The Privacy Policy is effective December 26, 2019

This policy will help you understand what may be involved in using March:

1, how do we collect and use your personal information, how we use cookies and similar technology 3, how do we share, transfer, publicly disclose your personal information. 4, how do we protect your personal information 5, your rights 6, how do we deal with the personal information of minors in July and how your personal information in the global scope of transfer 8, applicable laws and jurisdiction 9, how to update this policy 10, how to contact us March knows the importance of personal information to you, and will do its best to protect your personal information safe and reliable. We are committed to maintaining your trust in us and protecting your personal information by following the following principles: the principle of equal rights and responsibilities, the principle of clear purpose, the principle of opt-in consent, the principle of minimum sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency. At the same time, March promises that we will take appropriate security measures to protect your personal information in accordance with the industry’s mature security standards.

Please read and understand this Privacy Policy carefully before using our products (or services).

How do we collect and use your personal information

Personal information refers to all kinds of information recorded electronically or in other ways that can independently or in combination with other information identify the identity of a particular natural person or reflect the activities of a particular natural person.

March will collect and use your personal information only for the purposes described in this Policy:

First, picture editing

When the product can be used without registration, when you make network data requests (such as downloading materials or connecting iCloud to download and upload photos), we may need to collect your unique device identifier, device model, local language, geographic location information and time zone information for determining the device to use.

When you edit pictures, in order to provide you with relevant services, we may require you to open the following terminal system permissions:

(1) Album (iOS)/ Storage (Android) permission for reading and storing photos and videos; (2) GPS positioning permission, used to add decorative materials with geographic location information when editing photos; (3) Software installation permission, used for software update and installation; Since March is a photo processing app, processing photos is the only function of March, so album (iOS)/Storage (Android) permission is required to select photos to be processed. If you refuse to open the permission, you will not be able to select photos for processing.

If you refuse to open other permissions, only corresponding functions will not be realized. You can continue to use other functions of March.

Two, product purchase

When you purchase the paid VIP service of March, we will collect the corresponding order information, including IP address, unique device identifier, order number, transaction time, product type, product amount and local language.

Other business functions

1. In order to troubleshoot products and ensure account security, we may collect your device model, operating system, UNIQUE device identifier, IP address, network access mode, type and status, software usage record, click record, operation log information, language and timely area. 2, in order to provide you with customized product, recommended product dynamic and function, the content of the push messages sent, we may collect the following information: equipment types, operating systems, the only way equipment identification number, IP address, access networks, type and status, software using the record, click on the record, language area, the geographical position information in a timely manner. This information will be used to build a profile of the user but will not be correlated and applied to identify a particular user. At the same time, we may require you to open GPS positioning rights and notification rights. If you refuse to open any of the above rights, only the corresponding functions will not be realized. You can continue to use other functions of March. 3. When you give feedback, consult or complain to March, we may require you to provide your name, mobile phone number, email address and other valid contact information for the convenience of contacting you or helping you solve problems. If you refuse to provide the above information, it may affect the timely handling of problems and feedback. 4. March may be connected to e-commerce, games, live broadcasting or other functions provided by a third party. Please read the User Agreement and Privacy Policy of the third party carefully before using it and confirm it before using it. These third-party functions may require you to verify your identity information, collect your payment information and order information. We will only provide you with the above functions or access the above functions for the purpose of storing and keeping your relevant information, and will not use it for other purposes. If you do not agree to provide the above information, it will only affect your use of the corresponding third-party functions, and you can continue to use the other functions of March. March may access other third-party apps. March will only provide advertising cooperation or access jump services. Please read the User Agreement and Privacy Policy of the third party carefully before using it. How do we use cookies and similar technologies

(a) a Cookie

To ensure the normal operation of the website, we store a small data file called Cookie on your computer or mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. With cookies, websites can store data about your preferences. We do not use cookies for any purpose other than those stated in this Policy. You can manage or delete cookies according to your preference. For details, see AboutCookies.org. You can clear all cookies saved on your computer. Most web browsers have Cookie blocking functions. You can clear all cookies saved on your computer through browser Settings.

(2) Website beacons and pixel labels

In addition to cookies, we also use other similar technologies like web beacons and pixel tags on our websites. For example, we may send you an email containing a click URL that links to content on our website. If you click on this link, we will track this click to help us understand your product or service preferences and improve customer service. A web beacon is usually a transparent image embedded in a web site or email. With the help of the pixel labels in the E-mail, we can tell whether the E-mail is open or not. If you do not wish your activities to be tracked in this way, you can always unsubscribe from our mailing list.

Iii. How do we share, transfer and publicly disclose your personal Information

(1) Sharing

We will not share your personal information with any company, organization or individual, except in the following cases:

1. Sharing with express Consent: After obtaining your express consent, we will share your personal information with other parties. 2. We may share your personal information in accordance with laws and regulations, litigation dispute resolution requirements, or mandatory requirements of the competent government authorities or judicial authorities according to law. 3. Within the scope required or permitted by law, it is necessary to provide your personal information to a third party in order to protect users or social public interests, property or security from damage. 4. Sharing with Authorized Partners: Some of our services will be provided by authorized partners only for the purposes stated in this Policy. We may share some of your personal information with our partners to ensure the completion of the services provided to you and to provide you with better customer service and user experience. We will only share your personal information for lawful, legitimate, necessary, specific and explicit purposes and will only share such personal information as is necessary to provide the services. Our partners do not have the right to use the shared personal information for any other purpose. Currently, our licensing partners include the following three types:

1) Advertising partners. They mainly help us to statistics and evaluate the display effect of advertising and product data analysis, so that we can optimize the service for you to get a better experience. The personal information we will provide to these partners may include IP address, device information (device model, operating system, unique device identifier, network access mode, type and status, language and timely area). 2) E-commerce suppliers. When you use the e-commerce platform connected to March, we may share your order content, user name and contact information, and delivery address with third-party merchants to realize your demand for goods or services purchased from them and facilitate them to complete subsequent after-sales services. 3) Technical support partners. In order to complete the corresponding functions, we will access the SDK of a third party to obtain technical support, such as helping us to understand the product user distribution and data analysis statistically. We may provide the following personal information to such partners. March may choose to use some of these partners or change partners at different times, so the list of partners may be adjusted. Third-party SDKS Name Usage Scenario Description Shared personal information Type Fabric Used for crash log collection Unique device identifier and geographic location information GrowingIO used for data statistics and analysis software usage and click records, unique device identifier and geographic location information Firebase Used for data statistics and analysis Software use, and click on the record, the only equipment identification number, location Bugly used to crash logs from crash logs, the only equipment identification number Gold is used for user location information in the photo The only device identifier, location information Millet push for millet mobile phone login account of personalized push, the only equipment identification number Their Allies to push For personalized push device MAC address, unique device identification code, IP address sharing SDK (Weibo, QQ, wechat) is used for users to independently share the shooting results with the MAC address and unique device identifier of the third-party platform. SDK (Facebook) is used for users to independently share the shooting results with the MAC address and unique device identifier of the third-party platform (II) transfer

We will not transfer your personal information to any company, organization or individual except for the following circumstances:

1. Transfer with express consent: After obtaining your express consent, we will transfer your personal information to other parties; 2. In the case of merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy; otherwise, we will require the company or organization to ask you for authorization again. (3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. After obtaining your explicit consent; 2. Disclosure based on law: We may publicly disclose your personal information when required by laws, legal procedures, lawsuits or government authorities. (4) exceptions

In accordance with relevant laws and regulations, we may collect, share, transfer or publicly disclose your personal information without your authorized consent under the following circumstances.

1. Those directly related to national security, national defense security and other national interests; 2. Those directly related to major public interests such as public safety, public health and public information; (3) those directly related to criminal investigation, prosecution, trial and execution of judgment; 4. For the protection of your life, property, reputation and other important legal rights and interests of you or other individuals, but it is difficult to obtain the consent of yourself; 5. Necessary for signing and performing the contract as required by you; 6. Necessary for maintaining the safe and stable operation of the provided products or services, such as finding and disposing of faults of the products or services; 7. When it is necessary to carry out statistical or academic research for the public interest, and it provides the results of academic research or description to the public, it de-labels the personal information contained in the results; 8. Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels; 9. Other circumstances stipulated by laws and regulations. Iv. How do we protect your personal Information

