美文网首页
大话单机版

大话单机版

作者: L_Wilson | 来源:发表于2020-03-10 15:24 被阅读0次

    法律相关-版权说明

    未经本人书面许可,任何单位及个人不得以任何方式或理由对上述产品、服务、信息、材料的任何部分进行使用、复制、修改、抄录、传播或与其它产品捆绑使用、销售。

    如有疑问请邮箱联系:szshangwunetwork@163.com

    Kuyun Networks owns intellectual property such as copyright, including but not limited to the entire content of the product or service that is issued or jointly issued with a partner company, and is protected by law.

    Without the written permission of the owner, no unitor individual may use, copy, modify, copy or transmit any part of the above products, services, information, or materials in any way or for any reason.

    隐私政策

    Privacy Policy

    KuyunNetworks regards user information security and privacy protection ashis"lifeline." We adhere to the "everything based onuservalue" philosophy, and strive to improve the transparency ofinformationprocessing, enhance your convenience of information management, andprotectyour information and communication security.

    KuyunNetworksstrictly abides by laws and regulations and follows the followingprivacyprotection principles to provide you with safer and more reliableservices:

    1,

    Safeandreliable: We make every effort to prevent your information from beingleaked,damaged or lost through reasonable and effective information securitytechnologyand management processes.

    2,

    Self-selection:Weprovide you with convenient information management options so you can maketheright choices and manage your personal information.

    3,

    Protectingcommunicationsecrets: We strictly abide by laws and regulations, protect yourcommunicationsecrets, and provide you with secure communication services.

    4,

    Reasonable:Inorder to provide better service to you and other users, we only collectthenecessary information.

    5,

    Clearandtransparent: We strive to use a concise statement to introduce you totheprivacy policy so that you can clearly understand how our informationishandled.

    6,

    Incorporateprivacyprotection into product design: We integrate various concepts such aslaw,product and design into all aspects of product or service development,andincorporate the concept of privacy protection.

    ThisPrivacyPolicy mainly explains to you:

    Whatinformationwe collect;

    Thepurposeof our collection of information;

    Yourrights.

    Ihopethat you read the Privacy Policy (hereinafter referred to as"thispolicy") to learn more about how we collect and use informationso thatyou can better understand our services and make appropriate choices.

    ByusingKuyun Networks's services, you are agreeing to what we have describedin thispolicy. Terms used in this policy have the same meanings as in theUserAgreement unless otherwise agreed.

    Ifyouhave any questions, please contact us.

    First,theinformation we collect

    Wecollectonly the information necessary to achieve product functionality basedon legal,justified, and necessary principles.

    1.1

    Informationthatyou provide when you use our services

    1.1.1Informationyou fill out when you register your account.

    Forexample,the nickname and mobile number you filled in when you signed up for anaccount.

    1.1.2Informationthat you upload when you use the service.

    Forexample,when you use an app, upload an avatar, shared photo.

    1.1.3Informationsubmitted by you through our customer service or attending ourevents.

    Forexample,a questionnaire you fill out when participating in our online eventmay includeyour name, phone number, home address, and more.

    Someofour services may require you to provide specific personallysensitiveinformation to achieve specific functions. If you choose not toprovide thistype of information, you may not be able to use certain features intheservice, but it will not affect your use of other features in the service.Byproviding your personally sensitive information, you consent to theprocessingof your personally sensitive information in accordance with thepurposes andmethods described in this policy.

    1.2

    Informationweget when you use the service

    1.2.1Loginformation. When you use our services, we may automatically collectrelevantinformation and store it as service log information.

    (1)Equipmentinformation. For example, device model, operating system version,unique deviceidentifier, battery, signal strength, and more.

    (2)Softwareinformation. For example, the version number of the software, thebrowser type.To ensure the security of the operating environment or to provideservices, wecollect information about the mobile apps and other software youuse.

    (3)IPaddress.

    (4)Servicelog information. For example, information you search, view, servicefailureinformation, referral URLs, etc. when you use our services.

    (5)Communicationlog information. For example, the account, communication time,and duration thatyou used to communicate when using our services.

    1.2.2Locationinformation. When you use location-related services, we may record thelocationof your device to provide you with relevant services.

    (1)Whenyou use the service, we may obtain your geographic location informationthroughIP address, GPS, WiFi or base station;

    (2)Theinformation provided by you or other users when using the service mayincludeinformation about your location, such as the information about yourarea thatmay be included in the account information you provided, and thegeo-tagginginformation contained in photos shared by you or others. ;

    1.2.3Otherrelevant information. To help you make better use of our products orservices,we collect relevant information. For example, we collect buddy lists,group listinformation, and voiceprint feature value information. To ensurethat you canuse our services to reach people you know, if you choose to enablethe ImportContacts feature, we may encrypt your contact's name and phonenumber andcollect only the encrypted information.

    1.3

    Informationsharedby other users contains your information

    Forexample,photos posted by other users or shared videos may contain yourinformation.

    1.4

    Informationobtainedfrom third-party partners

    Wemayobtain information that you generate or share when you use a third-partypartnerservice. For example, when you use your account to sign in to athird-partypartner service, we'll get the name and login time of yourthird-party partnerservice, so you can manage it. Please read carefully theuser agreement orprivacy policy of the third party partner service.

    Second,howdo we use the information we collect?

    Westrictlyabide by the laws and regulations and the agreement with the users,and use thecollected information for the following purposes. If we use yourinformationbeyond the following purposes, we will explain it to you again andobtain yourconsent.

    2.1

    Provideservicesto you.

    2.2

    Meetyourindividual needs. For example, language settings, locationsettings,personalized help services.

    2.3

    Productdevelopmentand service optimization. For example, when our system fails, werecord andanalyze the information generated by the system failure to optimizeourservices.

    2.4

    Security.Forexample, we use your information for authentication, security, anti-fraudmonitoring,archive backup, customer security services, and more. For example,securitysoftware that you download or install detects malware or viruses oridentifiesfraudulent information for you.

    2.5

    Recommendads,news, and more that may be of interest to you.

    2.6

    Assessandimprove the effectiveness of our advertising and other promotionsandpromotions.

    2.7

    Managementsoftware.For example, perform software certification, software upgrades, andthe like.

    2.8

    Inviteyouto participate in a survey about our services.

    Inorderto give you a better experience, improve our services or other uses thatyouagree to, we may use the information collected through certain services forourother services, subject to relevant laws and regulations. For example, useinformationabout one of our services for another service to show youpersonalized contentor ads, for user research analysis and statistics.

    Toensurethe security of our services and to help us better understand howourapplications are performing, we may record information such as how oftenyouuse the application, fault information, overall usage, performance data,andthe source of the application. We do not combine the information we storeinthe analysis software with the personally identifiable information youprovidein the application.

    Howdowe use cookies and related technologies?

    Weorour third-party partners may collect your information by placing securecookiesand related technologies in order to provide you with a morepersonalized userexperience and service. We will strictly require third-partypartners to complywith the relevant provisions of this policy.

    Youcanalso manage your cookies through your browser settings. However, pleasenotethat if you disable cookies, you may not be able to enjoy the bestserviceexperience and some services may not work properly. If you would likemoreinformation on the security of cookies, please see the Cookie Policy Note.

    Fourth,theinformation you share

    Youcanshare your information with your friends, family and other users throughourservices. For example, the text and photos you share publicly on theWeChatcircle of friends. Please note that this may include sensitiveinformation suchas your personally identifiable information, personal propertyinformation.Please carefully consider disclosing your relevant personalsensitiveinformation.

    Youcancontrol the scope of your shared information through the privacy settingsin ourservices, or you can delete your publicly shared information throughthesettings in the service or the guidelines we provide. However, please notethatthis information may still be stored independently by other usersornon-associated third parties not under our control.

    Howdoyou manage your information?

    5.1

    Youmayaccess, modify and delete the registration information and otherpersonalinformation you provide while using our services, or you may follow thenoticeguidelines to contact us. The scope and manner in which you access,modify, anddelete personal information will depend on the specific service youuse. Forexample, if you want to stop sharing your location information whenusing location-relatedservices, you can stop sharing by using the mobile phonelocation shutdownfeature, software and hardware service provider andcommunication serviceprovider shutdown. I suggest you read the relevantguidelines carefully. .

    5.2

    Wewillcollect and use your information only as described in this policy forthefunctionality of our products or services. If you find that we haveviolatedlaws, administrative regulations or the agreement of both parties tocollectand use your personal information, you can ask us to delete it. If youfindthat your personal information collected and stored by us is incorrect, youcanalso ask us to correct it. Please contact us through the contact detailslistedin this policy.

    5.3

    Whenyouaccess, modify, and delete information, we may ask you to authenticate tokeepyour account secure.

    5.4

    Pleaseunderstandthat due to technical limitations, legal or regulatory requirements,we may notbe able to meet all of your requirements and we will respond to yourrequest withina reasonable timeframe.

    6.Informationwe share

    Westrictlyrestrict the sharing of information in accordance with laws andregulations,such as:

    6.1

    Wemayshare your personal information with third parties with your prior consent;

    6.2

    Forthesole purpose of external processing, we may work with third partypartners(third party service providers, contractors, agents, advertisingpartners, appdevelopers, etc., for example, to provide email or pushnotifications on ourbehalf. Providers, map service providers that provide uswith locationservices) (they may not be in your jurisdiction) share yourpersonalinformation and let them follow our instructions, privacy policies andotherrelevant confidentiality and security measures. Process the aboveinformationand use it for the following purposes:

    6.2.1provideyou with our services;

    6.2.2achievethe stated purpose of the “How we use the information collected”section;

    6.2.3fulfillour obligations under the User Agreement or this Policy and exerciseour rights;

    6.2.4Understand,maintain and improve our services.

    Ifweshare your information with the above-mentioned third parties, we willuseencryption, anonymization and other means to protect your information.

    6.3

    Asourbusiness continues to develop, when mergers, acquisitions, asset transfers,etc.result in the sharing of your personal information with third parties, wewillinform you of the relevant situation by means of pushnotifications,announcements, etc., in accordance with laws and regulations andnot less thanThe standards required by this policy continue to protect orrequire newadministrators to continue to protect your personal information.

    6.4

    Wewilluse the information we collect for big data analysis. For example, we usetheinformation we collect to analyze urban thermograms or industry insightreportsthat do not contain any personal information. We may disclose and sharewith ourpartners information that is processed without post-identificationcontent tounderstand how users use our services or to inform the public aboutthe overallusage trends of our services.

    6.4

    Wemaydisclose your personal information for the following purposes:

    6.5.1Complywith applicable laws and regulations and other relevant regulations;

    6.5.2complywith the provisions of court decisions, rulings or other legalprocedures;

    6.5.3complywith the requirements of relevant government agencies or otherlegallyauthorized organizations;

    6.5.4Wehave reason to believe that we need to comply with relevant lawsandregulations;

    6.5.5Reasonableand necessary use for the protection of the personal and propertysafety orother legal rights of our customers, us or our affiliates, otherusers oremployees for the purpose of implementing the relevant serviceagreements orthis policy, safeguarding the public interest.

    7.Informationwe may send you

    7.1

    Informationpush

    Wemaysend you emails, text messages, news or push notifications when you useourservices. You can choose to unsubscribe on your device by following ourtips.

    7.2

    Servicerelatedannouncement

    Wemayissue service-related announcements to you when necessary (for example,when aservice is suspended due to system maintenance). You may not be able tocancelthese announcements that are related to the service and that arenotadvertising.

    Eight,thelocation and duration of the stored information

    8.1

    Locationwhereinformation is stored

    Wecomplywith the laws and regulations and store the personal informationcollected byusers in China.

    8.2

    Termofinformation stored

    Ingeneral,we retain your personal information for the shortest period of timenecessary toachieve its purpose. However, in the following cases, we maychange the storagetime of personal information due to legal requirements:

    8.2.1Tocomply with applicable laws and regulations and other relevant regulations;

    8.2.2tocomply with court decisions, rulings or other legal procedures;

    8.2.3inorder to comply with the requirements of relevant government agenciesorstatutory authorized organizations;

    8.2.4Wehave reason to believe that we need to comply with relevant lawsandregulations;

    8.2.5Thepurpose reasonably necessary to protect the personal and property safetyorother legal rights of our customers, us or our affiliates, other usersoremployees for the purpose of implementing the relevant service agreementsorthis policy, safeguarding the public interest.

    Intheevent that our products or services cease to operate, we will notify youby, forexample, push notifications, announcements, etc., and delete oranonymize yourpersonal information within a reasonable period of time.

    Nine,informationsecurity

    Weprovideappropriate security for your information to prevent loss, misuse,unauthorizedaccess or disclosure.

    9.1

    Westrictlyabide by laws and regulations to protect users' communication secrets.

    9.2

    Wewilluse various security measures to ensure the security of information withinareasonable level of security. For example, we use encryption (eg, TLS,SSL),anonymization, and other means to protect your personal information.

