This policy only applies to the products, websites and other services of the Shanghai Institute of Technology Minecraft Club(hereinafter referred to as "we").
All contents of this policy are subject to the final interpretation of the Minecraft Club of Shanghai Institute of Technology.
Last updated date: May 19, 2025
This policy will help you understand the following:
I. How do we collect and use your user information
II. How do we use Cookies and similar technologies
III. How do we share, transfer or publicly disclose your user information
IV. How do we protect your User Information
V. Your Rights
VI. How do we handle children's personal Information
VII. How is your user information stored and transferred overseas
VIII. How will this policy be updated
IX. How to Contact Us
Please read and understand this Privacy Policy carefully before using our products (or services).
I. How do we collect and use your user information
We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose for yourself whether to provide this information. However, in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to the problems you encounter.
When you use our services, you allow us to collect information that you provide to us on your own or that is necessary for us to provide you with services, including: account nickname, password, password protection options, email address, device information,Cookies、Game information (including network information, game behavior, and all user information generated by the interaction between the game client and our server), etc.
- If you register for our user center through the Information portal of Shanghai Institute of Technology, our user Center will only store the password of the unidirectional encrypted and irrecoverable unified authentication system account as the default password for the user center account.
- If you register for our user Center using a unified authentication system account supported by Eduroam of Shanghai Institute of Technology, our user center will only store the password of the unidirectional encrypted and non-recoverable unified authentication system account as the default password for the user Center account.
The information you provide above will be continuously authorized for our use during your use of this service. When you stop using our services, you can choose to contact us to delete the above information.
We guarantee that we will process the collected user information in accordance with the law to de-identify or anonymize it. Information that cannot identify the personal identity of a natural person alone or in combination with other information does not fall under the category of personal information in the legal sense. If we combine non-personal information with other information to identify your personal identity, or use it in combination with your personal information, during the period of combined use, we will treat such information as your personal information and process and protect it in accordance with this Privacy Policy.
In order to better operate and improve our technology and services, when the collection, use or processing of user information required for the products or services we provide exceeds the above scope, or when the collected user information is to be used for other purposes not specified in this Privacy Policy, or when we are to use the information collected for a specific purpose for other purposes, We will notify you within a reasonable period after obtaining your information or before processing it, and obtain your authorization and consent.
(2) Exceptions to obtaining authorization and consent
Please understand that in accordance with laws, regulations and relevant national standards, in the following circumstances, we do not need to obtain your authorization and consent to collect and use your user information:
1. Directly related to national security and defense security;
2. Directly related to public security, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial and the enforcement of judgments, etc.
4. Where it is necessary to safeguard your or another individual's major legitimate rights and interests such as life and property, but it is difficult to obtain your consent;
5. The user information we have collected about you is that you have voluntarily disclosed to the public.
6. Your user information collected from legally disclosed public sources, such as legitimate news reports, government information disclosure channels, etc.
7. As necessary for the conclusion or performance of the contract as per your requirements;
8. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling faults of software and related services;
9. Where the personal information controller is a news organization and it is necessary for it to carry out legal news reporting;
10. Where academic research institutions conduct statistics or academic research necessary for the public interest and provide the results of academic research or description to the outside, and de-identify the personal information contained in the results.
11. Other circumstances as prescribed by laws and regulations.
II. How do we use Cookies and similar technologies
(1) Cookies
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, as well as some numbers and characters. With the help of cookies, websites can store your access preference data.
We will not use cookies for any purpose other than those described in this policy.You can manage or delete cookies according to your own preferences. You can clear all cookies saved on your computer. Most web browsers have the function of blocking cookies. But if you do so, you will need to change the user Settings yourself every time you visit our website.
(2) Website beacons and pixel tags
In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our website.For example, the emails we send to you may contain click urls linking to the content on our website.
If you click on this link, we will track this click. Web beacons are usually transparent images embedded in websites or emails. With the help of pixel tags in emails, we can know whether an email has been opened. If you do not wish your event to be tracked in this way, you can unsubscribe from our mailing list at any time.
(3) Do Not Track
Many web browsers have the Do Not Track function, which can publish Do Not Track requests to websites.At present, major Internet standards organizations have not established relevant policies to stipulate how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our websites will respect your choice.
