Privacy Policy

Date of Update: January 23, 2024

Effective Date: January 23, 2024

Notice Clauses:

Your trust is of utmost importance to us, and we recognize the significance of personal information to you. We pledge to adhere to the General Data Protection Regulation 2016/679 ("GDPR") enacted by the European Union on April 27, 2016, as well as the French Law No. 78-17 of January 6, 1978, concerning information technology, data files, and individual freedoms ("Data Protection Regulation"). In light of these regulations, LEETA TECHNOLOGY PTE.LTD., the independent developer of JoyIn (referred to hereafter as "LEETA" or "we"), has crafted this Privacy Policy to elucidate how we handle your data and safeguard your rights during your usage of JoyIn.

It's essential to note that this agreement exclusively pertains to JoyIn products and services and does not extend to services offered by third parties. Before utilizing JoyIn products and services, we urge you to carefully read and thoroughly comprehend this agreement, particularly the terms highlighted in bold/underline. You should prioritize reading these terms and only commence usage after confirming your complete understanding and agreement. Individuals below the age of 18 should use this software under the supervision of a guardian. Your utilization of the service is considered a full understanding and acceptance of this agreement.

Should you have any inquiries, opinions, or suggestions regarding the content of this policy, please reach out to us through the contact information provided at the end.

Section 1: Definitions

JoyIn: Refers to the JoyIn mobile client, including but not limited to applications (APP) and mini-programs.

Personal Information: Refers to various information recorded electronically or by other means, capable of individually identifying a specific natural person or reflecting the specific activities of a natural person when combined with other information.

Sensitive Personal Information: Refers to personal information, including but not limited to ID card numbers, personal biometric information, bank account numbers, property information, travel trajectories, transaction information, and information about children aged 14 and below (inclusive). We will prominently identify specific sensitive personal information in this agreement using bold, underline, or other methods.

Section 2: Privacy Agreement

This section of the privacy agreement aims to help you understand the following:

  1. Our Permissions and the Collection and Use of Your Personal Information
    1. How We Use Cookies
    2. How We Protect and Manage Your Information
    3. How We Share, Transfer, and Publicly Disclose Your Personal Information
    4. How You Manage Your Personal Information
    5. Protection of Personal Information of Minors
    6. Accessing and Updating the Privacy Agreement
    7. How to Contact Us

1. Our Permissions and the Collection and Use of Your Personal Information

We will only collect and use your information under legal, fair, and necessary circumstances. When you use our products and/or services, the scenarios in which we need or may need to collect and use your personal information include only the following: to achieve the basic functions of providing our products and/or services, you must authorize us to collect and use necessary information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally.

1.1 By continuing to use the services of this software, you fully understand and agree that this software will obtain the following permissions:

1.1.1 Access to account information, including your Apple ID and related account details such as email address, registered devices, account status, and usage duration.

  1. Allow the application to read the contents of the storage card, which is used for importing and printing sheet music.
  2. Allow the application to modify or delete content in the storage card, which is used for saving sheet music.
  3. Allow the application to access camera permissions, used for capturing sheet music for upload.
  4. Allow the application to use microphone permissions, used for recording.
  5. Obtain information related to your device, including device model and operating system version.
  6. Obtain IP information related to your orders, Google Pay ID, and Apple Pay ID for accounting verification and auditing.
  7. Obtain the nickname and UID of the third-party account you log in to, used for services that require login through the APP platform account. We may verify your identity based on the provided information to ensure that we are providing services to you personally. Scenarios that require identity confirmation include using recharge functions, coupon functions, redemption codes, and other features.
  8. Collect and record user behavior, using tools (including third-party SDKs) to gather data information generated during your use of the product. This includes application launch counts, page visit counts, key button click counts, and configuration attributes of settings. As the product undergoes subsequent version upgrades, the scope of our statistics may change, and your downloading/installing/using behavior of future versions of JoyIn will be considered your agreement to relevant changes.
  9. Collect information about your device (including device serial number, device model, operating system version, geographic location, IMEI, MEID, Android ID, IMSI, GUID, MAC address, IDFA, OAID, OpenUDID, GUID, SIM card, etc.), information about apps you have installed, or running process information. Our product, in conjunction with the Alibaba Cloud SDK, needs to collect the above information to identify your device ID, prevent malicious programs and anti-cheating, enhance service security, ensure operational quality and efficiency, and provide statistical analysis services. This also involves calibrating report data accuracy through geographical location.
  10. Access to your clipboard information, mainly used for sharing or receiving shared sheet music. JoyIn needs to locally access your clipboard, read the contained links, to facilitate services such as jumping and sharing.
  11. Access to your location information (IP address, base station information, etc.), used for Alibaba Cloud email verification login.
  12. Access to your network information, used for Alibaba Cloud email verification login.

