Magical Artist (煎饼馃子) Privacy Policy

Updated: July 16, 2025

Effective: July 16, 2025

Your trust is very important to us. We deeply understand the significance of personal information to you, and we will take appropriate security measures as required by laws and regulations to ensure that your personal information is secure and controllable. This Policy applies to all products and services provided by the Game Service Provider, but does not cover third-party services. Please read this Policy carefully before using our services; by using our services, you agree to the terms of this Policy.

Part 1: Definitions

Magical Artist: Refers to the Magical Artist client.

Magical Artist Service Provider: Refers to the provider of internet information and software technology services for Magical Artist, 【Prudence Interactive Tianjin Technology Co., Ltd.】.

Children: Refers to minors under the age of fourteen.

Personal Information: Refers to various information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.

Sensitive Personal Information: Refers to personal information that includes identification numbers, personal biometric information, bank account numbers, property information, tracking information, transaction information, children's information, etc.

Personal Information Deletion: Refers to the act of removing personal information from a system that involves daily business functions, making it unsearchable and inaccessible.

Part 2: Privacy Policy

I. Collection, Protection, and Use of Your Personal Information

You understand and agree that:

1. We are committed to creating excellent product features and services to meet your needs. Since the products and services we provide to you are varied, and the specific product features and service ranges chosen by different users may vary, the types and ranges of personal information collected and used for various features will differ. Please refer to the specific product features and service functions for details.

2. To provide you with better product features and service experiences, we continuously strive to improve our technology. As a result, we may introduce new or optimized features from time to time, which may require collecting and using new personal information or changing the purposes or methods of using personal information. We will explain the purposes, ranges, and methods of information collection through policy updates, pop-ups, and page prompts, and provide you with the option to agree. We will collect and use such information only after obtaining your explicit consent.

3. To achieve specific business functions, we may need to collect relevant personal information from end users, primarily including: log information, network information, system name, system version, and country code.

4. User Information Authentication Service: When using features or services that require identity verification, you may need to provide your name, ID number, and phone number to verify your identity according to relevant laws and regulations. This information is classified as sensitive personal information. You can refuse to provide it, but you may not be able to access the related services.

5. Network Signal Reporting: This game provides network signal broadcasting functionality, including real-time reporting of: (a) Wi-Fi signal strength; (b) SIM card signal strength; (c) Network type. To enable this feature, we require access to your device's geographic location data (GPS coordinates or coarse location). Such location data constitutes sensitive personal information. If you decline to grant location permission, the game will not broadcast your SIM card signal, and it will not affect the normal use of other services that do not require location permissions. All the above information we collect and use has been de-identified. Data analysis only corresponds to specific codes that cannot directly link to your identity, and will not be associated with your real identity.

6. Customer Service and Issue Resolution: When you contact us through customer service consultations, we will collect the consultation content you provide and your contact information (name, address, email, or other contact information you leave) to contact you or help resolve issues, or record the solutions and results of relevant issues.

7. Providing Security for You: To enhance the security of your use of services provided by us and our affiliates and partners, protect the personal and property safety of you, other users, or the public from infringement, better prevent phishing software, fraud, software vulnerabilities, computer viruses, and malicious software intrusions, and more accurately identify violations of laws, regulations, or our relevant agreement rules, we may use or integrate your member information, device information, service log information, and information shared by our affiliates or partners that you have authorized or legally shared to comprehensively judge your account risk, verify your identity, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures as required by law.

8. Other:

If we indirectly obtain your information from third parties, we will clearly require the third party to collect personal information with your consent in written form before collecting it and inform you of the shared information content. If sensitive information is involved, it must be confirmed by you before providing it to us for use. We will require the third party to commit to the legality and compliance of the personal information source. If the third party violates the agreement, we will require them to bear corresponding legal responsibilities. Our professional security team will reinforce the security of personal information (including sensitive information reporting, sensitive information encrypted storage, access permission control, etc.). We will use protection means and measures no less stringent than those we use to protect our own users' personal information to protect the indirectly obtained personal information.

