Drimeet - Privacy Policy

Special Note

Please also read it carefully (minors should be accompanied by a guardian) and understand this policy before using Drimeet to make appropriate choices. When you agree to this privacy policy, you agree to us processing your relevant information in accordance with this policy. If you do not agree to this privacy policy, you may give up using our products or services.

Once you start using the products or services provided by Drimeet, it means that you have fully understood and agreed to this policy.

How we store your personal information

How we store personal information

How long the information is stored

We will only retain your personal information, including the files you uploaded, the personal information you filled in, etc., for the period necessary to provide this product and service. We will retain relevant information while you have not withdrawn, deleted or canceled your account. information. After the necessary period has passed, we will delete your personal information, unless otherwise provided by laws and regulations.

How we collect and use personal information

The Company will collect and use users' personal information in accordance with the principles of legality, necessity, and transparency and for the purposes stated in this policy. If the Company uses the user's personal information for other purposes not specified in this policy, or collects the user's personal information for other specific purposes, the Company will notify the user in a reasonable manner and obtain the user's consent again before use. agree.

1.1 Personal information actively provided by users in the process of providing products and/or services to users

1.1.1 In order to realize the basic business functions of this software, the company needs to collect the following personal information from users. If the user refuses to provide it, the company will not be able to provide corresponding services to the user.

(1)Account registration, login and verification

When a user registers a personal account in this software, the user needs to provide the following information to the company to complete the registration:

1) Date of birth information: Users need to provide true date of birth information for their personal accounts. The company will determine the user's age based on the date of birth provided by the user. After the software is updated, it will only provide services to adult users who are over 18 years old. If the user is under 18 years old or does not provide the date of birth information to the company when registering, the user will not be able to register as a user of the company and continue to use the software. software service.

2) Gender: Users need to fill in their personal gender information for their personal account. If the user does not provide such information, it will not affect your use of all functions of the software.

3) Hobbies: Users need to select their interest tags. The Company will assign users to specific interest groups based on the specific tags selected by the user. If the user refuses to select specific interest tags, it will not affect your registration and use of this software service.

4) Personalized signature: Users can choose to provide relevant information. The Company will display it to other users based on the information provided by the user. This information is optional and will not affect the use of normal functions if the user does not choose it.

When the user completes the registration process and obtains the software account by providing the above information, it is deemed that the user has successfully logged in to the software and is always logged in. If the user needs to log out and log in again.

5)Search function

When users use the "search" function in this software service, users need to provide the company with the keyword information they input, which is used to display the content they need and their search history. Users can choose to delete historical search records. . If the user does not wish to provide the above information, please do not use the search function.

6)Feedback

If the user has any feedback about the services of this software, the user can provide feedback through "Settings" - "Feedback" in the software. Users need to provide specific descriptions of opinions and upload supporting photos to help the company understand their problems and find corresponding solutions.

1.2 Personal information actively collected by the Company during the process of providing software services to users

Under the premise of complying with laws and regulations, in order to protect the security of users' accounts and provide users with better services, the company will collect and use the following information generated by users during the use of this software service:

1.2.1 Equipment information

In order to make the necessary adaptation of this software to users' mobile devices, provide users with safe and trustworthy products and usage environments, and ensure the safe operation of this software, when users use this software, according to the user's installation and use of the software, For specific permissions granted, the company will collect the user's device model, device identification code (including but not limited to IMEI/Android ID/IDFA/IDF V/OPEN U DID/GUID/O AID/S NID/ME ID, advertising ID, SIM card phone number, IMSI, ICC ID), software list, device running status information, system version, MCC, MNC, Mac address information (including mobile phone Mac address and Bluetooth Mac address), device sensor information. This information is collected to help the company carry out security protection work such as bug analysis, anti-cheating, and anti-blackmail, to ensure users’ normal use of this software service, to improve and optimize the company’s product experience, and to protect users’ account security. At the same time, unless otherwise expressly agreed in this policy, the company will not provide the user's device information to any third party, but the company cannot guarantee that other third parties will not obtain the user's device information through other channels and transfer the user's device information to If it is combined with other information to identify the user's personal identity, resulting in any loss to the user, the user shall claim compensation from the third party. The above device information is basic information collected to provide services. If the user does not want the above device information to be collected by the company, the company may not be able to provide normal services.

