provide you with more accurate and high-quality services, this application will legally use and disclose your personal information in accordance with the provisions of this Privacy Policy. Except as otherwise stipulated in this Privacy Policy, this application will not disclose such information to the public or provide it to third parties without your prior permission. This application will update this Privacy Policy from time to time. Before using the services of Token Box APP, please be sure to carefully read and thoroughly understand this Policy, and start using it only after confirming that you have fully understood and agreed to it. Your registration, login, use and other behaviors will be deemed as acceptance of this Privacy Policy and agreement to be bound by the terms of this Privacy Policy. If you do not agree with any content in this Privacy Policy, please immediately stop using or accessing our products and services.
1. Definitions
- **Token Box**: Refers to the website and Token Box client.
- **Personal Information**: Refers to various information recorded by electronic or other means that can identify a specific natural person alone or in combination with other information, or reflect the activities of a specific natural person.
- **Sensitive Personal Information**: Refers to personal information including ID card numbers, personal biometric information, property information, whereabouts, information of children under 14 years old (inclusive), etc.
- **Deletion of Personal Information**: Refers to the act of removing personal information from the systems involved in the realization of daily business functions, so that it remains in a state that cannot be retrieved or accessed.
Unless otherwise agreed, the definitions used in this Policy have the same meaning as those in the Token Box Platform Service Agreement.
2. Scope of Application
1. This Privacy Policy applies to all services provided by the Token Box platform and its affiliates, including the Token Box client, website, etc.
2. It should be specially noted that this Privacy Policy does not apply to services provided to you by other third parties. Including but not limited to the following situations:
- Information collected by third-party services accessed through our products and services;
- Information collected by other companies or institutions that provide advertising services in our products and services. Please be aware that if you provide personal information to a third party when browsing a third-party website or using a third-party product or service, your information shall be subject to the third party's privacy policy, and we shall not bear any legal liability. Please be sure to carefully read the third party's privacy policy and confirm whether you accept it at that time.
3. The "Token Box" and related services mentioned in this Privacy Policy may vary depending on factors such as the mobile phone model, system version, and software application version you use. The final products and services shall be subject to the "Token Box" software and related services used.
4. If you have any questions, opinions or suggestions about the content of this Privacy Policy, you can contact us by logging in to the "Feedback" page in the "Token Box" client.
### 3. What Information We Collect
In order to provide you with better, higher-quality and more personalized services, and strive to improve your user experience, we will collect the following information about you according to the services you use:
#### 3.1 Information You Provide to Us
We will collect information about your use of our products or services and the way you use them, which includes:
- **Device Information**: According to the specific permissions you grant during the installation and/or use of the software, we will receive and record information related to the device you use (such as device model, operating system version, device settings, unique device identifier, hardware and software characteristic information such as device environment), and information related to the device's location (such as IP address, GPS location, and sensor information such as WLAN access points, Bluetooth, and base stations that can provide relevant information). If you refuse to grant us the corresponding permissions during installation and/or use, we will not record the above corresponding information.
- **Service Log Information**: When you use the products or services provided by our website or client, we will automatically collect the detailed usage of our services by you and save them as relevant network logs. For example, search query content, IP address, browser type, telecom operator, language used, access date and time, and records of the web pages you visit, etc.
- **Other Relevant Information**: To help you better use our products or services, we will collect relevant information.
Please understand that separate device information, log information, etc., are information that cannot identify a specific natural person. Unless such non-personal information is combined with other information to identify a specific natural person, or combined with personal information for use, then during the combined use, such non-personal information will be regarded as personal information, and we will anonymize and de-identify such personal information (except in cases where your authorization is obtained or otherwise stipulated by laws and regulations).
When you contact us, in order to verify your identity and help you solve problems, we may record your conversation with us and collect other necessary information needed to solve the problem.
#### 3.2 Information We Obtain During Your Use of Services
In order to improve service quality and user experience, we will retain relevant information about your use of services and the way you use them, which includes:
- Your personal internet browsing records, including website browsing records, software usage records, click records, author information in the sharing and following functions. The above information will be stored in our server so that you can use the above functions when logging in through multiple terminals, and you can also delete this information on any client at any time.
- Your clipboard, through functions such as one-click copy to copy the official customer service's WeChat and QQ numbers.
#### 3.3 Information from Third Parties
During your registration of our account and use of services, with your authorization, we may obtain your personal information from affiliates, partners and other independent third-party sources. Such personal information includes but is not limited to your identity information, behavioral information, transaction information, device information, etc. We will aggregate such information to help us provide you with better and more personalized services or better prevent internet fraud.
The information we collect is stored in servers owned or controlled and leased by us (such as Alibaba Cloud servers).