    9.3

    Weestablishspecialized management systems, processes and organizations toensureinformation security. For example, we strictly limit the range ofpeopleaccessing information and require them to comply withconfidentialityobligations and conduct reviews.

    9.4

    Intheevent of a security incident such as a personal information disclosure, wewillinitiate an emergency plan to prevent the expansion of security incidentsandinform you by push notifications, announcements, etc.

    Ten,advertising

    Wemayuse your relevant information to provide you with ads that are morerelevant toyou on relevant websites, apps and other channels. You can learnmore about thead page.

    Eleven,protectionof minors

    Weattachgreat importance to the protection of personal information of minors.Inaccordance with the relevant laws and regulations, if you are a minor undertheage of 18, you should obtain the consent of your parent or legalguardianbefore using Tencent's services. If you are a guardian of a minor,pleasecontact us through the contact details in Section 13 when you havequestionsabout the personal information of the minor you are monitoring.

    Twelve,thescope of application

    Thispolicyapplies to all of our services. However, some services have their ownspecificprivacy guidelines/statements that more specifically describe how weprocessyour information in the service. In the event of any inconsistencybetween thispolicy and the privacy guidelines/claims for a particular service,please referto that particular privacy guide/declaration.

    Pleasenotethat this policy does not apply to services provided by other companiesorindividuals. For example, you can use a WeChat account to log in toothercompanies or individuals.

    Youruseof such third party services is subject to its Privacy Policy (not thisPolicy)and you will need to read the policies carefully.

    Thirteen,contactus

    Ifyouhave any questions about this policy or other related matters, pleasecontact usthrough the contact information indicated at the bottom of theofficial website.

    Wewillreview the issue as soon as possible and respond within 30 days ofverifyingyour user status.

    Fourteen,change

    Wemayrevise this policy in due course. If such changes result in asubstantialderogation of your rights under this Policy, we will notify you bypromptingyou at the prominent location on the page, by sending you an email,etc.,before the change takes effect. In such a case, if you continue to useourservices, you agree to be bound by the revised policy.

    Youcanshare your information with your friends, family and other users throughourservices. For example, the text and photos you share publicly on theWeChatcircle of friends. Please note that this may include sensitiveinformation suchas your personally identifiable information, personal propertyinformation.Please carefully consider disclosing your relevant personalsensitiveinformation.

    Howdoyou manage your information?

    Youruseof such third party services is subject to its Privacy Policy (not thisPolicy)and you will need to read the policies carefully.

    Forexample,a questionnaire you fill out when participating in our online eventmay includeyour name, phone number, home address, and more.

    Incorporateprivacyprotection into product design: We integrate various concepts such aslaw,product and design into all aspects of product or service development,andincorporate the concept of privacy protection.

    (1)Equipmentinformation. For example, device model, operating system version,unique deviceidentifier, battery, signal strength, and more.

    Informationthatyou provide when you use our services

    Security.For example, we use your information for authentication, security,anti-fraudmonitoring, archive backup, customer security services, and more. Forexample,security software that you download or install detects malware orviruses oridentifies fraudulent information for you.

    用户协议

    User Agreement

    PartI Important

    This"Online Game End User License Agreement" (hereinafter referred to as"Agreement") is the user's (individual or single entity, hereinafterreferred to as "User") and Kuyun Networks regarding this online game(including any modification of the online game, The legal agreement for the useof the update, all previous versions and subsequent versions, hereinafterreferred to as "online games".

    1.Agreement content

    1.1main content:

    Thefirst part of the important tips; the second part of the rights statement; thethird part of the necessary clauses; the fourth main terms; the fifth part ofthe user code;

    1.2Change content:

    Allof the above, Kuyun Networks reserves the right to make changes based onoperational needs. All changes and updates will take effect immediately afterthe end of the objection period specified by Kuyun Networks;

    1.3new content:

    Otherrules that Kuyun Networks publishes periodically or irregularly according tooperational needs, including but not limited to other official information suchas forum forum rules, code of conduct, activity rules, definitioninterpretation, etc.

    Pleasenote that in view of the user's habit of using the online game service, theuser is obliged to re-read the entire contents of the end user license agreementon a monthly basis from the date of using the Kuyun Networks service. In viewof the above agreement, the user is not satisfied with the performance. Thosewho have such obligations are not entitled to object to the legal effect of therelevant provisions without knowing the above.

