User Privacy Policy
User Privacy Policy
Updated Date: 2025-12-12 Effective Date: 2025-12-12
This User Privacy Policy (hereinafter referred to as "this Policy") applies to any products and services provided by WeeklyCreate (Shenzhen) Technology Co., Ltd. (hereinafter referred to as "we") to users (hereinafter referred to as "you") through the HackathonWeekly.com website (hereinafter referred to as the "Website").
We attach great importance to protecting users' personal information and privacy. We are fully aware of the importance of personal information to you, and will take corresponding security protection measures to protect your personal information in accordance with laws and regulations and mature security standards in the industry. We hope to clearly introduce to you through this Policy how we handle your personal information when you use our products/services, and the ways we provide for you to access, correct, delete, and protect this information.
This Policy will help you understand the following contents: I. How we collect and use your personal information II. How we share, transfer, and publicly disclose your personal information III. How we save and protect your personal information IV. How you manage your personal information V. Protection of minors' personal information VI. Notification and Revision VII. How to contact us VIII. Appendix
Special Prompt: Please read carefully and fully understand this Policy and make corresponding choices before using various products/services provided by us. If you have any questions about this privacy policy, you may contact us through the methods provided in "How to contact us" in this Policy.
I. How we collect and use your personal information
We will follow the principles of legitimacy, lawfulness, and necessity to collect and use personal information that you proactively provide during the use of services or that is generated due to the use of our products and/or services for the following purposes described in this Policy. If we want to use your personal information for other purposes not stated in this Policy, or use the information collected for specific purposes for other purposes, we will inform you in a reasonable manner and solicit your consent again.
(I) Scenarios where you need to authorize us to collect and use personal information
We will follow the principles of legitimacy, lawfulness, and necessity to collect and use your personal information for the following purposes described in this Policy.
1. Help you become our user
In order to comply with the requirements of laws and regulations and to provide you with better services, strictly abiding by Chinese laws, when you register to become our user as a user in China, you need to at least provide a valid Mainland China mobile phone number to create an account, and complete relevant network identity verification information (such as avatar, name, and login password, etc.). Please note that providing a Mainland China mobile phone number to us is a necessary personal information piece for us to provide you with basic business functions. If you refuse to provide it, we will not be able to provide you with our basic business functions.
When you choose to authorize the use of a third-party account to register and log in, we will obtain the account information you shared from the third party (such as avatar, nickname, and other information authorized by you on the page) and bind it to your account with us for quick login. In some cases where you choose to use a third-party account to register and log in, we need to re-verify and bind your mobile phone number to confirm the authenticity and relevance of the third-party account.
In the process of your registration and use of your account, if you are willing to additionally supplement the following personal information, it will help us provide you with more personalized services (pushing specific resources, customer service consultation, etc.), such as your work unit, job title, etc. If you do not provide such information, it will not affect your use of the basic functions of our products and services.
Identity Verification: To satisfy relevant legal provisions and regulatory requirements, ensure the authenticity of user identity, and achieve risk control such as anti-fraud, when you use specific services/functions, we need to collect your relevant information for identity verification. For example: when you use the "Retrieve Account" function, we may collect your identity information, including your real name, ID card number, or other information that can prove personal identity, to verify your identity and help you retrieve your account.
2. Provide customer service and after-sales service for you
When you file a complaint, appeal, or consultation with us, in order to facilitate contact with you or help you solve problems, we may need you to provide your name, mobile phone number, and/or email address and other contact information, and may use this information to contact you. We may also use the mobile phone number provided by you during registration to contact you. If what you submit is an infringement complaint, we will also require you to submit an ID card, letter of authorization, and proof of ownership in accordance with legal provisions to clarify your qualification as the subject of the complaint and judge whether your complaint is valid. If it is necessary to submit your aforementioned information to the court or other regulatory agencies or judicial departments according to legal provisions, we will provide it in accordance with the law. If you do not provide the above information, our customer service will not be able to provide you with the aforementioned services, but it does not affect your use of other services provided by us.
When you are the complained party or a relevant party in a dispute, in order to verify the content you published in our platform and clarify whether the content affects and damages our or others' rights and interests, we may also use the mobile phone number provided by you during registration to contact you.
