Tencent Music Entertainment Group (TME) Privacy Policy


Tencent Music Entertainment Group (hereinafter referred to as "TME") regards user information security and privacy protection as its "lifeline". Following our "all for user value" philosophy, we are committed to improving the transparency of information processing, enhancing your convenience of information management, and ensuring the security of your information and communication.

TME strictly abides by relevant laws and regulations and adheres to the following privacy protection principles to provide you with more secure and reliable services:

Security and reliability: We make every effort to prevent your information from leakage, damage or loss via reasonable and effective information security technology and management processes.

Self-determination: We provide you with convenient information management options so that you can make appropriate choices to manage your personal information.

Protection of communication secrets: We protect your communication secrets and provide you with secure communication services in strict compliance with laws and regulations.

Reasonable necessity: We only collect information that is necessary to provide better services for you and other users.

Openness and transparency: We strive to explain our privacy policy to you in a concise and understandable way, so that you have a clear understanding of how we deal with information.

Integrating privacy protection into product design: We integrate the concept of privacy protection into all aspects of the development and operation of products or services, taking into account such factors as laws, products, and design.

This Privacy Policy of Tencent Music Entertainment Group (TME)(hereinafter referred to as "this Policy") mainly explains what information we collect, the purpose for which we collect information, and the rights you enjoy. We hope that you will read this Policy carefully to understand in detail how we collect and use information so that you can better understand our products or services and thus make appropriate choices. If there are specific privacy protection guidelines for our specific products and services, you may refer to these guidelines, in order to better protect your personal information.

This Policy will help you understand:

  1. 1. What necessary information do we collect
  2. 2. How do we use the information collected
  3. 3. How do we use cookies and related technologies
  4. 4. The information you share
  5. 5. How do you manage your information
  6. 6. The information we share
  7. 7. The information we may send to you
  8. 8. Location and duration of information storage
  9. 9. Information security
  10. 10. Advertising
  11. 11. Protection of minors
  12. 12. Scope of application
  13. 13. Contact us
  14. 14. Changes

By using the products or services of TME, you are agreeing with us on the contents as stated in this Policy. If you or your guardians disagree with any contents of this Policy, you shall stop using it immediately.

Please feel free to contact us if you have any questions.


Part I Definitions


"Personal information" refers to all kinds of information recorded electronically or otherwise in relation to an identified or identifiable natural person, excluding the information anonymized.

"Sensitive personal information" refers to personal information that, once disclosed or illegally used, is likely to infringe the human dignity of a natural person or endanger his/her personal and property security, including biometrics, religious beliefs, specific identity, health care, financial accounts, and whereabouts, as well as the personal information of minors under the age of 14.

"Devices" refer to machines that can be used to access TME services, such as desktop computers, laptops, tablets, and smartphones.

"Unique device identifier (exclusive ID or UUID)" refers to a string of characters programmed into a device by the device manufacturer, which can be used to identify the corresponding device (such as the IMEI number of a mobile phone) in an exclusive manner. A unique device identifier can be used for a variety of purposes, including serving advertisements when cookies cannot be used (in mobile application programs, for example).

"Cookie" is a neutral technology that allows a web server to store data on or read data from the client. A cookie file is a file in the format of .txt, which stores some information about a user’s visit to a website. The contents of cookies are usually encrypted. Secure cookie technology will provide users with more convenient services when surfing the Internet.

"IP address" is a serial number assigned to each device with access to the Internet, which is called an Internet protocol (IP) address. These numbers are usually assigned by geography. An IP address can usually be used to identify the location of a device when it is connected to the Internet.

"GPS" is short for Global Positioning System. The GPS signal receiver on your device can receive signals from GPS satellites and use the incoming information to calculate your location.

"Wi-Fi" refers to a technology that connects electronic devices to a wireless local area network (WLAN), which is commonly known as a wireless network.

"Base station" is a public mobile communication base station, which is a form of the radio station. It refers to a radio transceiver station that transmits information with mobile phone terminals in a certain radio coverage area through the mobile communication switching center.

"TLS" is short for Transport Layer Security, also known as Secure Transport Layer Protocol, which consists of TLS Record and TLS Handshake protocols that are used to provide confidentiality and data integrity between two communicating application programs.

"SSL" is short for Secure Socket Layer, which is a security protocol implemented over the transmission communication protocol (TCP/IP). SSL supports various types of networks and provides three basic security services, all of which achieve the effect of information confidentiality by means of public key and symmetric key technologies.

"Information collection technology" The "automatic collection" described herein includes the following methods:

(1) Cookie

A cookie is a small text file placed on the client (in your computer, mobile phone, or other intelligent terminals) by the website server when you browse a web page. It can be used to improve your online experience.

(2) Web beacon

A web beacon is an electronic image file or other technologies embedded in a website or email. It can be used to count the number of visitors, record whether and when you read an email, view a website, or use certain cookies.

(3) Log files

Log files store a number of data automatically collected. Such data includes Internet protocol (IP) addresses, browser types, Internet service providers (ISPs), reference/exit pages, operating systems, date/time stamps, and click-stream data.

(4) ETag

ETag is an HTTP protocol header transmitted behind the Internet browser and Internet server. It can be used in place of cookies to track individual users, so that we can better understand and improve our services.

