Privacy Policy
This page is used to inform website visitors and users about Anearly's policies regarding the collection, use, and disclosure of personal information.
If you choose to use Anearly's services, you agree to the collection and use of information related to this policy. The personal information we collect is used to provide and improve services. Anearly will not use or share your information with anyone unless stated in this privacy policy and terms of service.
This policy applies to the products and services of Anearly. Before using Anearly's products and services, you must carefully read this policy and thoroughly understand it, and use the relevant products or services only after confirming that you fully understand and agree to this policy. By starting to use Anearly's various products or services, you indicate that you have fully understood and agreed to this policy.
1. How We Collect and Use Your Personal Information
Personal information refers to various types of information that can identify a specific individual either alone or in combination with other information, recorded electronically or otherwise. We will collect and use your personal information for the following purposes as specified in this policy:
1.1 Help You Become Our User
To complete your account creation so that we can provide services to you, you need to provide the following information: your phone number, email address, profile picture, nickname, and gender, and create a username and password. For service and notification purposes, we may send emails and messages to you using the above information.
1.2 Information You Provide to Us
Relevant personal information you provide to us when registering an account or using our services, such as your phone number, email address, Facebook account, bank card number, or other payment details; information shared with another party through our services, and information stored while using our services. Before providing the above personal information to Anearly, you should ensure that you have obtained the authorization and consent of the party.
When you use our facial recognition service, you explicitly agree to the collection of your facial recognition information by us or other parties.
1.3 Information We Collect During Your Use of the Service
To provide you with results that better meet your needs and identify abnormal account activities, we will collect information about your usage of the service and how you use the service, and associate this information, which should include the following:
Device Information: We will receive and record information about the device you are using, such as device model, operating system version, device settings, unique device identifiers, and location information of the device, such as IP address, GPS location, Wi-Fi access points, Bluetooth, base stations, and other sensor information that can provide relevant information, based on the specific permissions granted when installing and using the software.
Please note that device information, log information, etc., cannot be used alone to identify a specific individual. If we combine such non-personal information with other information to identify a specific individual, or use it in conjunction with personal information, then such non-personal information will be considered personal information during the information usage period. Combined with personal information, unless authorized by you or otherwise stipulated by laws and regulations, we will anonymize or de-identify such personal information.
When you contact us, we may store your communication/call records and content or contact information or other information you leave behind to contact you or help you resolve issues, or record the handling plans and results of related issues.
1.4 Providing Security Assurance for You
To enhance the security of the services provided by us and our affiliates and partners, protect your own, other users', or the public's personal safety, and prevent property damage, we take better measures to combat phishing sites, fraud, network vulnerabilities, computer viruses, cyber attacks, network intrusions, and other security risks, and more accurately identify violations of laws and regulations or agreements related to Anearly. We may use or combine your user information, transaction information, device information, and relevant network logs and information shared by our affiliates and partners with your authorization or according to the law to comprehensively assess your account and transaction risks, conduct identity verification, detect and prevent security incidents, and carry out necessary recording, auditing, analysis, and disposal measures according to the law.
1.5 Other Purposes
When using information for any other purposes not covered by this policy, or using information collected for specific purposes for any other purposes, we will obtain your consent in advance.
1.6 Exceptions for Obtaining Authorization and Consent
According to relevant laws and regulations, we do not need to obtain your authorization and consent when collecting your personal information in the following situations:
(I) Personal information related to national security and defense security;
(II) Personal information related to public safety, public health, and major public interests;
(III) Personal information related to the investigation of crimes, prosecution, trial, and execution of judgments;
(IV) Collecting personal information to protect the life, property, and other major legitimate rights and interests of the personal information subject or others, and it is difficult to obtain your consent;
(V) The collected personal information has been publicly disclosed by you;
(VI) Personal information that is legally publicly disclosed, such as through legitimate news reports, government information disclosure, etc.;
(VII) Personal information necessary for signing and concluding this contract as requested by you;
(VIII) Personal information necessary for maintaining the safe and stable operation of the provided products or services, such as detecting and handling product or service failures;
(IX) Personal information necessary for legitimate news reporting;
(X) Personal information necessary for academic research institutions to conduct statistics or academic research based on public interest, and when providing academic research or descriptive results, the personal information contained in the results will be deleted or anonymized;
(XI) Other situations stipulated by laws and regulations.
