This version was last updated on: June 11, 2025
This privacy policy applies to the Cavalry Assault app (hereby referred to as "Application") for mobile devices that was created by Chengdu Liudao Wuyu Technology Co., Ltd (hereby referred to as "Service Provider") as a Free service.
¡¾Preface¡¿ Cavalry Assault Group and its affiliated companies (hereinafter collectively referred to as "Cavalry Assault" or "we") solemnly promise to protect the personal information and privacy security of users (hereinafter referred to as "users" or "you") who use the products and services of Cavalry Assault (hereinafter referred to as "Cavalry Assault Services"). When you use Cavalry Assault Services, we may collect and use your relevant personal information. We hope to explain the processing rules and other relevant matters regarding our collection and use of your personal information through this "Cavalry Assault Privacy Policy" (hereinafter referred to as "this policy") to better safeguard your rights.
¡¾Special Reminder¡¿This policy applies to all Cavalry Assault Services we provide. When you use any individual service we offer, you agree to accept the protection of this policy and the specific privacy information policy terms set for that individual service (hereinafter referred to as "specific terms"). In this case, specific terms and the provisions of this policy will simultaneously take effect for you. Users under the age of fourteen shall also adhere to this policy and the "Cavalry Assault Children's Personal Information Protection Rules and Guardian Notice." If there are any inconsistencies between the specific terms and this policy, the specific terms shall prevail within the scope of the specific terms. If a certain individual service we provide does not apply to this policy, it will be explicitly stated in that service.
Before using various Cavalry Assault Services, please read and understand this policy carefully, especially the terms marked in bold. You should focus on these terms and only begin using the services after confirming that you fully understand and agree. If you do not agree with the contents of this policy, it may result in the inability of Cavalry Assault Services to operate normally or achieve the service effects we intend, and you should immediately stop accessing/using Cavalry Assault Services.
After reading this policy, if you have any questions regarding this policy or related matters, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will respond to you as soon as possible.
We collect your personal information primarily to facilitate easier and more satisfying use of Cavalry Assault Services for you and other users. The goal of Cavalry Assault is to provide all Internet users with a safe, interesting, and educational online experience, and this information helps us achieve that goal.
(1) We will collect and obtain your personal information through the following means:
1. Information you provide. For example:
(1) Information you provide to us when registering an account for Cavalry Assault Services or using Cavalry Assault Services;
(2) Shared information you provide to third parties through Cavalry Assault Services, as well as information stored when you use the Cavalry Assault Services.
Please note that if you upload or post information in publicly visible areas of Cavalry Assault Services, or publicly share your information in response to information uploaded or posted by others, such information may be collected and used by others. If you find that others are improperly collecting or using your information, please contact us through the feedback channels listed in the "How to Contact Us" section of this policy.
2. Information shared by third parties about you, meaning information shared by third parties while using Cavalry Assault Services.
3. Information we obtain about you. We collect, aggregate, and record information such as log information, location information, and device information when you use Cavalry Assault Services.
(2) We will collect and use the following types of personal information for the following purposes:
We need to remind you that due to the variety of our products and services, the content provided varies, so the related business functions (including the types of personal information collected) will differ based on the product/service content you choose; please refer to the actual product/service you are using. In addition, you understand and agree that we aim to provide you with comprehensive products and services, so we will continuously improve our products and services. This means that as our products and services iterate, expand, or upgrade, we may frequently launch new services or business functions or redefine business functions, which may require collecting new personal information or changing the purposes or methods of using personal information. If we intend to use your personal information for purposes not disclosed in this policy or collect additional personal information not mentioned, we will obtain your consent separately through page prompts, interactive processes, website announcements, or other means. During this process, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will respond to you as soon as possible.
1. Help you complete registration and login
To facilitate our provision of continuous and stable services and to ensure your security when using Cavalry Assault Services, we need you to provide basic registration or login information, including your phone number, email address, and create your account, username, and password. In some individual services, if you only need to use basic functions like browsing and searching, you do not need to register as a Cavalry Assault user and provide the above information.
You can also fill in or supplement your additional information (such as your nickname, avatar, gender, place of origin, occupation, education, date of birth, and interests) during registration, login, or subsequent usage, which will help us provide you with personalized and better service experiences, but not providing this information will not affect your use of the basic functions of Cavalry Assault Services.
