Privacy Policy

(Published by JoD Studio, provided by Guangzhou Qidong Network Technology Co., Ltd.)​​ ​

Last Updated: January 02, 2026​ ​

Effective Date: June 09, 2025​​ ​

Preface​

Thank you for using the game products and services provided by Guangzhou Qidong Network Technology Co., Ltd.​ (hereinafter referred to as "Our Company" or "we"). Our Company is the legal entity responsible for data processing under this Privacy Policy. The games covered by this Policy are developed and published under the developer account JoD Studio​ (hereinafter referred to as "Developer") on platforms including Google Play. Our Company is solemnly committed to protecting the personal information and privacy security of users who use our products and services. When you use our services, we may collect and use your relevant personal information. We hope to explain the corresponding processing rules and related matters regarding the collection and use of your personal information through this "Guangzhou Qidong Network Technology Co., Ltd. User Privacy Protection Policy"​ (hereinafter referred to as "this Policy") to better protect your rights and interests.

This Privacy Policy applies to all game services published under the JoD Studio developer account. We hope that you carefully read and confirm that you have fully understood the content of this Policy before using our game services, and that you can make choices you deem appropriate according to the guidance of this Privacy Policy. Your use of our services or continued use after we update this Privacy Policy (we will promptly notify you of updates) means that you agree to the content of this Privacy Policy (including the updated version) and consent to our collection, use, storage, and sharing of your relevant information according to this Privacy Policy.

 

Table of Contents​

I. How We Collect and Use Personal Information

II. How We Store Your Personal Information

III. How We Use COOKIES or Similar Technologies

IV. How We Share, Transfer, and Publicly Disclose Your Personal Information

V. How Third-Party Products or Services Obtain Your Personal Information

VI. How We Protect Your Personal Information

VII. How You Can Manage Your Personal Information

VIII. How We Handle Minors' Personal Information

IX. How Your Personal Information is Transferred Globally

X. How This Privacy Policy is Updated

XI. How to Contact Us​

 

I. How We Collect and Use Personal Information​​ ​

(I) How We Collect Your Personal Information​

Personal information refers to various information recorded electronically or by other means that can, alone or in combination with other information, identify a specific natural person or reflect the activities of a specific natural person. We will only collect and use your personal information for the purposes described below in this Policy: 

1. Account Registration: When you register for our game, we need to collect your mobile phone number and login password. If you use a Meta or Google account to link and log in to our game, we will collect the unique identifier of your Meta or Google account. We collect this information to help you complete account registration, save your login information for access across different devices, and protect your account security. If you do not provide this information, we will be unable to create an account for you and provide normal services.

2. Game Services: When you use game services, we need to collect the device ID, device name, device type, and version you use. We collect this information to ensure your normal use of our services, maintain the normal operation of basic game functions, optimize game product performance, and enhance your gaming experience. If you do not provide this information, you will be unable to use the game services.

3. Real-Name Authentication: To comply with relevant laws, regulations, policies, and requirements of competent authorities, users of our games must undergo real-name authentication to continue using game services. When you perform real-name authentication, we need to collect your name, type of identity document, and identity document number. Simultaneously, for the purpose of real-name authentication, you agree and authorize us, either by ourselves or entrusted to a third party, to provide, query, and verify your aforementioned identity information with relevant real-name authentication institutions (e.g., government departments). We collect your real-name identity information when you actively provide it. We collect this information to fulfill legal obligations, verify user identity, identify user age, and ensure system and service security. This information is sensitive. Refusing to provide real-name identity information may result in your inability to log in to the game or face corresponding restrictions while using our game services.

4. Safeguarding Network and Service Security: To ensure the security of the network and game services, and to guarantee your normal use of our game services, ensure the normal operation of game service functions, optimize the game product experience, and protect your account security, we collect your device information, network identity identification information, and network environment information, including device ID, device type and version, system version, IP address, MAC address, application ID, network type, etc. We collect this information to create a fair, healthy, and secure gaming environment and to combat behaviors that undermine the fair gaming environment or disrupt the normal operation of game services (e.g., for detecting piracy, scanning for unauthorized programs ["cheating software"], preventing cheating, etc.). If you do not provide the above information, you will be unable to use the game services.

5. Recharge and Consumption: When you recharge or make payments within our games, we collect your recharge records, consumption records, payment information, payment type, order number, etc., to allow you to query your transaction history and to provide customer service personnel with information to support the handling of disputes should they arise. Recharge records, consumption records, etc., are sensitive information. Collecting the aforementioned information is necessary to complete the payment transaction function; otherwise, the transaction cannot be completed. At the same time, to protect your property security to the greatest extent possible, we collect device information, network identity identification information, and network environment information at the time of payment to identify, reconfirm, or block high-risk transaction behaviors.

