Data Deletion

Histar Privacy Policy

Last Updated on: 2024.05.01

 

1.About this Policy: 

Thank you for choosing to play our game which is developed by Histar Interactive Pte. Ltd.. (referred to as "we" or "us" hereafter). For any personal data protection concerns, please reach us at zhaorh@hipo.ph.

These Privacy Policy are applicable whenever you play the Game linked to this document. Alongside the Histar Privacy Policy and the Histar Terms of Service, these Policy provide detailed information on how we collect, use, store, and share your personal information during gameplay, as well as the rights you have regarding your data. These Policy are a component of the Histar Terms of Service.

 

2.Terms:

(1) When we mention "the Game(s)", we're talking about the interactive entertainment provided by Histar Interactive Pte. Ltd. This includes not only the primary game but also other games offered by Histar Interactive Pte. Ltd. under this agreement. These encompass a wide array of gaming experiences such as client-based PC games, web games, HTML5 games (H5 games), mobile games, and various other genres. If the Game is distributed as software, it also encompasses any associated software and accompanying documentation.

(2)"The Game's Service" refers to all the online operational services provided by Histar Interactive Pte. Ltd. in relation to the Games.

(3)"You", also known as "player(s)" or "user(s)", denotes any individual who is authorized to access and utilize the Game and its associated services provided by Histar Interactive Pte. Ltd.

 

3.Information Collection:

To enhance your gaming experience and support player interactions, purchases, and other services, we need to collect certain information, including your gaming history, device details, login data, and more. By playing our games, you agree to provide the following information:

(1)Your age or date of birth

(2)Your full name

(3)Your email address

(4)A password

(5)Your game username(s)

(6)Details about the games you play

(7)Your approximate location

(8)Your gaming history

(9)Your device’s operating system and version

(10)Your mobile device’s identifiers, such as Identifier for Advertising (IDFA), and International Mobile Equipment Identity (IMEI)

Your login data

Any additional information that ensures secure access to your account, supports service requests, or improves our services (e.g., survey responses or feedback forms)

To safeguard the physical and mental well-being of minors and encourage responsible internet use, we may enforce stricter anti-addiction measures in line with online gaming regulations. We are also continuously developing and testing new technologies to better protect minors.

You can manage your personal information and authorizations according to the provisions outlined in our Policy.

 

FULL VERSION

We employ a variety of security measures to ensure that your personal information is safeguarded in a reasonably secure manner.

To gain a deeper understanding of how we process personal information, including the types of data we collect and their purposes, please read the full version of the "Histar Privacy Policy."

1. Information We Collect

When you use the Game's Service, Histar Interactive Pte. Ltd. gathers information you voluntarily provide, as well as data generated from your use of the service. This helps us optimize our services and maintain the security of your account.

1.1 Registration and Usage Data

When you register or use the Game's Service, we collect information about your network identity and the personal device you frequently use to identify you as a user. If you log in using a Facebook account or another recognized third-party account ("Third-Party Account"), we collect your unique ID, avatar, and username from that account to store your login information, enabling you to access the game across different devices.

If you use a Facebook or Third-Party Account to log in, we collect the following information to enhance your gaming experience:

(1)Your first and last name

(2)Your profile picture or its URL

(3)Your user ID number (e.g., Facebook ID), which may be linked to other information like your name and profile photo, and your friends' identifiers

(4)Your friends' user ID numbers, names, and profile photos

(5)The email address associated with the third-party account

(6)Nicknames

(7)Your login status, battle information/status, and achievement information related to the Game

(8)Your physical location and the location of the devices you use to access our Service

(9)Your gender

(10)Your birthday and/or age range

(11)Information about your activities on or through the third-party account

(12)Other information you have shared on the third-party account

If you access our Service via a third-party account or connect our Service to one, please review that third-party account's Terms of Service and Privacy Notice to understand what information they share with us. If you are unsure about the data being shared, visit the third-party application to learn more about their privacy practices.

The Game may display some of this information to you, other users, or your friends. Depending on the specific game, we may offer permissions allowing you to adjust settings related to the visibility of such information.

