Privacy Policy
Last Updated: [25] June [2025]
Effective Date: [25] June [2025]
If you have any questions, comments, or suggestions regarding this policy or matters related to your personal information, please contact us by email at owen@newdreamfamily.us.
We highly value user privacy and understand the importance of your personal information. We are committed to maintaining your trust in us. We will protect the security of your personal information in accordance with legal and regulatory requirements. [Before using our products and/or services, please carefully read and thoroughly understand this Privacy Policy. Only after confirming your full understanding and agreement should you proceed to use the relevant products and services.]{.underline}
The key points of this policy are as follows:
(1) To help you understand our privacy practices, we will explain the types of personal information we need to collect and their purposes one by one;
(2) When you use certain features, we will collect some of your sensitive information only after obtaining your consent;
(3) If it is necessary to share your information with third parties to provide services to you, we will carefully evaluate factors such as the legality of the third party's information collection and its data security capabilities, and clearly inform you of the relevant information through this policy or supplementary statements;
(4) You can exercise your rights as a personal information subject in the ways described in this policy or contact us for further clarification or explanation.
Before reading and understanding this policy further, please note:
We offer a wide variety of products and/or services that are constantly optimized. The specific personal information collected by different products or services may vary and may be adjusted after the release of this policy. Therefore, in addition to this policy, we will also explain the processing of personal information under specific products or services through privacy prompts, supplementary statements, etc.; for example, providing supplementary explanations for unique scenarios involving personal information collection and use under each APP, or regarding third-party SDKs. When using these products or services, please pay attention to reading the relevant prompts or statements. If their content conflicts with this policy, the former shall prevail within the scope constrained by the relevant prompt or statement.
[You are not obligated to accept this policy or similar documents. However, you should be aware that if you choose not to accept it, we may not be able to provide you with the full range of products or services, and we may also be unable to respond to or resolve issues you encounter in certain specific scenarios. You may also choose to stop using our products or services. When you choose to continue accepting this policy or use our products or services again, it will be deemed that you have accepted and acknowledged this policy or other similar documents based on the necessity of providing the products and services.]{.underline}
Furthermore, after we update this policy (we will promptly notify you of updates), your continued use of our products and/or services will be deemed as your acceptance of the contents of this policy (including the updated version).
When a specific product or service we offer ceases operation, we will inform you through system notifications, announcements, SMS, email, etc., and process your corresponding personal information in accordance with this policy or similar documents. If we permanently cease operations, this policy will become invalid, and we will process all your personal information as required by regulations.
[Additionally, this policy does not apply to services provided by other companies or individuals (hereinafter referred to as "Third-Party Services").]{.underline} For user convenience, our products and/or services may contain Third-Party Services or links thereto; however, as these third parties independently collect and process your personal information beyond our control, we assume no responsibility for Third-Party Services unless otherwise stipulated by law. You need to read and refer to these third parties' privacy policies independently and decide whether to use their services.
The purpose of this policy is to help you understand the following:
I. How We Collect and Use Your Personal Information
II. Cookie Policy
III. How We Entrust Processing, Share, Transfer, and Publicly Disclose Your Personal Information
IV. Your Rights
V. How We Protect Your Personal Information
VI. How We Handle Minors' Personal Information
VII. How Your Personal Information is Transferred Globally
VIII. Updates to This Privacy Policy
IX. Contact Us
I. How Do We Collect and Use Your Personal Information?
Personal information refers to various types of information recorded electronically or by other means that can identify a specific natural person's identity, either alone or in combination with other information, or reflect the activities of a specific natural person. Your personal information includes name, date of birth, identification number, personal biometric information, address, communication contact details, communication records and content, account passwords, property information, credit information, whereabouts trajectory, accommodation information, health and physiological information, transaction information, etc.
Sensitive personal information includes identification numbers, personal biometric information, bank accounts, communication records and content, property information, credit information, whereabouts trajectory, accommodation information, health and physiological information, transaction information, and personal information of children under 14 years old (inclusive). [Involvement of sensitive personal information will be highlighted to you in bold.]{.underline} Personal biometric information includes personal genes, fingerprints, voiceprints, palm prints, auricle patterns, irises, facial recognition features, etc. [When we need to collect your personal biometric information, we will separately inform you via pop-up and obtain your consent. You should carefully consider and tick the consent box.]{.underline}
1. Circumstances Under Which We Collect Your Personal Information
1.1. Creating an Account, Purchasing, Registering for Products or Services
If you submit an application online to create an account, purchase, or register for our products or services, including fulfilling your purchase order, delivering your products or services, product activation or verification, making changes at your request, providing technical support, or authorization updates, we may require you to provide corresponding personal data, such as [your name, email address, mobile phone number, shipping address, product information, purchase time, and payment method]{.underline}, so that we can process your order, download products, and provide services.
