BEATIX

Privacy Policy

This version was updated on: January 15, 2025

This version takes effect on: January 15, 2025

introduction

You are welcome to use "BEATIX" related products and services (including but not limited to BEATIX developed and operated by Beijing Duiniutanqin Technology Co., Ltd. and its affiliates (hereinafter collectively referred to as " Duiniutanqin " or " we ") , which provides you with various products and services through websites, client applications, applets and new forms that emerge with technological development, hereinafter collectively referred to as " Software " ). We are fully aware of the importance of personal information to you, and your trust is very important to us. We attach great importance to the privacy and personal information protection of users, and strictly abide by the relevant provisions of national laws and regulations on privacy and personal information protection. When you use the "BEATIX" software , we will collect and use your relevant information in accordance with the relevant provisions of this Privacy Policy. This Privacy Policy is intended to help you understand the following:

1. Information Collection and Use

2. Use of Cookies and Related Technologies

III. Sharing, Transfer and Public Disclosure of Information

IV. Information Protection and Preservation

V. How do you manage your personal information?

VI. Protection of Information of Minors

VII. Notice and Revision

8. How to contact us

IX. Advertising

10. Definition

This privacy policy is closely related to the software you use and the various business functions included in the software. We will collect, store, use and provide your information in accordance with this privacy policy. Therefore, please read carefully and fully understand the entire content of this policy, especially the terms marked in bold, to help you understand how to maintain your privacy and personal information and make the choices you think are appropriate .

you click a button like "Agree" or actively check the box to agree to this Privacy Policy, it means that you have agreed to our collection, storage, use and external provision of your personal information in accordance with this Privacy Policy. However, when you click a button like "Agree" or actively check the box to agree to this Privacy Policy, it does not mean that you have separately agreed to the processing of non-essential personal information, processing of non-essential personal information and processing of sensitive personal information. We will separately seek your consent based on your actual use.

Article 1 Collection and Use of Information

1.1 This Privacy Policy applies to all products and services provided by DNIU TANQIN, including all products and/or services provided to you by various versions of client applications . Except for the relevant information collection and use activities described in this Privacy Policy, this Privacy Policy does not apply to other services provided to you by third parties. Other services are subject to the personal information collection and use rules separately explained to you by the third party. In addition to this Privacy Policy, in certain scenarios, we may explain to you the purpose, scope and use of the relevant information through pop-up windows, page prompts and other instant notification methods, and such notifications also constitute part of this Privacy Policy.

1.2 We will only collect and use your personal information for the purposes described in this Privacy Policy. We mainly collect your personal information through the following three channels, and you understand and agree to this:

(1) Information we proactively collect: When you register, log in, and use the services we provide, as well as when handling customer complaints, inquiries, or disputes, we will collect relevant information sent to us by the computer or other access devices you use, collect relevant information that you authorize us to obtain, and record relevant information about the computer or other access devices you use.

(2) Information you provide directly: We may collect and store the information you fill out and submit on the relevant pages when using the software, the written materials you provide to us (including paper and electronic materials), the information published in the software when you use the software (including but not limited to the information sent when you interact with the system, the preference information you fill out or select, etc.), the information you provide when you contact us, and the information about your activities generated during the use of the software.

(3) Information we obtain from other sources: With your consent, we may also obtain your relevant information from our partners and third-party organizations that are established in accordance with the law and that legally retain your relevant information.

Please note that if you upload or post information in a public area visible to other users in the software , or disclose your information in your response to information uploaded or posted by others, such information may be collected and used by others. If you find that others are improperly collecting or using your information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this Privacy Policy .

1.3 How we use your information

Circumstances in which you authorize us to collect and use your personal information:

The "BEATIX" software is a comprehensive AI music platform software that integrates music playback and social interaction . It will provide various functions, and your personal information needs to be collected or used to achieve these functions. Since the collected personal information is a necessary prerequisite for the realization of this business function, if you do not provide the information, we will not be able to provide you with the corresponding functions and/or services. These functions include:

(1) Register/Log in

When you register an account, you will need to provide your real mobile phone number and the verification code you received via SMS. If you need to set a login password, you can set it according to the prompts on the page. During the registration process, we will collect and use the relevant information you filled in when you registered in order to generate an account for you. You can also fill in or supplement your additional information during the registration process: including but not limited to your avatar, nickname, date of birth, personal signature information, etc.