1.2 Other

If the information you provide contains personal information of other users, please ensure that you have obtained legal authorization before providing us with such personal information. If it involves the personal information of children, you need to obtain the consent of the corresponding guardian before providing it.

If we use the information for purposes not specified in this agreement, or use information collected for specific purposes for other purposes, or actively obtain your information from third parties, we will obtain your consent in advance.

Establishing a professional security team will secure your personal information (including information obtained directly and indirectly) through security measures such as sensitive information reporting, encryption of sensitive information storage, and regular clearance. Additionally, for indirectly obtaining personal information, we will confirm its legitimacy of sources.

2. How We Use Cookies

Cookies and similar technologies are commonly used on the internet. When you use our related services, we may use these technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information about your visits and usage of this product. We promise not to use cookies for any purposes other than those stated in this privacy policy. We use cookies and similar technologies primarily for the following functions or services:

3. How We Store and Protect Your Personal Information

3.1 Storage of Personal Information

3.1.1 Storage Period:

We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will retain your personal information only for the period necessary to achieve the purposes stated in this agreement, unless there is a legal requirement for mandatory retention. For example, the "E-commerce Law of the People's Republic of China" requires the retention of product and service information, transaction information for a period of three years from the completion of the transaction. The "Cybersecurity Law of the People's Republic of China" requires the retention of relevant network logs for no less than six months.

3.1.2 For log information, record backups, transaction information, etc., after you log out of your account on the same day (but according to legal requirements for the shortest retention period, we will adhere to the shortest period required by law). After the above-mentioned period, we will delete or anonymize your relevant information.

3.1.3 In the event of the cessation of operation of our product or service, we will notify you through push notifications, announcements, etc., and delete your personal information or anonymize it within a reasonable period.

3.2 Protection of Personal Information

Respecting personal privacy is our responsibility. When you confirm and agree to use our products or services under this agreement, to protect your personal privacy, we take the following measures to protect and manage your personal information:

3.2.1 We have implemented security measures in line with industry standards and reasonable practices to protect your personal information, preventing unauthorized access, disclosure, use, and modification. We use encryption technology to enhance the security of personal information; we deploy trusted protection mechanisms to prevent malicious attacks on personal information; we implement access control mechanisms to ensure that only authorized personnel can access personal information; we use SSL for encrypted protection during data exchange; we also adopt secure browsing methods with https for corresponding URLs; and we conduct security and privacy protection training courses to reinforce employee awareness of the importance of protecting personal information.

3.2.2 We do not publicly disclose, edit, or disclose the content of user personal data without user authorization, except for reasons such as government requirements, legal agreements, etc. During the process of user information transmission and after receiving the information, we will comply with industry-standard practices to protect users' private information.

3.2.3 In the unfortunate event of a personal information security incident, we will inform you within 30 natural days. We will notify you of the basic situation and potential impact of the security incident, the measures we have taken or will take, suggestions for you to autonomously prevent or reduce risks, and remedial measures for you. We will inform you through email, letters, telephone, push notifications, etc. If it is difficult to inform each individual user one by one, we will release announcements in a reasonable and effective manner. Additionally, we will report to regulatory authorities on the disposal of personal information security incidents as required.

