Privacy Policy
The security of your personal information is of paramount importance to Guangzhou Xuesheng Technology Co., Ltd. (hereinafter referred to as "we" or "us"). We will take appropriate measures in accordance with legal and regulatory requirements to protect the security and controllability of your personal information. For the above purposes, we have formulated this Privacy Policy and make the following reminders to you:
When you use our products or services, we may collect and use your relevant information. We hope to explain to you through this Privacy Policy how we collect, use, store, share, and transfer this information when you use our products or services, as well as the ways we provide you to access, update, delete, and protect this information.
This Privacy Policy is closely related to the Lincy related services you use and the various business functions included in the service (hereinafter collectively referred to as "our Products or Services"). We hope that you will carefully read and confirm that you have fully understood the contents of this Privacy Policy before using our Products or Services, and that you can make choices that you deem appropriate according to the guidelines of this Privacy Policy. Your use of or continued use of our Products or Services after we update this Privacy Policy (we will promptly notify you of the update) means that you agree to the content of this Privacy Policy (including the updated version) and agree to our collection, use, storage, and sharing of your relevant information in accordance with this Privacy Policy.
We promise to strictly keep your personal information and other data confidential and process your personal information in strict accordance with the contents set forth in this Privacy Policy. We will collect, use, store, share, and transfer your personal information based on your consent and other legal basis for processing your personal information.
I. Definitions
1.1 Personal Information: Personal information refers to any information recorded electronically or otherwise that can be used to identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information, including but not limited to the natural person's name,date of birth,ID number,personal biometric information,address,and phone number.
1.2 Sensitive Personal Information: Sensitive personal information refers to personal information that,once leaked,illegally provided,or abused,may endanger personal and property safety,and is highly likely to cause damage to personal reputation,physical and mental health,or discriminatory treatment.For example,sensitive personal information includes home address,personal biometric information,bank account numbers,communication content,and health and physiological content.
II.Legal Basis for Our Processing of Personal Information
If you are a user in mainland China,we will collect and use your personal information in accordance with the Personal Information Protection Law of the People's Republic of China, the Cybersecurity Law of the People's Republic of China,the Information Security Technology-Personal Information Security Specification (GB/T 35273-2020),and other relevant laws and regulations to provide you with Lincy related products and services.We will generally only collect your personal information with your consent,or may need personal information to protect your vital interests or the interests of others.
III.How We Use Your Personal Information
3.1 We will only collect and use your personal information based on the principles of legality,legitimacy,necessity,and for the purpose of realizing the functions of our products and services.
3.2 If we use the information for purposes not specified in this policy or use information collected for a specific purpose for other purposes,we will notify you in a reasonable manner and obtain your consent in advance.
3.3 We collect your information to provide you with a better course experience.Some of our services may require you to provide specific sensitive personal information to implement specific functions.If you choose not to provide such information,you may not be able to use certain functions in the service normally,but it will not affect your use of other functions in the service.If you actively provide your sensitive personal information,it means that you agree to our processing of your sensitive personal information for the purposes and in the manner described in this policy.To facilitate you in obtaining the services you want,we will provide a switch setting for"Personalized Recommendations".If you do not want us to recommend users and dynamic content that meet your learning needs and progress,you can turn this switch off in the settings.
3.4 When you use our Products or Services,you need to log in through a third-party associated account.We will request the third party to provide your account nickname,avatar,account ID,gender,and other information.We also need you to provide your mobile phone number to bind your learning qualifications.If you refuse to provide the above information,you will not be able to use our Products or Services.
3.5 When you participate in our activities,fill out user questionnaires,and ask questions online with teaching assistants,we may collect information such as your name,phone number,address,educational background,occupation,and years of work experience.We will receive and record information related to your browser,computer,and mobile device,including:
3.6 When you purchase a course and make a payment,we will collect your third-party payment account(such as Alipay account,WeChat account,ApplePay account,or other forms of bank card information).If you have enabled fingerprint payment or facial recognition payment,you need to use your fingerprint or facial information for verification.We will not collect your original fingerprint or facial image.Your original fingerprint image is only stored on the device you authorized to collect fingerprints.
3.7 Account Cancellation Method:You can initiate an account cancellation application in Settings-About-Delete Account.We will delete your personal information according to your request after receiving your cancellation application.
3.8 Third-Party SDK Information Collection
- WeChat Open SDK
- Purpose of Use: To help users log in using WeChat account
- Usage Scenario: When users choose to log in with WeChat account
- Sharing Method: SDK collects locally,no data sharing involved
- Third-Party Name: Shenzhen Tencent Computer System Co.,Ltd.
- Information Collected/Shared: Network access,obtaining Wi-Fi status,reading phone status,writing to external storage,using storage permissions to read external storage information,device identification information(including IMEI,device serial number,Android ID,MAC address,SIM card serial number),installed APP information,sensor information,clipboard.
- Information Type: Operating system information,device model information,application list information
- Privacy Policy: https:
- Alibaba Cloud Mobile Push SDK
- Usage Scenario: Used to identify push devices and implement push function to individual devices
- Third-Party Name: Alibaba Cloud Computing Co.,Ltd.