After successful registration, you can use the SMS verification code login function to log in to the software. When using the SMS verification code login function, we will collect and use your mobile phone number and the received SMS verification code. If you refuse collection and use, you will not be able to use the SMS verification code login function.

You can authorize login through a third-party account. After you authorize to log in to the software with a third-party account, we will obtain the user ID, login name, nickname, avatar, mobile phone number, and login status information of the relevant account in an indirect manner according to your authorization, and bind the third-party account to the software account. You need to authorize us to obtain your nickname, avatar, and mobile phone number from the third-party account. If your mobile phone number has been registered in the software, we will bind the third-party account to the existing account. If you refuse to authorize such information, you will not be able to use the third-party account to log in to the software, but it will not affect the normal use of other products and services we provide to you.

(2) Membership subscription and payment

When you need to use the exclusive privilege services provided by the software for members (such as music playback experience without advertising interference, high-quality music downloads (for offline playback), etc.), you must first subscribe to the software membership before using it. Please carefully read and accept the "BEATIX" Member Service Agreement before subscribing to the software membership; if you are a child under the age of fourteen, please read the "BEATIX" Member Service Agreement with your guardian before subscribing to the software membership and obtain the guardian's consent. During your subscription process, we need to collect and use your account information and recharge information. The payment function related to the subscription membership is provided to you by our cooperative third-party payment institutions. During the recharge process, we may need to share your account information and transaction amount information with the third-party payment institution to implement your recharge instructions and complete the subscription.

(3) Music playback function

We provide you with music playback services. To this end, we may need to collect your software account, software usage records, browsing and playback history, collection records, and access your device storage permissions with your consent to achieve the above functions.

In order to better help you enjoy the above services, we may need to access your device microphone and SD card permissions with your consent to collect and use the information involved in the relevant functions. You can decide to turn these permissions on or off in your device settings at any time . Turning off the corresponding permissions will not affect the processing of personal information based on your consent. After turning off the permissions, we will no longer collect and use your relevant personal information.

(4) Music search function

We provide you with the music library search function, for this purpose, we need to collect your search content, browsing history and time, search time and other information.

(5) Information release function

We provide you with the information publishing function in the software's built-in dynamic community. To this end, we may need to collect your account information, as well as collect corresponding personal information (which may include sensitive personal information ) and obtain corresponding permissions based on the content and type of information you publish (including music you actively share, likes, comments, forwarding of other people's dynamics, and communication and interaction information). Please note that if you publish other people's personal information in the software's built-in dynamic community, you should obtain their consent before publishing .

(6) Sharing function

We provide you with the music sharing function. To do this, we need to call up the system software list information to determine whether the corresponding third-party APP has been installed, so as to call up the third-party APP for sharing.

(7) Security

To ensure the stability and security of your system when you use our software, to protect the personal safety, property safety, account safety, and transaction safety of you or other users or the public, to better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, and malicious programs, to prevent your personal information from being illegally obtained, and to more accurately prevent fraud and protect account security, we need to collect your device information (device model, browser type), login information (mobile phone number, login password, SMS verification code or WeChat account) to determine your account risk, and may record some links that we think are risky ; we will also collect your device information to analyze our system problems, count traffic, and troubleshoot possible risks, and troubleshoot when you choose to send us abnormal information. If you do not provide the above information, we will not be able to protect your services and account security during your use of our services.

(8) User service statistics

In order to improve our services and software, we will collect your usage information, personal device information, page click frequency, and page dwell time. We may combine the aforementioned personal information from various services after de-identification and conduct data analysis to count the number of users, analyze the usage of the software, discover and solve software failures, and conduct internal audits, data analysis and research to continuously improve our software and provide you with better software function services;

We may associate the information we collect from your devices so that we can provide you with services on those devices. We may combine information from a service with information from other services to provide you with services. We will protect the related profile information generated in the same way as your personal information in accordance with this Privacy Policy.

