top of page

Private communication

private policy

This policy applies to the provision of proprietary goods and clothing. Please use "xx" for each item before delivery, please be sure to understand this policy, special policy. Please read the terms and conditions below, please make sure you fully understand and agree to the terms and conditions before resuming use. This policy is easy to understand when you read it, and it is easy to understand the general expression.
Hongo Private Policy Shoujosuke Etsu I understand the following content.
1. Specifications and optional accessories
2. How do I collect and use personal information?
3. How do we use cookies?
4. How do we share information about how we share information, what we say, and what information we share with the public?
5. Information about how we protect ourselves and how we live
6. How to manage your own information and information safety
Seven, others

1. Applicable accessories
a) At the time of the current reference system, personal reference information (comprehensive manual number);

b) If you are currently using this system, please use this system to access information on a computer, or when using this system, you can automatically access the information on the computer, comprehensive information. However, there are unlimited IP location, survey type, usage language, visit date, time and date, special information about the case, and the number of requests for information, etc.;

c) The number of persons who will use this system to legally proceed with the acquisition of commercial and commercial equipment.

d) Location information: When you use the location, we will collect the location information you need.

e) Installation information: If the normal operation of the service is guaranteed, the customer will be provided with a problem check or will be provided with the service, the hard case type number of the collection of our meeting, Operation system complete version, equipment layout, only equipment location MAC, equipment location MAC, equipment connection information, equipment location information, etc. The basic system is different, the information representation characters are different.

f) Equipment limitations:

1. Telephone call limit ): If you have access to the main platform, you may be required to make a telephone call for the purpose of receiving this information, excluding this information, or for other purposes.

2. Existence limit (读 copy 存储): 为了existent储necessary to use the arrangement of the sentence below, change the place of choice, update content, change the table, or take the request on the same page, the same content, the need to use the existing option.

3. Comparison machine limitations: When we use the speed or drawing mode, there are limits to the coordination machine according to our demand.

4. Compatibility limit: When the user wants to change the image or copy the image in contrast, there is a limit to the ability to copy the image if the user wishes to use it. 

I understand and agree to the following information regarding this policy: 

a) Information on the key words that are currently in use and available for search and delivery; 

b) The number of information collected in this series is comprehensive, but unlimited, with unlimited participation, communication information and review information;

c) Measures taken to determine the violation of the law or the conduct of the violation of the original system and the adoption of the original system.

Below are the image information, pictures, and information on the number of media used in the meeting:
1. Collected pictures/Multi-media type
When using this function, we can collect pictures or multiple media:
上传的图片: Inclusive but unlimited use of the master's movement on the top of the original 图片, 编辑后的图片(as滤镜处り), shortened 图.
Partial element number: Partial fragments can include additional information (such as time, equipment type, geographical location), information about the information we [meet/not see] collect in this category.
Completion of the accompaniment: The function of the young player's use of the beat light, the image of the time of our meeting was completed [functional purpose, the placement of the image, the identification of the image, etc.].

2. Numerical applications
The purpose of the collection is as follows:
- Provided by Yen [concrete ability, like “Head image self-determination” “Picture content analysis”].
- Ascertainment of the implementation of changes (for example, the anonymization procedure model).
- Compatibility with the requirements of the law.

3. Safety and security
Existence location: The number of fragments is on the original equipment/end equipment.
Suspension period: 30 days after the original image is removed, the number of existing controllers is suspended before removal.
Security measures: You can use SSL/TLS security, and use AES-256 standard.

4. Utilization
The following restraints are in place:
删DIVISION STANDING: Passing "setting-me-excluding-me-pictures" Perpetual-excluding-you-pictures.
Consent to withdraw: There is no limit to the use of the system, and there is no limit to the access to the system.
A number of originals were published: A duplicate copy of a copy of a copy of the book, which was published in a booklet box.

5. Third party co-enjoyment
Here are some details for you to enjoy:
Service provider: For example, there is a service provider, and the policy is to comply with this policy.
Anonymized numbers: When used for accounting analysis, there is no guarantee that the individual will be identified.