- Information Collected: Device information(including operating system,device model),IP,operator information
- Privacy Policy: https:
- Flash Verification SDK
- Third-Party Entity: Shanghai Jingmeng Information Technology Co.,Ltd.SDK
- Purpose: To provide APP users with one-click login,number verification,and security verification services SDK
- Information Processing Type: In order to realize the gateway number fetching technology,Flash Verification SDK needs to obtain the local number,device identifier(including IDFV,OAID),device hardware information(including device model,device hardware manufacturer),operating system information(including operating system version),network information(including network type,operator name,IP address,network status,network type),SIM card information(including SIM card status,subId),and application information(including BundleId,package name,package signature).
- Data Processing Method: De-identification,encrypted transmission,and other security methods
- Privacy Policy: https:
- China Mobile
- Information Collected: Network type,network address,operator type,local number,SIM card status,mobile device type,mobile operating system,hardware manufacturer
- Purpose and Usage: Identify the user's mobile phone number for quick login/number verification, problem inquiry, analysis, and risk control
- Information Processing Method: SDK collects on its own
- Third-Party Entity: China Mobile Internet Co., Ltd.
- Agreement Name: China Mobile Authentication Service Terms
- Agreement Link: https://wap.cmpassport.com/resources/html/contract.html
- China Unicom
- Information Collected: Network type, network address, operator type, local mobile phone number, mobile device type, mobile operating system, hardware manufacturer
- Purpose and Usage: Identify the user's mobile phone number for quick login/number verification
- Information Processing Method: SDK collects on its own
- Third-Party Entity: China United Network Communications Co.,Ltd.
- Agreement Name: China Unicom Service and Privacy Agreement Terms
- Agreement Link: https:
- China Telecom
- Information Collected: Registered mobile phone number,local number,network connection type,network status information,network address,operator type,mobile device type,mobile device manufacturer,mobile operating system type and version
- Purpose and Usage: Identify the user's mobile phone number for quick login/number verification and business risk control
- Information Processing Method: SDK collects on its own
- Third-Party Entity: Tianyi Digital Life Technology Co., Ltd.
- Agreement Name: Tianyi Service and Privacy Agreement
- Agreement Link: https://e.189.cn/sdk/agreement/detail.do?hidetop=true
- iFlytek SDK
- Usage Scenario: Used for speech synthesis
- Third-Party Name: iFLYTEK Co., Ltd.
- Privacy Policy: https://www.xfyun.cn/doc/tts/online_tts/online_tts_sdkprivacy.html
- Xiaomi Push SDK
- Developer Name: Beijing Xiaomi Mobile Software Co., Ltd.
- Purpose of Use: Used to push messages to you
- Types of Personal Information Shared: Device identifiers (OAID, encrypted Android ID), push message content, device information (device manufacturer, model, location, operator name, etc.), notification bar settings
- Permissions that may be invoked: Access network status, obtain device information, write to device storage
- Privacy Policy Link: https://dev.mi.com/console/doc/detail?pId=1822
- OPPO Push SDK
- Third-Party Name: Guangdong Huantai Technology Co., Ltd.
- Purpose of Use: Used to push messages on OPPO devices
- Processing Method: Secure processing methods such as de-identification, encrypted transmission and processing
- Types of Personal Information Collected: Device identification information, network information, device status information, application usage information
- Privacy Policy Link: https://open.oppomobile.com/new/developmentDoc/info?id=10288
- Huawei Push SDK
- Third-Party Name: Huawei Software Technology Co., Ltd.
- Purpose of Use: Used to push messages on Huawei devices
- Processing Method: Secure processing methods such as de-identification, encrypted transmission and processing
- Types of Personal Information Collected: Application identification information, message delivery records, etc.
- Privacy Policy Link: https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177
- Meizu Push SDK
- Third-Party Name: Zhuhai Xingji Meizu Information Technology Co., Ltd.
- Purpose of Use: Used to push messages on Meizu devices
- Processing Method: Secure processing methods such as de-identification, encrypted transmission and processing
- Types of Personal Information Collected: Device identification information, location information, network status information, operator information
- Privacy Policy Link: http://open.flyme.cn/docs?id=202
- VIVO Push SDK
- Third-Party Name: Vivo Mobile Communication Co., Ltd.
- Purpose of Use: Used to push messages on VIVO devices
- Processing Method: Secure processing methods such as de-identification, encrypted transmission and processing
- Types of Personal Information Collected: Device identification information, network status information
- Privacy Policy Link: https://dev.vivo.com.cn/documentCenter/doc/652
- TikTok Business SDK
- Third-party Name: ByteDance Technology Co., Ltd.
- Purpose of Use: Collecting and analyzing anonymized usage data
- Handling Method: Secure handling methods through de-identification, encrypted transmission, and processing
- Types of Personal Information Collected: Device identifier information, network status information, Google Advertising ID (GAID)
- Privacy Policy Link: https://ads.tiktok.com/i18n/official/policy/business-products-terms
IV. How We Share, Transfer, and Publicly Disclose Your Personal Information
4.1 Sharing
We will not share your personal information with any third-party companies, organizations, or individuals, except in the following circumstances:
4.2 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
4.3 Public Disclosure
4.4 Exceptional Circumstances
V. How We Protect Your Personal Information
The security of your personal information is of paramount importance to us. We will strictly comply with relevant laws and regulations and take reasonable and feasible measures recognized by the industry to protect your personal information. We strive to prevent unauthorized access, disclosure, use, and modification of your information, and to avoid damage or loss of information.
5.1 Technical and Data Security Measures
We strive to adopt various physical, electronic, and managerial security measures that comply with industry standards to protect the security of your personal information. We actively establish data classification and grading systems, data security management specifications, and data security development specifications to manage and regulate the storage and use of personal information, ensuring that we do not collect personal information that is not related to the services we provide.
We implement comprehensive security controls on data through confidentiality agreements with individuals who have access to the information, as well as monitoring and auditing mechanisms. This helps prevent unauthorized access, disclosure, use, modification, damage, or loss of your personal information. We have employed industry-standard security measures to safeguard the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your personal information.
5.2 Security Incident Handling
We will endeavor to ensure the security of any information you send to us. However, please understand that due to technological limitations and various malicious methods that may exist in the internet industry, it is impossible to guarantee 100% security of information at all times. You need to understand that the systems and communication networks you use to access our services may encounter problems due to factors beyond our control.
To prevent security incidents, we have formulated sound early warning mechanisms and emergency response plans. In the unfortunate event of a personal information security incident, we will promptly inform you according to legal and regulatory requirements, including:
We will immediately activate our emergency response plan to minimize losses. We will promptly inform you of the relevant situation of the incident through phone calls, push notifications, etc. When it is difficult to inform users one by one, we will issue announcements in a reasonable and effective manner.
At the same time, we will proactively report the handling of personal information security incidents to regulatory authorities as required and cooperate closely with government agencies'work.
VI.Your Rights to Manage Your Personal Information
We will ensure that you can exercise the following rights regarding your personal information in accordance with this Privacy Policy:
6.1 Access and Correction of Your Personal Information: Except for special circumstances stipulated by laws and regulations,you have the right to access and correct your personal information.
6.2 Deletion of Your Personal Information: You can request us to delete your personal information under the following circumstances:
After you delete your information from our Services,we may not immediately delete the corresponding information in the backup system,but we will delete it when the backup is updated.
6.3 Responding to Your Requests: To ensure security,you may need to provide a written request or prove your identity in other ways.We may require you to verify your identity before processing your request.We may refuse requests that are groundlessly repetitive,require excessive technical means,endanger the legitimate rights and interests of others,or are highly impractical.In the following situations,we will not be able to respond to your request in accordance with laws and regulations:
VII.How We Use Cookies and Similar Technologies
7.1 Cookies: To ensure the normal operation of the website,we store small data files called cookies on your computer or mobile device.Cookies typically contain identifiers,site names,and some numbers,characters,and data such as learning progress.We will not use cookies for any purpose other than the purposes described in this policy.You can manage or delete cookies according to your preferences.You can clear all cookies stored on your computer,and most web browsers offer the function of blocking cookies.However,if you do so,you will need to change your user settings every time you visit our website.For more information on how to change your browser settings,please visit the relevant settings page of your browser.
7.2 Web Beacons and Pixel Tags: For example,the emails we send to you may contain links to content on our website.If you click on such links,we will track the initial click to help us understand your product or service better and improve user experience.A web beacon is usually a transparent image embedded in a website or email.We use web beacons to understand whether you have opened the email.If you do not want your activity to be tracked in this way,you can unsubscribe from our mailing list at any time.
VIII.How We Protect the Personal Information of Minors
If you are a minor under the age of 18,you should obtain the consent of your parent/legal guardian before using our Products or Services,and read this Privacy Policy under their accompaniment and guidance.If we discover that we have collected personal information from a minor under the age of 14 without first obtaining the consent of their parent/legal guardian,we will delete the relevant data in stages.
IX.How to Update and Revise this Privacy Policy
9.1 This Privacy Policy is an important part of the Lincy User Service Agreement.Lincy reserves the right to update or modify this Privacy Policy from time to time.
9.2 We will not reduce your rights under this Privacy Policy without your express consent.We will notify you of any changes to this Privacy Policy in a reasonable manner,such as through official account push notifications and pop-up windows,so that you can stay informed of any changes.
9.3 If you do not agree to the revised Privacy Policy,you have the right and should immediately stop using Lincy's services.If you continue to use the services provided by Lincy,it will be deemed that you accept the modifications made by Lincy to the relevant terms of this Privacy Policy.
X.How to Contact Us and Dispute Resolution
10.1 If you have any questions,comments,or suggestions regarding this Privacy Policy or related matters,you can contact Lincy at any time through the customer service hotline 400-990-9669.
10.2 If you believe that our processing of your personal information has infringed upon your legitimate rights and interests,you can also report it to the relevant government departments.