(9) Maintain the normal operation of basic functions

When you use our services, in order to provide you with basic software functions, identify abnormal account status, understand product adaptability, ensure the network and operation security of the service, and maintain the normal operation of the aforementioned basic functions, we may directly or indirectly collect, store and associate information about the services you use and how you use them. This information includes but is not limited to:

Log information: When you use our services (including background operation status), we may automatically collect detailed information about your use of our services and save it as relevant network logs. Your login account, IP address, browser type, telecom operator, network environment, language used, access date and time, Push opening records, stay time, refresh records, release records, follow, subscription, collection and sharing.

Device information: When you use our services (including background running status), we may receive and record information about the device you are using. Device model, operating system and version, client version, device resolution, package name, device settings, process and software list, software and hardware feature information, device information (device model, device name, SIM card serial number, hardware serial number), device identifier (OAID, IMEI, IDFA, Android ID, MAC, Advertising ID, Serial Number, IMSI, UAID, ICCID, IDFV, IDFA, GAID, OpenUDID, GUID), network information (SSID, BSSID , IP or domain name connection results, network type, network access identification, wireless network list, IP address).

In order to collect the above basic personal device information, we will apply for permission to access your device information. We collect this information to provide you with our basic services and basic functions. If you refuse to provide the above permissions, you may not be able to use our products and services.

Please note that separate device information and log information cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information will be considered personal information during the combined use period. Unless otherwise authorized by you or required by laws and regulations, we will anonymize and de-identify such personal information. During the combined use period, such information will be treated and protected as your personal information in accordance with this policy.

(10) Personalized recommendations

We may recommend products or services suitable for you based on your software usage, including notifications within the App, WeChat, SMS notifications and other message push notifications, but the aforementioned recommendations will not be based on your personal characteristics. To do this, we need to obtain your software account and usage history.

If you do not agree to the use of personalized recommendations, we provide you with a corresponding opt-out mechanism: you can contact us to turn off personalized recommendations by the methods listed in the "How to Contact Us" section of this Privacy Policy .

1.4 You are fully aware that we do not need your authorization or consent to collect and use personal information in the following circumstances:

(1) Related to the personal information controller’s performance of laws and regulations;

(2) Those directly related to national security or national defense security;

(3) Directly related to public safety, public health, or major public interests;

(4) Directly related to criminal investigation, prosecution, trial and execution of judgment;

(5) For the purpose of protecting the life, property, and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain your consent;

(6) The personal information collected is disclosed to the public by the subject of personal information on his/her own accord;

(7) Your personal information is collected from legally disclosed information;

(8) Necessary for signing and performing a contract according to your requirements;

(9) Necessary for maintaining the safe and stable operation of the provided software, such as discovering and handling service failures;

(10) When academic research institutions conduct statistical or academic research based on public interests and provide the results of academic research or descriptions to the public, they shall de-identify the personal information contained in the results;

(11) Other circumstances prescribed by laws and regulations.

1.5 Circumstances in which we obtain your personal information from third parties

We may obtain account information that you authorize to share from a third party. We will use your personal information in accordance with the agreement with the third party, after confirming the legitimacy of the source of the personal information and in compliance with relevant laws and regulations.

1.6 Other uses of your personal information

After we use technical means to de-identify personal information, the de-identified information will not be able to identify the subject. Please understand and agree that in this case we have the right to use the de-identified information; without disclosing your personal information, we have the right to analyze the user database and make commercial use of it .

We will collect statistics on the use of our software and may share these statistics with the public or third parties to show the overall usage trends of our software. However, these statistics do not contain any of your personally identifiable information.

When we display your personal information, we will use methods including content replacement and anonymization to desensitize and display your information in order to protect the security of your information.

When we want to use your personal information for other purposes not specified in this policy, or use information collected for a specific purpose for other purposes, we will ask for your consent in advance. Please understand that the software we provide to you will be constantly updated and changed. If you choose to use other functions not listed in this privacy policy, before we collect your personal information, we will explain the purpose, method, and scope of information collection in detail to you through business agreements and page prompts and ask for your explicit consent. If you do not agree to provide the above information, you may not be able to use this service, but it will not affect your use of other services.

