Effective Date: January 1, 2025


Privacy Policy


1. Special Note

Welcome to using the DreamyDET App (hereinafter referred to as the "Product"). The provider of this product and its services (hereinafter referred to as "we" or "us") fully understands the importance of personal information to you and will make every effort to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and process your personal information in accordance with the principles of legality, legitimacy, necessity, and good faith. Therefore, we have formulated this Privacy Policy (hereinafter referred to as "this Policy") to help you fully understand how we collect, use, store, share, and transfer this information when you use the Product, as well as the methods we provide for you to access, update, delete, and protect this information.


Before using the Product, please read this Policy carefully and fully understand its terms (if you are under 18 years old, please read this agreement accompanied by your legal guardian). You can make choices you deem appropriate based on the guidance of this Privacy Policy. We have tried to use concise expressions for relevant terms involved in this Privacy Policy and provided links for further explanation to help you better understand. If you have any questions, please contact us.


This Policy will help you understand the following:

1.1. How We Collect and Use Your Personal Information

1.2. How We Use Cookies or Similar Technologies

1.3. How We Share, Transfer, and Publicly Disclose Your Personal Information

1.4. How We Protect Your Personal Information

1.5. How You Can Manage Your Personal Information

1.6. How We Handle Minors' Personal Information

1.7. How This Privacy Policy Is Updated

1.8. How to Contact Us


2. How We Collect and Use Your Personal Information

2.1. Personal information refers to various information recorded electronically or by other means related to identified or identifiable natural persons, excluding anonymized information. Sensitive personal information refers to personal information that, once leaked or illegally used, may easily infringe upon the personal dignity of natural persons or endanger personal or property safety, including biometrics, religious beliefs, specific identity, medical health, financial accounts, location tracking, etc., as well as the personal information of minors under the age of eighteen.


2.2. We will follow the principles of fairness, legality, and necessity, and for the purposes stated below in this Policy, collect and use the personal information you actively provide during your use of the Product or generated from using the Product, as well as obtain your relevant personal information from third parties. If we wish to use your personal information for purposes not stated in this Policy, or use information collected for a specific purpose for other purposes, we will inform you in a reasonable manner and obtain your consent again before use. When you cancel your account, we will stop using and delete the aforementioned information.


2.3. Situations Where You Must Authorize Us to Collect and Use Your Personal Information

2.3.1. Our Product includes some core functions. We may need to collect, store, and use the following information related to you to achieve these functions. If you do not provide the relevant information, you will be unable to enjoy the products and services we provide. These functions include:

2.3.1.1. Account Registration, Login, and Verification

When you register a Product account, you need to provide at least your intended username, password, your mobile phone number, and email address. We will verify whether your identity information is valid by sending an SMS verification code or email.

2.3.1.2. Product Purchase and Payment Function

To facilitate the delivery of goods or services to you, you need to provide us at least with the recipient's personal identity information (including name, delivery address, postal code, contact number) and payment status information as prompted. If you refuse to provide such information, we will be unable to complete the relevant delivery service.

If payment settlement occurs during your use of the Product, you can choose the payment services provided by our affiliates or third-party payment institutions cooperating with us (including payment channels such as Alipay, WeChat Pay, UnionPay, etc., hereinafter referred to as "Payment Institutions"). The payment function itself does not collect your personal information, but we need to share your order number and transaction amount information with these Payment Institutions so that they can confirm your payment instruction and complete the payment.

2.3.1.3. Customer Service Function

If you contact our customer service, we may need you to provide necessary personal information for identity verification to ensure your account security. To provide services according to your requests, with your authorization, manual customer service personnel need to query or verify your relevant information within the scope of your authorization. We will take technical and managerial measures as much as possible to protect your information security and use it within the necessary scope. We may save your contact information (mobile number, WeChat ID, QQ number, or other contact methods you use or actively provide), records and content of your communication with us, and other necessary information to provide and record customer service for you.

2.3.1.4. Security Function

To improve the security of your use of our products and services, protect your or other users' personal and property safety from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, and more accurately identify violations of laws and regulations, we may collect, use, or integrate your account information, transaction information, and device information to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.