#### 3.4 Permissions Related to Collecting Personal Information Needed During Your Use of Services
1. **READ_PHONE_STATE**
- Involved products: U-APP statistical analysis service, U-Share social sharing.
- Function description: Obtain the IMEI of the user's device, and uniquely identify the user through IMEI to provide services.
2. **WRITE_EXTERNAL_STORAGE**
- Involved products: U-Share social sharing.
- Function description: Used when sharing large images/multiple images or large files with one click between different Apps.
3. **READ_EXTERNAL_STORAGE**
- Involved products: U-Share social sharing.
- Function description: Used when sharing large images/multiple images or large files with one click between different Apps.
#### 3.5 What Information We Collect (Supplementary Content on SDK and Third-Party Information)
- **Third-party SDK and social account login function**:
To provide one-click login, social sharing, content dissemination, friend invitation and other services, we have accessed some third-party SDKs in the App, including but not limited to:
- Facebook Login SDK
- Google Sign-In SDK
- Social platform jump and invitation sharing SDK (Twitter, Facebook, Telegram, Discord, Instagram)
(1)**Scope of information collection**:
After obtaining your authorization, these third-party service providers may collect your:
- Username, avatar, email address, unique identifier of the social platform (such as ID or OpenID)
- Login authorization code (OAuth Token)
- Device information (such as device model, IP address, system version, etc.)
We only use it for user quick login, content sharing or friend invitation, and will not use the information for other purposes.
(2)**Description of use purpose**:
This information will be used for:
- Providing quick login function
- Realizing the sending of invitation links or invitations through social platforms
- Realizing one-click sharing of content to platforms such as Facebook, Twitter, Telegram, Discord, Instagram
- Identifying user identity and binding accounts
(3)**User authorization and control**:
- All login/sharing/jump operations require the user's explicit authorization and consent.
- You can log out or unbind the third-party platform authorization at any time.
- If you wish to delete relevant information, please contact us through [Online Customer Service].
(4)**Links to third-party privacy policies (it is recommended to provide them synchronously in the App)**:
- Facebook Privacy Policy: https://www.facebook.com/privacy/policy
- Google Privacy Policy: https://policies.google.com/privacy
- Twitter Privacy Policy: https://twitter.com/privacy
- Telegram Privacy Policy: https://telegram.org/privacy
- Discord Privacy Policy: https://discord.com/privacy
- Instagram Privacy Policy: https://privacycenter.instagram.com
(5)**Security description**:
We will not use such information for user profiling, advertising push, etc., nor will we share or sell such information. All third-party SDKs comply with the "Data Minimization Principle" and Google Play compliance standards, and the access purpose, data scope, and processing methods have been strictly restricted.
### 4. How We Use the Collected Information
We strictly abide by the provisions of laws and regulations or use your personal information with your authorization, and mainly use it for the following purposes:
1. To provide you with the various products or services you use, and maintain and improve these services.
2. When we provide products or services, it is used for identity verification, customer service, security prevention, fraud monitoring, archiving and backup purposes to ensure the security of the products and services we provide to you.
3. To help us better understand how you use our products and services, so as to respond to your personalized needs, and provide you with services, personalized content and suggestions.
4. We may conduct de-identified research, statistical analysis and prediction on the collected information to improve the content and layout of Token Box, provide product or service support for business decisions, and improve our products and services (such as using anonymous data for machine learning or model algorithm training).
5. If we stop operating the Token Box products or services, we will promptly stop the activities of continuing to collect your personal information, notify you of the stop of operation by means of individual delivery or announcement, and delete or anonymize the personal information we hold related to the closed business.
6. If we use the information for other purposes not specified in this Policy, or use the information collected for specific purposes for other purposes, we will seek your consent in advance.
7. **Additional purpose description**: Used to realize the function of sharing invitation links through social platforms and recording user recommendation relationships through third-party SDKs. Used to provide multi-platform one-click sharing and invitation functions. Used to realize quick registration/login through the OAuth protocol to improve user experience.
### 5. How We Share or Disclose Information
#### 5.1 Sharing
We will not share your personal information with companies, organizations and individuals other than the provider of Token Box services, except in the following cases:
1. **Sharing under legal circumstances**: We may share your personal information in accordance with the provisions of laws and regulations, the needs of litigation dispute resolution, or the requirements of administrative and judicial organs in accordance with the law.
2. **Sharing with explicit consent**: After obtaining your explicit consent, we will share your personal information with other parties.
3. **Sharing at your active choice**: When you purchase goods or services through the Token Box platform, we will share the necessary information related to the reward task with the provider of the relevant goods or services according to your choice to realize your reward service needs.