If we stop operating Anearly's products or services, we will promptly stop further collecting your personal information and notify you of the cessation of operations by sending notifications to each user or through announcements, and delete or anonymize the personal information we hold.
2. How We Use Cookies
2.1 Cookies
To ensure the normal operation of the website, ensure easier access for you, and recommend content you may be interested in, we will store small data files called cookies on your computer or mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. Cookies allow the website to store your preferences and other data.
2.2 Web Beacons and Pixel Tags
In addition to cookies, we may also use web beacons, pixel tags, and other similar technologies on the website. For example, emails we send you may contain links to our website content, and if you click on this link, we will track this click to help us understand your preferences for products or services so that we can proactively improve the customer service experience. Web beacons are usually transparent images embedded in websites or emails. Pixel tags in emails can let us know if the email has been opened. If you do not wish to track your activities in this way, you can unsubscribe from our mailing list at any time.
3. How We Share, Transfer, and Publicly Disclose Your Personal Information
3.1 Sharing
We will not share your personal information with any company, organization, or individual outside of our service providers, except in the following situations.
3.1.1 Sharing After Obtaining Your Explicit Consent: We will share your personal information with another party after obtaining your explicit consent.
3.1.2 Sharing Required by Law: We may share your personal information externally based on the need to resolve litigation and disputes, or legal requirements from administrative or judicial authorities according to laws and regulations.
3.1.3 Sharing with Affiliates: Your personal information may be shared with our affiliates to facilitate us jointly providing services to you based on affiliated accounts, recommending information you may be interested in, or protecting the personal safety of our affiliates and preventing infringement of Anearly's affiliates, other users of Anearly, or the public's property. We will only share necessary personal information, such as sharing necessary account information with our affiliates to facilitate your use of Anearly accounts and the products or services of affiliates. If we share your sensitive information, we will again seek your authorization and consent. Personal information or affiliates change the purpose of using and processing your personal information.
3.1.4 Sharing with Authorized Partners: Some of our services will be jointly provided by us and authorized partners, solely for the purposes specified in this privacy policy. We may share some of your personal information with partners to provide better customer service and user experience. For example, we may arrange for partners to provide services. We will only share your personal information for legitimate, appropriate, necessary, specific, and explicit purposes, and only share personal information necessary for providing services. Our partners do not have the right to use the shared personal information for other purposes unrelated to the products or services.
We may send information to suppliers, service providers, and other partners that support our business. Such support includes, but is not limited to, providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertisements and services, providing customer service, facilitating payments, or conducting academic research and surveys. We will sign strict data protection agreements with the companies, organizations, and individuals with whom we share personal information and require them to process personal information according to our instructions, this privacy policy, and any other relevant confidentiality and security measures.
3.2 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following situations.
(I) Transfer After Obtaining Your Explicit Consent: We will transfer your personal information to another party after obtaining your explicit consent.
(II) In the event of mergers, acquisitions, or bankruptcy liquidation, or other situations involving mergers, acquisitions, or bankruptcy liquidation, if personal information is transferred, we will require the new company or organization holding your personal information to continue to be bound by this policy; otherwise, we will require that company, organization, and individual to seek your authorization and consent again.
3.3 Public Disclosure
We will only publicly disclose your personal information in the following situations:
(I) We may publicly disclose your personal information after obtaining your explicit consent or based on your active choice;
(II) If we determine that you have violated laws and regulations or seriously violated the provisions of our relevant agreements and regulations, or to protect the personal safety and property of our company and its affiliates' users, or the public, we may disclose your personal information after obtaining your consent, according to laws and regulations or our company's relevant agreements and regulations, including related violations and the measures we have taken against you.