2.4. Situations Where You Can Voluntarily Provide Personal Information

2.4.1. To make your use of the Product more convenient or enjoyable, thereby enhancing your experience, our following extended functions may collect and use your personal information. If you do not provide this personal information, you can still use the core functions of the Product, but you may be unable to use the extended functions we provide for you or you may need to repeatedly fill in some information. These extended functions include:

2.4.1.1. Location-Based Extended Functions

If you use location-based functions or services, we need you to authorize us to access your location permission and collect your location information. Your location information is sensitive personal information. Please provide it cautiously. You can turn off such functions and services by disabling the permission.

2.4.1.2. Contact List-Based Extended Functions

After you agree to enable the contact list permission, we will collect your contact list information to facilitate your use of our products and services without manually entering the information of contacts in your address book.

2.4.1.3. Camera-Based Extended Functions

You can use this extended function to complete video shooting, photography, QR code scanning, and facial recognition login. When you use facial recognition login, we will collect your facial information and limit its use within the scope of your authorization. In the future, we may apply facial recognition technology to more scenarios. At that time, we will confirm with you again whether you are willing to allow us to use your facial information to achieve these extended functions.

2.4.1.4. Using Third-Party Account Login

When you use a third-party account (such as WeChat, QQ, Weibo, Apple ID) to log in to the Product, you need to authorize us, in compliance with relevant laws and regulations, to read and share the public information you have published or recorded on that third-party platform (including one or several items of nickname, avatar, region, gender, contact email) in order to bind your third-party account to your Product account and remember your login identity as our user.

2.4.1.5. Supplementary Account Information

After registering your account, you can continue to fill in your information in the basic profile section, including your birthday, gender, and company name. If you do not provide this information, it will not affect your use of specific technical services.

2.4.1.6. Changing Account Password

When you need to change your account password, please enter a new password to complete the reset. When you need to change your mobile number, please enter the new mobile number and SMS verification code. You can voluntarily bind your email in the settings page. At this time, you need to provide your email account and the SMS verification code we send to you for verification. If you need to set up a trusted device, you need to provide us with the device name, device type, and last used time of the device you are using.

2.4.1.7. Accessing Third-Party Applications

When you use integrated third-party applications within this product, for purposes such as providing technical support for integration, we may obtain necessary personal information about you from the developers of such third-party applications and their technical service providers, such as device information and operational behavior log information. If your sensitive personal information is involved, we will seek separate authorization from you. If you refuse our collection of the relevant personal information, it may result in the inability to realize all or part of the functions of the third-party application, but it will not affect your use of other functions of this product.

The developers and technical service providers of such third-party applications may directly collect and use your personal information in accordance with their provided privacy policies; however, we will not obtain this personal information. It is recommended that you read and confirm your understanding of such privacy policies before accepting the relevant services and providing personal information.

2.5. You are fully aware that in the following circumstances, we may collect and use personal information without obtaining your authorization and consent:

2.5.1. Related to national security and national defense security.

2.5.2. Related to public security, public health, and major public interests.

2.5.3. Related to criminal investigation, prosecution, trial, and execution of judgments, etc.

2.5.4. For the purpose of safeguarding the major legitimate rights and interests such as life and property of the personal information subject or other individuals, but where it is difficult to obtain the consent of the individual.

2.5.5. The personal information collected is disclosed to the public by the personal information subject or guardian on their own initiative.

2.5.6. The personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels.

2.5.7. Necessary for the conclusion and performance of a contract as requested by you.

2.5.8. Necessary for maintaining the safe and stable operation of the provided products and services, such as discovering and handling product and service failures.

2.5.9. Necessary for legal news reporting.

2.5.10. Necessary for academic research institutions to carry out statistics or academic research based on public interests, and when providing the results of academic research or descriptions to the outside world, the personal information contained in the results is de-identified.

2.5.11. Other circumstances stipulated by laws and regulations.


2.6. Situations Where We Obtain Your Personal Information from Third Parties

2.6.1. We may obtain personally identifiable information that you authorize to be shared from third parties. After confirming the legality of the source of personal information in accordance with the agreement with the third party, we will use your personal information under the premise of complying with relevant laws and regulations.


3. How We Use Cookies or Similar Technologies

3.1. We may obtain and use your information through the use of Cookies or similar technologies and store this information as log information.

3.2. By using Cookies, we provide users with a simple, easy-to-use, and personalized network experience. A Cookie is a small amount of data that is sent from a web server to your browser and stored on your computer's hard drive. We use Cookies to benefit our users. For example, to make the login process for the Product faster, you can choose to store your username in a Cookie. This will make it more convenient and faster for you to use the Product's services next time. Cookies help us determine the pages and content you connect to, the time you spend on specific services of the Product, and the Product services you choose.