4. How We Share, Transfer, and Publicly Disclose Your Personal Information

4.1 Sharing

Please be aware that we will only share your personal information for legal, legitimate, necessary, specific, and explicit purposes. For companies and organizations with which we share personal information to achieve the purposes stated in this policy, we will require them to strictly adhere to our agreement and take relevant security measures to protect your personal information.

4.2 Transfer

In the event of acquisitions, mergers, or similar events, if it involves the transfer of personal information, we will require the company or organization receiving your personal information to continue to be bound by this agreement. Otherwise, we will request the company or organization to obtain your authorization again.

4.3 Public Disclosure

In the following circumstances, we will disclose your personal information in accordance with your wishes or legal requirements, and any issues arising from this will be your personal responsibility:

  1. With your prior authorization;
  2. Only by providing your personal information can we provide the products and services you requested;
  3. In accordance with relevant laws and regulations;
  4. According to the requirements of relevant government authorities;
  5. To safeguard the legitimate rights and interests of our software;
  6. You agree to let third parties share information;
  7. We find that you have violated the terms of use or regulations of our software;
  8. We need to provide information to companies representing us in providing products or services (unless we notify you otherwise, these companies are not authorized to use your identity information).

5. How You Manage Your Personal Information

5.1 Accessing Your Personal Information

You can access your personal information through [My].

5.2 Correcting Your Personal Information

If you discover errors in the personal information we process about you, you have the right to correct inaccuracies or incomplete information. You can contact us at [email protected]. We will respond to your request and complete the operation within 7 working days after receiving your feedback and verifying your identity.

5.3 Deleting Your Personal Information

In the following situations, you can request the deletion of personal information by emailing [email protected]. We will respond to your request and complete the operation within 7 working days after receiving your feedback and verifying your identity:

  1. If we violate laws or regulations or breach agreements with you regarding the collection and use of personal information;
  2. If we violate laws or regulations or breach agreements with you by sharing or transferring personal information to third parties, you have the right to request an immediate cessation of such actions and notify third parties to promptly delete the corresponding information;
  3. If you no longer use our products or services, or you have deactivated your account.

5.4 Withdrawing Consent

If you decide to revoke JoyIn APP's authorization to collect your relevant personal information, you can contact us at [email protected]. We will respond to your request and complete the operation within 7 working days after receiving your feedback and verifying your identity.

5.5 Account Deactivation

You have the right to deactivate your account. You can do this by visiting the APP's "My" - "Settings" - "Delete Account" for online operations. Please understand that upon successful deactivation, unless otherwise required by laws and regulations, we will delete your personal information or anonymize it.

6. Protection of Personal Information for Minors

We place great importance on the protection of personal information for minors. Our products and services are primarily designed for adults.

In accordance with relevant laws and regulations, if you are under 18 years of age, you should use JoyIn services or provide information to us only with the written consent of your parents or legal guardians. If you are the guardian of a minor under 14 years of age, before using JoyIn services, your ward should read and agree to this privacy agreement, and you should provide information to us on their behalf.

If you are the guardian of a minor and have questions about the personal information of the minor you are supervising, please contact us through the contact information provided in Section Seven.

7. Review and Update of Privacy Agreement

7.1 You can view this privacy agreement by visiting the registration and login page or by logging into your account and navigating to "My - Settings - Privacy Policy."

7.2 Our services and technology will be continuously updated and optimized to meet the needs of you and other users. When there are changes to new services or business processes, we will promptly update our privacy agreement to inform you of specific changes. Please rest assured that without your explicit consent, we will not limit your rights as stipulated in this agreement. For significant changes, we will obtain your consent through noticeable notification methods, such as pop-up prompts.

8. How to Contact Us

If you have any questions or complaints regarding this privacy policy or matters related to the protection of personal information, you can contact us through the following methods provided in this agreement. We will respond to your request within 7 working days: