DAWA Privacy Policy

We are fully aware of the importance of personal information to you and will do our best to protect your personal information. We are committed to maintaining your trust in us and abiding by the following principles: protecting your personal information, the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring safety, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take appropriate security measures to protect your personal information in accordance with mature security standards in the industry.

Please read and understand this policy carefully before using this platform.

This Privacy Policy will help you understand:

•We will collect and use your information in accordance with the Privacy Policy, but will not collect personal information in a forced bundling manner simply because you agree to this Privacy Policy.

• When you use or enable related functions or services, we will collect and use relevant information as necessary to achieve the functions and services. Unless it is necessary information required to achieve basic business functions or in accordance with laws and regulations, you can refuse to provide it without affecting other functions or services. We will explain which information is necessary item by item in the privacy policy.

• Camera, microphone, and photo album permissions are not enabled by default. They will only be used to implement specific functions or services with your explicit authorization, and you can also withdraw the authorization. It is particularly important to point out that even if we obtain these sensitive permissions with your authorization, we will not collect your information when the relevant functions or services do not require it.

•This Privacy Policy applies to your access and use of our products and services through our applications, our software development kits (SDKs) and application programming interfaces (APIs) for use by third-party websites and applications.

The following will help you understand in detail how we collect, use, store, transmit, share, transfer (if applicable) and protect personal information; help you understand how to query, access, delete, correct and withdraw authorized personal information. Among them, we have highlighted the important terms and conditions related to your personal information rights and interests in bold, please pay special attention.

1. Scope of application of this User Privacy Policy and the meaning of related terms

2. How we collect and use personal information

3. How do we use cookies and other similar technologies?

4. How do we share, transfer, and publicly disclose personal information?

5. How we store personal information

6. How do we protect the security of personal information?

7. Manage your personal information

8. Minors Clauses

9. How we update this policy

1 0 . SDK Technical Description

1 1. Contact us

( I ) Scope of application of this User Privacy Policy

This User Privacy Policy is the universal content that applies to all our products and/or services. When you use any of our products and/or services, this User Privacy Policy applies, regardless of whether the product and/or service has a separate privacy clause, and regardless of whether you are a browsing user (visitor) or a registered user. However, please note that this User Privacy Policy does not apply to the following situations: (1) The information collection/processing practices of third parties that provide advertising services for our products and/or services; (2) Our products and/or services may contain or link to information and/or third-party services provided by third parties (including any third-party applications, websites, products, services, etc.). Such information and/or services are operated by third parties, and your use of such information and/or services has nothing to do with us. We kindly remind you that when you use third-party information and/or services, you should pay attention to and carefully read the relevant user agreements and privacy policies displayed to you by the third party, and properly keep and provide your personal information with caution. This "User Privacy Policy" only applies to your personal information collected by us, and does not apply to any third party's collection of your personal information, any services provided by any third party or any third party's information usage rules. We do not assume any responsibility for any third party's collection, storage and use of your personal information within the scope permitted by law; (3) Other products and/or service content not provided to you by this APP.

(II) Meaning of relevant terms

(1) Personal information: refers to various information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. The personal information involved in this privacy policy includes basic personal information (including personal name, birthday, gender, etc.), personal Internet browsing history (including website browsing history, software usage history, click history), personal commonly used device information (including hardware serial number, hardware model, device MAC address, operating system type, software list, unique device identification code (such as IMEI/Android id/IDFA/OPENUDID/GUID, SIM card IMSI information, etc., which describes the basic situation of personal commonly used devices). The specific types of personal information we actually collect are subject to the description below.

( 2 ) Device: refers to a device that can be used to access our products and/or services, such as a desktop computer, laptop, tablet or smartphone.

( 3 ) Unique device identifier (UUID): refers to a string of characters that is programmed into a device by the device manufacturer and can be used to uniquely identify the device (e.g., the IMEI number of a mobile phone). Unique device identifiers have a variety of uses, including the ability to serve advertising when cookies cannot be used (e.g., in mobile applications).

( 4 ) IP address: Every device that accesses the Internet is assigned a number, called an Internet Protocol (IP) address. These numbers are usually assigned based on geographic location. An IP address can usually be used to identify the location of a device when it is connected to the Internet.

( 5 ) SSL: SSL (Secure Socket Layer) is also known as Secure Sockets Layer. It is a security protocol implemented on the transport communication protocol (TCP/IP). SSL supports various types of networks and provides three basic security services, all of which use public key and symmetric key technology to achieve information confidentiality.