2. Achieve identity verification
In accordance with relevant laws, regulations, and regulatory requirements, or to meet the needs of verifying user identity, ensuring system and service security, and other specific service functions, we may require you to provide real identity information (such as name, ID card, passport, driver's license, household registration), biometric information (static or dynamic), and other identity information to complete identity verification. If you do not provide the above information, we will not be able to offer you the related functions and services.
For the purpose of achieving identity verification, you agree and authorize us to provide, inquire, and verify your above identity information to the relevant identity verification institutions (such as personal credit agencies, government departments, etc.) either by ourselves or by entrusting third parties.
Please note that your identity information and biometric information are sensitive personal information; please provide them cautiously. If you refuse to provide such information, you may not be able to obtain the relevant services, but it will not affect the normal use of other functions and services.
3. Maintain the normal operation of basic functions
During your use of our services, to provide you with basic functions such as browsing and searching, and to identify abnormal account statuses, understand product compatibility, and ensure the network and operational security of Cavalry Assault Services, we may directly or indirectly collect and store information about the services you use and how you use them, and associate this information. This information includes:
(1) Log information: When you use our services (including background operation states), we may automatically collect detailed usage information about our services as part of network log preservation. For example: your login account, search query content, IP address, browser type, telecom operator, network environment, language used, date and time of access, and browsing history of the webpages you visit, Push open records, duration of stay, refresh records, posting records, follows, subscriptions, favorites, and shares.
(2) Device information: When you use our services (including background operation states), we may receive and record relevant information about the device you are using. For example: device model, operating system and version, client version, device resolution, package name, device settings, process and software list, device identifiers (MAC address/IMEI/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information/OAID/AAID/ODID), software and hardware feature information, and relevant location information of the device (such as IP address, GPS location, and information from WLAN access points, Bluetooth, and base station sensors that can provide relevant information). To collect the above basic personal device information, we will apply for permission to access your device information. We collect this information to provide you with our basic services, and if you refuse to provide the above permissions, you may be unable to use Cavalry Assault Services.
Please note that separate device information and log information cannot identify specific natural persons. If we combine this type of non-personal information with other information to identify a specific natural person, or combine it with personal information, then during the period of combined use, this type of non-personal information will be treated as personal information. Unless we obtain your authorization or there are other legal provisions, we will anonymize and de-identify this type of personal information. During the period of combined use, this information will be processed and protected as your personal information in accordance with this policy.
4. Provide you with interactive and publishing services
When you use Cavalry Assault Services, upload and/or publish information, and engage in related interactive behaviors (such as posting comments, replying to comments, bumping posts, liking articles, publishing talks, sharing, favoriting, tipping), we will collect the information you upload, publish, or form, and use your nickname, avatar, and published content for display.
Please note that the information you publicly publish may contain your personal information or sensitive personal information. Please consider carefully before publishing. If the information you publish involves the personal information of others, you should obtain their consent before publishing.
5. Help you complete orders, payments, and deliver goods or services to you
(1) When you order specific goods and/or services in Cavalry Assault Services, we will generate an order for the purchase of those goods and/or services through the system. During the ordering process, you must at least provide the recipient's personal identity information, including name, delivery address, postal code, recipient contact number, and payment status information. If you refuse to provide this information, we will be unable to complete the relevant delivery services. If you order goods or services for someone else through Cavalry Assault Services, you need to provide the above information of that actual purchaser. Before providing us with the above information of the actual purchaser, you must ensure that you have obtained their authorization and consent;
(2) To display your account transaction information and ensure transaction security, we will collect the information generated during your use of Cavalry Assault Services (such as the information of goods or services purchased, specific order number, order creation time, transaction amount) to display to you and facilitate your order management;
(3) To complete order payments, deliver goods or services, confirm transaction status, and provide you with after-sales and dispute resolution services, we will collect account, order, transaction, payment, and logistics information related to the transaction progress based on the trading objects, payment institutions, logistics companies, etc. you choose for the transaction, or share your transaction information with the above service providers.
6. Provide you with customer service or other user response functions
When you contact our customer service or use other user response functions (such as submitting sales or after-sales applications, personal information protection complaints or suggestions, and other customer complaints and needs), we may need you to provide necessary personal information to match and verify your user identity, to ensure the safety of your account and system. We may also retain your contact information (the contact method you used when contacting us or other contact methods you voluntarily provide), your communication/call records and content with us, and other necessary information related to your needs, to contact you or help you solve problems, or record the handling plans and results of related issues.