Article 2 Use of Cookies and Related Technologies

2.1 Cookies and similar device information identification technologies are commonly used technologies on the Internet . In order to meet your personalized needs for online experience and provide you with an easier access experience, we will send one or more small data files named Cookies to your computer or mobile device. The Cookie assigned to you is unique and can only be read by the Web server in the domain that publishes the Cookie to you. We send you Cookies to simplify your repeated login steps, store your conversation interaction context and preferences, and other data to help you simplify the filling of personal information, provide your service preferences, help you optimize your interaction with artificial intelligence robots, and help determine your login status and account or data security.

2.2 You have the right to refuse to accept cookies. You can refuse to accept cookies by modifying the settings of your computer or mobile device regarding cookies, or you can clear all cookies saved in your computer and mobile device. However , if you choose to refuse to accept cookies or clear all cookies saved in your computer and mobile device, you may not be able to log in or use our services or features that rely on cookies, and it may have a certain impact on the security of the services you use .

Article 3 Sharing, Transfer and Public Disclosure of Information

3.1 Basic principles

(1) The principle of legality, legitimacy and minimum necessity: The sharing, transfer and public disclosure of information must have a legal basis, a legitimate purpose and be limited to the minimum scope necessary to achieve the corresponding purpose.

(2) Principle of maximizing the user’s right to know and right to decide: In the process of information sharing, transfer, and public disclosure , the user’s right to know and right to decide on the processing of their personal information shall be fully respected.

(3) Principle of maximum security assurance capabilities: We will take necessary measures to ensure the security of the personal information we process, carefully evaluate the purpose of our partners ’ use of data, conduct a comprehensive assessment of the security assurance capabilities of these partners , and require them to comply with the relevant requirements of the cooperation agreement and this Privacy Policy .

3.2 Sharing

We will not share your personal information with any company, organization or individual other than Diaoniu Tanqin and its affiliates , except in the following circumstances:

(1) Obtain your explicit consent or authorization in advance;

(2) Providing the information when necessary in accordance with applicable laws and regulations, legal procedures, mandatory administration, or in accordance with the requirements of relevant regulatory authorities, administrative authorities, judicial authorities, or other competent authorities;

(3) To the extent permitted by laws and regulations, it is necessary to protect the interests, property or safety of us or our partners, you or other users of the Software or the general public from damage;

(4) Only by sharing your information can we realize the core functions of our software or provide the services you need, including but not limited to: sharing the corresponding transaction order information and payment amount information with third-party payment institutions that provide payment services;

(5) Resolve disputes or controversies between you and others upon your request;

(6) Comply with the relevant agreements signed with you (including online electronic agreements and corresponding software rules) or other legal documents;

(7) Use based on academic research;

(8) Use based on social public interests in accordance with laws and regulations.

We may share your personal information with DNIU Tanqin’s affiliated companies. However, we will only share necessary personal information and it will be subject to the purposes stated in this Privacy Policy. If DNIU Tanqin’s affiliated companies want to change the purpose of processing personal information, they will ask for your authorization and consent again.

We may share your personal information with partners and other third parties to ensure the realization of software functions. Specific functions may include registration and login, conversation interaction, entertainment interaction, etc. You hereby confirm that the aforementioned services are what you want to obtain (including but not limited to transmitting your conversation content to our cloud server for calculation and processing by our cloud service provider, etc.). However, we will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary for providing services. Our partners have no right to use the shared personal information for any other purpose.

We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with the confidentiality and security measures required by our agreements and this Privacy Policy.

3.3 Sharing of SDK or other similar applications

To ensure the stable operation and functional implementation of the software, we may access SDKs or other similar applications (such as embedded codes, plug-ins, etc.) provided by third-party service providers to provide you with better customer service and user experience. Some of the third-party SDKs or other similar applications we access may involve the collection of your personal information for the purpose of providing you with corresponding services. We will evaluate the legality, legitimacy and necessity of the third party's collection of information, require the third party to take protective measures for your information, and strictly comply with relevant laws, regulations and regulatory requirements.

For disclosure of how partner SDKs or related technologies obtain user information, please see the " Third-Party SDK Cooperation List" at the bottom of the page. You can use the "Third-Party SDK Cooperation List" at the bottom of the page to learn in detail about the name, purpose, type of personal information collected, and other information of the third-party SDK or other similar applications that the software accesses.