1.2. Upgrade Services
We may collect information about the system and applications on your end device to notify you promptly of available system and application updates. The information collected for this purpose [includes device name, system and application version, operating system and browser version, region and language settings, etc.]{.underline} Our processing of the above information is limited to notifying you that application updates are available.
1.3. Fault Diagnosis
When an abnormality occurs with your device or application, and you choose to send relevant information to us or our partners to provide fault analysis services, we may collect relevant information, [including device model, application name and version, device identification number, error logs, etc.]{.underline}
1.4. We Collect and Use Corresponding Personal Information Based on the Specific Features You Choose to Use:
(1) When you bind your device to use our products and services, we collect [the product serial number and product verification code of the device you bind.]{.underline} This type of information is unique basic product information essential for binding the product and further providing services to you.
(2) When you install software and use products and services, to ensure the security of your account usage, we will [access your phone state permission]{.underline} to receive and record the device's International Mobile Equipment Identity (IMEI). Please understand that this information identifies the bound terminal device and is data collected to ensure the normal and secure operation of the service. You may choose not to grant this permission, but this may prevent the identification of the bound terminal device.
(3) When you use the APP to scan QR codes or take photos, we will access your [device camera permission]{.underline}. After enabling camera permission, you can use this feature for QR code recognition, photo taking, and functions like facial recognition in specific scenarios upon your authorization. Please be aware that we only obtain this permission when you actively authorize it and present the shooting interface in the foreground.
(4) When you select a photo containing a recognizable QR code from your phone album, we need to obtain your [album/storage permission]{.underline} to identify and obtain the device type and serial number to complete the addition. You can also use this permission to save photos and videos taken by the device, or photos generated from device QR codes, to your phone album, and share your pictures or videos to social platforms like WeChat.
(5) When connecting your device to the network, we will obtain your [location permission]{.underline}. This permission is used solely to obtain the name (SSID) of the Wi-Fi network your phone is currently connected to, facilitating automatic filling during the device network configuration process. You may choose not to grant this permission and manually enter the Wi-Fi name (SSID) to achieve this function.
(6) When you use the video preview function for monitoring, we will [collect a screenshot of your current video feed to help you identify the monitored location.]{.underline} Additionally, if you use the "Panoramic Photo" function, we will collect panoramic screenshots of the video feed for the purpose of providing this function to you; this screenshot will be saved persistently while you use the device. It should be noted that unless you separately use value-added services based on video analysis and authorize us accordingly, we will not view your video content and/or the aforementioned video screenshots.
(7) When you use functions like remote intercom, you need to enable the [microphone permission. We will collect the audio content you submit to enable this function for you.]{.underline} You can refuse collection by disabling microphone permission in system settings, but this will prevent you from using this feature.
(8) When you use analysis or comparison functions based on baseline information (including face/person recognition, license plate/vehicle recognition, voice recognition, text recognition, fingerprint unlocking), [you need to pre-register baseline information such as facial images, fingerprints, voice, etc. If you refuse to provide this, you will be unable to use the related functions.]{.underline}
(9) [When you enable the message notification function, we will collect screenshots from your camera's video feed to push these screenshots to you as the content of the alert message.]{.underline} You can disable this feature in your account settings.
(10) When you use device, video, or recording [sharing-related functions, you may need to submit information such as the nickname of the relevant person, their relationship to you, and contact details;]{.underline} if you refuse to provide this, you will be unable to use the related functions. Please be reminded that sharing or similar functions will make your corresponding personal information public within the scope you specify. You must decide carefully whether to use them and are responsible for the consequences.
(11) When you use value-added services, we will collect your personal information directly related to the service purpose. The specific service purpose, information content, etc., will be presented to you in the form of service descriptions or usage rules. This information is essential for us to provide you with various value-added services. If you refuse to provide it, you may not be able to use the related services normally.
