EasyBoss Privacy Policy

Version number: June 2023

Last revision date: June 1, 2023

Effective date: June 8, 2023

 

This Personal Information Protection Policy (“This Policy”) sets forth how Fuzhou Jianqiyun Network Technology Co., Ltd. and its affiliates (hereinafter collectively referred to as “EasyBoss”or“Us”) will handle your personal information when providing all types of products and services (collectively referred to as “Services”). Whether you are [https://www.easyboss.com/] through our official website (hereinafter referred to as the “site”), software, phone, email, marketing activities such as how to use our services or interact with us.

Respecting and protecting personal information is a long-standing basic policy of EasyBoss. We are fully aware of the importance of personal information to you, and the information you provide to us is based on your trust and acceptance of us. We value this trust and will ensure the security, confidentiality, integrity and availability of your personal information provided to us when using EasyBoss services and/or interacting with us, as well as the realization of other relevant legal rights and interests; When collecting and processing your personal information, we will strictly abide by the principles of legality, legitimacy, necessity and good faith, truthfully and openly inform you of the purpose, method and scope of collecting and using your personal information in different business scenarios, and carry out processing activities after obtaining your authorization and consent.

Before you use our services and submit your personal information to us, please read this policy carefully, in particular the following bold font, to understand our practices in handling and protecting personal information, and to make your choice according to the guidelines in this Policy.

By choosing to use EasyBoss services, you acknowledge and accept all EasyBoss terms and conditions regarding the protection of personal information. If you have any objection to this policy, please contact us through the following contact information. Your authorized consent can be withdrawn at any time, and after withdrawal, we will not process your personal information in principle, but the withdrawal of consent will not affect our personal information processing activities based on your consent before withdrawal.

If you have any objection, question, comment or suggestion on this policy, please contact us through the following contact information:

E-mail:service@mail.easyboss.com

Tel: 17850838056

China Contact Address: Office 25, 21/F, Building C2, Fuzhou Changshan Wanda Plaza C, No. 216 Pu Shang Avenue, Jinshan Street, Changshan District, Fuzhou

This policy will help you understand the following.

1. How we collect and use your personal information

2. How we use cookies or similar technologies

3. To whom we share, transfer and publicly disclose your information

4. How we save information and transfer it across borders

5. How you manage your information

6. How we protect your information

7. Protection of personal information of minors

8. Information security incident handling

9. External links

10. Revision of policies

11. How to contact us

I. How we collect and use your personal information

Definition of personal information. According to the Personal Information Protection Law, personal information is all kinds of information related to an identified or identifiable natural person recorded electronically or by other means, excluding information after anonymization, such as name, date of birth, identity document number, personal biometric information, residential address, communication contact method, communication record and content, account password, property information, credit information, travel track, accommodation information, health and physiological information, transaction information, etc. In different business scenarios, we may collect different personal information from you to achieve the service functions we provide to you, please refer to the business functions and personal information authorized for use below.

Special notice for personal sensitive information. Personal sensitive information is personal information that may endanger the safety of persons and property if leaked, illegally provided or misused, and is highly likely to lead to damage to personal reputation, physical and mental health or discriminatory treatment, etc. Generally, personal information of children under 14 years of age (inclusive) and private information of natural persons are considered personally sensitive information. If we subsequently need to collect your sensitive personal information for a specific purpose and with sufficient necessity, we will inform you of the manner and purpose of collection and use, seek your separate and express consent, and take strict measures to protect it.

Information about other people. If you use the Services for others through us, you will be required to submit the personal information of others for compliance purposes. You undertake to provide us with the personal information of others after you have obtained their express consent and ensure that they are aware of and accept this policy and consent to our processing of their relevant information, or where there is no need to obtain the consent of the individual as required by law or regulation. We have the right to ask you to explain and provide evidence of the source and legality of the personal information of others provided and the scope of authorized consent.

We provide our services through our website, software side, telephone, email and other online and offline activities, and we will only collect and use your personal information for the purposes described below in this policy. If we want to use your personal information for other purposes not set forth in this Policy or use the information collected for a specific purpose for other purposes, we will inform you in a reasonable manner and again obtain your consent prior to such use.

(i) How we collect and use your personal information when you visit the website

In order to transfer the content of the website to your computer, we need to temporarily collect and store the following personal information about you.

Technical information, including IP address, browser type and version, time zone setting and region, browser plug-ins and versions, operating system and platform, and other technical information about the device you use to access the Site.

Identity information, including your account number and password in the e-commerce platform, your WeChat and Alipay account.

Contact information, including cell phone number

Transaction information, including your store order information in the e-commerce platform

Due to the identity verification mechanism of the e-commerce platform, we need to use your identity information to log in to the e-commerce platform and access product links. If you download the browser plug-in and open our "Mutual Accelerator" service, we will use your identity information to log in to the e-commerce platform and help others to capture product information. Please note that we will only use your browser to help others capture information if you have unused resources. Please be aware that this feature is only used to obtain publicly available web information and does not involve any personal privacy or sensitive data. This feature does not degrade your experience or speed of access to the service.

Your personal information is stored in log files to ensure the proper functioning of the website and also to help us optimize the website and ensure the security of our IT systems. During this process, your personal information is not analyzed for marketing purposes. As soon as your personal information is no longer needed for the purposes for which it was collected, it is deleted. If your personal information was recorded for the purpose of visiting the website, it is deleted immediately after the end of the relevant session. If your personal information is stored in a log file, it should be deleted within no more than seven days, although it may be stored for longer. In this case, your personal information will be deleted.

We may use necessary cookie technology or similar technology to automatically collect information from you. The purpose of our automatic collection of such information is to help us use your identity to access the e-commerce platform and to provide you with better personalized service. Without the use of these technologies, certain features of the website would not be available. Please see [Part II] below for more information on the use of cookies and similar technologies.

(ii) How we collect and use your personal information in the applet side

1. In order to transfer website content to your applet, we need to temporarily collect and store the following personal information about you.

Technical information, including IP address, browser type and version, time zone setting and region, browser plug-ins and versions, operating system and platform, and other technical information about the device you use to access the Site.

Identity information, including your account number and password in the e-commerce platform, your WeChat and Alipay account.

Contact information, including cell phone number

Transaction information, including your store order information in the e-commerce platform

Your personal information is stored in log files to ensure the proper functioning of the website and also to help us optimize the website and ensure the security of our IT systems. During this process, your personal information is not analyzed for marketing purposes. As soon as your personal information is no longer needed for the purposes for which it was collected, it is deleted. If your personal information is recorded for the purpose of visiting the website, it is deleted immediately after the end of the relevant session. If your personal information is stored in a log file, it should be deleted within no more than seven days, although it may be stored for longer. In this case, your personal information will be deleted.

(iii) How we collect and use your personal information on the software side

1. In order to transfer the content of the website to your computer, we need to temporarily collect and store the following personal information about you.

Technical information, including IP address, browser type and version, time zone setting and region, browser plug-ins and versions, operating system and platform, and other technical information about the device you use to access the Site.

Identity information, including your account number and password in e-commerce platform, your WeChat and Alipay account.

Contact information, including cell phone number

Transaction information, including your store order information in the e-commerce platform

Due to the identity verification mechanism of the e-commerce platform, we need to use your identity information to log in to the e-commerce platform and access product links. If you download the browser plug-in and open our "Mutual Accelerator" service, we will use your identity information to log in to the e-commerce platform and help others to capture product information. Please note that we will only use your browser to help others capture information if you have unused resources. Please be aware that this feature is only used to obtain publicly available web information and does not involve any personal privacy or sensitive data. This feature does not degrade your experience or speed of access to the service.

Your personal information is stored in log files to ensure the proper functioning of the website and also to help us optimize the website and ensure the security of our IT systems. During this process, your personal information is not analyzed for marketing purposes. As soon as your personal information is no longer needed for the purposes for which it was collected, it is deleted. If your personal information was recorded for the purpose of visiting the website, it is deleted immediately after the end of the relevant session. If your personal information is stored in a log file, it should be deleted within no more than seven days, although it may be stored for longer. In this case, your personal information will be deleted.

(iv) Cases in which your express consent is not required for the collection and use of personal information

 

You acknowledge and agree that we do not require your authorized consent to collect and use your personal information, but we will still do our best to protect your personal information to the extent that it is within our control.

1. directly related to national security and national defense security.

2. directly related to public safety, public health, and significant public interest.