3. Security Guarantee
In order to safeguard your account security, transaction security, and system operation security, and meet the relevant requirements of laws and regulations and Terms of Service rules, during your visit and use of our products/services, upon your authorization, we will obtain your device information and network status information, including the device model you use, device MAC address, device serial number (SN), device identification code (such as IMEI/AndroidID/IDFA/IDFV/Android OAID/HarmonyOS OAID/UAID and other device identifiers), sensor information, WIFI status (such as SSID, BSSID), location information (such as IP address), telecom operator, and other software and hardware characteristic information. Without your authorization, we will not obtain the above information in advance.
At the same time, in order to prevent malicious programs and ensure operational quality and efficiency, we may collect installed mobile application list information or running process information, overall operation of applications, usage and frequency, application crash situations, overall installation and usage situations, performance data, and application sources, used to judge account security, identify illegal and irregular situations, and detect and prevent security incidents.
To improve the security of your use of services provided by us, we may use or integrate your personal information and information shared by our affiliates and partners with your authorization or in accordance with the law, comprehensively judge your account risk based on your usage habits and commonly used software information, including verifying identity, preventing, discovering, and investigating possible fraud, network viruses, network attacks, and other security risks as well as behaviors violating our or affiliates' agreements, policies, or rules, to protect the legitimate rights and interests of you, other users, us, or affiliates, and record some links ("URLs") that we consider risky.
4. Questionnaire Assessment
In order to understand user demand points and improve user experience, we will invite you to participate in questionnaire surveys so that we can provide you with better service quality. We may collect personal information contained in the content you feedback in the survey questionnaire according to the actual situation. Because the content you need to reply to in each survey questionnaire is different, therefore, we will solicit your authorized consent again before sending you the survey questionnaire.
5. Search Function
When you use the search function provided by us, we will collect and store the keywords you query and your click situations in the search results. Such keyword information usually cannot identify your personal identity alone, does not belong to your personal information, and is not within the scope of this Policy. Only when the keyword information you searched strictly links with your other information and can identify your personal identity, then during the combined use period, we will treat your search keyword information as your personal information and handle and protect it according to this Policy.
6. Other legal grounds other than consent
According to the provisions of relevant laws and regulations, in the following circumstances, we can collect and use some necessary personal information without soliciting your authorized consent: (1) Necessary for the conclusion and performance of a contract to which the individual is a party; (2) Necessary for the performance of statutory duties or statutory obligations; (3) Necessary for responding to sudden public health incidents, or for protecting natural persons' life health and property safety in emergency situations; (4) Handling personal information disclosed by individuals themselves or other legally disclosed personal information within a reasonable scope in accordance with the "Personal Information Protection Law of the People's Republic of China" and other laws related to personal information; (5) Other circumstances stipulated by laws and administrative regulations.
II. How we entrust processing, share, transfer, and publicly disclose your personal information
1. Entrust processing of your personal information
In order to provide you with more perfect and high-quality products and/or services, certain functions may be provided by our service partners (such as our third-party service suppliers). We will entrust service partners to process certain personal information of yours on our behalf, for example, third-party suppliers sending emails or push notifications on our behalf, sending survey invitations on our behalf, and conducting data statistical analysis on de-identified information.
For companies, organizations, and individuals that we entrust to process your personal information, we will sign strict confidentiality agreements or data processing agreements with them, clarifying entrusted matters, entrusted processing purposes, deadlines, processing methods, types of personal information processed, protection measures, and rights and obligations of both parties, requiring them to handle personal information only in accordance with our requirements, this Policy, and related confidentiality and security measures. If such third parties want to change the purpose of personal information processing, such third parties should solicit your consent again. If you refuse our service partners to collect or use personal information necessary for providing services when providing services, it may cause you to be unable to use the services provided by such partners in some products and/or services.
2. Share your personal information
In order to provide you with perfect products and services, certain services or technologies of ours will be provided by authorized partners. Please be aware that we will not proactively provide your personal information to other personal information processors. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share necessary personal information. In the following circumstances, we will provide your personal information to other personal information processors, inform you of the recipient's name, contact information, processing purpose, processing method, and type of personal information, and obtain your separate consent. At the same time, we will sign strict confidentiality agreements with partners, requiring them to handle your personal information strictly in accordance with our instructions, this Policy, and any other relevant confidentiality policies and take security measures. We require our partners to have no right to use the shared personal information for any other purpose. When you view web pages created by third parties or use applications developed by third parties, these third parties may place their own Cookies or use other technical means. These technical means are not under our control, and their use is not subject to this Policy. Partners may have their independent personal information protection policies and Terms of Services. We suggest you read and abide by the third party's personal information protection policy and Terms of Service.
