Weezer Player Privacy Policy

This Privacy Policy (hereinafter referred to as the “Policy”) is designed to clarify the relevant rules for Weezer Player (hereinafter referred to as the “Software”) developers (hereinafter referred to as the “Developers”) to collect, use, store, protect, and disclose the personal information of users (hereinafter referred to as the “Users”), in accordance with international general privacy protection principles, to protect the security of the personal information of users and their legitimate interests. By using this Software, users are deemed to have fully read, understood, and agreed to all the terms of this Policy. If users do not agree with this Policy, please do not use this Software.

1. Scope of Personal Information Collection

1.1 Necessary Personal Information Collected

1.1.1 To ensure the proper operation of the Software, the Developer collects only the personal information necessary for users to use the Software, including, but not limited to, the device model, operating system version, software installation version, and device unique identifier (used for adapting software features and troubleshooting).

1.1.2 This class of information is used only for software operational adaptation and troubleshooting, does not involve sensitive information such as user personal identification, geographic location, and will not collect additional irrelevant information.

1.2 Voluntary Personal Information

1.2.1 Users may voluntarily provide personal information (such as customized profiles, nicknames) to optimize the personal use experience, such information can be modified or deleted at any time by the user, and is not provided for use that does not affect the core functionality of the Software.

1.2.2 If the user uses the software‘s built-in music favorites and playlist synchronization features, the developer may collect the user‘s music playback history and favorite list information. This type of information is used only for the user‘s personal use scenarios and not for other purposes.

2. Rules for the Use of Personal Information

2.1 Purpose of Use

2.1.1 The collected personal information is used only for the implementation of the core functions of this Software, including the software‘s operational adaptation, troubleshooting, personalized playback experience optimization, and user-operated music management (collections, sorting, etc.).

2.1.2 Developers will not use personal information for purposes unrelated to the functionality of this Software, and will not expand the scope of use of information without the explicit consent of the user.

2.2 Usage Restrictions

2.2.1 The use of personal information will strictly follow the principle of “purpose clear, minimum necessary”, and will be used only to the extent necessary to achieve the established use purpose, and beyond that scope the user‘s consent must be obtained separately.

2.2.2 Developers will not use user personal information for commercial advertising, data sales, etc. and will not share user personal information with any third parties for commercial use.

3. Personal Information Storage Standards

3.1 How and Where to Store Information

3.1.1 The user‘s personal information will be stored in secure servers designated by the developer. Encrypted storage technologies will be used to secure the storage of information and prevent information from being leaked, tampered with, or lost.

3.1.2 Storage locations are located in clusters of servers that comply with international privacy protection standards, do not involve any offending storage zones, and strictly comply with the laws and regulations related to data storage in the region where they are located.

3.2 Storage Duration

3.2.1 The retention period of personal information will be strictly controlled to the minimum time required to achieve the purposes of use, and when the information is no longer needed, it will be automatically anonymized or completely deleted.

3.2.2 If a user signs out of an account or deletes personal information, the developer will complete the deletion or anonymization of all information within a reasonable period of time, except as otherwise stipulated by law and regulations.

4. Personal Information Protection Measures

4.1 Technology Protection

4.1.1 Developers adopt internationally advanced encryption technologies (including encryption in transit and encryption in storage) to provide end-to-end encryption protection for user personal information, preventing information from being illegally obtained or tampered with during transmission and storage.

4.1.2 Establish a comprehensive security defense system, regularly conduct security checks on servers and software systems, fix vulnerabilities, and prevent security risks such as cyber attacks and virus invasions.

4.2 Manage Protection

4.2.1 Strictly limit the scope of access to the user‘s personal information, only authorizing employees to access the relevant information when performing their work duties, and requiring strict confidentiality agreements.

4.2.2 Periodic privacy protection training for authorized personnel, strengthening privacy protection awareness, clarifying confidentiality responsibilities, and harsh penalties for unauthorized access and disclosure of user information.

5. Personal Information Disclosure Rules

5.1 Prohibition of Discretionary Disclosure

5.1.1 Developers will not disclose, sell, rent, or transfer user personal information to any third party without the explicit written consent of the user.

5.1.2 Any third party request for access to the user‘s personal information will be refused by the developer, unless otherwise required by law or regulation or if a lawful authority makes a request for retrieval.

5.2 Legal Disclosure

5.2.1 To comply with applicable international laws and regulations, judicial decisions, arbitration rulings, or in response to legitimate retrieval requests from competent authorities, the developer may legally disclose the user‘s personal information and will notify the user as early as legally permitted (except where notification is prohibited by law and regulations).

6. Protection of User Information Rights

6.1 Information Queries and Modifications

6.1.1 Users have the right to inquire at any time about the collection, use and storage of their personal information, and to modify and supplement their personal information through the relevant settings in the software or by contacting the developer to ensure the sourcing circumstances and completeness of the information.

6.2 Information Deletion and Account Logout

6.2.1 Users may delete their personal information at any time (voluntarily provided information can be deleted directly, and necessary collected information will be deleted or anonymized without affecting the operation of the Software).

6.2.2 Users can request to log out of their account. After the account is logged out, the developer will completely delete all personal information of the user, or anonymize it to ensure that the user‘s information will no longer be used.

6.3 Rights Relief

6.3.1 If users discover that personal information has been illegally collected, used, disclosed, or have questions about the rights of personal information, they can communicate with the developer through the contact email provided in this Policy, and the developer will respond and process them within a reasonable period of time.

7. Third-party service descriptions

7.1 Scope of Third-Party Services

7.1.1 This Software may contain modules of third-party services (such as third-party audio decoding, storage services), and third-party services will strictly follow their own privacy policies to independently collect and use relevant information.

7.2 Division of Responsibility

7.2.1 Developers are not responsible for the privacy protection practices of third-party services, and users are responsible for information security risks arising from their use of third-party services.

7.2.2 Before third-party services collect user information, they must obtain the user‘s explicit consent. Developers will make reasonable efforts to monitor third-party privacy protection practices to ensure the security of user information.

8. Policy Changes and Dispute Resolution

8.1 Policy Changes

8.1.1 Developers have the right to modify this Policy in accordance with updates to international privacy protection laws and regulations, and iterations of software functions. The modified Policy will be published in a prominent position within the Software, and users will continue to use this Software as if accepting the modified Policy.

8.1.2 After policy changes, developers will notify users as early as possible to ensure that users are aware of the content of the policy changes and ensure the right of users to be informed.

8.2 Dispute Resolution

8.2.1 Any disputes arising from or related to this Policy should first be resolved through friendly negotiation; if negotiation fails, either party has the right to file a lawsuit in the courts with jurisdiction where the developer resides.

8.3 Contact Information

8.3.1 If users have any questions, suggestions or complaints regarding this Policy, they may contact the Developer at the following email address: cecapemergencetv94@gmail.com, and the Developer will respond to them within 3 business days.