Tweeba Privacy Policy

Wuhan Tweebaa Technology Co., Ltd., as the main operating company of Tweebaa APP, was established on July 7, 2023. Its registered address is Building 8, Building 8, Fanhai International SOHO City (Phase I), Central Business District, Jianghan District, Wuhan City, Hubei Province Room 18 on the floor, the legal representative is Yu Lijie.


We understand the importance of personal information and would like to use this summary to briefly introduce to you how we collect, use and protect your personal information.


1. Personal information collected to provide services

· Business functions: account registration, login

· Types of personal information: registration information (including mobile phone number); online identification information (including account number, password); information filled in by users (including avatar, nickname); public information registered on third-party platforms (including avatar, nickname and username) Authorized other information)

· Business functions: search, browse, collect, share, comment, like

· Type of personal information: information generated from clicks, browsing, searches, inquiries, collections, sharing, etc. generated during access and use

· Business functions: security risk control

· Types of personal information collected: Common device information (such as device Mac address, device serial number, unique device IMEI/Android_ID/device ID/GUID, OAID, ICCID, GAID/AAID, device identifier (such as IDFV), SIM card IMSI information , SD card data, WIFI SSID, BSSID, device IP, etc.); personal location information (GPS positioning); when the APP is running in the foreground: obtain the device serial number, obtain sensor information; running process information, installed APP information; may be called Permissions: access network, access network status, access WI-FI status, stay awake, BODY_SENSORS, software installation list information, running process information, service log information, network information, transaction information, address book, SMS and other necessary information ( (See list below)


2. Apply for permission to use to provide services

In order to implement functional services such as publishing posts, comments, chat interactions, products, etc., we may apply to use your following permissions: camera, photo album or storage, microphone recording, location, address book.

You can view and manage the system permissions we have applied for from you through Settings - System Permission Management.


3. Personal information shared with third parties

In order to provide you with the function of logging in using a third-party account, your personal information may be shared with the following third parties. We will continue to improve and enhance the security level of your personal information in accordance with legal and regulatory requirements and with reference to industry best practices. We strictly follow the provisions of the Privacy Policy. Once we involve sharing your sensitive personal information or adding new sharing parties, we will ask for your authorization and consent again.

For details about your personal information we share with third parties, please seeThird-party SDK situation description


4. How you manage your information

You have the right to manage your personal information, including querying, correcting and deleting your account, changing the scope of your authorization or consent, or withdrawing your authorization, and canceling your account.

This policy only applies to Wuhan Tweebaa Technology Co., Ltd.’s Tweebaa APP products or services.

Last updated: December 2023.

If you have any questions, comments or suggestions, please contact us through the following contact information:

Email: support@tweebaa.com

Phone: 17538233597

This policy will help you understand the following:

1. Personal information collection and use rules

2. How we use cookies and similar technologies

3. How we protect your personal information

4. your rights

5. How we process children's personal information

6. How your personal information is transferred globally

7. Copyright statement involved in this application

8. How to update this policy

9. How to contact us

[Technology Co., Ltd.] (hereinafter referred to as "we") understands the importance of personal information to you and will do its best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: principle of consistency of rights and responsibilities, principle of clear purpose, principle of choice and consent, principle of minimum necessity, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry.

Please read and understand this "Personal Information Protection Policy" carefully before using our products or services.

1. Personal information collection and use rules

(1) Provide you with functional services


1. Business function one: Register as a user

To complete the account creation, you need to provide the following information:Three types of personal information: your phone number, created username and password

When you use this business function, our App will apply to you for the following system permissions related to personal information: location information, device information (such as device MAC address), software installation list information, running process information, storage and other system permissions . If you do not authorize it, we will be unable to provide this business function.

In addition to the above permissions, you can choose whether to grant other system permissions to the App. If you log in with a third party, log in with a WeChat account, QQ account, Weibo account or authorize binding the WeChat account, QQ account and Weibo account after logging in with your mobile phone number, we will request your information from the associated third party personal information.

(1) When you log in with your QQ account, we will access and obtain your QQ avatar, nickname, region and gender information;

(2) When you log in using your WeChat account, we will obtain your WeChat avatar, WeChat nickname, gender and region information;

(3) When you log in with a Douyin account, we will obtain your Douyin avatar, Douyin nickname, gender and region information;

(4) When you log in using your Apple ID, we will obtain your Apple ID email address. In order to ensure account security and implement the online real-name system, you may still need to bind a valid mobile phone number when you use other methods to log in or use certain functions of the Tweebaa App.


2. Business function two: Users can publish posts, comments, products, etc. by themselves.

You can publish posts, comment on posts, publish new product information and other functions in the app. In the process, your personal information will be collected as tag attributes of these functions, so that other users can see the content and location of the posting user. , to enhance the viewing user's deeper understanding of the message. For example, providing location information can enhance other users' trust in the message. In the future, relevant information may be pushed to you based on these identifiers.

If you choose to use this business function, the necessary information you need to provide us or allow us to collect includes: location information, SD card data, network information, camera, photo album or storage.


3. Business function three: Users can add friends, text chat or voice and video chat with friends, etc.

You can add friends by mobile phone number or user ID in the app. The mobile phone number can be obtained directly from the address book with your permission, or the added friends can be written to the address book simultaneously. During the chat interaction process, SD card resources (pictures, audio, videos, etc.) may be referenced, the microphone or camera may be used for voice and video chat, and location information may also be sent, etc.

If you choose to use this business function, the necessary information you need to provide us or allow us to collect includes: camera, microphone recording, photo album or storage, address book, location information, SD card data, and network information.


4. Business function four: Provide push services for related module functions to optimize user experience and send relevant messages about changes in posts/comments/chats you have participated in.

a. In order to provide you with a better experience when using it, we will provide you withProvide your posts/comments/products/chat interactions, etc. and push relevant information to you to remind you of these related changes. During the push process, the information you provide may be used as a push channel and your Tweebaa App Possibly self-started through pushed related messages

If you choose to use this business function, the necessary information you need to provide us or allow us to collect includes: five types of personal information: mobile phone number, WeChat number, Weibo account, QQ account, and Douyin account.

b. Personalized push and convenient service. By analyzing and using users' personal information (including browsing history, retrieval content, click-to-view records, transaction records and IP addresses, operators, language used, access date and time), we can provide more convenient and personalized information to users in a targeted and accurate manner. Push service and other help services.

c. For the above push services, you can turn on or off through My->Settings on the upper right->Message Notification->Personalized Push.


(2) Carry out internal data analysis and research, third-party SDK statistical services, and improve our products or services. We collect data based on your interaction with us and the choices you make, including your privacy settings and the information you use. Products and features.
The data we collect may include SDK/API/JS code version, browser, Internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, unique device identifier, iOS advertising identifier IDFA, Android Advertiser Identifier, Network Card (MAC) address, International Mobile Equipment Identity (IMEI), International Mobile Subscriber Identity (IMSI), device model, device serial number, Android ID, terminal manufacturer, terminal Device operating system version, session start/stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage, etc.

In order to adapt to the use of this application and third-party platform services on different mobile devices, to achieve your mobile device identity authentication, mobile device security, receive information push, share information through third-party platforms, payment security and other related purposes, this application access third-party SDK. The above-mentioned third-party SDK providers include social platforms, communication operators and third-party payment institutions. Some third-party SDKs may call your device permissions and obtain your relevant information so that you can use corresponding functions normally on different mobile devices or third-party platforms. The type of device permissions called by different third-party SDKs and the information obtained may be different, which may include obtaining your location information, reading/writing your external memory card, reading your mobile phone status and identity, viewing WLAN connections, etc. Regarding the specific types of device permissions called by the third-party SDK, and how to collect and use your personal information, we recommend that you refer to the relevant service agreement and privacy policy of the third-party SDK. If you want to know more about the third-party SDK we have connected, please readThird-party SDK situation description


(3) How we entrust you to process, share, transfer and publicly disclose your personal information

1. Entrust processing

Certain specific modules or functions in this business function are provided by external suppliers. For example, we may engage service providers to assist us in providing customer support.

We will sign confidentiality agreements with companies, organizations and individuals that we entrust to process personal information, requiring them to process personal information in accordance with our requirements, this personal information protection policy and any other relevant confidentiality and security measures.

2. Share

We will not share your personal information with any company, organization or individual outside our company, except in the following circumstances:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.

3. Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy. If affiliated companies want to change the purpose of processing personal information, they will ask for your authorization and consent again.

4. Sharing with authorized partners: Only to achieve the purposes stated in this privacy policy, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In such cases, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and we will only share personal information necessary to provide services.

We will sign confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

3. Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

2. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to continue to be bound by this privacy policy. Re-ask for your authorization and consent.

4. Public disclosure

We will only publicly disclose your personal information under the following circumstances:

(1) After obtaining your explicit consent;

(2) Disclosure based on law: We may publicly disclose your personal information when required by law, legal proceedings, litigation or mandatory requirements from government authorities.

(3). The following is a clear list of collection of personal information:

Please readThird-party SDK situation description

(5) Instructions for self-start and associated startup

1. In order to ensure that the application can normally receive the information pushed by the client when it is closed or running in the background, the application must use the (self-starting) capability, and there will be a certain frequency of sending broadcasts through the system to wake up the application's self-starting or associated startup behavior. It is necessary to realize functions and services.

2. When you open a content push message, the relevant content will be redirected to you after obtaining your explicit consent. There will be no self-initiation or associated activation without your consent.

3. When you open a file downloaded within this App, the third-party App will be launched in association with it.

2. How we use cookies and similar technologies

(1) Cookies

To ensure the normal functioning of the system, we will store small data files called Cookies on your computer or mobile device. Cookies usually contain an identifier, the site name, and some numbers and characters. With the help of cookies, the system can store your personal information, preferences, products and other data.

We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer or mobile device, and most web browsers have the ability to block cookies. However, if you do this, you will need to change your user settings yourself each time you visit our website. To learn more about changing your browser settings, visit the official browser websites for help: Internet Explorer, Google Chrome, Mozilla Firefox, Safari, and Opera.

(2) Website beacons and pixel tags

In addition to Cookies, we also use other similar technologies such as web beacons and pixel tags on our website. For example, emails we sent you may contain click URLs linked to content on our website. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded into a website or email. With the help of pixel tags in emails, we can learn whether the emails have been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

(3) Do Not Track

Many web browsers have a Do Not Track feature that issues a Do Not Track request to a website. Currently, the major Internet standards organizations have no policies in place that govern how websites should respond to such requests. However, if your browser has Do Not Track enabled, all of our sites will respect your choice.

(4) Others

For other technologies that may be related to your personal data, Wuhan Tweebaa Technology Co., Ltd. reserves the right to explain when necessary.

3. How we protect your personal information

(1) We have used security protection measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably feasible measures to protect your personal information. For example, the exchange of data (such as credit card information) between your browser and the "Service" is protected by SSL encryption; we also provide https secure browsing on our website; we will use encryption technology to ensure the confidentiality of data; we will Use trusted protection mechanisms to prevent data from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information. know.

(2) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.

(3) The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other our users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.

Tweebaa.com is not responsible for any leakage of personal information caused by users telling others their personal passwords or sharing their registered accounts with others.

Tweebaa does not assume any responsibility for network service interruptions or other defects caused by force majeure or reasons beyond Tweebaa's control, but will try its best to reduce the losses and impacts caused to users.

(4) The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability.

(5) After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures you can take to prevent and control your own information. Recommendations for reducing risks, remedial measures for you, and more. We will promptly notify you of the incident-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner.