9. Exceptions to Obtaining Authorization and Consent: You fully understand and agree that we may collect and use your personal information without your authorization and consent in the following situations, and we may not respond to your requests for correction, modification, deletion, cancellation, withdrawal of consent, or retrieval of information:

Please be aware that according to applicable laws, if we take technical measures and other necessary measures to process personal information so that the data receiver cannot re-identify specific individuals and cannot recover it, or we may study, statistically analyze, and predict the collected information after de-identification, used to improve our content and layout, support business decisions, and improve our products and services (including using anonymous data for machine learning or model algorithm training), then such processed data does not require separate notification and consent from you.

10. If we stop operating our products or services, we will promptly stop the collection of your personal information, notify you by individual delivery or announcement, and delete or anonymize the personal information related to the terminated business we hold.

11. Explanation of Third-Party SDK Integration: To provide users with more services, ensure service stability and quality, or upgrade related features, we may need to adjust the third-party SDKs we integrate. We will promptly explain the latest situation regarding third-party SDKs that collect user information on this page. The SDKs used include iFLYTEK and Wwise.

Third-Party SDK Source: iFLYTEK

Purpose of Collecting User Information: To provide services such as speech-to-text conversion, speech synthesis, speech evaluation after voice input, and text-to-speech synthesis after text input. It is also used for authorization billing, user identity recognition, more accurately locating and resolving issues encountered by developers and end-users while using our products and/or services, avoiding conflicts with other applications, statistical analysis of service usage, ensuring service stability and network security, performing data statistics and operational analysis, and improving and optimizing product interaction experience.

Third-Party Privacy Policy Link: https://www.xfyun.cn/doc/tts/offline_tts/offline_tts_sdkprivacy.html#

Third-Party SDK Source: iFLYTEK CO. LTD.

Purpose of Collecting User Information: Language information, text data, device information, and log data are primarily utilized to:

Third-Party Privacy Policy Link: https://www.xfyun.cn/doc/tts/offline_tts/offline_tts_sdkprivacy.html#

12. Providing Security for Users: To ensure account security and system operation security, comply with relevant legal regulations, and our agreement rules, during the use of our products, we may obtain user device information with user authorization. This includes device attributes, connection, and status information. We may attempt to read or write SDcard data (public storage area) to ensure the smooth operation of this app. Please be aware of this necessity.

II. How We Manage Your Personal Information

1. Sharing: We do not share your personal information with companies, organizations, or individuals outside of our game service providers, except in the following circumstances:

2. Transfer: We do not transfer your personal information to any company, organization, or individual, except in the following cases:

3. Public Disclosure: We will only disclose your personal information in the following situations:

4. Exceptions to Prior Authorization for Sharing, Transfer, or Public Disclosure: The following situations do not require prior authorization and consent for sharing, transfer, or public disclosure of your personal information:

According to legal regulations, sharing or transferring de-identified personal information, ensuring that the data recipient cannot restore or re-identify the personal information subject, does not constitute sharing, transfer, or public disclosure of personal information. Such data storage and processing do not require further notice or consent from you.

III. How We Protect Your Personal Information

1. Security Measures: We have implemented industry-standard and reasonably feasible security measures to protect your information from unauthorized access, public disclosure, use, modification, damage, or loss. Specifically:

2. Data Security Management System: We have an advanced data-centric data security management system that focuses on the data lifecycle. This system improves overall security from various dimensions including organizational development, system design, personnel management, and product technology.

3. Minimizing Data Collection and Retention: We take reasonable and feasible measures to avoid collecting irrelevant personal information. We will retain your personal information only for the duration necessary to achieve the purposes described in this policy, unless legally required to retain it for a longer period. The criteria for determining this period include:

After the retention period expires, we will delete or anonymize your personal information in accordance with applicable laws.