1.5. Security Assurance and Operation & Maintenance Services
To meet the basic requirements of laws and regulations such as the "Cybersecurity Law" and to ensure the security of your account and system operation, we will collect relevant information generated during your use of our products and/or services, including:
(1) When you use related services, we will, based on the specific permissions you grant during software installation and use, receive and record information about the device you use to install and use the software and its location, [including your phone or computer hardware model, operating system version number, browser type, International Mobile Equipment Identity (IMEI), network device hardware address (MAC), IP address, software version number, network access method and type, and operation log information.]{.underline} Please understand that this information constitutes basic information necessary for us to provide services and ensure the normal operation of the product.
(2) When you use the service to manage your bound devices, we automatically receive and record [information about the relevant device, including type, model, firmware number, MAC address, system version number, and system settings.]{.underline} We rely on this information to provide services to you and ensure the secure operation of the device; for example, when the system setting allows automatic device updates (this setting is enabled by default on some devices), we will automatically install available update packages to ensure your device remains effectively compatible with the software you are using.
(3) To help us better understand the operation of the software and related services to ensure operation and provide secure services, [we may record network log information, as well as information such as the frequency of software and related service usage, crash data, error or abnormal service data, system running status of abnormal devices, overall installation and usage, performance data, etc.]{.underline}
2. Circumstances Under Which We Use Your Personal Information
We will process your personal information for the purposes described in this policy only after obtaining your consent, when we need to fulfill our obligations to you under a user agreement and/or service contract, when we are subject to statutory obligations, or when we assess it as necessary to protect our legitimate interests or the legitimate interests of third parties. We will strictly adhere to the contents set forth in this policy and its updates when using your personal information.
2.1. We use your personal information according to the following rules:
(1) We use it in accordance with the provisions of this policy and to achieve the corresponding product and/or service functions.
(2) [We may integrate your personal information and/or other information legally obtained by us related to your service or product usage behavior (hereinafter referred to as "Other Information") to prevent, detect, and investigate fraud, infringement, threats to security, illegal acts, or violations of agreements between you and us or our affiliates.]{.underline}
(3) When you access Third-Party Services through our products and/or services, we will, based on your authorization, share your personal information within the scope of authorization with the Third-Party Service provider.
(4) Other purposes with your permission.
2.2. Please note that all personal information you provide or authorize us to collect while using our products and/or services [will be continuously authorized for us to use during the period you use our products and/or services, unless you delete it or refuse collection through account settings or system settings.]{.underline} When you deactivate your account, we will cease using and delete your personal information, unless otherwise stipulated by laws and regulations.
2.3. We may conduct statistics on the usage of our products and/or services and may share these statistics with the public or third parties to showcase the overall usage trends of our products and/or services and/or form related market satisfaction research reports, service improvement plans, and other research results. However, these statistical information will not contain any personally identifiable information about you.
2.4. When we display your personal information, we will desensitize your information using methods such as content replacement and anonymization to protect your information security.
2.5. When we intend to use your personal information for purposes not stated in this policy, or use information collected for a specific purpose for other purposes, we will seek your consent in advance by having you actively tick a box.
2.6. We hereby specifically remind you that [if information cannot identify your personal identity either alone or in combination with other information, it does not constitute your personal information in the legal sense. When your information can identify your personal identity either alone or in combination with other information, during the period of combined use, such information will be treated and protected as your personal information in accordance with this policy.]{.underline}
3. Exceptions to Obtaining Authorization and Consent
According to relevant laws and regulations, collection of your personal information does not require your authorization and consent in the following circumstances:
[(1) Related to national security and defense security;
(2) Related to public security, public health, and significant public interests;
(3) Related to criminal investigation, prosecution, trial, execution, and other judicial or administrative law enforcement activities;
(4) Necessary for safeguarding the life, property, and other significant legitimate rights and interests of you or other individuals, but where it is difficult to obtain the consent of the individual concerned;
(5) Personal information that you have voluntarily disclosed to the public;
(6) Personal information collected from legally publicly disclosed information, such as through lawful news reports, government information disclosure channels, etc.;
(7) Necessary for the conclusion and performance of relevant agreements or other written documents with you;
(8) Necessary for maintaining the safe and stable operation of the provided products and services, such as discovering and handling product and service failures;
(9) Necessary for academic research institutions to carry out statistics or academic research based on public interest, and when the results of academic research or descriptions are provided externally, the personal information contained in the results is de-identified;
(10) Other circumstances stipulated by laws and regulations.]{.underline}
II. Cookie Policy
[To ensure the normal operation of our website, we sometimes place small data files on your computer or mobile device. These files are called Cookies.]{.underline} A Cookie is a simple text file stored on your computer or mobile device by a website's server, and only that server can retrieve or read the Cookie's content. For a browser, each Cookie is unique. It contains certain anonymous information, such as a unique identifier, website name, and some numbers. It allows a website to remember information such as your preferences or shopping cart contents.
