Effective December 26, 2019

This policy will help you understand what may be involved in using June:

1, how do we collect and use your personal information, how we use cookies and similar technology 3, how do we share, transfer, publicly disclose your personal information. 4, how do we protect your personal information 5, your rights 6, how do we deal with the personal information of minors in July and how your personal information in the global scope of transfer 9. How to update this Policy 10. How to contact us June fully understands the importance of your personal information and will do its best to protect your personal information. We are committed to maintaining your trust in us and protecting your personal information by following the following principles: the principle of equal rights and responsibilities, the principle of clear purpose, the principle of opt-in consent, the principle of minimum sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency. At the same time, June promises that we will take appropriate security measures to protect your personal information in accordance with the industry’s mature security standards.

Please read and understand this Privacy Policy carefully before using our products (or services).

1. How do we collect and use your personal Information

Personal information refers to all kinds of information recorded electronically or in other ways that can independently or in combination with other information identify the identity of a particular natural person or reflect the activities of a particular natural person.

June will collect and use your personal information only for the following purposes as stated in this Policy:

I. Shooting and editing

1. This product can be used without registration. When you make network data requests (such as downloading materials or connecting iCloud to download and upload photos), we may need to collect your unique device identification code, device model, local language, geographic location information and time zone information for determining the device to use. 2. When you take or edit pictures or video, in order to provide you with the corresponding services, we may require you to open the following terminal system permissions: (1) Camera permissions for taking pictures and recording videos; (2) Microphone permission for recording sound in video; (3) Album (iOS)/ Storage (Android) permission for reading and storing photos and videos; (4) Bluetooth permission for connecting with the selfie stick to take photos; (5) Software installation permission, used for software update and installation; If you refuse to open any of the above permissions, only corresponding functions will not be realized. You can continue to use other functions of June. 3 when you take or edit pictures and video, will use the face information, the face information is mainly used to identify the face and facial features in the photo and video position, based on these positions to provide portrait editing, filter, sticker image and video processing operations. These face information data will only be used on your device, we will not collect and store. Ii. Other business functions

1. In order to troubleshoot products and ensure account security, we may collect your device model, operating system, UNIQUE device identifier, IP address, network access mode, type and status, software usage record, click record, operation log information, language and timely area. 2. In order to provide you with customized product content, recommend product dynamics and functions, and send push messages, we may collect the following information: device model, operating system, unique device identifier, IP address, network access mode, type and status, software usage record, click record, language and timely area. This information will be used to build a profile of the user but will not be correlated and applied to identify a particular user. At the same time, we may require you to open the notification permission. If you refuse to open the above permission, only the corresponding functions will not be realized. You can continue to use other functions of June. 3. When you give feedback, consultation or complaint to June, we may require you to provide your name, mobile phone number, email address and other valid contact information for the convenience of contacting you or helping you solve problems. If you refuse to provide the above information, it may affect the timely handling of problems and feedback. 4. E-commerce, games, live broadcasting or other functions provided by third parties may be connected in June. Please read the User Agreement and Privacy Policy of the third party carefully before using it and confirm it before using it. These third-party functions may require you to verify your identity information, collect your payment information and order information. We will only provide you with the above functions or access the above functions for the purpose of storing and keeping your relevant information, and will not use it for other purposes. If you do not agree to provide the above information, it will only affect your use of the corresponding third-party functions, and you can still continue to use other functions of June. 5. June may access other third-party apps, and June only provides advertising cooperation or access jump services. Please be sure to read the User Agreement and Privacy Policy of the third party carefully before using the APP and confirm before using it. How do we use cookies and similar technologies

(a) a Cookie

To ensure the normal operation of the website, we store a small data file called Cookie on your computer or mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. With cookies, websites can store data about your preferences. We do not use cookies for any purpose other than those stated in this Policy. You can manage or delete cookies according to your preference. For details, see AboutCookies.org. You can clear all cookies saved on your computer. Most web browsers have Cookie blocking functions. You can clear all cookies saved on your computer through browser Settings.

(2) Website beacons and pixel labels

In addition to cookies, we also use other similar technologies like web beacons and pixel tags on our websites. For example, we may send you an email containing a click URL that links to content on our website. If you click on this link, we will track this click to help us understand your product or service preferences and improve customer service. A web beacon is usually a transparent image embedded in a web site or email. With the help of the pixel labels in the E-mail, we can tell whether the E-mail is open or not. If you do not wish your activities to be tracked in this way, you can always unsubscribe from our mailing list.

Iv. How do we share, transfer and publicly disclose your personal Information

(1) Sharing

We will not share your personal information with any company, organization and individual other than June, except in the following cases:

1. Sharing with express Consent: After obtaining your express consent, we will share your personal information with other parties. 2. We may share your personal information in accordance with laws and regulations, litigation dispute resolution requirements, or mandatory requirements of the competent government authorities or judicial authorities according to law. 3. Within the scope required or permitted by law, it is necessary to provide your personal information to a third party in order to protect June and its users or the interests, property or safety of the public from damage. 4. Sharing with our Affiliates: Your personal information may be shared with June’s affiliates. We will only share necessary personal information and are bound by the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing personal information, it will seek your authorization and consent again. 5. Sharing with Authorized Partners: Some of our services will be provided by authorized partners only for the purposes stated in this Policy. We may share some of your personal information with our partners to ensure the completion of the services provided to you and to provide you with better customer service and user experience. We will only share your personal information for lawful, legitimate, necessary, specific and explicit purposes and will only share such personal information as is necessary to provide the services. Our partners do not have the right to use the shared personal information for any other purpose. Currently, our licensing partners include the following three types:

1) Advertising partners. They mainly help us to statistics and evaluate the display effect of advertising and product data analysis, so that we can optimize the service for you to get a better experience. The personal information we will provide to these partners may include IP address, device information (device model, operating system, unique device identifier, network access mode, type and status, language and timely area). 2) E-commerce suppliers. When you use the e-commerce platform accessed by June, we may share your order content, user name and contact information, and delivery address with third-party merchants, so as to fulfill your demand for purchasing goods or services from them and to facilitate them to complete subsequent after-sales services. 3) Technical support partners. In order to complete the corresponding functions, we will access the SDK of a third party to obtain technical support, such as helping us to understand the product user distribution and data analysis statistically. We may provide the following personal information to such partners. June may choose to use some of the partners or change the partners at different times, so the partners in the list may be adjusted. Third-party SDKS Name Usage Scenario Description Shared personal information Type Fabric Collects crash logs Unique device identifiers and geo-location information Firebase collects data statistics and analyzes software usage and click records, unique device identifiers and geo-location information Bugly collects crash logs Crash log, unique device identifier Miui push personalized push login account and unique device identifier miUI push personalized push device MAC address and unique device identifier IP address sharing SDK (Weibo, QQ, wechat) is used for users to independently share the shooting results with the MAC address and unique device identifier of the third-party platform. SDK (Facebook) is used for users to independently share the shooting results with the MAC address and unique device identifier of the third-party platform (II) transfer

We will not transfer your personal information to any company, organization or individual except for the following circumstances:

1. Transfer with express consent: After obtaining your express consent, we will transfer your personal information to other parties; 2. In the case of merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy; otherwise, we will require the company or organization to ask you for authorization again. (3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. After obtaining your explicit consent; 2. Disclosure based on law: We may publicly disclose your personal information when required by laws, legal procedures, lawsuits or government authorities. (4) exceptions

In accordance with relevant laws and regulations, we may collect, share, transfer or publicly disclose your personal information without your authorized consent under the following circumstances.

1. Those directly related to national security, national defense security and other national interests; 2. Those directly related to major public interests such as public safety, public health and public information; (3) those directly related to criminal investigation, prosecution, trial and execution of judgment; 4. For the protection of your life, property, reputation and other important legal rights and interests of you or other individuals, but it is difficult to obtain the consent of yourself; 5. Necessary for signing and performing the contract as required by you; 6. Necessary for maintaining the safe and stable operation of the provided products or services, such as finding and disposing of faults of the products or services; 7. When it is necessary to carry out statistical or academic research for the public interest, and it provides the results of academic research or description to the public, it de-labels the personal information contained in the results; 8. Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels; 9. Other circumstances stipulated by laws and regulations. Iv. How do we protect your personal Information

(I) We have used industry-standard security measures to protect the personal information you provide and prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable steps to protect your personal information. For example, data (such as credit card information) exchanged between your browser and the Service is protected by SSL encryption; We provide HTTPS secure access to the supporting Web services provided by our products. We will use trusted protection mechanisms to protect our data from malicious attacks; We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; And we will conduct security and privacy protection training courses to enhance staff’s awareness of the importance of protecting personal information. (b) We will take all reasonably practicable measures to ensure that no irrelevant personal information is collected. We promise to keep your personal information within the period of time required by law or reasonably necessary to realize product functions and services. We will immediately delete or anonymize the personal information that exceeds the deadline. (c) The Internet is not an absolutely secure environment, and E-mail, instant messaging and communication with other Camera 360 users are not encrypted. We strongly advise you not to send personal information through such means. Please use a complex password to help us keep your account secure. (IV) The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send us. (five) After the unfortunate occurrence of personal information security incidents, we will, in accordance with the requirements of laws and regulations, timely inform you of the basic situation and possible impact of security incidents, the disposal measures we have taken or will take, you can independently prevent and reduce the risk of suggestions, remedial measures for you, etc. We will timely inform you of the information related to the event by email, phone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will also take the initiative to report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities. V. Your rights

In accordance with relevant laws, regulations and standards of China, as well as common practices of other countries and regions, we guarantee that you can exercise the following rights to your personal information:

(I) Delete your personal information

1. Under the following circumstances, you may request us to delete your personal information through the contact information provided in Article 10 of this Policy:

(1) If we deal with personal information in violation of laws and regulations; (2) If we collect or use your personal Information without your consent; (3) If our processing of personal information violates our agreement with you; (4) If you no longer use our products or services, or you cancel your account; (5) If we no longer provide you with products or services. 2. If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities have obtained your independent authorization. When you remove information from our services, we may not remove the corresponding information from the immediate backup system, but will delete the information when the backup is updated.

(2) Withdraw your authorization

If you wish to revoke your authorization, you can contact us through the contact details in this policy. We will process your request within a reasonable time after receiving your email or registered letter.

However, you understand and agree that the withdrawal of certain authorizations by you will result in the unavailability of product functions related thereto, that we cannot continue to provide you with certain functions and/or services corresponding to the withdrawal of consent or authorization, and that your decision to withdraw authorization will not affect the processing of personal information previously carried out based on your authorization.

(III) Respond to your above request

1. For security purposes, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We’ll give you an answer within fifteen days. 2, for your reasonable request, we do not charge in principle, but for repeated requests, beyond the reasonable limit, we will charge a certain cost according to the situation. We may refuse requests that are unwarranted, require excessive technical means (for example, the development of new systems or fundamental changes in existing practices), pose a risk to the legal rights of others, or are highly impractical (for example, involving information stored on backup tapes). 3. In accordance with laws and regulations, we will not be able to respond to your request under the following circumstances: (1) directly related to national security and national defense security; (2) those directly related to public security, public health or major public interests; (3) those directly related to criminal investigation, prosecution, trial and execution of judgment; (4) There is sufficient evidence that you have subjective malice or abuse of rights; (5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations. (6) Those involving commercial secrets. Six, how do we deal with minors’ personal information

(I) Our products, websites and services are primarily aimed at adults. Minors are not allowed to create their own user accounts without the consent of a parent or guardian. If you are under the age of 14, please read this policy with your guardian before using our products and/or services, and ensure that you have obtained the explicit consent of your guardian before using our services and providing us with your personal information.

(II) In the case of collecting personal information of minors with parental consent, we will only use or publicly disclose such information to the extent permitted by law, expressly agreed by parents or guardians, or necessary for the protection of minors.

(III) If your guardian disagrees with your use of our services or provision of personal information to us in accordance with this Policy, please terminate your use of our services immediately and notify us in a timely manner.

Vii. How will your personal information be transferred globally

We will store personal information collected within the territory of the People’s Republic of China in accordance with the provisions of laws and regulations. At the same time, because we provide products or services through resources and servers spread around the world, it means that, with your authorized consent, your personal information may be transferred to, or accessed from, foreign jurisdictions in the countries/territories in which you use the Products or services.

Such jurisdictions may have different data protection laws, or even none at all. In such cases, we will ensure that your personal information is adequately and equally protected within the People’s Republic of China. For example, we may request your consent to transfer personal information across borders, or implement security measures such as data de-identification prior to cross-border data transfer.

Viii. Governing law and jurisdiction

This Privacy Policy is governed by the laws of the People’s Republic of China. Disputes under this Privacy Policy shall be under the jurisdiction of the court where the defendant lives.

Ix. How to update this policy

(I) Our Privacy Policy is subject to change or revision. We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this policy on this page. We will notify you of major changes by email, phone and push. (II) Major changes referred to in this Policy include but are not limited to: 1. Our purpose of processing personal Information, the type of personal information we process, and the way we use personal Information; 2. Your rights to participate in personal information processing and the way to exercise them have changed significantly; 3. Impact of personal information security when June report indicates that there is a risk. How to contact us

If you have any questions, comments, suggestions or complaints about this policy or the content of the Services, you can contact us by: email: [email protected].