6. Device Identification Information: To protect your game account security and create a fair, healthy, and safe game environment, we collect your game application information, device information, network identity identification information, operating system and process information, network environment information, and game crash records, etc., to combat behaviors that disrupt the fair game environment or interfere with or disrupt the normal operation of game services (e.g., cheating using plug-ins ["waigua"]).

7. When you post information or interact with other players through text, pictures, voice, video, or other means in game chat rooms or on forums, we may collect the content of the information you send to filter and monitor inappropriate content such as pornography, violence, politics, insults, and malicious advertisements, to purify the game environment and maintain a healthy online environment.

(II) Device Permission Call Situations​

During your use of our games, we need to apply for device permissions within the necessary scope. Please note that we will not enable your device's permissions by default. Our Company may collect your information through device permissions only after you actively confirm and enable them. Permission application rules are as follows:

· When sharing a screenshot for the first time ¡ú Request storage permission

· When participating in a city challenge event ¡ú Request location permission (using only approximate location, accuracy reduced to city level, precise coordinates are not collected)

· When joining a voice channel ¡ú Request microphone permission If you wish to disable a permission after initially authorizing it, you can do so in your device's settings, thereby refusing our collection of the corresponding personal information.

(III) How We Use Your Personal Information​

1. We use the collected personal information in accordance with the agreements of this Policy and for the purpose of achieving our services.

2. Please note that all personal information you provide while using our services will be subject to continuous authorization for our use during your use of our services, unless you delete it or refuse our collection through system settings. We will stop using and delete your personal information when you cancel your account.

3. We may statistically analyze the usage of our services and may share these statistical information with the public or third parties for product development, service optimization, and security purposes. However, these statistical information do not contain any personally identifiable information about you.

4. When we intend to use your personal information for purposes not stated in this Policy, or use information collected for a specific purpose for other purposes, we will seek your prior consent proactively, typically through a checkbox mechanism.

(IV) Other Rules​

According to relevant laws, regulations, and national standards, in the following circumstances, we may collect and use your relevant personal information without obtaining your authorized consent:

(1) Related to fulfilling obligations under laws and regulations; 

(2) Directly related to national security and national defense security;

(3) Directly related to public safety, public health, and major public interests;

(4) Directly related to criminal investigation, prosecution, trial, and execution of judgments;

(5) Where it is necessary to protect the major legal rights and interests, such as life and property, of the personal information subject or other individuals, but it is difficult to obtain the consent of the individual;

(6) Where the personal information involved is disclosed to the public by the personal information subject or guardian on their own initiative;

(7) Where personal information is collected from legally disclosed information channels, such as legitimate news reports and government information disclosure;

(8) Necessary for concluding or performing a contract as requested by the personal information subject;

(9) Necessary for maintaining the safe and stable operation of the provided products or services, such as detecting and handling product or service failures;

(10) Necessary for legitimate news reporting;

(11) Necessary for conducting statistical or academic research in the public interest, and when providing the results of academic research or description to the outside world, the personal information contained in the results is de-identified;

(12) Other circumstances provided by laws and regulations. 

II. How We Store Your Personal Information​

1. We will store your personal information for the minimum period required to fulfill the purposes stated in this Policy and as required by laws and regulations. Upon expiration of said period, we will delete or anonymize your personal information.

2. Personal information collected and generated during our operations within the territory of the People's Republic of China will be stored within China (for the purposes of this Privacy Policy, "China" does not include Hong Kong, Macao, and Taiwan), except in the following circumstances: (1) Clearly stipulated by law; (2) Obtaining your explicit authorization; (3) Your personal initiative, such as requesting overseas services. For the above circumstances, we will ensure that adequate protection is provided for your personal information in accordance with this Privacy Policy and relevant laws and regulations.

3. We adhere to the principle of minimal necessity:

o MAC address is only used for local network diagnosis and is not uploaded to the server;

Location information accuracy is reduced to the city level; only approximate location (city level) is used when obtaining location, precise coordinates are not collected;

OAID anonymous identifiers cannot be associated with personal identity.

III. How We Use COOKIES or Similar Technologies​

1. How We Use Cookies​

(1) By using Cookies, we provide users with a secure and personalized service experience. We and third-party partners may store Cookies and other identifiers on your device for the following purposes:

Security Cookies: Help us ensure the security and efficient operation of our products and services.

Recommendation Cookies: Help us recommend, display, and push content that may interest you. (2) The collection and use of your information by third-party partners through Cookies is not constrained by this Policy but is governed by their own information protection statements. We are not responsible for third-party Cookies or similar technologies. (3) You can modify your acceptance of Cookies or refuse our Cookies through your browser settings. However, this may affect your secure use of our products or services, and the relevance of advertisements you receive may decrease.