3.3. Cookies allow us to serve you better and faster and make your experience on the Product services more personalized. You can refuse or manage Cookies or similar technologies through your browser or user choice mechanisms. However, please note that if you disable Cookies or similar technologies, we may not be able to provide you with the best service experience, and some services may not function properly.

3.4. We use our own Cookies or similar technologies, which may be used for the following purposes:

3.4.1. To remember your identity.

3.4.2. To analyze your use of our services.

3.4.3. For advertising optimization.

3.5. If you wish to disable Cookies, you can configure your browser: choose "refuse Cookies" or "notify you when a website sends Cookies." Given that our services are implemented by supporting Cookies, after completing the operation of closing Cookies, your access to Weibo may be affected or you may not fully obtain our services. When you do not disable Cookies, you may be prompted, for example, whether to retain user information the next time you enter this website to simplify the login process (such as automatic login).


4. How We Share, Transfer, or Publicly Disclose Your Personal Information

4.1. Entrusted Processing

4.1.1. If we entrust a third party to process your personal information, we will agree with the trustee on the purpose, period, processing method, types of personal information, protection measures, and the rights and obligations of both parties, etc., and supervise the trustee's personal information processing activities.

4.2. Sharing

4.2.1. We share your personal information under the premise of adhering to the "principles of legality, legitimacy, minimum necessity, and clear purpose". At the same time, we will conduct a personal information protection impact assessment beforehand for personal information sharing activities, and take effective technical protection measures for the output form, circulation, and use. At the cooperation agreement level, we strictly require partners' information protection obligations and responsibilities, and sign data security protection agreements with business partners before cooperation.

We have formulated a "Third-Party Sharing List" to clearly and concisely introduce the main situation regarding the sharing of your personal information.

4.2.2. We will not share your information with any third party outside our company, except in the following circumstances:

(1) Having obtained your explicit consent or authorization in advance.

(2) Sharing your information externally as required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements.

(3) Sharing your personal information is necessary to achieve the core functions of our products and services or to provide the services you need.

(4) In order to provide you with relevant products or services based on our offerings, show you content that may be of interest, protect your account and transaction security, etc., we may share your personal information with our affiliates. We will share your personal information with our affiliates in accordance with the provisions of this Privacy Policy, but we will only share necessary personal information and be bound by the purposes stated in this Privacy Policy. If our affiliates wish to change the purpose of personal information processing, they will seek your authorization and consent again.

(5) We may share your relevant information with partners and other third parties to ensure the smooth completion of the services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share the personal information necessary to provide the services. Our partners have no right to use the shared personal information for any other purpose.

(6) Provided based on academic research.

(7) Provided in accordance with the single service agreement signed with you or other legal document agreements.

4.3. Transfer

4.3.1. Transfer refers to the process of transferring the control right of personal information to other companies, organizations, or individuals.

4.3.2. We will not transfer your personal information to any third party outside our company, except in the following circumstances:

(1) Having obtained your explicit consent or authorization in advance.

(2) As our business continues to develop, in the event of our merger, acquisition, or bankruptcy liquidation, your information may be transferred as part of such transactions. If personal information transfer is involved, we will require the new company, organization, or individual holding your personal information to continue to be bound by this Policy; otherwise, we will require that company, organization, or individual to re-seek your authorization and consent.

4.4. Public Disclosure

4.4.1. We will not publicly disclose your personal information to any third party outside our company, except in the following circumstances:

(1) We may publicly disclose your personal information as required by laws and regulations, litigation, dispute resolution needs, or in accordance with the lawful requirements of administrative or judicial organs.

(2) Disclose the information you specify in the manner you explicitly agree to, based on your needs.


5. How We Protect Your Personal Information

5.1. We have always attached great importance to protecting users' personal information security. To this end, we have adopted security technologies and organizational and managerial protection measures that meet industry standards to minimize the risk of your information being leaked, damaged, misused, accessed without authorization, disclosed without authorization, or altered.

5.1.1. Data Security Technical Measures

5.1.1.1. We will adopt security protection measures that comply with industry standards, including establishing reasonable system norms and security technologies, to prevent your personal information from being accessed and used without authorization, modified, and to avoid data damage or loss.

