User Privacy Policy

Version update date: [06], [11], 2024

Version effective date: [06], [11], 2024 

Special tips

The User Privacy Policy is only applicable to AiYin products and related services provided by Xiamen AiYin Technology Co., Ltd. If the products / services provided by AiYin are used in our affiliated companies' products or services (such as directly using the AiYin account to log in but without an independent privacy policy), this policy also applies to such products or services.

In particular, it is noted that the products we provide may include links or guidelines to other third party products or services ("third party", including but not limited to your transaction party, any third party website, third party service provider). This policy does not apply to the products / services provided to you by the third party and are applicable to the privacy policy otherwise stated to you.

We are well aware of the importance of personal information to you, and will try our best to protect your personal information safe and reliable. We are committed to maintaining your trust in us, abide by the principles of legitimate, legal and necessary, and protect your personal information. At the same time, we promise that we will take appropriate security protection measures to protect your personal information according to the mature security solutions in the industry.

Before using AiYin products or services, please be sure to carefully read and thoroughly understand this policy, and use Aiyin products or services after confirming your full understanding and consent. If you do not understand or agree with any provision of this policy, you should immediately stop access or use the product / immediately stop registration. Once you start using iyin products or services, you have fully understood and agree to this policy. If you have any questions, comments or suggestions on this policy, you can contact us through the contact information provided. 

This Privacy Policy section will help you understand the following:

  1. How do we collect and use your personal information

  2. How do we use Cookies and similar technologies

  3. Use of the third-party SDK

  4. How do we share, transfer, and publicly disclose your personal information

  5. How do we store and protect your personal information

6.sensitive personal information tips

  1. How do you manage your personal information

  2. How do we handle children's personal information

9.How can your personal information be transferred around the world

  1. How to update this policy

  2. How to contact us

  3. Jurisdiction and application of law

1. How do we collect and use your personal information

(1)Collect and use your personal information

Personal information refers to any information recorded electronically or by other means that can, individually or in combination with other information, identify the identity of a specific natural person or reflect the activities of a specific natural person. We will collect and use your personal information for the following purposes described in this Policy.

(2)To help you become our users

①Mobile number or email registration/login

When you register/log in to our account, in order to help you complete the registration/login process, you need to provide us with your mobile phone number and email address (sensitive personal information). The collection of mobile phone number and email address is to meet the requirements of the network real name system stipulated by relevant laws. If you refuse to provide the above information for verification, it will lead to registration/login failure, and we will not be able to provide you with the core functions of the product/service. If you use the account password login method, you need to provide us with your mobile phone number, email (sensitive personal information) and AiYin account password information (sensitive personal information).

②Mobile phone number one-click login

When you use the "Mobile Number one-click login" function, with your consent, the operator will provide us with your mobile phone number (sensitive personal information) of your current device, so that we can use it as your registration/login account without password or dynamic verification code verification, to provide you with fast registration/login services. If you do not want to use the "mobile number one-click login" function, you can use other ways to register/log in to the AiYin account.

③Third-party platform account authorized login

If you use a third-party platform account (wechat, QQ, Tiktok, Facebook, etc.) to authorize login, you need to authorize us to obtain the relevant information (including user ID, nickname, profile picture) and identity verification information (sensitive personal information) under the third-party account. It is used to bind the account, improve the account information, protect your account security, and prevent security risks. If you refuse to authorize the above information, you will not be able to use the account of the third party platform to log in to AiYin, but you can complete the registration/login through other means.

(3)Provide you with goods or services

When you need us to provide customer service, in order to ensure the security of your account and system, we need you to provide the necessary personal information to verify your user identity. Please understand that if you refuse to provide specific personal information leading to identity verification, we may not be able to respond to your service request (e. g., change the delivery address, contact number, etc).

In order to facilitate contact with you, as soon as possible to help you solve the problem or record the related problem solutions and results, and continue to improve our service ability, we may keep your communication with us, communication / call records and related content (including account information, order information, payment information you provide other information to prove the relevant information, or you leave contact information).

If you refuse us to process the above information, it will prevent you from using our customer service, but it will not affect your normal use of other functions or services of the product.

(4)Provide the security guarantee for you

To enhance the security of your services provided with us and our affiliates and partners, Protect the personal and property safety of you or other users or the public from infringement, To better prevent phishing sites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion and other security risks, More accurately identify violations of laws and regulations or relevant agreement rules, We may use or integrate your user information, transaction information, device information, operating system, unique device identifier (refers to a string of characters incorporated into the device by the device manufacturer, Can be used to identify the corresponding equipment in a unique way), login IP address, software version number, way / type / status of network access to, network quality data, operation log, service log information (such as your browsing records in the App, search / view records, service fault information, etc.) and our affiliated companies, partners obtain your authorization or sharing information according to the law, To comprehensively judge your account and transaction risks, verify, detect and prevent security incidents, And take the necessary measures of recording, audit, analysis and disposal according to law.

(5)Improve our products or services

In order to provide you with the page display and search results that better fit your needs, understand the product suitability, and identify the abnormal status of the account, we will collect information about the service and how you use it and associate these information, including:

①Equipment information: We will receive and record the device information you use according to the specific permissions you grant during software installation and use, such as device model, operating system version, device Settings, unique device ID (Android ID/iOS ID) and other software and hardware characteristic information; Information about the location of the device, such as IP address, GPS location, and sensor information such as Wi-Fi access points, Bluetooth, and base stations that can provide relevant information.

②Log information: When you use the products or services provided by our website or client, we will automatically collect your detailed usage of our services and save them as a relevant web log. For example, your search query content, IP address, browser type, telecom operator, language used, access date and time, and the web page records you visit, etc.

(6)Other uses Your consent when we use the information for other purposes not specified in this policy or for the information collected for a specific purpose for other purposes.

(7)Exception to authorized consent

In accordance with the relevant laws and regulations, your authorization is not required to collect your personal information in the following circumstances:

It is necessary for the conclusion and performance of your contract as a party, or for the implementation of human resources management in accordance with the labor rules and regulations formulated according to law and the collective contract signed according to law;

Necfor the performance of statutory duties or obligations;

It is necessary to deal with public health emergencies or to protect the life, health and property safety of natural persons in emergency;

Implement news reports and supervision by public opinion for the public interest, and deal with your personal information within a reasonable scope;

Deal with the personal information that you have disclosed or otherwise legally disclosed within the reasonable scope according to the provisions of the Personal Information Protection Law;

Other circumstances as stipulated by laws and administrative regulations.

(8)Device permissions call

We will open the APP permission according to the specific permissions you granted in the software installation and use. If you refuse to open the corresponding permissions, it may cause the direct function to be usable, and then affect your experience of using love printing. If you want to close the corresponding sensitive permissions, you can reject it in the popup when you trigger the permission application, or turn it off by accessing the "Device-AiYin" of the phone.

Please note that you open any authority on behalf of you authorize we can collect and use relevant personal information to provide you with corresponding services, you close any authority on behalf of you cancel the authorization, we will no longer based on the corresponding authority to continue to collect and use the relevant personal information, also cannot continue to provide you with the authority of the corresponding service. Your decision to close the permissions will not affect the previous collection and use of information based on your authorization.

The specific relevant APP permission usage and description are as follows:

Permission name: READ _ EXTERNAL _ STORAGE Permission function: Read the content on the SD card Use scenarios and objectives: reading of stored data, reading of local files

Permission name: WRITE _ EXTERNAL _ STORAGE Permission function: Modify / delete content on the SDK Use scenarios and objectives: data modification and preservation, local file modification and preservation

Permission name: CAMERA Permission function: call the camera permission Use scenarios and objectives: need practical photo function, access album function

Permission name: READ _ PHONE _ STATU Permission function: Read the mobile phone status and identity Use scenarios and objectives: network status judgment, statistics and analysis of device data

Permission name: ACCESS_COARSE_LOCATION Permission function: access to location Use scenarios and objectives: search the Bluetooth printer and connect the necessary permission of the printer

Permission name: ACCESS_COARSE_LOCATION Permission function: to gain access to the approximate location Use scenarios and objectives: search the Bluetooth printer and connect the necessary permission of the printer

2.How do we use Cookies and similar technologies

(1)Cookies

To ensure that the site is working and give you an easier access experience, we will store Cookies, Flash Cookies, or other local storage on your browser (or associated applications) that usually contains identifiers, site names, or characters) (collectively "Cookies"). With Cookies, we can use it to determine whether you are logged in, perform statistical analysis to optimize your product or service, simplify the steps you repeat, and conduct data analysis, etc. We will not use Cookies and similar technologies for any purpose other than the purposes stated in this Privacy Policy.

You can set the device terminal / system to notify you immediately when you receive the Cookies so that you can decide whether to accept it. Most web browsers may automatically accept Cookies, but you can usually modify your browser settings to reject Cookies; you can also delete all Cookies that is already stored on your computer, mobile devices, or other devices. But if you do, you may have to personally change the user Settings every time you visit our product, and the information you have previously recorded will be deleted, and may have an impact on the security of the services you use.

(2) The website beacon and the pixel label

In addition to Cookies, we also use other similar technologies such as website beacons and pixel tags on the website. For example, an email we send you may contain an address link to the content of our website, and if you click on the link, we will follow this click to help us understand your product or service preferences so as to proactively improve the customer service experience. Website beacons are usually a transparent image embedded in a website or email. With the pixel label in the email, we can know whether the email is being opened.

3.Use of the third-party SDK

In order to provide users with a variety of services more efficiently, we have access to third-party Software Development Kit (Software Development Kit),commonly referred to as SDK, Software development kits are generally a collection of development tools used by software engineers to build application software for specific software packages, software frameworks, hardware platforms, operating systems, etc. SDKS used on this platform include:

(1)zxing SDK

Purpose of use: For scanning code, quickly identify and generate two-dimensional code for printing

Application scenario: Scan codes

Types of personal information involved: Obtaining device serial numbers, obtaining acceleration sensor information

Collection method: SDK collection

(2)Google Play Services SDK

Purpose of use: Used to determine whether the location service is enabled

Application scenario: Bluetooth scanning

Type of personal information involved: Information about installed apps

Collection method: SDK collection

(3)Ali cloud one click login SDK

Purpose of use: The mobile number is used as the APP registration/login account and is exempt from password or dynamic verification code

Application scenario: one-click

Type of personal information involved: Phone number

Collection method: SDK collection

(4)Tencent QQ SDK

Purpose of use: APP account binding, account information improvement, account security, prevent security risks

Application scenario: User login/registration, click to jump to QQ, agree to the authorization after registration/login; Account binding, click to jump to QQ, agree to bind after authorization

Type of personal information involved: Account authentication information

Collection method: SDK collection

(5)WeChat SDK

Purpose of use: APP account binding, account information improvement, account security, prevent security risks

Application scenario: User login/registration, click to jump to WeChat, agree to the authorization after registration/login; Account binding, click to jump to WeChat, agree to bind after authorization

Type of personal information involved: Account authentication information

Collection method: SDK collection

(6)Google SDK

Purpose of use: APP account binding, account information improvement, account security, prevent security risks

Application scenario: User login/registration, click to jump to Google, agree to the authorization after registration/login; Account binding, click to jump to Google, agree to bind after authorization

Type of personal information involved: Account authentication information

Collection method: SDK collection

(7)Tik Tok SDK

Purpose of use: APP account binding, account information improvement, account security, prevent security risks

Application scenario: User login/registration, click to jump to Tik tok, agree to the authorization after registration/login; Account binding, click to jump to Tik tok, agree to bind after authorization

Type of personal information involved: Account authentication information

Collection method: SDK collection

(8)Facebook SDK

Purpose of use: APP account binding, account information improvement, account security, prevent security risks

Application scenario: User login/registration, click to jump to Facebook, agree to the authorization after registration/login; Account binding, click to jump to Facebook, agree to bind after authorization

Type of personal information involved: Account authentication information

Collection method: SDK collection

4. How do we share, transfer, and publicly disclose your personal information

(1)Sharing

We will not share your personal information with companies, organizations, and individuals other than Iproviders, except:

Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties;

Sharing under legal circumstances: we may share your personal information according to the provisions of laws and regulations, the needs of litigation dispute settlement, or according to the requirements of administrative and judicial organs;

Sharing with affiliates: In order to facilitate our efforts to provide services based on the associated account and protect the personal and property safety of the affiliates or other users or the public from infringement, your personal information may be shared with our affiliates. We will only share the necessary personal information (such as for you to use love printing account use our associated products or services, we will share to affiliates your necessary account information), if we share your personal sensitive information or affiliates change the use of personal information and processing purpose, will again for your authorization consent;

Sharing with Authorized Partners: For the purposes stated in this Privacy Policy only, some of our services will be provided jointly by us and our Authorized Partners. We may share some of your personal information with our partners to provide a better customer service and user experience. For example, arranging for partners to provide services. We will only share your personal information for legitimate, legitimate, necessary, specific and specific purposes, and will only share the personal information necessary to provide the services. Our partners are not authorized to use the shared personal information for other purposes unrelated to the product or service.

Currently, our authorization partners include the following types:

Authorized partner for advertising and analytical services. We do not share, without your permission, your personally identifiable information (information that can identify you, such as your name or email address, to contact you or identify you) with partners providing advertising and analysis services. We will provide these partners with information about their advertising coverage and effectiveness, and will not provide your personally identifiable information, or we will aggregate this information so that it will not identify you personally. For example, only after the advertisers agree to comply with our advertising guidelines, we may tell advertisers the effect of their ads how, or how many people see their ads or installed after seeing the application, or to these partners can not identify statistical information (such as "men, 25-29 years old, located in Beijing"), to help them understand their audience or customers;

Suppliers, service providers, and other partners. We send information to providers, service providers, and other partners that support our business by providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, facilitating payments, or conducting academic research and surveys.

For companies, organizations and individuals with whom we share personal information, we sign strict data protection agreements requiring them to process personal information in accordance with our instructions, this Privacy Policy, and any other relevant confidentiality and security measures.

(2)Transfer or transfer

We will not transfer or transfer your personal information to any company, organization or individual, except where:

Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

In the merger, acquisition or bankruptcy liquidation, or other merger, acquisition or bankruptcy liquidation, such as personal information transfer, we will require new hold your personal information of the company, organizations continue to be subject by this policy, otherwise we will require the company, organizations and individuals to ask your authorized consent.

(3)Public disclosure

We will publicly disclose your personal information only if:

With your explicit consent or based on your active choice, we may publicly disclose your personal information;

If we determine that you violate the laws and regulations or serious violation of the relevant agreement rules, or to protect love and its affiliated users or the public property safety from infringement, we may according to the laws and regulations or relevant rules of agreement with your consent to disclose about your personal information, including related violations and love has the measures taken to you.

(4)Exception to prior authorization consent when sharing, transferring and public disclosure of personal information

Where, your prior consent is not required for sharing, transfer and public disclosure of your personal information:

Related to our performance of the obligations prescribed by laws and regulations;

Related to national security and national defense security;

Related to public safety, public health and major public interests;

Related to crime investigation, prosecution, trial and execution of judgment;

For the protection of you or other individual's life, property and other major legitimate rights and interests, but it is difficult to get my consent;

The personal information that you can disclose to the public;

Collecting personal information from legally and publicly disclosed information, such as legal news reports, government information disclosure and other channels.

If you voluntarily release or publicly share information through this product, such as publishing text, pictures or videos, according to the foregoing provisions, we need not obtain your consent to publicly display relevant information for you in this product. Please note that the relevant information may involve your or others' personal information or even sensitive personal information, such as your transaction information, facial images. Please use this product more carefully to consider whether to publish and share relevant information publicly.

Please be aware that, according to the law, if we take technical measures and other necessary measures for personal information processing, make the data receiver unable to identify specific individuals and cannot recover, the processing data sharing, transfer and public disclosure behavior, will not need to inform you and obtain your consent.

5.How we store and secure your personal information

Store your personal information

Storage area

The personal information collected and generated within the PRC will be stored within the PRC except:

(1) Having ly provisions by laws and regulations;

(2) Get your consent according to law.

In the above exceptions, we will request and require the data recipient to process the personal information in accordance with this policy and other relevant security and confidentiality measures.

Storage period

Unless required by laws and regulations, with your consent or otherwise agreed, we usually keep your personal information only within the period necessary to achieve the purpose stated by this policy. When you cancel your account, we will delete the corresponding information.

Measures to protect your personal information

We have taken reasonable security measures in line with industry common solutions to protect the security of your personal information against unauthorized access, public disclosure, use, modification, damage or loss of personal information. For example, you are protected by the SSL (Secure Socket Layer) protocol when exchanging data (such as credit card information); we use encryption technology to improve the security of personal information; we use trusted protection mechanisms to prevent malicious attacks on personal information; we deploy access control mechanisms to ensure that only authorized personnel have access to personal information; and we hold security and privacy training courses to enhance employee awareness of the importance of protecting personal information.

We have an advanced data security management system with data as the core and the data life cycle, which improves the security of the whole system from the aspects of the organization construction, the system design, the personnel management, the product technology and so on.

We will take reasonable and feasible measures to try to avoid collecting irrelevant personal information. We will only keep your personal information for the period required to meet the cost policy objectives, unless the retention period is extended or permitted by law.

The Internet is not an absolutely safe environment, we strongly recommend that you do not use communication to send personal information. You can connect and share with each other through our services. When you create communication, transaction, or sharing through our services, you can choose the object of communication, transaction or sharing, independently, as a third party that can see your transaction content, contact information, exchange information or sharing information.

If you find that your personal information, especially your account or password, is leaked, please contact the relevant personnel of AiYin user service immediately, so that we can take corresponding measures according to your application.

Please use complex passwords to help us keep your account safe. We will do our best to secure any information you send to us.

At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities. 

6.Sensitive personal information tips

Sensitive personal information is personal information that is easy to infringe the personal dignity or personal and property safety, including biometric identification, religious belief, specific identity, medical and health care, financial account, whereabouts track, etc.

Sensitive personal information involved in this policy includes: order information, payment information, address book information, communication / call records, fingerprint base map, fingerprint features, face recognition base map, facial features, geographical location, browsing records, etc.

We will tell you about the processing of sensitive personal information before collecting and using your sensitive personal information. If you tick, click consent or other keys in the provided page or popup of the description with the same meaning, you fully understand and agree to the full content of the description. At the same time, we will significantly identify the relevant content of sensitive personal information in bold and underlined in this policy.  

7. How do you manage your personal information

You can access and manage your personal information by:

(1)Consult and copy your personal information

You have access to your personal information, except for exceptions prescribed by laws and regulations. You can access, edit, and modify nicknames, avatar, signatures, gender, etc. in your profile through My-Account.

You may also request to consult and copy the personal information you have submitted to us through the contact information provided in section 11 of this policy.

(2)To correct or supplement your personal information

When you find an error in the personal information we process about you, you have the right to request us to make corrections or supplements. You may apply for correction or supplement by the manner listed in "(I) Review and Copy your Personal Information" in this article.

If you find that your other personal information held by us is inaccurate or incomplete, you may also request us for correction or supplement through the contact information provided in section 11 of this policy.

(3)Delete your personal information

You can delete some of your personal information as listed in this article in "(1) Access to your Personal Information".

You may request us to delete your personal information in the following situations:

If our handling of personal information violates laws and regulations;

If we collect and use your personal information without obtaining your express consent;

If our handling of personal information seriously violates our agreement with you;

If we never provide products or services for you;

(4)Unsubscribe

If we stop operating AiYin products or services, we will continue to collect your personal information, notify you of the notice of stopping the operation one by one or announcement, and delete or anonymize the personal information we hold.

After our review and confirmation, if your deletion request conforms to the circumstances of personal information deletion stipulated by law, your personal information will be deleted in time except for the information otherwise required by laws and regulations. However, due to relevant legal regulations or security technical restrictions, after your personal information under this product is deleted from the business system, we may not be able to immediately delete the corresponding information from the backup system. We will securely store your personal information and limit any further processing until the backup can be cleared or anonymized.

(5)Withdraw your consent

Each business function requires some basic personal information to be completed (see Article 1 of this Privacy Policy). In addition, for the collection and use of additional personal information, you can give or withdraw your authorized consent in Settings or contact AiYin customer service.

Please understand that after you perform the above operations, we will not continue to provide you with the services that to your consent or authorization, but will not affect the previous personal information processing based on your authorization.

(6)Log off your account

You can directly apply for the cancellation of your account in our products. You can access "My-Cancel account" through the mobile APP to complete account cancellation; in order to avoid account recovery after cancellation, you need to confirm and obtain the bound mobile phone verification code for authentication. Please note that after you cancel your account, we will delete or anonymize your personal information according to the law. Please be careful to cancel your account.

(7)The constraint information system makes an automatic decision-making

In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms, such as information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us to make an explanation, and we will also provide the appeal method on the premise of not infringing on the trade secrets or other users' rights and interests, social and public interests.

(8)In response to your above request

We will review the questions as soon as possible and make a reply within 15 days after receipt of the request or within the time limit prescribed by laws and regulations. If you are not satisfied, you can also make a complaint through the customer service.

For your reasonable request, we do not charge in principle, but for repeated requests beyond the reasonable limit, we will charge a certain cost according to the situation. We may reject requests that repeat themselves, require excessive technical tools (for example, require new systems or fundamentally change existing practices), pose risks to the legitimate rights of others, or are very unrealistic.

We will not be able to respond to your request in the following circumstances:

Related to national security and national defense security;

Related to public safety, public health and major public interests;

Related to crime investigation, prosecution, trial and execution of judgments;

There is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights;

Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;

Involving trade secrets.

8. How do we handle children's personal information

In this policy, children refer to a minor under the age of 14.

Before you register, we will ask you to truthfully confirm whether you have reached the age of 14. This product is only for users over the age of 14 years old. In principle, we do not collect personal information of children. If we found that personal information was collected without prior consent of verifiable parents or guardians, we managed to remove relevant data as soon as possible.

For accidental cases of collect personal information about our products or services with the consent of our parents or guardians, we will only use, share, transfer or disclose such information as permitted by laws and regulations, explicitly agreed by the parents or guardians or necessary to protect minors.

9.How can your personal information be transferred around the world

In principle, the personal information collected and generated during our operations in the People's Republic of China is stored in China. If your personal information may be provided outside the People's Republic of China, we will strictly fulfill the obligations prescribed by laws and regulations and obtain your prior consent in advance in accordance with the law.

10. How to update this policy

We may update this policy due to changes in service content, contact information, legal and regulatory policy requirements. When this policy changes, we will publish it on our official network platform, or show the updated version to you by including but not limited to wechat, SMS, or making special prompts on the browsing page. In the foregoing case, if you continue to use our Services, you agree to accept and be bound by the revised Policy.

Changes referred to in this Policy include, but are not limited to:

Our service model has changed significantly. Such as the purpose of processing personal information, the type of personal information processed, and the way of use of personal information;

We have had major changes in control, etc. Such as the owner change caused by the merger and reorganization;

The main objects of personal information sharing, transfer or public disclosure shall change;

Your rights to participate in the processing of personal information and their exercise methods have changed significantly;

We are responsible for dealing with the personal information security responsible departments, contact information and complaint channels change;

Personal information security impact assessment report indicate high risk.

You can view the latest version of this policy through the My-Privacy Policy.

11. How to contact us

We have set up a dedicated personal information protection team and a personal information protection officer. If you have any questions, comments or suggestions about the contents of this Privacy policy, or you may need to contact us as mentioned in this policy, you can contact us through the following ways:

Contact phone/customer service hotline: 400-851-5088

Email : [email protected]

After we verify and verify your user identity, we will review the issues involved as soon as possible and give feedback within 15 days after receiving the request or within the time limit specified by laws and regulations.

12. Jurisdiction and application of law

The validity, performance and interpretation of this Policy and its amendment shall apply to the laws of the People's Republic of China, and any dispute shall be governed only by the laws of the People's Republic of China. If any part of the policy clause is in conflict with the laws of the People's Republic of China, such provisions shall be reinterpreted in accordance with the law. The invalidity or reinterpretation of some provisions shall not affect the legal effect of the other provisions.

Any dispute or dispute between you and AiYin caused by this policy shall be settled in the principle of friendly negotiation. If no agreement can be reached through negotiation, you fully agree to submit the dispute or dispute to the people's court of AiYin, which has the jurisdiction of Xiamen City, through litigation.

The headings of all the terms of this Agreement are convenient for reading only and have no actual meaning, and shall not be the basis for the interpretation of the meaning of this Agreement.

The terms of this Agreement are partially invalid or unenforceable for any reason, and the remaining terms shall remain valid and binding on both parties.