我们非常重视您的个人信息和隐私保护,为说明会如何收集、使用和存储您的个人信息及您享有何种权利,我们将通过本政策向您阐述相关事宜,具体细则如下:
您使用时,我们将按照本政策收集、存储、使用及对外提供、传输、转让(如适用)您的个人信息。同时,我们会通过本政策向您说明,我们如何为您提供访问、更新、管理和保护您的个人信息的服务。
除另有约定外,本政策所用定义与《用户注册服务协议》中的定义具有相同的涵义。
在使用我们的产品或服务前,请您务必仔细阅读并充分理解本政策, 特别是以粗体标识的条款,可能涉及您的重要权利,您应重点阅读,在确认充分理解并同意后使用相关产品或服务。一旦您开始使用我们提供的产品或服务,即表示您已充分理解并同意我们在本政策中所述内容。
本政策将帮助您了解以下内容:
一、我们如何收集和使用个人信息
二、我们如何使用Cookie、同类技术和SDK技术
三、我们如何共享、转让、公开披露个人信息
四、我们如何保护个人信息
五、您的权利
六、我们如何处理未成年人的个人信息
七、我们如何存储个人信息
八、我们如何更新本政策
九、其他
十、与我们联系
我们深知个人信息对您的重要性,并会尽全力保护您的个人信息安全可靠。我们致力于维持您对我们的信任,恪守以下原则,保护您的个人信息:权责一致原则、目的明确原则、选择同意原则、最少够用原则、确保安全原则、主体参与原则、公开透明原则等。同时,我们承诺将按业界成熟的安全标准,采取相应的安全保护措施来保护您的个人信息。 请在使用前,仔细阅读并了解本政策。
一、我们如何收集和使用个人信息
(一)词语释义
1.应用程序或服务是指:我们及关联方通过合法拥有并运营的、标注名称的客户端应用程序,为用户提供便捷生活万物互联的网络服务平台,包括但不限于产品分享、授权、购买等功能服务。
2.个人信息是指:以电子或者其他方式记录的能够单独或者与其他信息结合识别特定自然人身份或者反映特定自然人活动情况的各种信息。本政策个人信息包括您的真实姓名、性别、出生日期、身份证件号码、个人生物识别信息、住址、通信通讯联系方式、通信记录和内容、账号信息、财产信息、征信信息、行踪轨迹、健康生理信息、学历情况、城市、个性签名、网络身份识别信息、常用设备信息、交易信息等。
3.个人敏感信息是指:一旦泄露、非法提供或滥用可能危害人身和财产安全,极易导致个人名誉、身心健康受到损害或歧视性待遇等的个人信息。本政策中的个人敏感信息包括身份证件号码、邮箱地址、各类密码(口令、保护答案、数字证书)、个人生物识别信息、通记记录和内容、个人健康生理信息、个人财产信息、银行账号、征信信息、行踪轨迹、住宿信息、交易信息、14岁周岁以下(含)儿童的个人信息等。
4.身份要素是指:用于识别您身份的信息要素,例如:您的登录名、密码、电话号码、手机号码及头像。
5.非个人信息:通过对个人信息的技术处理(包括匿名化、去标识化等),使得处理后的信息无法单独或结合其他信息识别到您的个人身份,且处理后的信息不能被复原,处理后的信息不属于法律意义上您的个人信息。但当个人信息与处理后的信息结合使用期间,这些结合信息将作为您的个人信息按照本政策处理与保护。
(二)收集和使用个人信息的目的
我们仅会出于本政策所述的以下目的,收集和使用您的个人信息:
(1)保障服务能够正常运行;
(2)保障服务、用户使用的安全;
(3)管理软件,例如,软件认证、软件升级等;
(4)遵循法律法规及国家标准的规定。
当我们要将个人信息用于本政策未载明的其它用途时,会事先征求您的同意。当我们要将基于特定目的收集而来的信息用于其他目的时,会事先征求您的同意。
(三) 注册、登录、访问和使用服务
当您注册本平台账户时,我们依据法律规定需要您提供有效的中国大陆手机号码进行实名制核验。手机号属于敏感个人信息,收集此类是为了满足相关法律、法规关于网络实名制的要求。我们还会收集您的昵称、Android ID、Mac地址、IP地址、拟使用的用户名和密码,上述信息系我们提供智能设备基本功能所必要的个人信息,收集这些信息是为了帮助您完成注册,创建本平台帐户,建立您的个人信息档案。若您不提供这类信息,您可能无法正常使用我们的服务。 您提供的上述信息将在您使用本服务期间持续授权我们使用。
(四)我们直接收集和与使用的个人信息
1.保障正常运行
当您使用时,为了保障基础功能及服务的安全运行、运营的质量及效率,您授权同意我们收集您设备的如下信息(即正常运行所必需的移动设备信息):硬件型号、操作系统版本号、国际移动设备识别码(IMEI)、网络设备硬件地址(MAC)、IP地址、WLAN接入点、蓝牙、NFC、基站、软件版本号、操作日志、网络接入方式、网络接入类型、状态、网络质量数据、操作、使用、服务日志、设备加速器(如重力感应设备)、IMSI信息、手机状态、已安装或正在运行的必要的应用/软件列表信息(包括应用/软件来源、应用/软件程序的总体运行情况)等信息。
为了预防恶意程序、保障运营质量及效率,我们会收集安装的应用信息或正在运行的进程信息、应用程序的总体运行、使用情况与频率、应用崩溃情况、总体安装使用情况、性能数据、应用来源。
2.注册账号
(1)当您通过移动手机号码注册账号时,为完成注册,您需提供完整的、可接收短信或电话的手机号码,我们将通过发送短信验证码或语音验证码的方式确认您的身份是否有效。通过验证且您阅读并同意本政策及《用户注册服务协议》后,将完成账号注册。
(2)完成账号注册后,您可以自行决定是否需要完善您的头像、昵称等网络身份识别信息。如果您完善以上额外信息,将有助于我们为您提供更好的服务和体验,但如果您不提供上述信息,将不会影响使用基本功能。
(3)当您注册和使用本服务产品时,我们需要根据你在软件安装及使用中授予的具体权限,收集与您的设备相关的信息。包括:设备型号、操作系统版本、设备设置、设备标识符、MAC(媒体访问控制)地址、IMEI(移动设备国际身份码)、广告标识符“IDFA” 与 “IDFV”)、集成电路卡识别码(“ICCD”)、应用列表,方便我们统计使用我们产品的设备数量并进行设备机型数据分析与设备适配性分析。另外设备信息还将作为我们识别真实用户而不是外挂软件、机器的重要依据。
(4)当您使用我们的产品或服务时,我们将会自动收集您对我们的产品或服务的详细使用情况,作为日志信息保存。这些信息包括:
(1)关于您的使用时间与使用频率的细节;
(2)设备统计信息、关键操作路径、错误日志、崩溃记录、语言和时区;
(3)互联网协议(IP)地址、互联网服务供应商(ISP)、引用/退出页面、操作系统、日期/时间戳和点击流数据。这些日志信息能够帮助我们更好的了解和改善我们的服务,并非用于识别任何特定的个人。
3.保障服务及用户使用安全
为帮助我们更好地了解运行情况,为预防恶意程序、保障运营质量及效率,以帮助我们更好地了解产品运行情况、判断账户安全、进行身份验证、检测及防范安全事件的目的,我们可能记录网络日志信息、应用信息、正在运行的进程信息、应用程序的总体运行、使用情况与频率、应用崩溃情况、总体安装使用情况、性能数据及应用来源等信息。
(一)收集、使用个人信息目的变更
我们可能随着业务的发展,会有所调整。当新功能或服务与注册、发布图文等场景相关时,收集与使用的个人信息属于与原目的具有直接关联。在与原目的无直接关联的场景下,我们收集、使用您的个人信息,会再次征得您的同意。
(二)无需征得同意收集和使用的个人信息
根据法律法规及相关国家标准,我们在下列任意一种或多种情形下收集和使用您的个人信息无需征得您的授权同意。
(1)与国家安全、国防安全直接相关的;
(2)为应对突发公共安全、公共卫生、重大公共利益事件;
(3)与犯罪侦查、起诉、审判和判决执行等直接相关的;
(4)紧急情况下为保护自然人的生命健康、财产安全所必需的;
(5)所收集的您的个人信息是您自行向社会公众公开的;
(6)依法在合理的范围内处理您自行公开或者其他从合法公开披露的信息中收集的您的个人信息的,如合法的新闻报道、政府信息公开等渠道;
(7)根据您的要求,或为签订或履行您作为一方当事人的合同所必需的;
(8)用于维护安全稳定运行所必需的,例如发现、处置故障;
(9)为个人信息处理者履行法定义务或法定职责所必需的;
(10)学术研究机构基于公共利益开展统计或学术研究所必要,且对外提供学术研究或描述的结果时,对结果中所包含的个人信息进行去标识化处理的;
(11)法律、行政法规规定的其他情形。
二、我们如何使用Cookie、同类技术和SDK技术
(一)Cookie
为使您获得更轻松的访问体验,为了保障产品与服务的安全、高效运转,您使用我们的产品时,我们可能会通过小型数据文件识别您的身份,这么做可帮您省去重复输入注册信息的步骤和流程,或者帮助判断您的账号与交易的安全状态,排查崩溃、延迟的相关异常情况。这些数据文件可能是Cookie。Cookie是一种可让网站服务器将数据存储于客户端或从客户端中读取数据的中立技术。Cookie内容通常均经过加密。安全的Cookie技术会为用户在上网时提供更为便捷的服务。Cookie通常包含标识符、站点名称以及一些号码和字符。您可根据自己的偏好管理或删除Cookie。您可根据自己的偏好管理或删除Cookie。有关详情,请参见AboutCookies.org。但请注意,如果停用Cookie,您可能无法享受最佳的服务体验,某些服务也可能无法正常使用。除Cookie外,我们还会在我们上使用网站信标和像素标签等其他同类技术。我们不会将 Cookie 用于本政策所述目的之外的任何用途。您可根据自己的偏好管理或删除 Cookie。您可以清除计算机上保存的所有 Cookie,大部分网络浏览器会自动接受Cookie,但您通常可根据自己的需要来修改浏览器的设置以拒绝 Cookie;另外,您也可以清除软件内保存的所有Cookie。但如果您这么做,您可能需要在每一次访问时亲自更改用户设置,而且您之前所记录的相应信息也均会被删除,并且可能会对您所使用服务的安全性有一定影响。
(二)与Cookie同类技术
除Cookie外,我们还会使用网站信标和像素标签等其他同类技术(例如Beacon、Proxy等),但我们不会将Cookie和同类技术(例如Beacon、Proxy等)用于本政策所述目的之外的任何用途。如果您不希望自己的活动以这种方式被追踪,则可以随时从设置中注销账号。
(三)SDK技术
为保证产品相关功能的实现与应用安全稳定地运行、功能实现,使您能够使用和享受更多的服务及功能,我们可能会接入由第三方服务提供商提供的软件开发包(SDK)或其他类似的应用程序实现相关目的。我们会对合作获取信息的软件工具开发包(SDK)、应用程序接口(API)进行严格的安全监测,并与授权合作伙伴约定严格的数据保护措施,令其按照本政策以及其他任何相关的保密和安全措施来处理个人信息,以保证数据安全。
接入第三方软件开发包(SDK)详情如下,
①.SDK名称:个推SDK
功能:信息推送
收集个人信息类型:设备标识符,位置信息,MAC地址,SD卡储存权限
使用范围:消息推送
使用目的:针对智能设备厂商进行稳定和准确的消息推送服务。
隐私政策链接: https://getui.com/privacy
自启动和关联启动说明:
-为确保本应用处于关闭或后台运行状态下可正常接收到客户端推送的信息,本应用须使用(自启动)能力,将存在一定频率通过系统发送广播唤醒本应用自启动或关联启动行为,是因实现功能及服务所必要的。
-当您打开内容类推送消息,在征得您的明确同意后,会跳转打开相关内容。在未征得您同意的情况下,则不会有自启动或关联启动。
②.SDK名称:微信SDK
功能:实现微信分享
收集个人信息类型:设备信息,运营商信息,位置信息,MAC地址,网络类型,系统版本
使用范围:分享功能
使用目的:用户分享功能
隐私政策链接: https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy
③.SDK名称:高德地图SDK
功能:高德地图
收集个人信息类型:访问WI-FI状态,获取位置,设备信息,运营商信息,位置信息,MAC地址,网络类型,系统版本
使用范围:注册或者使用时,提供地理位置服务。
使用目的:能够帮助用户清楚的了解使用时的地理位置。
隐私政策链接: https://lbs.amap.com/pages/privacy/
④.SDK名称:腾讯SDK Bugly
功能:Bugly crash上报功能,实人认证
收集个人信息类型:设备标识符,MAC地址,运营商信息,音视频信息,SIM系列号。
使用范围:记录网络日志信息、应用信息、正在运行的进程信息、应用程序的总体运行、 使用情况与频率、应用崩溃情况、总体安装使用情况、性能数据及应用来源等信息。
使用目的:帮助更好地了解平台、产品运行情况。
隐私政策链接: https://privacy.qq.com
⑤.SDK名称:友盟统计SDK(com.umeng)
功能:统计
收集个人信息类型:设备序列号,地理位置
使用范围:自动收集您对我们的产品或服务的详细使用情况,作为日志信息保存。这些使用范围: 关于您的使用时间与使用频率的细节;设备统计信息、关键操作路径、错误日志、崩溃记录、语言和时区;互联网协议(IP)地址、互联网服务供应商(ISP)、引用/退出页面、操作系统、日期/时间戳和点击流数据。
使用目的:帮助更好的了解和改善我们的服务,为分析我们服务的使用情况,提升用户使用的体验,可能会与关联方或第三方共享产品使用情况(崩溃、闪退)的统计性数据。
隐私政策链接: https://www.umeng.com/page/policy
注:除上表所示外, 产品接入的其他第三方服务不对用户个人信息进行收集和处理。
在第三方向您提供产品和服务时,可能会获取到以下权限:
1)读取设备信息权限;
2)连接网络权限;
3)改变网络状态;
4)读取网络信息状态;
5)读取手机短信;
6)外部 SD 卡和 / 或手机内部存储读、写权限;
7)蓝牙;
8)NFC;
9)IMSI
10)IMEI
11) MAC
12)读取系统日志;
13)获取任务信息;
14)读写系统设置;
15)允许挂载和反挂载文件;
16)系统可移动存储;
17)读取手机定位信息;
18)写入 GPRS 接入点设置;
19)调用摄像头;
20)振动;
21)屏幕点亮的广播
22)开机启动的广播;
23)允许程序重新启动其他程序;
24)允许一个程序收到广播后快速收到下一个广播;
25)获取应用列表;
26)结束后台进程。
三、我们如何共享、转让、公开披露个人信息
(一)如何共享个人信息
我们不会与本公司的产品服务相关提供者以外的公司、组织和个人共享您的个人信息。我们可能会与合作伙伴共享您的某些个人信息,以提供更好的客户服务和用户体验。我们仅会出于合法、正当、必要、特定、明确的目的共享您的个人信息,并且只会共享提供服务所必要的个人信息,具体情况如下:
1.在获取您明确授权或同意的情况下共享:在获得您的明确同意后,我们会与其他方共享您的个人信息。
2.在法定情形下的共享:我们可能会根据法律法规规定、法律程序、政府的强制命令需要,司法裁定、或按行政、司法机关依法提出的要求,对外共享您的个人信息。
3.为实现产品功能或服务的共享:您的个人信息可能会与我们的关联公司共享。我们只会共享必要的个人信息,且受本政策中所声明目的的约束。关联公司如要改变个人信息的处理目的,将再次征求您的授权同意。
4.为实现产品安全与分析统计的共享:(1)保障使用安全:为保障您和其他用户的账号与财产安全,使您和我们的正当合法权益免受不法侵害,我们和关联方或服务提供商可能会共享必要的设备、账号及日志信息。
(2)分析产品使用情况:为分析我们服务的使用情况,提升用户使用地体验,可能会与关联方或第三方共享产品使用情况(崩溃、闪退)的统计性数据,这些数据难以与其他信息结合识别您的个人身份。
(3)学术研究与科研:为提升相关领域的科研能力,促进科技发展水平,我们在确保数据安全与目的正当的前提下,可能会与科研院所、高校等机构共享去标识化或匿名化的数据。
5.帮助您参加营销推广活动:当您选择参加我们及我们的关联方或第三方举办的有关营销活动时,可能需要您提供姓名、通信地址、联系方式、银行账号信息。这些信息是个人敏感信息,拒绝提供可能会影响您参加相关活动,但不会影响其他功能。只有经过您的同意,我们才会将这些信息与关联方或第三方共享,以保障您在联合活动中获得体验一致的服务,或委托第三方及时向您兑现奖励。
6.在法律要求或允许的范围内,为了保护关联方或合作伙伴、您或其他用户或社会公众的利益、财产或安全免遭损害而有必要提供。
7.只有共享您的个人信息,才能实现我们的产品与/或服务的核心功能或提供您需要的服务。
8.应您需求为您处理您与他人的纠纷或争议。
9.符合与您签署的相关协议(包括在线签署的电子协议以及相应的平台规则)或其他的法律文件约定所提供;
10.基于符合法律法规的社会公共利益而使用。
(二)如何转让个人信息
我们不会将您的个人信息转让给任何公司、组织和个人,但以下情况除外:
1.在获取明确同意的情况下转让:获得您的明确同意后,我们会向其他方转让您的个人信息;
2.在涉及合并、收购、资产转让或破产清算时,如涉及个人信息转让,我们会我们将告知您相关情形,并按照法律法规及不低于本政策所要求的标准继续保护或要求新的持有您个人信息的公司、组织继续受本政策的约束,将按照法律法规及不低于本政策所要求的安全标准继续保护或要求个人信息的继受方继续保护您的个人信息,否则我们将要求该公司、组织重新向您征求授权同意。
(三)如何披露个人信息
我们仅会在以下情况下,且采取符合业界标准的安全防护措施的前提下,公开披露您的个人信息:
1.获得您明确同意或基于您的主动选择后,我们可能会公开披露您的个人信息;
2.基于法律的、法规的要求、强制性的行政执法或司法要求所必须提供您个人信息的情况下,我们可能会依据所要求的个人信息类型和披露方式公开披露您的个人信息:在符合法律法规、法律程序、诉讼或政府主管部门强制性要求的情况下,我们收到上述披露信息的请求时,我们会要求必须出具与之相应的法律文件(如传票或调查函),并对被披露的信息采取符合法律和业界标准的安全防护措施,我们可能会公开披露您的个人信息。
3.对违规账号、欺诈行为进行处罚公告。
(四)免征得同意共享、转让、公开披露的个人信息
根据法律法规及国家标准,我们在下列情形中,共享、转让、公开披露您的个人信息无需征得您的授权同意
(1)与国家安全、国防安全相关的;
(2)与公共安全、公共卫生、重大公共利益相关的;
(3)与犯罪侦查、起诉、审判和判决执行等相关的;
(4)出于维护您或其他个人的生命、财产等重大合法权益但又很难得到您的同意的;
(5)您自行向社会公众公开的个人信息;
(6)从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道。
请知悉,根据法律规定,共享、转让经去标识化处理的个人信息,且确保数据接收方无法复原并重新识别个人信息主体的,不属于个人信息的对外共享、转让及公开披露行为,对此类数据的保存及处理将无需另行向您通知并征得您的同意。
四、我们如何保护个人信息
(一)为保障您的信息安全,我们致力于使用各种安全技术及配套的管理体系来尽量降低您的信息被泄露、毁损、误用、非授权访问、非授权披露和更改地风险。
我们将在合理的安全水平内会采取使用各种合理可行的安全保护措施,以保护您的个人信息安全。例如,
1.在您的设备与“产品服务”之间交换数据(如银行信息)时受SSL加密保护;
2.我们会使用加密技术确保数据的保密性;
3.我们会使用受信赖的保护机制防止数据遭到恶意攻击;
4.我们会举办安全和隐私保护培训课程,加强员工对于保护个人信息重要性的认识;
5.我们会部署访问控制机制,确保只有授权人员才可访问个人信息
6.我们建立专门的管理制度、流程和组织以保障信息的安全。例如,我们严格限制访问信息的人员范围,要求他们遵守保密义务,并进行审计。
7.我们认为其他的合理可行的保护措施。
(二)我们通过不断提升的技术手段加强安装在您设备端的软件的安全能力,以防止您的个人信息泄露。我们会使用不低于行业同行的加密技术、匿名化处理等合理可行的手段保护您的个人信息,并使用安全保护机制防止您的个人信息遭到恶意攻击。
(三)我们会采取一切合理可行的措施,确保未收集无关的个人信息。我们只会在达成本政策所述目的所需的期限内保留您的个人信息,除非需要延长保留期或受到法律的允许。我们仅在为提供服务之目的所必需的期间内保留您的个人信息。超出必要期限后,我们将对您的个人信息进行删除或匿名化处理,但法律法规另有规定的除外。
(四)互联网并非绝对安全的环境,而且即时通讯及与其他用户的交流方式并未加密,我们强烈建议您不要通过此类方式发送个人信息。请使用复杂密码,协助我们保证您的账号安全。请您务必妥善保管好您的登录名及其他身份要素。您在使用时,我们会通过您的登录名及其他身份要素来识别您的身份。一旦您泄漏了前述信息,您可能会蒙受损失,并可能产生对您不利的法律后果。如您发现登录名及/或其他身份要素可能或已经泄露时,请您立即和我们取得联系,以便我们及时采取相应措施以避免或降低相关损失。
(五)我们将不定期更新并公开安全风险、个人信息安全影响评估等报告的有关内容。
(六)互联网环境并非百分之百安全,我们将尽力确保或担保您发送给我们的任何信息的安全性。如果我们的物理、技术或管理防护设施遭到破坏,导致信息被非授权访问、公开披露、篡改或毁坏,导致您的合法权益受损,我们将承担相应的法律责任。
(七)在不幸发生个人信息安全事件后,我们会启动应急预案,阻止安全事件扩大,并将按照法律法规的要求,履行相关的报告及通知义务,及时向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的处置措施、您可自主防范和降低风险的建议、对您的补救措施等。我们将及时将事件相关情况以邮件、电话、推送通知等方式告知您,难以逐一告知个人信息主体时,我们会采取合理、有效的方式发布公告。我们还将按照监管部门要求,主动上报个人信息安全事件的处置情况。
五、您的权利
按照中华人民共和国相关的法律、法规、国家标准,以及行业通行做法,为保障您对自己的个人信息行使以下权利,我们在产品中为您访问、修改和删除个人信息提供相应的操作设置,您可以参考下面的政策进行操作。
请注意,不同操作系统、软件的不同版本之间,操作设置可能存在差异; 此外,为了优化您的使用体验,我们也可能对操作设置进行调整。故如下政策仅供参考,若您对行使相关权利的方式及途径仍有任何疑问的,您可以通过本政策披露的方式与我们联系。
(一)访问您的个人信息
您有权访问您的个人信息,法律法规规定的例外情况除外。如果您想行使数据访问权,可以通过以下方式自行访问:账号信息——如果您希望访问或编辑您的账号中的个人资料信息等,您可以通过点击右下方的「我的」,通过点击「头像、个人资料、昵称」点击执行相应操作。
如果您无法通过上述链接访问上述个人信息,您可以随时使用我们的客服电话(0755 - 86965862)联系。我们将在30天内回复您的访问请求。
(二)更正您的个人信息
一般情况下,您可以随时浏览、修改自己提交的信息。但出于安全性和身份识别的考虑,您可能无法自主修改注册时提交的某些初始注册信息(如手机号认证后信息)及验证信息;如您确有必要修改该类信息,您可以使用客服电话(0755 - 86965862)的方式提出更正申请,我们将尽快审核所涉问题,并由专人验证您的用户身份后及时予以回复。
(三)删除您的个人信息
在以下情形中,您可以向我们提出删除个人信息的请求:
1.如果我们处理个人信息的行为违反法律法规;
2.如果我们收集、使用您的个人信息,却未征得您的同意;
3.如果我们处理个人信息的行为违反了与您的约定;
4.如果您不再使用;
5.如果我们不再为您提供服务。
若我们决定响应您的删除请求,我们还将同时通知从我们获得您的个人信息的实体,要求其及时删除,除非法律法规另有规定,或这些实体获得您的独立授权。
当您从我们的服务中删除信息后,我们可能不会立即从备份系统中删除相应的信息,但会在备份更新时删除这些信息。
(四)管理您的授权范围
每个业务功能需要一些基本的个人信息才能得以完成。对于额外收集的个人信息的收集和使用,您可以随时给予或收回您的授权同意。
您可以通过以下方式自行操作:
您可以通过删除信息、关闭设备功能等方式改变您在功能和服务中的授权范围。
请您理解,特定的业务功能和服务将需要您的个人信息才能得以完成,当您撤回同意后,我们无法继续为您提供撤回同意所对应的功能和服务,也不再处理您相应的个人信息。但您撤回同意的决定,不会影响我们此前基于您的同意而开展的个人信息处理。
当您撤回同意后,我们将不再处理相应的个人信息。但您撤回同意的决定,不会影响此前基于您的授权而开展的个人信息处理。
(五)逝者近亲属的权利
如用户不幸逝世,其近亲属可通过客服联系我们,来行使法律规定的合法、正当权益。
(六)获取您的个人信息副本
您有权获取您的个人信息副本。如您需要您的个人信息副本,您可以通过本政策文末提供的方式联系我们,在核实您的身份后,我们将向您提供您在服务中的个人信息副本(包括个人基本资料、个人身份信息),但法律法规另有规定的除外。
(七)约束信息系统自动决策
在某些业务功能中,我们可能仅依据信息系统、算法等在内的非人工自动决策机制作出决定。如果这些决定显著影响您的合法权益,您有权通过本政策文末提供的方式联系我们,并要求作出解释;
(八)我们如何响应您的请求
为保障安全,您可能需要提供书面请求,或以其他方式证明您的身份。我们可能会先要求您验证自己的身份,然后再处理您的请求。
对于您的请求,我们将在三十个工作日内做出答复。如您不满意,还可以通过客服发起投诉。对于您合理的请求,我们原则上不收取费用,但对多次重复、超出合理限度的请求,我们将视情收取一定成本费用。对于那些无端重复、需要过多技术手段(例如,需要开发新系统或从根本上改变现行惯例)、给他人合法权益带来风险或者非常不切实际的请求,我们可能会予以拒绝。
在以下情形中,按照法律法规要求,我们将无法响应您的请求:
1.国家安全、国防安全相关的;
2.与公共安全、公共卫生、重大公共利益相关的;
3.与犯罪侦查、起诉、审判和判决执行等相关的;
4.有充分证据表明您存在主观恶意或滥用权利的;
5.响应您的请求将导致您或其他个人、组织的合法权益受到严重损害的;
6.涉及商业秘密的。
(九)注销您的账户
您可以通过以下方式申请注销您的账户:
可通过【我的】-【设置管理】-【个人资料】- 【注销账户】自行提交注销申请,申请注销后7天生效。
(十)投诉举报
您可以按照我们公示的制度进行投诉或举报。如果您认为您的个人信息权利可能受到侵害,或者发现侵害个人信息权利的线索,您可以通过【我要反馈】或拨打电话(0755 - 86965862)与我们联系。我们核查后会在30日内反馈您的投诉与举报。
(十一)访问隐私政策
您可以在注册、登录页面,或者登录后依次点击「设置」-「隐私政策」后,查看本政策的全部内容。
(十二)停止运营向您告知权利
如我们的产品或服务发生停止运营的情形时,我们将及时停止收集您个人信息的活动,将停止运营的通知以逐一送达或以推送通知、公告的形式通知您,并在合理的期限内对所持有的您的个人信息进行删除或匿名化处理。(本政策中的“匿名化处理”,是指通过对个人信息的技术处理,使得个人信息主体无法被识别,且处理后的信息不能被复原的过程。个人信息经匿名化处理后所得的信息不属于个人信息。)
六、我们如何处理未成年人的个人信息
我们非常重视对未成年人个人信息的保护。根据相关法律法规的规定,若您是18周岁以下的未成年人,您将无法使用我们的服务。我们不会向未成年人推销我们的服务,或者未经父母同意而有意收集其未成年子女的个人信息。
七、我们如何存储个人信息
1.信息存储的地点:我们会按照法律法规规定,将在中华人民共和国境内收集和产生的个人信息存储在中华人民共和国境内。 如果您的个人信息存储地点从中国境内转移到境外的,我们将严格依照法律的规定执行。我们不会将上述信息传输至境外,如果部分涉及跨境业务,我们需要向境外机构传输境内收集的相关个人信息的,我们将会遵循国家相关规定,征求您的同意,并按照法律法规和相关监管部门的规定执行,并通过签订协议、现场核查等有效措施,要求境外机构为所获得的您的个人信息保密。
2.信息存储的期限:一般而言,我们仅为实现目的所必需的时间及法律、行政法规所规定的保存期限内保留您的个人信息保留您的个人信息。
八、我们如何更新本政策
为了给您提供更好的服务,我们会适时对本政策进行修订,该等修订构成本政策的一部分并具有等同于本政策的效力。如该等修订会导致您在本政策项下权利的实质减损,我们将在您登录及版本更新时以推送通知、弹窗的形式向您展示变更后的政策。在该种情况下,若您继续使用我们的服务,即表示同意受经修订的政策约束。
若您不同意修改后的隐私政策,您有权并应立即停止使用我们的服务。如果您继续使用服务,则视为您接受我们对本政策相关条款所做的修改。
九、其他
(一)本政策中的标题仅为方便及阅读而设,并不影响本政策中任何规定的含义或解释。
(二)本政策中所述有可能会根据您所使用的手机型号、系统版本、软件应用程序版本等因素而有所不同。最终服务以您所使用的产品为准。
(三)本政策的版权为我们所有,我们拥有解释和修改的权利。
更新日期:2022年10月
生效日期:2021年01月
We attach great importance to the protection of your personal information and privacy. To explain how we collects, uses and stores your personal information and what rights you have, we will explain the relevant matters through this policy. The details are as follows:
This Privacy Protection Policy ("this Policy") is only applicable to applications or related services developed and operated by the Company, and also applies to other Internet products developed and operated by the Company and its affiliates. However, the privacy policy is independently set in other products and the collection, use, storage If the protection of user information is made differently from the provisions of this policy, its provisions shall apply. This policy does not apply to applications or services provided to you by other independent third parties, nor does it apply to products or services that have separate legal notices and privacy policies set up on our platform. When you use our platform, we will collect, store, use, and provide, transmit, and transfer (if applicable) your personal information in accordance with this policy. At the same time, we will explain to you through this policy how we provide you with services to access, update, manage, and protect your personal information.
Unless otherwise agreed, the definitions used in this policy have the same meanings as those in the User Registration Service Agreement.
Before using our products or services, please be sure to carefully read and fully understand this policy, especially the terms marked in bold, which may involve your important rights. You should focus on reading and use the relevant products or services after confirming that you fully understand and agree. "Once you start using the products or services we provide, you fully understand and agree to the content stated in this policy."
This policy will help you understand the following:
1. How do we collect and use personal information?
2. How do we use cookies, peer technology, and SDK technology?
3. How do we share, transfer, and publicly disclose personal information?
4. How do we protect personal information?
5. Your rights.
6. How do we handle the personal information of minors?
7. How do we store personal information?
8. How do we update this policy?
9. Others.
10. Contact Us.
We fully understand the importance of personal information to you and will do our utmost to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of selective consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take appropriate security measures to protect your personal information according to mature security standards in the industry. Please read and understand this policy carefully before using our platform.
1. How do we collect and use personal information?
1.1. Explanation of words
1.1.1. "Application or service" refers to a network service platform that provides users with convenient life and Internet of Things through legally owned and operated client applications labeled with names, including but not limited to product sharing, authorization, purchase, and other functional services.
1.1.2. Personal information refers to various types of information recorded in electronic or other ways that can individually or in combination with other information identify a specific natural person or reflect the activities of a specific natural person. Personal information in this policy includes your real name, gender, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, account information, property information, credit information, whereabouts, health and physiological information, educational background, city, personal signature, network identification information, common equipment information, transaction information, etc.
1.1.3. "Personal sensitive information refers to personal information that, once leaked, illegally provided, or misused, may endanger personal and property safety, and is highly likely to cause personal reputation, physical and mental health damage, or discriminatory treatment.". The personal sensitive information in this policy includes ID number, email address, various passwords (passwords, protection answers, digital certificates), personal biometric information, communication records and content, personal health and physiological information, personal property information, bank account number, credit information, whereabouts, accommodation information, transaction information, and personal information of children under the age of 14 (including).
1.1.4. Identity elements refer to the information elements used by our platform to identify you, such as your login name, password, phone number, mobile phone number, and avatar。
1.1.5. Non personal information: Through technical processing of personal information (including anonymization and deidentification), the processed information cannot be individually or in combination with other information to identify your personal identity, and the processed information cannot be restored. The processed information does not belong to your personal information in the legal sense. However, when personal information is used in combination with processed information, these combined information will be treated and protected as your personal information in accordance with this policy.
1.2. Purpose of collecting and using personal information.
We will only collect and use your personal information for the following purposes described in this policy:
1.2.1. Ensure the normal operation of our platform service;
1.2.2. Ensure the safety of services and users on our platform;
1.2.3. Management software, such as software certification, software upgrade, etc;
1.2.4. Comply with laws, regulations, and national standards.
When we want to use personal information for other purposes not specified in this policy, we will seek your consent in advance. When we want to use information collected for a specific purpose for other purposes, we will seek your consent in advance.
1.3. Register, log in, access, and use our platform service.
When you register your account on this platform, we need you to provide a valid mobile phone number in Chinese Mainland for real name verification in accordance with laws and regulations. Mobile phone numbers belong to sensitive personal information, which is collected to meet the requirements of relevant laws and regulations on the network real-name system. We will also collect your nickname, Android ID, Mac address, IP address, user name and password to be used. The above information is personal information necessary for us to provide basic functions of smart devices. The purpose of collecting this information is to help you complete registration, create an account on this platform, and establish your personal information profile. If you do not provide such information, you may not be able to use our services properly. The above information provided by you will continue to be authorized for use by us during your use of this service.
1.4. Personal information we directly collect and use.
1.4.1. Ensure the normal operation of our platform.
When you use our platform, in order to ensure the safe operation, quality, and efficiency of the basic functions and services of our platform, you authorize us to collect the following information about your device (i.e., the mobile device information necessary for the normal operation of our platform): hardware model, operating system version number, international mobile device identification code (IMEI), network device hardware address (MAC), IP address, WLAN access point, Bluetooth, NFC Base station, software version number, operation log, network access method, network access type, status, network quality data, operation, usage, service log, device accelerator (such as gravity sensing device), IMSI information, phone status, necessary application/software list information installed or running (including application/software source, overall operation of application/software program), and other information.
In order to prevent malicious programs and ensure operational quality and efficiency, we collect information about installed applications or running processes, the overall operation, usage, and frequency of applications, application crashes, overall installation usage, performance data, and application sources.
1.4.2. Register our platform account.
1.4.2.1. When you register our platform account with your mobile phone number, in order to complete registration, you need to provide a complete mobile phone number that can receive text messages or calls. We will confirm whether your identity is valid by sending a text message verification code or voice verification code. After verification and you have read and agreed to this policy and the User Registration Service Agreement, account registration will be completed.
1.4.2.2. After completing the registration of our platform account, you can decide whether you need to change your network identification information such as your avatar and nickname. If you complete the above additional information, it will help us provide you with better service and experience. However, if you do not provide the above information, it will not affect the use of the basic functions of our platform.
1.4.2.3. When you register and use this service product, we need to collect information related to your device based on the specific permissions you have granted during software installation and use. It includes: device model, operating system version, device settings, device identifier, MAC (Media Access Control) address, IMEI (International Identity Code for Mobile Devices), advertising identifiers "IDFA" and "IDFV"), integrated circuit card identification code ("ICCD"), and application list. It is convenient for us to count the number of devices using our products and conduct device model data analysis and device compatibility analysis. In addition, device information will also serve as an important basis for us to identify real users rather than external software or machines.
1.4.2.4. When you use our products or services, we will automatically collect your detailed usage of our products or services and save them as log information. This information includes:
1.4.2.4.1. Details about your usage time and frequency;
1.4.2.4.2. Device statistics, critical operation paths, error logs, crash records, language, and time zones;
1.4.2.4.3. Internet Protocol (IP) addresses, Internet Service Providers (ISPs), reference/exit pages, operating systems, date/time stamps, and click stream data. This log information can help us better understand and improve our services, and is not used to identify any specific individuals.
1.4.3. Ensure the safety of our platform, service, and user use.
To help us better understand the operation of our platform, prevent malicious programs, ensure operational quality and efficiency, and help us better understand the operation of products, judge account security, perform authentication, detect, and prevent security events, we can record network log information, application information, information about running processes, the overall operation, usage, and frequency of applications Information such as application crashes, overall installation and usage, performance data, and application sources.
1.4.3.1. Changes in the purpose of collecting and using personal information.
We may make adjustments to our platform as our business grows. When a new function or service is related to scenarios such as registration, publishing images, and text, the personal information collected and used is directly related to the original purpose. "In scenarios that are not directly related to the original purpose, we will seek your consent again when collecting and using your personal information.".
1.4.3.2. Personal information collected and used without consent
According to laws, regulations, and relevant national standards, we do not need your authorization to collect and use your personal information under any one or more of the following circumstances.
1.4.3.2.1. Directly related to national security and national defense security;
1.4.3.2.2. To respond to sudden public safety, public health, and major public interest events;
1.4.1.2.3. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
1.4.1.2.4. Necessary to protect the life, health, and property safety of natural persons in emergency situations;
1.4.1.2.5. The collected personal information about you is disclosed to the public by yourself;
1.4.1.2.6. Processing your personal information disclosed by you or collected from legally disclosed information within a reasonable range according to law, such as legal news reports, government information disclosure, and other channels;
1.4.1.2.7. "At your request, or necessary to enter into or perform a contract to which you are a party;";
1.4.1.2.8. Necessary for maintaining the safe and stable operation of our platform, such as detecting and handling our platform fault;
1.4.1.2.9. Necessary for the personal information processor to perform legal obligations or duties;
1.4.1.2.10. It is necessary for academic research institutions to carry out statistical or academic research based on the public interest, and when providing academic research or descriptive results to the public, the personal information contained in the results is deidentified;
1.4.1.2.11. Other circumstances stipulated by laws and administrative regulations.
2. How do we use cookies, peer technology, and SDK technology?
2.1. Cookies
In order to make your access experience easier and ensure the safe and efficient operation of products and services, when you use our products, we may identify you through small data files. Doing so can help you avoid the steps and processes of repeatedly entering registration information, or help determine the security status of your account and transactions, and troubleshoot related anomalies such as crashes and delays. These data files may be cookies. Cookies are a neutral technology that allows website servers to store data on or read data from clients. Cookie content is typically encrypted. Secure cookie technology will provide users with more convenient services when surfing the internet. Cookies typically contain identifiers, site names, and numbers and characters. You can manage or delete cookies based on your preferences. You can manage or delete cookies based on your preferences. For more information, see AboutCookies.org. However, please note that if you disable cookies, you may not enjoy the best service experience, and some services may not work properly. In addition to cookies, we will also use website beacons, pixel tags, and other similar technologies on our website. We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies based on your preferences. "You can clear all cookies saved on your computer. Most web browsers will automatically accept cookies, but you can usually modify your browser's settings to reject cookies based on your needs;"; In addition, you can also clear all cookies saved in the software. However, if you do this, you may need to personally change user settings each time you visit our platform, and the corresponding information you previously recorded will also be deleted, which may have a certain impact on the security of the services you use.
2.2. Cookie like technology.
In addition to cookies, we will also use other similar technologies such as website beacons and pixel labels (such as Beacon, Proxy, etc.), but we will not use cookies and similar technologies (such as Beacon, Proxy, etc.) for any purpose other than those stated in this policy. If you do not want your activities to be tracked in this way, you can log out of your account at any time from the settings of our platform.
2.3. SDK technology
In order to ensure the realization of product related functions and the safe and stable operation and function realization of applications, so that you can use and enjoy more services and functions, we may access software development kits (SDKs) or other similar applications provided by third-party service providers to achieve relevant purposes. "We will strictly monitor the security of software tool development kits (SDKs) and application program interfaces (APIs) that we collaborate to obtain information, and agree with authorized partners on strict data protection measures to enable them to process personal information in accordance with this policy and any other relevant confidentiality and security measures to ensure data security."
The details of accessing third-party software development kits (SDKs) are as follows:
2.3.1. SDK name: igexin SDK
Function: information push
Type of personal information collected: device identifier, location information, MAC address, SD card storage permissions
Scope of use: message push
Purpose: Provide stable and accurate message push services for smart device manufacturers.
Privacy Policy Link: https://getui.com/privacy
2.3.2. SDK name: WeChat SDK
Function: Realize WeChat sharing
Type of personal information collected: device information, operator information, location information, MAC address, network type, system version
Scope of use: sharing function
Purpose of use: Users share functions with our product
Privacy Policy Link: https://weixin.qq.com/cgi-bin/readtemplate?lang=zh_CN&t=weixin_agreement&s=privacy
2.3.3. SDK name: Amap SDK
Function: Amap
Type of personal information collection: accessing WI-FI status, obtaining location, device information, operator information, location information, MAC address, network type, system version
Scope of use: Provide geographic location services when registering or using our platform.
Purpose of use: It can help users clearly understand the geographical location of our product.
Privacy Policy Link: https://lbs.amap.com/pages/privacy/
2.3.4. SDK name: Tencent SDK Bugly
Function: Bugly crash reporting function, real person authentication
Type of personal information collected: device identifier, MAC address, operator information, audio and video information, SIM serial number.
Scope of use: Records information such as network log information, application information, running process information, overall operation, usage, and frequency of applications, application crashes, overall installation usage, performance data, and application sources.
Purpose: To help better understand the operation of the platform and products.
Privacy Policy Link: https://privacy.qq.com
2.3.5. SDK name: Youmeng SDK (com. umeng)
Function: Statistics
Type of personal information collected: device serial number, geographic location
Scope of use: Automatically collect your detailed usage of our products or services and save them as log information. These usage ranges: details about your usage time and frequency; Device statistics, critical operation paths, error logs, crash records, language, and time zones; Internet Protocol (IP) addresses, Internet Service Providers (ISPs), reference/exit pages, operating systems, date/time stamps, and click stream data.
Purpose of use: To help better understand and improve our services, in order to analyze the usage of our services and improve the user experience, we may share statistical data on product usage (crashes, flashbacks) with related parties or third parties.
Privacy Policy Link: https://www.umeng.com/page/policy
Except as shown in the above table, other third-party services accessed by the product do not collect and process user personal information.
When providing products and services to you by a third party, you may obtain the following permissions:
1) Permission to read device information;
2) Permission to connect to the network;
3) Change the network status;
4) Read the network information status;
5) Read mobile phone text messages;
6) External SD card and/or mobile phone internal storage read and write permissions;
7) Bluetooth;
8)NFC;
9)IMSI;
10)IMEI;
11)MAC;
12) Read system logs;
13) Obtain task information;
14) Read and write system settings;
15) Allow mounting and anti mounting files;
16) System removable storage;
17) Reading mobile phone positioning information;
18) Write GPRS access point settings;
19) Call the camera;
20) Vibration;
21) Screen illuminated broadcast;
22) Start broadcasting;
23) Allow programs to restart other programs;
24) Allow a program to quickly receive the next broadcast after receiving the broadcast;
25) Obtain the application list;
26) End the background process.
3. How do we share, transfer, and publicly disclose personal information?
3.1. How do we deal with personal information?
We will not share your personal information with companies, organizations, or individuals other than our product service related providers. We may share some of your personal information with partners to provide better customer service and user experience. "We will only share your personal information for legitimate, legitimate, necessary, specific, and clear purposes, and only share personal information necessary for the provision of services, as follows:"
3.1.1. Sharing with your explicit authorization or consent: After obtaining your explicit consent, we will share your personal information with other parties.
3.1.2. Sharing under legal circumstances: We may share your personal information externally according to laws and regulations, legal procedures, government mandatory orders, judicial decisions, or legal requirements of administrative and judicial authorities.
3.1.3. To achieve sharing of product functions or services: Your personal information may be shared with our affiliated companies. We will only share necessary personal information and are bound by the purposes stated in this policy. If an affiliated company wants to change the purpose of processing personal information, it will again seek your authorization and consent.
3.1.4. To achieve the sharing of product safety and analysis statistics:
3.1.4.1. Secure Use: To ensure the security of your and other users' accounts and property, and to protect your and our legitimate rights and interests from illegal infringement, we and related parties or service providers may share necessary equipment, account, and log information.
3.1.4.2. Analysis of product usage: In order to analyze the usage of our services and improve the user experience, we may share statistical data on product usage (crashes, flashbacks) with related parties or third parties, which is difficult to identify your personal identity in combination with other information.
3.1.4.3. Academic research and scientific research: In order to improve scientific research capabilities in relevant fields and promote the level of technological development, we may share deidentified or anonymized data with research institutes, universities, and other institutions on the premise of ensuring data security and legitimate purposes.
3.1.5. Help you participate in marketing activities: When you choose to participate in related marketing activities organized by us, our affiliates, or third parties, you may need to provide your name, mailing address, contact information, and bank account information. "This information is personal and sensitive. Refusal to provide it may affect your participation in related activities, but it will not affect other functions.". "Only with your consent can we share this information with related parties or third parties to ensure that you receive consistent service experience in joint activities, or entrust a third party to timely cash rewards to you."
3.1.6. "To the extent required or permitted by law, it is necessary to provide in order to protect the interests, property, or safety of our platform, associated parties, or partners, you, or other users of our platform, or the public from damage."
3.1.7. "Only by sharing your personal information can we achieve the core functions of our products and/or services or provide the services you need."
3.1.8. Handle disputes or disputes between you and others based on your needs.
3.1.9. Provided in accordance with relevant agreements signed with you (including online signed electronic agreements and corresponding platform rules) or other legal documents.
3.1.10. Use based on social and public interests that comply with laws and regulations.
3.2. How do we transfer personal information?
We will not transfer your personal information to any company, organization, or individual, except for the following:
3.2.1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.
3.2.2. "When it comes to mergers, acquisitions, asset transfers, or bankruptcy liquidation, if it involves the transfer of personal information, we will inform you of the relevant situation and continue to protect or require new companies and organizations that hold your personal information to continue to be bound by this policy in accordance with laws and regulations and standards not lower than those required by this policy,", "We will continue to protect your personal information in accordance with laws, regulations, and security standards not lower than those required by this policy, or require the recipient of personal information to continue to protect your personal information. Otherwise, we will require the company or organization to seek authorization from you again."
3.3. How do we disclose personal information?
We will only publicly disclose your personal information under the following circumstances, and on the premise of adopting safety protection measures that comply with industry standards:
3.3.1. After obtaining your explicit consent or based on your active choice, we may publicly disclose your personal information;
3.3.2. "In cases where it is necessary to provide your personal information based on legal, regulatory, mandatory administrative or judicial requirements, we may publicly disclose your personal information based on the type of personal information required and the method of disclosure: When we receive the request for disclosure of information in accordance with laws and regulations, legal procedures, litigation, or mandatory requirements of government authorities,", We will require that corresponding legal documents (such as subpoenas or investigation letters) be issued, and security measures that comply with laws and industry standards be taken for the disclosed information. We may publicly disclose your personal information.
3.3.3. Announce penalties for illegal accounts and fraudulent acts.
3.4. Exemption from consent to share, transfer, and publicly disclose personal information.
According to laws, regulations, and national standards, we do not need your authorization to share, transfer, or publicly disclose your personal information under the following circumstances:
3.4.1. Related to national security and national defense security;
3.4.2. Those related to public safety, public health, or significant public interests;
3.4.3. Relating to criminal investigation, prosecution, trial, and execution of judgments;
3.4.4. It is difficult to obtain your consent for the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property;
3.4.5. Personal information that you disclose to the public on your own;
3.4.6. Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure, and other channels.
Please be aware that, according to legal regulations, sharing and transferring personal information that has undergone deidentification processing, and ensuring that the data recipient cannot recover and re identify the subject of personal information, does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require separate notice to you and your consent.
4. How do we protect personal information?
The following personal information protection measures provided in this policy are only applicable to our platform. Once you leave our platform and browse or use other websites, services, and content resources, we have no ability or obligation to protect any personal information submitted by you on software or websites outside our platform, regardless of whether you log in, browse, or use the above software or websites based on links or guidance from our platform.
4.1. To ensure the security of your information, we are committed to using various security technologies and supporting management systems to minimize the risk of your information being disclosed, damaged, misused, accessed, disclosed, and changed without authorization.
We will take all reasonable and feasible security measures to protect the security of your personal information within a reasonable level of security. For example:
4.1.1. Be protected by SSL encryption when exchanging data (such as bank information) between your device and Product Services;
4.1.2. We will use encryption technology to ensure the confidentiality of data;
4.1.3. We will use trusted protection mechanisms to prevent malicious attacks on data;
4.1.4. We will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information;
4.1.5. We will deploy an access control mechanism to ensure that only authorized personnel can access personal information
4.1.6. We establish specialized management systems, processes, and organizations to ensure the security of information. For example, we strictly restrict the scope of personnel accessing information, require them to comply with confidentiality obligations, and conduct audits.
4.1.7. Other reasonable and feasible protective measures in our opinion.
4.2. We enhance the security capabilities of the software installed on your device through continuously improving technical means to prevent the disclosure of your personal information. We will use reasonable and feasible means such as encryption technology and anonymization processing that are not inferior to industry peers to protect your personal information, and use security protection mechanisms to prevent malicious attacks on your personal information.
4.3. We will take all reasonable and feasible measures to ensure that unrelated personal information is not collected. "We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless the retention period needs to be extended or permitted by law.". We will only retain your personal information for the period necessary for the purpose of providing services on our platform. "After the necessary period has expired, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations.".
4.4. The Internet is not an absolutely secure environment, and instant messaging and communication methods with other users are not encrypted. We strongly recommend that you not send personal information through such methods. Please use a complex password to help us ensure the security of your account. Please be sure to keep your login name and other identity elements of our platform properly. When you use our platform, we will identify you by your login name and other identity elements. Once you disclose the aforementioned information, you may suffer losses and may have adverse legal consequences for you. If you find that the login name and/or other identity elements of our platform may or have been disclosed, please contact us immediately so that we can take timely measures to avoid or reduce related losses.
4.5. From time to time, we will update and disclose relevant contents of security risk, personal information security impact assessment, and other reports.
