Privacy Policy
Privacy Policy
This privacy policy applies to the Vampire Run, Inc mall (hereinafter referred to as the “Mall”) operated the Company . It aims to explain how we collect, use, store, and protect the personal information you provide during the use of the Mall’s services, as well as the rights you have over such information. We attach great importance to your privacy and will strictly comply with relevant laws and regulations to protect the security of your personal information.
- Information We Collect
(A) Personal Information
When you use the services of the Mall, we may collect the following personal information: - Registration Information: When you register as a user of the Mall, we will collect your username, password,emailaddress, and mobile phone number. This information is used to create your account, ensure that you can log in and use various functions of the Mall normally, and communicate with you when necessary, such as sending account security reminders and transaction notifications.
- Transaction Information: When you purchase game props in the Mall, we will collect the recipient’s name, delivery address, contact number, and payment information (including but not limited to payment account, payment amount, and payment time). This information is used to complete order processing, ensure that the game props can be accurately delivered, and conduct transaction settlement and after-sales service.
- Feedback Information: If you send feedback, inquiries, or complaints to us via the email business@fityourgame.com, we will collect the content of your email and relevant personal information (such as the account information you mention in the email) so that we can reply to your questions promptly and accurately and improve our services.
(B) Non-personal Information
We will also collect some non-personal information that cannot directly identify you but helps us optimize our services and understand user behavior:
- Device Information: We will collect the device information you use when accessing the Mall, including device model, operating system version, browser type and version, and device identifier (such as IMEI, MAC address). This information is used to ensure the normal operation of the Mall on different devices, as well as for data analysis and security protection.
- Log Information: We will record the relevant log information of your access to the Mall, including access time, accessed pages, stay duration, click operations, and IP address. This information is used to analyze users’ usage habits and behavior patterns, so that we can optimize the page layout, function design, and recommendation system of the Mall. It also helps to prevent security risks and troubleshoot problems.
- How We Use the Collected Information
1. Providing Services: We use the collected personal information and non-personal information to provide you with various services of the Mall, including account management, order processing, game props delivery, customer support, etc., to ensure that you can smoothly browse, purchase, and use game props. - Personalized Recommendations: Based on your purchase history, browsing records, and other collected information, we may recommend game props, promotional activities, and other relevant content that you may be interested in to enhance your shopping experience in the Mall.
- Security and Protection: We use the collected information to ensure the secure operation of the Mall, prevent fraud, malicious attacks, and other security risks, and protect your account and transaction security. For example, by analyzing IP addresses and device information to identify abnormal login behaviors, and by analyzing transaction information to detect suspicious transactions.
- Improving Services: We will analyze and study the collected information to understand users’ needs and feedback, so as to continuously improve the functions, performance, and service quality of the Mall and provide you with a better shopping experience.
- Legal Compliance: When required by law or to comply with relevant laws and regulations, regulatory requirements, court orders, or government agency requests, we may use your personal information for corresponding processing.
III. How We Share, Transfer, and Disclose Information
1. Sharing: We will not share your personal information with any third party unless we obtain your explicit consent or as otherwise provided by laws and regulations. In some cases, we may share necessary information with our partners (such as payment institutions and logistics distribution companies) to complete order transactions and deliveries. However, we will require these partners to comply with strict confidentiality obligations and use your information only within the scope necessary for providing services.
- Transfer: We will not transfer your personal information to any other company, organization, or indivi,
unless there is a merger, acquisition, bankruptcy liquidation, or other similar transactions. And we will ensure that the transferee continues to comply with this privacy policy and protects the security of your personal information. Before such a transfer, we will notify you in an appropriate manner and obtain your consent.
- Disclosure: In the following situations, we may disclose your personal information:
- As required by laws and regulations, such as responding to the investigations, law enforcement, and regulatory requirements of judicial and administrative organs;
- To safeguard the legitimate rights and interests of us or other users, such as preventing fraud and pursuing liability for infringement;
- In case of an emergency to protect the personal or property safety of you or others.
- How We Store and Protect Information
1. Storage: We will store the collected personal information in secure servers and databases, and the storage period is determined according to business needs and legal requirements. For personal information, we will retain it for the shortest time necessary to achieve the service purpose, unless required by law or with your consent to extend the retention period. - Protection: We have taken a series of technical and management measures to protect the security of your personal information, including but not limited to:
- Using encryption technology to encrypt sensitive information (such as passwords and payment information) to prevent the information from being stolen or tampered with during transmission and storage;
- Implementing access control measures to restrict only authorized personnel from accessing and processing your personal information;
- Regularly conducting security assessments and vulnerability scans of the system and promptly fixing security vulnerabilities;
- Providing privacy and security training to employees to improve their security awareness and confidentiality awareness.
Although we have taken reasonable security measures, please note that the Internet is not an absolutely secure environment, and we cannot guarantee the absolute security of information transmission. If you find that your personal information has been leaked, please contact us immediately via the email unless there is a merger, acquisition, bankruptcy liquidation, or other similar transactions. And we will ensure that the transferee continues to comply with this privacy policy and protects the security of your personal information. Before such a transfer, we will notify you in an appropriate manner and obtain your consent.
- Disclosure: In the following situations, we may disclose your personal information:
- As required by laws and regulations, such as responding to the investigations, law enforcement, and regulatory requirements of judicial and administrative organs;
- To safeguard the legitimate rights and interests of us or other users, such as preventing fraud and pursuing liability for infringement;
- In case of an emergency to protect the personal or property safety of you or others.
- How We Store and Protect Information
1. Storage: We will store the collected personal information in secure servers and databases, and the storage period is determined according to business needs and legal requirements. For personal information, we will retain it for the shortest time necessary to achieve the service purpose, unless required by law or with your consent to extend the retention period. - Protection: We have taken a series of technical and management measures to protect the security of your personal information, including but not limited to:
- Using encryption technology to encrypt sensitive information (such as passwords and payment information) to prevent the information from being stolen or tampered with during transmission and storage;
- Implementing access control measures to restrict only authorized personnel from accessing and processing your personal information;
- Regularly conducting security assessments and vulnerability scans of the system and promptly fixing security vulnerabilities;
- Providing privacy and security training to employees to improve their security awareness and confidentiality awareness.
Although we have taken reasonable security measures, please note that the Internet is not an absolutely secure environment, and we cannot guarantee the absolute security of information transmission. If you find that your personal information has been leaked, please contact us immediately via the email business@fityourgame.com, and we will take necessary measures to deal with it.