 

1.2 Real-Name Verification and Compliance

To comply with applicable laws, regulations, and policies, and to meet the requirements of regulatory authorities, users may need to undergo real-name verification before accessing and enjoying the Game. By using the Game, you consent to our collection of your real-name ID and other necessary information, which may include:

(1)Your first and last names

(2)Your age or date of birth

(3)ID number

(4)Photos

Failure to provide this real-name ID information may prevent you from logging into the Game or lead to restrictions on your use of the Game.

 

1.3 Ensuring Service Accessibility and Game Optimization

In order to ensure smooth and optimized service provision, and to enhance the performance of our game products for an improved gaming experience and the security of your account, we collect the following information:

(1)Your device's unique ID and name

(2)Device type and version

(3)Operating system version

(4)IP address

(5)Application ID

(6)Network type

 

1.4 Collection of Game Log Information

When you use the Game's Service, we gather your game log information to provide you with access to your game history records on your device. This includes:

(1)Login data

(2)Item logs

(3)Game battle information

(4)Friend relationship records

We use this information for game operation analysis, customer service management, and to enhance game security. Additionally, to improve your Game experience, we may synchronize the above information with later versions of the Game or with other products provided by us.

 

1.5 Transaction History and Virtual Items Protection

When utilizing the Game's purchasing function, we gather your recharge history, purchase records, and related details. This allows you to monitor your transaction history and ensures the utmost protection for your virtual items. Recharge history and purchase records are sensitive information critical for enabling the Game's transaction capabilities. Without this information, transactions cannot be completed.

 

1.6 Ensuring Game Account Security and Fair Play

To safeguard your game account and foster a fair, healthy, and secure gaming environment, we collect information such as your game identity, hardware and operating system details, process logs, and other pertinent data. This is essential for combating behaviors that disrupt fair gameplay or interfere with normal game services, such as detecting cheats, scanning for plugins, and preventing fraudulent activities.

 

1.7 Content Filtering and Regulation

In efforts to maintain a clean and safe gaming environment and uphold legal standards, we may temporarily store and filter information related to reports and specific keywords involving prohibited content. This includes content pertaining to pornography, violence, political extremism, abusive language, terrorism, malicious advertising, and other illicit activities. This ensures the purification of the Game environment and contributes to a healthy internet atmosphere.

 

1.8 Voice and Video Interaction

Should you choose to engage in voice and video interactions with other players or participate in live broadcasts within the Game, we may access your microphone and camera upon your consent. This facilitates features such as voice chatting, interactive broadcasts, and other related functions. Rest assured, we prioritize the privacy of your voice and video data at all times, and you retain the ability to revoke microphone and camera permissions whenever you wish.

 

1.9 Geographic Location for Player Interaction

If you opt to engage with nearby players in the Game, we will request your permission to collect geographic location information. This allows us to match you with nearby players or facilitate team interactions. Geographic location data is considered sensitive information. Declining to provide this information will only affect your ability to interact with nearby players, without impacting other Game functionalities. You retain the right to withdraw authorization for geographic location information at any time.

 

1.10 Game Time Reminder and Health Monitoring

To promote healthy gaming habits, we have implemented a reminder feature for moderate gameplay durations. With your consent, if you use a wearable device, we may also collect data such as your heart rate during gameplay. This enables us to issue reminders when excessive gaming time is detected, promoting balanced gameplay habits.

 

1.11 Preference Analysis and Cross-Product Sharing

We analyze your gameplay data to understand your preferences better. With your consent, we may share these preferences and relevant information with other products and services within the Histar Interactive Pte. Ltd. Group. This enables us to personalize your experience across the Game and other offerings within our group of services.

 

1.12 Legal Basis for Personal Information Collection

In accordance with applicable laws, regulations, and standards, we may collect and use your personal information without requiring additional authorization in the following circumstances:

(1)Where it relates directly to national interests such as national security and defense, or major public interests such as public security, health, or knowledge.

(2)Where it is directly related to criminal investigations, prosecutions, trials, or enforcement of judgments.

(3)Where it is necessary to protect fundamental legal rights such as life, property, and reputation, and obtaining consent is impractical.

(4)Where you have voluntarily disclosed your personal information to the public.

(5)Where personal information is collected from legitimate and publicly available sources such as news reports or government disclosures.

(6)Where it is necessary to fulfill contractual obligations at your request.

(7)Where it is necessary to ensure the safe and stable operation of our products or services, including identifying and rectifying malfunctions.

(8)Where it is necessary for statistical or academic research that serves public interests, provided that personal information is anonymized or de-identified where applicable.

(9)Other circumstances as stipulated by laws and regulations.

 

Rest assured, we uphold strict measures to safeguard the security of your personal information and ensure that it is used solely for legitimate purposes as outlined above.

 

1.13 Updates and Development of Services

Please note that the functions and services we offer are continuously evolving and improving. If we introduce a new function or service that involves collecting your information not covered in the descriptions above, we will inform you separately. This notification may occur through prompts, interactive processes, website announcements, or other methods to obtain your consent. We will clearly explain the content, scope, and purpose of such collection.

Currently, apart from gathering game research data from third-party research organizations to enhance our game products and deliver personalized services, and excluding the use of Third-Party Accounts for login purposes as described in Section 1.1, we do not actively seek your personal information from any third party outside of the Histar Interactive Pte. Ltd. Group. In the future, if the Game requires us to indirectly obtain your personal information from a third party outside our group and process it, we will strictly adhere to relevant laws and regulations. We will also ensure that the third party obtains your consent and guarantees the legality of the information provided.

Rest assured, we maintain rigorous measures to protect the security of your personal information and ensure that it is utilized solely for lawful purposes as outlined above.

 

2. Storage and Security of Information

2.1 Storage Methods and Duration

We prioritize secure storage of your information, utilizing local storage (such as app data caching), databases, and server logs. Generally, we retain your information for as long as necessary to fulfill our service obligations or as required by applicable laws and regulations.

2.2 Location of Information Storage

Personal information collected is stored within Amazon servers located in Singapore, in accordance with pertinent laws and regulations.

2.3 Termination of Product or Service Notice

In the event of discontinuation of a product or service, we will issue a notification as stipulated by relevant laws and regulations, ensuring the protection of your legitimate rights and interests.

3. Information Security

3.1 Security Measures

We are committed to safeguarding user information against risks such as leakage, loss, misuse, unauthorized access, and disclosure. Our security measures encompass technical solutions, robust management systems, and guarantees within our security framework to ensure your personal information remains reasonably protected.

To clarify, our game products are solely for entertainment purposes and do not involve monetary transactions. All in-game currencies and items are intended strictly for enjoyment within the Game.

3.1.1 Technical Safeguards

We employ leading industry practices including firewall protection, encryption (e.g., SSL), de-identification, anonymization, and access controls. Additionally, we continually enhance the security capabilities of software installed on your devices.

3.1.2 Organizational Safeguards

Specialized management regulations, procedures, and organizational structures are established to protect the personal information we collect. This includes strict limitations on authorized access, confidentiality obligations, and regular audits. Violations of these obligations are subject to disciplinary action in accordance with established regulations. We continuously review and update our management practices to prevent unauthorized access, use, or disclosure of user information.

3.1.3 User Responsibility and Assistance

We encourage you to prioritize the protection of your personal information when using our products and services. We provide multiple security options to assist you in safeguarding your personal data effectively.

 

3.2 Handling Security Incidents

In the event of a security incident such as a personal information breach, we activate our emergency response plan promptly to prevent its escalation. We commit to notifying you of any known personal data breach within 72 hours of becoming aware of it, or when we have reasonable grounds to believe such a breach has occurred. Upon identification of a security incident, we will communicate the basic details, our response measures, remedies taken or planned, and provide advice through announcements, push notifications, emails, or other appropriate means. If reaching every user individually proves challenging, we will issue a public notice or employ other suitable methods to alert affected parties.

 

4. How We Utilize Your Information

We adhere strictly to applicable laws, regulations, and agreements with our users, utilizing collected information in accordance with the "Histar Terms of Service" and "Histar Privacy Policy" to enhance service delivery.

4.1 Usage Guidelines

We employ collected information under the following guidelines:

 

4.1.1 Functionality Enhancement:

Utilizing gathered data to provide diverse functions and services, including general gaming features, player interaction capabilities, live broadcasting functionalities, and transactional services.

 

4.1.2 Operational Analysis:

Analyzing product performance based on usage frequency, operational issues, and performance metrics to ensure secure service provision, optimize products, and enhance service quality. We uphold strict separation between your personal information and data utilized in our analytical tools.

 

4.2 Consent Acquisition Process Post-Purpose Change Notification

We use your collected information strictly within the framework outlined in our policies. Should we intend to use your personal data beyond the initially stated purpose or a directly related scope, we will notify you again and seek explicit consent before proceeding with such usage.

 

5. Sharing of Your Information

At present, apart from scenarios outlined in the Policy and "Histar Terms of Service," we do not actively share, provide, or transfer your personal information to external third parties beyond the Histar Interactive Pte.Ltd. Group without your explicit consent. Should the need arise to share your personal information with a third party outside our group, we will first seek your prior express approval or confirm that the third party has obtained your explicit consent.

However, it's important to note the following exceptions and collaborations:

5.1 Third-Party Services and Collaborations

(1) Overseas Developer Entities and Third Parties:

We may share your login information and relevant data generated within the Game with overseas developer entities or relevant third parties for security analysis purposes and to enhance game services, thereby optimizing user experiences. This process ensures continuous improvement and security in our offerings.

 

(2) Bugly SDK Integration:

To monitor and swiftly address any anomalies in our product operations, we may collect relevant personal and sensitive user data, such as installed application details, crash information, Android ID/IDFV, in a de-identified or anonymous format. This data is shared with Bugly SDK operator. For more details, refer to Bugly's privacy policy:
https://static.bugly.qq.com/bugly-sdk-privacy-statement.pdf
 

(3)AppsFlyer SDK Integration:

AppsFlyer SDK integration enables the tracking and analysis of app installations, user engagement, and in-app actions. It collects anonymized data such as app usage metrics, device identifiers (e.g., IDFA, GAID), and campaign information for attribution and performance analytics. For further details, consult AppsFlyer's privacy policy:

https://www.appsflyer.com/legal/services-privacy-policy/

 

4)Google Pay SDK Integration:
Integrating Google Pay SDK facilitates secure payment processing within apps, leveraging encrypted transaction data and user authentication tokens. This SDK collects transaction details, device information, and relevant identifiers to facilitate seamless payment experiences. Refer to Google's privacy practices for comprehensive information:

https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice

 

(5)Facebook SDK Integration:
The Facebook SDK integration enhances app functionality with features like social sharing, analytics, and targeted advertising. It may collect device identifiers, app events, and user interactions for personalized content delivery and performance analysis. Learn more about Facebook's data usage in their privacy policy:

https://opensource.fb.com/legal/privacy/


(6)Firebase SDK Integration:
Firebase SDK integration empowers apps with backend services like analytics, databases, and messaging. It gathers user-specific data such as app usage patterns, crash reports, and device information to optimize app performance and user experience. Explore Firebase's privacy policies for detailed insights:

https://firebase.google.com/support/privacy


(7)Adjust SDK Integration:
Integrating Adjust SDK supports mobile marketing analytics, attribution, and campaign optimization. It captures anonymized data including attribution IDs, app usage metrics, and device identifiers (e.g., IDFA, GAID) for accurate performance measurement. Review Adjust's privacy policy for additional information:

https://www.adjust.com/terms/privacy-policy/

 


(8)AMP SDK Integration:
AMP SDK integration enhances app monetization through targeted advertising and analytics. It may collect data on user interactions, device characteristics, and ad performance metrics to personalize ad content and improve revenue generation. Refer to AMP's privacy policies for comprehensive details:
https://developers.google.com/amp/cache/policies

 

 

5.2 Parental Notification for Minors

In cases where a suspected minor engages in transactions, we endeavor to contact the parent or legal guardian. We inform them of the transaction records and related details to facilitate necessary confirmation and actions on their part.