7. Your personal information collected indirectly:
Based on the Cavalry Assault Services you choose to use, we may obtain relevant information that you authorize to share from affiliated parties and third-party partners. For example, when you log in to Cavalry Assault Services using a third-party platform account, we will obtain relevant information under that third-party account based on your authorization (including: username, nickname, avatar, specifically according to your authorized content), and after you agree to this policy, bind your third-party account with your Cavalry Assault Service account, allowing you to log in and use Cavalry Assault Services directly through the third-party account. We will ensure compliance with relevant laws and regulations and execute according to the agreements with affiliated parties or third-party partners, ensuring that the information provided is legally sourced.
8. Provide you with information display and push related to goods or services
Based on the information you provide to us, the information we may collect, and the information we collect indirectly (such as your browsing and search records, device information, location information, order information), we may use the combination of one or multiple of the above information for recommendation algorithm modeling, programmatic advertising recommendation algorithm modeling, user behavior analysis, and user profiling to extract your browsing, searching preferences, behavioral habits, and location information-related features to provide you with more relevant page displays and personalized content recommendations. We may also send you marketing information and user surveys based on feature tags via email, SMS, or other methods to help us improve Cavalry Assault Services and provide or promote the following goods and services from us/third parties:
Our goods and services include but are not limited to: instant messaging services, online media services, interactive entertainment services, social networking services, payment services, Internet search services, location and mapping services, application software and services, data management software and services, online advertising services, Internet finance, and other social media, entertainment, online games, e-commerce, information, and communication software and services; and
Third-party goods and services include but are not limited to: Internet services, food and beverage, sports, music, movies, television, live performances, and other arts and entertainment, books, magazines, and other publications, clothing and accessories, jewelry, cosmetics, personal health and hygiene, electronics, collectibles, household items, appliances, home decor and furnishings, pets, automobiles, hotels, transportation and tourism, banking, insurance and financial services, points and rewards programs, as well as other goods and services that we believe may be relevant to you.
If you wish to manage our personalized services, you can do so according to the instructions provided by the individual services you are using.
9. Provide you with security assurance
To enhance the security of your use of our services and those provided by partners, protect you or other users or the public's personal and property safety from infringement, better prevent phishing sites, fraud, network vulnerabilities, computer viruses, cyber attacks, and other security risks, and to more accurately identify violations of laws and regulations or the relevant agreements and rules of Cavalry Assault Services, we may collect, use, or integrate your account information, transaction information, device information, log information, and information obtained by our affiliated companies or partners with your authorization or shared according to the law, to comprehensively assess the risks associated with your account and transactions, perform identity verification, detect and prevent security incidents, and take necessary record, audit, analysis, and handling measures in accordance with the law.
10. You understand and agree that some individual services may require you to enable specific access permissions on your device to achieve the collection and use of information related to these permissions. For example:
(1) After you enable storage permissions, you allow us to access your storage space so that you can download and save content, or achieve corresponding services through caching;
(2) After you enable device information permissions, you allow us to obtain your device information as a unique identifier for your device, to provide you with more relevant page displays and personalized content recommendations, understand product compatibility, identify abnormal statuses, and ensure the network and operational security of Cavalry Assault Services;
(3) After you enable photo album and/or camera permissions, you can upload, take photos/images/videos, enabling functions such as publishing information and comments, live video streaming, or communicating with customer service to provide proof;
(4) After you enable contacts permissions, we can obtain your contact friends' information to provide you with functions such as querying friend status, inviting your friends to use Cavalry Assault Services, and sharing content/products with people you know;
(5) After you enable microphone and related voice permissions, you can use voice functions to interact with our products or others, or contact customer service, etc.;
(6) After you enable location permissions, we can obtain your location information to allow you to interact with nearby friends or push personalized content to you;
(7) After you enable our ability to read/write your calendar permissions, we can obtain your schedule to provide you with functions such as recording, appointment, and reminders.
When you need to disable these functional permissions, most mobile devices will support your request. For specific methods, please refer to or contact your mobile device service provider or manufacturer. Please note that enabling any permission means you authorize us to collect and use relevant information to provide you with corresponding services. Once you disable any permission, it means you revoke the authorization, and we will no longer continue to collect and use the relevant information based on that permission, and we will also be unable to provide the services corresponding to that permission. However, your decision to disable permissions will not affect the information collection and use conducted based on your prior authorization.
11. Exceptions to obtaining authorization consent
According to relevant laws and regulations, collecting your information in the following situations does not require obtaining your authorization consent:
(1) Directly related to national security and defense security;
(2) Directly related to public safety, public health, and significant public interests;
(3) Directly related to criminal investigations, prosecutions, trials, and judgments;
(4) In order to maintain your or other individuals' significant legitimate rights and interests but difficult to obtain consent from the individual;
(5) The personal information collected is publicly disclosed by you;
(6) Necessary for signing and performing a contract at your request;
(7) Collecting personal information from legally disclosed public information, such as legal news reports, government information disclosures, etc.;
(8) Necessary for conducting legal news reports;
(9) Other circumstances as stipulated by laws and regulations.
12. Reminder regarding sensitive personal information
Sensitive personal information refers to personal information that, once disclosed or illegally used, is likely to harm a person's dignity or endanger personal or property safety. The information you provide or we collect may include your sensitive personal information, such as ID card numbers, personal biometric information (static or dynamic), bank account details, communication records and content, property information, whereabouts, accommodation information, and transaction information. Please be cautious and attentive regarding sensitive personal information, and you agree that we may process your sensitive personal information for the purposes and methods described in this policy.
We or our partners may obtain and use your information through COOKIES or similar technologies, and store such information as log information.
By using COOKIES, we provide users with a simple and personalized online experience. A COOKIE is a small amount of data sent from a web server to your browser and stored on your computer's hard drive. We use COOKIES to benefit our users. For example, to make the login process for the Cavalry Assault virtual community faster, you can choose to store your username in a COOKIE. This way, when you log in to Cavalry Assault Services next time, it will be more convenient and quicker. COOKIES can help us identify the pages and content you connect to, the time you spend on specific Cavalry Assault services, and the Cavalry Assault services you choose.
COOKIES allow us to serve you better and faster, making your experience on Cavalry Assault Services more personalized. However, you should be able to control whether and how COOKIES are accepted by your browser. Please refer to the documentation that comes with your browser for more information on this aspect.
We and third-party partners may collect and use your information through COOKIES or similar technologies and store such information.
We use our own COOKIES or similar technologies, which may be used for the following purposes:
1. Remember your identity. For example, COOKIES or similar technologies help us recognize you as our registered user or save your preferences or other information you provide to us;
2. Analyze your use of our services. We can use COOKIES or similar technologies to understand what activities you are engaged in while using Cavalry Assault Services or which services are the most popular;
3. Advertising optimization. COOKIES or similar technologies help us provide you with ads relevant to you based on your information instead of conducting general ad placements.
While using COOKIES or similar technologies for the above purposes, we may aggregate the non-personally identifiable information collected through COOKIES or similar technologies and provide it to advertisers and other partners for analyzing how you and other users use Cavalry Assault Services and for advertising services.
There may be COOKIES or similar technologies placed by advertisers and other partners on Cavalry Assault Services. These COOKIES and/or similar technologies may collect non-personally identifiable information related to you for analyzing how users use such services, sending you ads that you may be interested in, or assessing the effectiveness of advertising services. The collection and use of such information by these third-party COOKIES or similar technologies are not bound by this policy but are subject to their own privacy policies, and we are not responsible for third-party COOKIES or similar technologies.
You can refuse or manage COOKIES or similar technologies through your browser or user selection mechanisms. However, please note that if you disable COOKIES or similar technologies, we may not be able to provide you with the best service experience, and some services may not function properly. At the same time, you will still receive ads, but their relevance to you may decrease.
(1) Sharing
We place great importance on protecting your personal information. Except in the following circumstances, we will not share your personal information with any third party outside of Cavalry Assault without your separate consent:
1. Sharing necessary to realize our services/functions. In certain cases, we need to share your information with third parties to realize the functions of our products and/or services, allowing you to normally use the services you need, including: (1) sharing corresponding transaction order information and payment amount information with third-party payment institutions providing payment services; (2) sharing order information with third-party merchants and logistics service providers on the Cavalry Assault platform; (3) sharing the necessary materials for real-name authentication with real-name authentication service providers; (4) other necessary sharing with suppliers, service providers, and business partners related to our services/functions.