    2.The obligations of Kuyun Networks

    2.1The legal Kuyun Networks's obligation to take reasonable care to the attentionof the user will be achieved as follows:

    Inthis agreement, Kuyun Networks reminds the user of the relevant terms in areasonable manner, such as underline and red mark, which are enough to draw theuser's attention. (It is important to emphasize that it is not limited to theuser should pay special attention to any unspecified “including” ", "disclaimer","not", "reject" and other terms of similar terms), theseterms shall be applied to this Agreement to the fullest extent permitted byChinese law. Unless the user accepts all the terms of this agreement, he or sheis not authorized to install, copy, access Kuyun Networks related websites,recharge, run client software or otherwise use online games.

    3.User's rights

    Incase of any objection to the above mentioned terms and any content of thisagreement, the user has the right to refuse to click to agree or to express anobjection to Kuyun Networks by phone or email within 30 days after anyagreement is updated, changed or modified.

    Anyof the following actions of the user will be deemed as the user's completerecognition of the agreement. This User Agreement will take effect immediatelyand be fully legally binding on Kuyun Networks and the user: (1) Click on anypart of registration, download, use, etc. (2) use the online game products andservices provided by Kuyun Networks in any way that may or may have interactedwith the online game; (3) not call or within 30 days after the update, changeor modification of the agreement, rules, etc. Send an email to Kuyun Networksto object.

    4.User's approval

    Inview of the fact that Kuyun Networks has fulfilled its obligations under theformat clauses, the above actions of the user will be deemed and should beregarded as the legality and validity of the terms that the user has fully paidattention to and agreed to all the terms of this agreement, especially the user'sattention. The User shall not claim or require the Court or any other thirdparty to confirm that the Terms are illegal or invalid on the grounds that KuyunNetworks does not promptly alert the user to the format terms or does notfulfill the stated obligation on the User's request.

    5.Minors pay attention to the terms

    Minorsshould review and accept this agreement in the company of a legal guardian. Forminors under the age of 14, you must apply for registration in the name of alegal guardian by their legal guardian. Minor users should use "onlinegames" and conduct online games to a reasonable extent. Kuyun Networks hasthe right to impose relevant restrictions in accordance with the law.

    PartII Statement of Rights

    1.Intellectual property

    Thisproduct and the instruction manual are protected by copyright law. All programsand graphic contents may not be copied, reproduced or modified in whole or inpart by any means without the written permission of the authorized party andthe operator. All related product names, trademarks, brands and pictures onthis product and in the packaging and manuals are owned by the authorized partyor Kuyun Networks and are the property of their respective owners.

    Theentire content of online games (including but not limited to any computer code,game characters, game character names, game character information, storybackground, plot language, place name settings, task design, economic system,trading system, production building system, social system The intellectual propertyrights of the confrontation function, character image, sound effect, map props,motion rendering, team system, game concept, art work, sound effects, music,audio and video, documentation, and game client and server software are ownedby the authorized party. All rights to perform this Agreement are legallyavailable based on authorization.

    2.game account

    Theownership of the online game user account is owned by Kuyun Networks. After theuser successfully registers, the user's right to use the online game useraccount is obtained, and any data information generated by the game account andstored in the Kuyun Networks database (including but not limited to accountdata) The ownership of information, role data information, etc. belongs to KuyunNetworks. Under the premise of full compliance with the agreement, the user hasthe right to use the agreement specified in the agreement for the datainformation belonging to his user account during the normal use of the onlinegame.

    Virtualitem

    Virtualitems in online game products and services, including but not limited toingots, coins, gold, game coins, virtual equipment, virtual items, etc., areowned by Kuyun Networks and are generated based on the virtual item and storedin the Kuyun Networks database. The ownership of any data information(including but not limited to virtual item data information, grade item datainformation, etc.) belongs to Kuyun Networks. Under the premise of fullcompliance with the agreement, the user has the right to use the agreementspecified in the agreement for the data information belonging to his virtualitem during the normal use of the online game.

    PartIII Essential Terms

    1.Account registration

    1.1The user promises to register as a Kuyun Networks user in his true identity,and to ensure that the personally identifiable information provided is true,complete and valid, and bears corresponding legal responsibility for theinformation provided in accordance with legal provisions and mandatory terms.

    1.2After the user registers as a Kuyun Networks user in his or her real identityand needs to modify the personally identifiable information provided, KuyunNetworks shall provide the service in a timely and effective manner.