3.4 Exceptions for Obtaining Prior Authorization and Consent When Sharing, Transferring, and Publicly Disclosing Personal Information
In the following situations, we do not need to obtain your authorization and consent in advance when sharing, transferring, and publicly disclosing your personal information:
(I) Personal information related to national security and defense security;
(II) Personal information related to public safety, public health, and major public interests;
(III) Personal information related to the investigation of crimes, prosecution, trial, and execution of judgments;
(IV) Collecting personal information to protect the life, property, and other major legitimate rights and interests of the personal information subject or others, and it is difficult to obtain your consent;
(V) The collected personal information has been publicly disclosed by you;
(VI) Personal information that is legally publicly disclosed, such as through legitimate news reports, government information disclosure, etc.;
According to laws and regulations, the de-identified sharing and transfer of personal information under the condition that the data recipient cannot restore and re-identify the personal information subject does not constitute sharing, transferring, and publicly disclosing personal information. Information, and we do not need to notify you or seek your consent when storing and processing such data.
4. How We Protect Your Personal Information Security
4.1 We have taken reasonable and feasible security protection measures that comply with industry-wide solutions to protect the security of the personal information you provide and prevent unauthorized access, public disclosure, use, modification, damage, or loss of personal information. For example, the data exchanged between your browser and server is encrypted using SSL (Secure Sockets Layer) protocol; we will use encryption technology to enhance the security of personal information; we will use trusted protection mechanisms to prevent malicious attacks on personal information; we will deploy access control mechanisms and do our utmost to ensure that only authorized personnel can access personal information; we will organize security and privacy protection training programs to raise employees' awareness of the importance of protecting personal information.
4.2 We have an industry-leading data security management system to address data lifecycle issues centered on data, enhancing the overall system's security from multiple dimensions such as organizational development, system design, personnel management, and product technology.
4.3 We will do our utmost to take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only retain your personal information for the time necessary to achieve the purposes specified in this policy, unless an extension of the retention period is required or permitted by law.
4.4 Since the internet is not an absolutely secure environment, we strongly recommend that you do not send personal information through communication methods not recommended by Anearly. You can connect and share with others through our services. When you establish communication, conduct transactions, or share through our services, you can choose who you want to communicate, transact, or share with, as a third party who can see your transaction content, contact information, communication, or shared content.
If you find that your personal information, especially your account or password, has been leaked, please contact our user service personnel immediately so that we can take appropriate measures according to your request.
Please note that when you use our services, the information you voluntarily or even publicly share may involve your or others' personal information or even sensitive personal information, such as when you choose to upload images containing personal information. When using our services, please consider more carefully whether to share or even publicly share relevant information.
Please use complex passwords to help us ensure the security of your account. We will do our utmost to ensure the security of any information you send to us.
At the same time, we will also report the handling of personal information security incidents according to the requirements of regulatory authorities.
5. How You Manage Your Personal Information
You can access and manage your personal information in the following ways:
5.1 Accessing Your Personal Information
You have the right to access your personal information, except in special circumstances stipulated by laws and regulations. You can access your personal information by the following means:
Personal Data - If you want to access or edit your nickname, personal profile photo, signature, work and address information, interests, questions, and answers, etc., you can view your profile by clicking on your profile photo.
If you cannot obtain such personal information through the above means, you can contact us through [Settings - Feedback].
5.2 Correcting or Supplementing Your Personal Information
If you find that the personal information we process is incorrect, you have the right to request us to correct or supplement your personal information. You can submit a request for correction or supplementation of personal information through the means specified in this section “(5.1) Accessing Your Personal Information.”