5.2.1 Special Situations for Disclosure

In compliance with applicable laws, regulations, and standards, we may share, transfer, or publicly disclose personal information without your prior authorization in circumstances including but not limited to:

(1) Matters concerning national security, defense, public security, or public health.

(2) Criminal investigations, prosecutions, trials, and enforcement of judgments.

(3) Protection of vital legal rights and interests such as life and property, where obtaining consent is impractical.

(4) Instances where personal information is publicly disclosed by the individual concerned or collected through legitimate public channels like government disclosures or legitimate news reports.

As our business evolves, transactions such as mergers, acquisitions, or asset transfers may occur. In such cases, we will inform you of any pertinent information and ensure that the new controllers continue to uphold personal information protection standards in accordance with applicable laws and regulations, at a level no less stringent than stipulated in our policies.

 

5.2.2 Circumstances for Sharing Personal Information

(1) National Security and Defense: Personal information may be disclosed if it is directly related to national security and national defense security, as mandated by law to safeguard national interests.

(2) Public Security, Health, or Major Public Interests: Disclosure may occur when personal information directly relates to public security, public health, or other major public interests that require protection or intervention.

(3) Criminal Investigation and Legal Proceedings: In cases of criminal investigation, prosecution, trial, or enforcement of judgments, personal information may be shared as necessary to facilitate legal proceedings and uphold justice.

(4) Protection of Legal Rights and Interests: When it is difficult to obtain consent from the individual but essential to protect material legal rights and interests, such as life, property, or other rights of the individual or others, personal information may be disclosed.

(5) Voluntary Disclosure by the Individual: If the personal information holder voluntarily discloses their own personal information publicly, we may not require further authorization to use or disclose that information as per the individual's actions.

(6) Legitimate and Public Channels: Personal information collected through legitimate and publicly available channels, such as from legitimate news reports or government information disclosures, may be shared or disclosed without prior authorization, provided it complies with applicable laws and regulations.

 

  

6. Data Management: Retention and Deletion Policies

6.1 Retention of Personal Information

Our approach to retaining your personal information is guided by the purpose for which it was collected and the necessity to comply with legal obligations. We ensure that personal information is not kept longer than required for operational purposes or as mandated by law.

6.1.1 General Principle:

Personal information is retained as long as necessary to fulfill the purposes for which it was collected, such as providing our services to you.

6.1.2 Active Account:

We retain personal information associated with your account as long as it remains active. Upon your request to delete your account, we take steps to promptly delete the information, except where retention is necessary for legal or accounting reasons.

6.1.3 Exceptional Retention:

Certain records, such as those related to payments or customer service matters, may be retained beyond account deletion for legal or regulatory compliance purposes.

6.1.4 Archival Purposes:

If personal information must be retained for archival purposes under applicable laws, we ensure such information is stored separately and securely.

 

6.2 Deletion of Personal Information

You have the right to request the deletion of your personal information, and we facilitate this process to respect your privacy preferences.

6.2.1 Account Deletion:

You can delete your account to initiate the removal of personal information associated with it. Contact us at zhaorh@hipo.ph with your account ID and deletion request, and we'll process it promptly.

6.2.2 Data Deletion Callback:

Removing our app triggers a data deletion process. You can also manage data removal through your Facebook settings.

6.2.3 Right to Erasure:

You may request erasure of your personal information if you believe it is no longer necessary or if it is unlawfully processed.

6.2.4 Restriction of Processing:

You can restrict our processing of your personal information while your erasure request is under consideration.

 

6.3 Legal Considerations and Obligations

We may retain personal information if required by law, including for defense against legal claims or to uphold freedom of expression rights. When erasing publicly available personal information, we take steps to inform relevant parties for comprehensive removal.

 

6.4 Secure Data Destruction

Personal information is securely destroyed using technical methods to ensure irrecoverability. Electronic files containing personal information undergo permanent deletion to prevent reproduction.

 

7. Reporting Security Vulnerabilities

If you uncover a security vulnerability affecting any of our products or services at Histar Interactive Pte. Ltd., we encourage you to notify us promptly. We value your contribution and commit to investigating all reports thoroughly to address reasonable vulnerabilities as swiftly as possible.

7.1 How to Report:

To ensure security and confidentiality, please send an email to zhaorh@hipo.ph.

The email shall include the following details:

(1)Affected Products and Versions: Specify the products and software versions you believe are affected by the vulnerability.

(2)Behavior Observed vs. Expected: Describe the behavior you observed due to the vulnerability and what behavior you expected instead.

(3)Steps to Reproduce: Provide a numbered list of steps to reproduce the issue or attach a video demonstration if reproducing the steps is complex.

Upon receipt of your report, Histar Interactive Pte. Ltd. will send an automatic confirmation. If additional information is needed, we will contact you promptly.

 

8. Your Rights

Throughout your use of our Game's Service, we provide you with specific operational settings tailored to the game products you interact with. These settings empower you to search, delete, modify, or withdraw your relevant personal information as needed. Refer to the game product's specific instructions for guidance on these operations. Additionally, we've established channels to receive complaints and reports, ensuring your feedback is promptly addressed.

To exercise your rights concerning personal information, please contact us at zhaorh@hipo.ph.

 

9. Policy Amendments

Periodically, we may update this Policy as necessary. Any amendments will be communicated to you effectively during version updates of the Policy. We encourage you to carefully review the updated Policy or its contents. Your continued use of the Game signifies your consent to our collection, handling, and use of your personal information in accordance with the revised Policy.

 

10. Safeguarding Minors

At Histar Interactive Pte. Ltd., we prioritize the protection of minors' personal information, continuously exploring innovative methods to uphold their rights.

10.1 Commitment to Protection:

We implement robust anti-addiction systems in compliance with online game regulations, safeguarding minors' well-being. Through real-name identification verification, we determine whether an account belongs to a minor. Accounts identified as such are integrated into our anti-addiction system, where we monitor login times and gameplay duration. Our system intervenes when necessary, automatically limiting gameplay and enforcing mandatory exits to promote responsible gaming habits among minors.

10.2 Parental Involvement:

When suspected minors engage in transactions, we proactively reach out to parents or legal guardians for guidance and confirmation, ensuring a healthy online experience.

10.3 Enhanced Measures:

To further promote physical and mental health among minors, we implement stringent anti-addiction measures aligned with online gaming policies. Our ongoing research explores advanced technologies, such as facial recognition for enhanced identity verification during specific game interactions. This technology helps prevent minors from using false identities, fostering a safer gaming environment.

10.4 Sensitive Data Handling:

We may collect game behavior data, including click dynamics, positional data, and voice interactions during gameplay. This information aids in preliminary assessments to determine user age, with voice data anonymized for age group detection. If identified as a minor, enhanced verification protocols like facial recognition may be activated.

10.5 Guidance for Guardians:

Parents and legal guardians play a crucial role in monitoring minors' use of our Game's Service. We encourage guardians to authorize and supervise their children's interactions and information sharing. For inquiries regarding a minor's personal information under your care, please contact us using the details provided in Section 9.

 

11. Disclaimer of Warranties

11.1 Financial Independence:

Our game is solely designed for entertainment purposes and is not associated with monetary transactions. All in-game assets and items are intended strictly for enjoyment within the confines of the game.

 

12. Get in Touch

12.1 Your Feedback Matters:

Should you have any grievances, recommendations, or inquiries concerning the protection of minors' personal information, please direct your correspondence to:

Email: zhaorh@hipo.ph

We prioritize prompt response and aim to address your concerns within 15 days upon verifying your user identity.