Privacy Policy

This Privacy Policy (hereinafter referred to as "this Policy") was published and came into effect on May 10, 2024, and was last revised on May 10, 2024. It is a valid contract regarding the privacy protection of the APP product [Epimini Short Drama] (hereinafter referred to as "this Product"). By clicking to confirm this agreement or accepting it in any other way, you indicate that you agree to all the following terms of this Policy. [Epimini Short Drama] is the registered copyright owner of this product and legally enjoys the copyright of this product. This software is operated by Epimini Short Drama and provides services to you, and you are legally entitled to rights, fulfill obligations, and bear legal responsibilities. This Policy will help you understand the following:

1. How we collect and use your personal information
2. How we disclose your personal information publicly
3. How we protect your personal information
4. Your rights
5. How we handle children's personal information
6. How your personal information is transferred globally
7. How this Policy is updated
8. The applicability of this Policy
9. Dispute resolution
10. Contact us


The registered copyright owner of this product attaches great importance to the protection of personal information. When you use our products or services, we may collect and use your relevant information. Once you choose to use our products or services, it means you recognize and accept the existing content of this term and its possible updates at any time. If you disagree, you should stop using the services of this product. Please read and understand this "Privacy Policy" carefully before using our products.

1. How we collect and use your personal information: Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information, or reflect the specific activities of a natural person. The registered copyright owner of this product will only collect and use your personal information for the following purposes, methods, and scope when providing reading services to you as described in this Policy: To make these points more concise, clear, and easy to understand, we have provided you with a "Clear List of Collected Personal Information" that you can click on for further review.

1. Application function one: becoming a registered user When you apply to become a registered user of this product, you need to provide the following information: your device information. The information you provide authorizes us to continue using it during your use of this service. When you cancel your account, we will stop using and delete the above information.

2. Application function two: ordering and payment When you use this product, records generated when paying for short drama services, including order records, consumption records, and payment records, will be stored on our server. The above information is necessary for product functions. If you do not agree to our recording of the aforementioned information, we will not be able to provide you with short drama purchase and viewing services.

1. Transfer We will not transfer your personal information to any company, organization, or individual, except in the following cases:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

2. In the case of mergers, acquisitions, or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise, we will ask the company or organization to seek your authorization again.

2. How we disclose your personal information publicly We will only disclose your personal information in the following cases:

1. After obtaining your explicit consent;
2. Disclosure based on the law: In the case of legal requirements, legal procedures, litigation, or mandatory requirements from government authorities, we may disclose your personal information.
3.Types of personal information that may be involved in external sharing: device identification code, product version information; Types of personal information that may be disclosed publicly: viewing episodes, viewing duration.

We are aware of the corresponding legal responsibilities for sharing, transferring, and publicly disclosing personal information and will take reasonable measures to ensure the security of personal information.

How we protect and store your personal information
(1) Technical protection measures
We attach great importance to the security of your personal information and will strive to take various reasonable security measures that meet industry standards to protect your information, so that your information is not leaked, damaged, or lost, including but not limited to SSL, encrypted storage of private information, and access control to data centers. We will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information.

(2) Security management system
We have an industry-leading data-centric security management system that revolves around the data lifecycle, enhancing the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, product technology, and personal information security impact assessment. We also have strict management for employees or contractors who may come into contact with your information, including but not limited to different access controls based on positions, signing confidentiality agreements with them, and monitoring their operations.

(3) Account protection
Your accounts have security protection functions, please keep your account and password information properly. If you find that your account has been misused or your personal information has been leaked, please contact us in time so that we can take corresponding measures.

(4) Information security incident handling Despite the aforementioned security measures, please also understand that there is no "perfect security measure" on the information network.


If a personal information security incident occurs, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or will take, your suggestions for self-protection and risk reduction, and remedies for you. We will inform you by phone, notification, and other means, and if it is difficult to inform each individual, we will take reasonable and effective ways to publish announcements. At the same time, we will also report the handling of personal information security incidents as required by the supervisory authorities.

(5) Retention period
We only store your personal information in mainland China. We will take all reasonable and feasible measures to ensure that we do not collect irrelevant personal information. We will only retain your personal information for the shortest period required by law to achieve the purpose stated in this policy, unless it is necessary to extend the retention period or is allowed by law. After your personal information exceeds the retention period, we will delete your personal information or anonymize it according to the requirements of laws and regulations.

4. Your rights
In accordance with relevant laws, regulations, and standards in the US, we protect your rights to exercise the following over your personal information:

(1) Access to your personal information
You have the right to access your personal information through the user center, except for exceptions stipulated by laws and regulations.


(2) Correction of your personal information When you find that there are errors in the personal information we handle about you, you have the right to ask us to correct it. How to correct personal information can be seen in (6) how we respond to your request.


(3) Deletion of your personal information In the following situations, you can request us to delete your personal information:

1. Our behavior of processing personal information violates laws and regulations;
2. We collect and use your personal information without your consent;
3. Our behavior of processing personal information violates the agreement with you;
4. You no longer use our products or services, or you have canceled your account;
5. We no longer provide you with products or services.

How to delete personal information can be seen in (6) how we respond to your request. If we decide to follow your request, we will also notify the entities that have obtained your personal information from us to delete it in a timely manner, unless there are other provisions in laws and regulations, or these entities have obtained your independent authorization. After you delete information from our services, we may not immediately delete the corresponding information in the backup system, but we will delete this information when the backup is updated.


(4) Withdrawal of consent, closing of functional use You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by turning off device functions. You can also withdraw all authorization for us to continue collecting your personal information by canceling your account. How to withdraw consent and close functional use can be seen in (6) how we respond to your request.


(5) Account cancellation You can cancel the account registered before at any time. After canceling the account, we will stop providing you with products or services and delete your personal information, except as stipulated by laws and regulations.


In the following situations, in accordance with the requirements of laws and regulations, we will not be able to follow your request to delete personal information:


1. Directly related to national security and national defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to crime investigation, prosecution, trial, and execution of judgment;
4. There is sufficient evidence that you have subjective malice or abuse of rights;
5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
6. Involving trade secrets.


(6) Response to your above requests You can choose to close the permissions you want to close through the mobile phone "Settings" function. You can also view your personal information through the personal center, and you can click "My"