《Letsgo Chinese Privacy Policy》

    Guangzhou Rixue Cultural Development Co., Ltd. (collectively referred to as "Letsgo Chinese," "we," "us," or "our"), with its registered address at Rooms 217 and 218, No. 79 Qinghe Middle Road, Shiqiao Street, Panyu District, Guangzhou, Guangdong Province, respects and emphasizes the importance of protecting the privacy and personal information of our users. This Privacy Policy ("Policy") explains how we collect, use, store, and protect your personal information when you use our products and services.
Please read and understand this Policy carefully before using our services. If you do not agree with the content of this Policy, we will be unable to provide you with our full services, and we kindly request that you immediately stop using our products and services.
You have the freedom to choose based on your own situation. By using or continuing to use the products and/or services we provide, you agree to our collection, use, storage, and protection of your personal information in accordance with this Policy.
We may revise this Privacy Policy from time to time in accordance with laws and regulations or due to business adjustments. When changes are made to this Privacy Policy, we will notify you through prominent prompts or push notifications after the version update.
You need to understand that only after you confirm and agree to the revised policy will we collect, use, process, and store your personal information in accordance with the updated Privacy Policy. You have the right to refuse to agree to the revised privacy policy. However, please be aware that such refusal may result in your inability to fully use our relevant services and functions, or failure to achieve the intended service effects.

Table of Contents

I. Definition of Terms

II. How We Collect, Store, and Use Your Personal Information

III. How We Protect Your Personal Information

IV. Your Rights

V. How We Handle Children's Personal Information

VI. How This Policy Is Updated

VII. How to Contact Us

I. Definition of Terms

1. Personal Information (as defined in GB/T 35273-2017 Information Security Technology - Personal Information Security Specification): Refers to various types of information recorded electronically or by other means that can, either alone or in combination with other information, identify a specific natural person or reflect the activities of a specific natural person. The personal information involved in this Privacy Policy includes: basic personal details (such as name, gender, phone number, email, and picture), online identity information (including system account, IP address, email address, and related passwords), personal property information (including bank account number, transaction and consumption records, virtual currency, and virtual property information), personal commonly used device information (including hardware serial number, model, device MAC address, operating system type, software list, and unique device identifier), and personal location information (including approximate and precise location information). The specific types of personal information we actually collect are subject to the descriptions provided in this Policy.
2. Sensitive Personal Information (as defined in GB/T 35273-2017 Information Security Technology - Personal Information Security Specification): Refers to personal information that, if leaked, illegally provided, or abused, may endanger personal and property safety, and could likely cause damage to personal reputation, physical and mental health, or lead to discriminatory treatment. The sensitive personal information covered in this Privacy Policy includes your personal property information, personal identity information (including identity document numbers), personal biometric information, online identification information, contact lists, precise location information, and shipping addresses. The specific types of sensitive personal information we actually collect are subject to the descriptions provided in this Policy.
3. Device: Refers to equipment used to access our products and/or services, such as desktop computers, laptops, tablets, or smartphones.
4. Account: When you register an account and provide us with certain personal information, you can better utilize our services. When you access our services, the system uses this account information to authenticate your identity to prevent unauthorized access to your account.
5. IP Address: Each device connected to the Internet is assigned a unique number known as an Internet Protocol (IP) address. These numbers are typically assigned based on geographical regions. An IP address can often be used to identify the location from which a device is connecting to the Internet.
6. Cookie: A cookie is a small file containing a string of characters that is sent to and stored on your computer, mobile device, or other device when you access a website or online service. Similar technologies include web beacons, proxies, and embedded scripts, which can be used for purposes similar to cookies.
7. Server Logs: Our servers automatically record the requests you make when visiting our website or using our services. These "server logs" typically include your web request, Internet Protocol address, browser type, browser language, the date and time of your request, and one or more cookies that may uniquely identify your browser.
8. Unique Device Identifier (Unique ID or UUID): A string of characters encoded into a device by the manufacturer, which can be used to uniquely identify the device (such as a mobile phone's IMEI number). Unique Device Identifiers serve various purposes, including facilitating advertising in contexts where cookies cannot be used (e.g., in mobile applications).