4. Internet Security Limitations: The internet is not an entirely secure environment. When using the services provided by "九河天宫之煎饼和馃子," we strongly recommend not using communication methods not recommended by us to send your information. You can use our services to establish contact and share information. When creating communications, transactions, or sharing through our services, you may choose who to communicate or share with, and these third parties may see your contact information, communication details, or shared content.

Please be aware that information you voluntarily share or publicly disclose while using our services may involve personal information or sensitive personal information of yourself or others. Consider carefully whether to share or publicly disclose such information when using our services.

We will strive to ensure the security of any information you send us. If our physical, technical, or managerial protective measures are breached, leading to unauthorized access, public disclosure, tampering, or damage of information, resulting in harm to your legal rights, we will assume corresponding legal responsibilities.

5. Updates and Public Disclosure: We will periodically update and publicly disclose information about security risks, personal information security impact assessments, and other related content, which you can access through our announcements.

6. Response to Security Incidents: In the unfortunate event of a personal information security incident, we will notify you in accordance with legal requirements, including:

We will inform you of the incident details through email, letter, phone, push notifications, or other means. If it is difficult to inform each affected individual, we will use reasonable and effective methods to issue public announcements. We will also report the handling of personal information security incidents to regulatory authorities as required.

IV. How You Can Manage Your Personal Information

1. Correcting or Supplementing Your Personal Information: If you find that the personal information we handle about you is incorrect, you have the right to request corrections or supplements. You can submit a request to us for these changes.

2. Deleting Your Personal Information:

(1) You can request the deletion of your personal information under the following circumstances:

(2) If we decide to respond to your deletion request, we will also, if possible, notify the parties who obtained your personal information from us, requesting them to delete it promptly, unless otherwise specified by laws and regulations or those parties have obtained your independent authorization.

(3) After you delete information from our services, we may not immediately remove the corresponding information from backup systems, but will delete it when the backup is updated.

3. Changing the Scope of Your Authorized Consent: Each business function requires certain basic personal information to function (see "Section II" of this privacy policy). Beyond that, you can withdraw part of your authorization by unlinking, modifying personal settings, or deleting relevant information, or by turning off certain features. When you withdraw consent, we will no longer process the corresponding personal information. However, the decision to withdraw consent will not affect the processing of personal information based on your prior authorization.

4. Constraints on Automated Decision-Making by Information Systems: In some product functions, decisions may be made solely by automated decision-making mechanisms such as information systems or algorithms. If these decisions significantly impact your legal rights, you have the right to request an explanation. We will provide a method for appeal without compromising the product’s commercial secrets, other users' rights, or public interests.

5. Responding to Your Requests:

V. How We Handle Children's Personal Information

Children are not allowed to create their own accounts without the consent of a guardian. If you are a child, we ask that your guardian carefully read this privacy policy and use our services or provide information only with their consent.

For instances where personal information of children is collected with the guardian's consent to use our products or services, we will only use, share, transfer, or disclose such information in accordance with legal regulations, with the explicit consent of the guardian, or when necessary to protect the child.

VI. How Your Personal Information Is Transferred Globally

Personal information collected and generated during our operations within the People's Republic of China is stored within China, except in the following circumstances:

In such cases, we will ensure that your personal information is adequately protected in accordance with this privacy policy.

VII. How This Privacy Policy Is Updated

Our privacy policy may be updated.

1. No Limitation of Rights: We will not limit your rights as outlined in this privacy policy without your explicit consent. Any changes to the privacy policy will be published on a dedicated page (Settings - About Us - User Agreement - Privacy Policy).

2. Significant Changes: For significant changes, we will provide more prominent notifications, including notifications through our service or even pop-up alerts. Significant changes include but are not limited to:

VIII. How to Contact Us

You can contact us through the following methods, and we will respond to your request within 15 days: