Privacy Policy Statement

Important Notice:
  • Your trust is of utmost importance to us, and we recognize the significance of personal information to you. We will implement corresponding security measures in accordance with legal requirements to safeguard the security and controllability of your personal information. In light of this, V V Technology PTE. LTD. (referred to as "V V Technology" or "we") has established this <Privacy Policy> (hereinafter referred to as "this Policy") and wishes to bring the following to your attention:
  • This Policy is applicable to V V Work Connect (hereinafter referred to as "V V") products and services, including the V V client and the V V official website (domain: www.vv.cn). If our affiliated companies utilize V V products and services without having a separate privacy policy, this Policy equally applies to that segment of the products or services.
  • Before utilizing V V products or services, we urge you to carefully read and thoroughly comprehend this Policy. By confirming your full understanding and agreement, you may proceed to use the relevant products or services. The commencement of your use of V V products or services signifies your complete understanding and consent to this Policy.
The formulation of this Policy aims to assist you in understanding the following:
  • I. How we collect and use your information
  • II. How we use Cookies and similar technologies
  • III. How we disclose your information
  • IV. How we protect your information
  • V. How you manage your information
  • VI. How we handle children's information
  • VII. How your information is transferred globally
  • VIII. How this Privacy Policy is updated
  • IX. Contact us
I. How we collect and use your information
  • When you use our V V products or services, we may need to collect and use your personal information, encompassing the following two categories:

    • 1, To achieve the fundamental functionalities of providing you with our V V products or services, you are required to authorize us to collect and use necessary information. Refusal to provide corresponding information will impede your normal use of our products or services.
    • 2, To achieve supplementary functionalities of providing you with our products or services, you have the option to authorize us to collect and use information. Declining to provide such information will hinder your use of the relevant supplementary functions or prevent the attainment of our intended functional effects. However, this will not affect your regular use of the basic functions of our products or services.
  • You understand and agree:

    • 1, We are committed to creating diverse products and services to meet your needs. Due to the variety of products and services we offer, and the differences in the specific products/services chosen by different users, there may be variations in the corresponding basic/additional features and the types and scope of personal information collected and used. Please refer to the specific product/service functionalities for accurate information.
    • 2, In our continuous efforts to enhance your product and service experience, we strive to improve our technology, which may lead to the periodic introduction of new or optimized features. This may require the collection and use of new personal information or modifications to the purposes or methods of using personal information. In such cases, we will inform you separately through updates to this policy, pop-ups, or page notifications. We will provide you with the option to choose to consent and will collect and use the information only after obtaining your explicit consent. If you have any questions, opinions, or suggestions during this process, you can contact us through various contact methods provided by V V, and we will promptly address your inquiries.
  • To provide services to you and V V enterprise/company users, maintain the normal operation of V V services, improve and optimize our service experience, and ensure the security of your account, we may collect information that you actively provide, authorize, or provide based on the request of your enterprise/company user during registration and use of V V services, as well as information generated during your use of V V services:

    (I) Help you become a registered user of V V Technology
    To register as a V V enterprise/company user and enable us to provide V V services based on your enterprise/company's employment and management activities, such as V V intelligent HR application services (including employee roster management, employee care, onboarding, employment confirmation, labor contract management, and resignation management based on personnel management, attendance management, and leave management based on employee leave management, as well as enterprise notice information release), and V V intelligent office application services (including attendance management, approval, logs, schedules, V V email) to achieve the digital transformation and upgrading of enterprise/company office operations, you need to provide your enterprise/company name to create a V V enterprise/company account. Otherwise, you will not be able to use V V services based on enterprise/company management activities. After registering as a V V enterprise/company user, you will need to provide further information about the location, industry type, and personnel scale of the enterprise/company. If you need to obtain more benefits (such as opening premium applications), as the enterprise/company administrator, you must provide specific information and documentation on behalf of the enterprise/company to complete the V V enterprise/company certification, including document type, copy of business license, unified social credit code, enterprise/company name, address, legal representative's name, legal representative's ID number, certification letter, and other basic information.
    (II) Collection of information during the use of V V services

    When you use V V services, we collect information about your usage patterns and operational processes, including but not limited to information about your usage of V V services, the manner in which you use them, and the operational processes involved. This information is collected to provide you with more tailored V V services, interactive displays, search results, identify abnormal account states, maintain the normal operation of V V services, enhance and optimize your experience with V V services, and ensure the security of your account. This includes information about the way you use V V services and the operational processes involved, and correlates this information:

    1, Usage Information
    We collect information that you, as the end user of V V services within a V V enterprise/company, submit or generate during your use of V V services.
    2, Device Information
    In order to ensure the secure operation and quality efficiency of the software and services, we collect specific permissions granted by you during software installation and use. This includes your: hardware model, operating system version, device identifiers (such as IMEI, AndroidID, OAID, IMSI, ICCID, GAID, MEID, with differences in validity period, user-resettable capability, and acquisition method), network device hardware address (MAC address), hardware serial number, IP address, WLAN access points (such as SSID, BSSID), Bluetooth, base station, software version number, network access method, type, status, network quality data, operations, usage, service logs, and device time zone.
    3, Log Information
    • When you use our client or website to access products or services, we automatically collect detailed usage information as part of our network log records. This includes information such as your search queries, IP address, browser type, telecommunications carrier, language used, access date and time, webpage history, approval log information, attendance log information, and other operation log details.
    • Please note that individual device information, log information, etc., cannot identify the identity of a specific natural person.If we combine such non-personal information with other information to identify a specific natural person's identity, or if it is combined and used with personal information, during the combined usage period, such non-personal information may be considered personal information. Unless authorized by you or required by laws and regulations, we will anonymize or de-identify such personal information.
    4, Enterprise/Company Control Data

    If you, as a V V enterprise/company administrator, choose to enable and manage V V services, we will record information and data (referred to as "Enterprise/Company Control Data") generated or submitted during the use of V V-related features/applications by V V personal users within your V V enterprise/company, in accordance with the instructions of the V V enterprise/company administrator. Enterprise/Company Control Data may include:

    • 1) Position, department, main industry, office email account, office phone number, etc., assigned by the enterprise/company you belong to, sensitive personal information generated or required for the operation of daily business management features such as attendance, approval, sign-ins, and logs. This includes fingerprint images, fingerprint features, facial recognition images, facial features, sign-in facial photos, geographical location, attendance clock-in information, approval records, log information, schedule information, and file information.
    • 2) If the enterprise/company administrator chooses to enable and manage V V's online services, you need to provide identity information (name, ID information, household registration, etc.), enterprise position information (department, position, rank, etc.), labor contract status information, contact information (phone, fixed phone, email), address information (home address, office address), education information (school, major, education level), salary payment bank card information, emergency contact information, and/or business contact card information of external contacts, as required by the enterprise/company user.
    • 3) Data submitted by enterprise/company users that may contain your personal information, such as V V enterprise/company contact information, including the enterprise/company user's position, contact information, and personal identity information.

    You understand and agree that the enterprise/company user is the controller of the above-mentioned enterprise/company-controlled data. We only process enterprise/company-controlled data or your personal information for V V enterprise/company services based on the instructions of the enterprise/company user administrator. Before uploading V V enterprise/company contact information or other personal information of V V personal users required by the enterprise/company, the enterprise/company user should ensure that explicit consent has been obtained from V V personal users in advance. The collection of relevant end-user information is limited to what is necessary for achieving the purposes of enterprise operation and management, and the end user has been fully informed of the purpose, scope, and use of relevant data collection.