5.3 Deleting Your Personal Information
You can delete some of your personal information through the means specified in this section “(5.1) Accessing Your Personal Information.” You can request us to delete personal information in the following situations:
(I) If our processing of personal information violates laws and regulations;
(II) If we collect and use your personal information without obtaining your explicit consent;
(III) If our processing of personal information seriously violates our agreement with you;
(IV) If you no longer use our products or services;
(V) If we no longer provide products or services to you.
If we decide to respond to your deletion request, we will also do our utmost to notify the parties that obtained your personal information from us and request them to delete the personal information in a timely manner, unless those parties have obtained your separate authorization.
When you delete information from our services, we may not immediately delete the corresponding information in the backup system, but will delete that information when the backup is updated.
5.4 Changing Your Authorization Scope
Each operational function can only be realized through some basic personal information (see this privacy policy “Article One”). In addition, you can contact Anearly customer service personnel to grant or withdraw your authorization and consent for the collection and use of additional personal information.
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the processing of personal information based on your authorization prior to the withdrawal.
5.5 Limiting Automated Decision-Making by Information Systems
We may rely solely on non-human automated decision-making mechanisms, including information systems and algorithms, to make decisions for certain operational functions. If the decision significantly affects your legitimate rights and interests, you have the right to request us to provide an explanation, and we will provide an appeal method without harming Anearly's trade secrets or the rights and interests of other users.
5.6 Responding to Your Above Requests
For security reasons, you may need to provide a written request or prove your identity in other ways. Before processing your request, we may first ask you to verify your identity.
We will respond within 30 days. If you are not satisfied with our response, you can also file a complaint through Anearly customer service personnel.
In principle, we will not charge you for reasonable requests, but for repeated requests that exceed reasonable levels, we will charge a certain fee based on the situation. We may refuse requests that are groundless, pose risks to the legitimate rights and interests of others, or are extremely unrealistic.
In the following situations, we will not be able to respond to your requests according to the requirements of laws and regulations:
(I) Personal information related to national security and defense security;
(II) Personal information related to public safety, public health, and major public interests;
(III) Requests related to the investigation of crimes, prosecution, trial, and execution of judgments;
(IV) Sufficient evidence proves that the personal information subject has subjective malice or abuses rights;
(V) Responding to your request will seriously harm the legitimate rights and interests of you or other individuals and organizations;
(VI) The request involves trade secrets.
6. How Your Personal Information is Transmitted Globally
The personal information collected and generated by our business within the People's Republic of China will be stored within China, except in the following situations:
(I) Laws and regulations have clear provisions;
(II) Obtained your explicit consent;
(III) You conduct cross-border live broadcasts and other activities via the internet.
For the above situations, we will ensure that your personal information is adequately protected according to this privacy policy.
7. How the Privacy Policy is Updated
Our privacy policy may change.
We will not restrict the rights granted to you by this privacy policy without your explicit consent. If there are significant changes, we will provide clear notifications.
For this policy, significant changes include but are not limited to:
(I) Significant changes in how we provide services, such as the purposes of processing personal information, types of personal information being processed, how we use personal information, etc.;
(II) Significant changes in our control, such as changes in ownership due to mergers, acquisitions, reorganizations, etc.;
(III) Changes in the main purposes of sharing, transferring, or publicly disclosing personal information;
(IV) Significant changes in your rights regarding the processing of personal information and how to exercise those rights;
(V) Changes in the department responsible for processing personal information, contact information, and complaint channels;
(VI) High-risk events in personal information security impact assessment reports.
8. How to Contact Us
You can contact us through the customer service channels under Anearly [Settings - Feedback], and we will reply to you within 30 days.
If you are not satisfied with our response, especially if you believe that our processing of personal information has harmed your legitimate rights and interests, you can also file a lawsuit in the court where the defendant is located to seek resolution.
9. Changes to the Privacy Policy
Anearly may update the privacy policy from time to time and publish it on this page, so we recommend that you regularly check this page for all changes, which will take effect immediately upon publication.