Preamble

Dear Lincy Users:Guangzhou Xuesheng Technology Co.,Ltd.has updated the Privacy Policy.Please carefully read this Privacy Policy and make sure you understand Lincy's rules for processing user personal information. If you have any questions during the reading process, you can contact Lincy customer service for consultation. If you do not agree to any of the terms in the Privacy Policy, you should immediately stop using or accessing Lincy related services and websites.

Last Updated: 
Effective Date: 

Privacy Policy

The security of your personal information is of paramount importance to Guangzhou Xuesheng Technology Co., Ltd. (hereinafter referred to as "we" or "us"). We will take appropriate measures in accordance with legal and regulatory requirements to protect the security and controllability of your personal information. For the above purposes, we have formulated this Privacy Policy and make the following reminders to you:

When you use our products or services, we may collect and use your relevant information. We hope to explain to you through this Privacy Policy how we collect, use, store, share, and transfer this information when you use our products or services, as well as the ways we provide you to access, update, delete, and protect this information.

This Privacy Policy is closely related to the Lincy related services you use and the various business functions included in the service (hereinafter collectively referred to as "our Products or Services"). We hope that you will carefully read and confirm that you have fully understood the contents of this Privacy Policy before using our Products or Services, and that you can make choices that you deem appropriate according to the guidelines of this Privacy Policy. Your use of or continued use of our Products or Services after we update this Privacy Policy (we will promptly notify you of the update) means that you agree to the content of this Privacy Policy (including the updated version) and agree to our collection, use, storage, and sharing of your relevant information in accordance with this Privacy Policy.

We promise to strictly keep your personal information and other data confidential and process your personal information in strict accordance with the contents set forth in this Privacy Policy. We will collect, use, store, share, and transfer your personal information based on your consent and other legal basis for processing your personal information.

I. Definitions

1.1 Personal Information: Personal information refers to any information recorded electronically or otherwise that can be used to identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information, including but not limited to the natural person's name,date of birth,ID number,personal biometric information,address,and phone number.

1.2 Sensitive Personal Information: Sensitive personal information refers to personal information that,once leaked,illegally provided,or abused,may endanger personal and property safety,and is highly likely to cause damage to personal reputation,physical and mental health,or discriminatory treatment.For example,sensitive personal information includes home address,personal biometric information,bank account numbers,communication content,and health and physiological content.

II.Legal Basis for Our Processing of Personal Information

If you are a user in mainland China,we will collect and use your personal information in accordance with the Personal Information Protection Law of the People's Republic of China, the Cybersecurity Law of the People's Republic of China,the Information Security Technology-Personal Information Security Specification (GB/T 35273-2020),and other relevant laws and regulations to provide you with Lincy related products and services.We will generally only collect your personal information with your consent,or may need personal information to protect your vital interests or the interests of others.

III.How We Use Your Personal Information

3.1 We will only collect and use your personal information based on the principles of legality,legitimacy,necessity,and for the purpose of realizing the functions of our products and services.

3.2 If we use the information for purposes not specified in this policy or use information collected for a specific purpose for other purposes,we will notify you in a reasonable manner and obtain your consent in advance.

3.3 We collect your information to provide you with a better course experience.Some of our services may require you to provide specific sensitive personal information to implement specific functions.If you choose not to provide such information,you may not be able to use certain functions in the service normally,but it will not affect your use of other functions in the service.If you actively provide your sensitive personal information,it means that you agree to our processing of your sensitive personal information for the purposes and in the manner described in this policy.To facilitate you in obtaining the services you want,we will provide a switch setting for"Personalized Recommendations".If you do not want us to recommend users and dynamic content that meet your learning needs and progress,you can turn this switch off in the settings.

3.4 When you use our Products or Services,you need to log in through a third-party associated account.We will request the third party to provide your account nickname,avatar,account ID,gender,and other information.We also need you to provide your mobile phone number to bind your learning qualifications.If you refuse to provide the above information,you will not be able to use our Products or Services.

3.5 When you participate in our activities,fill out user questionnaires,and ask questions online with teaching assistants,we may collect information such as your name,phone number,address,educational background,occupation,and years of work experience.We will receive and record information related to your browser,computer,and mobile device,including:

  • Device information such as device model,operating system version,device settings,unique device identifier,and other software and hardware characteristic information;
  • Location information obtained through GPS,Bluetooth or WIFI signal access points,Bluetooth,and base station sensor information;
  • When you use the products or services provided by our website or client,we will automatically collect detailed information about your use of our products or services and save it as relevant network logs.
  • 3.6 When you purchase a course and make a payment,we will collect your third-party payment account(such as Alipay account,WeChat account,ApplePay account,or other forms of bank card information).If you have enabled fingerprint payment or facial recognition payment,you need to use your fingerprint or facial information for verification.We will not collect your original fingerprint or facial image.Your original fingerprint image is only stored on the device you authorized to collect fingerprints.

    3.7 Account Cancellation Method:You can initiate an account cancellation application in Settings-About-Delete Account.We will delete your personal information according to your request after receiving your cancellation application.

    3.8 Third-Party SDK Information Collection

    1. WeChat Open SDK
      • Purpose of Use: To help users log in using WeChat account
      • Usage Scenario: When users choose to log in with WeChat account
      • Sharing Method: SDK collects locally,no data sharing involved
      • Third-Party Name: Shenzhen Tencent Computer System Co.,Ltd.
      • Information Collected/Shared: Network access,obtaining Wi-Fi status,reading phone status,writing to external storage,using storage permissions to read external storage information,device identification information(including IMEI,device serial number,Android ID,MAC address,SIM card serial number),installed APP information,sensor information,clipboard.
      • Information Type: Operating system information,device model information,application list information
      • Privacy Policy: https:
    2. Alibaba Cloud Mobile Push SDK
      • Usage Scenario: Used to identify push devices and implement push function to individual devices
      • Third-Party Name: Alibaba Cloud Computing Co.,Ltd.
      • Information Collected: Device information(including operating system,device model),IP,operator information
      • Privacy Policy: https:
    3. Flash Verification SDK
      • Third-Party Entity: Shanghai Jingmeng Information Technology Co.,Ltd.SDK
      • Purpose: To provide APP users with one-click login,number verification,and security verification services SDK
      • Information Processing Type: In order to realize the gateway number fetching technology,Flash Verification SDK needs to obtain the local number,device identifier(including IDFV,OAID),device hardware information(including device model,device hardware manufacturer),operating system information(including operating system version),network information(including network type,operator name,IP address,network status,network type),SIM card information(including SIM card status,subId),and application information(including BundleId,package name,package signature).
      • Data Processing Method: De-identification,encrypted transmission,and other security methods
      • Privacy Policy: https:
    4. China Mobile
      • Information Collected: Network type,network address,operator type,local number,SIM card status,mobile device type,mobile operating system,hardware manufacturer
      • Purpose and Usage: Identify the user's mobile phone number for quick login/number verification, problem inquiry, analysis, and risk control
      • Information Processing Method: SDK collects on its own
      • Third-Party Entity: China Mobile Internet Co., Ltd.
      • Agreement Name: China Mobile Authentication Service Terms
      • Agreement Link: https://wap.cmpassport.com/resources/html/contract.html
    5. China Unicom
      • Information Collected: Network type, network address, operator type, local mobile phone number, mobile device type, mobile operating system, hardware manufacturer
      • Purpose and Usage: Identify the user's mobile phone number for quick login/number verification
      • Information Processing Method: SDK collects on its own
      • Third-Party Entity: China United Network Communications Co.,Ltd.
      • Agreement Name: China Unicom Service and Privacy Agreement Terms
      • Agreement Link: https:
    6. China Telecom
      • Information Collected: Registered mobile phone number,local number,network connection type,network status information,network address,operator type,mobile device type,mobile device manufacturer,mobile operating system type and version
      • Purpose and Usage: Identify the user's mobile phone number for quick login/number verification and business risk control
      • Information Processing Method: SDK collects on its own
      • Third-Party Entity: Tianyi Digital Life Technology Co., Ltd.
      • Agreement Name: Tianyi Service and Privacy Agreement
      • Agreement Link: https://e.189.cn/sdk/agreement/detail.do?hidetop=true
    7. iFlytek SDK
      • Usage Scenario: Used for speech synthesis
      • Third-Party Name: iFLYTEK Co., Ltd.
      • Privacy Policy: https://www.xfyun.cn/doc/tts/online_tts/online_tts_sdkprivacy.html
    8. Xiaomi Push SDK
      • Developer Name: Beijing Xiaomi Mobile Software Co., Ltd.
      • Purpose of Use: Used to push messages to you
      • Types of Personal Information Shared: Device identifiers (OAID, encrypted Android ID), push message content, device information (device manufacturer, model, location, operator name, etc.), notification bar settings
      • Permissions that may be invoked: Access network status, obtain device information, write to device storage
      • Privacy Policy Link: https://dev.mi.com/console/doc/detail?pId=1822
    9. OPPO Push SDK
      • Third-Party Name: Guangdong Huantai Technology Co., Ltd.
      • Purpose of Use: Used to push messages on OPPO devices
      • Processing Method: Secure processing methods such as de-identification, encrypted transmission and processing
      • Types of Personal Information Collected: Device identification information, network information, device status information, application usage information
      • Privacy Policy Link: https://open.oppomobile.com/new/developmentDoc/info?id=10288
    10. Huawei Push SDK
      • Third-Party Name: Huawei Software Technology Co., Ltd.
      • Purpose of Use: Used to push messages on Huawei devices
      • Processing Method: Secure processing methods such as de-identification, encrypted transmission and processing
      • Types of Personal Information Collected: Application identification information, message delivery records, etc.
      • Privacy Policy Link: https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177
    11. Meizu Push SDK
      • Third-Party Name: Zhuhai Xingji Meizu Information Technology Co., Ltd.
      • Purpose of Use: Used to push messages on Meizu devices
      • Processing Method: Secure processing methods such as de-identification, encrypted transmission and processing
      • Types of Personal Information Collected: Device identification information, location information, network status information, operator information
      • Privacy Policy Link: http://open.flyme.cn/docs?id=202
    12. VIVO Push SDK
      • Third-Party Name: Vivo Mobile Communication Co., Ltd.
      • Purpose of Use: Used to push messages on VIVO devices
      • Processing Method: Secure processing methods such as de-identification, encrypted transmission and processing
      • Types of Personal Information Collected: Device identification information, network status information
      • Privacy Policy Link: https://dev.vivo.com.cn/documentCenter/doc/652
    13. TikTok Business SDK
      • Third-party Name: ByteDance Technology Co., Ltd.
      • Purpose of Use: Collecting and analyzing anonymized usage data
      • Handling Method: Secure handling methods through de-identification, encrypted transmission, and processing
      • Types of Personal Information Collected: Device identifier information, network status information, Google Advertising ID (GAID)
      • Privacy Policy Link: https://ads.tiktok.com/i18n/official/policy/business-products-terms

    IV. How We Share, Transfer, and Publicly Disclose Your Personal Information

    4.1 Sharing

    We will not share your personal information with any third-party companies, organizations, or individuals, except in the following circumstances:

  • With Your Consent: We will share your personal information with other parties after obtaining your explicit consent or the consent of your parent/legal guardian if you are a minor.
  • Legal Requirements: We may share your personal information with external parties in accordance with laws and regulations or mandatory requirements of government authorities.
  • Service Provision and Improvement: We may share your information with partners and other third parties to provide, maintain, and improve our Products or Services. These third parties are obligated to protect your information under the terms of a data processing agreement.
  • Protection of Rights and Interests: To the extent permitted by laws and regulations, in order to comply with the law, maintain the interests, property, or safety of us and our affiliates or partners, you or other users, or the public from harm, we may exchange information with other companies and organizations.
  • Limited Sharing for Specific Purposes: We will only share your personal information for legitimate, justifiable, necessary, specific, and explicit purposes, and will only share the minimum amount of personal information necessary to provide the services. For companies, organizations, and individuals with whom we share personal information, we will enter into strict confidentiality agreements, requiring them to handle personal information in accordance with our instructions, this Privacy Policy, and any other relevant confidentiality and security measures. They are prohibited from using the shared personal information for any other purpose.
  • 4.2 Transfer

    We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

  • With Your Consent: We will transfer your personal information to other parties after obtaining your explicit consent or the consent of your parent/legal guardian if you are a minor.
  • Business Transactions: In the event of a merger, acquisition, or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy. Otherwise, we will require the company or organization to re-obtain your authorization and consent.
  • 4.3 Public Disclosure

  • We will only publicly disclose your personal information under the following circumstances:
  • With Your Consent: After obtaining your explicit consent or the consent of your parent/legal guardian if you are a minor.
  • Legal Disclosure: We may publicly disclose your personal information as required by law, legal process, litigation, or mandatory requirements of government authorities.
  • 4.4 Exceptional Circumstances

  • You acknowledge and agree that we may share, transfer, or publicly disclose personal information without prior consent in the following circumstances:
  • Directly related to national security or national defense security;
  • Directly related to public safety, public health, or major public interests;
  • Directly related to criminal investigation, litigation, arbitration, or judgment execution;
  • To protect your vital interests or those of other individuals, such as life and property, when obtaining your consent is difficult or impossible;
  • Personal information that you have disclosed to the public yourself;
  • Personal information collected from legally publicly disclosed information, such as legitimate news reports or government information disclosure channels.
  • V. How We Protect Your Personal Information

    The security of your personal information is of paramount importance to us. We will strictly comply with relevant laws and regulations and take reasonable and feasible measures recognized by the industry to protect your personal information. We strive to prevent unauthorized access, disclosure, use, and modification of your information, and to avoid damage or loss of information.

    5.1 Technical and Data Security Measures

    We strive to adopt various physical, electronic, and managerial security measures that comply with industry standards to protect the security of your personal information. We actively establish data classification and grading systems, data security management specifications, and data security development specifications to manage and regulate the storage and use of personal information, ensuring that we do not collect personal information that is not related to the services we provide.

    We implement comprehensive security controls on data through confidentiality agreements with individuals who have access to the information, as well as monitoring and auditing mechanisms. This helps prevent unauthorized access, disclosure, use, modification, damage, or loss of your personal information. We have employed industry-standard security measures to safeguard the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your personal information.

    5.2 Security Incident Handling

    We will endeavor to ensure the security of any information you send to us. However, please understand that due to technological limitations and various malicious methods that may exist in the internet industry, it is impossible to guarantee 100% security of information at all times. You need to understand that the systems and communication networks you use to access our services may encounter problems due to factors beyond our control.

    To prevent security incidents, we have formulated sound early warning mechanisms and emergency response plans. In the unfortunate event of a personal information security incident, we will promptly inform you according to legal and regulatory requirements, including:

  • Basic information about the security incident and its potential impact;
  • Measures we have taken or will take to address the incident;
  • Suggestions for you to take to prevent and mitigate risks;
  • Remedial measures we will provide to you.
  • We will immediately activate our emergency response plan to minimize losses. We will promptly inform you of the relevant situation of the incident through phone calls, push notifications, etc. When it is difficult to inform users one by one, we will issue announcements in a reasonable and effective manner.