    5, Information Provided by You
    • During the use of V V services, you may provide feedback on the experience of V V's products, features, applications, and services, helping us better understand your experience and needs. For this, we record your contact information, feedback, and suggestions so that we can further contact you regarding our handling of your feedback.
    • You may also provide personal information of other individuals when using V V services to authenticate or order services for them. For example, when submitting an enterprise/company user for V V enterprise/company authentication, you may need to submit the enterprise/company user's relevant enterprise information and documents, as well as the administrator and legal representative's name and identity information. You understand and agree that before providing us with the aforementioned personal information of the actual relevant individuals, you must ensure that you have obtained their authorized consent. If the individuals in question do not agree, we will not be held responsible for any legal liability related to the potential infringement on the rights of these individuals.
    6, Information Provided by Third Parties
    We may collect information about you when other users perform operations related to you. Additionally, we may obtain your personal data information from V V Technology's affiliated companies, cooperating third parties, or through other legal means. For example, to complete the registration of your V V account, you agree that the operator will send a text message verification code to V V based on your personal mobile phone number; otherwise, you cannot register for a V V account. When you add an email account (including but not limited to 163 mailbox, 126 mailbox, Gmail, Outlook, Tencent Enterprise Email, etc.) on the client, we will use standard email protocols (IMAP/POP3/Exchange/CardDAV/CalDAV) to obtain the email address and login information you provide (including associated email account, application password, or authorization code information), as well as information generated during the sending and receiving of emails (including email content, attachments, and contact email addresses associated with the email account). This type of information is necessary for providing you with this service and will be stored on your local client in an encrypted manner. If you refuse to provide this information, please do not add an email account, but it will not affect your use of our other features. When you delete the email account, the relevant information stored on your local client will also be deleted. If V V is used to synchronize the email content and others in Gmail through the IMAP protocol, V V will request Gmail user data through the Google API service to help users access:
    • 1) Read, edit, send, and permanently delete all emails in Gmail.
    • 2) View, edit, share, and permanently delete all calendars you can access using Google Calendar.
    • 3) View, modify, download, and permanently delete your contacts.
    • 4) View, modify, create, and delete all your Google Drive files.
    To process Gmail user data requested through the Google API service, V V will comply with the <Google API Services: User Data Policy> and <Google APIs Terms of Service>.
    7, To provide you with security and protection of the information collected
    To enhance the security of the services provided by us and our affiliated companies and partners, protect your or other users' personal and property safety from infringement, prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, and other security risks, accurately identify violations of laws, regulations, or relevant agreements, we embed application security SDK in the application to collect your personal information, service usage information, device information, and service log information. We may also use or integrate your membership information, transaction information, and information obtained with your authorization or in accordance with the law, to comprehensively assess the risks of your account and transactions, perform identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.
    8, Other

    In order to provide you with more convenient and high-quality services and enhance your experience, we may collect and use your personal information in the following additional services. If you do not provide this information, it will not affect your use of basic services such as V V's digital office, communication, and collaboration, but you may not be able to enjoy the user experience brought by these additional services. These additional services include:

    • 1) Additional Services Based on Contact Information: We collect your contact information after you grant permission to access your address book. This allows us to automatically recommend friends or colleagues who use V V from your address book, facilitating the initiation of V V digital office features.
    • 2) Additional Services Based on Camera Access: After granting camera access, you can use features such as scanning QR codes for facial check-ins, real-person verification, taking photos, and, with your authorization, facial recognition in specific scenarios. When using facial recognition, we collect your facial photos or facial feature information strictly within the scope of your authorized consent. If we intend to use your facial information for other product or service functionalities in the future, we will confirm with you again.
    • 3) Additional Services for Accessing and Uploading Images/Videos Based on Storage, Albums (Photo Library/Video Library): After granting album permissions, you can upload your photos/images/videos for tasks such as changing your avatar within V V, completing enterprise/company authentication, providing proof of communication with customer service, and caching logs. If you refuse to grant us this permission, we will be unable to provide you with these services.
    • 4) Additional Services Related to Voice Technology Based on Microphone Access: After granting microphone access, you can use the microphone for voice input in V V's one-on-one/group chats or interact with customer service or customer service bots. Please note that even if you have agreed to enable microphone access, we will only use the microphone to capture voice information when you actively click on the microphone icon in the client or when recording a video.
    • 5) Location Permissions: You can enable your location permissions (including geographic location permissions or WIFI/Bluetooth recognition range) to complete attendance check-ins arranged by your enterprise/company.
    • 6) To ensure that this application can receive broadcast messages normally when it is closed or running in the background, the application needs the (self-starting) capability. This involves sending broadcast messages at a certain frequency through the system to wake up the application, which is necessary to implement functions and services.
    • 7) To provide you with better audio/video and meeting experiences, we use the self-starting capability (PHONE_STATE, NEW_OUTGOING_CALL). The purpose is to listen for incoming calls and mute the audio during phone calls.

    You understand and agree that the aforementioned additional services may require you to enable access permissions on your device for location information (geographic location), camera, albums and storage, microphone (voice), address book, calendar, and/or phone status to collect and use information related to these permissions. You can check the status of these permissions on your device and decide to enable or disable them at any time. Please note that enabling any permission signifies that you authorize us to collect and use relevant personal information to provide you with the corresponding service. Once you disable any permission, it means you revoke the authorization, and we will no longer collect and use the relevant personal information based on that permission or provide you with the corresponding service. However, your decision to disable permissions will not affect the information collection and usage carried out based on your previous authorization.

