Privacy Policy

Introduction: Welcome to use the software and services! In order to use HonorNovel software and services (hereinafter referred to as "this software" or "this service"), you should read and abide by the "Users' Personal Information Protection and Privacy Policy Agreement" (hereinafter referred to as "this Agreement"). Please be sure to carefully read and fully understand the contents of each clause, especially the corresponding clauses on the exemption or limitation of liability, as well as the separate agreement for opening or using a service, and choose to accept or not to accept it. Restrictions and disclaimers have been highlighted in bold for your attention. We will provide you with corresponding services after expressly obtaining your consent and acceptance. The terms under this Agreement may be changed by the Software at any time, and you should review them regularly. Once the terms of the agreement are changed, the software will be updated on this page, and the changed content will be provided on the relevant page, and you will be notified separately. Once the revised agreement has been published, it will effectively replace the original agreement. You have the right not to accept the revised agreement, but it may cause you to stop using a certain software or service provided by this software. You can check the latest user personal information protection and privacy policy on this page at any time. If you violate this agreement, the software has the right to unilaterally restrict, suspend or terminate the provision of this service at any time in accordance with the violation, and has the right to pursue your relevant responsibilities. If you are under the age of 18, please read this agreement and other above agreements accompanied by a guardian, and obtain the consent of your parent or legal guardian in advance. If you are the guardian of a minor, when you have any questions about the personal information of the minor under your guardianship, please contact us through customer service. 1. Definition 1. Software: refers to the reading tools provided by the software to users, supporting the reading of books in the software's built-in bookstore, and providing users with software licenses and services including but not limited to book recommendation, friend sharing and other functions or content. Terminal software, referred to as "the software" in this agreement. 2. User: refers to the user who enables, browses or uploads data to the software service, and is more referred to as "you" in this agreement. 3. Other users: refer to other users of this software other than the user who are related to this software service. 2. Scope of the agreement 1. This agreement is an agreement between you and this platform regarding your downloading, installation, and use of this software involving user personal information protection and privacy policy and other related matters. 2. The content of this agreement also includes the relevant agreements, statements, business rules and announcement guidelines that may be released by the software from time to time on the protection of users' personal information and privacy policies (hereinafter collectively referred to as "special rules"). Once the above content is officially released, it is an integral part of this agreement, and you should also abide by it. 3. User Personal Information Protection and Privacy Policy 1. Before you use some functions of this service, you need to have a successfully registered software platform account, you need to provide your mobile phone number (*) + verification code (*); or other third-party platform accounts information,. For your account information, this platform will adopt professional encrypted storage and transmission methods to ensure information security, and will not collect, use, disclose or disclose it without authorization. You are responsible for the security of your account information, and the software does not assume any responsibility for the leakage, tampering, deletion and other consequences of the relevant information under the service caused by the leakage of account information due to your own reasons. Regarding the specific rules for using your account, please abide by the relevant account usage agreement (including but not limited to the "User Agreement of this Software") and other special rules released by this software for this purpose. 2. You understand and agree that in order to provide you with our services, we will require you to provide the personal information necessary to provide you with services (we will expressly state to you the purpose and method of collecting and using personal information in this Privacy Policy , location, retention period and location, and collect information with your consent). If you do not provide personal information, we may not be able to provide you with our products or services. 2. 1. Scope of collection and use of information: (1) The information you fill in when you register your account (mobile phone number), and the information you upload when you use the service. (2) The information you submit through our customer service or when you participate in our activities and the information we obtain when you use the service. The detailed list is as follows: 1) Login: User authorized to log in to the third-party platform account (*), avatar, nickname, or mobile phone number + verification code login mobile number (*); 2) Edit information: account avatar, nickname, gender (*) ; 3) Account: Account ID (the unique identifier generated by the system, users cannot edit it), account avatar, nickname, gender; 4) Check-in calendar: If you click on the sign-in sign, you will get a certain amount of rewards, which can be redeemed every day. 5) Notification: If you agree and actively click "Allow", we will send you a push notification. You can display the notification sound and mark in the mobile phone system. Set; if you want to turn off push notifications, you can turn off notifications in the mobile phone system; 6) Today's reading: Count the reading time of users in this software APP on that day, and the statistical unit is minutes; 7) Reading history: users read Books (books that the user has read in this software using the same device), adding to the bookshelf (all the books that the user has added to the bookshelf using the same device, the user can delete the added books), manage reading history (delete the books in the column); 8) Reading records : Browsing records (books that the user has browsed in this software using the same device), bookshelf records (all books added to the bookshelf by the user using the same account, users can delete the books that have been added to the bookshelf record, and add the books in the bookshelf record to the local bookshelf of the device ), manage the bookshelf (delete the books in the bookshelf), in order to realize the function of the bookshelf record, you need to log in to the software to register an account, if you refuse to log in, you cannot use it; 9) Bookshelf: When you open the software APP for the first time, we may It will actively recommend high-quality books to you and add them to your bookshelf. You can also put books you are reading or like into the bookshelf for easy search, or delete books that you do not want to keep in the bookshelf; 10) Import Books: If you agree and click Import Books, we will open the Import Local Books page. If you agree and actively click on the smart guide, we will scan your device after obtaining your authorization, and display all scanned TXT, EPUB, MOBI format files, you can manually check to confirm that you need to add the device Books on the local bookshelf; if you agree and actively click on the mobile phone directory, you can choose the file path in TXT, EPUB, MOBI format and add it to the local bookshelf of the device. In order to provide this service, we need access to your device's SD card. You agree and confirm that the files you import from the device to the local bookshelf do not contain any content that violates relevant laws and regulations, or infringes the legitimate rights and interests of third parties, and you should take full responsibility for this; 11) WiFi transmission: if you agree and take the initiative If you click on WiFi to send a book, we will provide you with a link address, you can enter the link address into the address bar of your computer browser, and drag the TXT format file in your computer to the designated upload area on the link page, then you can upload the file Transfer to the local bookshelf of the mobile phone. If you want to get this service, you need to ensure that the computer and the mobile phone are connected to the same WiFi, and we need to identify your mobile phone WiFi name (*); 12) Message notification: notifications in the software system, including nickname modification, avatar Modification and other news related to your account (we need to identify your registered account of this software), as well as general notices; 13) Ad-free throughout the site: Users who pay to become a VIP member can enjoy the book reading page without ads and add a distinguished logo and other membership rights (this software has the right to update membership rights from time to time, subject to the updated "Membership Service Agreement"), if you agree and take the initiative to click "Activate Now", the Apple Store payment (*) page will be opened ( iOS system), or three-party payment page (Android system), but we only obtain your payment information (*), and will not obtain other information including payment account number, password, fingerprint; 14) Account binding: my - Settings - Account management page, you can bind the mobile phone number (*), you can change the bound mobile phone number (*), if you want to cancel the mobile phone number, please contact our customer service; 15) In order to achieve For sharing and push functions, we use MobTech's ShareSDK product, please refer to the privacy policy of this product: https://www.mob. com/about/policy; 16) Help and feedback: If you agree and actively click "I want feedback", you need to submit a description of the problem, a picture of the problem (optional), and the user's contact information and mobile phone number (*). The permissions corresponding to the above functions are all necessary permissions for business functions. If you do not grant the corresponding permissions, you cannot use the relevant functions. Some of our services may require you to provide certain personal sensitive information (*) to achieve certain functions. If you choose not to provide such information, you may not be able to use certain functions in the service normally, but it will not affect your use of other functions in the service. If you voluntarily provide your personal sensitive information, you agree that we will process your personal sensitive information in accordance with the purposes and methods described in this agreement. *Personal sensitive information refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. Personal sensitive information includes ID number, personal biometric information, bank account number, communication content, health and physiological information, etc. The content of "personal information" or "personal sensitive information" in this privacy policy is from GB/T35273 "Personal Information Security Specification", and the definition is consistent with the definition in the "Personal Information Security Specification". 