TME Privacy Policy

TME Privacy Policy

Overview

Tencent Music Entertainment Group (hereinafter referred to as "TME") regards user information security and privacy protection as its "lifeline". Following our "all for user value" philosophy, we are committed to improving the transparency of information processing, enhancing your convenience of information management, and ensuring the security of your information and communication.

TME strictly abides by relevant laws and regulations and adheres to the following privacy protection principles to provide you with more secure and reliable services:

Security and reliability: We make every effort to prevent your information from leakage, damage or loss via reasonable and effective information security technology and management processes.

Self-determination: We provide you with convenient information management options so that you can make appropriate choices to manage your personal information.

Protection of communication secrets: We protect your communication secrets and provide you with secure communication services in strict compliance with laws and regulations.

Reasonable necessity: We only collect information that is necessary to provide better services for you and other users.

Openness and transparency: We strive to explain our privacy policy to you in a concise and understandable way, so that you have a clear understanding of how we deal with information.

Integrating privacy protection into product design: We integrate the concept of privacy protection into all aspects of the development and operation of products or services, taking into account such factors as laws, products, and design.

This Privacy Policy of Tencent Music Entertainment Group (TME)(hereinafter referred to as "this Policy") mainly explains what information we collect, the purpose for which we collect information, and the rights you enjoy. We hope that you will read this Policy carefully to understand in detail how we collect and use information so that you can better understand our products or services and thus make appropriate choices. If there are specific privacy protection guidelines for our specific products and services, you may refer to these guidelines, in order to better protect your personal information.

This Policy will help you understand:

  1. 1. What necessary information do we collect
  2. 2. How do we use the information collected
  3. 3. How do we use cookies and related technologies
  4. 4. The information you share
  5. 5. How do you manage your information
  6. 6. The information we share
  7. 7. The information we may send to you
  8. 8. Location and duration of information storage
  9. 9. Information security
  10. 10. Advertising
  11. 11. Protection of minors
  12. 12. Scope of application
  13. 13. Contact us
  14. 14. Changes

By using the products or services of TME, you are agreeing with us on the contents as stated in this Policy. If you or your guardians disagree with any contents of this Policy, you shall stop using it immediately.

Please feel free to contact us if you have any questions.

 

Part I Definitions

 

"Personal information" refers to all kinds of information recorded electronically or otherwise in relation to an identified or identifiable natural person, excluding the information anonymized.

"Sensitive personal information" refers to personal information that, once disclosed or illegally used, is likely to infringe the human dignity of a natural person or endanger his/her personal and property security, including biometrics, religious beliefs, specific identity, health care, financial accounts, and whereabouts, as well as the personal information of minors under the age of 14.

"Devices" refer to machines that can be used to access TME services, such as desktop computers, laptops, tablets, and smartphones.

"Unique device identifier (exclusive ID or UUID)" refers to a string of characters programmed into a device by the device manufacturer, which can be used to identify the corresponding device (such as the IMEI number of a mobile phone) in an exclusive manner. A unique device identifier can be used for a variety of purposes, including serving advertisements when cookies cannot be used (in mobile application programs, for example).

"Cookie" is a neutral technology that allows a web server to store data on or read data from the client. A cookie file is a file in the format of .txt, which stores some information about a user’s visit to a website. The contents of cookies are usually encrypted. Secure cookie technology will provide users with more convenient services when surfing the Internet.

"IP address" is a serial number assigned to each device with access to the Internet, which is called an Internet protocol (IP) address. These numbers are usually assigned by geography. An IP address can usually be used to identify the location of a device when it is connected to the Internet.

"GPS" is short for Global Positioning System. The GPS signal receiver on your device can receive signals from GPS satellites and use the incoming information to calculate your location.

"Wi-Fi" refers to a technology that connects electronic devices to a wireless local area network (WLAN), which is commonly known as a wireless network.

"Base station" is a public mobile communication base station, which is a form of the radio station. It refers to a radio transceiver station that transmits information with mobile phone terminals in a certain radio coverage area through the mobile communication switching center.

