Updated: September 22, 2022
Table of Contents of Hobiton
II. How we collect and use your personal information
IV. How we share, transfer, and publicly disclose your personal information
V. How we protect your personal information
VI. Your rights
Seven, how we store your personal information
VIII. Protection of minors' information
IX. Contact us
X. How to update this policy
XI. Dispute Resolution
II. How we collect and use your personal information
2.2 Personal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information. Such as name, date of birth, identity document number, personal biometric information, address, communication contact method, communication record and content, account password, property information, credit information, travel track, accommodation information, health and physical information, transaction information, etc.
Sensitive personal information is personal information that may endanger personal and property safety if leaked, illegally provided or misused, and is highly likely to lead to damage to personal reputation, physical and mental health or discriminatory treatment, etc.
2.3 Normally, we will collect information that you actively provide when using products and services, as well as information generated during the use of functions or receipt of services by automated means in the following scenarios in the following manner.
2.3.1 Registration, Login
(1) When you register, log in to Hobiton and use the services, you will need to create an account with your cell phone number and provide us with your gender and date of birth. If you refuse to provide the above information, you may not be able to register and use Hobiton successfully. cell phone number is sensitive personal information, if you refuse to provide it, you will not be able to use it for registration and login, but it does not affect your login by other means.
We collect and store the above information for as long as you use Hobiton. When you cancel your account, we will anonymize or delete the above information in accordance with legal and regulatory requirements.
2.3.2 User or dynamic recommendations
When you need to use our recommended nearby users, we will record your geographic location information after obtaining your independent choice to agree to open the location permission. This information is personally sensitive and refusal to provide this information will prevent you from using the above mentioned features normally, but will not affect your normal use of Hobiton's other features. In addition, you can turn off the relevant features at any time.
2.3.3 Voice Dating
When you use the voice dating function, you need to turn on the microphone and storage permissions for voice accordingly. It is necessary to turn on the phone's memory access to enable this feature. You can also turn on/off this permission at any time through the relevant function settings of your device. When you cancel this permission, we will no longer be able to provide you with the corresponding services mentioned above.
2.3.4 Uploading dynamic, avatar and photo
When you upload avatar or photo, post news, including text, picture, voice and short video, you need to turn on camera, recording, album and storage permission accordingly. At the same time, you can also turn on/off the permission at any time through the relevant function settings of your device. When you cancel this permission, we can no longer provide you with the corresponding services mentioned above. The dynamic photos, texts, videos, comments and likes you upload will be stored on our servers, as storage is necessary to enable this function. We store this information in an encrypted form and you can delete it at any time. We will not make such dynamic information available to the public or use it for purposes other than this feature, unless you choose to do so or comply with relevant laws and regulations.
Special Note: The information you publicly post may involve personal information or even sensitive personal information of you or others, such as pictures containing sensitive personal information that you choose to upload when you post your news. Please consider more carefully whether to share or even publicly share relevant information when using our services. We recommend that you do not upload photos and other personal information of minors or other minors in your household, and if you do, you are deemed to have consented to our collection of the aforementioned personal information of minors that you have uploaded.
2.3.5 Complaints, Feedback
When you initiate a complaint, grievance or inquiry with Hobiton, we may require you to first provide your account information and match it with your previous personal information to verify your user identity for your account and system security. We may also ask for your name, cell phone number, email and other contact information, and ID (sensitive personal information) in order to contact you or help you resolve a problem. In addition, we collect information about your communications with us (in the form of text/picture/audio/video/call logs), and other information necessary to relate to your needs. If you refuse to provide such information, we may not be able to provide you with timely feedback on the outcome of your complaint, grievance or inquiry. When making a complaint, grievance or inquiry, you may need to open the corresponding photo album, camera, microphone to communicate with online customer service and provide the appropriate materials. Of course, you can also turn on/off this permission at any time through the relevant function settings of your device.
2.3.6 Payment function
When you open VIP membership service or purchase coins on Hobiton, you need to use the payment function. During the payment process, Apple pay order number (IOS) needs to be collected. The above information is necessary for us to provide you with the information you need to purchase goods and/or services, and we cannot obtain information about your personal property based solely on this information, nor can we identify information about the identity of a specific natural person.
When you perform cell phone authentication, we will collect and store your real name cell phone number for completing account registration; when you perform real name authentication, you will need to provide your real name, ID number and face information (face recognition) for further verification of the authenticity of your information
Based on the information collected from you, we will conduct comprehensive statistics and do feature and preference analysis through algorithms, which will be used to make personalized recommendations to you, display or push information about specific content that may be of interest to you, or push special tips for specific features or services that are more suitable for you.
We may collect search history, browsing
history, gift information, device information (OS version, phone model, device
network information, hardware serial number, device MAC address, unique device
identifier (IMEI, Android ID, UUID, IMSI)), who likes/shares/comments/interacts
with you when you use our products and/or services, your This information is
used to help us better understand how you access and use our products and/or
services, maintain and improve our products and/or services, or otherwise
respond to you. We collect and use this information in a de-identified manner,
and the data analysis only corresponds to specific codes that cannot be
directly associated with the user's identity and cannot and will never be
associated with your true identity.
2.3.9 If we obtain your information indirectly from a third party, we will explicitly ask that third party in writing before collection to collect personal information after having obtained your consent in accordance with the law and inform you of the content of the information shared, and those involving sensitive information need to be explicitly confirmed by you before being provided to us for use, and require the third party to make a commitment to the legality and compliance of the source of personal information, and if the third party has If the third party has violated the law, we will explicitly ask the other party to bear the corresponding legal responsibility; at the same time, our professional security team will carry out security protection for personal information (including classification of sensitive information, access control of sensitive information use, encrypted storage of sensitive information, etc.). We will use means and measures that are no less protective than those we use for our own users' personal information to protect the personal information we indirectly obtain.
2.3.10 To improve the security of your use of our products/services, to protect your personal and property safety or that of other users or the public from infringement, to better prevent security risks such as phishing sites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion, and to more accurately identify violations of laws and regulations or Hobiton's relevant agreement rules, we may use or integrate your user information, transaction information, device information (operating system version, phone model, device network information, device hardware serial number, device MAC address, unique device identifier (IMEI, Android ID, UUID, IMSI)), phone privileges (to read phone status and identity), relevant web logs, application installation lists, and information that our partners have obtained your authorization or shared with us in accordance with the law (of which (among others, we may collect MAC addresses, IMEI and other device identifiers for risk verification during the background operation of the application or in silent state) to comprehensively determine your account and transaction risks, verify your identity, detect and prevent security incidents, and take necessary recording, auditing, analysis and disposal measures in accordance with the law.
2.3.11 You understand and agree that the products/services we provide may require you to turn on your device information (OS version, phone model, device network information, hardware serial number, device MAC address, unique device identifier (IMEI, Android ID, UUID, IMSI), user clipboard), location information, camera, photo album microphone, storage, and phone privileges (reading phone status and identity) to enable the collection and use of information covered by these privileges. You will be prompted by a pop-up when you use the service to ask if you want to turn on the relevant permission. You can check the status of these permissions in your device settings and decide for yourself whether to turn them on or off at any time. Please note that by turning on any of the permissions, you authorize us to collect and use the relevant personal information to provide you with the corresponding services, and by turning off any of the permissions, you cancel your authorization, and we will no longer collect and use the relevant personal information based on the corresponding permissions, and will not be able to provide you with the services corresponding to the permissions. However, your decision to close the permission will not affect the collection and use of information based on your authorization.
2.3.12 HobitonAPP is not self-starting or associated with startup.
An itemized list of the information collected and used by each product/service is provided in this policy
Cookies are small data files called cookies that we store on your computer or mobile device to ensure that the site works properly, to make your visit easier, and to suggest content that may be of interest to you. cookies typically contain an identifier, the site name, and some numbers and characters. Cookies enable websites to store data such as your preferences.
3.2 Web beacons and pixel tags
In addition to cookies, we use other similar technologies such as web beacons and pixel tags on our websites. For example, an email we send you may contain a link to an address that links to content on our site, and if you click on that link, we track that click to help us understand your product or service preferences so that we can proactively improve our customer service experience. A web beacon is typically a transparent image embedded in a website or email. With the help of pixel tags in emails, we can tell if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
3.3 Keeping products and services safe and efficient
3.4 SDK Technology
SDK technology is provided by third parties with whom we work, and we are only aware of their requests for authorized access. The third party will need to collect information from you and we will not have access to your information unless the third party explicitly discloses to us the sensitive information to be collected. The permissions required by the third party and the sensitive information they explicitly disclose to us for collection are detailed in
Third Party SDK Information Collection Instructions
IV. How we protect your personal information
4.1 We use security measures that meet industry standards to protect the personal information you provide against unauthorized access, public disclosure, use, modification, damage or loss of data. We will use various security measures within a reasonable level of security to safeguard the information. For example, we may use encryption technology (e.g., SSL), anonymization processes, and other means to protect your personal information. We have established access control mechanisms to ensure that only authorized personnel have access to personal information; from time to time, we conduct security and privacy training courses to enhance our employees' awareness of the importance of protecting personal information.
4.2 We enhance the security capabilities of the software installed on your device through constantly improving technical means to prevent the leakage of your personal information. For example, we will complete some information encryption locally on your device for secure transmission; to prevent viruses, Trojan horses or other malicious programs, websites will know the information of the applications installed on your device or the information of running processes.
4.3 We have established special management systems, personal information protection security departments, processes and organizations to safeguard the security of information. For example, we strictly limit the scope of people who access information, require them to comply with confidentiality obligations, and conduct audits.
4.4 In the event of a security incident such as leakage of personal information, we will initiate an emergency plan to prevent the expansion of the security incident and inform you by push notification, announcement, etc.
4.5 We will take all reasonably practicable measures to ensure that no unrelated personal information is collected. We will only retain your personal information for as long as is necessary to achieve the purposes described in this policy, unless an extended retention period is required or permitted by law.
4.6 The Internet is not an absolutely secure environment, so we strongly recommend that you take proactive measures to protect the security of your personal information, including but not limited to using complex passwords, changing your password regularly, and not disclosing your account password and other personal information to others. If you discover that your personal information, especially your account or password, has been compromised, please provide feedback immediately through Hobiton Online Customer Service so that we can take appropriate measures based on your application.
4.7 The Internet environment is not 100% secure and we will do our best to ensure or warrant the security of any information you send to us. In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation of the security incident and the possible impact, the measures we have taken or will take to deal with it, the suggestions you can independently prevent and reduce the risk, the remedial measures for you, etc. We will promptly inform you of the event-related situation by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement.
At the same time, we will also take the initiative to report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.
V. Your rights
We understand your concern about personal information, in order to make it more convenient for you to access, correct, supplement and delete your personal information, as well as to protect your right to withdraw your consent to the use of personal information and to cancel your account, we have provided you with the corresponding operational settings in the product design, and you can refer to the following guidelines for operation. In addition, we have also set up a feedback channel, and your comments will be dealt with in a timely manner.
5.1 Accessing, correcting and supplementing your personal information
To access, correct and supplement your basic information such as avatar, my album, my news, basic information, basic conditions, and mate selection conditions.
After logging in to your account, click on "Me" and follow the instructions on the page to access, correct and add information.
5.2 Accessing and correcting your cell phone number
After logging in to your account, click on "Me", click on "Mobile Phone Authentication", and then access and correct your information.
5.3 Accessing your VIP membership and wallet
After logging in to your account, click on "Me" and follow the instructions on the page to access your membership and wallet.
If you are unable to access, correct, or supplement
your personal information through the means described above, you may contact us
Us". We will respond to you within 15 business days of receiving your
In the event that you encounter difficulties in exercising the above rights or otherwise may not be able to provide you with online self-correction/correction services at this time, you have the right to correct or amend incorrect or incomplete information after verification of your identity and provided that the correction/correction does not affect the objectivity and accuracy of the information, or in certain circumstances, particularly in the case of data errors, through our published feedback and error reporting You have the right to correct or amend your data by submitting your request for correction/amendment to us through measures such as our published feedback and error reporting, except where otherwise provided by law or regulation. However, for security and identification reasons, you may not be able to correct some of the initial registration information submitted during registration.
5.4 Deletion of your personal information
For some of your personal information, you may also voluntarily delete the information you provided through the function pages of the relevant products and services provided by us.
5.5 Cancellation of your account
After logging in to your account, click on "Me", click on "Settings", and then click on "Delete Account".
Note: When you cancel your account, we will delete or anonymize your personal information.
5.6 Report a complaint
After logging in to your account, click on "Me", click on "Settings", click on "Feedback", fill in the content and submit.
5.8 Withdrawal of your authorization of personal information
Some of the functions of the products and services we provide require your permission to use the device (including: location, photo album, camera, microphone, storage permission, phone permission (read phone status and identity), depending on the actual functions obtained by the product), you can revoke your authorization by closing some or all of the permissions in the operating system of your mobile device itself. We will no longer collect information related to these permissions. You may revoke your continued authorization of all of your personal information at any time after authorization has been granted, by canceling your account, as described in Section 6.5. You understand that if you withdraw your authorization, we will not be able to continue to provide you with the specific features and/or services for which you have withdrawn your authorization. However, your decision to withdraw your authorization will not affect the processing of personal information previously carried out on the basis of your authorization.
VI. Contact Us
(1) You may contact us by locating our online customer service on the product features page on our platform or by submitting feedback online.
(2) You may contact us by sending an email ([email protected]) or through online customer service.
6.2 We will reply to you as soon as possible after receiving your comments and suggestions and within 15 days after verifying your user identity.
VII. How to update this policy
7.2 Material changes include, but are not limited to.
(1) Significant changes to our service model. such as the purposes for which personal information is processed, the types of personal information processed, and the manner in which personal information is used.
(2) Significant changes in our ownership structure, organizational structure, etc. Such as change of ownership caused by business restructuring, bankruptcy and merger, etc.
(3) Changes in the primary recipients of personal information sharing, transfer or public disclosure.
(4) Significant changes in your rights to participate in the handling of personal information and the manner in which they are exercised.
(5) Change in our responsible department, contact method and complaint channel for handling personal information security.
(6) When the personal information security impact assessment report indicates the existence of high risk.