This policy only applies to our products or services. Last revision date: 65438+February 20th, 2020.
This policy will help you understand the following:
1. How do we collect and use your user information?
Second, how do we use Cookie and similar technologies?
Third, how to * * * enjoy, transfer and publicly disclose your user information?
Fourth, how to protect your user information?
Verb (short for verb) Your right.
How do we deal with children's personal information?
How to store your user information and how to transfer it around the world.
8. How to update this policy?
Nine, how to contact us
We are well aware of the importance of user information to you and will do our best to protect your user information safely and reliably. We are committed to maintaining your trust in us and adhere to the following principles to protect your user information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring safety, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take corresponding security protection measures to protect your user information according to the mature security standards in the industry.
Please read and understand this privacy policy carefully before using our products (or services).
1. How do we collect and use your user information?
(1) The information we collect and use when you use our products or services.
We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information, but in most cases, if you don't provide it, we may not be able to provide you with the corresponding services or answer your questions:
When you use our service, we are allowed to collect information provided by you or necessary to provide you with services, including personal identity information, equipment information, log information, IP address, location information, etc.
For the user information we collect, we will use it to provide you with authentication, customer service, security, exhibition activities and physical exercise records.
During your use of this service, the above information provided by you will continue to authorize us to use it. When you stop using the push service, we will stop using and delete the above information.
We guarantee that the collected user information will be de-identified or anonymized according to law. Information that cannot identify the personal identity of a natural person alone or in combination with other information does not belong to personal information in the legal sense. If we combine non-personal information with other information to identify you personally, or combine this information with your personal information, we will treat this information as your personal information and protect it in accordance with this privacy policy during the combined use.
In order to better operate and improve our technology and services, or due to the change of business strategy, when the collection, use and processing of user information required by our products or services are beyond the above scope, or when we want to use the collected user information for other purposes not specified in this privacy policy, or when we want to use the information collected for specific purposes for other purposes, we will notify you within a reasonable period after obtaining the user information or before processing the user information, and obtain your authorization and consent.
(2) Exceptions with authorization and consent.
Please understand that according to laws and regulations and relevant national standards, we do not need your authorization to collect and use your user information under the following circumstances:
1, which is directly related to national security and national defense security;
2 directly related to public safety, public health and major public interests;
3. Directly related to criminal investigation, prosecution, trial and judgment execution;
4. It is difficult to obtain my consent in order to safeguard your or others' life, property and other major legitimate rights and interests;
5. The user information you collected is made public by yourself;
6. Your user information is collected from legally open information, such as legal news reports and government information disclosure;
7. Necessary for signing or performing the contract according to your requirements;
8. It is necessary to maintain the safe and stable operation of software and related services, such as finding and handling the faults of software and related services;
9. The controller of personal information is a news unit, which needs to carry out legal news reports;
10. When an academic research institution conducts statistical or academic research based on public interests and provides academic research results or explanations to the outside world, the personal information contained in the results will be de-identified.
1 1, other circumstances stipulated by laws and regulations.
Second, how do we use Cookie and similar technologies?
(1) cookies
In order to ensure the normal operation of the website, we will store a small data file named Cookie on your computer or mobile device. Cookie usually contain identifiers, site names, and some numbers and characters. With Cookie, websites can store your access preference data.
We will not use Cookie for any purposes other than those specified in this policy. You can manage or delete Cookie according to your preference. You can clear all cookies saved on your computer, and most web browsers have the function of blocking cookies. But if you do this, you need to change your user settings every time you visit our website.
(2) Website beacons and pixel labels
In addition to Cookie, we will also use other similar technologies on the website, such as website beacons and pixel tags. For example, the email we send you may contain a click URL that links to the content of our website.
If you click this link, we will follow this click to help us understand your product or service preferences and improve customer service. Website beacons are usually transparent images embedded in websites or emails. With the help of the pixel tag in the email, we can know whether the email has been opened or not. If you don't want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
(3) No tracking (No tracking)
Many web browsers have the Do Not Track function, and you can post Do Not Track requests to websites. At present, major Internet standards organizations have not yet formulated relevant policies to stipulate how websites should respond to such requests. But if your browser is enabled, please don't track, all our websites will respect your choice.