    At the same time, we will proactively report the handling of personal information security incidents to regulatory authorities as required and cooperate closely with government agencies'work.

    VI.Your Rights to Manage Your Personal Information

    We will ensure that you can exercise the following rights regarding your personal information in accordance with this Privacy Policy:

    6.1 Access and Correction of Your Personal Information: Except for special circumstances stipulated by laws and regulations,you have the right to access and correct your personal information.

    6.2 Deletion of Your Personal Information: You can request us to delete your personal information under the following circumstances:

  • If our processing of your personal information violates laws and regulations;
  • If we collect or use your personal information without your consent;
  • If our processing of your personal information breaches our agreement with you;
  • If you no longer use our Products or Services,or if you have re-registered your account;
  • If we no longer provide Products or Services to you.
  • After you delete your information from our Services,we may not immediately delete the corresponding information in the backup system,but we will delete it when the backup is updated.

    6.3 Responding to Your Requests: To ensure security,you may need to provide a written request or prove your identity in other ways.We may require you to verify your identity before processing your request.We may refuse requests that are groundlessly repetitive,require excessive technical means,endanger the legitimate rights and interests of others,or are highly impractical.In the following situations,we will not be able to respond to your request in accordance with laws and regulations:

  • Directly related to national security or national defense security;
  • Directly related to public safety,public health,or major public interests;
  • Directly related to criminal investigation,litigation,arbitration,or judgment execution;
  • Where there is sufficient evidence to prove that you have subjective malice or abuse of rights;
  • If responding to your request would seriously damage the legitimate rights and interests of you or other individuals or organizations;
  • Involving trade secrets.
  • VII.How We Use Cookies and Similar Technologies

    7.1 Cookies: To ensure the normal operation of the website,we store small data files called cookies on your computer or mobile device.Cookies typically contain identifiers,site names,and some numbers,characters,and data such as learning progress.We will not use cookies for any purpose other than the purposes described in this policy.You can manage or delete cookies according to your preferences.You can clear all cookies stored on your computer,and most web browsers offer the function of blocking cookies.However,if you do so,you will need to change your user settings every time you visit our website.For more information on how to change your browser settings,please visit the relevant settings page of your browser.

    7.2 Web Beacons and Pixel Tags: For example,the emails we send to you may contain links to content on our website.If you click on such links,we will track the initial click to help us understand your product or service better and improve user experience.A web beacon is usually a transparent image embedded in a website or email.We use web beacons to understand whether you have opened the email.If you do not want your activity to be tracked in this way,you can unsubscribe from our mailing list at any time.

    VIII.How We Protect the Personal Information of Minors

    If you are a minor under the age of 18,you should obtain the consent of your parent/legal guardian before using our Products or Services,and read this Privacy Policy under their accompaniment and guidance.If we discover that we have collected personal information from a minor under the age of 14 without first obtaining the consent of their parent/legal guardian,we will delete the relevant data in stages.

    IX.How to Update and Revise this Privacy Policy

    9.1 This Privacy Policy is an important part of the Lincy User Service Agreement.Lincy reserves the right to update or modify this Privacy Policy from time to time.

    9.2 We will not reduce your rights under this Privacy Policy without your express consent.We will notify you of any changes to this Privacy Policy in a reasonable manner,such as through official account push notifications and pop-up windows,so that you can stay informed of any changes.

    9.3 If you do not agree to the revised Privacy Policy,you have the right and should immediately stop using Lincy's services.If you continue to use the services provided by Lincy,it will be deemed that you accept the modifications made by Lincy to the relevant terms of this Privacy Policy.

    X.How to Contact Us and Dispute Resolution

    10.1 If you have any questions,comments,or suggestions regarding this Privacy Policy or related matters,you can contact Lincy at any time through the customer service hotline 400-990-9669.

    10.2 If you believe that our processing of your personal information has infringed upon your legitimate rights and interests,you can also report it to the relevant government departments.