User privacy policy introduction: we regard user information security and privacy protection as our "lifeline". Adhering to the concept of "all based on user value", we are committed to improving the transparency of information processing, enhancing your convenience in information management, and ensuring your information and communication security. We strictly abide by laws and regulations, follow the following privacy protection principles, to provide you with more secure and reliable services:
1. Safety and reliability: We do our utmost to prevent your information leakage, damage and loss through reasonable and effective information security technology and management process.
2. Selfdetermination: We provide you with convenient information management options, so that you can make appropriate choices and manage your personal information.
3. Protecting communication secrets: We strictly abide by laws and regulations, protect your communication secrets, and provide you with secure communication services.
4. Reasonable and necessary.... Introduction to User Privacy Policy We regard user information security and privacy protection as our "lifeline". Adhering to the concept of "all based on user value", we are committed to improving the transparency of information processing, enhancing your convenience in information management, and ensuring your information and communication security. We strictly abide by laws and regulations, follow the following privacy protection principles, to provide you with more secure and reliable services:
1. Safety and reliability: We do our utmost to prevent your information leakage, damage and loss through reasonable and effective information security technology and management process.
2. Selfdetermination: We provide you with convenient information management options, so that you can make appropriate choices and manage your personal information.
3. Protecting communication secrets: We strictly abide by laws and regulations, protect your communication secrets, and provide you with secure communication services.
4. Reasonable Necessity: In order to provide better service to you and other users, we only collect necessary information.
5. Clear and transparent: We strive to use concise and easy-to-understand expressions to introduce you to privacy policies so that you can clearly understand our information processing methods.
6. Integrate privacy protection into product design: We integrate various factors such as law, product and design into the concept of privacy protection in every link of product or service development. This Privacy Policy mainly tells you what information we collect; the use of information we collect; and your rights. I hope you will read the Privacy Policy carefully and understand in detail how we collect and use information so that you can better understand our services and make appropriate choices. If you use our service, it means that you agree with what we have said in this policy.
1. The information we collect is based on the principles of legality, legitimacy and necessity, and we only collect the information necessary to realize the function of the product.
1.1 information you voluntarily provide when you use our services.
1.1.1 the information you fill in when you register your account. For example, the nickname and cell phone number you wrote when you registered your account.
1.1.2 upload information when you are using the service. For example, when you use your account, upload your avatar and share photos.
1.1.3 information you sent through our customer service or participate in our activities. For example, the questionnaire you filled out when you participated in our online activities may contain your name, telephone number, home address and other information.
1.2 we get information when you use the service.
1.2.1 log information. When you use our services, we may automatically collect relevant information and store it as service log information.
(1) equipment information. For example, information such as device type, operating system version, unique device identifier, battery, signal strength, etc.
(2) software information. For example, the version number and browser type of the software. To ensure the security of the operating environment or to provide services, we will collect information about mobile applications and other software you use.
(3) IP address.
(4) service log information. For example, when you use our service, you search, view information, service failure information, referral website and other information.
(5) communication log information. For example, the account, communication time and time that you used to communicate when we used our service.
1.2.2 location information. When you use location-related services, we may record the location information of your device in order to provide you with relevant services.
(1) The information provided by you or other users when using the service may contain the location information of your location, such as the information of your location in the account information you provide, the geographic tag information contained in the photos shared by you or others;
1.3 Information shared by other users contains your information, for example, photos or videos shared by other users may contain your information.
1.4 Information obtained from third-party partners may provide information that you generate or share when using thirdparty partner services. For example, when you log in to the third party partner service with Wechat or QQ account, we will get the name and time of your login to the third party partner service, which will facilitate your authorization management. Please read carefully the user agreement or privacy policy of the third party partner service.
2. How do we use the collected information? We strictly abide by the laws and regulations and the agreement with users. We use the collected information for the following purposes. If we use your information for more than the following purposes, we will explain it to you again with your consent.
2.1 to provide you with services.
2.2 meet your personalized needs. For example, language settings, location settings, personalized help services.
2.3 product development and service optimization. For example, when our system fails, we record and analyze the information generated when the system fails, and optimize our services.
2.4 safety assurance. For example, we will use your information for authentication, security, anti-fraud monitoring, archive backup, customer security services and other purposes. For example, the security software you download or install will detect malicious programs or viruses, or identify fraudulent information for you.
2.5 recommend to you what advertisements and information you may be interested in.
2.6 evaluate and improve our advertising and other promotional and promotional activities.
2.7 management software. For example, software certification and software upgrading.
2.8 invite you to take part in the investigation of our service. In order to let you have a better experience, improve our services or other uses with your consent, we may use the information collected by some services for other services in accordance with relevant laws and regulations. For example, use your information when using one of our services to show you personalized content or advertisements in another service, and use it for user research, analysis and statistics. To ensure the security of the service and help us better understand how our application works, we may record relevant information, such as how often you use the application, failure information, overall usage, performance data, and the source of the application. We will not combine the information we store in the analysis software with the personal identity information you provide in the application.
Third, how can we use Cookie and related technologies, or our third-party partners, to collect your information, possibly by placing secure Cookies and related technologies, in order to provide you with more personalized user experience and services? We will strictly request the third party partners to comply with the relevant provisions of this policy. You can also configure Cookie by browser. Note, however, that if you disable Cookie, you may not be able to enjoy the best service experience and some services may not work properly. If you want to know more about the security of Cookie, please refer to the Cookie policy statement.
Fourth, you can share your information with your friends, family members and other users through our service. Please note that this may include sensitive information such as your personal identity information, personal property information and so on. Please carefully consider disclosing your personal sensitive information. You can control the range of information you share through the privacy settings in our service, or you can delete the information you publicly share through the settings in the service or the guidelines we provide. But please note that this information may still be kept independently by other users or unrelated third parties outside our control.
Five, how do you manage your own information?
5.1 You can access, modify and delete the registration information and other personal information provided by you in the process of using our service. You can also contact us in accordance with the notification guidelines. The scope and mode of your access, modification and deletion of personal information will depend on the specific services you use. For example, if you want to stop sharing your geographic location information when using geographic location-related services, you can stop sharing through the mobile location shutdown function, the shutdown mode of software and hardware service providers and communication service providers. It is recommended that you read the relevant guidelines carefully.
5.2 According to this policy, we will collect and use your information only to realize the functions of our products or services. If you find that we violate the provisions of laws, administrative regulations or the agreement between the two sides to collect and use your personal information, you can ask us to delete it. If you find that your personal information we collect and store is wrong, you can also ask us to correct it. Please contact us through the contact information listed in this policy.
5.3 When you visit, modify and delete relevant information, we may require you to authenticate to ensure the security of your account.
5.4 Please understand that due to technical constraints, legal or regulatory requirements, we may not be able to meet all your requirements. We will respond to your request within a reasonable period of time.
6. The information we share is strictly restricted by laws and regulations, such as:
6.1 with your prior consent, we may share your personal information with the third party.
6.2 For external processing purposes only, we may work with third-party partners (third-party service providers, contractors, agents, advertising partners, application developers, etc.), e.g., communication service providers who send e-mail or push notifications on behalf of us, map service providers who provide location services for us. They may not be in your jurisdiction) to share your personal information and allow them to process the above information for us in accordance with our instructions, privacy policies and other relevant confidentiality and security measures for the following purposes:
6.2.1 to provide you with our services; 6.2.2 to achieve the purpose described in the section "How do we use the collected information";
6.2.3 fulfilling our obligations and exercising our rights in this policy;
6.2.4 understands, maintains and improves our services. If we share your information with the above-mentioned third parties, we will use encryption, anonymous processing and other means to protect your information security.
6.3 With the sustained development of our business, when mergers, acquisitions, asset transfers and other transactions lead to the sharing of your personal information with third parties, we will inform you of the relevant situation by pushing notifications, announcements and other forms, and continue to protect or require new managers in accordance with laws and regulations and standards not less than those required by this policy. Continue to protect your personal information.