3. Transfer your personal information
In principle, we will not transfer the control of your personal information to other companies, organizations, or individuals. If a merger, acquisition, or bankruptcy liquidation occurs involving personal information transfer, in this case, we will inform you of the recipient's name and contact information, and require the new company or organization holding your personal information to continue to be bound by this Policy. If the collection and processing methods of personal information agreed in this Policy change, the company or organization will solicit your authorized consent again.
4. Publicly disclose your personal information
We will only publicly disclose your personal information under the following circumstances, and on the premise of taking security protection measures in line with industry standards: (1) According to your needs, disclose the personal information specified by you in the disclosure method explicitly agreed by you; (2) Under the circumstances where it is necessary to provide your personal information according to the requirements of laws, regulations, and mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information according to the required personal information type and disclosure method. Under the premise of complying with laws and regulations, when we receive the above request for disclosing information, we will require that corresponding legal documents must be issued, such as subpoenas or investigation letters.
5. Exceptions to soliciting authorized consent beforehand when sharing, transferring, and publicly disclosing personal information
In the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require soliciting your authorized consent beforehand: (1) Related to national security and national defense security; (2) Related to public safety, public health, and major public interests; (3) Related to criminal investigation, prosecution, trial, and judgment execution; (4) Necessary for safeguarding the major legitimate rights and interests such as life and property of you or other individuals but difficult to obtain the person's consent; (5) Necessary for other circumstances safeguarding public interests, for example, your credit evaluation information must be disclosed/shared; (6) Personal information disclosed by yourself to the public; (7) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels. Unless you explicitly refuse or handling such information infringes on your major interests; (8) Other circumstances where authorization is not required according to laws.
III. How we save and protect your personal information
(I) Preservation of personal information
- Retention Period: We will only retain your personal information for the period necessary to achieve the purposes stated in this Policy, unless laws and regulations have mandatory retention requirements. We judge the storage period of personal information mainly by referencing the following standards and taking the longer one: completing transaction purposes related to you, maintaining corresponding transaction and business records to respond to your possible inquiries or complaints; ensuring the safety and quality of services we provide to you; whether you agree to a longer retention period; whether there are other special agreements or legal and regulatory provisions regarding the retention period. After exceeding the retention period, we will delete your personal information or anonymize it according to the requirements of applicable laws. When you proactively cancel your account, we will handle data according to the requirements of laws and regulations.
- Storage Region: Personal information collected and generated by us within the People's Republic of China will be stored in China.
- Termination of Operation: If termination of operation occurs, we will notify you at least 30 days in advance, and handle your personal information according to the requirements of laws and regulations after terminating operation.
(II) Measures for personal information protection
- Data Security Measures: To safeguard your information security, we strive to take various physical, electronic, and management security measures in line with industry standards to protect your personal information, establish data classification and grading systems, data security management specifications, and data security development specifications to manage and regulate the storage and use of personal information. We conduct comprehensive security control over data through confidentiality agreements with information contacts, monitoring, and audit mechanisms to prevent your personal information from unauthorized access, public disclosure, use, modification, damage, or loss. For example, using encryption technology to ensure data confidentiality; using trusted protection mechanisms to prevent data from malicious attacks; deploying access control mechanisms to ensure only authorized personnel can access personal information; and holding security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information. When we display your personal information, we will use methods including content replacement and desensitization to display your information to protect your information security.
- Please understand and know that the Internet is not an absolutely safe environment. We strongly suggest you assist us in ensuring your account security by using secure methods and complex passwords. If you find your personal information leaked, especially your account or password leaked, please contact us immediately according to the contact information provided in this Policy so that we can take corresponding measures.
- Security Incidents: After the unfortunate occurrence of a personal information security incident, we will immediately set up a special emergency team, start the emergency plan, prevent the expansion of security incidents, and inform you in time according to the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks independently, remedial measures for you, etc. We will timely inform you of the relevant situation of the incident by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also proactively report the disposal situation of personal information security incidents according to the requirements of regulatory departments.
IV. How you manage your personal information
You enjoy the following rights to your personal information. According to the requirements of laws and regulations, in specific circumstances, unless you have other arrangements, your close relatives specifically can exercise the following rights to your relevant personal information for their own legitimate and just interests.