    You understand and agree that the functionalities and service scenarios we provide are constantly evolving. If we do not explicitly state the personal information we need to collect in the aforementioned scenarios, we will notify you separately of the content, scope, and purpose of the information collection through page prompts, interactive designs, etc., and seek your consent.

    If we cease the operation of V V products or services, we will promptly stop ongoing activities related to the collection of your personal information and, in accordance with applicable laws, delete or anonymize the personal information we hold.

    (III) About the Third-Party SDK List
    1) In order to provide you with essential functions such as receiving push notifications, sharing information on third-party platforms, and using map services, our application incorporates SDKs or similar applications from authorized partners. We conduct strict security testing on the application programming interfaces (APIs) and software development kits (SDKs) that authorized partners use to obtain information. We also stipulate strict data protection measures in agreements with authorized partners, requiring them to handle personal information in accordance with our delegated purposes, service descriptions, this privacy policy, and any other relevant confidentiality and security measures.
    2)You can view the data usage and protection rules of related third-party SDKs. Please note that the personal information processing types of third-party SDKs may change due to version upgrades, policy adjustments, etc. Refer to their official documentation for the most accurate information.
    3) Third-Party SDK List:
    3.1、AMap SDK
    • Operator: AMap Software Co., Ltd.
    • Function: Used for device location services.
    • Types or permissions of personal information collected: Device information (IMEI, IDFV, IDFA, Android ID, MEID, MAC address, OAID, IMSI, hardware serial number, BSSID, SSID), location information.
    • URL:https://lbs.amap.com
    • Privacy Policy:https://lbs.amap.com/pages/privacy
    3.2、JPush SDK
    • Operator: Shenzhen Hexun Huagu Information Technology Co., Ltd.
    • Function: Used for pushing messages to devices.
    • Types or permissions of personal information collected: End-user personal information (device information including Android ID, MAC, network information, location information, app installation list).
    • URL:https://www.jiguang.cn
    • Privacy Policy:https://www.jiguang.cn/license/privacy
    3.3、Bugly SDK
    • Operator: Tencent Computer Systems (Shenzhen) Company Limited.
    • Function: Used for software stability log collection.
    • Types or permissions of personal information collected: Logcat logs and APP crash stack information, device ID (Android ID, Open UDID, MAC, IMEI), iOS advertising identifier (IDFA), terminal device operating system version, terminal manufacturer, network information, system name, system version, and country code.
    • URL:https://bugly.qq.com/v2
    • Privacy Policy:https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56
    3.4、Tencent Browser Service Document SDK
    • Operator: Tencent Computer Systems (Shenzhen) Company Limited.
    • Function: Used for document browsing.
    • Types or permissions of personal information collected: Device information (including International Mobile Equipment Identity (IMEI), International Mobile Subscriber Identity (IMSI), MAC Address), user model, screen size, operating system version number, target API, network type (Apn Type), application information (host application package name, version number), network change monitoring broadcast, WIFI MAC address, storage permission, clipboard access permission.
    • URL:https://cloud.tencent.com/product/tbs
    • Privacy Policy:https://rule.tencent.com/rule/preview/1c4e2b4b-d0f6-4a75-a5c6-1cfce00a390d
    3.5、Tencent Real-Time Audio and Video SDK
    3.6、Alibaba Cloud OSS SDK
    3.7、Wildfire SDK
    3.8、Xiaomi PUSH
    • Types of personal information involved: Device identifiers (such as IMEI, Android ID, MEID, Serial, OAID, GAID), WLAN access points (such as SSID, BSSID).
    • Purpose of use: Message push.
    • Usage scenario: Used during message push.
    • Operator: Beijing Xiaomi Mobile Software Co., Ltd.
    • Collection method: SDK collection.
    • URL:https://dev.mi.com/platform/push
    • Privacy Policy:https://dev.mi.com/console/doc/detail?pId=1822
    3.9、VIVO PUSH
    • Types of personal information involved: Device information.
    • Purpose of use: Message push.
    • Usage scenario: Used when pushing messages on VIVO mobile terminals.
    • Operator: Guangdong Tiantian Network Technology Co., Ltd. and future companies that acquire operations of the vivo open platform.
    • Collection method: SDK collection.
    • URL:https://dev.vivo.com.cn/documentCenter/doc/366
    4.0、Huawei PUSH
    4.1、OPPO PUSH
    • Types of personal information involved: Device identifiers (such as IMEI, ICCID, IMSI, Android ID, GAID), application information (such as application package name, version number, and running status), network information (such as IP or domain connection results, current network type).
    • Purpose of use: Message push.
    • Usage scenario: Used when pushing messages on OPPO mobile terminals.
    • Operator: Guangdong Huantai Technology Co., Ltd.
    • Collection method: SDK collection.
    • URL:https://open.oppomobile.com/wiki/doc#id=10194
    • Privacy Policy:https://open.oppomobile.com/wiki/doc#id=10288
II. How We Use Cookies and Similar Technologies
  • To enhance your browsing experience, when you use V V products or services, we may collect and store relevant data about your interactions with V V services using various technologies. This allows us to identify your identity when you access or revisit V V services, providing better and more services through data analysis. This may involve using small data files to identify you, such as Cookies, Flash Cookies, or other local storage provided by your browser or affiliated applications (collectively referred to as "Cookies").
  • Please understand that some of our services can only be achieved through the use of Cookies. If your browser or browser add-ons allow, you can modify the acceptance level of Cookies or reject V V's Cookies. However, rejecting V V's Cookies may result in the inability to use certain functions of V V services that depend on cookies in some situations.
III. How We Disclose Your Information