6.4 we will use the collected information for big data analysis. For example, we will use the information collected to analyze and form city thermodynamic plans or industry insight reports that do not contain any personal information. We may publicize and share with our partners information that is statistically processed and does not contain identifying content, to understand how users use our services or to inform the public about the general trends in the use of our services.
6.5 we may disclose your personal information for the following purposes:
6.5.1 comply with applicable laws and regulations.
6.5.2 complying with the provisions of court judgments, rulings or other legal procedures;
6.5.3 comply with the requirements of relevant government agencies or other statutory authorized organizations.
6.5.4 we have reason to believe that we need to comply with relevant laws and regulations.
6.5.5 Reasonable and necessary uses for the implementation of relevant service agreements or policies, the maintenance of social and public interests, and the protection of personal property safety or other legitimate rights and interests of our customers, our affiliated companies, other users or employees.
Seven, we may send information to you.
7.1 When you use our service, we may send you e-mail, short message, information or push notification. You can choose unsubscribe on the device according to our related hints.
7.2 Service-related announcements We may issue service-related announcements to you when necessary (e.g., when a service is suspended due to system maintenance). You may not be able to cancel these announcements related to service and nature that are not advertising.
Eight. Location and duration of information storage
8.1 Where information is stored, we shall abide by the provisions of laws and regulations and store the personal information of users collected in our territory.
8.2 Generally speaking, we only keep your personal information for the shortest time necessary to achieve our goals. However, under the following circumstances, we may change the storage time of personal information to meet the legal requirements:
8.2.1 complies with applicable laws and regulations.
8.2.2 compliance with court decisions, rulings or other legal procedures;
8.2.3 to comply with the requirements of relevant government agencies or statutory authorized organizations.
8.2.4 we have reason to believe that we need to comply with relevant laws and regulations.
8.2.5 Reasonable and necessary uses for the implementation of relevant service agreements or policies, the maintenance of social and public interests, and the protection of personal property safety or other legitimate rights and interests of our customers, our affiliated companies, other users or employees. When our products or services stop operating, we will take the form of push notification, announcement and so on to inform you, and delete or anonymize your personal information within a reasonable period of time.
9. Information security We provide corresponding security for your information to prevent information loss, improper use, unauthorized access or disclosure.
9.1 we strictly abide by laws and regulations to protect users' communication secrets.
9.2 we will use various safety protection measures to ensure the safety of information at a reasonable level of safety. For example, we use encryption technology (such as TLS, SSL), anonymous processing and other means to protect your personal information.
9.3 we establish specialized management systems, processes and organizations to ensure information security. For example, we strictly limit the range of people accessing information, require them to abide by their confidentiality obligations and conduct censorship.
9.4 In case of personal information leakage and other security incidents, we will initiate emergency plans to prevent the expansion of security incidents and inform you in the form of push notifications and announcements.
Ten, minor protection, we attach great importance to the protection of minors' personal information. According to the relevant laws and regulations, if you are a minor under the age of 18, you should obtain the consent of your parents or legal guardians before using the service. If you are the guardian of a minor, please contact us through the contact information in Part 13 when you have any questions about the personal information of the minor under your guardianship.
Eleven, the scope of application of all our services are applicable to this policy. But some services have specific privacy guidelines / declarations that more specifically describe how we process your information in the service. If there are inconsistencies between this policy and the privacy guidelines/declarations for specific services, please refer to the privacy guidelines/declarations for specific services. Please note that this policy does not apply to services provided by other companies or individuals. For example, you can log on to other companies or individuals by using WeChat account. Your use of such third-party services is subject to its privacy policy (rather than this policy), and you need to read its policy carefully.
Twelve. Contact us if you have questions about this policy or other related matters, please contact us. We will examine the problem as soon as possible and reply within thirty days after verifying your user status.
Thirteen, we may modify the content of this policy in due course. If such changes result in substantial impairment of your rights under this policy, we will notify you by notifying you of the prominent position on the page and sending you an e-mail before the changes take effect. In this case, if you continue to use our services, you agree to be bound by the revised policy.