At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

4. Your rights

In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights with respect to your personal information:

(1) Access your personal information

You have the right to access your personal information, except for exceptions provided by laws and regulations. If you wish to exercise your right to access your data, you can do so yourself by:

Account information - If you want to access or edit the personal information in your account, change your password, close your account, etc., you can do so by accessing the personal information in the personal center or finding the change password, canceling account, etc. in the settings. Such operations.

If you are unable to access this personal information through the above methods, you can always go to the "Interaction" tab of the application -> "Message" tab at the top -> Tweebaa address book -> slide to find "Aini" and give us feedback on your needs. Your access request will be responded to as soon as possible.

For other personal information generated during your use of our products or services, we will provide it to you as long as we do not need to invest too much. If you want to exercise data access rights, please go to the "Interaction" tab -> "Message" tab at the top -> Tweebaa Address Book -> We will respond to your access request as soon as possible

(2) Correct your personal information

You have the right to have it corrected when you discover an error in the personal information we process about you. You can correct it by yourself through the method in "(1) Access to your personal information". If you are unable to correct this personal information through the above methods, you can go to the "Interaction" tab -> "Message" tab at the top -> Tweebaa address book -> slide to find "Aini" and give us feedback on your needs, and we will Respond to your access request as soon as possible.

(3) Delete your personal information

You can make a request to us to delete personal information under the following circumstances:

1. If our handling of personal information violates laws and regulations;

2. If we collect and use your personal information without your consent;

3. If our processing of personal information violates our agreement with you;

4. If you no longer use our products or services, or you cancel your account;

5. If we no longer provide you with products or services.

If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and require them to delete it promptly, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization.

When you delete information from our services, we may not delete the corresponding information in the backup system immediately, but we will delete the information when the backup is updated.

(4) Change the scope of your authorization and consent

Each business function requires some basic personal information to be completed. You can give or withdraw your consent at any time for the collection and use of additional personal information.

You can operate by yourself in the following ways: modify or delete personal information where you fill in the personal information under the "My" tab.

When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

If you do not want to accept the commercial advertisements we send you, you can cancel at any time by: in the application settings, select push notifications to off.

(5) Personal information subject cancels account

You can cancel your currently registered account at any time. You can do this in the following ways:

In the app, click the "My" tab->Settings on the upper right->Account Security->Enter the account cancellation page. After carefully reading the matters needing attention when canceling the account, log out by clicking "Cancel Account". After canceling your account, we will stop providing products or services to you and delete your personal information according to your request, unless otherwise provided by laws and regulations.

If you still log in to the APP through the SMS verification code after canceling your account, a new account will be registered for you, and all data on the previous account cannot be retrieved.

(6) Personal information subject obtains a copy of personal information

You have the right to obtain a copy of your personal information. You can do this yourself by:

Click the "Interaction" tab -> "Message" tab at the top -> Tweebaa Address Book -> Slide to find "Aini" and give us feedback on your need to obtain a copy. We will respond to your request as soon as possible.

Where technically feasible, such as data interface matching, we may also directly transfer a copy of your personal information to a third party designated by you upon your request.

(7) Constraint information system automatic decision-making

In some business functions, we may make decisions based only on non-human automated decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legal rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate relief.

(8) Respond to your above request

For security reasons, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

We will respond as soon as possible. If you are not satisfied, you can also complain through the following channels:

Click the "Interaction" tab -> "Message" tab at the top -> Tweebaa Address Book -> Slide to find "Aini" and send us feedback and complaints. We will deal with them as soon as possible and promise that the maximum time limit will not exceed 15 years. working days.

In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. For those that are gratuitously repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) request, we may deny it.

We will not be able to respond to your request under the following circumstances:

1. Relevant to the personal information controller’s performance of obligations stipulated in laws and regulations;

2. Directly related to national security and national defense security;

3. Directly related to public safety, public health, and major public interests;

4. Directly related to criminal investigation, prosecution, trial and execution of judgments;

5. The personal information controller has sufficient evidence to show that the personal information subject has subjective malice or abused rights;

6. To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the individual;

7. Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;

8. Involving business secrets.

5. How we process children's personal information

Our products, websites and services are primarily intended for adults. Children should not create their own personal information subject account without the consent of a parent or guardian.

For cases where we collect personal information from children with parental consent, we will only use or publicly disclose this information as permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.

Although local laws and customs may define children differently, we consider anyone under the age of 14 to be a child.

If we discover that we have collected personal information from children without first obtaining verifiable parental consent, we will seek to delete the data as quickly as possible.

6. How your personal information is transferred globally

(1) Storage of personal information

In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. At the same time, your personal information will only be retained for the period necessary to achieve the purposes stated in this policy, unless there are mandatory retention requirements by law. We will anonymize the user behavior logs involved in our services. Our criteria for judging the aforementioned period include:

1. Complete the transaction purposes related to you, maintain corresponding transaction and business records, and respond to your possible inquiries or complaints;

2. Ensure the safety and quality of the services we provide you;

3. Do you agree to a longer retention period;

4. Is there any other special agreement on the retention period?

After your personal information exceeds the retention period, we will delete your personal information or make it anonymized in accordance with the requirements of applicable laws (if you are a minor, after your personal information exceeds the retention period, the platform will Relevant laws and regulations require the corresponding processing of your personal information). If it cannot be deleted in accordance with relevant requirements due to special circumstances, we will explain this part to you.

(2) Global transfer of personal information

Because we provide products or services through resources and servers around the world, this means that, with your authorization and consent, your personal information may be transferred to overseas jurisdictions in the country/region where you use the products or services, or subject to access from these jurisdictions.

Such jurisdictions may have different or no data protection laws. In such cases, we will ensure that your personal information is adequately protected within the People's Republic of China. For example, we may ask for your consent to the cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.

7. Copyright statement involved in this application

All other contents of this APP except for off-link products, including but not limited to posts, comments and other graphics, pictures, text information, audio, video, software, programs and web page layout design and arrangement, are independently owned by the Company.

It is strictly prohibited for any individual or unit to reproduce, copy, republish, tamper with, or otherwise affect the uniqueness of the content on Tweebaa without the permission of the company. Tweebaa membership accounts are only owned by the registered user. Proprietary. It is strictly prohibited to use one account by multiple people. If the above situation is discovered, the company will have the right to stop the use of the account and take legal action according to the seriousness of the case.

8. How to update this policy

Our personal information protection policy may change.

Without your explicit consent, we will not reduce your rights under this personal information protection policy. We will post any changes to this policy on this page.

When there is a major update to the Privacy Policy, we will re-obtain the user's consent through a pop-up window (including for some services, we will send a notification via email explaining the specific changes to the personal information protection policy).

Major changes referred to in this policy include but are not limited to:

1. Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;

2. We have undergone major changes in ownership structure, organizational structure and other aspects. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;

3. The main objects to whom personal information is shared, transferred or publicly disclosed change;

4. Significant changes in your rights to participate in the processing of personal information and how you exercise them;

5. When our responsible department, contact information and complaint channels for handling personal information security change;

6. When the personal information security impact assessment report indicates that there is a high risk.

We will also archive older versions of this policy for your review.

9. How to contact us

If you are not satisfied with our response, especially if our personal information processing behavior harms your legitimate rights and interests, you can also seek solutions through the following channels:

Name of platform operating entity: Wuhan Tweebaa Technology Co., Ltd.

Registered address: Room 18, Floor 8, Building 8, Fanhai International SOHO City, Central Business District, Jianghan District, Wuhan City, Hubei Province

Contact number: 17538233597

Email: support@tweebaa.com

We will review the content involved as soon as possible and respond to your questions, comments and suggestions within 15 working days.