2. Necessary sharing with some of our partners. To ensure the smooth development of necessary/reasonable business, meet your requirements, fulfill our obligations in the relevant user agreements or this policy, exercise our rights, or comply with legal regulations, we may need to share your information with some partners, including: (1) sharing log information and device information with partners providing data services (including online advertising monitoring, data statistics, data analysis, etc.); (2) sharing statistical data on your product usage (such as crashes, flashbacks) with partners providing product analysis services (including application crash analysis, network performance analysis, domain resolution optimization); (3) sharing your relevant information (including: device information) with partners providing marketing services (including advertising placements, marketing); (4) sharing how many people viewed their promotional information or purchased goods after seeing that information with partners who commissioned us for promotion, or providing them with non-personally identifiable statistical information to help them understand their audience or customers; (5) other necessary sharing with some of our partners.
3. Necessary sharing with our affiliated parties. To facilitate us in providing consistent services based on a unified account system and to make it easier for you to manage, personalize recommendations, and ensure system and account security, your personal information may be shared as necessary between us and our affiliated parties, including: (1) to help you save time and simplify procedures, after you register for our Cavalry Assault mobile account/email account, you can log in to some individual services without re-registering, and your account-related information will be shared internally between our products and our affiliated parties; (2) to ensure consistency and personalized browsing, advertising, and other service experiences in our and our affiliated parties' products and/or services, you acknowledge and agree that your account information, device information, and relevant browsing data reflecting your usage habits and preferences may be shared with our affiliated parties.
4. To achieve other purposes described in Section 1 "How We Collect and Use Personal Information" of this policy.
5. To fulfill our obligations and exercise our rights under this policy or any other agreements with you.
6. Within the scope allowed by laws and regulations, to comply with laws, protect the interests, property, or safety of us, our affiliated parties, partners, you, or other Cavalry Assault users or the public from damage, such as to prevent fraud and other illegal activities and reduce credit risks, we may exchange information with other companies and organizations. However, this does not include the sale, rental, sharing, or other disclosures of information for profit purposes that violate the commitments made in this policy.
7. At your legitimate request or with your authorization.
8. To provide your information at the legitimate request of your guardian.
9. As provided in the individual service agreement signed with you (including electronically signed agreements and corresponding platform rules) or other legal documents.
10. Provided based on academic research.
11. Provided based on social public interests in compliance with laws and regulations.
We will only share your personal information for legitimate, lawful, necessary, specific, and clear purposes. For companies, organizations, and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to process the information in accordance with our instructions, this policy, and any relevant confidentiality and security measures.
(2) Transfer
1. As our business continues to develop, we may conduct mergers, acquisitions, asset transfers, or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization holding your personal information to continue to be bound by this policy; otherwise, we will require that company or organization to reobtain your authorization consent.
2. With your explicit consent, we will transfer your personal information to third parties.
(3) Disclosure
We will only disclose your personal information in the following circumstances, and only after taking security measures that meet industry standards:
1. Disclosing the information you designate under the disclosure method you explicitly consent to, based on your request.
2. We may disclose your information when required to provide information under laws, regulations, mandatory administrative enforcement, or judicial requirements, according to the type of information requested and the method of disclosure. Under the premise of complying with laws and regulations, when we receive requests for such disclosure, we will require the recipient to provide corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that requests for information we provide should be as transparent as possible within the scope allowed by law. We carefully review all requests to ensure they have legal basis and are limited to law enforcement agencies obtaining data for specific investigation purposes with legal rights.
(4) Exceptions to obtaining prior authorization consent when sharing, transferring, or disclosing information
In the following circumstances, sharing, transferring, and disclosing your information does not require prior authorization consent:
1. Directly related to national security and defense security;
2. Directly related to public safety, public health, and significant public interests;
3. Directly related to criminal investigations, prosecutions, trials, and execution of judgments;
4. In order to maintain the significant legitimate rights and interests of you or other individuals but difficult to obtain consent from the individual;
5. Information publicly disclosed by you;
6. Information collected from legally disclosed public information, such as legal news reports, government information disclosures, etc.;
7. Related to our fulfillment of obligations stipulated by laws and regulations.
According to legal provisions, sharing, transferring, and disclosing de-identified personal information, ensuring that the data recipient cannot restore and re-identify the information subject, does not constitute external sharing, transferring, or public disclosure of personal information; the storage and processing of such data will not need to be notified to you separately and does not require your consent.
(1) Storage of personal information
Except as otherwise provided by laws, regulations, or regulatory authorities, we will only store your personal information for the necessary and shortest time required for the purposes described in this policy. If we terminate services or operations, we will promptly stop continuing to collect your personal information, notify you in advance in accordance with relevant laws and regulations, and delete or anonymize your personal information after terminating services or operations, except as otherwise provided by laws and regulations or regulatory authorities.
The personal information collected and generated during our operations within the People's Republic of China will be stored within China, except in the following circumstances:
1. There are clear provisions in laws and regulations;
2. Obtaining your authorization consent;
3. The Cavalry Assault Services you use involve cross-border services, and Cavalry Assault needs to provide your personal information to overseas parties.
For the above circumstances, we will ensure compliance with national laws and regulations and relevant regulatory requirements and provide adequate protection for your personal information.
(2) Protection of personal information
We place great importance on information security, have established a dedicated security team, and take all reasonable and feasible measures to protect your personal information:
1. Data security technical measures
We will adopt security measures that meet industry standards, including establishing reasonable institutional norms and security technologies to prevent unauthorized access, use, and modification of your personal information, avoiding data damage or loss.
Our services use various encryption technologies. For example, in some Cavalry Assault Services, we will use encryption technologies (such as SSL) to encrypt and store your personal information and isolate it through isolation technologies to protect your personal information.
When using personal information, such as information display and information association calculations, we will use various data desensitization technologies to enhance the security of information during use.
We will also implement strict data access permission controls and multi-factor authentication technologies to protect personal information and prevent data from being misused.
2. Other security measures we take to protect personal information
We have an industry-leading data-centric data security management system, enhancing the overall system's security from multiple dimensions, including organizational construction, institutional design, personnel management, and product technology. We manage the storage and use of personal information by establishing data classification and grading systems, data security management norms, and data security development norms.
We conduct comprehensive security control of data through confidentiality agreements with information handlers, monitoring, and auditing mechanisms.
We also hold security and privacy protection training courses to enhance employees' awareness of security and their understanding of personal information protection policies and relevant regulations.
3. We only allow Cavalry Assault employees and partners who need to know this information to access your personal information and have set strict access control and monitoring mechanisms for this purpose. We also require all personnel who may come into contact with your personal information to fulfill corresponding confidentiality obligations. If these obligations are not fulfilled, they may be held legally responsible or have their cooperation with Cavalry Assault suspended.
4. The Internet is not an entirely secure environment, and communication methods with other users, such as email, instant messaging, social software, or other service software, cannot guarantee complete encryption. We recommend that you use complex passwords when using these tools and take care to protect your information security. When communicating with third parties or purchasing goods and services through Cavalry Assault Services, you inevitably need to disclose your information, such as contact information or postal addresses, to the transaction counterpart or potential transaction counterpart. Please protect your information carefully and only provide it to others when necessary.
5. The internet environment is not 100% secure. We will do our best to ensure or guarantee the security of the personal information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, alteration, or destruction of personal information, leading to damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.
6. Security incident handling
To respond to potential risks such as personal information leakage, damage, and loss, we have established multiple systems that define classification and grading standards for security incidents and vulnerabilities and corresponding handling processes. We have also established an emergency response team for security incidents, which will activate security plans in accordance with security incident handling specifications, conducting loss control, analysis, positioning, formulating remedial measures, and collaborating with relevant departments for traceability and crackdown. We also regularly organize internal training and emergency drills to ensure that our relevant personnel master corresponding emergency handling strategies and procedures.
In the unfortunate event of an information security incident, we will inform you in a timely manner according to legal requirements: the basic situation of the security incident and possible impacts, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks, and remedial measures for you. We will also promptly inform you of the relevant circumstances of the incident via email, letter, phone, push notifications, etc. When it is difficult to inform each information subject individually, we will take reasonable and effective measures to issue announcements. Meanwhile, we will also proactively report the handling situation of the information security incident as required by regulatory authorities.