6. 儿子隐体
I will not intentionally collect the number of children's pictures below 13 years (or the legal age of the district where I am located). As you can see, we will remove the system immediately.


2. Information use
a) Personal information for the purpose of sharing, distributing, paying taxes, sharing or trading personal information, excluding any personal information that may be provided by a third party without prior appointment, or the third party Japanese version. (Includes the book system's original license company) The service provided by Germany or jointly, and after the service has been completed, the general owner may not be allowed to use the service, including the previously owned property.

b) Personal information that may not be used by any third party to collect, edit, or release personal information. The above-mentioned activities for the various series of books, as well as the above-mentioned activities, will be completed immediately.

c) Personal information for personal use, information provided by customers, comprehensive but unlimited use of personal information for personal use In other words, the information may be sent to other parties by way of collaboration with other parties (with prior consent of those who request it).

d) For further use, please provide additional clothing or products, and personal information for use in the following form:
The requirements of the law law;
Foundational training;
The terms and conditions of the Nezumoto system are set out in terms of terms and conditions for use and permission for use.

e) Information provided by the customer and the latest information sent by the customer. After the message is sent, I will send the message to you with lower accuracy or correlation, but the function will be limited to normal use and other non-required functions.


3. Cookie-like use
a) Under certain circumstances, cookies may not be accepted by this system, and cookies may not be configured or used on accounting machines by this system. This system may use cookies, but we also provide a more thorough and comprehensive service.

b) You may choose to accept or decline cookies. You may refuse to accept cookies by modifying or modifying them. However, if you choose to refuse to accept cookies, you may be able to register or use cookies without any legal restrictions or functionalities.

c) Cookies may be used for general purposes, and may be used for general purposes.

4. Information presentation

Under the circumstances, the personal will or legal requirements of this individual may be disclosed in whole or in part:

a) Agreed in advance and disclosed to third party;

b) If you provide us with the additional goods and clothing you require, you will also be required to provide personal information to a third party;

c) Based on the basic legal definition, the demands of some administrative or judicial institutions, and the disclosure of certain administrative or judicial institutions to third parties;

d) If the current situation is contrary to China's law, the law or the person's original service may be discontinued or the circumstances of the request may be disclosed to a third party;

e) It is a suitable knowledge to know that a person can make a contribution, request a person to be invested, show a person to be invested, and send a message that can be easily processed by both parties;

f) During a certain trade on a construction site based in Japan, someone has fulfilled or partially fulfilled the trade duties and requests for information to be submitted. , This system has determined the direction and provides the necessary information such as the communication method for the trade, thereby facilitating the completion of the trade or the continuous resolution.

g) Appropriate presentation of relevant laws, regulations or office policies.

5. Information exchange
This collection of information and resources for the company is a collection of information and resources. It is possible to send the information to the country, region, or region where you are located, or if you wish to visit outside the country's borders, you may be able to display the information.

We provide personal information that is necessary for the purpose of personal policy, service for third parties, business cooperation, business cooperation, etc.

Information on receiving the envoy's ability, information on distributing information on the third side of the platform, use of land management, broadcast monitoring and other necessary functional uses, and SDK or other similar usage procedures for our own use. When you use Huayu/Xiaomi/Miku when using Huayu/Xiaomi/Mizu SDK, please check the separate number for the request, contact information, and send notifications;您 Use high-definition provision of land clothing, high-definition SDK demand, opening configuration, location limit, collection, location communication information, installation, identification name, connection communication communication information.

Our association will teach you how to use the information, and we will work together with you to provide you with the information you need. We will take certain specific security measures, the purpose of our commission, service details, actual private policy, and personal information regarding other security measures.

We have a collection of IMSI, IMEI, configuration MAC location, connection table, configuration sequence number, and how to determine how to register for Android ID.The purpose is to conveniently use the registration function.

Personal information or limitations included in this policy:
(1) Basic information (comprehensive name, date of birth, gender, place of residence, telephone number, telephone box);
(2) Personal information (comprehensive personal identification information, etc.);
(3) Sales information (comprehensive trade record and sales information on gold, iron, etc.);
(4) Personal location information;
(5) Contact your personal information breath (comprehensive system purchase name, IP location, 邮Box地址 and the above-mentioned information, secret security);
Reading history;
(6) Personal record (comprehensive search record, search history, point history);
(7) Personal equipment information (comprehensive hardware model number, equipment MAC location, operational system specific type);
(8) The only way to read the list is to read it (like IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information, internal description of the person's common equipment, basic information information, existence collection ICCID, Android ID, IP, IMSI, SD card number, IMEI, installation sequence, installation sequence, user sensor, MAC, cutting board behavior).


Third-party SDK column table:
(1) SDK name: SDK for mobile intelligence final payment preparation
Package name: com.bun
SDK House: China Information and Communication Research Institute
SDK description: Export, Xiaomi, OPPO, vivo, China, China, Customer, Samsung, etc.
Personal information: Tori OAID

(2) SDK name: Takatoku SDK
Effect: Localization and display of map and poi Quote
Collection personal information type: demand acquisition external property status, recent primary geolocation information, location location, location type, location, location, IMEI, MAC location, WiFi information.
Personal policy information: https://lbs.amap.com/pages/privacy/


(3) SDK name: Alipay-Ali Alipay
Effect: Use Alipay.
Collection personal information type: family language, family unique identification, external status, network type, equipment type, equipment manufacturer, SIM card number, IMEI, MAC location, ANDROID_ID, IP location, WiFi Information, security list, OpenUDID.
Personal policy information: https://www.alipay.com/

(4) SDK name: WeChat
Function: Use WeChat development platform SDK, support WeChat transfer, WeChat share support WeChat support.
Collection personal information type: Third-party license, configuration information (comprehensive open UDID, unique IMEI, IOS IDFA, MAC location, equipment model number, final equipment operating system complete edition, final manufacturing manufacturer),设计语语、时间和网络/语言情形态关关information、用于统计计计您旨用们的应用数SET;Bugly SDK meeting CRASH environment (comprehensive CRASH Information and link schedule (ROM/RAM/SD card capacity), package name for program, program name for program, program name belonging to program, installation information (open UDID, IOS notification label (IDFA), MAC location, international migration equipment identification (IMEI), equipment type number, final equipment operation system, final version (Manufacturer's business), installation language, time zone Japanese mail order/language status information, user judgment collection, accounting CRASH information. )
Private policy contact: https://open.weixin.qq.com/

(5) SDK name: QQSDK
Collected personal information categories: equipment model number, operation system complete edition, unique equipment identification, electric battery, signal strength, communication edition edition, survey equipment type, IP location, geographical location, service daily information, communication daily information
Purpose: support QQ teaching and sharing
腾讯隐Private policy: https://www.tencent.com/zh-cn/privacy-policy.html

(6) SDK name: 腾讯Bugly SDK
Collection person information type: At the time of collection progress information, it is bugly SDK general collection, usage information (comprehensive: third-party developer self-determined information, Logcat information from the application), connection information, family name, family version, IMEI, IMSI, DEVIC

EID equipment MAC site and national information
Purpose: Provide app review, process order review, help developers quickly create a problem
User agreement: https://bugly.qq.com/v2/contract

6. How to manage your own information and information safety
(1) Information security
a) The name and secret information of the uniform safety protection function, reasonable storage and use. We will take security measures such as security and security measures to ensure that the information is not lost and will not be missed. The above-mentioned safety measures are in place, but please be aware that at the same time, there may be no "perfect safety measures" in the information.

b) During the course of trade, it is inevitable that the system in use should be able to provide information on necessary trade methods or potential trade methods, as well as personal information, how to communicate with others, or the location of the person's government. Please be reasonable and protect your own personal information, while providing necessary information to others. As you can see, you can reveal your personal information secretly, and that's the name you use for the original system, and you can also use the official name and secret information.

(2) How to manage your own information
a) Management information for this registration

Seven, others
1. The law of the People's Republic of China for the purpose of private policy arrangement, implementation, implementation and dispute resolution.
2. If the dispute was resolved by the dispute, the dispute was not successful, and the court where the dispute was located was resolved by the court.

bottom of page