5.1.1.2. Our network services have adopted encryption technologies such as the Transport Layer Security protocol, providing browsing services through HTTPS, etc., to ensure the security of user data during transmission.

5.1.1.3. We use encryption technology to encrypt and save users' personal information and use isolation technology for isolation.

5.1.1.4. When using personal information, such as displaying personal information or performing personal information-related calculations, we use various data desensitization technologies including content replacement and SHA256 to enhance the security of personal information during use.

5.1.1.5. We adopt strict data access permission control and multi-factor authentication technology to protect personal information and avoid data being used improperly.

5.1.1.6. We use code security automatic checking and data access log analysis technology for personal information security audits.

5.1.2. Other Security Measures We Take to Protect Personal Information

5.1.2.1. We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

5.1.2.2. We implement comprehensive security control over data through information confidentiality agreements for personnel with access, monitoring, and audit mechanisms.

5.1.2.3. We have established a Data Security Committee with a dedicated information protection department and a data security emergency response organization to promote and guarantee personal information security.

5.1.2.4. We hold security and privacy protection training courses to strengthen employees' security awareness and understanding of personal information protection policies and related procedures.

5.2. Please note that while we will endeavor to ensure the security of any information you send to us, the internet environment is not 100% secure, and we shall not be liable for any risks or losses arising from or related thereto.

5.3. In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation of the security incident and its potential impact, the measures we have taken or will take to address it, recommendations for you to prevent and reduce risks on your own, and remedial measures for you. We will promptly inform you of the event-related procedures by email, letter, telephone, push notification, etc. When it is difficult to inform each personal information subject individually, we will issue an announcement in a reasonable and effective manner. At the same time, we will also report the handling of the personal information security incident to the regulatory authorities as required.


6. How You Can Manage Your Personal Information

6.1. We attach great importance to your management of personal information and will do our utmost to protect your rights to access, correct, delete, withdraw consent, and other statutory rights regarding your personal information, so that you have full ability to safeguard your privacy and personal information security.

6.2. Accessing and Correcting Your Personal Information

6.2.1. Except as otherwise provided by laws and regulations, you have the right to access and correct your personal information at any time, which specifically includes:

(1) Account Information:

(2) Browsing Information:

(3) Comment Information:

6.2.2. For other personal information generated during your use of our products and services that needs to be accessed or corrected, please contact us at any time. We will respond to your request within the methods and time limits listed in this Privacy Policy.

6.3. Deleting Your Personal Information

6.3.1. Under the following circumstances, you can request us to delete personal information through the methods stated in this Policy:

(1) If our processing of personal information violates laws and regulations.

(2) If you no longer use our products and services, or you cancel your account.

(3) If we stop providing the products and services, or the storage period has expired.

(4) If you withdraw your consent.

(5) If the purpose of our processing of personal information has been achieved, cannot be achieved, or is no longer necessary for achieving the processing purpose.

6.4. Changing or Withdrawing Your Consent

6.4.1. You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting information, turning off device functions, or setting privacy settings on the Product website or software. You can also withdraw all authorizations for us to continue collecting your personal information by canceling your account.

6.4.2. Please understand that the Product may need to collect necessary personal information to function. When you withdraw your consent, we will be unable to continue providing you with the services corresponding to the withdrawn consent, but it will not affect the personal information processing services carried out previously based on your authorization.

6.5. Canceling Your Account

6.5.1. You can cancel your previously registered account at any time in the following ways:

(1) Online cancellation

(2) Contact customer service

6.5.2. After you cancel your account, the content, information, data, records, etc. under that account will be deleted or anonymized (unless otherwise provided by laws and regulations or required by regulatory authorities). At the same time, once the account cancellation is completed, it cannot be recovered.

6.6. Responding to Your Above Requests

6.6.1. If you are unable to exercise the above rights in the ways described, you can contact us using the contact method stated in this Policy. To ensure the security of your account, when you make the above requests to us, we may first ask you to verify your identity before processing your request.

6.6.2. For reasonable requests, we generally do not charge a fee. However, for requests that are repeated multiple times or exceed reasonable limits, we may charge a certain cost fee depending on the circumstances. We reserve the right to decline requests that are groundlessly repetitive, require excessive technical means, pose risks to the legitimate rights and interests of others, or are highly impractical.

