OK CHAT PTY LTD Privacy Policy

Effective date: October 1, 2024

OK CHAT PTY LTD (hereinafter referred to as "the Company" or "we") will collect personal

information (hereinafter referred to as "Personal Information") when providing the

Company's applications (Apps), services and websites (collectively, the "Services") ” or

“ personal data”). The Company regards the protection of personal data as one of the most

important management priorities . This includes being transparent about how information

about you is collected, used and shared, and complying with the Data Privacy Act 2009 ( Qld )

(the Data Privacy Act) ( including the Data Privacy Principles implemented by the Act) ( IPPs ) ,

the Spam Act 2003 ( Cth ) and other applicable privacy and data protection legislation. The

Company will also comply with applicable national and regional laws and regulations where

it operates (collectively, the "Applicable Regulations") ), which includes the Privacy Act 1988

and its amendments, as well as the privacy regulations overseen and enforced by the Office

of the Australian Information Commissioner (OAIC), and will be based on this Privacy Policy

(hereinafter referred to as "this Policy" ”) strives to properly protect personal information.

We will review and update the content of this policy regularly.

If you do not agree to this policy, please do not access or use our services or other features .

Through this privacy policy, we explain to you how we collect, use, store and share personal

information, as well as your related rights and other matters. The key points are as follows:

 In order for you to use our services, we need to collect and use your real-name

information in accordance with the requirements of relevant laws and regulations.

 In order to provide you with services and related user interaction, consumption and

other services, we need to collect your service history, device information, login logs

and other information.

 You can manage your personal information and related authorizations as described in

this privacy policy.

 We adopt multi-faceted security protection measures to ensure that the protection of

your personal information is at a reasonable level of security.

  1. Information collected

In order to provide you with a better experience, improve our services and protect

the security of your account, or to use relevant information for other purposes with

your consent, in compliance with relevant laws and regulations, during your use of

the services, The company will collect information that you actively provide when

using the service or that is generated due to the use of the service in the following

ways:

1.1

When you register or use the service, we will collect your account and login

information as online identity information to mark you as a service user. You can

use the methods listed in the service, or other accounts recognized by us

(hereinafter referred to as third-party accounts) to register and associate to log in

to the service.

If you use a third-party account as an account link to log in, we will collect relevant

information related to the third-party account you use to complete registration and

login, as well as friend relationships or other information authorized by you, in

order to link to the third-party account within the service. Friends with third-party

accounts to achieve a better social experience. You can view and manage the

1 authorization of the above information in the platform to which the third-party

account belongs.

1.2

In order to meet relevant laws, regulations, policies and the requirements of

relevant competent authorities, service users need to undergo real-name

authentication to continue to use and enjoy services. We will collect your real-name

identity information (including name, ID number, phone number) with your consent

or when you actively provide it. This information is sensitive information. Refusal

to provide real-name identity information may result in you being unable to log in

to the service or Subject to corresponding restrictions during use of services.

1.3

In order to ensure your normal use of our services, maintain the normal operation

of basic service functions, optimize service content , improve your service

experience and protect your account security, we will collect your device type,

device name, device language, device model and Version, operating system,

system properties, IP address, application ID, network type, device identifier

(including IMEI, IMSI, MAC address, Android ID, hardware serial number), operator

information, running processes, Installation Checklist.

1.4

When you use the service, we will collect your service log information so that you

can view your history on the user terminal, and also use it for service operation

statistical analysis, customer service complaint handling and other service

security analysis to ensure the quality of your service experience. For consistency

and stability, we may synchronize the above information to subsequent updated

versions.

1.5

When you use the consumption function of the service, we will collect your

recharge records and consumption records so that you can check your transaction

records and protect the security of your transactions. Recharge records and

consumption records are sensitive information. The collection of the above

information is necessary to realize the consumption function of the service,

otherwise the transaction will not be completed.

1.6

In order to protect the security of your account and create a fair, healthy and safe

service environment, we will collect your device and identification information,

including device identification code, hardware and system information, process

and service related records, installed application list, services The overall usage

method and service channel source are used to combat behaviors that damage the

fair environment of the service or interfere with or disrupt the normal operation of

the service (generally used to detect malicious programs, scan plug-ins, and

prevent cheating).