Third, how to * * * enjoy, transfer and publicly disclose your user information?
(1) Enjoy * * *
We will not share your user information with any other company, organization or individual, except in the following cases:
1. Explicitly agree to enjoy: We will share your user information with other parties after obtaining your explicit consent.
2. According to laws and regulations or mandatory requirements of government departments, we may enjoy your user information to the outside world.
3. Share with our affiliated company * * *: Your user information may be shared with our affiliated company * * *. We will only * * * enjoy the necessary user information and be bound by the purposes stated in this privacy policy. If the affiliated company wants to change the processing purpose of user information, it will ask for your authorization again.
4. Sharing with authorized partners * * *: Some of our services will be provided by authorized partners only for the purposes specified in this policy. We may share some of your user information with our partner * * * to provide better customer service and user experience. We will only * * enjoy your user information for legitimate, legitimate, necessary, specific and clear purposes, and only * * * will enjoy the user information necessary for providing services. In order to better operate and improve the technology and services, you agree that we and authorized partners can use the collected information for other services and purposes on the premise of complying with relevant laws and regulations.
The specific authorized partners are listed below, and a link to this third-party privacy policy is provided. We recommend that you read the privacy policy of this third party:
(1) Message push service provider: Daily Interactive Co., Ltd. provides push technical services, and we may provide your equipment information such as equipment platform, equipment manufacturer, equipment brand, equipment identification code, application list information, network information and location-related information to Daily Interactive Co., Ltd. to provide you with push technical services. When we push messages to you, we may authorize Daily Interactive Co., Ltd. to adjust links and promote the closed SDK push process to ensure that you can receive the messages we push to you in time. For details, please visit the Twitter User Privacy Policy.
(2) Advertising and media: We may share the collected information with advertising, media and our other authorized partners for commercial purposes, including optimizing advertising and improving marketing effectiveness.
(3) XXX service provider: ....................................................................................................................................................................
We will sign strict confidentiality agreements with companies, organizations and individuals sharing user information, requiring them to handle user information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.
(2) Transfer
We will not transfer your user information to any company, organization or individual, except in the following circumstances:
1. Express consent to transfer: We will transfer your user information to other parties with your express consent;
2. In the case of merger, acquisition or bankruptcy liquidation, if the transfer of user information is involved, we will ask the new company and organization holding your user information to continue to be bound by this privacy policy, otherwise we will ask the company and organization to seek authorization from you again.
(3) Public disclosure
We will only publicly disclose your user information under the following circumstances:
1. After obtaining your explicit consent;
2. Disclosure according to law: We may publicly disclose your user information under the circumstances of laws, legal procedures, lawsuits or compulsory requirements of government authorities.
(4) * * * Exceptions of obtaining prior authorization when enjoying, transferring or publicly disclosing information.
Please understand that according to laws and regulations and relevant national standards, we * * * enjoy, transfer and publicly disclose your user information without your authorization and consent under the following circumstances:
1, which is directly related to national security and national defense security;
2 directly related to public safety, public health and major public interests;
3. Directly related to criminal investigation, prosecution, trial and judgment execution;
4. It is difficult to obtain my consent in order to safeguard your or others' life, property and other major legitimate rights and interests;
5. Information disclosed to the public by yourself;
6. Collect from the information disclosed according to law, such as legal news reports, government information disclosure and other channels.
Fourth, how to protect your user information?
(1) We have used security protection measures in line with industry standards to protect the user information provided by you and prevent the data from being accessed, publicly disclosed, used, modified, damaged or lost without authorization. We will take all reasonable and feasible measures to protect your user information. For example, when data is exchanged between your browser and the service, it is protected by SSL encryption; At the same time, we provide https secure browsing mode for the website; We will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanism to prevent data from being maliciously attacked; We will deploy an access control mechanism to ensure that only authorized personnel can access user information; We will hold security and privacy protection training courses to enhance employees' understanding of the importance of protecting users' information.
(2) We have obtained the following certifications: {Relevant certifications obtained by the company}.
(3) Our data security capability: {company data security capability description}.
(4) We will take all reasonable and feasible measures to ensure that irrelevant user information is not collected. We will only keep your user information for the period required to achieve the purpose specified in the cost policy, unless the retention period needs to be extended or permitted by law.
(5) The Internet is not an absolutely secure environment, and emails, instant messages and communications with other users are not encrypted. We strongly recommend that you do not send user information in this way.
(6) We will regularly update and publish the relevant contents of the security risk and user information security impact assessment report. It can be obtained through the following ways: supplementing the security risk exposure channels.
? The Internet environment is not 100% secure, and we will try our best to ensure the security of any information you send us. Even if we make great efforts and take all reasonable and necessary measures, we may still be unable to prevent your user information from being illegally accessed, stolen, tampered with or destroyed, thus damaging your legitimate rights and interests. Please understand the above risks of information network and bear them voluntarily.
? After the unfortunate occurrence of user information security incidents, we will inform you in time according to the requirements of laws and regulations: the basic situation and possible impact of security incidents, the disposal measures we have taken or will take, the suggestions that you can prevent and reduce risks independently, and the remedial measures taken for you. We will inform you of the incident in time by email, letter, telephone and push notification. If it is difficult to inform the users of the information subject one by one, we will make an announcement in a reasonable and effective way. At the same time, we will actively report the handling of user information security incidents according to the requirements of the regulatory authorities.
Verb (short for verb) Your right.
According to the relevant laws, regulations and standards of China and the common practices of other countries and regions, we guarantee that you can exercise the following rights on your user information:
(a) Access your user information
You have the right to access your user information, except for the exceptions stipulated by laws and regulations. If you want to exercise the right to access data, you can access it by yourself in the following ways: supplement the access method of user information.
If you can't access these user information through the above links, you can contact us at any time by using our online form or sending an email to {company mailbox}. We will reply to your visit request within 30 days.
As long as we don't need to invest too much, we will provide you with other user information generated in the process of using our products or services. If you want to access data, please send an email to {company mailbox}.
(2) Correct your user information.
When you find that the information we handle about your users is wrong, you have the right to ask us to correct it. You can use "1". Access your user information ". If you can't correct these user information through the above links, you can contact us at any time by using our online form or sending an email to {company email}. We will reply to your request for correction within 30 days.
(3) Delete your user information.
You can ask us to delete user information under the following circumstances:
1. If our handling of user information violates laws and regulations;
2. If we collect and use your user information without your consent;
3. If our handling of user information violates our agreement with you;
4. If you no longer use our products or services, or if you cancel your account;
5. If we no longer provide you with products or services.
We will evaluate your deletion request, and if it meets the corresponding requirements, we will take corresponding measures to deal with it. When you make a deletion request to us, we may ask you to verify your identity to ensure the security of your account. When you delete information from our service, due to applicable laws and security technologies, we may not delete the corresponding information from the backup system immediately. We will store your information securely until the backup is cleared or anonymous.
(4) Change the scope of your authorization and consent.
Every business function requires some basic user information to complete (see "Part I" of this policy). You can grant or revoke the authorization to collect and use user information at any time. You can operate by yourself in the following ways: supplement and change the access method of user information.
When you withdraw your consent, we will no longer process the corresponding user information. At the same time, please note that your revocation of authorization consent may lead to some consequences. For example, we may not be able to continue to provide you with the corresponding services or specific functions, but your decision to withdraw your consent will not affect the previous user information processing based on your authorization.
(5) The user information subject cancels the account.
You can cancel your previously registered account at any time, and you can cancel it by yourself in the following ways: supplement the operation method of canceling the account.
After canceling the account, we will stop providing products or services to you and delete or anonymize your information according to your requirements, unless otherwise stipulated by laws and regulations. This may also prevent you from accessing the data in your account. Please be careful.
(6) The user information subject obtains a copy of the user information.
You have the right to obtain a copy of your user information, and you can obtain it by yourself in the following ways: supplement the operation method of obtaining a copy of user information.
On the premise of technical feasibility, such as data interface matching, we can also directly transmit a copy of your user information to your designated third party according to your requirements.
(seven) constraint information system automatic decision-making.