6.6.3. Exceptions to Response

In the following circumstances, we will be unable to respond to your request:

(1) Related to our fulfillment of obligations stipulated by laws and regulations.

(2) Directly related to national security and national defense security.

(3) Directly related to public security, public health, and major public interests.

(4) Directly related to criminal investigation, prosecution, trial, and execution of judgments.

(5) There is sufficient evidence that the personal information subject has subjective malice or abuses their rights.

(6) It is necessary to safeguard the major legitimate rights and interests such as the life and property of the personal information subject or other individuals, but it is difficult to obtain the consent of the individual.

(7) Responding to the request of the personal information subject will seriously damage the legitimate rights and interests of the personal information subject or other individuals and organizations.

(8) Involving trade secrets.


7. How We Handle Minors' Personal Information

7.1. We attach great importance to the protection of minors' personal information. If you are a minor under the age of 18, you should obtain the consent of your guardian before using our products and services. We will protect minors' personal information in accordance with relevant national laws and regulations.

7.2. We will not actively and directly collect personal information from minors. For the collection of minors' personal information with the consent of the guardian, we will only use, share, transfer, or disclose this information when permitted by law, consented to by the guardian, or necessary to protect the minor.

7.3. If facts prove that a minor has used our products and services without the consent of their guardian, we will negotiate with the relevant guardian and try to delete the relevant personal information as soon as possible.

7.4. For minors under the age of 14, in addition to complying with the provisions of this Privacy Policy regarding user personal information, we will adhere to the principles of legitimacy and necessity, informed consent, purpose specification, security assurance, and lawful utilization. We will strictly follow the requirements of laws and regulations such as the "Regulations on the Protection of Children's Personal Information Online" for the storage, use, and disclosure of such information. We will not retain the information beyond the period necessary to achieve the purposes for which it was collected and used. Upon expiration of this period, we will delete or anonymize the children's personal information.​​

7.5. If you are the parent or other guardian of a minor under the age of 14, we may need to collect the children's personal information under your guardianship from you, which is necessary for providing you with relevant services. For specific services that require collecting children's personal information from you, we will obtain your authorization and consent in advance and inform you of the purpose and use of the collection. If you do not provide the aforementioned information, you will be unable to enjoy the relevant services we provide.


8. How This Privacy Policy Is Updated

8.1. Our Privacy Policy may change from time to time. We will post any changes to this Privacy Policy on this platform. For major changes, we will provide more prominent notice, such as through special prompts on browsing pages, explaining the specific changes to the Privacy Policy. Without your explicit consent, we will not reduce the rights you should enjoy according to this Privacy Policy.

8.2. Major changes referred to in this Privacy Policy include but are not limited to:

8.2.1. Major changes in our service model.

8.2.2. Changes in the main objects of personal information sharing, transfer, or public disclosure.

8.2.3. Major changes in your rights and their exercise methods regarding personal information processing.

8.2.4. Changes in our contact information and complaint channels.

8.2.5. When the personal information security impact assessment report indicates high risks.

8.3. We will archive the old versions of this Privacy Policy for your reference.


9. How to Contact Us

9.1. If you have any questions, comments, or suggestions regarding this Privacy Policy, please contact us in the following ways:

Email: contact@info.dreamydet.com

9.2. Generally, we will reply within fifteen working days. If you are dissatisfied with our reply, especially if our personal information processing actions have harmed your legitimate rights and interests, you can also complain or report to regulatory departments such as cyberspace administration, telecommunications, public security, and industry and commerce, or seek a solution by filing a lawsuit in the competent court of the defendant's domicile.


Appendix 1: Definitions

1. Personal Information

Personal information refers to various information recorded electronically or by other means that can identify a specific natural person alone or in combination with other information, or reflect the activities of a specific natural person, including name, date of birth, ID number, personal biometric information, address, contact information, communication records and content, account password, property information, credit information, location tracking, accommodation information, health and physiological information, transaction information, etc.

2. Sensitive Personal Information

Personal information that, once leaked or illegally used, may easily infringe upon the personal dignity of natural persons or endanger personal or property safety, including biometrics, religious beliefs, specific identity, medical health, financial accounts, location tracking, etc., as well as the personal information of minors under the age of fourteen. For example, sensitive personal information includes ID card numbers, personal biometric information, bank account numbers, communication content, health and physiological information, etc.

3. Authorization and Consent

Refers to your act of giving explicit authorization for the specific processing of your personal information, including giving authorization through positive actions (i.e., explicit consent), and also including giving authorization through negative inaction.

4. Anonymization

The process of technical processing of personal information so that the personal information subject cannot be identified or associated, and the processed information cannot be restored.

5. De-identification

The process of processing personal information so that it cannot identify a specific natural person without the use of additional information.

6. Log Information

The content you publish and browse when using our platform, the operation time, type, network source address, destination address, port when you publish content, the date and time of access, and login IP information.

7. Device Information

Includes device identifiers (IMEI, IDFA, Android ID, MAC, OAID, IMSI, and other device-related information), application information (application crash information, notification switch status, application installation list, and other application-related information), device parameters and system information (device type, device model, operating system, and hardware-related information), device network environment information (IP address, WiFi information, base station information, and other network-related information). Subject to the actual collection situation of the product.

8. Precise Location Information

Refers to GPS or base station information, which is sensitive personal information. To collect the above information, we need to apply for your authorization to use the device's location permission.

9. Product or Service Name

Refers to the DreamyDET software program, mobile application product, mini-program.

10. Product or Service Name Provider

Refers to Dalian Dengdeng Zongheng Information Technology Co., Ltd.

11. Child

Refers to a minor under the age of fourteen.


Appendix 2: Children's Personal Information Protection Rules

Effective Date: January 1, 2025


1. Special Note

Welcome to using the DreamyDET App. We deeply understand the importance of children's personal information and privacy security and solemnly promise to protect the personal information and privacy security of child users. We hope to explain through these Children's Personal Information Protection Rules (hereinafter also referred to as "these Rules") how we collect, use, store, and process children's personal information, and the methods we provide for guardians and children to access, correct, delete, and protect this information. Before using our products or services, please read and thoroughly understand this Policy carefully, especially the terms marked in bold should be read with emphasis. Please start using only after confirming full understanding and agreement to all terms.


Special Note for Guardians:

The protection of children's personal information requires joint efforts from you and us. We hope you will assist us in protecting your child's personal information. Please ensure that your child uses our products or services and submits personal information to us (if needed) under your consent and guidance. Your click to agree to use or continue using the products or services we provide indicates your consent to our collection, use, and processing of your and your supervised child's personal information in accordance with the provisions of the "Privacy Policy" and these Rules. If you do not agree to the content of these Rules, please ask your child to stop accessing or using our products or services immediately.


Special Note for Children:

If you are a child, please notify your guardian to read these Rules, and please use our products or services after obtaining your guardian's authorization and consent. If your guardian does not agree to these Rules or does not agree to your use of our products or services, please stop using our products or services.


This Policy will help you understand the following:

(1) How we collect and use children's personal information

(2) How we share, transfer, and publicly disclose children's personal information

(3) Your and/or the child's control over children's personal information

(4) How we store and protect children's personal information

(5) How to contact us


2. How We Collect and Use Children's Personal Information

2.1. We will strictly fulfill the statutory obligations and responsibilities for the protection of children's personal information. In collecting and using children's personal information, we adhere to the principles of legitimacy and necessity, informed consent, purpose specification, security assurance, and lawful utilization. We will not collect children's personal information unrelated to the products or services we provide, nor will we collect or use children's personal information in violation of legal provisions or our agreements with you.

2.2. Situations Where You Actively Provide Information

2.2.1. You actively provide us with your child's personal information in your use of our products or services, for example, photos, videos, or other information of your child that you share in the comments, communities, and other information publishing functions we provide for you, indicating that you have agreed to our collection and processing of your child's personal information in accordance with the content of these Rules.

2.3. Children/Teen Mode

2.3.1. You can enable Teen Mode in our products or services. In Teen Mode, we will only collect device information (including device MAC address, unique device identifier, login IP address, device model, device name, device identifier, browser type and settings, language settings, operating system and application version, network information, product version number), online operation records (including playback records, playback duration, access date and time, browsing records, click records), and other information necessary to achieve the most basic functions. We collect this information for the purpose of your account security and anti-cheating, to disclose your supervised child's daily usage to you, to provide the child with the content they need and services that may be more interesting to them, and to improve our products and services. In Teen Mode, you can create a dedicated child account to manage your child. During the process of creating a dedicated child account, we will collect children's personal information that you may provide to us (including nickname, birthday, gender, avatar). We collect this information to complete the creation process of the dedicated child account and accordingly provide high-quality content more suitable for the child you supervise. We kindly advise you that, unless necessary, please do not provide the child's real name, portrait, contact information, etc., and do not easily share children's personal information with others or publish it publicly.