2. 2 For users who use the Android system, when you use this software, for the purpose of providing, processing, maintaining, improving, developing our products and/or providing you with services, this software may obtain the following permissions from your terminal device: (1) Allow access to network permission; (2) Allow access to WiFi status permission; (3) Allow access to network status permission; (4) Allow write permission to external storage; (5) Allow read device unique ID permission; (6) Allow to write system settings permission; (7) Allow read external storage permission; (8) Allow program vibration permission; (9) Allow system popup dialog permission; (10) Allow CellID or WiFi hotspot to get your rough location (*) permission, we can obtain it, if you turn off the authorization, we can not continue to obtain the information; (11) permission to obtain GPS positioning information (*) permission, you can set it in the mobile phone system before we can obtain it, If you turn off the authorization, we cannot continue to obtain the information; (12) Allow to obtain permission to install the App; (13) Allow to request access to the permission to use photos and photo albums; (14) Allow the application process to still run after the phone locks the screen Permissions; (15) Allows to read the underlying log permissions of the system. 2.3 For users of iOS, when you use this software, for the purpose of providing, processing, maintaining, improving, developing our products and/or providing services to you, this software may obtain the following permissions on your terminal device: ( 1) Allow access to the network; (2) Allow access to WiFi status; (3) Allow access to network status; (4) Allow access to location information; (5) Allow request to access the permission to use photos and photo albums; (6) Allow Get the message push permission. 2.4 How we share, transfer and publicly disclose your personal information 2.4. 1 Sharing We attach great importance to the protection of your personal information. Your personal information is an important basis and part of us to provide you with products and/or services. For your personal information, we only describe it in this "Privacy Policy" Purpose and scope or in accordance with the requirements of laws and regulations to collect and use, and strictly confidential, we will not share your personal information with third-party companies, organizations and individuals other than this software and its affiliates, unless there are one or more of the following circumstances : (1) You request it yourself. (2) Your express authorization and consent have been obtained in advance. (3) Necessary and reasonable sharing of the software and its related parties. You know and agree that the registered account information of this software and some personal information that does not include your personal sensitive information in the relevant reading data may be shared with our affiliates. We will strive to ensure that our affiliates take no less than the level of security measures promised in this Privacy Policy and comply with other security protection requirements we put forward to protect the security of your personal information. (4) Necessary sharing with some business partners: Third-party SDK service providers: Our products may include third-party SDKs or other similar applications, if you use such services provided by third parties on our platform , you agree that your information will be collected and processed directly (such as in the form of embedded codes, plug-ins, etc.), for example: the ad network SDK needs to read your IMEI information. The collection and processing of information by the aforementioned service providers abide by their own privacy terms and do not apply to this policy. However, we will also strive to review the business access qualifications of the third party and strive to require the legal compliance and security of such service providers. In order to maximize the security of your information, we strongly recommend that you review the privacy terms of any third-party SDK-like services before using them. In order to protect your legitimate rights and interests, if you find that these SDKs or other similar applications are at risk, it is recommended that you immediately terminate the relevant operations and contact us in time; (5) What is shared is de-identified information, and you accept The third party that the information is shared cannot re-identify the identity of the information subject; (6) In order to protect you, our other users or employees, the software or the public interest, property or safety (for example: fraud or credit risk, etc.) from damage Sharing with third parties; (7) In some cases, only sharing your personal information can realize the core functions of our products and/or services or provide the services you need, or deal with disputes or disputes between you and others; (8) Shared in accordance with the relevant agreements you signed with us (such as online agreements, platform rules, etc.) or legal documents; (9) In accordance with the relevant agreements between you and other third parties; (10) Based on reasonable Business practices, such as: sharing information about winnings/winners in joint marketing activities with third parties, so that they can issue prizes/gifts to you in a timely manner; when we accept due diligence, etc.; (11) Authorized authorities Requirements, litigation disputes, and other situations that need to be shared as stipulated by laws and regulations. We will only share your personal information for legitimate, legitimate, necessary, specific, and explicit purposes, and will only share necessary personal information. When we share information with our business partners, we strictly require them to fulfill their responsibility to protect your personal information. 2.4.2 Transfer Transfer refers to the process of transferring control of personal information to another company, organization or individual. In principle, we will not transfer your personal information, except in the following cases: (1) You request it yourself; (2) Your express authorization and consent have been obtained in advance; (3) If we conduct mergers, acquisitions, or reorganizations , division, bankruptcy, transfer of assets, or similar transactions where your personal information may be transferred as part of such transactions, we will require the new holder to continue to comply with and perform the entire content of this Privacy Policy (including Purpose of use, rules of use, security protection measures, etc.), otherwise we will require it to re-obtain your express authorization and consent; (4) Other situations stipulated by laws and regulations. If the above-mentioned reasons really need to be transferred, we will inform you of the purpose and type of the transferred information before the transfer (if it involves your personal sensitive information, we will also inform you of the content of the sensitive information involved), and we will inform you of the content of the sensitive information involved before the transfer. After obtaining your authorization and consent, it shall be transferred, unless otherwise stipulated by laws and regulations or otherwise stipulated in this policy. 2.4. 3 Public disclosure Public disclosure is the act of releasing information to the society or to an unspecified group of people. We will not publicly disclose your personal information, except for necessary disclosures due to the need to announce penalties for illegal accounts, fraudulent acts, etc., and to desensitize and display relevant information when announcing the list of winners/winners. If there are reasonable reasons for public disclosure, we will inform you of the purpose and type of the publicly disclosed information before the public disclosure (if it involves your personal sensitive information, we will also inform you of the content of the sensitive information involved), And it will be disclosed publicly after obtaining your authorization and consent, unless otherwise stipulated by laws and regulations or otherwise stipulated in this policy. For your personal information disclosed publicly, we will pay full attention to the risks, and prudently review its legitimacy, rationality and legality as soon as possible after receiving the application for public disclosure, and take appropriate measures when and after public disclosure. To the extent of the personal information security protection measures and means stipulated in this "Privacy Policy", it shall be protected. Please be aware that even if we have obtained your authorization and consent, we will only publicly disclose your personal information for legal, legitimate, necessary, specific and explicit purposes, and try our best to anonymize the personal information in the publicly disclosed content. . According to laws and regulations, in the following cases, sharing, transferring and publicly disclosing your personal information does not require your prior authorization and consent: (1) It is directly related to national security and national defense security; (2) It is related to public security, Directly related to public health and major public interests; (3) Directly related to criminal investigation, prosecution, trial and execution of judgments; or in accordance with the requirements of laws and regulations, the requirements of administrative agencies or public prosecutors and other competent authorities; (4) For the protection of your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain your consent; (5) Personal information is disclosed to the society by you or from legal public channels (such as legal news reports) (6) Necessary for signing and performing relevant agreements or other written documents with you; (7) Other situations stipulated by laws and regulations. 2. 5 How do we use cookies and similar technologies Cookies are very important to improve the user's network experience. This software generally uses cookies for the following purposes: (1) Authentication cookies can notify us when you access our services, so that we can Your account information (*) can be verified to ensure your account security. For example, cookie technology can notify us when you log in to the software, so we can identify whether you are logged in securely and display information about you when you visit the software's site. (2) Security cookies can help us ensure the security of data and services, and troubleshoot cheating, hacking, and fraudulent acts against our products and services. For example, a cookie can store the ticket information (*) of your token, which can be verified by the server whether it is your normal login to the software on your own, and prevent various types of attacks and cross-site information theft through the encrypted information in the ticket information. access to prevent identity masquerading. (3) Function and service Cookies can help us provide users with better products and services. For example, when you log in, a cookie can help you fill in your last logged-in account name through stored information, thereby improving your operational efficiency. (4) Efficiency Cookies can avoid unnecessary server load, improve service efficiency and save resources. For example, cookies help us optimize the routing of traffic between servers and understand how quickly different users load our services, and sometimes we may use cookies to make our software load and respond faster when you use it. 2.6 Ways of using and protecting information: 2.6.1 The protection of users' personal information is a basic principle of this platform, and this platform will take reasonable measures to protect users' personal information. Except as provided by laws and regulations or otherwise agreed in this agreement, this platform will not disclose or disclose users' personal information to third parties without the user's permission. This platform adopts professional encrypted storage and transmission methods for relevant information to ensure the security of users' personal information. 2.6. 2 This platform will use various security technologies and procedures to establish a sound management system to protect your personal information from unauthorized access, use or disclosure. For example, https + self-developed encryption method realizes transmission encryption; adopts JWT authentication (the most popular cross-domain authentication solution at present); malicious user traffic detection, freeze account after suspicious user behavior analysis, prevent account theft and cause losses to users ;High Availability of the database (referring to reducing the time when the system cannot provide services by design) prevents the loss of user gold coins and other data, and can be backed up and restored; when the client displays the mobile phone number to the user, the middle 4 digits are added with "*" Hide, protect the user's mobile phone number, etc. 2.6.3 Without your consent, this software will not share, transfer or publicly disclose your personal information to any company, organization or individual other than this software, unless otherwise stipulated by laws and regulations or otherwise agreed in this agreement. 2.6.4 You understand and agree that on the premise of not disclosing the private information of a single user, this platform has the right to conduct technical analysis on the entire user database and make commercial use of the user database that has been analyzed, sorted and desensitized. 2.7 At present, there is no personal information going abroad in this software. If personal information is required to go abroad due to business development in the future, we will list the types of exiting personal information item by item in this policy and mark them prominently. 2.8 You understand and agree that some functions of this software may allow third parties to know the user's information, for example: when the user shares relevant content to third-party products/platforms, the third party will know some of your information, including account avatars , account nickname, shared content; and, after sharing, the information you share will be displayed on the products/platforms you share. On this product/platform, third parties can view your information according to the settings of their respective product/platform, including account avatar, account nickname, and shared content. If you are not willing to let third parties know your information, please do not use these functions of this software; if you use these functions of this software, it is deemed that you agree to third parties to know your information. 2.9 You understand and agree that, in order to provide you with better services, the platform can associate the data records (such as purchase records, consumption records, and bookshelf contents) of the account on the platform’s official website and other clients under your software account. , the platform company can also associate your aforementioned data records in the software to the account on the platform's official website and other clients. 2.10 Information Storage 2.10. 1 We will ensure adequate protection of your personal information in accordance with this Privacy Policy. 2.10.2 In general, we will only retain your personal information for the period necessary to achieve the purpose (not less than 6 months), unless there is a mandatory retention requirement by law. Our criteria for judging the aforementioned period include: (1) Complete your related service purposes, maintain corresponding service and business records, and respond to your possible inquiries or complaints; (2) Ensure the safety and quality of our services to you; ( 3) Whether you agree to a longer retention period; (4) Whether there are other special agreements for retention period. After your personal information exceeds the retention period, we will delete or anonymize your personal information as required by applicable law. 2.10.3 Information deletion and anonymization If the software decides to stop operating, we will stop collecting your personal information after the relevant services stop operating. We will serve you a notice of cessation of operations in the form of an announcement. Your personal information already held will be deleted or anonymized. 4. Your rights 1. Access to your personal information You have the right to access your personal information, except for the exceptions stipulated by laws and regulations. If you want to exercise the right to access data, you can access it yourself in the following ways: (1) Access basic information such as avatar, nickname, gender, etc.: After entering the APP, click "My", click "Avatar" to query and access information; ( 2) Access account binding information: After entering the APP, click "Settings", click "Account and Security" to query and access information. 2. Correcting your personal information When you find that your personal information needs to be corrected, you can modify it by yourself through the page in "1. Visiting your personal information", or you can contact customer service to assist you in modifying the information. 3. Deletion of your personal information In the following situations, you can request us to delete your personal information: (1) If our behavior of processing personal information violates laws and regulations; (2) If we collect and use your personal information, but without your consent; (3) if our handling of personal information violates our agreement with you; (4) if you no longer use our products or services, or you cancel your account; (5) if we no longer provide you with products or services. 4. Manage your authorization scope If you want to change the authorization scope, you can modify the authorization scope through the mobile phone permission settings. If you cancel the authorization required for a specific function in the service, you may not be able to use the function normally, but it will not affect your use of the service. other functions. 5. Cancellation of the account (1) The cancellation of the account must meet the following conditions: 1) There has been no operation of changing sensitive information such as changing the mobile phone number in the past month; 2) The account is in a normal state and there are no restrictions such as being disabled. (2) After the account is cancelled, the relevant information will be emptied and cannot be retrieved, and related operations cannot be performed: 1) Unable to log in and use the software account; 2) The bookshelf records in the account will be cleared; 3) The account in the account Membership rights will be cleared; 4) Invite friends in the account will be cleared; 5) Check-in records in the account will be cleared; (3) In the following cases, according to laws and regulations, we may not be able to respond to your request: 1) It is directly related to national security and national defense security; 2) It is directly related to public security, public health, and major public interests; 3) It is related to criminal investigation, prosecution, trial, and execution of judgments; 4) There is sufficient evidence It indicates that you have subjective malice or abuse of rights; 5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations; 6) It involves business secrets. (4) For the cancellation operation, click "Settings", click "Account and Security", click "Account Security", click "Cancel Account", click "Agree and Cancel Account", and click "Apply for Account Cancellation after Verification". After the account cancellation application is submitted for review, we will complete the review within 5-7 working days. Before the account is officially cancelled, you can terminate the cancellation process by logging in to your account. 5. Youth Mode In order to protect the healthy growth of young people, this software specially launches the youth mode, and some functions in this mode will no longer be open for use. This software has selected a batch of educational and knowledge books, which are presented in the selected bookstore for users in the youth mode to read. If you want your minor children to use the software services, you can set to enable the youth mode in "My" - "Adolescent Mode". When turning on Teen Mode, you need to bind your mobile number (*). If you want to exit the youth mode, you need to receive the SMS verification code (*) through the bound mobile phone number (*) for verification before exiting. 6. Notifications and delivery All notifications under this agreement can be delivered by means of announcements on important pages, emails, text messages or regular letters; such notifications are deemed to have been delivered to the recipient on the date of sending. 7. Others 1. By using this software, you are deemed to have read and agreed to be bound by this agreement. This platform reserves the right to amend the terms of this agreement when necessary. You can check the relevant terms of the agreement in the latest version of the software, and this platform will also publicize it in a prominent place in the software. After the terms of this agreement are changed, if you continue to use the software, you are deemed to have accepted the revised agreement. If you do not accept the revised agreement, you should stop using the software. 2. The establishment, entry into force, performance, interpretation and dispute resolution of this agreement shall be governed by the laws of the mainland of the People's Republic of China (excluding conflict of laws). 3. If there is any dispute or dispute between you and this platform, it should be resolved through friendly negotiation first; if the negotiation fails, you agree to submit the dispute or dispute to the people's court with jurisdiction in the place where this agreement is signed. 4. The titles of all clauses in this agreement are for reading convenience only, have no actual meaning in themselves, and cannot be used as the basis for the interpretation of the meaning of this agreement. 5. The terms of this agreement are partially invalid or unenforceable for whatever reason, the remaining terms are still valid and binding on both parties. (End of text)