IV. How We Share, Transfer, and Publicly Disclose Your Personal Information​

1. Entrusted Processing: We entrust third-party service providers to process the personal information we collect to provide us with infrastructure technology, data analysis, advertising, marketing decisions, and other product or technical support. Such entrusted processing is bound by the purposes stated in this Policy, and we supervise these entrusted third-party service providers by contract.

2. Sharing: We will not share your personal information with any company, organization, or individual, except in the following cases: (1) Sharing with your explicit consent; (2) Providing information as required by applicable laws and regulations or mandatory requirements of government authorities; (3) Sharing with our affiliates: We may share your personal information with our affiliates; however, we will only share necessary personal information and it will be bound by the purposes stated in this Policy.

3. Transfer: We will not transfer your personal information to any company, organization, or individual, except in cases involving mergers, acquisitions, asset transfers, or bankruptcy liquidation. If personal information transfer is involved, we will inform you of the situation and require the new holder of your personal information to continue to be bound by this Policy.

4. Public Disclosure: We will only publicly disclose your personal information under the following circumstances: (1) After obtaining your explicit consent; (2) Disclosure based on law: In circumstances such as legal requirements, legal procedures, litigation, or mandatory requirements of government authorities.

5. Exceptions: According to relevant laws and national standards, in the circumstances listed in Article IV of this Policy, we may share, transfer, or publicly disclose personal information without prior consent.

V. How Third-Party Products or Services Obtain Your Personal Information​

To provide you with richer and more complete functions, we use the following third-party Software Development Kits (SDKs) to provide you with services. The specific information collection and usage of the SDKs are subject to the privacy policy or relevant statements of the SDK operators. 

List of Integrated Third-Party SDKs:​

SDK Name

Purpose

Information Collected

Privacy Link

Cocos

Ad Mediation

IMEI,Android ID

https://download.cocos.com/CocosUdc/agreement/Cocos_Privacy_Policy_cn_20200904.html

TopOn

Ad Mediation

IP,SSID,Android ID,OAID,​MAC Address

https://www.toponad.com/privacy

​​Mobile Security Alliance​​

Device Identification Service

OAID

http://www.msa-alliance.cn/col.jsp?id=120

Meta

Ad Monetization

Device Model, Operating System Version, IP Address, etc.​

https://www.facebook.com/privacy/policy/?entry_point=help_tray

Unity

Ad Monetization

Device Model, Operating System Version, IP Address, etc.​

https://unity.com/cn/legal/privacy-policy

Pangle

Ad Monetization

Device Model, Operating System Version, IP Address, etc.​

https://www.pangleglobal.com/zh/privacy

Kochava

Mobile Attribution,Data Analytics​

Device Identifiers,Device Information,App Information,​Campaign,General Location Information,​​etc.​

https://www.kochava.com/legal/website-visitor-privacy-policy/?ext-link=pub-suite-signup

​SDK Special Instructions:​

· TopOn obtains OAID via com.anythink.odoptfor advertising attribution and obtains Android ID via com.anythink.chinafor device identification.

· MSA SDK only generates OAID and does not collect additional information.

· Advertising SDK information collection can be opted out of by turning off personalized ads in [Settings - Advertising Preferences].

VI. How We Protect Your Personal Information​

We attach great importance to personal information security and take all reasonable and feasible measures to protect your personal information: 

1. We have used security protection measures that comply with industry standards to protect the personal information you provide, preventing data from unauthorized access, public disclosure, use, modification, damage, or loss. The technical means we use include but are not limited to firewalls, encryption (e.g., SSL), de-identification or anonymization, access control measures, etc. Furthermore, we continuously enhance the security capabilities of the software installed on your device. For example, we complete part of the information encryption locally on your device to consolidate secure transmission; we learn about the application information installed on your device and the running process information to prevent viruses, Trojans, and other malicious programs. We recommend that you pay full attention to the protection of personal information when using products and services, and we also provide multiple security features to help you protect your personal information security.

2. We will take all reasonably feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period necessary to achieve the purposes described in this Policy, unless extended retention is required or permitted by law.

3. Please note that while we will endeavor to ensure or guarantee the security of any information you send to us, the Internet environment is not 100% secure, and communication methods such as email, instant messaging, and communication with other users are not encrypted. We strongly advise you not to send personal information through such methods. We shall not be liable for any risks or losses arising therefrom or related thereto.

4. In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedies for you. We will promptly inform you of the relevant situation of the incident through means such as application push notifications, email, SMS, and phone calls. Simultaneously, we will also actively report the handling of personal information security incidents to the regulatory authorities as required.

VII. How You Can Manage Your Personal Information​

During your use of our games, you can manage your personal information in the following ways:

1. Access and Correct Your Personal Information: If you wish to access or correct your personal information, you can do so by clicking "[Settings] - [Feedback]" and following the on-screen instructions, or contact us using the methods specified in this Policy.