    2.User account usage and custody

    2.1According to the mandatory provisions, Kuyun Networks has the right to reviewwhether the identity information provided by the user registration is true andeffective, and should actively take reasonable measures such as technology andmanagement to ensure the security and validity of the user account; the user isobliged to keep it safe. Account and password, and use their account andpassword correctly and securely. If any party fails to perform the aboveobligations resulting in the loss of the account password, the account isstolen, etc., causing damage to the civil rights of the user and others, thelegal liability arising therefrom shall be borne.

    2.2The user has rights and assumes responsibility for the actions of the accountheld after login.

    2.3If the user finds that his account or password has been illegally used byothers or has abnormal use, he shall promptly notify Kuyun Networks accordingto the processing announced by Kuyun Networks and have the right to inform KuyunNetworks to take measures to suspend the login and use of the account.

    2.4 KuyunNetworks shall take measures to suspend the login and use of the user accountaccording to the user's notice. Kuyun Networks shall require the user toprovide and verify the personal valid identity information consistent with theregistered identity information.

    2.4.1Kuyun Networks verifies that the personal valid identity information providedby the user is consistent with the registered identity information, and shalltake measures to suspend the login and use of the user account in a timelymanner.

    2.4.2Kuyun Networks violates the agreement of 2.4.1. If the measures are not takenin time to suspend the login and use of the user account, and therefore causelosses to the user, they shall bear the corresponding legal responsibilities.

    2.4.3Kuyun Networks has the right to refuse the user's request if the user does notprovide his or her personal valid ID or if the personal valid ID provided bythe user is inconsistent with the registered identity information.

    2.5In order to maintain the legitimate rights and interests of the user andprovide Kuyun Networks with personal valid identity information consistent withthe registered identity information, BobWalker shall provide the user with thenecessary assistance and support for the account registrant certificate,original registration information, etc., as needed. Provide relevant evidenceand information to relevant administrative agencies and judicial organs.

    3.Suspension and termination of services

    3.1If the user has published illegal information, seriously violates socialethics, and other violations of the legal prohibition, Kuyun Networks shallimmediately terminate the service to the user.

    3.2 KuyunNetworks has the right to terminate the service to the user if the userperforms the improper behavior when accepting the Kuyun Networks service. Thespecific circumstances of the improper conduct shall be expressly agreed inthis Agreement or be prohibited by Kuyun Networks's prior notice that theservice shall be terminated. Otherwise, Kuyun Networks shall not terminate theprovision of services to the User.

    3.3The user provides false registration identity information or implements aviolation of this agreement. Kuyun Networks has the right to suspend all orpart of the service to the user; Kuyun Networks shall suspend the user andinform the user of the suspension period. The suspension period shall bereasonable and shall be suspended. Kuyun Networks should resume service tousers in time.

    3.4 KuyunNetworks shall, in accordance with this Article, suspend or terminate theprovision of part or all of the services to the User, Kuyun Networks shall bearthe burden of proof.

    4.User information protection

    4.1 KuyunNetworks requires users to disclose their privacy protection policies andpersonal information utilization policies to users in a clear and easy way, andto take necessary measures to protect the security of users' personalinformation. .

    4.2 KuyunNetworks shall not provide, disclose or share personally identifiableinformation such as name, personal identification number, contact information,home address, etc. in the user registration data without any user permission,except in the following cases:

    4.2.1 The user or user guardian authorized the disclosure of Kuyun Networks;

    4.2.2 Relevant legal requirements are disclosed by Kuyun Networks;

    4.2.3 The judicial or administrative agency requires Kuyun Networks to provide it onthe basis of legal procedures;

    4.2.4 Kuyun Networks filed a lawsuit or arbitration with the user in order to protecthis or her legitimate rights and interests;

    4.2.5 When the user's personally identifiable information is provided in accordancewith the legal requirements of the user's guardian.

    The ownership of the online game user account is owned by Chaoting Networks. Afterthe user successfully registers, the user's right to use the online game useraccount is obtained, and any data information generated by the game account andstored in the Chaoting Networks database (including but not limited to accountdata) The ownership of information, role data information, etc. belongs toChaoting Networks. Under the premise of full compliance with the agreement, theuser has the right to use the agreement specified in the agreement for the datainformation belonging to his user account during the normal use of the onlinegame.

    相关文章

      网友评论

          本文标题:大话单机版

          本文链接:https://www.haomeiwen.com/subject/avwwdhtx.html