II. How We Collect, Store, and Use Your Personal Information

1. We collect and use personal information that you actively provide while using our services, or that is generated by your use of our products and/or services, in accordance with laws and regulations and following the principles of legitimacy, legality, and necessity. If we intend to use your personal information for purposes not specified in this Privacy Policy, or to use information collected for a specific purpose for other purposes, we will inform you through appropriate channels and obtain your consent again before such use .
2. The personal information we collect from you falls into two categories:
Information Essential for Core Business Functions: This information is necessary for the normal operation of our products and/or services. You must authorize us to collect it. Refusal to provide this information will prevent you from using our core products and/or services normally.
Information for Additional Business Functions: This information is not essential for the core business functions. You can choose whether to authorize its collection. If you decline to provide it, the additional functions may not work or may not achieve their intended effects, but this will not affect your normal use of the core functions.
3. We remind you that our products and services are diverse, and the specific core functions (and corresponding types of personal information collected) may vary depending on the product or service you use. Furthermore, as we continuously improve and introduce new features, we may need to collect new personal information or change how we use it. If a new function requires collecting personal information not described herein, we will inform you separately via policy updates, in-app prompts, pop-ups, or announcements, explain the purpose and scope, and obtain your explicit consent before collection. If you have questions, you can contact us using the methods provided in Article VII of this Policy.
4. We generally collect and use your personal information in the following scenarios:
4.1 Registration

4.1.1 When you register and log in to a Letsgo Chinese account, you need to provide information such as an account nickname, mobile phone number, or email address (used to receive verification codes for identity matching). Providing accurate information is necessary to successfully register and use the core features. Refusal to provide this information may prevent you from using the core product features.
4.1.2 Our product supports logging in with third-party platform accounts (e.g., Google, Apple, X). If you use this method, we will obtain relevant information (like username, nickname, avatar) and identity verification information from that platform based on your authorization. This is solely for login services and account security. Refusing this authorization will prevent you from using the third-party login but won't affect other services.
4.1.3 Please note that matching your phone number or email with a verification code involves sensitive personal information. We collect this based on legal requirements. Refusal may prevent account registration and use of related functions.
4.2 Payment Processing: When you make a payment for our products or services, you or the payment tool will provide relevant information such as your name, gender, ID number, password, grade, bank card number, transaction details, delivery address, and remarks.
4.3 Customer Support: When you contact our customer service or use after-sales services, you may provide account-related information or transaction details. Please note that uploading personal information (especially sensitive information) is not obligatory, but refusing to provide it may limit our ability to offer you additional services.
5. Information Shared by Other Parties: When you use services provided by our affiliates or partners, they may share your relevant information with us based on your authorization. If you log in via a third party, we will request your personal information from them. For information we need but cannot obtain from third parties, we will ask you to provide it. Refusal may impede the normal use of certain services. We will use information from third parties after confirming the legality of the source and in compliance with relevant laws and agreements .
6. Information Collected Automatically: When you use our services, we may automatically collect:
Log Information: Technical data collected via cookies or similar methods, including device/software configuration, your IP address, device version and identifier, search terms and URLs you visit, information about previously used apps, communication metadata (account, time, data), metadata of shared content (e.g., date/time/location of photos), and network data (e.g., mobile operator, WiFi signals).
Location Information: When you enable location services, we collect your geographic location via GPS or WiFi. You can stop this collection anytime by turning off the location function.
Audio, Video, and Photo Information: We collect this information after obtaining your authorization when you use specific functions like voice search, scanning, or taking photos. Refusing authorization only affects the specific function, and you can disable it anytime.
As we improve our services, we may introduce new features requiring new information. If significant changes occur in data collection or usage, we will notify you and may update this policy.
7. Third-Party SDKs: To provide comprehensive services, some functions are provided by authorized third parties, with whom we may share necessary personal information. This sharing is for legitimate, specific purposes, and third parties cannot use the information for other purposes. Their information collection is governed by their own privacy policies. We recommend reviewing their policies. If you refuse third-party collection necessary for a service, you may be unable to use that service on our platform .
Function type Third-party SDK name Purpose of use Involving personal information Third-party SDK official website/privacy policy link
Collect user behavior data Firebase Analytics Used to improve the application experience Device information (device model, operating system version)、 Application usage data 、User interaction events (page visits, button clicks, etc.) 、Geographical location information (rough area) https://policies.google.com/privacy
Capture application crash information Firebase Crashlytics Used for fixing bugs Collapse stack information ,Application runtime environment information ,Basic information of the equipment,It may contain a small amount of application status data https://firebase.google.com/support/privacy
User authentication and management Firebase Authentication Authorized login User email address,User's mobile phone number (if SMS verification is used),Social media account information (such as Twitter/X, Google, etc.),Anonymous user identifier,Login status and timestamp https://firebase.google.com/support/privacy
Provide Google ID and credential management Google Identity Services Authorized login Google account information,User Credentials,Login status https://policies.google.com/privacy
Through the social login function provided by Firebase Authentication Twitter/X Social Login Authorized login User public information (username, profile picture, etc.), Authorization token information,Equipment information and usage data https://support.google.com/googleplay/android-developer/answer/16558241?sjid=2743327828135466774-NC&visit_id=639055294709856795-3825592510&rd=2
Handle in-app purchase transactions Google Play Billing Library In-app purchase transactions Purchase transaction information,Order status,Product ID information https://www.mob.com/about/policy
Provide in-app update functionality Google Play In-App Update Library Allow users to update the application version directly within the application Application version information,Update status and progress,Equipment compatibility information, Google Play Store installation status https://policies.google.com/privacy
Store multimedia resources Tencent Cloud COS Store multimedia resources Upload media files,Store access logs https://cloud.tencent.com/document/product/436/40921
8. Storage of Personal Information
Storage Location: We store your personal information within the People's Republic of China. Cross-border transfers will require your separate authorization and consent.
Storage Period: We retain your personal information for the period necessary to provide our services, unless you request deletion or account cancellation, or as required by law. Anonymized information is handled without requiring additional authorization or notice.
9. How We Use Your Information: We use the collected information to:
Conduct data analysis to improve our services.
Verify identity, provide customer service, ensure security, prevent fraud, archive data, and back up information.
Design new services and improve existing ones.
Invite you to participate in voluntary surveys.
Ensure safety and comply with legal investigations.
Perform aggregated, anonymized data analysis and mining (including for commercial use), ensuring individuals cannot be identified.
Use information from one service to improve other services, subject to legal compliance, to provide a better user experience.
Unless you delete your account or withdraw consent, we will continue to use your personal information as per this Policy during your use of our services. After account cancellation, we will delete or anonymize your personal information upon request, unless otherwise required by law.

III. How We Protect Your Personal Information

We highly value information security and employ various security technologies and procedures to prevent the loss, misuse, unauthorized access, or disclosure of your information. For example, in some services, we use encryption technology (like SSL) to protect the personal information you provide. However, please understand that due to technological limitations and evolving risks, while we strive to implement robust security measures, we cannot guarantee absolute information security. You should be aware that the systems and communication networks you use to access our services may encounter issues beyond our control .
We have established a dedicated team responsible for researching, developing, and implementing security technologies and procedures. Security assessments are conducted for relevant management personnel and those in key security positions. A comprehensive information security management system and an internal security incident response mechanism are in place.
We cultivate data security awareness among employees, provide training and assessments, implement identity authentication and access controls, and require employees and partners with access to your personal information to sign confidentiality agreements. Violations of these agreements result in termination of employment or cooperation and may lead to legal pursuit. Confidentiality obligations continue after personnel leave their positions .
In the event of a personal information security incident, we will promptly inform you in accordance with legal requirements, detailing the incident's circumstances, potential impacts, measures taken or to be taken, suggestions for mitigating risks, and remedial measures. Notification will be provided via email, letter, phone, push notification, etc. If individual notification is difficult, we will issue a public announcement. We will also report the incident handling to regulatory authorities as required .

IV. Your Rights

You have the following rights regarding your personal information:
Access Right
Account Information: Log in to your account to access or edit your profile, change your password, add security information, etc.
Usage Information: View order details on our website or client. You can also contact us to request deletion of this information. We will provide it after verifying your identity, unless otherwise stipulated by law.
Other Information: For other personal information or operational issues, contact us as provided in Article VII. We will provide the information after identity verification, unless otherwise stipulated by law.
Right to Correction
After identity verification, and provided the correction does not affect information objectivity and accuracy, you can correct or update erroneous or incomplete information. You can do this directly on our platform or, in specific cases (like data errors), submit a correction request to us. Note that some initial registration information may not be modifiable for security and identification reasons.
Deletion Right
You can submit a request to delete your personal information to us through the contact information provided in Article VII, for instance, if you no longer need our services. This is subject to data having been anonymized or other legal stipulations.
Right to Data Portability
If you need a copy of your personal data, you can contact us. After verifying your identity, we will provide you with a copy (e.g., basic and identity information) from our services, unless otherwise stipulated by law.
Withdrawal of Consent
You can modify authorizations (e.g., for location, contacts, camera) through your device settings or within our product's function settings. Contact us if you encounter issues. Withdrawing consent means we stop collecting that information and can no longer provide the related services. However, this does not affect the processing and storage of information based on your prior authorization before withdrawal, unless you exercise your deletion right.
Right to Account Cancellation
You can cancel your account by contacting our customer service (WeChat ID: waiyu555) or via email at service@92waiyu.com. After verifying your account ownership, we will process the cancellation within three working days. Account cancellation will result in the inability to use our full range of services. Please note, if you have unused balance or unfinished courses, we may not immediately support cancellation and will prompt you to take action first. After cancellation, all account information will be cleared, and personal data will be deleted per your request, unless otherwise required by law. If you logged in via a third-party account (e.g., Google, Apple, X), you need to apply for cancellation with that third party.
Right to be Informed of Service Cessation
If our products or services cease operation, we will notify you 15 days in advance via the product's main page, in-app messages, email, or other suitable means. We will stop collecting your personal information and, as required by law, delete or anonymize the information we hold, unless otherwise stipulated.
Exceptional Circumstances
We may be unable to fulfill your requests in the following situations, as permitted by laws and regulations:
Directly related to national security and defense security.
Directly related to public safety, public health, and significant public interests.
Directly related to criminal investigation, prosecution, trial, and execution of judgments.
There is sufficient evidence indicating you have subjective malice or are abusing your rights.
Responding to your request would seriously harm your own legitimate rights and interests or those of other individuals or organizations.
Involving trade secrets.

V. How We Handle Children's Personal Information

Minors under the age of 18 are not allowed to create their own user accounts without the consent of their parents or guardians. If you are a minor, please ensure your parents or guardians have read this Privacy Policy and only use our services or provide information after obtaining their consent. For the collection of personal information from minors with parental consent, we will only use and protect this information as permitted by law, with explicit parental consent, or when necessary to protect the minor. If parents or guardians discover that a minor has provided information without their consent and needs modification or deletion, please contact us at service@92waiyu.com. We will respond promptly upon receiving the notification .

VI. How This Policy Is Updated

Our Privacy Policy may change. We will not diminish your rights under this Policy without your explicit consent. Updates will be announced on this page. For significant changes, we will provide more prominent notification (e.g., via our official website or pop-up prompts). Significant changes include, but are not limited to:
1. Significant changes in our service model, including changes in the purposes, types, or methods of personal information processing.
2. Significant changes in our ownership or organizational structure (e.g., due to business adjustments, bankruptcy, mergers, acquisitions).
3. Significant changes in your rights regarding personal information processing and how to exercise them.
4. Changes in the department responsible for personal information security, its contact details, or complaint channels.
5. Personal information security impact assessment reports indicating high risk.

VII. How to Contact Us

You can contact us through the following methods. We will respond to your request within 15 working days:
1. For questions, opinions, or suggestions regarding this policy: service@92waiyu.com
2. To report potential personal information leaks: service@92waiyu.com
3. Our dedicated personal information protection department: service@92waiyu.com
If you are dissatisfied with our response, especially if you believe our handling of your personal information has infringed your legitimate rights and interests, you may also file a lawsuit with the court having jurisdiction over the defendant's domicile.