(1) You have the right to access, correct, and delete your personal information, except for exceptions stipulated by laws and regulations. Please be aware that due to the requirements of laws and regulations and the technical conditions of different information, we may not be able to completely delete the corresponding information you wish to delete from the system immediately. Before that, we will only store the corresponding information and take necessary security protection measures according to regulatory requirements. If you cannot manage these personal information through the above links, you can contact us at any time through the feedback method provided in this Privacy Policy. We will reply to your access request in time.
1. Change the scope of your authorized consent or withdraw authorization
You can change the scope of consent or withdraw your authorization by deleting information on our website, changing privacy settings, or turning off device permission functions in the system. Please understand that after you execute the above operations, we will no longer be able to provide you with the services corresponding to the withdrawal of consent or authorization, but it will not affect the personal information processing previously carried out based on your authorization.
2. Cancel Account
You have the right to cancel your account. Specific cancellation operations can be carried out on the website. After your successful cancellation, except as otherwise provided by laws and regulations and corresponding national standards, we will delete your personal information or anonymize it. If you cannot access, correct, or delete your personal information and cancel your account, or if you believe that we exist circumstances of collecting and using your personal information in violation of laws, you can contact us through the contact information provided in this Privacy Policy. To ensure security, we may require you to provide corresponding methods to prove your identity and the legitimacy of the request. We will reply to your request within 15 days after receiving your feedback and verifying your identity. For your reasonable requests, we basically do not charge fees, but for requests that are repeated multiple times and exceed reasonable limits, we will charge certain cost fees depending on the situation. We may refuse requests that are groundlessly repeated, require excessive technical means (for example, requiring the development of new systems or fundamentally changing current practices), bring risks to the legitimate rights and interests of others, or are very impractical.
3. Independent management and control of marketing information and targeted push
Message Push - If you do not wish to receive our message notifications, you can refuse to receive message notifications through settings, or turn off the corresponding notification function in the "Notification" center in the mobile terminal operating system.
V. Protection of minors' personal information
If you are the guardian of a minor, when you have any questions about whether the minor under your guardianship uses our services or provides information to us, please contact us in time according to the method described in Article 8. If we verify that we collected personal information of minors without knowing it, we will try to delete relevant data as soon as possible.
VI. Notification and Revision
To provide you with better services, our business will change from time to time, and this Privacy Policy will also be adjusted accordingly. When our basic situation, the purpose, method, type, and retention period of processing your personal information, the way you manage perosnal information, or our contact information changes, we will update it in time. Without your explicit consent, we will not reduce the rights you should enjoy under this Privacy Policy.
We will remind you of the updates of relevant content by issuing updated versions on the website or in other ways. Please also visit the website to understand the latest privacy policy in time. In the aforementioned circumstances, if you continue to use our services, it indicates that you agree to accept the revised Policy and be bound by it.
VII. How to contact us
When you have any questions about this Policy, you can consult via contact@hackathonweekly.com, and we will solve your problem in time. We will complete the response and handling of your identity and request within fifteen working days after receiving your request to assist in solving your problem.
Please understand and know that to ensure security and efficiently handle your problem and feedback to you in time, we will handle your request after verifying your identity. When we verify your identity, we may require you to provide relevant evidence.
VIII. Concepts and Definitions
- Personal Information: Various information recorded electronically or in other ways related to identified or identifiable natural persons, including but not limited to the natural person's name, date of birth, ID card number, personal biometric information, address, telephone number, etc., excluding information after anonymization.
- Sensitive Personal Information: Personal information that, once leaked or illegally used, is likely to result in the infringement of the natural person's personal dignity or damage to personal and property safety, including biometric recognition, religious belief, specific identity, medical health, financial accounts, whereabouts tracks, etc., as well as personal information of minors under the age of fourteen. For example, sensitive personal information includes ID card numbers, personal biometric information, bank accounts, communication content, health physiological information, etc.
- De-identification: The process of processing personal information so that it cannot identify a specific natural person without the help of additional information.
- Anonymization: The process of processing personal information so that it cannot identify a specific natural person and cannot be restored.
- Mainland China or Territory of Mainland China: Refers to the mainland of the People's Republic of China, solely for the purpose of this Policy, excluding Hong Kong Special Administrative Region, Macau Special Administrative Region, and Taiwan Region.