Without your prior consent, we promise not to sell your personal data. We will use the personal data you provide within the scope allowed by law and this policy. However, we may disclose your personal data to administrative or judicial enforcement and regulatory agencies, government departments, or other such entities as required by law or regulations, or in legal or dispute resolution proceedings such as litigation or arbitration, or when we have reason to believe it is necessary to protect our, customers', or public interests, possibly disclosing certain personal data within the smallest possible scope. When you provide personal data, you understand and agree that we may use or disclose your personal data to third parties in certain situations, including but not limited to the following:

  • a) Disclosing to third parties or administrative, judicial, law enforcement, and regulatory agencies as required by relevant laws and regulations or the requirements of administrative, judicial, law enforcement, or regulatory agencies;
  • b) Disclosing to third parties if you violate applicable laws, regulations, or service agreements or related policies;
  • c) Disclosing to third parties as necessary to provide you with or in connection with the products and services you have ordered or requested;
  • d) Other disclosures that we deem appropriate under laws, regulations, or website policies, such as for enforcing terms and conditions or preventing personal, property loss, or illegal activities;
  • e) Without your permission, or unless otherwise provided in this policy, or unless the third party serves as our service provider/subcontractor/authorized center to provide services to you, we will not provide, sell, or rent your personal data to unrelated third parties;
  • f) In certain jurisdictions, in case of reorganization, merger, bankruptcy, or liquidation, it may be necessary to disclose your personal data;
  • g) Network link information may be used for network attack detection;
  • h) In legal or dispute resolution proceedings, such as litigation or arbitration.
IV. How We Protect Your Information
  • 1, We prioritize the security of personal data and implement appropriate physical, managerial, and technical safeguards to prevent unauthorized access, disclosure, use, modification, damage, or loss of your personal data. For instance, we employ encryption technology to ensure data confidentiality, protective mechanisms against malicious attacks, access control measures to restrict data access to authorized personnel, and conduct security and privacy protection training to enhance staff awareness of the importance of safeguarding personal data. We will retain your personal data for the duration necessary to achieve the purposes outlined in this policy unless an extension is required or permitted by law. While we make every effort to protect your personal data, it's important to note that no security measure can be entirely foolproof.
  • 2, Despite the aforementioned security measures, it is your responsibility and obligation to securely manage your account, password, and other information. You are solely liable for legal responsibilities arising from your failure to safeguard your account and password properly.
  • 3, In the event of unauthorized use of your account or any suspicious activities, promptly notify us. You may request measures to suspend the login and use of your account.
  • 4, In case of a security incident such as personal information leakage, we will, in accordance with applicable laws and regulations, inform you and/or relevant authorities of information related to the data breach through website announcements or emails. If personal information leakage occurs solely due to our reasons, after confirming the data breach event and root causes, we will make reasonable efforts to promptly notify you of the data breach.
V. How You Manage Your Information

You can access and manage your information through the following methods:

(1) Query, Correct, and Supplement Your Information
As an administrator of V V enterprise/company users, you have the right to query, correct, or supplement information for your enterprise/company. As an individual V V user, you have the right to query, correct, or supplement your information. You can perform these actions on your own through the following means.
(2) Deletion of Your Information

In the following situations, you can request the deletion of personal information:

  • 1, If our processing of personal information violates laws and regulations.
  • 2, If we collect or use your personal information without obtaining your explicit consent.
  • 3, If our processing of personal information seriously violates agreements with you.
  • 4, If you no longer use our products or services or if you deactivate your account voluntarily.
  • 5, If we permanently cease to provide products or services to you.