4. **Sharing between affiliates**: To facilitate us to provide you with products and services based on the Token Box platform account, recommend information that may be of interest to you, identify abnormal platform accounts, and protect the personal and property safety of Token Box users or the public from infringement, your personal information may be shared with our affiliates and/or their designated service providers. We will only share necessary personal information, and it is subject to the purposes stated in this Privacy Policy. If we share your sensitive personal information or change the purpose of use and processing of personal information, we will seek your authorization and consent again.
5. **Sharing with authorized partners**: We may entrust authorized partners to provide you with certain services or perform functions on our behalf. We will only share your information for legal, legitimate, necessary, specific and clear purposes stated in this Privacy Policy. Authorized partners can only access the information necessary for performing their duties and must not use this information for any other purpose.
**Additional purpose description**: In the process of providing one-click login and social sharing services, we may need to share users' basic authorization information (such as OAuth login Token, public ID, avatar, nickname, etc.) with social platform partners such as Facebook, Google, Twitter, Telegram, Discord, and Instagram to complete user identity authentication or content distribution functions. The above sharing is strictly limited to the scope of required functions and processed in accordance with the minimization principle. Such sharing is subject to platform encrypted transmission and agreement constraints and will not be used for other purposes.
Currently, our authorized partners include the following types:
- **Authorized partners of analysis service type**: Unless permitted by you, we will not share your personal identity information with partners providing analysis services. We will provide these partners with information about the coverage and effectiveness of their advertisements, but will not provide your personal identity information, or we will aggregate this information so that it will not identify you personally. Such partners may combine the above information with other data they legally obtain for advertising or decision-making suggestions.
- **Suppliers, service providers and other partners**: We send information to suppliers, service providers and other partners that support our business. These supports include providing technical infrastructure services, analyzing the use of our services, measuring the effectiveness of advertisements and services, providing customer service, facilitating payments, or conducting academic research and surveys.
We will agree on strict data protection measures with them, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
#### 5.2 Transfer
We will not transfer your personal information to any company, organization or individual, except in the following cases:
1. **Transfer with explicit consent**: After obtaining your explicit consent, we will transfer your personal information to other parties.
2. **In the event of merger, acquisition or bankruptcy liquidation of the service provider, or other situations involving merger, acquisition or bankruptcy liquidation**: If personal information transfer is involved, we will require the new company or organization that holds your personal information to continue to be bound by this Policy; otherwise, we will require the company, organization or individual to seek your authorization and consent again.
#### 5.3 Public Disclosure
We will only publicly disclose your personal information in the following cases:
1. With your explicit consent or based on your active choice, we may publicly disclose your personal information.
2. If we determine that you have violated laws and regulations or seriously violated the relevant agreements and rules of the Token Box platform, or to protect the personal and property safety of Token Box users or the public from infringement, we may disclose your personal information in accordance with laws and regulations or with your consent, including relevant violations and the measures taken by the Token Box platform against you. For example, if you seriously violate the Token Box platform rules due to fraudulent behavior, we may publicly disclose your certified subject information and violation situation.
#### 5.4 Exceptions to Obtaining Authorization and Consent in Advance for Sharing, Transferring, or Publicly Disclosing Personal Information
In the following cases, sharing, transferring, or publicly disclosing your personal information does not require prior authorization and consent from you:
1. Related to national security and national defense security.
2. Related to public security, public health, and major public interests.
3. Related to criminal investigation, prosecution, trial, and execution of judgments and other judicial or administrative law enforcement.
4. For the protection of your or other individuals' major legitimate rights and interests such as life and property, but it is difficult to obtain the person's consent.
5. Personal information that you have publicly disclosed to the public.
6. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
Please note that according to applicable laws, if we take technical measures and other necessary measures to process personal information so that the data recipient cannot re-identify a specific individual and cannot restore it, the sharing, transfer, and public disclosure of such processed data do not require additional notification to you and obtaining your consent.
2. We will not illegally sell or illegally provide your information to others; we will not provide such information to any third party, nor use it for any other purposes, except in the following cases:
- Disclose to a third party with your prior consent.
- Disclose to a third party or administrative or judicial organs in accordance with relevant legal provisions or the requirements of administrative or judicial organs.
- When we provide services, your information may be used for identity verification, customer service, security prevention, fraud monitoring, archiving and backup, etc., to prevent, detect, and investigate fraud, endanger safety, illegal acts, or acts that violate agreements, policies, or rules with us, to protect the legitimate rights and interests of you, other users, our affiliates, partners, and other trusted third-party suppliers, service providers, agents, and the public, and to ensure the security of the products and services we provide to you.
- We cooperate with third parties to provide you with relevant services of the Token Box platform or other network services, and such third parties agree to bear the same responsibility for protecting user privacy as us.
- Other disclosures required by laws, regulations, or policies.