Most large websites or internet service providers enable Cookies during your visit (using session Cookies) or upon your return visit (using persistent Cookies) to remember your settings and improve your user experience. Cookies help websites remember your settings, such as the language, font size, and other preferences you used when browsing the website on your computer or mobile device, so you don't have to re-enter these settings each time you return. If a website does not use Cookies, every time you move to a new page on the site, you will be treated as a new visitor. For example, if you enter details and move to another page, the new page will not recognize you and will not keep you logged in.
[Our Cookies are not used to identify you personally, but only to make the website work better and more conveniently during your visit. If necessary, you can control or delete Cookies. You can delete all Cookies on your computer, and you can also set most browsers to disable Cookies.]{.underline} However, if you do this, you may have to manually adjust some preference settings every time you visit our website.
We will not use the personal information collected by Cookies for any purpose other than those described in this document, nor will we use it to collect any personal information to satisfy any other purpose.
III. How We Entrust Processing, Share, Transfer, and Disclose Your Personal Information
1. Entrusted Processing
When you use our products or services, certain specific modules or functions may be provided by external suppliers. For example, we may engage service providers to assist us in providing customer support.
For companies, organizations, and individuals to whom we entrust the processing of personal information, we sign strict confidentiality agreements requiring them to process personal information according to our requirements, this privacy policy, and any other relevant protection and security measures.
2. Sharing
We will only share your personal information under the following circumstances. We will never share your personal information with third parties outside of the following situations:
(1) You have given explicit consent;
(2) Sharing your personal information with our affiliates or authorized cooperative third parties;
(3) [We may need to provide you with certain services through some third-party partners; therefore, we need to share part of your personal information with authorized partners to enrich our services and meet your needs. The aforementioned third-party partners include the following types: agents, suppliers of products and technical services, and other third parties. We strictly prohibit our affiliates or authorized third parties from using the shared information for other purposes.]{.underline}
(4) Sharing your personal information as required by law;
(5) We may provide your personal information when required by law, litigation, judicial authorities, or government agencies. In the event we are involved in reorganization, merger, or liquidation, your personal information may also be provided to the transaction parties.
Regarding third-party SDK service providers: [Our products may include third-party SDKs or similar applications. When you use services provided by such third parties on our platform, you agree that they will directly collect and process your information (e.g., in the form of embedded code, plugins, etc.).]{.underline} For example: When you use Alipay or WeChat Pay to complete a transaction, the Alipay SDK or WeChat SDK needs to read your information to achieve the transaction purpose; when you share content to third-party platforms like Weibo, QQ, or WeChat, their SDK may collect the information you provide; we may use Umeng SDK to track user activity levels in using products or services, and Umeng SDK may need to read your device information; [The collection and processing of information by the aforementioned service providers comply with their own privacy terms and are not governed by this policy. To maximize the protection of your information security, we recommend that you review the privacy terms of any third-party SDK service before using it.]{.underline} To protect your legitimate rights and interests, if you discover that such SDKs or similar applications pose risks, we advise you to immediately terminate the related operation and contact us promptly.
Specific SDK information is provided in the Appendix to this policy.
3. Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
(1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
(2) In the event of a merger, acquisition, or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new holder of your personal information to continue to be bound by this policy and will seek your re-authorization and consent if the purpose of using the personal information changes.
4. Public Disclosure
We will only publicly disclose your personal information under the following circumstances:
(1) After obtaining your explicit consent;
(2) Disclosure based on legal or reasonable grounds: We may publicly disclose your information when required by law, legal proceedings, litigation, or government authorities.
5. Exceptions to Prior Authorization and Consent for Sharing, Transferring, and Publicly Disclosing Personal Information
Please understand that, according to applicable laws and regulations such as the "Cybersecurity Law" and the national standard "Information Security Technology - Personal Information Security Specification," [in the following circumstances, we may share, transfer, or publicly disclose your personal information without obtaining your prior authorization and consent:
[(1) Related to fulfilling our obligations under laws and regulations;
(2) Directly related to national security and defense security;
(3) Directly related to public security, public health, and significant public interests;
(4) Directly related to criminal investigation, prosecution, trial, and execution of judgments;
(5) Necessary for safeguarding the life, property, and other significant legitimate rights and interests of you or other individuals, but where it is difficult to obtain the consent of the individual concerned;
(6) Personal information that you have voluntarily disclosed to the public;
(7) Personal information collected from legally publicly disclosed information, such as through lawful news reports, government information disclosure channels.
Additionally, according to the aforementioned regulations, providing externally de-identified personal information, ensuring that the data recipient cannot restore and re-identify the personal information subject, does not require separate notification to you or obtaining your consent.]{.underline}
IV. Your Rights
We will retain your personal information for the period necessary to fulfill the purposes outlined in this policy, unless a longer retention period is required or permitted by law. We ensure that you can exercise the following rights regarding your personal information:
1. Access Your Personal Information
You have the right to access your personal information, except in circumstances stipulated by laws and regulations. If you wish to exercise your right of access, you can access it yourself in the following ways: Log in to the WEB or client we provide using your ID. If you cannot access this personal information through the above link, you can contact us at any time by sending an email to fae@我们com.com.cn (Note: This placeholder email needs correction. Assuming it should be a valid contact like support@company.com, but translating as provided).
2. Correct Your Personal Information
If you discover that the personal information we process about you is incorrect, you have the right to request us to correct it. You can make a correction request through the methods listed in "1. Access Your Personal Information".
3. Delete Your Personal Information
You can request us to delete your personal information under the following circumstances:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect or use your personal information without obtaining your consent;
(3) If our processing of personal information violates our agreement with you;
(4) If you no longer use our products and services, or if you deactivate your account;
(5) If we cease providing products or services to you.
If we decide to respond to your deletion request, we will also simultaneously notify the entities that obtained your personal information from us and request them to delete it promptly, unless otherwise stipulated by laws and regulations, or unless these entities have obtained your separate authorization.
4. Change the Scope of Authorization or Withdraw Consent
You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting information, turning off a service or function, performing privacy settings within the software, managing app permissions, etc. You can also withdraw all authorization for us to continue collecting your personal information by deactivating your account.
[Please understand that each business function requires some basic personal information to be completed. After you withdraw your consent or authorization, we will be unable to continue providing you with the services corresponding to the withdrawn consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the previous processing of personal information based on your authorization.]{.underline}
5. Personal Information Subject Account Deactivation
You can apply to deactivate your account through customer service or through the methods we publish. [Once your account is deactivated, you will no longer be able to log in or use our products or services using that account.]{.underline} You will be unable to log in or use the aforementioned services through this account. Any points, orders, qualifications, discounts, etc., you previously obtained will be deemed forfeited and unusable. You understand and agree that we cannot assist you in restoring the aforementioned services.
If, after careful consideration, you still decide to deactivate your ID, you can deactivate your account on the relevant feature page within the products or services you use.
You can contact us at any time regarding account deactivation by sending an email to owen@newdreamfamily.us.
For requests requiring manual processing, we will complete the processing within 15 working days. After deactivating your account, we will stop providing you with products or services and, subject to your request, delete your personal information, unless otherwise stipulated by laws and regulations.
6. Personal Information Subject Obtains Copy of Personal Information
If you need to obtain a copy of your personal information, you can contact us by sending an email to owen@newdreamfamily.us or through other methods listed in this policy. To ensure security, we may require you to provide a written request or otherwise verify your identity. We will respond to your request within 15 working days after receiving your feedback and verifying your identity.
7. Restrict Automated Decision-Making
In certain business functions, we may make decisions solely based on non-manual automated decision-making mechanisms, including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will also provide appropriate remedies.
8. Responding to Your Requests
We generally do not charge a fee for reasonable requests and will respond to your request within the legally stipulated timeframe (fifteen working days). However, for repeated requests beyond a reasonable limit, we may charge a certain cost fee depending on the circumstances. We may refuse requests that are groundlessly repetitive, require excessive technical means (e.g., developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical (e.g., involving information stored on backup tapes).
[In the following circumstances, we may be unable to respond to your request:
[(1) Related to our fulfillment of obligations under laws and regulations;
(2) Directly related to national security and defense security;
(3) Directly related to public security, public health, and significant public interests;
(4) Directly related to criminal investigation, prosecution, trial, or execution of judgments;
(5) Where we have sufficient evidence to indicate your subjective malice or abuse of rights;
(6) Necessary for safeguarding the life, property, and other significant legitimate rights and interests of you or other individuals, but where it is difficult to obtain the consent of the individual concerned;
(7) Responding to your request would seriously harm the legitimate rights and interests of you or other individuals or organizations;
(8) Involving trade secrets.]{.underline}
V. How We Protect Your Personal Information
We will take all reasonable precautions. We have implemented security protection measures that comply with industry standards to protect the personal information you provide, preventing it from unauthorized access, public disclosure, use, modification, damage, or loss.
We have established dedicated management systems, processes, and organizations to ensure information security:
(1) Establishing strict data usage and access systems, employing strict data access permission controls and multi-factor authentication technology to protect personal information and prevent misuse. We only allow authorized personnel to access personal information and require them to fulfill corresponding confidentiality obligations.
(2) Implementing specialized data and technical security audits, establishing multiple measures including log auditing and behavior auditing.
Additionally, we will also take other security protection measures:
(1) Managing and regulating the storage and use of personal information by establishing data classification and grading systems, data security management specifications, and data security development specifications.
(2) Enhancing security awareness. We also conduct security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.
We will take all reasonably feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.
We will store the personal information of users collected within China within the territory of China in accordance with legal and regulatory requirements. We will not transmit your personal information overseas unless required by mandatory retention laws.
[During your use of the products or services, we will continuously save your personal information. If you deactivate your account or actively delete personal information, we will continue to retain specific personal information for a period after deactivation or deletion in accordance with laws and regulations such as the "E-commerce Law" and the "Cybersecurity Law"; for example, the "E-commerce Law of the People's Republic of China" requires that commodity and service information and transaction information be retained for no less than three years from the date of transaction completion. Upon expiration, we will immediately delete or anonymize it.]{.underline}
[The internet environment is not 100% secure. We will endeavor to ensure or guarantee the security of any information you send to us. If our physical, technical, or administrative safeguards are breached, leading to unauthorized access, public disclosure, alteration, or destruction of information, thereby damaging your legitimate rights and interests, we will bear corresponding legal liability.]{.underline}
In the unfortunate event of a personal information security incident, we will, in accordance with legal requirements, promptly inform you of: the basic situation of the security incident and its potential impact; measures we have taken or will take; suggestions for you to prevent and reduce risks independently; and remedial measures for you. We will promptly inform you of the incident-related situation via email, letter, phone, push notification, etc. If it is difficult to inform each personal information subject individually, we will issue announcements in a reasonable and effective manner.
[Simultaneously, we will also proactively report the handling of personal information security incidents to regulatory authorities as required.]{.underline}
VI. How We Handle Minors' Personal Information
Our products and services are primarily intended for adults. [If you are a minor who has not reached the legal age of majority, you should obtain the consent of your guardian (your parent or legal guardian) before using our products and services.]{.underline} For minors' personal information collected with guardian consent, we will only use or disclose it when permitted by law, with the guardian's explicit consent, or when necessary to protect the minor.
If facts prove that a minor registered and used our products and services without obtaining guardian consent, we will delete the relevant personal information as soon as possible.
[If a guardian has reason to believe that a minor has submitted personal information to us without prior consent, please contact us as soon as possible to avoid unnecessary losses or impacts.]{.underline}
VII. How Your Personal Information is Transferred Globally
The personal information we collect and generate during our operations within the People's Republic of China is stored within China, except in the following circumstances:
(1) Where laws and regulations explicitly stipulate otherwise;
(2) Where you personally engage in cross-border transactions via the internet, etc.
For the above situations, we will ensure that this privacy policy provides adequate protection for your personal information. Except for the above circumstances, if we need to transfer your personal information across borders, we will separately obtain your authorization and consent.
VIII. Updates to This Privacy Policy
IX. Contact Us
If you have any questions, comments, or suggestions regarding our policy, you can contact us by sending an email to owen@newdreamfamily.us. Generally, we will respond within fifteen days.