Permission function description: Use photo album

Usage scenarios and purposes: To help you select photos and related functions that require this permission

Jiguang One-click Login SDK

Necessary personal information: Device identifiers (including Android ID, GAID, OAID, UAID, IDFA, ICCID): used to generate a desensitized unique identifier for the end-user device to prevent security risks; Device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name), operating system information (including operating system version, system name, system language): used to ensure the compatibility of services on different devices; Network information (including network type, operator name, IP address, WIFI status information): used to determine whether the user is connected to the mobile network, lock the mobile phone number used for the service, obtain the pre-fetched number and token information of the current Internet card, thereby realizing one-click login and SMS verification functions under the mobile network status; Mobile phone number : used to provide one-click login capability using the mobile phone number and send SMS verification codes to the corresponding numbers.

Purpose: One-click login

Usage scenario: Used when users log in with one click using their mobile phone number

Partner entity: Shenzhen Hexun Huagu Information Technology Co., Ltd.

Collection method: SDK self-collection

Official website link: https://docs.jiguang.cn/jverification/guideline/jghgzy

Partner privacy policy: https://www.jiguang.cn/license/privacy

WeChat OpenSDK

Purpose: Support WeChat sharing

Use scenario: Used when users use WeChat sharing

Data types: Device identifiers (Android such as IMEI, Android ID, hardware serial number/Serial, iOS such as IDFV), device MAC address, WLAN access point, shared pictures or content

Company entity: Shenzhen Tencent Computer Systems Co., Ltd.

Collection method: SDK self-collection

Official website link: https://open.weixin.qq.com/

Privacy policy: https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8

Safe operation and risk control verification. In order to ensure the safe operation of software and services, prevent your personal information from being illegally obtained, and more accurately prevent fraud and protect account security, we will actively collect your device information: IMEI, IP, Android ID, language settings, operating system and application versions, product version number, device model and name, device network type, network operator, for security risk control verification. If you do not agree to our collection of the above information, you may not be able to complete the risk control verification. Please understand that in order to dynamically detect whether there are any abnormal logins to your account, we may read it again every time you switch the platform to the background or restart the program. We will control the reading frequency within a reasonable range.

3.4 Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

(1) Obtain your explicit consent or authorization in advance;

(2) Providing information as required by applicable laws and regulations, legal procedures, mandatory administration, or in accordance with the requirements of relevant regulatory authorities, industry associations, administrative authorities, judicial authorities, or other competent authorities;

(3) Comply with the relevant agreements signed with you (including online electronic agreements and corresponding software rules) or other legal documents;

(4) In the event of a merger, acquisition, asset transfer or similar transaction involving the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy. Otherwise, we will require the company or organization to re-solicit your authorization and consent.

3.5 Disclosure

We will only disclose your personal information in the following circumstances and only after taking security measures that meet industry standards:

(1) Disclose the personal information you specify in accordance with your needs and in the manner you explicitly consent to;

(2) When we are required to provide your personal information in accordance with the requirements of laws and regulations, mandatory administrative enforcement, or in accordance with the requirements of relevant regulatory authorities, industry associations, administrative agencies, judicial agencies, or other competent authorities, we may publicly disclose your personal information based on the requested type of personal information and disclosure method.

(3) Other circumstances prescribed by laws and regulations.

Article 4 Information Protection and Preservation

4.1 Our technologies and measures to protect your personal information

We attach great importance to personal information security and take all reasonable and feasible measures to protect your personal information:

(1) Data security technical measures

We will adopt security protection measures that meet industry standards and security technologies commonly used in the industry to prevent your personal information from unauthorized access and modification, and to avoid leakage, damage or loss of your personal information: we use encryption technology to encrypt and store your personal information, and set strict data access permissions to ensure the security of your personal information ; our network services use encryption technologies such as the transport layer security protocol, and provide browsing services through https and other methods to ensure the security of your personal information during transmission ; we occasionally hire security experts to provide corresponding training for technical personnel, and set up corresponding security experts within the technical department to check the security of the system.

(2) Security incident handling

Once a personal information security incident occurs, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you in accordance with the requirements of laws and regulations. We will also promptly inform you of the relevant situation of the incident by email, letter, phone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take reasonable and effective means to issue an announcement. At the same time, we will also proactively report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.

Although we have taken the above technical security measures, please understand that due to the limitations and rapid development of technology in the Internet industry and the various malicious attacks that may exist, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. Please understand that the system and communication network you use when using our software may have security problems due to other factors beyond our control. If you find that your personal information has been leaked, especially your account or password, you should immediately contact us through the contact information agreed in Article 8 below so that we can take corresponding measures.

4.2 Storage of your personal information

We will store personal information collected within the People's Republic of China within the People's Republic of China.

We promise that in order to protect your rights and interests, we will generally only retain your personal information for the shortest period necessary to achieve the purpose , unless in accordance with the provisions of laws and regulations, we will have the right to change the storage period of your personal information in the following circumstances :

(1) To comply with applicable laws, regulations and other relevant provisions;

(2) To comply with a court judgment, ruling or other legal procedure;

(3) To comply with the requirements of relevant government agencies or legally authorized organizations;

(4) We have reason to believe that it is necessary to comply with laws, regulations and other relevant provisions;

(5) Purposes that are reasonably necessary to implement relevant service agreements or this Policy, safeguard the public interest, and protect the personal and property safety or other legitimate rights and interests of our customers, us or our affiliates, other users or employees.

(6) When your personal information exceeds the period we retain it, we will delete or anonymize it.

4.3 We only allow employees and partners who need to know this information to access your personal information, and we have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to fulfill the corresponding confidentiality obligations. If they fail to fulfill these obligations, the aforementioned personnel may be held legally liable or their cooperative relationship with Diaoniu Tanqin may be terminated .

4.4 If we terminate the service or operation, we will notify you at least thirty days in advance and delete or anonymize your personal information after the termination of the service or operation. Your personal information will be used and circulated after anonymization, and we do not need to notify you or obtain your consent for the storage and use of such anonymized information.

Article 5 How do you manage your personal information?

We attach great importance to your concern about personal information and do our best to protect your rights to access, correct, delete and withdraw your consent to your personal information so that you have sufficient ability to protect your privacy and security. You can manage your personal information in the following ways:

5.1 Access and Correction of Your Personal Information

If you need to access or correct your personal information, you can do so through the contact information listed below. If you have other requests, please feel free to contact us. We will respond to your request in the manner and time limit specified in this Privacy Policy. However, you acknowledge and agree that we are unable to provide you with access and/or correction services for some of your personal information. This information is collected to ensure that the service is secure and meets the requirements of relevant mandatory laws and regulations, and the personal information generated when you use our software. We will use the above information within the scope of your authorization and in accordance with the provisions of relevant laws and regulations, and you cannot change or delete it on your own .

5.2 Deleting your personal information

You may request us to delete your personal information in the following circumstances:

(1) If our handling of personal information violates laws and regulations;

(2) If we collect and use your personal information without obtaining your consent;

(3) If our handling of personal information violates our agreement with you;

(4) If you no longer use our products or services, or you cancel your "BEATIX" software account;

(5) If we terminate our services and operations.

After receiving your deletion request, we will perform subsequent deletion processing according to your requirements and relevant laws and regulations and provide you with feedback on the results. We will also notify the entities that obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization. When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.

5.3 Change the scope of your authorization or withdraw your authorization

You can change the scope of your authorization for us to continue to collect your personal information or withdraw your authorization by turning off device function permissions, contacting us as agreed below, etc. You can also contact us as agreed below to withdraw all authorizations for us to continue to collect your personal information.

Please understand that each business function requires some basic personal information to be completed. Once you withdraw your consent or authorization, we will no longer be able to provide you with the services corresponding to the withdrawal of consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the processing of personal information previously carried out based on your authorization.

5.4 Logout

You can apply to cancel your account or cancel the specific "BEATIX" software service function you applied for in accordance with the provisions of the "BEATIX" Account Cancellation Agreement. After verifying your cancellation information, the performance of the software you use and other specific details, we will process your account cancellation application.

5.5 Responding to your requests

fifteen working days or the period prescribed by law after receiving your feedback and verifying your identity .

In principle, we do not charge any fees for your reasonable requests. However, for repeated requests that exceed reasonable limits, we will charge a certain amount of cost depending on the circumstances.

We may reject requests that are unreasonably repetitive, require excessive technical means, pose risks to the legitimate rights and interests of others, or are extremely impractical.

However, you acknowledge and agree that we will not be able to respond to your request in accordance with laws and regulations in the following circumstances:

(1) Those related to national security or national defense security;

(2) Related to public safety, public health, or major public interests;

(3) Related to criminal investigation, prosecution and trial;

(4) There is sufficient evidence that you have subjective malice or abuse of rights;

(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

Article 6 Protection of Information of Minors

6.1 We attach great importance to the protection of minors' personal information. If you are a minor, you should obtain the consent of your legal guardian before using our software. In particular, if you are a child under the age of 14, please inform your guardian to read the "BEATIX" Children's Privacy Policy and seek your guardian's consent and guidance before using the software services; if you are the guardian of a child under the age of 14, you should read and accept the "BEATIX" Children's Privacy Policy for your child before the child uses the software-related services.

6.2 When collecting personal information of minors with the consent of their legal guardians, we will only use or disclose this information when permitted by law, with the explicit consent of the guardian or when necessary to protect minors.

6.3 If your legal guardian does not agree with you providing us with your personal information in accordance with the provisions of this Privacy Policy, please notify us immediately so that we can process your information.

Article 7 Notification and Amendment

7.1 In order to provide you with better services and as our business develops, this Privacy Policy will be updated accordingly. However, without your explicit consent, we will not reduce your rights under this Privacy Policy. We will issue updated versions on our official website and client applications and remind you of updates to relevant content through website announcements or other appropriate means before they take effect. Please visit our software to keep up to date with the latest privacy policy .

7.2 For major changes, we will also provide more prominent notifications (we will explain the specific changes to the privacy policy through methods including but not limited to email, text messages or special reminders on the browsing page) . Major changes referred to in this policy include but are not limited to:

(1) Our business and service models undergo major changes, such as the purpose of processing personal information, the type of personal information processed, the way personal information is used, business functions, etc.;

(2) We experience major changes in our ownership structure, organizational structure, etc., such as changes in ownership due to business adjustments, bankruptcy, mergers and acquisitions, etc.;

(3) The main objects of sharing, transfer or public disclosure of personal information have changed;

(4) There are significant changes in your rights to participate in the processing of personal information and how you exercise them;

(5) When our responsible department for handling personal information security, contact information and complaint channels change;

(6) When the personal information security impact assessment report indicates that there is a high risk.

Article 8 How to Contact Us

9.1 If you have any questions, comments or suggestions about this Privacy Policy or your personal information, you can contact us in the following ways:

(1) Send an email to : support@beatix.co

(2) Our official website : https://beatix.co

9.2 After we verify the relevant situation, we will generally respond within fifteen working days.

9.3 We remind you that in some cases, in order to protect the security of your personal information, we may need you to provide a written request or prove your identity in other ways.

9.4 If you are not satisfied with our response, especially if you believe that our processing of personal information has damaged your legal rights and interests, you may also seek a solution by filing a lawsuit in a court with jurisdiction over the defendant's place of residence.

Title IX Advertising

10.1 In order to provide you with a richer advertising experience, we may provide you with personalized advertising services. You can receive relevant advertising content on our official website, various versions of client applications, mini-programs and other channels. You can refer to the privacy protection guidelines of specific products for more information. If you do not want to receive personalized advertising, you can also turn it off according to the guidelines in the specific product.

Article 10 Definitions

11.1 Cookie: is a neutral technology that allows a website server to store data on a client or read data from a client. Cookie files are files that store some information related to the user's visit to the website, in .txt format. Cookie content is usually encrypted. Secure Cookie technology will provide users with more convenient services when surfing the Internet.

11.2 Anonymization: refers to the process by which personal information is processed so that it cannot identify a specific natural person and cannot be restored.

11.3 Affiliate: refers to a company directly or indirectly controlled by a party, a company that directly or indirectly controls the party, or a company that is directly or indirectly controlled or significantly influenced by the same entity as the party.

11.4 Personal Information: refers to any information recorded electronically or otherwise that can, alone or in combination with other information, identify a specific natural person or reflect the activities of a specific natural person, excluding information that has been anonymized.

11.5 Sensitive Personal Information: refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment, etc., including biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts, etc., as well as personal information of minors under the age of fourteen.