(5) JavaScript

JavaScript is a programming language for making more interactive and dynamic web pages. JavaScript can set, read, and delete cookies.

"Affiliated companies" refer to the operators of platforms or products under Tencent Music Entertainment Group (TME) and other companies associated with TME (including but not limited to Tencent Music Entertainment Technology (Shenzhen) Co., Ltd., Tencent Music Entertainment (Shenzhen) Co., Ltd., GuangZhou Kugou Computer Technology Co., Ltd., Beijing Kuwo Technology Co., Ltd., and Shenzhen Tencent Computer System Co., Ltd.). "Affiliated relationship" means, in relation to any subject (including an individual, a company, an organization, or any other entity), a subject which it directly or indirectly controls, or which is directly or indirectly controlled by it, or which is directly or indirectly controlled by the same subject. The foregoing "control" refers to other relationships of directly or indirectly having the power to give instructions or obligate others to give instructions or in fact, constitute effective control over the management and decision-making of the relevant subject, through the holding of voting rights, contracts, or otherwise.

"Products or services" refer to websites, application programs, clients, services, and tools of various platforms or products of TME (including QQ Music, Kugou Music, Kuwo Music, WeSing, Kugou Live, Kuwo Live, Tencent Musician Program, 5sing, and other products or services provided by TME).


Part II Privacy Policy Terms


  1. What Necessary Information Do We Collect

We collect only the personal information necessary to achieve the functions of our products in accordance with laws and regulations and following the principles of legality, justifiability, necessity, and integrity. The information includes:

1.1 Information you voluntarily provide when using our products or services

1.1.1 Information you voluntarily fill in or upload when registering for our products or services, including nickname, cell phone number, profile photo, and picture. The information includes, for example, the nickname and mobile phone number you fill in when you register a QQ or WeChat account or log in to your account.

1.1.2 Information you upload when using the products or services.

It includes, for example, the profile photo uploaded and pictures shared when you use QQ Music and WeSing.

1.1.3 Information you submit through our customer service or when you participate in our activities.

For example, the questionnaire you fill in when participating in our online activities may contain such information as your name, telephone number, and home address. Some of our services may require you to provide specific sensitive personal information so that certain functions can be performed. If you choose not to provide such information, you may fail to use specific in-service functions normally, which, however, will not affect your use of other in-service functions. By voluntarily providing your sensitive personal information, you are agreeing with us to deal with your sensitive personal information according to the purposes and methods as described in this Policy.

1.1.4 Some of our specific services may require you to provide specific personal information so that relevant functions can be performed. If you choose not to provide such information, your use of other in-service functions will not be affected.

1.2 Information obtained by us when you use products or services

1.2.1 Log information. When you use our products or services, we may automatically collect relevant information and store it as service log information.

(1) Device information. It includes, for example, device model, operating system version, unique device identifier, battery, and signal strength.

(2) Software information. It includes, for example, software version number and browser type. We will collect information about the mobile applications and other software you use to ensure the security of the operating environment or as necessary to provide the services.

(3) IP address.

(4) Service log information. It includes, for example, information about what you search for and view when using our products or services, service failure information, and referral URLs.

(5) Communication log information. It includes, for example, the account, time, and duration of your communication when you use our products or services.

1.2.2 Location information. When you use location-related services, we may record information about the location of your device in order to provide you with related services.

(1) When you use the services, we may obtain the information about your location through IP address, GPS, Wi-Fi, or base station. GPS location information is sensitive personal information. If you refuse to provide such information, it will only affect the location-related functions, but not your use of other functions of the products or services.

(2) The information you or other users provide when using the services may include the information about your location. For example, the account information you provide may contain information about your region, and photos shared by you or others may contain geo-tagging information.

1.2.3 Other relevant information. We will collect relevant information to help you better use our products or services. For example, we will collect information about friend lists, song lists, and voiceprint eigenvalue. To ensure that you can contact people you know when using our services, if you choose to enable the function of importing contacts, we may encrypt your contacts’ names and phone numbers and collect only the encrypted information.

1.3 Information shared by other users that contains your information

For example, photos posted or videos shared by other users may contain information about you.

1.4 Information obtained from third-party partners

We may obtain information generated or shared by you when you use the products or services of third-party partners. For example, when you use products or services of a third-party partner that has business cooperation with TME, we will obtain the information about when and where you use TME services via products or services of the third-party partner, so as to facilitate your authorization management. Please carefully read the user agreement or privacy policy on the services of third-party partners.

  1. How Do We Use the Information Collected

In strict compliance with laws and regulations, as well as agreements with users, we will use the information collected for the following purposes. If we use your information beyond the scope of the following purposes, we will explain to you again to seek your consent.

2.1 Provide services for you.

2.2 Meet your personalized needs. It includes, for example, language settings, location settings, and personalized help services.

2.3 Carry out product development and service optimization. For example, when our system fails, we will record and analyze the information generated during the failure, so as to optimize our services.

2.4 Guarantee security. For example, we will use your information for authentication, security, anti-fraud monitoring, archived backup, and customer security services.

2.5. Recommend advertisements, information, and other information that you may b