III. How do we share, transfer or publicly disclose your user information
(1) Sharing
We will not share your user information with any other company, organization or individual, except in the following circumstances:
Sharing with explicit consent: We will share your user information with other parties only after obtaining your explicit consent.
2. We may share your user information with third parties in accordance with the provisions of laws and regulations or as required by the competent government authorities.
For the companies, organizations and individuals with whom we share user information, we will enter into strict confidentiality agreements with them, requiring them to handle user information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
We will not transfer your user information to any company, organization or individual, except in the following circumstances:
Sharing with explicit consent: We will share your user information with other parties only after obtaining your explicit consent.
(3) Public Disclosure
We will only disclose your user information publicly under the following circumstances:
1.After obtaining your explicit consent;
2. Disclosure Based on law: We may disclose your user information publicly when required by law, legal procedures, litigation or by government authorities.
(4) Exceptions where prior authorization and consent are obtained when sharing, transferring or publicly disclosing information
Please understand that in accordance with laws, regulations and relevant national standards, in the following circumstances, we do not need to obtain your authorization and consent to collect and use your user information:
1. Directly related to national security and defense security;
2. Directly related to public security, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial and the enforcement of judgments, etc.
4. Where it is necessary to safeguard your or another individual's major legitimate rights and interests such as life and property, but it is difficult to obtain your consent;
5. Information that you disclose to the public on your own initiative;
6. Your user information collected from legally disclosed public sources, such as legitimate news reports, government information disclosure channels, etc.
IV. How do we protect your User Information
(1)We have adopted industry-standard security measures to protect the user information you provide, preventing unauthorized access, public disclosure, use, modification, damage or loss of the data. We will take all reasonable and feasible measures to protect your user information.For example, it is protected by SSL encryption when exchanging data between your browser and the "Service"; We also provide https secure browsing for the website. We will use encryption technology to ensure the confidentiality of data. We will use trusted protection mechanisms to prevent data from being maliciously attacked. We will deploy access control mechanisms to ensure that only authorized personnel can access user information.
(2)We will take all reasonable and feasible measures to ensure that no irrelevant user information is collected.We will only retain your user information for as long as necessary to achieve the purposes described in this policy, unless an extension of the retention period is required or permitted by law.
(3) The Internet is not an absolutely secure environment. Moreover, emails, instant messaging, and communication methods with other users are not encrypted. We strongly recommend that you do not send user information through such means.
- The Internet environment is not 100% secure. We will do our best to ensure the security of any information you send to us.Even if we have made great efforts and taken all reasonable and necessary measures, it is still possible that we cannot prevent your user information from being illegally accessed, stolen, tampered with or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of the information network and voluntarily bear them.
- In the event of an unfortunate user information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or will take to handle it, suggestions for you to independently prevent and reduce risks, and the remedial measures for you, etc.We will promptly inform you of the relevant circumstances of the event through email, letter, phone call, push notifications and other means. When it is difficult to inform each user information subject individually, we will issue a public announcement through reasonable and effective means.
V. Your Rights
In accordance with relevant laws, regulations and standards in China, as well as common practices in other countries and regions, we guarantee that you can exercise the following rights over your user information
(1) Access your user information
You have the right to access your user information, except in cases where exceptions are stipulated by laws and regulations.If you wish to exercise your data access rights, please contact us by email (wotsginger@outlook.com). We will respond to your access request within 30 days.
(2) Correct your user information
When you find that the user information we have processed about you is incorrect, you have the right to request us to make corrections.You can submit a correction request through the methods listed in "(1) Access Your User Information". We will respond to your correction request within 30 days.
(3) Delete your user information
In the following circumstances, you may request us to delete your user information:
1. If our handling of user information violates laws and regulations;
2. If we collect or use your user information without obtaining your consent;
3. If our handling of user information violates the agreement with you;
4. If you no longer use our products or services, or if you cancel your account;
5. If we no longer provide you with products or services.
We will evaluate based on your deletion requestIf the relevant regulations are met, we will take the corresponding steps to handle it.When you make a deletion request to us, we may ask you to verify your identity to ensure the security of your account. When you delete information from our service, due to applicable laws and security technologies, we may not immediately remove the corresponding information from our backup systems. We will securely store your information until the backup can be cleared or anonymized.
(4) Alter the scope of your authorization and consent
Each business function requires some basic user information to be completed (see "Part One" of this policy). You may grant or withdraw your authorization and consent at any time for the collection and use of user information. You can operate it by yourself in the following way: Supplement and change the access method of user information
When you withdraw your consent, we will no longer process the corresponding user information.Please also note that your withdrawal of authorization and consent may lead to certain consequences, such as our inability to continue providing you with the corresponding services or specific functions. However, your decision to withdraw consent will not affect the processing of user information that was carried out based on your previous authorization.
(5) User information subject cancels account
You can cancel your previously registered account at any time. You can do it yourself by visiting our websiteUser Center.Log in to your account - select "User Center" - "Profile" - in the "Delete Account" TAB, choose the "Delete My Account" option
After you cancel your account, we will cease providing you with products or services and, upon your request, delete or anonymize your information, except as otherwise required by laws and regulations. This may also result in your loss of access to the data in your account. Please operate with caution.
(6) The user information subject obtains a copy of the user information
You have the right to obtain a copy of your user information. You can contact us by email (contact@sitmc.club).
Subject to technical feasibility, such as data interface matching, we can also, upon your request, directly transmit a copy of your user information to the third party you specify.
(7) Respond to your above request
For security reasons, you may need to verify your identity first before we process your request. We will reply within thirty days.
For your reasonable requests, we generally do not charge any fees. However, for repeated requests that exceed a reasonable limit, we may charge a certain cost fee depending on the circumstances.We may refuse requests that are groundlessly repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes to current practices), pose risks to the legitimate rights and interests of others, or are highly impractical. Please also understand that due to security considerations, requirements of relevant laws and regulations, or technical limitations, we may not be able to respond to some of your requests, such as in the following situations:
1. Related to the obligations of the user information controller as stipulated by laws and regulations;
1. Directly related to national security and defense security;
2. Directly related to public security, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial and the enforcement of judgments, etc.
5. Where the user information controller has sufficient evidence to show that the user information subject has malicious intent or is abusing their rights;
4. Where it is necessary to safeguard your or another individual's major legitimate rights and interests such as life and property, but it is difficult to obtain your consent;
7. Responding to the request of the user information subject will cause serious damage to the legitimate rights and interests of the user information subject or other individuals or organizations;
8. Involving trade secrets.
VI. How Do We Use Children's Information
Our products, website and services are mainly targeted at adults and do not serve children. Although laws and customs in different regions define children differently, we consider anyone under the age of 14 to be a child.
VII. How is your user information stored and transferred overseas
In principle, user information collected and generated within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. We will only retain your user information for the period necessary to fulfill the purposes and uses described in this policy and for the minimum period stipulated by laws and regulations. After the retention period, we will delete your user information or anonymize it in accordance with the requirements of applicable laws and regulations. Except as otherwise provided by laws and regulations, or for the purposes of public interest, scientific and historical research, or with your separate authorization and consent, we may need to retain relevant data for a longer period of time.
As we provide products or services through some overseas servers, this means that with your authorized consent, your user information may be transferred to a jurisdiction outside the country/region where you use the products or services, or be accessed from these jurisdictions.
Such jurisdictions may have different data protection laws, or even no relevant laws at all.In such cases, we will ensure that your user information receives sufficient and equivalent protection within the territory of the People's Republic of China.For instance, we may request your consent for the cross-border transfer of user information or implement security measures such as data de-identification before cross-border data transfer.
VIII. How will this policy be updated
Our privacy policy may change. Without your explicit consent, we will not reduce the rights you are entitled to under this Privacy Policy.我们会在本页面上发布对本政策所做的任何变更。
For major changes, we will also provide more prominent notifications. The major changes referred to in this policy include but are not limited to:
1.Our service model has undergone significant changes. Such as the purpose of processing user information, the types of user information processed, the way user information is used, etc.
2. The main objects to which user information is shared, transferred or publicly disclosed change;
3. There are significant changes to your rights regarding user information processing and the ways to exercise them;
IX. How to Contact Us
If you have any questions, comments, or suggestions regarding this Privacy Policy, please contact us through the following methods:
Email: contact@sitmc.club
Our management team includes members specifically responsible for external communications. You may contact the relevant personnel through the following methods:
Email: wotsginger@outlook.com
Generally, we will respond within thirty days.