(I) We have used industry-standard security measures to protect the personal information you provide and prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable steps to protect your personal information. For example, data (such as credit card information) exchanged between your browser and the Service is protected by SSL encryption; We provide HTTPS secure access to the supporting Web services provided by our products. We will use trusted protection mechanisms to protect our data from malicious attacks; We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; And we will conduct security and privacy protection training courses to enhance staff’s awareness of the importance of protecting personal information. (b) We will take all reasonably practicable measures to ensure that no irrelevant personal information is collected. We promise to keep your personal information within the period of time required by law or reasonably necessary to realize product functions and services. We will immediately delete or anonymize the personal information that exceeds the deadline. (c) The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other March users are not encrypted. We strongly recommend that you do not send personal information through such means. Please use a complex password to help us keep your account secure. (IV) The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send us. (five) After the unfortunate occurrence of personal information security incidents, we will, in accordance with the requirements of laws and regulations, timely inform you of the basic situation and possible impact of security incidents, the disposal measures we have taken or will take, you can independently prevent and reduce the risk of suggestions, remedial measures for you, etc. We will timely inform you of the information related to the event by email, phone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will also take the initiative to report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities. V. Your rights

In accordance with relevant laws, regulations and standards of China, as well as common practices of other countries and regions, we guarantee that you can exercise the following rights to your personal information:

(I) Delete your personal information

1. Under the following circumstances, you may request us to delete your personal information through the contact information provided in Article 10 of this Policy:

(1) If we deal with personal information in violation of laws and regulations; (2) If we collect or use your personal Information without your consent; (3) If our processing of personal information violates our agreement with you; (4) If you no longer use our products or services; (5) If we no longer provide you with products or services. 2. If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities have obtained your independent authorization. When you remove information from our services, we may not remove the corresponding information from the immediate backup system, but will delete the information when the backup is updated.

(2) Withdraw your authorization

If you wish to revoke your authorization, you can contact us through the contact details in this policy. We will process your request within a reasonable time after receiving your email or registered letter.

However, you understand and agree that the withdrawal of certain authorizations by you will result in the unavailability of product functions related thereto, that we cannot continue to provide you with certain functions and/or services corresponding to the withdrawal of consent or authorization, and that your decision to withdraw authorization will not affect the processing of personal information previously carried out based on your authorization.

(III) Respond to your above request

1. For security purposes, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We’ll give you an answer within fifteen days. 2, for your reasonable request, we do not charge in principle, but for repeated requests, beyond the reasonable limit, we will charge a certain cost according to the situation. We may refuse requests that are unwarranted, require excessive technical means (for example, the development of new systems or fundamental changes in existing practices), pose a risk to the legal rights of others, or are highly impractical (for example, involving information stored on backup tapes). 3. In accordance with laws and regulations, we will not be able to respond to your request under the following circumstances: (1) directly related to national security and national defense security; (2) those directly related to public security, public health or major public interests; (3) those directly related to criminal investigation, prosecution, trial and execution of judgment; (4) There is sufficient evidence that you have subjective malice or abuse of rights; (5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations. (6) Those involving commercial secrets. Six, how do we deal with minors’ personal information

(I) Our products, websites and services are primarily aimed at adults. Minors are not allowed to create their own user accounts without the consent of a parent or guardian. If you are under the age of 14, please read this policy with your guardian before using our products and/or services, and ensure that you have obtained the explicit consent of your guardian before using our services and providing us with your personal information.

(II) In the case of collecting personal information of minors with parental consent, we will only use or publicly disclose such information to the extent permitted by law, expressly agreed by parents or guardians, or necessary for the protection of minors.

(III) If your guardian disagrees with your use of our services or provision of personal information to us in accordance with this Policy, please terminate your use of our services immediately and notify us in a timely manner.

Vii. How will your personal information be transferred globally

We will store personal information collected within the territory of the People’s Republic of China in accordance with the provisions of laws and regulations. At the same time, because we provide products or services through resources and servers spread around the world, it means that, with your authorized consent, your personal information may be transferred to, or accessed from, foreign jurisdictions in the countries/territories in which you use the Products or services.

Such jurisdictions may have different data protection laws, or even none at all. In such cases, we will ensure that your personal information is adequately and equally protected within the People’s Republic of China. For example, we may request your consent to transfer personal information across borders, or implement security measures such as data de-identification prior to cross-border data transfer.

Viii. Governing law and jurisdiction

This Privacy Policy is governed by the laws of the People’s Republic of China. Disputes under this Privacy Policy shall be under the jurisdiction of the court where the defendant lives.

Ix. How to update this policy

(I) Our Privacy Policy is subject to change or revision. We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this policy on this page. We will notify you of major changes by email, phone and push. (II) Major changes referred to in this Policy include but are not limited to: 1. Our purpose of processing personal Information, the type of personal information we process, and the way we use personal Information; 2. Your rights to participate in personal information processing and the way to exercise them have changed significantly;