If we decide to comply with your deletion request, we will also notify entities that have obtained your personal information from us and request them to delete it promptly (unless laws and regulations stipulate otherwise, or these entities have independently obtained your authorization).

After you or we assist you in deleting the relevant information, due to applicable laws and security technologies, we may not be able to immediately delete the corresponding information from the backup system. We will securely store your personal information, isolate it from any further processing, until the backup can be cleared, or anonymization can be achieved.

(3) Account Deletion
When you exit an company, are administratively removed, or the team is dissolved by an administrator, you can request the Deletion of your organizational identity account. After your account is deleted, we will cease providing products or services, and, as required by applicable laws, delete or anonymize your personal information.
(4) Responding to Your Requests

For security reasons, you may need to provide a written request or other means to verify your identity. We may ask you to verify your identity first and then process your request.

For your reasonable requests, we generally do not charge fees, but for repeated requests beyond reasonable limits, we may charge fees at our discretion. We may refuse requests that are not directly related to your identity, unreasonably repetitive, involve too much technical effort (such as the need to develop new systems or fundamentally change current practices), pose risks to the legitimate rights and interests of others, or are impractical.

In the following circumstances, we will be unable to respond to your requests as required by laws and regulations:

  • 1, Matters related to national security and national defense security.
  • 2, Matters related to public safety, public health, and significant public interests.
  • 3, Matters related to criminal investigation, prosecution, trial, and execution of judgments.
  • 4, Substantial evidence shows that the data subject has subjective malice or abuses rights.
  • 5, Responding to your request would cause serious harm to your or others' legitimate rights and interests.
  • 6, Involving the business secrets of V V Technology and/or V V enterprise/company users.
VI. How We Handle Children's Information
  • In the context of digital office, communication, and collaboration activities, we assume that you have the corresponding capacity for civil conduct. If you are a child, we request that you ask your parents or other guardians to carefully read this privacy policy and use our services or provide information with their explicit consent.
  • For cases where we collect personal information of children with the consent of parents or other guardians to use our products or services, we will only use, share, transfer, or disclose this information in accordance with the law, with explicit consent from parents or other guardians, or when necessary to protect the child.
  • If you are the parent or guardian of a child, please pay attention to whether the child under your guardianship is using our services with your authorized consent. If you have any questions about the personal information of the child under your guardianship, please contact us.
VII. How Your Information is Transferred Globally
We will store the personal information collected and generated during the operation of V V Technology services within the territory of the People's Republic of China. For personal information generated by V V Technology users outside the People's Republic of China during the use of V V Technology products and services, you agree to transmit and store it on our servers located in countries/regions such as Singapore or Hong Kong, China. Otherwise, you cannot use existing V V Technology products and services. In such cases, we will take measures to ensure that the data we collect is processed in accordance with this policy and the requirements of applicable laws in the location of the data.
VIII. How This Privacy Policy is Updated

We reserve the right to update or modify this policy from time to time. If our privacy policy changes, we will publish the latest version on our website, and it will take effect immediately upon publication. You should actively review the content of this policy. If we make significant changes to the privacy policy, we may also send change notifications to you through your contact information, and you should pay attention to receiving them.

Significant changes referred to in this policy include but are not limited to:

  • 1, Significant changes in our service model, such as the purpose of processing personal information, types of personal information processed, and the ways personal information is used.
  • 2, Significant changes in control, organizational structure, etc., such as changes in controllers caused by mergers and acquisitions.
  • 3, Significant changes in the main objects of personal information sharing, transfer, or public disclosure.
  • 4, Significant changes in your rights regarding personal information processing and how they are exercised.
  • 5, Significant changes in the department responsible for the security of user information, contact methods, and complaint channels.
  • 6, The impact assessment report on the security of user information shows high risks.
IX. Contact Us

For any questions, opinions, or requests related to this privacy policy, you can send relevant questions to op@vv.cn. In general, we will respond within fifteen working days after receiving your relevant contact information and verifying your identity.

Update Date: September 2022