In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions seriously affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate remedial measures.
(8) Respond to your above requirements.
For security reasons, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
We will give an answer within 30 days. If you are not satisfied, you can also complain through the following channels: supplement other complaint channels
In principle, we don't charge you for your reasonable request, but we will charge you a certain fee as appropriate for repeated requests that exceed reasonable limits. We may reject unnecessary duplication, require too many technical means (for example, need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or make very unrealistic demands. Please also understand that due to security considerations, requirements of relevant laws and regulations or technical limitations, we may not be able to respond to some of your requests, such as the following:
1, which is related to the fulfillment of obligations stipulated by laws and regulations by the user information controller;
2, directly related to national security and national defense security;
3 directly related to public safety, public health and major public interests;
4. Directly related to criminal investigation, prosecution, trial and execution of judgments;
5. The user information controller has sufficient evidence to show that the user information subject has subjective malice or abuse of rights;
6. It is difficult to obtain the user's consent in order to ensure the life and property safety of the user's information subject or other individuals;
7. Responding to the request of the user information subject will cause serious damage to the legitimate rights and interests of the user information subject or other individuals and organizations;
8. Involving trade secrets.
How do we deal with children's personal information?
We attach great importance to the protection of children's personal information, and our products, websites and services are mainly for adults. Children should not create their own user accounts without the consent of their parents or guardians. Although local laws and customs have different definitions of children, we regard anyone below 14 as a child.
To collect user information of children with the consent of parents or guardians, we will only store, use or publicly disclose this information when permitted by law, explicitly agreed by parents or guardians or necessary for the protection of children, otherwise we will try to delete the relevant data as soon as possible.
In view of the limitations of existing technology and business model, it is difficult for us to actively identify children's personal information. If you find that we have collected children's personal information without knowing or obtaining the consent of the verifiable guardian in advance, you can contact us in time, and we will try our best to delete it in time after discovery. If we find the above situation ourselves, we will delete it in time, unless the law requires us to keep it.
How to store your user information and how to transfer it around the world.
In principle, the user information we collect and generate in People's Republic of China (PRC) will be stored in People's Republic of China (PRC). We will only keep your user information for the period required for the purposes and purposes specified in this policy and for the shortest period specified by laws and regulations. After the above retention period, we will delete your user information or treat it anonymously according to the requirements of applicable laws and regulations. Unless otherwise stipulated by laws and regulations, or for the purpose of public interest, scientific and historical research, or otherwise authorized by you, we may need to keep relevant data for a long time.
Because we provide products or services through resources and servers all over the world, this means that with your authorization, your user information may be transferred to or accessed from overseas jurisdictions in countries where you use products or services.
These jurisdictions may have different data protection laws or even no relevant laws. In this case, we will ensure that your user information is fully and equally protected in People's Republic of China (PRC). For example, we will ask your consent when transferring user information across borders, or implement security measures such as data de-identification before cross-border data transfer.
8. How to update this policy?
Our privacy policy may change. We will not reduce your rights under this privacy policy without your express consent. We will post any changes to this policy on this page.
For major changes, we will also provide more important notices. Major changes mentioned in this policy include but are not limited to:
1, our service model has undergone major changes. Such as the purpose of processing user information, the type of user information processed, the way of using user information, etc.
2. We have experienced great changes in ownership structure and organizational structure. Such as business adjustment, bankruptcy merger and acquisition, etc. ;
3. The main object of user information sharing, transfer or public disclosure has changed;
4. Your right to participate in user information processing and the way to exercise this right have undergone major changes;
5. When the responsible department, contact information and complaint channels responsible for handling user information security change;
6. The user information security impact assessment report shows that there are high risks.
We will also archive the old version of this policy for your reference.
Nine, how to contact us
If you have any questions, comments or suggestions about this privacy policy.
We set up a full-time user information protection department. You can contact the relevant personnel in the following ways: supplement the contact information related to user information protection.
Normally, we will reply within 30 days.
If you are not satisfied with our reply, especially our user information processing behavior has damaged your legitimate rights and interests, you can also seek solutions through the following external channels: supplement other external channels to obtain solutions.