4.6. The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.
4.7. In the event of an unfortunate personal information security incident, we will launch an emergency plan to prevent the expansion of the security incident. We will fulfill relevant reporting and notification obligations in accordance with the requirements of laws and regulations, and promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions that you can independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant information of the event by email, phone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take reasonable and effective methods to publish the announcement. We will also actively report the handling of personal information security incidents in accordance with regulatory requirements.
5. Your rights.
In accordance with the relevant laws, regulations, national standards, and industry practices of the People's Republic of China, in order to ensure that you exercise the following rights with respect to your personal information, we provide corresponding operational settings in the product for you to access, modify, and delete personal information. You can refer to the following policies for operation.
Please note that there may be differences in operating settings between different operating systems and different versions of software; In addition, in order to optimize your experience, we may also make adjustments to the operating settings. Therefore, the following policies are for reference only. If you still have any questions about the ways and means to exercise relevant rights, you can contact us through the methods disclosed in this policy.
5.1. Access your personal information.
You have the right to access your personal information, except for exceptions specified by laws and regulations. If you want to exercise data access rights, you can access them yourself through the following methods: Account Information - If you want to access or edit personal information in your account, you can click "My" at the bottom right of our platform, and click "avatar, personal information, and nickname" to perform corresponding operations.
If you cannot access the above personal information through the above link, you can contact us at any time using our customer service hotline (0755 - 86965862). We will respond to your request for access within 30 days.
5.2. Correct your personal information.
Generally, you can browse and modify the information you submit at any time. However, due to security and identity considerations, you may not be able to independently modify some initial registration information (such as information after mobile phone number authentication) and authentication information submitted during registration; If it is really necessary for you to modify this type of information, you can apply for correction by using the customer service hotline (0755 - 86965862). We will review the issues involved as soon as possible, and assign a dedicated person to verify your user identity and respond in a timely manner.
5.3. Delete your personal information.
In the following situations, you can request us to delete personal information:
5.3.1. If we violate laws and regulations in processing personal information;
5.3.2. If we collect and use your personal information without your consent;
5.3.3. If our behavior of processing personal information violates our agreement with you;
5.3.4. If you no longer use our platform or service;
5.3.5. If we no longer provide you with our platform or service.
If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and request them to delete it in a timely manner, unless otherwise provided by laws and regulations, or unless these entities have obtained your independent authorization.
"When you delete information from our service, we may not immediately delete the corresponding information from the backup system, but we will delete it during backup updates."
5.4. Manage your authorization scope.
Our business function requires some basic personal information to be completed. "For the collection and use of additional collected personal information, you can give or withdraw your authorization at any time."
You can operate by yourself in the following ways:
You can change your authorization scope in functions and services by deleting information, turning off device functions, and other methods.
Please understand that specific business functions and services will require your personal information to be completed. After you withdraw your consent, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent, and will no longer process your corresponding personal information. However, your decision to withdraw your consent will not affect our previous personal information processing based on your consent.
After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.
5.5. Rights of close relatives of the deceased.
In the event of the unfortunate death of a user on our platform, their close relatives can contact us through customer service on our platform to exercise their legal and legitimate rights and interests.
5.6. Get a copy of your personal information.
You have the right to obtain a copy of your personal information. If you need a copy of your personal information, you can contact us through the method provided at the end of this policy. After verifying your identity, we will provide you with a copy of your personal information (including personal basic data and personally identifiable information) in our platform service, unless otherwise stipulated by laws and regulations.
5.7. Automatic Decision Making in Constraint Information Systems.
In some business functions, we may only make decisions based on non manual and automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to contact us through the information provided at the end of this policy and request an explanation;
5.8. How do we respond to your request.
To ensure security, you may need to provide a written request or otherwise prove your identity. We may require you to verify your identity before processing your request.
We will respond to your request within 30 working days. If you are not satisfied, you can also initiate a complaint through customer service on our platform. "In principle, we do not charge a fee for your reasonable request, but for repeated requests that exceed a reasonable limit, we will charge a certain cost as appropriate.". "We may refuse requests that are unreasonably repetitive, require excessive technical means (such as the need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical.".
Under the following circumstances, we will not be able to respond to your request in accordance with legal and regulatory requirements:
5.8.1. Related to national security and national defense security;
5.8.2. Those related to public safety, public health, or significant public interests;
5.8.3. Related to criminal investigation, prosecution, trial, and execution of judgments;
5.8.4. There is sufficient evidence to indicate that you have subjective malice or abuse your rights;
5.8.5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;
5.8.6. Those involving trade secrets.
5.9. Sign out of your account.
You can apply to cancel your account through the following methods:
You can submit a cancellation application by yourself through [My] - [Settings Management] - [Personal Data] - [Account Cancellation]. The cancellation application takes effect within 7 days.
5.10. Complaint Reporting.
You can make a complaint or report in accordance with our published system. If you believe that your personal information rights may have been infringed, or if you find clues of infringement of your personal information rights, you can contact us at [I want feedback] or by calling (0755 - 86965862). We will provide feedback on your complaint and report within 30 days after verification.
5.11. Access Privacy Policy.
"You can view the entire content of this policy on the registration, login page, or after logging in, click Settings - Privacy Policy."
5.12. Stop operation and inform you of rights.
In the event that our products or services cease to operate, we will promptly stop collecting your personal information, notify you of the cessation of operation by delivering the notice one by one or by sending a push notice or announcement, and delete or anonymize the personal information held by you within a reasonable period of time. (The term "anonymization" in this policy refers to the process of making the subject of personal information unrecognizable through technical processing of personal information, and the processed information cannot be restored. The information obtained after anonymization of personal information is not personal information.)
6. How do we handle the personal information of minors?
We attach great importance to the protection of minors' personal information. According to relevant laws and regulations, if you are a minor under the age of 18, you will not be able to use our services. We will not promote our services to minors or intentionally collect personal information about their minor children without parental consent.
7. How do we store personal information?
7.1. Location of information storage: We will store personal information collected and generated within the territory of the People's Republic of China in accordance with laws and regulations. If your personal information storage location is transferred from China to overseas, we will strictly comply with the provisions of the law. "We will not transmit the above information overseas. If some of the information involves cross-border business and we need to transmit relevant personal information collected domestically to overseas institutions, we will comply with relevant national regulations, seek your consent, and implement in accordance with laws and regulations and the provisions of relevant regulatory authorities. Through effective measures such as signing agreements and on-site verification, we will require overseas institutions to keep your personal information obtained confidential."
7.2. Information storage period: Generally speaking, we only retain your personal information for the time necessary to achieve our goals and within the retention period specified by laws and administrative regulations.
8. How do we update this policy?
In order to provide you with better services, we will revise this policy from time to time, and such amendments form a part of this policy and have the same effect as this policy. If such amendments would result in a material derogation of your rights under this policy, we will display the changed policy to you in the form of push notifications and pop-up windows when you log in and update the version. In this case, if you continue to use our services, you agree to be bound by the revised policy.
If you do not agree to the revised privacy policy, you have the right and should immediately stop using our services. "If you continue to use the service, you will be deemed to have accepted the modifications we have made to the relevant terms of this policy."
9. Others.
9.1. The headings in this policy are for convenience and reading only and do not affect the meaning or interpretation of any provisions of this policy.
9.2. Our platform described in this policy may vary depending on factors such as the phone model, system version, and software application version you are using. The final platform and services are based on the products you use.
9.3. The copyright of this policy is ours, and we have the right to interpret and modify it.
Updated: October 2022
Effective Date: January 2021