3. directly related to crime investigation, prosecution, trial and sentence enforcement.

4. for the purpose of safeguarding the life, property and other significant legitimate interests of the subject of personal information or other individuals, but it is difficult to obtain authorization from the subject of the information in a timely manner.

5. necessary for the conclusion or performance of a contract to which an individual is a party, or for the implementation of human resources management in accordance with the labor regulations established by law and the collective contract concluded by law.

6. necessary for the performance of statutory duties or legal obligations.

7. In response to public health emergencies, or emergency situations necessary to protect the life, health and property of natural persons.

8. Implementing news reporting and public opinion monitoring in the public interest, and handling personal information within a reasonable range.

9. to handle personal information that has been disclosed by the individual himself/herself or otherwise lawfully disclosed within a reasonable range in accordance with the law, unless the individual expressly refuses.

10. necessary to maintain the security and stability of the services we provide, such as the prevention, detection and handling of product and service failures.

11. Other circumstances specified in laws and regulations.

(E) Information obtained from other sources

We may also periodically obtain personal and non-personal information about you from EasyBoss business partners, service providers and other independent third party sources and add it to other information about you. For example, if you click on a link to visit the Site from a website operated by one of our business partners and you have registered with that partner, that partner may share with us information that you have provided to that partner, such as contact information.

(vi) Rules for the use of your personal information

We will use your personal information strictly in accordance with this policy. If we want to use your personal information for purposes other than those described in this policy, or if we use information collected for a specific purpose, we will ask for your prior authorization. Please understand that the services we provide to you are subject to change from time to time. If you choose to use other services not listed in this policy, we will provide you with a pop-up reminder, independently authorized, detailing the purpose, manner, and scope of information collected and seeking your consent before collecting your personal information. If you do not agree to provide such information, you may not be able to use that product and/or service, but it will not affect your use of existing services.

1. After collecting your personal information, we may anonymize or de-identify the data through technical means. We have the right to use and share the information that has been anonymized or de-identified and the recipient cannot re-identify the subject of the personal information for commercial applications such as data analysis and accurate marketing.

2. All personal information that you provide or authorize us to inquire to collect when you receive our services will continue to be authorized for the duration of your use of our products and receipt of services, unless you submit a request for deletion and we respond, but such request does not apply to user information that is required to be kept in accordance with laws and regulations.

3. When you need to use cell phones and other devices to clearly display your personal information in the process of receiving our services, we will use methods including anonymity, partial information using symbolic substitution, etc. to deal with your information to protect the security of your information.

4. For sensitive personal information collected for the core and additional functions of the services, we will clearly inform you by means of pop-up windows, separate license agreements, etc., and inform you of the implications of refusing to provide or agree to, for example, that you will not be able to use the corresponding core or additional functions or enjoy the relevant services, so as to ensure that you make a fully informed decision whether to provide or authorize us to To ensure that you make a fully informed decision about whether to provide or authorize us to access, collect, or share your sensitive personal information.

II. How we use cookies or similar technologies

 

When you visit our website, we will assign a cookie text file (a small, uniquely identifiable text file) to your terminal, and we will obtain a record of your cookies from other e-commerce platforms. cookies can be stored on your computer's hard drive or device (if your web browser allows it). The website uses cookies for the following purposes.

Help us recognize your browser to determine if it is a previous visitor, save and remember any preferences your browser may have set when visiting the site.

We provide you with personalized services through the information we receive from cookies. For example, when you visit a web page, we, the e-commerce platform, our service providers or our partners automatically set a cookie to recognize your browser when you use the Internet and to log in to the e-commerce platform using your account information.

Help evaluate and research the effectiveness of features and products and advertising.

We do not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your own preferences, and the "Help" section of the toolbar on most browsers will tell you how to prevent your browser from accepting new cookies, how to have your browser notify you when you receive a new cookie, or how to disable most types of cookies. You can clear all cookies stored on your computer, and most web browsers automatically accept cookies, but you can usually modify your browser's settings to reject cookies if you wish; alternatively, you can clear all cookies stored in your software. However, if you do so, you may need to change your user settings each time you visit the site, and any information you have previously recorded will be deleted and may have an impact on the security of the services you use.

Web sites may also use web beacons (also known as transparent image files, pixel tags or web bugs), which are tiny graphics with unique identifiers that function similarly to cookies and are placed in the code of a web page. We use web beacons to monitor user traffic patterns from one page of the site to another, delivered or communicated through cookies, in order to understand whether you are accessing the site based on online advertisements displayed on third-party sites, and thus improve site performance. This helps us evaluate the effectiveness of the site's content and other offerings and improve the user experience.

Please note that we do not have access to or control over cookies or other technologies used by third parties to collect information about your interests preferences, and that the information policies of such third parties are not governed by this Policy. Please pay particular attention to their information policies (including, but not limited to, their personal information protection policies or privacy policies).

III. Who we share, transfer and publicly disclose your information to

 

(i) Information Sharing

We may share your personal information with the following entities (both within China and outside of China) in order to ensure the provision and sustainable improvement of our services to you. However, we will share your personal information strictly in accordance with the principles of lawfulness, legitimacy, necessity, and good faith, for specific, defined purposes, and only for information directly related to the purposes described in this policy.

EasyBoss internal sharing. In order to provide you with diversified products and comprehensive services, strengthen risk prevention and control, and enhance customer service and user experience, we may share your personal information within EasyBoss. Ltd. and any other entity that it controls, is controlled by, or is under common control with, directly or indirectly through one or more intermediaries. The term "control" means the right, directly or indirectly, whether through the holding of voting securities, contracts or otherwise, to direct the management and policies of a subject.

Any EasyBoss member organization that processes personal information beyond what is directly or reasonably related to the purposes stated in this policy will again seek your authorized consent. We will never share your personally sensitive information with other EasyBoss member organizations without your consent, unless we have your express authorization or are required by relevant laws, regulations and regulatory requirements. To the extent that other EasyBoss member organizations have access to your information, they will maintain confidentiality at least as strict as this policy. In addition, they will also comply with applicable laws regarding marketing activities and, at a minimum, provide you with the option to opt-out of receiving similar emails in any advertising emails they send. The personal information we may share about you within EasyBoss includes name, contact information (including cell phone number, email address, mailing address), employment information and other personal information that is necessary to share for the purposes described above. We may also share statistical or anonymized information within EasyBoss. This information does not contain any personally identifiable information and we use it to develop products and services that may be of interest to you.

Sharing with Third-Party Service Providers. We may share your personal information with third party service providers, including information necessary to perform functions or to deliver advertisements that match your personal interests, such as your identification data, contact information, to ensure the successful completion of the services provided to you. However, we will only share your personal information for lawful, legitimate, necessary, specific, and explicit purposes, and only as much personal information as is necessary to provide the services. Our partners are not authorized to use the shared personal information for any other purpose. Currently, our third party service providers include the following types.

•Data Analysis: We must provide your IP address information to achieve customer geographic distribution statistics.

•Customer information management: we must provide your cell phone number, QQ, WeChat, email to achieve pre-sales promotion, after-sales processing.

Shared by partners who have commissioned us to promote or sell. We may be engaged by our partners to promote and sell their products and services, in which case their names will be displayed together or separately from ours so that you can clearly identify them. If you are willing to receive products or services from our partners, we will share your information, including personal information, such as your personal contact information and location information, with the relevant partners in order for our partners to provide services to you.We recommend that you review their personal information protection policy or privacy policy, terms of use and other related policies to protect your legitimate interests.

For companies and organizations with which we share personal information, we will sign data transfer agreements and confidentiality agreements with them, requiring them to establish and implement confidentiality and security measures for personal information at levels no less than those required by national laws, regulations and standards. They are not authorized to use the shared personal information for any other purpose, and they will seek your authorized consent again if they wish to change the purpose for which the personal information is processed.

(ii) Information transfer

We will not transfer your personal information to any company, organization or individual, except for the following.

1. transfer with express consent: after obtaining your express consent, we will transfer your personal information to other parties.

2. you request us to transfer personal information to a designated personal information processor in accordance with the provisions of Article 45 of the Personal Information Protection Law, if the conditions set by the State Internet Information Department are met.

3. In the event of our merger, demerger, dissolution, acquisition or bankruptcy liquidation, or any other merger, demerger, dissolution, acquisition or bankruptcy liquidation involving the transfer of personal information, we will notify you of the name and contact information of the recipient and request that the recipient continue to be bound by this policy, or we will require the recipient to re-solicit your authorized consent.