"TLS" is short for Transport Layer Security, also known as Secure Transport Layer Protocol, which consists of TLS Record and TLS Handshake protocols that are used to provide confidentiality and data integrity between two communicating application programs.

"SSL" is short for Secure Socket Layer, which is a security protocol implemented over the transmission communication protocol (TCP/IP). SSL supports various types of networks and provides three basic security services, all of which achieve the effect of information confidentiality by means of public key and symmetric key technologies.

"Information collection technology" The "automatic collection" described herein includes the following methods:

(1) Cookie

A cookie is a small text file placed on the client (in your computer, mobile phone, or other intelligent terminals) by the website server when you browse a web page. It can be used to improve your online experience.

(2) Web beacon

A web beacon is an electronic image file or other technologies embedded in a website or email. It can be used to count the number of visitors, record whether and when you read an email, view a website, or use certain cookies.

(3) Log files

Log files store a number of data automatically collected. Such data includes Internet protocol (IP) addresses, browser types, Internet service providers (ISPs), reference/exit pages, operating systems, date/time stamps, and click-stream data.

(4) ETag

ETag is an HTTP protocol header transmitted behind the Internet browser and Internet server. It can be used in place of cookies to track individual users, so that we can better understand and improve our services.

(5) JavaScript

JavaScript is a programming language for making more interactive and dynamic web pages. JavaScript can set, read, and delete cookies.

"Affiliated companies" refer to the operators of platforms or products under Tencent Music Entertainment Group (TME) and other companies associated with TME (including but not limited to Tencent Music Entertainment Technology (Shenzhen) Co., Ltd., Tencent Music Entertainment (Shenzhen) Co., Ltd., GuangZhou Kugou Computer Technology Co., Ltd., Beijing Kuwo Technology Co., Ltd., and Shenzhen Tencent Computer System Co., Ltd.). "Affiliated relationship" means, in relation to any subject (including an individual, a company, an organization, or any other entity), a subject which it directly or indirectly controls, or which is directly or indirectly controlled by it, or which is directly or indirectly controlled by the same subject. The foregoing "control" refers to other relationships of directly or indirectly having the power to give instructions or obligate others to give instructions or in fact, constitute effective control over the management and decision-making of the relevant subject, through the holding of voting rights, contracts, or otherwise.

"Products or services" refer to websites, application programs, clients, services, and tools of various platforms or products of TME (including QQ Music, Kugou Music, Kuwo Music, WeSing, Kugou Live, Kuwo Live, Tencent Musician Program, 5sing, and other products or services provided by TME).

 

Part II Privacy Policy Terms

 

  1. What Necessary Information Do We Collect

We collect only the personal information necessary to achieve the functions of our products in accordance with laws and regulations and following the principles of legality, justifiability, necessity, and integrity. The information includes:

1.1 Information you voluntarily provide when using our products or services

1.1.1 Information you voluntarily fill in or upload when registering for our products or services, including nickname, cell phone number, profile photo, and picture. The information includes, for example, the nickname and mobile phone number you fill in when you register a QQ or WeChat account or log in to your account.

1.1.2 Information you upload when using the products or services.

It includes, for example, the profile photo uploaded and pictures shared when you use QQ Music and WeSing.

1.1.3 Information you submit through our customer service or when you participate in our activities.

For example, the questionnaire you fill in when participating in our online activities may contain such information as your name, telephone number, and home address. Some of our services may require you to provide specific sensitive personal information so that certain functions can be performed. If you choose not to provide such information, you may fail to use specific in-service functions normally, which, however, will not affect your use of other in-service functions. By voluntarily providing your sensitive personal information, you are agreeing with us to deal with your sensitive personal information according to the purposes and methods as described in this Policy.

1.1.4 Some of our specific services may require you to provide specific personal information so that relevant functions can be performed. If you choose not to provide such information, your use of other in-service functions will not be affected.

1.2 Information obtained by us when you use products or services

1.2.1 Log information. When you use our products or services, we may automatically collect relevant information and store it as service log information.

(1) Device information. It includes, for example, device model, operating system version, unique device identifier, battery, and signal strength.

(2) Software information. It includes, for example, software version number and browser type. We will collect information about the mobile applications and other software you use to ensure the security of the operating environment or as necessary to provide the services.

(3) IP address.

(4) Service log information. It includes, for example, information about what you search for and view when using our products or services, service failure information, and referral URLs.

(5) Communication log information. It includes, for example, the account, time, and duration of your communication when you use our products or services.

1.2.2 Location information. When you use location-related services, we may record information about the location of your device in order to provide you with related services.

(1) When you use the services, we may obtain the information about your location through IP address, GPS, Wi-Fi, or base station. GPS location information is sensitive personal information. If you refuse to provide such information, it will only affect the location-related functions, but not your use of other functions of the products or services.

(2) The information you or other users provide when using the services may include the information about your location. For example, the account information you provide may contain information about your region, and photos shared by you or others may contain geo-tagging information.

1.2.3 Other relevant information. We will collect relevant information to help you better use our products or services. For example, we will collect information about friend lists, song lists, and voiceprint eigenvalue. To ensure that you can contact people you know when using our services, if you choose to enable the function of importing contacts, we may encrypt your contacts’ names and phone numbers and collect only the encrypted information.

1.3 Information shared by other users that contains your information

For example, photos posted or videos shared by other users may contain information about you.

1.4 Information obtained from third-party partners

We may obtain information generated or shared by you when you use the products or services of third-party partners. For example, when you use products or services of a third-party partner that has business cooperation with TME, we will obtain the information about when and where you use TME services via products or services of the third-party partner, so as to facilitate your authorization management. Please carefully read the user agreement or privacy policy on the services of third-party partners.

  1. How Do We Use the Information Collected

In strict compliance with laws and regulations, as well as agreements with users, we will use the information collected for the following purposes. If we use your information beyond the scope of the following purposes, we will explain to you again to seek your consent.

2.1 Provide services for you.

2.2 Meet your personalized needs. It includes, for example, language settings, location settings, and personalized help services.

2.3 Carry out product development and service optimization. For example, when our system fails, we will record and analyze the information generated during the failure, so as to optimize our services.

2.4 Guarantee security. For example, we will use your information for authentication, security, anti-fraud monitoring, archived backup, and customer security services.

2.5. Recommend advertisements, information, and other information that you may be interested in. For example, we may use your relevant information to provide you with advertisements that are more relevant to you on relevant websites, applications, and other channels.

2.6. Evaluate and improve the effectiveness of our advertising and other promotions.

2.7 Manage software. For example, to perform software certification, software upgrades, and the like.

2.8 You are invited to participate in the survey on our services.

For your better experience, and improvement in our services or other purposes agreed by you, we may use the information collected through certain services for our other services, subject to relevant laws and regulations. For example, we may apply the information generated from your use of one of our services in showing personalized content or advertising to you in another service, and in performing user research, analysis, statistics, and other services.

In order to ensure the security of the services and help us better understand how our application program is operating, we may record information such as how often you use the application program, failure information, overall usage, performance data, and source of the application program. We will not combine the information we store in the analysis software with the personally identifiable information you provide in the application program.

As our business develops, the product functions and services we offer may be adjusted and changed. In case of changes in processing purpose caused thereby, we will explain to you again to seek your consent.

  1. How Do We Use Cookies and Related Technologies

We or our third-party partners may collect information about you by placing secure cookies and related technologies for the purpose of providing you with a more personalized user experience and services. We will strictly require third-party partners to comply with the relevant provisions of this Policy.

You may also manage cookies through browser settings. However, please note that if cookies are disabled, you may not enjoy the best service experience, and some services may not work properly.

  1. The Information You Share

Our services allow you to share your relevant information with friends, family, and other users. The information includes, for example, videos, texts, and photos that you make public in WeSing. Please note that this may contain your personally identifiable information, personal property information, and other sensitive information. Please give careful considerations to the disclosure of your sensitive personal information.

You may control the scope of your information you share through the privacy settings in our services, or delete the information you make public through the settings in the services or the guidelines we offer. However, please note that such information may still be stored independently by other users or unaffiliated third parties beyond our control.

  1. How Do You Manage Your Information

5.1 While using our services, you may manage your information by consulting, copying, correcting, supplementing, and deleting, or contacting us in accordance with the notice guidelines. While using our specific products and services, you may refer to their separate privacy guidelines, in which we specifically describe how and what you can do to manage your personal information, thus better protecting it. For example, if you want to stop sharing information about your location while using location-related services, you may disable the function of mobile phone positioning or adopt the closing mode of software and hardware service providers and communication service providers. We suggest you carefully read the relevant guidelines.

5.2. We will collect and use your information only to fulfill the functions of our products or services in accordance with this Policy. If you find that we collect and use your personal information in violation of laws and regulations or the agreement between both parties, you may ask us to delete such information. If you find any errors in your personal information collected or stored by us, you may also ask us to correct such information. Please contact us through the contact information set out in this Policy.

5.3. In exercising your rights as described above, you may be required by us to verify your identity, so as to ensure the security of your account. If you have any questions, please contact us through the contact information set out in this Policy.

5.4 Please understand that due to technical limitations and legal or regulatory requirements, we may not be able to meet all your requirements, and we will give feedbacks within the time limit specified by laws and regulations. Meanwhile, we will continue optimizing products and services to protect your rights.

  1. Third-Party Data Processing and Information Disclosure

During the cooperation with third parties, we will comply with legal regulations and handle relevant data safely and prudently, following the principle of minimum necessity.

6.1. We will strictly restrict the third parties involved in data processing in accordance with laws and regulations. They are required to strictly comply with our measures and requirements on data privacy protection, including but not limited to processing in accordance with data protection agreements, commitments, and relevant data processing policies to ensure data security.

6.2. For the purpose of providing services for you, we may entrust a third-party service provider to process your personal information. Such service provider will process personal information in strict accordance with the purpose of our entrustment and the relevant entrustment processing agreement.

6.3. We will apply the information collected in big data analysis. For example, we will use the information collected to analyze and form urban heat maps or industry insight reports that do not contain any personal information. We may make public the statistically processed, non-identifiable information, and share it with our partners, for the purpose of understanding how our services are used or informing the public about general usage trends of our services.

6.4. We will strictly protect your personal information and will not take the liberty to disclose your personal information or share information that can be used to identify you with partners, except for the personal information with your separate consent or as otherwise stipulated by laws and regulations, which is:

  • Required by the conclusion and performance of contracts to which an individual is a party, or by the implementation of human resources management in accordance with labor rules and regulations formulated by law and collective contracts signed according to law;
  • Required by the performance of statutory duties or legal obligations;
  • Required by responding to public health emergencies or protecting the life, health, and property of natural persons in emergencies;
  • Required by handling of personal information within a reasonable range, which covers news reporting, public opinion supervision, and other acts for the sake of public interests.
  • Voluntarily disclosed by individuals themselves or legally disclosed to a reasonable extent in compliance with legal regulations;
  • Other circumstances stipulated by laws and administrative regulations.

6.5 With the continuous development of our businesses, when we transfer your personal information to a third party due to merger, acquisition, asset transfer, and other transactions, we will inform you of the circumstances in push notifications, announcements, and other forms, and continue protecting or require new managers to continue protecting your personal information in accordance with laws and regulations as well as standards equal to or higher than those required by this Policy.

  1. The Information We May Send You

7.1 Information push

When you use our services, we may send you emails, short messages, news, or push notifications.

You may choose to unsubscribe them from your device by following our instructions. If personalized pushes exist in specific products and services, please refer to the specific privacy protection guidelines of these products and services for more information, or disable personalized recommendations.

7.2 Service-related announcements

We may make service-related announcements to you when necessary (for example, when a service is suspended for system maintenance). You may not be able to cancel these service-related announcements, which are not advertisements in nature.

  1. Location and Duration of Information Storage

8.1 Location of information storage

We store personal information collected and generated within the territory of the People’s Republic of China in accordance with laws and regulations.

8.2 Duration of information storage

In general, we retain your personal information only for the shortest period of time necessary to achieve our purpose. The exceptions are:

8.2.1 To comply with the applicable laws and regulations as well as other relevant provisions;

8.2.2 To comply with the provisions of court decisions, rulings, or other legal procedures;

8.2.3 To comply with the requirements of law enforcement by the relevant governmental authorities;

In the event that our products or services cease to operate, we will notify you in push notification, announcements, and other forms, and delete or anonymize your personal information within a reasonable period of time.

  1. Information Security

We provide a corresponding guarantee for the security of your information to prevent its loss, improper use, unauthorized access, or disclosure.

9.1 We strictly comply with laws and regulations to protect the confidentiality of user communications.

9.2 We will use various security protection measures within a reasonable level of security to ensure the security of information. For example, we will protect your personal information through encryption techniques (such as TLS and SSL), anonymous processing, and other means.

9.3 We have established special management systems, processes, and organizations to ensure information security. For example, we strictly limit the scope of persons with access to the information, require them to comply with confidentiality obligations, and carry out reviews.

9.4 In case of personal information disclosure and other security incidents, we will initiate emergency plans to prevent their expansion, and inform you in push notifications, announcements, and other forms.

  1. Advertising

To enrich your advertising experience, we may provide you with personalized advertising services that you can receive on TME and third-party partners’ websites, application programs, and other channels. For more information, refer to the privacy guidelines for specific products. If you do not want to receive personalized advertisements, you may also disable them according to the guidelines for specific products.

  1. Protection of Minors

We attach great importance to the protection of minors’ personal information.

11.1 According to relevant laws and regulations, if you are a minor under the age of 18, you shall obtain the consent of your parents or legal guardians before using the products or services of TME.

11.2 We may offer products or services specifically for children under the age of 14, which contain function blocks targeted at children, or products or services that require users to input birthday, age, and other information that can identify the user’s age.

According to relevant laws and regulations, if you are a minor under the age of 14, you shall, before using relevant products or services, obtain the consent of your parents or legal guardians and complete the registration process of the product or service with their assistance by conforming to the registration and use processes, in order to use the products or services we offer.

If you are the guardian of a child, you shall, before helping your child complete the registration and use the product or service, carefully read this Policy and product-specific privacy guidelines (if any), decide whether you agree to such provisions, and help your child register and use the product or service, so that your child can use the products or services we offer.

If you have any questions or claims regarding the personal information protection of the child in your custody, please contact us by the means set out in Section XIII. We will process and respond to you within a reasonable time.

  1. Scope of Application

This Policy applies to all our products or services. However, certain products or services may have their own specific privacy guidelines/statements, which describe more specifically how we handle your information in these services. In case of any inconsistencies between this Policy and the privacy guidelines/statements of specific services, the latter shall prevail.

Please note that this Policy does not apply to products or services provided by other companies or individuals. If you use the products or services of a third party, you are subject to its privacy policy (but not this Policy) and you need to read such policies carefully.

  1. Contact Us

If you have questions about this Policy or other related matters, please contact us at: https://kf.qq.com/. You may also send your questions to qqmusic155@tencent.com or to the following address:

TME Legal Department, 12/F, Building D3, Kexing Science Park, Kejizhongsan Avenue, Hi-Tech Park, Nanshan District, Shenzhen, Guangdong Province, P.R.China

Zip code: 518057

We will review the issues involved as soon as possible and give feedbacks within 15 working days or within the time limit prescribed by laws and regulations.

  1. Changes

We may revise this Policy from time to time. If such changes result in a substantial impairment of your rights under this Policy, we will notify you by prominently indicating the changes on the page or sending you an email before the changes take effect. In terms of privacy protection guidelines for specific products and services, we will seek your consent again in case of changes in processing purpose or method of personal information, or changes in the type of such personal information processed.

 

Date of last revision: December 17, 2021