Privacy policy

The introduction

Welcome to the Idle Fighter. We may collect and use your information when you use our products. We are committed to vigorously protecting the privacy of users of Idle Fighter products and services (hereinafter referred to as "users" or "you").

We will update this privacy policy from time to time, so relevant measures will change accordingly. We sincerely request you to check this page regularly to ensure that you are always aware of our privacy policy. If you have any questions about this privacy policy and related matters, please contact the customer service at 379016131@qq.com.

This privacy policy mainly explains the following information to you:

What information we collect;

The purposes for which we collect information;

Your rights.

This privacy policy applies to all products and services of Idle Fighter. When you use any of our products and services, you agree with what we say in this policy.

I. the information we collect

1. Non-identity information

When you use Idle Fighter's products and services, we may collect information about where users came from, in what order they were accessed, and so on. For example, record the source of each user, browser information, and so on.

2. Registration information

When you use our registration services, we may collect your personal information, such as: personal identification (including id, passport, driver's license, etc.), domicile of origin, gender, personal cell phone number, network identity (including account, IP address, email address and password, password protection information related to the foregoing, password, password protection information, etc.).

3. Use product equipment information

When you use Idle Fighter products, we may collect your device information (including device model, device MAC address, operating system type, device Settings, etc.), unique device identification code in the software list (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc., which describes the basic situation of personal commonly used devices).

4. Product information

When you use the Idle Fighter product, we may collect and aggregate your game virtual currency, game balance, game type, game records, and more.

How do we collect and use information

1. The information you provided

A. Information you provide to us when you register for or use the product services of Idle Fighter;

B. The Shared information you provide to other parties through the products of the Idle Fighter and the information you store when you use the products of the Idle Fighter;

C. Your information Shared by other parties;

D. we obtain information about your use of Idle Fighter products or services. Such as: log information, equipment information, network information, etc.

2. Cookies and log

We may obtain and use your information through cookies and store it as log information.

We provide our users with a better web experience through the use of cookies. We use cookies to benefit users. For example, the login process is faster when using Idle Fighter product services. Cookies can help us determine which pages and contents you are connecting to, enable us to serve you better and faster, and enrich the services you enjoy in Idle Fighter.

You can control whether cookies are accepted by your device. Please consult the documentation that accompanies your device for more information.

3. We use cookies for the following purposes

A. remember who you are. Cookies help us identify you as one of our registered users or save information you provide us about your preferences or other information;

B. Analyze your use of our services. We can use cookies to find out which activities or services you enjoy using Idle Fighter products.

The non-personally identifiable information we collect using cookies for the above purposes may be made available to other partners to analyze how you and other users use the Idle Fighter service.

Cookies may be placed on our products or services that may collect non-personally identifiable information about you for the purpose of analyzing how users use our products and services. You may control cookies through user selection mechanisms or user management. If you stop using cookies, we may not be able to provide you with the best service and certain services may not be available.

We collect and use your information for the following purposes:

1. Help you to complete the registration quickly

To facilitate our services for you, you need to provide basic registration information, such as personal identification, mobile phone number, and create your user name and password.

2. Provide you with prizes and services

A. In some service items, in order to facilitate the provision of prizes or services to you, you need to provide personal identity information, name, shipping address, postal code, consignee, contact number and other information. If you refuse to provide such information, we will not be able to complete the provision of prizes or services;

B. When you contact us, we may keep your correspondence/call records and your contact information so that we can contact you or help you solve the problem;

C. In order to provide you with prizes or services, we may collect the logistics information, prize information and other information of your choice and may share it with the service providers mentioned above.

3. Give you notice

We may, when necessary (such as suspension, maintenance, etc.), notify you of our services so that you can better know the status of our services.

4. Improve our service

We may use the information collected through a Idle Fighter product for our other products. We may ask you to participate in surveys regarding Idle Fighter products to help us improve our existing products and services or design new ones.

5. Provide security for you

To ensure the authenticity of your identity and provide you with better security, you can provide us with personal sensitive information such as proof of identity to complete real-name authentication.

In addition to authentication, we may use your information for customer service, security, fraud detection, archiving and backup purposes to ensure the security of the services we provide to you; We may use or integrate the information we collect about you, as well as the information our partners obtain from you or share according to law, to comprehensively judge your account, conduct authentication, detect and prevent security incidents, and take necessary measures such as recording, auditing, analysis and disposal according to law.

Iv. Sharing and disclosure

1. Share

We will not share your information with any third party outside of Idle Fighter without your express consent

A. To provide services to you, we may share your information with our partners or third parties, such as logistics services;

B. To achieve the purposes described in section 2, "how we collect and use information", of this privacy policy;

C. Maintain and improve our services. We may share your information with our partners and other third parties to help us provide you with more targeted and complete services, such as: communication service providers that send emails or push notifications on our behalf;

D. Perform our obligations and exercise our rights under this privacy policy or any other agreement we have with you;

E. To share with third parties such as partners who entrust us with the promotion, but we will only provide information about the coverage and effectiveness of the promotion to these clients, and will not provide information that can identify you, such as your name, telephone number or email address; Or we aggregate the information so that it does not identify you personally;

F. To the extent permitted by laws and regulations, we may exchange information with other companies or organizations in order to comply with the law and to safeguard the interests, property or safety of us and our affiliates or partners, you or other Idle Fighter users or the public, such as to prevent fraud and other illegal activities and to reduce credit risk;

G. Assist in handling disputes or disputes between you and others as required by your legal requirements;

H. Provide your information at the lawful request of your guardian;

I. Provided pursuant to a single service agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal document;

J. Provided on the basis of academic research;

K. Based on the social and public interests in accordance with laws and regulations.

We will only share your information for legitimate, legitimate, necessary, specific and specific purposes. We have a strict confidentiality agreement with the companies, organizations and individuals with whom we share information, requiring them to handle the information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.

2. Disclosure

We will only disclose your information if:

A. The premise of safety protection measures in line with industry standards;

B. With your express consent, disclose the information you specify in accordance with your requirements;

C. We may disclose your information in accordance with the type and manner of disclosure required if required by law, regulation, mandatory administrative enforcement or judicial requirement to provide your information. Subject to laws and regulations, when we receive a request for such disclosure, we will require the receiving party to issue a corresponding legal document, such as a subpoena or letter of investigation.

V. our protection and processing of your information

1. Data security technical measures

A. We will adopt security measures in line with industry standards, including establishing reasonable regulations and security technologies to prevent unauthorized access to your information, use and modification, and avoid damage or loss of data;

B. Network services adopt a variety of encryption technologies, such as SSL, TLS and other encryption technologies to protect your information;

C. Isolation by isolation technology;

D. In the use of information, such as information display and information association calculation, we will adopt a variety of data desensitization technologies to enhance the security of information in use. Strict data access control and multiple identity authentication technology are adopted to protect the information and prevent the data from being used illegally.

2. Other security measures taken to protect information

A. Manage the storage and use of standardized information by establishing data classification and classification system, data security management norms and data security development norms;

B. Comprehensive security control of data through confidentiality agreement of information contacts, monitoring and audit mechanism;

C. Enhance safety awareness. We will also conduct security and privacy protection training courses to enhance employees' awareness of the importance of information protection.

3. Only necessary personnel are allowed to know the information, and the personnel who know is guaranteed not to record and keep it.

For this set up the strict access control and monitoring mechanism. We also require all persons who may have access to your information to perform their respective confidentiality obligations. Failure to meet these obligations will result in legal action.

We will take all reasonable and practicable measures to ensure that irrelevant information is not collected.

5. We will do our best to ensure or warrant the security of any information you send us.

If our physical, technical, or managerial protective facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we shall bear the corresponding legal liabilities.

6. How to deal with security incidents

A. When communicating or serving with other parties through Idle Fighter, you will inevitably disclose your own information to other parties, such as mobile phone number, E-mail address, etc. Please properly protect your own information and only provide it to others if necessary;

B. In order to deal with the possible risks of information leakage, damage and loss, we have formulated a number of systems to clarify the classification and classification standards of security incidents and security vulnerabilities and corresponding processing procedures. We have also set up a special emergency response team for safety incidents. According to the requirements of safety event disposal specifications, we launch safety plans for different safety incidents, conduct stop-loss, analyze, locate, formulate remedial measures, and jointly combat with relevant departments.

C. If a security incident happens unfortunately, we will inform you in a timely manner according to the requirements of laws and regulations: the basic situation of the incident, the solutions we have taken or will take and the possible situations, the Suggestions you can prevent and reduce the risk, and the solutions you can remedy, etc. At the same time, we should report information security incidents and disposal according to the requirements of the regulatory department;

D. due to the limitations of technology and risk prevention, even though we have tried to strengthen security measures, we cannot always guarantee 100% security of information. Therefore, you need to understand the situations and problems that may occur outside our control

How do you manage your information

1. Access, update and delete

We encourage you to update and modify your information to make it more accurate and effective. You can access your information through the Idle Fighter, and according to the management of the corresponding information to complete or reasonable request us to modify, supplement and delete. We will take appropriate technical steps to ensure that you can access, update and correct your own information or other information provided by the Idle Fighter service whenever possible.

When accessing, updating, correcting, and deleting the foregoing information, we may require you to authenticate to secure the information.

2. Be open and share

In the process of using our services, you will share relevant information (such as gender, nickname, etc.) of the services you use. Such information can be modified after your own access. We do not accept responsibility for the leakage of your information.

3. Log out

Your account or related information may be cancelled or deleted in accordance with the service agreement of Idle Fighter and relevant national laws and regulations. After your account or related information is logged off or deleted, it will be processed in accordance with the Idle Fighter service agreement.

4. Change the scope of your authorization

You may choose whether your information is disclosed or not, and you may change the extent to which you authorize us to continue to collect information or withdraw your authorization by deleting the information, turning off device functions, etc.

Sensitive information

Some information may be considered sensitive due to its particularity, such as your race, religion, personal health and medical information, as well as identity documents, personal biometric information, property information, whereabouts, minor information, etc. Therefore, you need to consider carefully before using the products or services we provide for you. You agree that such personally sensitive information will be handled in accordance with the relevant terms of the privacy policy.

You need to think carefully about the content and information you provide in the Idle Fighter service.

Vii. Third-party services

We choose reputable third parties as our partners to provide users with information and services. However, each partner has a different privacy policy than that of the Idle Fighter, and the privacy policy of the Idle Fighter will no longer be in effect when you enter a third-party service. We recommend that you check the privacy policy of third parties to ensure the security of your information.

Restrictions on minors

Any minor participates online