1.7

When you interact with other users on the service through text, pictures, voice,

video and other means, we may collect and save the above information you send

through a third-party content security system to filter pornography, violence,

politics, Inappropriate content such as insulting text , malicious advertisements,

etc., in order to maintain a healthy service environment.

1.8

In order to provide you with location-based services, we will collect your

geographical location information (including your nearby Wi-Fi and nearby base

station ID ( CellID )). Geographical location information is sensitive personal

information. Refusal to provide this information will result in you being unable to

use the corresponding location service function, but it will not affect your normal

use of other functions of the service.

2 1.9

If you contact our customer service, we may need you to provide necessary

personal information for identity verification to ensure the security of your account.

In order to provide services based on your requests, customer service personnel

need to query or verify your relevant information within the scope of your

authorization. We will also save your contact information (the mobile phone

number or other contact information you use or actively provide), the records and

content of your communications with us, and other necessary information to

provide and record customer service for you, specifically based on your needs. The

actual authorization and information provided shall prevail .

1.10

You agree that we may collect and/or process your personal information by

ourselves or by entrusting or arranging third parties (including but not limited to

our advertising service partners, data analysis service providers, etc.) for the

following purposes or reasons:

(1) Arrange sales personnel to contact you to provide you with more valuable

information and achieve advertising and promotion purposes .

(2) Used for advertising business cooperation such as advertising delivery,

advertising effectiveness optimization, advertising attribution, and advertising

monitoring.

(3) Information collection and analysis for business analysis and optimization

services.

(4) Verify the authenticity of the information.

(5) Other purposes permitted by laws and regulations.

We will require these third parties to protect your personal information in

accordance with security standards no lower than ours.

1.11

In order to collect the above information, we may apply for some system

permissions from you in specific service business scenarios, and you can choose

whether to authorize it. These system permissions include:

(1) Android-Storage/ iOS -Photos: Provides image saving, uploading, and

downloading functions.

(2) Android-Microphone/ iOS -Microphone: Provides voice communication.

(3) Android-Location/ iOS -Location Services: Provides services based on location

functions.

(4) Android-Calendar/ iOS -Calendar and reminders: event appointments,

reminders.

(5) iOS - Local network: Check the security of the local area network environment,

the connection status of the local area network , and the network speed test.

Denying the above permissions will only affect the specific functions and business

scenarios associated with them, and will not affect your use of other functions.

Please understand that due to different terminal device operating systems, the

permission names on different terminals will be different. You can manage system

permissions through the [Settings] page of the terminal device.

1.12

We may collect and use advertising identification information that complies with

national or industry group standards. This identification is generated based on non

private information such as device model and system configuration.

3 2. Use of COOKIES or similar technologies

Cookie is a neutral technology that allows the website server to store data on the

user side or read data from the user side. Cookie contents are usually encrypted.

Cookies can avoid unnecessary server load, improve service efficiency, and save

resources and energy. For example, cookies can help you fill in the account name

you last logged in through the stored information when you log in, improving your

operational efficiency.

We obtain and use your information through COOKIES or similar technologies, and

store such information as log information. This information may be used for the

following purposes:

(1) Remember your identity and preferences.

For example: COOKIES or similar technologies help us verify your identity

information to ensure the security of your account; or save your browsing traces

to provide us with information about your preferences or preferences.

(2) Analyze how the Services are used. We can use COOKIES or similar technologies

to understand how you use our services and help us provide better products

and services to our users.

There may be COOKIES or similar technologies placed by third-party service

providers on this product service. The collection and use of information related to

you by these third-party COOKIES or similar technologies is not subject to this

policy. Please check the relevant rules of the third-party service provider.

You can refuse or manage COOKIES or similar technologies through your browser

or user selection mechanism. However, if you disable COOKIES or similar

technologies, we may not be able to provide you with the best service experience,

and some services may not work properly.

  1. Storage of information

3.1Method and period of information storage

We store your information in secure ways, including local storage, databases, and

server logs. We will only store your personal information within the time limit

necessary to achieve the purpose of the service and required by relevant laws and

regulations.

3.2 Region where information is stored

We will securely store user personal information collected within the country in

accordance with laws and regulations. If we transfer overseas, we will also comply

with relevant national regulations.

3.3 Notification when the product or service ceases operation

When our products or services cease operations, we will make an announcement in

accordance with relevant laws and regulations, and delete your personal information

after terminating the service or operation, unless otherwise stipulated by laws,

regulations or regulatory authorities . .

If you apply to cancel your account or delete your personal information, we will delete

your personal information, unless otherwise provided by laws and regulations.

  1. information security

4.1 Safety protection measures

We strive to provide user information security protection to prevent information

leakage, loss, improper use, unauthorized access and disclosure, etc. We use multi

faceted security protection measures to ensure that users' personal information

protection is at a reasonable level of security, including technical protection

methods, management system controls, security system guarantees, and many other

aspects.

4 We use appropriate technical protection measures. The technical means we use

include but are not limited to firewalls, encryption (such as SSL), de-identification or

anonymization, access control measures, etc. In addition, we will continue to

enhance the security capabilities of the software installed on your device . We have

established specialized management systems, processes and organizations to

ensure the security of personal information. For example, we strictly limit the scope

of personnel who can access information and require them to comply with

confidentiality obligations. Personnel who violate these obligations will be punished

in accordance with regulations. We will also review the management system,

processes and organization to prevent unauthorized persons from accessing, using

or disclosing user information.

We recommend that you pay full attention to the protection of personal information

when using products and services. We will also provide a variety of security features

to help you protect the security of your personal information.

4.2 Security incident handling measures

If a security incident such as a personal information leak occurs, we will activate

an emergency plan to prevent the security incident from expanding. After a security

incident occurs , we will inform you of the basic situation of the security incident,

the handling measures and remedial measures we are about to take or have taken,

and our response suggestions to you in the form of announcements, push

notifications, or emails. If it is difficult to notify each case one by one, we will issue

warnings through announcements and other means.

  1. How to use information

We strictly abide by various laws and regulations and agreements with users, and

use the collected information in accordance with the "OK CHAT PTY LTD Privacy

Policy " to provide you with better services , including providing various functions

and services based on the collected information ( Including basic functions, user

interaction functions and consumption functions, etc.). In addition, we analyze the

operation of our products based on the frequency and situation of service use,

fault information, performance information, etc. to ensure the safety of the service,

optimize our products, and improve the quality of our services.

Use the collected information within the purposes covered by the privacy policy. If

we use your personal information beyond the scope directly or reasonably related

to the stated purpose at the time of collection, we will inform you again and obtain

your express consent before using your personal information .

  1. provided externally

When you use a third-party account approved by us to use and enjoy our services,

if your account involves any issues such as stored value refunds that require us to

cooperate with the third party for verification, we can share it with such third

parties to the extent necessary. Related information and data. Except for the

circumstances stipulated in the privacy policy and services, we will not actively

share, provide or transfer your personal information to third parties outside the

company. If there is other sharing, provision or transfer of your personal

information or you need us to transfer your personal information to When personal

information is shared, provided or transferred to third parties outside our company ,

we will directly or confirm to obtain your express consent for the above actions. Except

5 as otherwise provided in the " Company Privacy Policy", we will not publicly disclose

the personal information we collect. If public disclosure is necessary, we will

inform you of the purpose of the public disclosure, the type of information

disclosed and the sensitive information that may be involved, and obtain your

express consent .

As our business continues to develop, if our company engages in mergers,

acquisitions, asset transfers and other transactions, we will continue to protect

your personal information in accordance with laws and regulations and standards

no lower than those required by these Guidelines or require new controllers to

continue to protect your personal information. In addition, in accordance with

relevant laws, regulations and standards of various countries, the Company may

share, transfer, and publicly disclose personal information in the following

circumstances without obtaining your prior authorization and consent:

(1) Matters directly related to national security and national defense security .

(2) Matters directly related to public safety, public health, and major public

interests.

(3) Matters directly related to criminal investigation, prosecution, trial and

execution of judgments.

(4) Matters related to the Company’s performance of its obligations under laws

and regulations.

(5) Matters where it is difficult to obtain the consent of the individual information

subject or other people's life, property and other major legitimate rights and

interests.

(6) Personal information subjects disclose personal information to the public on

their own initiative

(7) Collect personal information from legally publicly disclosed information, such

as legal news reports, government information disclosure and other channels.

  1. your rights

7.1 Access, copy, correct, supplement and delete

your use of the service , our company will provide you with corresponding operation

settings depending on the specific conditions of the service, so that you can query,

copy, correct, supplement or delete your relevant personal information. You can

refer to the specific guidelines of the corresponding service to operate. . The

Company will ask you to provide personal information to verify your identity before

processing the request . If you have any doubts or difficulties during the operation ,

you can choose to contact us through the contact information listed in the "Contact

Us" section of this policy, and our company will handle it for you in a timely manner.

Unless otherwise provided by laws and regulations, when you request to delete

your personal information, once the relevant information is deleted, it cannot be

recovered, so please consider it carefully.

7.2 Change the scope of authorization and consent

You can change the scope of your authorization for us to continue collecting

information or withdraw your authorization by deleting information, turning off

device functions, logging out of your account, etc. In addition, you can also contact

us through the contact information listed in the "Contact Us" section of this policy

to withdraw authorization.

7.3 Personal information display and sharing

(1) Your basic account information will be displayed in the service-related

functions you participate in.

6 (2) The information you upload or publish in this service, or the information you

actively share externally, will be displayed to the users within the scope you

choose to publish or share.

(3) When you authorize a third party to obtain your information within the service ,

the third party will disclose your relevant information to you or other users of

the third party within the scope of your authorization. For specific display rules

and how to set the public scope, please pay attention to the relevant rules of

the third party. If you disclose or share information through third-party

channels, our company will not be held responsible for the leakage of your

information. Therefore, our company reminds you and asks you to carefully

consider whether to disclose or share your information.

7.4 Account cancellation

We provide you with a way to cancel your account. Subject to the conditions agreed

in our terms of service and relevant national laws and regulations, you can contact

us through the contact information listed in the "Contact Us" section of this policy,

and we will answer you as soon as possible .

After your account is canceled, our company will stop providing you with all or part

of this product service and delete your personal information based on your request,

unless otherwise provided by laws and regulations. Once the relevant information

is deleted or the account is canceled, it cannot be recovered, so please consider it

carefully.

  1. Third party services

In order to achieve the purposes stated in this policy, the Company may access

program codes provided by third-party service providers or other similar

applications (such as embedded codes, plug-ins, etc.) in order to provide you with

better services and User experience. The third-party service providers we access

mainly include the following types:

(1) Used for advertising-related services, including advertising display, advertising

data monitoring/statistics, etc.

(2) Used for message push functions, including mobile phone push, specific event

reminders, etc.

(3) Used for payment-related services, including order payment, transaction

behavior verification , income settlement, payment information summary

statistics, etc.

(4) Used to obtain device location permission, collect device information and log

information, etc. with your consent.

(5) Used to optimize product performance, including improving hardware

performance, reducing server costs, functional hot fixes, etc.

(6) Used for account security and product reinforcement related services,

including network monitoring, function variable name resolution, anti-hijacking,

anti-spam and anti-cheating, encryption and decryption services, etc.

The Company's access to some third-party codes or similar applications may collect

your personal information. If you use such services provided by third parties in the

Company's services, you agree that your personal information will be collected and

processed directly by them.. The Company will evaluate the legality, legitimacy, and

necessity of such third-party services collecting personal information, require

such third parties to take protective measures for your personal information, and

strictly abide by relevant laws, regulations, and regulatory requirements. The above

third-party services are operated by relevant third parties. Your use of such third

party services (including any information you provide to such third parties) is

subject to the third party's terms of service and information protection statement

(not this policy), and you need to read its terms carefully. This policy only applies

to personal information collected by our company and does not apply to services

provided by any third party or third party's information usage rules.

7 9. Protection of minors

According to relevant laws and regulations, if you are a minor (the definition of

adult, according to the regulations of each state or jurisdiction), you should obtain

the consent of your parent or legal guardian in advance before using our services.

If you are a child under 14 years old , you need to carefully read this policy and the

attached "Children's Personal Information Protection Statement" with your

guardian, and obtain the consent of your guardian before using our services or

providing us with information.

If you are the guardian of a child, before you help your child complete the

registration and use of products or services, you should carefully read this policy

and the attached "Children's Personal Information Protection Statement" and

decide whether you agree to this policy and the attached "Children's Personal

Information Protection Statement" 》And help children register and use it so that

children can use the products or services we provide.

If you have any questions about the personal information of minors or children

under your custody, please contact us through the contact information listed in the

"Contact Us" section of this policy.

  1. change

The Company may revise the Privacy Policy from time to time. When the terms of

the Privacy Policy change, the Company will notify you of the changed guidelines

in an appropriate manner when the version is updated . Please read the changed

privacy protection guidelines or guidelines carefully . If you continue to use the

service, you agree that we collect, process or use your personal information in

accordance with the updated privacy policy.

  1. other

11.1

Note on self-start: In order to ensure the stability of message push within the

service, improve the message arrival rate, and reduce message push delays, the

service may attempt limited self-start during operation (the specific situation may

vary slightly depending on the device brand and system version) ), but will not auto

start frequently.

11.2

This Privacy Policy is a general privacy clause that is uniformly applicable within

the scope of our company's services. The contents stipulated in it, including but

not limited to user rights and information security measures, are applicable to

users of this service.

  1. Contact us

When you have other complaints, suggestions, or questions related to minors'

personal information, you can send your questions to okaychatme@gmail.com . The

company will review and confirm the issues involved as soon as possible and reply

as soon as possible after verifying your user identity.

 

8 Attachment: "Children's Personal Information Protection Statement"

The company attaches great importance to the protection of children's personal

information. We will strictly abide by laws and regulations and follow the following

personal information protection principles to provide children with safer and more

reliable services. The "Children's Personal Information Protection Statement"

(hereinafter referred to as this statement) and the "Privacy Policy" are intended to

explain to guardians (hereinafter referred to as "you") and children our collection,

use, storage and processing of children's personal information and other related

matters. Please understand that if this statement is not provided for, the "Privacy

Policy" shall apply. Where this statement is applicable, if there is any inconsistency

between this statement and the terms of the Privacy Policy, this statement shall

prevail .

If you are a child under 14 years old, you need to read this statement carefully with

your guardian and obtain your guardian's consent before using our products, services

or providing information to the company.

If you are the guardian of a child user, please read carefully and choose whether to

agree to this statement. The Company hopes that you will help us protect children's

personal information, educate and guide children to enhance their awareness and

ability of personal information protection, and guide, remind and require them to use

our products or services and submit personal information with your consent and

guidance. Please read carefully and fully understand the Privacy Policy and this

Statement. By clicking "Agree", you agree that our company will collect, use and

process information about you and the children under your custody in accordance

with the Privacy Policy and this Statement. If you do not agree with the relevant

privacy policy and the contents of this statement or the information necessary to

provide services, you and the children under your supervision may not be able to use

the company's products, services or certain related business functions normally.

  1. Gather information

The company strictly abides by the provisions of laws and regulations and the

agreements with users, and follows the principles of legitimate necessity, safety

and legal use, and collects the following personal information of you and the

children under your supervision.

The company will actively follow the anti-addiction policy requirements of each

state in the country and protect the legitimate rights and interests of children by

activating the anti-addiction system. The company will determine whether the real

name information of the relevant account is that of a child through real-name

identity and other information verification, and then decide whether to include the

account in the anti-addiction system. In addition, the company will collect

information such as children's login time and guide children to use the Internet

healthily through automatic intervention and restrictions at the system level.

When children use the service, the company will collect relevant information. For

details, please refer to the "Privacy Policy" and this statement to learn more about

other children's personal information we collect. If we need to collect personal

information from you or the children under your custody beyond the scope of

collection, we will inform you again and obtain your consent.

  1. How to use information

The company strictly abides by laws and regulations and agreements with users,

and uses the information collected from children under your custody for the

following purposes:

(1) Verify child and guardian identity.

(2) To provide our products or services, or specific features of our products or

services.

9 (3) Used for product or service optimization, security assurance, service

investigation purposes, etc.

(4) If the company needs to use the personal information of children under your

supervision beyond the above purposes, we will inform you again and obtain

your consent.

  1. provided externally

Under normal circumstances, the Company will not share children's personal

information with third parties. The Company may share children's personal

information with third parties only with the prior consent of the guardian.

For the sole purpose of external processing, the Company may share children's

personal information with third-party partners (third-party service providers,

contractors, agents, application developers, etc.) and ask them to follow our

instructions and privacy policy and relevant confidentiality and security policies to

handle the above information.

If the company entrusts a third party to process children's personal information,

the company will sign an entrustment agreement with the entrusted party and the

entrusted behavior, requiring the entrusted party's processing behavior not to

exceed the scope of our authorization and requiring the entrusted party to take

measures such as formulating internal management systems and Operating

procedures, classification management of personal information, and adoption of

corresponding encryption, de-identification and other security technical measures.

The Company may anonymize the collected children's information for analysis,

such as forming user analysis that does not contain any personal information.

As the company's business continues to develop, the company may conduct

mergers, acquisitions, asset transfers and other transactions. The company will

require new controllers to continue to protect children's personal information in

accordance with laws and regulations and standards no lower than those required

by this statement. .

According to relevant laws and regulations, the Company may share, transfer, and

publicly disclose children's personal information without obtaining your prior

authorization and consent under the following circumstances:

(1) Matters directly related to national security and national defense security.

(2) Matters directly related to public safety, public health, and major public

interests.

(3) Matters directly related to criminal investigation, prosecution, trial and

execution of judgments.

(4) Matters related to the Company's performance of its obligations under laws and

regulations.

(5) To protect the personal information subject or other people's life, property and

other major legitimate rights and interests, but it is difficult to obtain the

individual's consent.

(6) Personal information subjects disclose personal information to the public on

their own initiative.

(7) Collect personal information from legally publicly disclosed information, such

as legal news reports, government information disclosure and other channels.

10 4. storage of information

The company will take technical measures such as encryption to store children's

personal information to ensure information security. The Company will not store

children's personal information beyond the period necessary to achieve the

purpose of collection and use. Please refer to the relevant sections of the Privacy

Policy to learn more about how the company stores and protects children's

personal information.

When our products or services cease operations, we will notify you and children in

the form of push notifications, announcements, etc., and delete or anonymize

children's personal information within a reasonable period.

Please make sure you and your children keep your service account, password and

other identity factors properly. If you find that your account number, password

and/or other identity elements may or have been leaked, please contact the

company immediately so that the company can take appropriate measures in a

timely manner to avoid or reduce related losses.

  1. Information management

While children are using our company's services , you can manage children's

personal information through the contact information provided by our company.

The company will respond to your needs after verifying your questions. Please

understand that during the verification process, the company may require

guardians and/or children to conduct identity verification to ensure information

security.

5.1 Access to children’s personal information

You and the children under your supervision can view the personal information

provided or generated by child users when using our company's services, including

but not limited to account information, personal information, actively posted

content, etc.

5.2Correction of children’s personal information

When you and the children under your supervision find errors in the children's

personal information collected, used and processed by the Company, you can

contact us for correction. The company will take timely measures to correct the

problem after completing the identity verification and verification .

5.3Delete children’s personal information

If the following circumstances exist, you and the children under your supervision

can request the Company to delete the children's personal information collected,

used and processed. The company will take timely measures to delete it after

completing the identity verification and verifying the problem . Please note that if

you and the children under supervision request us to delete the personal

information of a specific child, it may result in the child user being unable to

continue to use our products and services or certain business functions in the

products and services.

(1) The Company collects, stores, uses, transfers and discloses children's personal

information in violation of laws, administrative regulations or the agreement

between the parties .

(2) Collect, store, use, transfer, and disclose children's personal information

beyond the scope of purpose or necessary period

11 (3) you withdraw your consent

(4) You or the children under your supervision terminate the use of the service by

logging out or other methods.

  1. change

The Company may update this statement from time to time based on service

updates and/or relevant laws and regulations. When the terms change, the

Company will notify you of the changed guidelines in an appropriate manner when

the version is updated . Please read the changed privacy policy and this statement

carefully. If you do not agree to the changes, you can choose to ask children to stop

using our products or services; if children still continue to use our products or

services, it means you agree. We collect, process or use your child's personal

information in accordance with the updated Privacy Policy and this Statement.

  1. Contact us

If you have any questions about this statement or other related matters, please

contact us through the contact information listed in this article. We will review the

issue as quickly as possible and respond within fifteen working days after verifying

your user identity .

 

12 Memo - Directory of Third-Party Service Providers

Online payment service partner

WEB ACTIVE CORPORATION PTY LTD

ABN: 32 086 209 403

Purpose of use: Online payment used by users within the application

Company official link: https://www.eway.com.au/

13