(iii) Public disclosure of information

  We will only publicly disclose your personal information when.

We may disclose your personal information publicly if we have your express and separate consent or based on your unsolicited choice.

If we determine that you have violated a law or regulation, or to protect the personal property of our users or the public from harm, we may disclose personal information about you, including related violations and the actions we have taken against you, in accordance with law or regulation or with your sole consent.

(iv) Exceptions to information sharing, transfer and public disclosure

According to the relevant laws and regulations, prior authorized consent is not required for the sharing, transfer, or public disclosure of your personal information in the following cases.

directly related to national security and national defense security.

directly related to public safety, public health, and significant public interest.

directly related to crime investigation, prosecution, trial and sentence enforcement.

For the purpose of safeguarding the life, property and other significant legitimate interests of the subject of personal information or other individuals, but it is difficult to obtain authorization from the subject of the information in a timely manner.

Necessary for the conclusion or performance of a contract to which an individual is a party, or for the implementation of human resources management in accordance with the labor regulations established by law and the collective contract concluded by law.

Necessary for the performance of legal duties or legal obligations.

In response to public health emergencies, or emergency situations necessary to protect the life, health and property of natural persons.

Handling personal information within a reasonable range for the implementation of news reporting, public opinion monitoring and other acts in the public interest.

To handle personal information that has been disclosed by the individual himself/herself or otherwise lawfully disclosed within a reasonable range in accordance with the law, unless the individual expressly refuses.

Other circumstances specified in laws and regulations.

We will still do our reasonable duty to protect your personal information to the extent that it is within our control.

(E) Legal Liability

We are aware of the legal responsibilities associated with the sharing, transfer, and public disclosure of personal information to outside parties.

 

IV. How we do information preservation

 

1. Since we provide products or services through our server, we need to upload your name, work unit, position, phone number, email address, micro signal and mailing address information to our server for unified storage and management based on the need to carry out business and unified management of the group.

2. If we cease operation or cease providing any services to you, we will promptly stop collecting your personal information in connection with such services and will send you a notice of cessation of operation on a case-by-case basis or by way of announcement. Except for special circumstances such as extending the retention period at your reasonable request, in accordance with laws and regulations, or at the request of the competent authorities, we will delete the relevant personal information held by us or anonymize it to ensure that no specific individual can be identified.

3. We will store the personal information collected and generated for the necessary period, but you have the right to request us to delete your personal information at any time when all business under you has been completed and no complaints, disputes or other situations that require your personal information to be processed; if otherwise provided by Chinese laws and administrative regulations, in accordance with their provisions.

4. In accordance with the provisions of Article 21(3) of the Network Security Law of the People's Republic of China, we will take technical measures to monitor and record the network operation status and network security events, and retain the relevant network logs for six months in accordance with the regulations.

V. How you manage your information

 

(i) Inquiries and corrections/updates of your information

We will take reasonable steps to ensure that you can easily check that your information is accurate, complete and used for the intended purpose. You can review, correct and update your information by contacting us.

We will provide you with other personal information generated in the course of your use of our services, provided that it does not require excessive input from us. You can exercise your right to data access by contacting us.

(ii) Withdrawal of your authorization

When you are not involved in any complaints, disputes or other situations that require your personal information in order to be processed, your authorization consent may be withdrawn at any time by sending an email to [service@mail.easyboss.com]; after withdrawal of authorization, you may not be able to use the corresponding business functions to receive services. We will continue to keep and use your personal information that we are required to keep according to laws, regulations and supervision. After you withdraw your authorization, in principle, we will no longer process your personal information, but the withdrawal of consent does not affect our personal information processing activities based on your consent before the withdrawal.

If you refuse to accept commercial advertisements sent to you by us, you may unsubscribe at any time by sending an email to [service@mail.easyboss.com]. The exception is when we send messages in accordance with laws and regulations, regulatory requirements or service agreements for individual services.

(C) copy and obtain copies of personal information

You may request a copy and obtain a copy of your personal information by sending an email to [service@mail.easyboss.com].

(iv) Delete your information

If all business under you has been completed and there are no complaints, disputes or other situations that require your personal information to be processed, you may delete your personal information at any time by yourself or ask us to delete your personal information. If you request deletion, we will delete your personal information promptly in the following cases.

The purpose of the treatment has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose of the treatment.

We collect and use your personal information in violation of laws and regulations.

Where we collect and use your personal information without your consent.

We collect and use your personal information in violation of the agreements in this policy.

you no longer use our services.

We are no longer available to serve you.

If we decide to respond to your request for deletion, we will also simultaneously notify the entities from which we obtained your personal information that they are required to delete it promptly, unless otherwise required by law or regulation, or unless those entities have your independent authorization.

When you delete information from our service, we may not immediately delete the corresponding information in our backup system, but we will delete it when the backup is updated.

(v) respond to your request above

For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

 

VI. How we protect your information

1. We are committed to protecting the information we collect and want you to feel comfortable using our services. We have established an information security system in accordance with Chinese laws, regulations and standards to meet industry standards in line with our business development. From the perspective of data life cycle, we have established security measures in all aspects of data collection, storage, display, processing, transmission, use and deletion, etc. We have adopted different reasonable management, technical and physical security measures to protect the personal information you provide to us according to the level of information sensitivity, including but not limited to access control, encrypted transmission and storage, de-identification, firewall and Intrusion detection systems, etc.

2. We will regularly conduct security risk and personal information security impact assessment.

3. We also adopt strict management of employees who may have access to your information, only authorized employees can view personal information and only use it for authorized work purposes. We can monitor their operations and have established approval mechanisms for important operations such as data access, batch modification, copying, downloading, internal and external transfer use, de-identification, decryption, etc., and signed confidentiality agreements with said employees, etc. At the same time, we also provide regular information security training to our employees and require them to form good operating habits in their daily work and enhance their awareness of information protection.

4. We manage to regulate the storage and use of personal information by establishing a data classification and grading system, data security management norms, and data security development norms.

5. You understand and accept that the systems and communication networks you use to access our services may have problems due to factors beyond our control.

6. Notwithstanding the foregoing security measures, please understand that there are no "perfect security measures". We will provide appropriate security measures and reasonable safeguards in accordance with available technology, and we will exercise reasonable care to protect your personal information.

VII. Protection of personal information of minors  

 

Our services are intended for the general public and are not offered exclusively to minors, but we always take the protection of personal information of minors very seriously. If you are a minor under the age of 14, please be sure to obtain the express consent of your parents or other guardians before using our services. If we become aware that a minor under the age of 14 has sent us personal information without the express consent of a parent or other guardian, we will delete that information as soon as reasonably possible after discovery, except as otherwise required by law, regulation or regulatory requirements.

 

VIII. Information security incident handling

 

We develop emergency plans for network security incidents in accordance with the requirements of Chinese laws, regulations and standards, and conduct regular drills. After a personal information security incident occurs, we will promptly inform you of: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you. If it is difficult to inform you one by one, we will take reasonable and effective ways to inform you by way of announcement. At the same time, we will also report the disposition of personal information security incidents in accordance with the requirements of the regulatory authorities.

IX. External Links

 

If the Website or Service links you to third party websites or services, please be aware that these websites or services are not governed by this Policy and we recommend that you review their personal information protection policies or privacy policies, terms of use, and other relevant policies to protect your legal rights.

X. Revision of the policy

 

Please understand that EasyBoss may update or modify this policy in the future. We will mark the date of the most recent revision to this Policy on our home page. We will not derogate from your rights or increase your obligations under this Policy without your express consent. We will notify you of major changes by sending a notice to the email address you provide to us or by posting a prominent notice on our website. Please be sure to check this policy periodically to be aware of the most current version.

XI. How to contact us

 

If you have any questions, comments or suggestions regarding this policy, please contact us at

E-mail:service@mail.easyboss.com

Tel: 17850838056

We have set up a personal information protection department (or personal Information Protection Commissioner), you can contact them through the above methods.

Under normal circumstances, we will reply within 15 working days from the date of reasonable confirmation of your identity. If you are not satisfied with our reply, especially if our personal information processing behavior damages your legitimate rights and interests, you can also complain or report to the network information, telecommunications, public security, industry and commerce and other regulatory authorities.

© 2023 Fuzhou Jianqiyun Network Technology Co., LTD. All rights reserved.