3. How We Share, Transfer, and Publicly Disclose Children's Personal Information

3.1. Sharing

3.1.1. We will not share children's personal information with third parties, except in the following circumstances:

(1) Sharing with the guardian.

(2) Having obtained your explicit authorization and consent in advance.

(3) Necessary sharing with service providers that provide functional support for our products or services for the purpose of smoothly carrying out necessary and reasonable business, meeting your and the child's requirements, fulfilling our obligations in relevant user agreements or these Rules, exercising our rights, or complying with legal provisions, etc. However, we promise that we will only share necessary children's personal information. If we need to change the purpose of processing children's personal information, we will seek your authorization and consent again. Please rest assured that we will conduct security assessments of service providers and their services, sign agreements, clarify responsibilities, processing matters, processing period, processing nature and purpose, etc., and require that their processing activities not exceed our authorization scope; and please rest assured that unless we obtain your authorization and consent, we will not share the personal information of the child you supervise with third parties for marketing activities.

3.2. Transfer and Public Disclosure

3.2.1. We will strictly fulfill the statutory obligations and responsibilities for the protection of children's personal information. In transferring and publicly disclosing children's personal information, we adhere to the principles of legitimacy and necessity, informed consent, purpose specification, security assurance, and lawful utilization.

3.3. If you wish to learn more, please refer to Chapter 4 of the main text of the "Privacy Policy".


4. Your and/or the Child's Control Over Children's Personal Information

4.1. Right of Access

4.1.1. You and/or the child you supervise can query and access the child's relevant personal information in our products or services, for example: personal profile information, video viewing history.

4.2. Right of Correction

4.2.1. You and/or the child you supervise can modify the child's relevant personal information in our products or services, for example: personal profile information. You can contact us to resolve the issue, and we will make corrections after verifying your identity and without affecting the objectivity and accuracy of the information. However, for security and identity recognition considerations, you may not be able to modify some initial registration information submitted during registration.

4.2.2. At the same time, if you and/or the child you supervise find that the children's personal information we collect, store, use, or disclose is incorrect, you can contact us to correct it. We will take measures to correct it in a timely manner after completing identity verification and problem confirmation.

4.3. Right of Deletion

4.3.1. Under the following circumstances, you and/or the child you supervise can directly request us to delete children's personal information. We will take measures to delete it in a timely manner after completing identity verification and problem confirmation, including:

(1) We collect, store, use, transfer, or disclose children's personal information in violation of laws and regulations or our agreement with you.

(2) We collect, store, use, transfer, or disclose children's personal information beyond the purpose scope or necessary period.

(3) You withdraw your consent.

(4) You and/or the child you supervise terminate the use of our products and/or services by means such as account cancellation.

(5) Other circumstances stipulated by laws and regulations.


5. How We Store and Protect Children's Personal Information

5.1. In accordance with the provisions of laws and regulations, we store children's personal information within the territory of the People's Republic of China. Unless otherwise stipulated by laws and regulations or regulatory authorities, we only retain children's personal information for the shortest period necessary for the purpose of providing our products and services. After exceeding the above storage period, we will delete or anonymize children's personal information.

5.2. We have adopted security technical measures that meet industry standards and supporting organizational structures and management systems at multiple levels to protect children's personal information; at the same time, we follow the principle of least privilege, set strict information access permissions for staff, and control the scope of knowledge of children's personal information; we have also taken necessary technical measures to avoid illegal copying and downloading of children's personal information.

5.3. If you wish to learn more, please refer to Chapter 5 of the main text of the "Privacy Policy".


6. How to Contact Us

6.1. If you have any questions, comments, or suggestions regarding this Privacy Policy, please contact us in the following ways:

Email: contact@info.dreamydet.com

6.2. Generally, we will reply within fifteen working days. If you are dissatisfied with our reply, especially if our personal information processing actions have harmed your legitimate rights and interests, you can also complain or report to regulatory departments such as cyberspace administration, telecommunications, public security, and industry and commerce, or seek a solution by filing a lawsuit in the competent court of the defendant's domicile.