### 6. How We Use Cookie, Web Beacon and Other Technologies
#### 6.1 Cookie
To ensure the normal operation of the website, provide you with a more convenient access experience, and recommend content that may be of interest to you, we will store Cookie, Flash Cookie, or other local storage provided by the browser (or associated application) that usually contains identifiers, site names, and some numbers and characters (collectively referred to as "Cookie") on your computer or mobile device. With the help of Cookie, the website can store data such as your preferences or items in your shopping cart.
If your browser or browser add-on service allows, you can modify your acceptance of Cookie or refuse our Cookie. For details, please see AboutCookies.org. However, if you do this, in some cases, it may affect your secure access to our website, and you may need to change user settings every time you visit our website.
#### 6.2 Cookie-like Technologies
In addition to Cookie, we also use other similar technologies such as web beacons, pixel tags, and ETag on the website.
ETag (entity tag) is an HTTP protocol header transmitted between the internet browser and the internet server, which can replace Cookie. ETag can help us avoid unnecessary server load, improve service efficiency, and save resources and energy. At the same time, we may use ETag to record your identity so that we can better understand and improve our products or services. Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data clearing operations in the browser settings. However, please note that if you disable ETag, you may not enjoy a relatively better product or service experience.
### 7. How You Can Manage Your Information
#### 7.1 Access, Correct, and Delete Your Personal Information
You can manage your information in the following ways: After completing the account registration and login of "Token Box" and conducting reasonable and necessary identity verification, you can check, modify, and delete the personal information you submitted to the "Token Box" software and related services (including deleting the graphics, videos you have published, modifying your nickname, avatar, etc.).
In general, you can directly delete the content you published, or click [My] at the bottom right of the client application to enter the personal center, and browse, modify, and delete the personal information you edited at any time. However, for security and identity recognition reasons, you may not be able to independently modify some initial registration information submitted during registration; if you really need to modify such information, please contact us through the WeChat service account, and the company will review the relevant issues as soon as possible, and a special person will verify your user identity and reply in a timely manner.
#### 7.2 Complaints and Reports
You can file complaints or reports in accordance with the system we publicly announce. If you believe that your personal information rights may have been infringed, or find clues of infringement of personal information rights, you can contact us by clicking "Report" to enter the user feedback interface. We will feedback your complaints and reports within 30 days after verification.
#### 7.3 Notification of Rights When Stopping Operation
If we stop operating, we will promptly stop the activities of collecting your personal information, notify you of the stop of operation by means of individual delivery or announcement, and delete or anonymize your personal information we hold.
### 8. How We Store Your Information
#### 8.1 Storage Location of Information
In accordance with the provisions of laws and regulations, we will store your personal information collected and generated during domestic operations within the territory of the People's Republic of China. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow the provisions of laws and regulations and seek your explicit consent.
#### 8.2 Storage Period
We only retain your personal information for the period necessary to provide "Token Box" and services. For example, the information such as videos, graphics, comments, and likes you publish will be retained by us during the period when you do not withdraw, delete, or cancel your account. After the necessary period, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations.
### 9. How We Protect Your Information
1. We attach great importance to the security of your personal information. We strive to take various reasonable physical, electronic, and management security measures to protect your personal information and make our best reasonable efforts to prevent your personal information from being leaked, damaged, or lost, including but not limited to SSL, encrypted storage of information, and access control of data centers. We also strictly manage employees or outsourcers who may have access to your personal information, including but not limited to measures such as controlling information access rights, signing confidentiality agreements with personnel who have access to personal information, and monitoring the operations of such personnel.
2. Despite the agreement in paragraph 1 above, please understand and be aware that due to various unpredictable or existing technologies that cannot defend against malicious means, even if we have taken necessary protection measures, your information may still be leaked, damaged, or lost. If you find that your account or password has been or is about to be leaked for any reason, you should contact us immediately so that we can take timely measures to prevent or reduce your related losses.
### 10. Protection of Minors' Personal Information
We attach great importance to the protection of minors' personal information. We recommend that minors encourage their parents or guardians to read this Privacy Policy, and recommend that minors seek the consent or guidance of their parents or guardians before submitting personal information. We protect minors' personal information in accordance with applicable regulations.
### 11. Revision of This Policy
To provide you with better services, our business will change from time to time, and this Privacy Policy will be adjusted accordingly. We will remind you of the update of relevant content by publishing the updated version on our website and mobile terminal or in other ways. Please also visit us to keep abreast of the latest Privacy Policy. In the aforementioned cases, if you continue to use our services, it means that you agree to accept the revised Policy and be bound by it.
If you have any questions about this Privacy Policy or your personal information or privacy when using our services, please contact our customer service with a full description, and we will try our best to solve it.