Please understand that due to technical limitations and risk prevention limitations, even if we have strengthened security measures as much as possible, we cannot always guarantee 100% security of the information. You need to understand that the system and communication network you use to access Cavalry Assault Services may experience issues due to circumstances beyond our control.
Please be sure to properly safeguard your account, password, and other identity elements. When you use Cavalry Assault Services, we will identify your identity through your account, password, and other identity elements. Once you disclose the aforementioned information, you may suffer losses and it may adversely affect you. If you find that your account, password, and/or other identity elements may have been or have been leaked, please contact us immediately so that we can take timely measures to avoid or reduce related losses.
(1) Access, update, and delete
We encourage you to update and modify your personal information to make it more accurate and effective.
You can also contact us through the feedback channels listed in the "How to Contact Us" section of this policy to assist you. We will take appropriate technical means or contact channels to allow you to access, update, and delete your personal information or other information provided when using Cavalry Assault Services, except as otherwise provided by laws and regulations.
Except as otherwise provided by laws and regulations, when you correct or delete your personal information, we may not immediately correct or delete the corresponding information from the backup system but will do so when the backup is updated.
(2) Disclosure and sharing
Many of our services allow you to publicly share your relevant information not only with your social network but also with all users using the service, such as the information you upload or publish in Cavalry Assault Services, your responses to information uploaded or published by others, uploading or publishing your information in publicly visible areas of Cavalry Assault Services via email, and including location data and log information related to this information. As long as you do not delete the information you publicly or share, the relevant information may remain in the public domain indefinitely; even if you delete shared information, it may still be independently cached, copied, or stored by other users or third parties beyond our control, or saved by other users or such third parties in the public domain. If you publicly or share information through the above channels, we are not responsible for any resulting leakage of your information. Therefore, we remind and ask you to carefully consider whether to publicly or share your information through the above channels.
(3) Account cancellation
We provide you with a way to cancel your account. Under the conditions stipulated in our service terms and national laws and regulations, you can submit an account cancellation application at the Cavalry Assault account center according to the corresponding requirements. You can also choose to contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will respond to you as soon as possible.
After your account is canceled, we will stop providing you with all or part of the Cavalry Assault Services and delete your personal information or anonymize it as per your request, except as otherwise provided by laws and regulations.
(4) Change the scope of your authorized consent
You can always choose whether to disclose personal information to us. Some personal information is necessary for using Cavalry Assault Services, but the provision of most other information is at your discretion. You can change the scope of your authorization for us to continue collecting information or revoke your authorization by deleting information, disabling device functions, or canceling your account.
After revoking authorization, we will be unable to continue providing the services corresponding to the revoked authorization and will no longer process your corresponding information. However, your decision to revoke authorization will not affect the information processing carried out based on your previous authorization.
(5) Obtaining a copy of personal information
If you need a copy of your personal information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy. After verifying your identity, we will provide you with a copy of your personal information in our services (including basic information and identity information), except as otherwise provided by laws and regulations or this policy.
(6) Responding to your requests above
For security reasons, you may need to provide a written request or prove your identity in other ways. We may first require you to verify your identity before processing your request. For your reasonable requests, we generally do not charge fees, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee based on the situation. We may refuse requests that are groundless, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are impractical (for example, involve information stored on backup tapes).
In the following circumstances, we will be unable to respond to your requests:
1. Related to our fulfillment of obligations stipulated by laws and regulations;
2. Directly related to national security and defense security;
3. Directly related to public safety, public health, and significant public interests;
4. Directly related to criminal investigations, prosecutions, trials, and execution of judgments;
5. We have sufficient evidence that you have subjective malice or abuse of rights;
6. In order to maintain the significant legitimate rights and interests of you or other individuals but difficult to obtain consent from the individual;