1.2.2 Log information

When a user uses this software service, the company will collect the user's relevant network log information, including software crashes, system activity information, device networking status, browsing records, click records, software usage records and IP address information. The company collects the above information in order to better use it for security maintenance and optimization of this software service, and to provide users with a better user experience. The above log information is basic information collected to provide services. If the user does not want the above log information to be collected by the company, it may cause the company to be unable to provide normal services.

In order to protect the legitimate rights and interests of users (combat illegal activities and prevent fraud) and maintain the safe operation of this software service, the company will collect base station information (including base station status, LAC, BID, NID, SID, signal strength) connected to the user's equipment. and WIFI information (including BSSID, SSID, signal strength)o

1.2.3 Consumption record information

When the user uses the payment function to recharge and consume, the company will collect and save the following information of the user: including but not limited to recharge information, consumption record information, order information, reconciliation information, etc., to confirm the user's payment instructions and help The user completes the payment, and at the same time, this information will also be used as a voucher for the user's recharge and consumption.

1.2.4 Other necessary information is used to improve the security of users’ use of the services provided by this software, protect the personal and property safety of users or other users or the public from infringement, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, and network attacks. , network intrusion and other security risks, and to more accurately identify violations of laws, regulations or this policy, the company may use or integrate the user’s user information, transaction information, device information, relevant network logs and the information obtained by the company’s affiliated companies and partners. The information authorized by the user or shared with the company in accordance with the law is used to comprehensively judge the user account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

1.3. System permissions called by this software

As mentioned above, in order to provide this software service to users, the company needs to use the system permissions in the user's device (excluding permissions for accessed third-party calls) to collect relevant personal information. Although they have been covered in the previous chapters, this section will summarize and organize all system permissions used by this software to facilitate a more systematic, complete and transparent presentation to users. The user can choose whether to authorize the company to use the relevant permissions of the device. If the user does not authorize the company to use the relevant permissions, some or all services will be unavailable. If some functions are unavailable, the use of other functions will not be affected.

1.3.1.Album and storage permissions

When the user agrees to turn on this permission, the company will use the album reading and storage functions on the user's device. This function will be used to upload text and image content in the device for users, and can also cache text and image content generated when users use this software service. Users are advised that the company will not automatically read the stored content of the user's local photo album, and will only obtain image data after the user agrees to enable this permission and actively selects the corresponding picture in the album. If the user refuses this authorization, the aforementioned functions will not work properly.

1.3.2. Microphone permissions

When the user agrees to turn on this permission, the company will use the microphone function on the user's device and identify the voice information uploaded by the user. This permission will be used to implement the voice input function, and collect and identify the voice information input during the implementation of the above functions. If the user refuses this authorization, the aforementioned functions will not be available.

1.3.3. Message push permissions

When the user agrees to enable this permission, the company will push messages to the user so that the user can receive and understand the notifications issued by the company in a timely manner. If the user refuses this authorization, the user will not be able to receive the messages pushed by the company for the user.

1.3.4.Camera permissions

When the user agrees to turn on this permission, the company will use the camera shooting function on the user's device. This function will be used to realize photo shooting and video recording functions, and to collect and identify the pictures and video information taken or recorded during the implementation of the above functions. If the user refuses this authorization, the aforementioned functions will not be available.

1.3.5. Permission to read application installation list

When the user agrees to turn on this permission, the company will collect the user's application installation list to protect the user's legitimate rights and interests, combat illegal products, and enrich the user's profile.

1.3.6. Device information access rights

When the user agrees to enable this permission, in order to protect the user's account and login security, the company will collect the user's corresponding device information (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) for unique Identify the device, optimize user experience, check security, identify whether it is a commonly used device, and device binding status. If the user is an Android system user, the user's refusal of this authorization will result in the user being unable to use this software service normally. If the user is an iOS system user, due to the limitations of the iOS system, the user cannot directly refuse or turn off IDFA information authorization. The user can choose whether to authorize the company to collect information other than IDFA. If the user refuses authorization, the company will not be able to provide the user with Corresponding functions or services.

1.4 Personal information we obtain from third parties

The Company will collect and use users' personal information from third parties (partners) within the scope of the user's consent. The company guarantees that it will handle users' personal information in accordance with the contract signed with the third party and relevant laws and regulations. Users are also requested to read the third party's personal information protection policy and user agreement in detail. If the user refuses the third party to collect and use the user's personal information when providing services, the user will be unable to use some of the software services.

1. Information collected by us from other users using our products.

2. When you use the identity authentication function provided by the product, we will use industry-wide methods and use our best commercial efforts to protect your sensitive personal information in accordance with relevant laws and regulations and/or as necessary for the identity authentication function. safety. If you do not provide this information, you will not be able to obtain relevant services, but this will not affect your normal use of other functions.

1.5 Changes in the purpose of collecting and using personal information As our business develops, we will make adjustments to our products. When new features or services are related to other scenarios, the personal information collected and used is directly related to the original purpose. In scenarios that are not directly related to the original purpose, we will obtain your consent again to collect and use your personal information.

1.6 Personal information collected and used without consent In accordance with laws, regulations and relevant national standards, we do not need to obtain your authorization and consent to collect and use your personal information in any one or more of the following circumstances.

(1) Directly related to national security and national defense security;

(2) Directly related to public security, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and judgment execution;

(4) To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain your consent;

(5) Your personal information collected is disclosed to the public by yourself;

(6) Your personal information collected from legally publicly disclosed information;

(7) Necessary to sign or perform a contract at your request;

(8) Necessary for maintaining the safe and stable operation of the product, and for discovering and handling product faults;

(9) Necessary for legitimate news reporting;

(10) When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results will be de-identified;

(11) Other situations stipulated in laws, regulations and relevant national standards.

How to exercise your rights related to personal information

1. Information usage rules

We strictly abide by the provisions of laws and regulations and our agreements with users, and use the collected information as described in this privacy policy to provide you with better services.

We will use the collected information in accordance with the following rules:

(1) We will provide you with various functions and services based on the information we have collected;

(2) In order to ensure the security of your account, we will use your geographical location information for security testing to provide you with safer account registration services;

(3) We will analyze the operation of our products based on your frequency of using Drimeet, fault information, performance information, etc. to ensure the security of the service, optimize our products, and improve the quality of our services. We do not combine the information we store in our analytics software with personally identifiable information you provide.

2. Method of obtaining consent after notifying the purpose of change

We will use the collected information within the purposes covered by this privacy policy. If we use your personal information beyond the scope directly or reasonably related to the stated purpose at the time of collection, we will inform you again and obtain your explicit consent before using your personal information.

We share, transfer and disclose your personal information

In order to provide you with an easier access experience, when you use our products, we may identify you through small data files. This can help you save the need to repeatedly enter registration information, or help determine the security of your account. state. These data files may be cookies. Cookies usually contain identifiers, site names, and some numbers and characters. You can manage or delete cookies according to your preferences. In addition to Cookies, we will also use other similar technologies such as web beacons and pixel tags on our website. We will not use cookies and similar technologies (such as Beacon, Proxy, etc.) for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. However, please note that if you disable cookies, you may not be able to enjoy the best service experience, and some services may not work properly.

1 How to share personal information We will not share your personal information with any company, organization or individual except in the following circumstances:

(1) Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

(2) We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.

(3) Sharing with our affiliates: Your personal information may be shared with our affiliates. We will only share necessary personal information and subject to the purposes stated in this policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization and consent again.

(4) Sharing with authorized partners: Only to achieve the purposes stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and we will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose.

(5) Users actively share information. Many services of our products allow you to publicly share your relevant information not only with your social network, but also with all users who use the service, such as information you upload or publish in the product. (including your public personal information, lists you create), your responses to information uploaded or posted by others, and including location data and log information related to such information. Other users of our services may also share information related to you (including location data and log information). In particular, the product's social media service is designed to allow you to share information with users around the world, so that shared information can be delivered in real time and widely. As long as you do not delete the shared information, the relevant information will remain in the public domain; even if you delete the shared information, the relevant information may still be cached, copied or stored independently by other users or unaffiliated third parties not under our control, or by other stored in the public domain by the user or such third parties. The content and information you provide, upload or publish on our services (such as photos or information about your social activities) may reveal your sensitive personal information. You need to carefully consider whether to use our services to disclose your sensitive personal information. Our authorized partners include the following types:

Suppliers, service providers and other partners. We send information to our vendors, service providers and other partners around the world who join with us to provide you with services, including to provide technical infrastructure services, analyze how our services are used, and measure the effectiveness of our advertising and services. sex, provide customer service or prizes, marketing promotions, payment convenience, or conduct academic research and surveys, for example, when you need to use the geolocation function, to implement this function, we may collect your location information and related device information (such as Hardware model, operating system version number, International Mobile Equipment Identity (IMEI), network device hardware address (MAC)) are de-identified and provided to the aforementioned provider. You can refuse to provide such information, but it will not affect your use of other services. We will agree on strict confidentiality terms with the companies, organizations and individuals with whom we share personal information. At the same time, we will evaluate their data security capabilities and environment and require third parties to maintain confidentiality no less than that required by this policy. and security measures to handle this information. Require them to handle personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures. If a third party really needs to use personal information beyond the scope of the aforementioned authorization due to business needs, the third party will need to seek your consent again.

Therefore, please carefully consider the content of the information you upload, publish and communicate through the product's services. In some cases, you can control the scope of users who have the right to browse your shared information through the privacy settings of certain services of the product. If you request to delete your personal information from the product's services, please do so through the methods provided in these special service terms.

2. How to transfer personal information

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

(1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

(2) When mergers, acquisitions, asset transfers or bankruptcy liquidations are involved, if personal information is transferred, we will require new companies and organizations that hold your personal information to continue to be bound by this policy and will comply with laws, regulations and Continue to protect your personal information with security standards that are no lower than those required by this policy or require successors of personal information to continue to protect your personal information. Otherwise, we will require the company or organization to seek your authorization and consent again. 3.3 How to disclose personal information

We will only publicly disclose your personal information under the following circumstances and will adopt security protection measures that comply with industry standards:

(1) After obtaining your explicit consent;

(2) Disclosure based on law: We may publicly disclose your personal information when required by law, legal proceedings, litigation or mandatory requirements from government authorities.

(3) Announcement of penalties for illegal accounts and fraudulent activities

3. Personal information that is shared, transferred, and publicly disclosed without consent

In accordance with laws, regulations and national standards, we do not need your authorization to share, transfer, or publicly disclose your personal information in the following situations:

(1) Directly related to national security and national defense security;

(2) Directly related to public security, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and judgment execution;

(4) To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

4. Personal information that you disclose to the public on your own;

5 .Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

Notices and Revisions

We may make adjustments to our products and services as our business develops. When the terms of the policy change, we will send you push notifications or pop-up windows to show you the changed policy when you log in and when the version is updated. Please note that we will collect, store, and use your personal information in accordance with the updated policy only with your consent.

How we protect your personal information

We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly.

1. We will use encryption technology, anonymization processing and related reasonable and feasible means that are no lower than those of our peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

2. We will take reasonable and feasible measures to try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.

3. The Internet is not an absolutely secure environment. We strongly recommend that you do not send personal information using methods other than those recommended by us. You can connect and share with other users through our Services. When you create communications, transactions or shares through our services, you can independently choose the objects of communication, transactions or sharing as third parties who can see your transaction content, contact information, communication information or shared content and other related information.

4. Some specific modules or functions in the live broadcast and other business functions provided on the Drimeet APP platform are provided by external suppliers. We will sign strict confidentiality agreements with the companies, organizations and individuals we entrust to process personal information, requiring them to process personal information in accordance with our requirements, this Privacy Policy and any other relevant confidentiality and security measures.

How we process personal information of minors

Persons under the age of 18 may not use the Service, and we do not knowingly collect personal information from persons under the age of 18. If you suspect that a user is under 18 years old, please contact us using the contact information in the app or email.

How to contact us

How to contact us

(1) If you have any questions, comments or suggestions about this Privacy Policy or matters related to your personal information, please contact us by sending an email to tiphamhaianhivi69030@gmail.com.

(2) Under normal circumstances, we will reply within thirty days. If you are not satisfied with our response, especially if our personal information processing behavior harms your legitimate rights and interests, you can also complain or report to the local regulatory authority, or file a lawsuit with the judicial department with jurisdiction.