( 6 ) Cookies: Cookies are small files containing strings of characters that are sent and stored in your computer, mobile device or other device (usually encrypted) when you log in and use a website or other online content. Cookie-like technologies are other technologies that can be used for similar purposes as cookies, such as Web Beacons, Proxy, embedded scripts, etc.

( 7 ) Account: When you register an account and provide us with some personal information, you can better use our services. When you access this APP, the system will use this account information to authenticate you to prevent unauthorized persons from accessing your account.

( 8 ) De-identification/anonymization: refers to the process of technically processing personal information so that the subject of the personal information cannot be identified without the aid of additional information, and the processed information cannot be restored.

( 9 ) Server logs: Our servers will usually automatically record the web page requests you make when you visit our website. These "server logs" typically include your network request, Internet Protocol address, browser type, browser language, the date and time of your request, and one or more cookies that can uniquely identify your browser.

2. How we collect and use personal information

We will collect the information you actively provide when using the service, as well as the information generated by you in the process of using the function or receiving the service through automated means in the following ways: We will collect the content and information you upload or publish through our platform, including text, shared photos, recordings, and the date and time of such information. When you use the above functions, for example, when a user uses the voice function, we will apply for your recording function permission or we will request you to authorize the camera, microphone permission and device location information permission. We will collect and use your account information, device information, log information and transaction record information. After you authorize and agree, we will access your microphone, album, and camera information . You understand and agree that the services we provide may require you to turn on your camera (camera), album (photo gallery), and microphone (voice) in your device to realize the collection and use of information involved in these permissions. When you use the relevant services, we will pop up a window to prompt you whether you want to turn on the corresponding permissions. You can view the status of the above permissions item by item in your device settings "Me-Settings-Privacy-System Permissions", and you can decide to turn these permissions on or off at any time. Please note that when you enable any permission, it means that you authorize us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, it means that you have cancelled the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, and we will not be able to provide you with the services corresponding to the permission. We will receive and record information about the device you use (such as device model, operating system version, device settings, unique device identifier (IMEI, MAC address) and other software and hardware feature information) based on the specific permissions you grant during software installation and use. Please allow us to obtain the status of your mobile phone, including obtaining IMEI and identity, memory card content (obtaining SD card data), and external storage space. However, your decision to close permissions will not affect the previous collection and use of information based on your authorization. The specific application of each permission is:

( 1 ) Photo album permission: When you use the Android and iOS versions of our APP to set up avatars and send pictures, you can enable photo album permission to upload pictures from your device. If you do not enable this permission, you will not be able to use functions related to picture upload, but it will not affect your use of other services.

our APP on Android and iOS , you can enable camera permissions to take real-time photos and upload photos. If you do not enable this permission, you will not be able to use the functions related to photo or video shooting, but it will not affect your use of other services.

( 2 ) Microphone permission: When you use the voice service in our APP on Android or iOS , you can enable microphone permission and click the voice recording or sending button to record or send voice so that we can collect your voice content and perform necessary processing. If you do not enable this permission, you will not be able to use voice input related functions, but it will not affect your use of other services.

2.1 Registration, Login, Personal Data

2.1.1 Register and log in to your account a. When you register or log in to our and related services, we will collect your mobile phone number, Android ID, IMSI, IMEI, OAID, device Mac address, IP address, and obtain activity information to create a platform account. You can also use a third-party account to log in and use our APP . You will authorize us to obtain the public information (avatar, nickname, and other information you authorize) you registered on the third-party platform for binding with our account, so that you can directly log in and use this product and related services. b . Logging in to a third-party account: When you use our account to log in to a third-party account, with your consent, we may share your nickname, avatar, and other information you authorize.

2.1.2 Personal Data During the registration and use of the service, if you provide the following information and complete your personal information: avatar, photo album, signature , nickname, gender, birthday , it will help us provide you with better services and experience. The above information you provide will continue to authorize us to use during your use of the service. When you actively cancel your account, we will anonymize or delete your personal information as soon as possible in accordance with the requirements of applicable laws and regulations.

2.2 Interaction​

a. When you send pictures or other content or make a post, we will collect the information you post and display your nickname, avatar, posted content and information.

b. When you use the Send Picture function, we will ask you to authorize camera, photo, and microphone permissions. If you refuse to provide authorization, you will not be able to use this function, but it will not affect your normal use of our other functions.

c . Unique device identifier (IMEI, MAC address) and other hardware and software feature information), please allow us to obtain your phone status including obtaining IMEI and identity, storage card content (obtaining SD card data), and external storage space .

2.3 Friend Recommendation

a. We may recommend friends to you completely randomly .

2.5 Safe Operation

a. We are committed to providing you with safe and reliable products and usage environment. Providing high-quality and reliable services and information is our core goal. The information collected to achieve security functions is necessary information.

b . When you use this platform, in order to ensure the normal operation of the basic functions and services of this platform, you need to agree that we collect the following information about your device (i.e. mobile device information necessary for the normal operation of this platform): hardware model, operating system version number, International Mobile Equipment Identity (IMEI), network device hardware address (MAC), software version number, IP address, WLAN access point, operation log, network access method, network access type, status, network quality data, operation, use, service log, device sensor information used to detect device risks and perceive the switching between horizontal and vertical screens during audio and video calls (including gravity sensor, magnetic field sensor, acceleration sensor), etc.

c. We may use your account information, device information, service log information, and information shared by our affiliates and partners with your authorization or in accordance with the law to determine account security, conduct identity authentication, and detect and prevent security incidents.

2.6 Changes in the purpose of collecting and using personal information Please understand that as our business develops, there may be some adjustments and changes to our functions and services. In principle, when new functions or services are related to the functions or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios where there is no direct or reasonable connection with the original processing purpose, we will inform you again and obtain your consent when we collect and use your personal information.

2.7 Personal information collected and used without consent in accordance with the law Please understand that in the following circumstances, in accordance with laws, regulations and relevant national standards, we collect and use your personal information without your authorization and consent:

a.Other circumstances prescribed by laws and regulations.

3. How do we use cookies and other similar technologies?

Cookies and similar technologies such as device information identifiers are commonly used technologies on the Internet. When you use our and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information when you visit and use this product. We promise not to use cookies for any other purpose other than the purposes stated in this privacy policy. We use cookies and similar technologies mainly to achieve the following functions or services:

3.1 Ensure safe and efficient operation of products and services We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you have logged into the service safely or whether you have encountered theft, fraud or other illegal activities. These technologies will also help us improve service efficiency and increase login and response speed.

3.2 In our sharing pages, we may use cookies to record browsing activities for the purpose of troubleshooting crashes, delays and other abnormal situations and exploring better service methods .

3.3 Clearing Cookies Most browsers provide users with the function of clearing browser cache data. You can perform the corresponding data clearing operation in the browser settings. If you clear the data, you may not be able to use the services or corresponding functions provided by us that rely on cookies.

4. How we share, transfer and publicly disclose personal information

4.1 Sharing

4.1.1 Sharing Principle a. Authorization and consent principle: We will not share your personal information without your consent, unless the shared personal information is de-identified and the third party cannot re-identify the natural person subject of such information. If the purpose of the third party's use of the information exceeds the scope of the original authorization and consent, they need to obtain your consent again. b. Principle of legality and minimum necessity: The shared data must have a legal purpose, and the shared data must be limited to what is necessary to achieve the purpose. c. Security and Prudence Principle: We will carefully evaluate the purpose of third parties using shared information, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with the cooperation legal agreement. We will review the software tool development kits that partners use to obtain information. Strict security monitoring is performed on SDK and API to protect data security. 4.1.2 Sharing of security and statistical analysis information a. Ensure safe use: We attach great importance to the security of accounts, services and content. In order to protect the account and property security of you and other users and protect your and our legitimate rights and interests from unlawful infringement, we and our affiliates or service providers may share necessary equipment, account and log information. b. Analyze product usage: In order to analyze the usage of our services and improve the user experience, we may share statistical data on product usage (crashes, flash backs) with affiliates or third parties. It is difficult to identify your personal identity by combining this data with other information.

4.2 Transfer a. We will not transfer your personal information to any other third party unless we have your explicit consent. b. As our business continues to develop, we may merge, acquire, or transfer assets, and your personal information may be transferred as a result. When the aforementioned changes occur, we will require the successor to protect your personal information in accordance with laws and regulations and security standards no less stringent than those set forth in this Privacy Policy, otherwise we will require the successor to obtain your authorization and consent again.

4.3 Public Display a. We will not disclose your information publicly unless it is in compliance with local laws and regulations or with your consent. When we disclose your personal information publicly, we will adopt security protection measures that meet industry standards. b. When announcing penalties for illegal accounts or fraudulent behavior, we will disclose the information of the relevant accounts.

4.4 Personal information that is exempted from consent for sharing, transfer, and public disclosure in accordance with the law Please understand that in the following circumstances, in accordance with laws, regulations and national standards, we do not need to obtain your authorization or consent to share, transfer, and publicly disclose your personal information: a. Local legal requirements.

5. How we store personal information

5. 1. Storage period We only retain your personal information for the period necessary to provide us and our services: we will retain the information you post and related information as long as you do not withdraw, delete or cancel your account. After the necessary period, we will delete or anonymize your personal information, unless otherwise provided by laws and regulations.

6. How do we protect the security of personal information?

a. We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being improperly used or accessed, disclosed, used, modified, damaged, lost or leaked without authorization.

b. We will use encryption technology, anonymization processing and other reasonable and feasible means that are no less than those of our peers in the industry to protect your personal information, and use security protection mechanisms to prevent your personal information from malicious attacks.

c. We will establish a special security management system and data security process to protect the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology in a timely manner.

d. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. We will do our best to ensure the security of the personal information you provide to us.

e. You are aware and understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information.

f. We will formulate emergency response plans and immediately activate them when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you. We will promptly inform you of the relevant situation of the incident by push notification, email and related forms. When it is difficult to inform you one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also report the disposal of user information security incidents in accordance with the requirements of relevant regulatory authorities.

g . Once you leave us and our related services and browse or use other websites, services and content resources, we will have no ability and direct obligation to protect any personal information you submit to software or websites outside of us and our related services, regardless of whether you log in, browse or use the above software or websites based on our links or guidance.

7. Manage your personal information We attach great importance to your management of personal information and do our best to protect your rights to query, access, modify, delete, withdraw consent, cancel your account, file complaints, and set up privacy functions, so that you can protect your privacy and information security. You can change the scope of consent or withdraw your authorization for the camera, microphone, and album permissions in the device's own operating system. After withdrawing authorization, we will no longer collect information related to these permissions.

7.1 . Change or withdrawal of authorization for information processing Specific business functions and services will require your information to be completed. Once you withdraw your consent or authorization, we will no longer be able to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect our previous processing of personal information based on your authorization.

7. 2. Cancel your account You can cancel your account in Links to Internet [Use] - [Settings] - [delete Account]. Before you cancel your account, you should be aware and understand that canceling your account is irreversible. After you cancel your account, we will delete your relevant information or anonymize it, unless otherwise provided by laws and regulations.

7. 3. Complaints and Reports You can file a complaint or report in accordance with our publicized system. If you believe that your personal information rights may be infringed, or if you find clues of infringement of personal information rights, you can contact us via email at liulongke@gmail.com . We will respond to your complaint and report within 15 days after verification.

7. 4. Notification of cessation of operation If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations by individual delivery or announcement, and delete or anonymize your personal information held.

8. Minors Clauses

We attach great importance to the protection of personal information of minors. Due to the characteristics of this software, we do not provide software and services to minors. Our products, websites and services are only for adults over 18 years old. When you use our services, we presume that you have the corresponding civil capacity. Any minor under the age of 18 may not create their own user account/or use our services. If we find or review any minor registering or using our products, we will take measures such as canceling the account and deleting information to prohibit and restrict the use of minors. For minor accounts that have been recharged and used, provide relevant certificates in accordance with the process for refund processing.

9. How we update this policy

a. In order to provide you with better services, we and related services will be updated and changed from time to time. We will revise this Privacy Policy from time to time. These revisions constitute part of this Privacy Policy and have the same effect as this Privacy Policy. Without your explicit consent, we will not reduce your rights under this Privacy Policy currently in effect. we will issue the updated version and remind you of the updated content through the app before the updated terms take effect, so that you can keep up to date with the latest version of this Privacy Policy.

10.SDK Technical Description In order for you to use the following services and functions, our application will be connected to a third-party SDK. The SDK technology is provided by a third-party organization that cooperates with us. We can only know the permissions that the third-party organization requires to obtain authorization. Your information will be collected by the third-party organization and we cannot obtain your information. The permissions that the third-party organization requires and the personal information that it clearly discloses to us shall be subject to the following table.

Tencent IM
Purpose: User chat
Usage scenario: public chat
Data types: APPID, UIN, device ID, Tencent Cloud ID , user nickname, avatar URL , any written, photo, audio and video message content
Official website link: Flutter | Tencent Cloud (tencentcloud.com)
Privacy Agreement: Privacy Policy | Tencent Cloud (tencentcloud.com)