Privacy policy

Last revision date:September 11, 2021

 

This policy will help you understand the following aspects that may be involved in the use of Holy Bible:

1. How do we collect and use your Personal Information

2. How do we use cookies and similar technologies

3. How do we share, transfer and publicly disclose your personal information

4. How do we protect your personal information

5. Your Rights

6. How do we handle minors' personal information

7. How is your personal information transferred around the world

8. Governing Law and Jurisdiction

9. How is this Policy updated

10. How can I contact us

 

Knowing the importance of personal information to you, we will do our best to protect your personal information safe and reliable. We are committed to maintaining your trust in us and protecting your personal information by abiding by the following principles: the principle of alignment of rights and responsibilities, the principle of clarity of purpose, the principle of selective consent, the principle of least sufficient, the principle of guaranteed security, the principle of principal participation, and the principle of openness and transparency. At the same time, Holy Bible commitment, we will be in accordance with the industry's mature safety standards, take the corresponding security protection measures to protect your personal information.

Please read and understand this Privacy Policy carefully before using our products (or services).

 

Ⅰ. How do we collect and use your Personal Information

Personal information refers to all kinds of information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.

 

Knowing Holy Bible will only collect and use your Personal Information for the following purposes as set out in this Policy:

 

Business functions:

When you use Holy Bible app, in order to provide you with the corresponding services, we may require you to open the following terminal system permissions:

1. Read and write album permission, access album, save photos in "Share".

2. Access to IDFA rights, to provide you with more useful personalized advertising services.

If you refuse to open the above permissions, you will not be able to use the corresponding functions.

 

Other business functions:

1. To continuously improve and optimize our service experience, the product breakdown, we may collect your device model, operating system type and version, system language area in time, the only equipment identification number, IP address, crash logs, bosom Holy Bible app using frequency/click record and access networks, types and status.

2.Holy Bible app may provide a service to jump to third party apps/websites in advertising partnerships. Please be sure to read the User Agreement and Privacy Policy of the third party application/website carefully before using it, and confirm it before using it. Knowing Holy Bible does not access or save any data you use when using third party applications/websites.

3. When you give feedback, consultation or complaint to intimate Holy Bible app, in order to facilitate contact with you or help you solve the problem, we may need you to provide your name, mobile phone number, email and other effective contact information. If you refuse to provide the above information, it will affect the timely processing of the problem and feedback.

 

Ⅱ. How do we use cookies and similar technologies

1. Knowing Holy Bible app itself does not enable cookies and similar technologies. To provide a normal service, Holy Bible app presents some information in the form of web pages -- such as this privacy agreement that you are reading -- but these pages do not contain cookies.

2. The Holy Bible app may jump to the web pages provided by the advertiser during the advertising partnership, which may contain cookies. These cookies are set by the advertising service provider to ensure the advertising, and the Holy Bible app does not read or store these cookies.

 

Ⅲ. How do we share, transfer and publicly disclose your personal information

(1) Sharing

We will not share your Personal Information with any other company, organization or individual except:

1. Sharing with express consent: With your express consent, we may share your personal information with other parties.

2. We may share your personal information with others in accordance with laws and regulations, the needs of litigation dispute settlement, or the mandatory requirements of the competent government authorities or judicial authorities.

3. To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect the interests, property or safety of its users or the public from damage.

4. Sharing with our Affiliates. We will only share necessary personal information and are bound by the purposes stated in this Privacy Policy. If the Affiliate wants to change the purpose of processing personal information, it will seek your authorization and consent again.

5. Sharing with Authorized Partners: Certain of our services will be provided by authorized partners only for the purposes stated in this Policy. We may share some of your personal information with our partners to ensure the completion of the services we provide to you and to provide you with better customer service and user experience. We will only share your Personal Information for lawful, legitimate, necessary, specific and explicit purposes, and will only share such Personal Information as is necessary to provide the Services. Our partners are not entitled to use the shared personal information for any other purpose.

6. Currently, our authorized partners include the following types:

• Advertising partners. Their main purpose is to help us to statistics and evaluate the display effect of advertising and product data analysis, so that we can optimize our services so that you get a better experience. Personal information that we may provide to these partners includes IP address, device information (device model, operating system, unique device identifier, network access method, type and status, language time zone).

• Technical support partners. In order to complete the corresponding functions, we will access the SDK of a third party to obtain technical support, such as helping us to understand the product user distribution and data analysis. We may provide the following personal information to such partners. The Holy Bible may choose to use some of the partners or change the partners in different periods, so the partners in the list may be adjusted.

(2) Assignment

We will not transfer your Personal Information to any company, organization or individual, except in the following circumstances:

1. Transfer with express consent: After obtaining your express consent, we may transfer your personal information to other parties.

2. In the case of merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be subject to this Privacy Policy, otherwise we will require the company or organization to seek authorization from you again.

(3) Public disclosure

We will only publicly disclose your personal information in the following circumstances:

1. With your express consent.

2. Legal Disclosure: We may publicly disclose your personal information when required by laws, legal procedures, lawsuits or government authorities.

(4) Exceptions

In accordance with relevant laws and regulations, we may collect, share, transfer or publicly disclose your Personal Information without your authorized consent under the following circumstances:

1. Those directly related to national security, national defense security and other national interests.

2. Those directly related to public security, public health, public knowledge and other major public interests.

(3) Those directly related to criminal investigation, prosecution, trial and execution of judgment.

4. In order to protect your or other personal life, property, reputation and other important legal rights and interests, but it is difficult to get my consent.

5. Necessary for signing and performing the contract according to your requirements.

6. Those necessary to maintain the safe and stable operation of the products or services provided, such as finding and dealing with faults of the products or services.

7. When it is necessary to carry out statistical or academic research in the public interest and the results of academic research or description are provided to the outside world, the personal information contained in the results is de-identified.

8. Personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.

9. Other circumstances stipulated by laws and regulations.

 

Ⅳ. How do we protect your personal information

(1) We have adopted industry-standard security measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably practicable steps to protect your personal information. For example, data exchanged between your browser and the Service, such as credit card information, is protected by SSL encryption; We provide HTTPS secure access to the accompanying Web services provided by the product; We will use trusted protection mechanisms to protect our data from malicious attacks; We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; And we will organize security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

(b) We will take all reasonably practicable steps to ensure that no irrelevant personal information is collected. We are committed to keeping your personal information stored at all times for the period required by law or reasonably necessary to realize product features and services. Personal information beyond the deadline will be deleted or anonymized immediately.

(c) The Internet is not an absolutely secure environment, and email, instant messaging, and communication with other intimate users are not encrypted. We strongly recommend that you do not send personal information through such means.

(4) The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send us.

(5) After the personal information security incident unfortunately occurs, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions for you to prevent and reduce risks independently, the remedial measures for you, etc. We will timely inform you of the relevant situation of the event through email, phone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will also in accordance with the requirements of the regulatory authorities, the initiative to report the disposal of personal information security incidents.

 

V. Your Rights

In accordance with the relevant laws, regulations and standards of China, as well as the common practices of other countries and regions, we guarantee that you exercise the following rights to your personal information:

(I) Withdrawal of your authorization

If you wish to revoke your authorization, you can contact us through the contact information in this policy. We will process your request within a reasonable time of receipt of your email or registered letter.

However, please understand and agree that, when you withdraw some authorization, the relevant product functions will become unavailable, and we will be unable to continue to provide you with the specific functions and/or services corresponding to the withdrawal of the authorization, and your decision to withdraw the authorization will not affect the personal information processing previously carried out based on your authorization.

(ii) In response to your above request

1. For security reasons, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will give you a reply within 30 days.

2. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. We may refuse requests that are gratuitously repetitive, require too much technology (for example, require the development of a new system or a fundamental change in existing practices), pose a risk to the legitimate interests of others, or are highly impractical (for example, involve backing up information held on tape).

3. In accordance with the requirements of laws and regulations, we will not be able to respond to your request under the following circumstances:

• Directly related to national security and national defense security.

• Those directly related to public safety, public health and major public interests.

• Those directly related to criminal investigation, prosecution, trial and execution of judgment.

• There is sufficient evidence of your subjective malice or abuse of power.

• Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

• Those involving trade secrets.

 

Ⅵ. How do we deal with the personal information of minors

(a) Our products, websites and services are primarily aimed at adults. Minors are not allowed to create their own user accounts without the consent of a parent or guardian. If you are a minor under the age of 14, please be sure to read this Policy with your guardian before using our products and services, and ensure that you have obtained the express consent of your guardian before using our services and providing us with your personal information.

(2) In the case of collecting personal information of minors with parental consent, we will only use or publicly disclose such information when permitted by law, with the express consent of parents or guardians, or when it is necessary to protect minors.

(3) If your guardian does not agree with your use of our services or provide personal information to us in accordance with this Policy, please immediately terminate your use of our services and promptly notify us.

 

Ⅶ. How can your personal information be transferred around the world

We will store the personal information collected in the People's Republic of China in the People's Republic of China in accordance with the provisions of laws and regulations. At the same time, because we provide products or services through resources and servers around the world, this means that, with your authorized consent, your personal information may be transferred to or accessed from foreign jurisdictions in the country/region where you use the products or services. Such jurisdictions may or may not have different data protection laws. In such cases, we will ensure that your personal information is adequately and equally protected within the People's Republic of China. For example, we may request your consent to transfer your personal information across borders, or implement security measures such as data de-identification prior to cross-border data transfer.

 

Ⅷ. Applicable Law and Jurisdiction

This Privacy Policy is governed by the laws of the People's Republic of China. Disputes under this Privacy Policy shall be under the jurisdiction of the court where the defendant has his domicile.

 

Ⅸ. How to update this policy

(I) Our Privacy Policy may change or be amended. Without your express consent, we will not diminish your rights under this Privacy Policy. We will post any changes we make to this policy on this page. For significant changes, we will notify you via email, phone and push.

(II) Major changes referred to in this Policy include but are not limited to:

1. The purpose of personal information processing, the type of personal information we process and the way we use personal information will change.

2. Your rights to participate in the processing of personal information and the manner in which they are exercised have materially changed.

3. The personal information security impact assessment report indicates that there is a high risk.

 

Ⅹ. How to contact us

If you have any questions, comments, suggestions or complaints about this policy or service content, you can contact us through the following ways:

Please send an email to tinyblackhorse@163.com