2. Delete Your Personal Information: Under the following circumstances, you can request deletion of your personal information by contacting us using the methods specified in this Policy:

(1) If we collect or use personal information in violation of laws, administrative regulations, or our agreement with you;

(2) If we share or transfer your personal information with third parties in violation of laws, administrative regulations, or our agreement with you;

(3) If you no longer use our products or services, or if you cancel your account.

3. Change the Scope of Your Authorization and Consent: You can contact us through device permission settings or the methods specified in this Policy to change the scope of consent or withdraw your authorization. After withdrawal, we will be unable to continue providing the services corresponding to the withdrawn authorization, but this will not affect the processing services previously carried out based on your authorization.

4. Delete Account: If you wish to delete your account, you can do so by clicking "[Settings] - [Reset]" and following the on-screen instructions, or contact us using the methods specified in this Policy. Account deletion is irreversible. We will stop providing you with products or services and will delete or anonymize personal information related to your account upon your request.

5. Permission Management Instructions:​

Enable/Disable Permissions: Phone Settings ¡ú App Management ¡ú [Game Name] ¡ú Permissions

Advertising ID Control: Settings ¡ú Privacy Center ¡ú Advertising Preferences ¡ú Turn off personalized ads

Location Permission Restriction: Settings ¡ú Activity Center ¡ú Turn off location authorization

Impact of Turning Off Permissions:​

Turn off storage permission: Unable to save screenshots and download resource packages.

Turn off location permission: Unable to participate in region-limited events.

Turn off advertising ID: Ads will still be displayed, but relevance will be reduced.

Turning off permissions only affects related additional functions and does not affect basic game services.

6. Exception Circumstances: In the following circumstances, we may be unable to respond to your request: (1) Directly related to national security and national defense security; (2) Directly related to public safety, public health, and major public interests; (3) Directly related to criminal investigation, prosecution, trial, and execution of judgments; (4) We have sufficient evidence that you have subjective malice or abuse your rights; (5) Responding to your request would seriously harm the legitimate rights and interests of you or other individuals or organizations.

VIII. How We Handle Minors' Personal Information​

We attach great importance to the protection of minors' personal information. According to relevant laws and regulations: 

· Collecting and using personal information of minors under the age of 14 requires authorization and consent from their guardian;

· Collecting and using personal information of minors who are 14 years old or older but under 18 may be authorized by their guardian or by the minor themselves.

If you are a minor (especially under the age of 14), we require you to ask your parents or other guardians to carefully read this Privacy Policy and use our services or provide us with information only under the premise of obtaining your guardian's authorized consent.

If you are the guardian of a minor, please pay attention to whether the minor under your guardianship is using our products or services after your authorization and consent. If you have questions about the personal information of the minor under your guardianship, please contact us using the methods specified in this Policy. 

IX. How Your Personal Information is Transferred Globally​

Personal information collected and generated by our Company within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. Without your explicit authorization and the approval of the relevant competent authorities, we will not transfer your personal information to overseas jurisdictions. 

X. How This Privacy Policy is Updated​

Our Privacy Policy may change periodically. We will post any changes to this Policy on this page. For significant changes, we will provide more prominent notice (e.g., through a special prompt on the browse page). We will not reduce your rights under this Policy without your explicit consent.

Significant changes referred to in this Policy include but are not limited to:

(1) Significant changes in our service model; 

(2) Significant chanwnership structure or organizational structure, etc.;

(3) Significant changes in the main objects of personal information sharing, transfer, or public disclosure;

(4) Significant changes in your rights regarding personal information processing and how they are exercised;

(5) Changes to our contact methods and complaint channels;

(6) When a personal information security impact assessment report indicates a high risk.

We will also archive previous versions of this Policy for your review. 

XI. How to Contact Us​

If you have any questions, opinions, or suggestions regarding this Privacy Policy or personal information protection, you can send your written inquiries, opinions, or suggestions to the customer service department at the following address:

· Legal Entity Name: Guangzhou Qidong Network Technology Co., Ltd.

· Developer Name (Google Play)£ºJoD Studio

· Address: Room 2612, Self-compiled B, No. 490 Tianhe Road, Tianhe District, Guangzhou City

· Contact Phone: 020-38894694

· Contact Email: wxkf01@gzqidong.cn

Generally, we will reply within fifteen working days. If you are dissatisfied with our reply, especially if our personal information processing activities have infringed upon your legitimate rights and interests, you may also complain or report to regulatory departments such as cyberspace administration, industry and information technology, public security, and industry and commerce.​

This Policy is written in Chinese. Translations in other languages are for reference only.

Thank you for reading this Policy!