7. Responding to your request will seriously damage the legitimate rights and interests of you or others;
8. Involving trade secrets.
Cavalry Assault Services may connect to or link to third-party provided social media or other services (including websites or other forms of services). Including:
1. You can use the "share" button to share certain contents of Cavalry Assault Services to third-party services, or share third-party service content to Cavalry Assault Services. These functions may collect your information (including your log information) and may place COOKIES on your device to operate these functions normally;
2. We provide you with links through advertisements or other means of our services, allowing you to link to third-party services or websites;
3. Other scenarios connecting to third-party services. For example, to achieve the purposes stated in this policy, we may connect to SDKs or other similar applications provided by third-party service providers (such as in the form of embedded code, plugins, etc.) to provide you with better customer service and user experience. Currently, the types of third-party service providers we connect to mainly include:
(1) For advertising-related services, including ad display, ad data monitoring/statistics, etc.;
(2) For message push functions, including mobile manufacturer Push notifications, specific event reminders, personalized content recommendations, etc.;
(3) For payment-related services, including order payments, transaction behavior verification, revenue settlement, payment information aggregation statistics, etc.;
(4) To obtain device location permissions, collect device information and log information, etc., with your consent;
(5) For third-party authorization services, including third-party account login, sharing relevant content to third-party products, etc.;
(6) For supporting product functional modules, including online live streaming, video playback, voice recognition, AR, intelligent customer service, bullet screen playback, content storage, etc.;
(7) To optimize product performance, including improving hardware networking capabilities, reducing server costs, and hotfixing functions;
(8) For account security and product hardening-related services, including network monitoring, domain resolution, anti-hijacking, anti-spam and anti-cheating, encryption and decryption services, etc.
Some third-party SDKs or similar applications we connect to may collect your personal information. If you use such services provided by third parties in our services, you agree that they will directly collect and process your information. We will assess the legality, legitimacy, and necessity of such third-party services collecting personal information, require these third parties to take protective measures for your personal information, and strictly comply with relevant laws, regulations, and regulatory requirements. You can click on the "Third-Party SDK Directory" to learn about the basic situation of the main third-party SDKs we connect to. The situation of individual services connecting to third-party SDKs may vary. If you need to know the specific situation of individual services connecting to third-party SDKs, please visit the corresponding service page and refer to the specific terms and relevant pages of our individual services. You can also choose to contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will respond to you as soon as possible.
The above third-party social media or other services are operated by relevant third parties. Your use of such third-party social media services or other services (including any information you provide to such third parties) is subject to the third parties' own service terms and privacy statements (rather than this policy). You should read their terms carefully. This policy only applies to the personal information we collect and does not apply to services provided by any third party or the information usage rules of third parties. If you find risks with these third-party social media or other services, it is recommended that you terminate relevant operations to protect your legitimate rights and interests and contact us promptly.
We recommend: Any minors participating in online activities should obtain prior consent from their parents or other guardians (hereinafter referred to as "guardians"). We will protect the relevant information of minors according to national laws and regulations.
We encourage guardians to guide minors in using Cavalry Assault Services. If you are a minor under the age of fourteen, please notify your guardian to read and accept our "Cavalry Assault Children's Personal Information Protection Rules and Guardian Notice" together and seek their consent and guidance before using Cavalry Assault Services or submitting personal information.
We does not use the Application to knowingly solicit data from or market to children under the age of 16.
To provide you with better services, we may modify the terms of this policy in a timely manner according to updates of Cavalry Assault Services and relevant legal requirements, and such modifications will constitute a part of this policy. We will publish any changes to this policy on this page. For significant changes, we will also provide more prominent notifications (including website announcements, push notifications, pop-up prompts, or other methods). Significant changes referred to in this policy include but are not limited to:
1. Significant changes in our service model, such as the purpose of processing personal information, types of personal information processed, and methods of using personal information;
2. Significant changes in our ownership structure, such as ownership changes caused by business adjustments, bankruptcy mergers, etc.;
3. Significant changes in the main objects of personal information sharing, transfer, or public disclosure;
4. Significant changes in your rights related to personal information processing and how to exercise those rights;
5. Significant changes in the department responsible for personal information security, contact methods, and complaint channels;
6. Other important circumstances that may seriously affect your personal rights and interests.
Our modifications will always prioritize your satisfaction. We encourage you to review our privacy policy each time you use Cavalry Assault Services.
We have established a dedicated department for personal information protection, which will protect your personal information in accordance with this policy. If you have any complaints or reports regarding network information security, or if you have any questions, comments, or suggestions regarding this policy, Cavalry Assault's privacy measures, or your information, please contact the person responsible for personal information protection at Cavalry Assault by sending an email to LemanPedro677@gmail.com
In general, we will process your questions, comments, or suggestions within fifteen working days after receiving them and verifying your user identity. If you are not satisfied with our handling, you can also file a complaint or report to the department responsible for personal information protection.